· 6 years ago · Mar 24, 2020, 07:57 AM
1##################################################################################################################################
2==================================================================================================================================
3Hostname www.notarioexpress.cl ISP Microsoft Corporation
4Continent North America Flag
5US
6Country United States Country Code US
7Region Iowa Local time 24 Mar 2020 01:35 CDT
8City Des Moines Postal Code 50307
9IP Address 40.113.247.175 Latitude 41.601
10 Longitude -93.611
11==================================================================================================================================
12##################################################################################################################################
13> www.notarioexpress.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18www.notarioexpress.cl canonical name = notarioexpress.azurewebsites.net.
19notarioexpress.azurewebsites.net canonical name = ssl.notarioexpress.azurewebsites.net.
20Name: ssl.notarioexpress.azurewebsites.net
21Address: 40.113.247.175
22>
23#################################################################################################################################
24Domain name: notarioexpress.cl
25Registrant name: Ninguna Ninguna
26Registrant organisation: Ninguna
27Registrar name: Hosting Concepts B.V. d/b/a Registrar.eu
28Registrar URL: https://www.openprovider.es
29Creation date: 2017-06-04 17:06:11 CLST
30Expiration date: 2021-06-04 17:06:11 CLST
31Name server: ns1-04.azure-dns.com
32Name server: ns2-04.azure-dns.net
33Name server: ns3-04.azure-dns.org
34##################################################################################################################################
35[+] Target : https://www.notarioexpress.cl
36
37[+] IP Address : 40.113.247.175
38
39[+] Headers :
40
41[+] Cache-Control : private
42[+] Content-Length : 41236
43[+] Content-Type : text/html; charset=utf-8
44[+] Content-Encoding : gzip
45[+] Vary : Accept-Encoding
46[+] Server : Microsoft-IIS/10.0
47[+] Set-Cookie : ASP.NET_SessionId=l0jcssxxisuj0yz4pguotadl; path=/; HttpOnly; SameSite=Lax, ASP.NET_SessionId=l0jcssxxisuj0yz4pguotadl; path=/; HttpOnly; SameSite=Lax, __AntiXsrfToken=dd8ba328b7be4aba8a9b9d7193e008a5; path=/; HttpOnly
48[+] X-AspNet-Version : 4.0.30319
49[+] X-Powered-By : ASP.NET
50[+] Date : Tue, 24 Mar 2020 06:41:50 GMT
51
52[!] SSL Certificate Information :
53
54[+] organizationalUnitName : Domain Control Validated
55[+] commonName : notarioexpress.cl
56[+] countryName : US
57[+] stateOrProvinceName : Arizona
58[+] localityName : Scottsdale
59[+] organizationName : GoDaddy.com, Inc.
60[+] organizationalUnitName : http://certs.godaddy.com/repository/
61[+] commonName : Go Daddy Secure Certificate Authority - G2
62[+] version : 3
63[+] serialNumber : DCED559CFE216E21
64[+] notBefore : Nov 10 23:54:59 2019 GMT
65[+] notAfter : Nov 10 23:54:59 2020 GMT
66[+] OCSP : http://ocsp.godaddy.com/
67[+] caIssuers : http://certificates.godaddy.com/repository/gdig2.crt
68[+] crlDistributionPoints : http://crl.godaddy.com/gdig2s1-1506.crl
69
70[!] Whois Lookup :
71
72[+] asn_registry : arin
73[+] asn : 8075
74[+] asn_cidr : 40.64.0.0/10
75[+] asn_country_code : US
76[+] asn_date : 2015-02-23
77[+] asn_description : MICROSOFT-CORP-MSN-AS-BLOCK US
78[+] query : 40.113.247.175
79[+] cidr : 40.120.0.0/14 40.76.0.0/14 40.125.0.0/17 40.96.0.0/12 40.112.0.0/13 40.74.0.0/15 40.80.0.0/12 40.124.0.0/16
80[+] name : MSFT
81[+] handle : NET-40-74-0-0-1
82[+] range : 40.74.0.0 - 40.125.127.255
83[+] description : Microsoft Corporation
84[+] country : US
85[+] state : WA
86[+] city : Redmond
87[+] address : One Microsoft Way
88[+] postal_code : 98052
89[+] emails : ['msndcc@microsoft.com' 'IOC@microsoft.com' 'abuse@microsoft.com']
90[+] created : 2015-02-23
91[+] updated : 2015-05-27
92
93[!] Starting DNS Enumeration...
94
95[+] notarioexpress.cl. 3599 IN MX 5 alt1.aspmx.l.google.com.
96[+] notarioexpress.cl. 21599 IN NS ns4-04.azure-dns.info.
97[+] notarioexpress.cl. 3599 IN TXT "notarioexpress.azurewebsites.net"
98[+] notarioexpress.cl. 3599 IN MX 10 alt4.aspmx.l.google.com.
99[+] notarioexpress.cl. 3599 IN MX 10 alt3.aspmx.l.google.com.
100[+] notarioexpress.cl. 21599 IN NS ns1-04.azure-dns.com.
101[+] notarioexpress.cl. 21599 IN NS ns3-04.azure-dns.org.
102[+] notarioexpress.cl. 3599 IN A 40.113.247.175
103[+] notarioexpress.cl. 3599 IN MX 5 alt2.aspmx.l.google.com.
104[+] notarioexpress.cl. 299 IN SOA ns1-04.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
105[+] notarioexpress.cl. 3599 IN MX 1 aspmx.l.google.com.
106[+] notarioexpress.cl. 21599 IN NS ns2-04.azure-dns.net.
107[+] notarioexpress.cl. 3599 IN SOA ns1-04.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
108
109[-] DMARC Record Not Found!
110
111[!] Starting Sub-Domain Enumeration...
112
113[!] Requesting BuffOver
114[!] Requesting ThreadCrowd
115[!] Requesting crt.sh
116[!] Requesting AnubisDB
117[!] Requesting ThreatMiner
118
119[+] Results :
120
121[+] admin.notarioexpress.cl
122[+] ssl.notarioexpress.azurewebsites.net
123[+] www.notarioexpress.cl
124[+] backoffice.notarioexpress.cl
125[+] ssl.nebackoffice.azurewebsites.net
126[+] ssl.adminnotarioexpress.azurewebsites.net
127
128[+] Total Found : 6
129
130[+] Port : 33434
131[+] Timeout : 1.0
132
133[!] Starting UDP Traceroute...
134
135HOPS IP HOST
136
1371 10.203.14.1 _gateway
1382 * * *
1393 149.6.188.49 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com
1404 154.25.10.249 be2160.rcr51.tll01.atlas.cogentco.com
1415 154.54.60.190 be3740.ccr21.sto03.atlas.cogentco.com
1426 130.117.50.226 be3376.ccr21.sto01.atlas.cogentco.com
1437 149.6.168.18 sting-networks-ab.demarc.cogentco.com
1448 104.44.225.161 ae1-0.sto-96cbe-1b.ntwk.msn.net
1459 104.44.232.173 ae22-0.ear01.ham30.ntwk.msn.net
14610 104.44.21.17 be-21-0.ibr02.ham30.ntwk.msn.net
14711 104.44.16.131 be-4-0.ibr06.ams06.ntwk.msn.net
14812 104.44.18.190 be-6-0.ibr02.ams21.ntwk.msn.net
14913 104.44.17.50 be-3-0.ibr02.lon24.ntwk.msn.net
15014 104.44.16.57 be-1-0.ibr02.lon22.ntwk.msn.net
15115 * * *
15216 104.44.7.105 be-3-0.ibr02.ewr30.ntwk.msn.net
15317 104.44.7.98 be-2-0.ibr02.cle30.ntwk.msn.net
15418 104.44.7.91 be-1-0.ibr01.cle30.ntwk.msn.net
15519 104.44.7.112 be-3-0.ibr01.ch4.ntwk.msn.net
15620 104.44.7.217 be-1-0.ibr01.ch2.ntwk.msn.net
15721 104.44.7.219 be-2-0.ibr02.ch2.ntwk.msn.net
15822 104.44.22.182 ae141-0.icr03.dsm05.ntwk.msn.net
15923 * * *
16024 * * *
16125 * * *
16226 * * *
16327 * * *
16428 * * *
16529 * * *
16630 * * *
167
168[!] Starting Port Scan...
169
170[+] Testing Top 1000 Ports...
171
172[+] 80 http
173[+] 443 https
174
175[!] Starting Crawler...
176
177[+] Looking for robots.txt........[ Found ]
178[+] Extracting robots Links.......[ 1 ]
179[+] Looking for sitemap.xml.......[ Found ]
180[+] Extracting sitemap Links......[ 76 ]
181[+] Extracting CSS Links..........[ 7 ]
182[+] Extracting Javascript Links...[ 13 ]
183[+] Extracting Internal Links.....[ 5 ]
184[+] Extracting External Links.....[ 44 ]
185[+] Extracting Images.............[ 68 ]
186[+] Crawling Sitemaps.............[ 0 ]
187[+] Crawling Javascripts..........[ 85 ]
188
189[+] Total Unique Links Extracted : 295
190
191[!] Starting Directory Search...
192
193[+] Threads : 50
194[+] Timeout : 10.0
195[+] Wordlist : wordlists/dirb_common.txt
196[+] Allow Redirects : False
197[+] SSL Verification : True
198[+] DNS Servers : 1.1.1.1
199
200[+] 200 | https://www.notarioexpress.cl/
201[+] 302 | https://www.notarioexpress.cl/agenda
202[+] 301 | https://www.notarioexpress.cl/certificates
203[+] 200 | https://www.notarioexpress.cl/contacto
204[+] 301 | https://www.notarioexpress.cl/content
205[+] 301 | https://www.notarioexpress.cl/Content
206[+] 301 | https://www.notarioexpress.cl/controller
207[+] 301 | https://www.notarioexpress.cl/controls
208[+] 301 | https://www.notarioexpress.cl/css
209[+] 301 | https://www.notarioexpress.cl/download
210[+] 301 | https://www.notarioexpress.cl/Download
211[+] 301 | https://www.notarioexpress.cl/email
212[+] 200 | https://www.notarioexpress.cl/error
213[+] 200 | https://www.notarioexpress.cl/errorpage
214[+] 200 | https://www.notarioexpress.cl/favicon.ico
215[+] 200 | https://www.notarioexpress.cl/feedback
216[+] 301 | https://www.notarioexpress.cl/fonts
217[+] 301 | https://www.notarioexpress.cl/images
218[+] 301 | https://www.notarioexpress.cl/Images
219[+] 200 | https://www.notarioexpress.cl/index
220[+] 200 | https://www.notarioexpress.cl/Index
221[+] 301 | https://www.notarioexpress.cl/js
222[+] 301 | https://www.notarioexpress.cl/lib
223[+] 200 | https://www.notarioexpress.cl/mobile
224[+] 301 | https://www.notarioexpress.cl/properties
225[+] 200 | https://www.notarioexpress.cl/robots.txt
226[+] 301 | https://www.notarioexpress.cl/scripts
227[+] 301 | https://www.notarioexpress.cl/Scripts
228[+] 200 | https://www.notarioexpress.cl/sitemap.xml
229
230[+] Directories Found : 29
231[+] Directories Skipped : 4585
232[+] Total Requests : 4614
233################################################################################################################################
234i] Scanning Site: http://www.notarioexpress.cl
235
236
237
238B A S I C I N F O
239====================
240
241
242[+] Site Title:
243 Notario Express - Menos de 10 minutos de espera promedio en la Notaria
244
245[+] IP address: 40.113.247.175
246[+] Web Server: Microsoft-IIS/10.0
247[+] CMS: Could Not Detect
248[+] Cloudflare: Not Detected
249[+] Robots File: Could NOT Find robots.txt!
250
251
252
253
254W H O I S L O O K U P
255========================
256
257 %%
258%% This is the NIC Chile Whois server (whois.nic.cl).
259%%
260%% Rights restricted by copyright.
261%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
262%%
263
264Domain name: notarioexpress.cl
265Registrant name: Ninguna Ninguna
266Registrant organisation: Ninguna
267Registrar name: Hosting Concepts B.V. d/b/a Registrar.eu
268Registrar URL: https://www.openprovider.es
269Creation date: 2017-06-04 17:06:11 CLST
270Expiration date: 2021-06-04 17:06:11 CLST
271Name server: ns1-04.azure-dns.com
272Name server: ns2-04.azure-dns.net
273Name server: ns3-04.azure-dns.org
274
275%%
276%% For communication with domain contacts please use website.
277%% See https://www.nic.cl/registry/Whois.do?d=notarioexpress.cl
278%%
279
280
281
282
283G E O I P L O O K U P
284=========================
285
286[i] IP Address: 40.113.247.175
287[i] Country: United States
288[i] State: Iowa
289[i] City: Des Moines
290[i] Latitude: 41.6006
291[i] Longitude: -93.6112
292
293
294
295
296H T T P H E A D E R S
297=======================
298
299
300[i] HTTP/1.1 301 Moved Permanently
301[i] Content-Type: text/html; charset=UTF-8
302[i] Location: https://www.notarioexpress.cl/
303[i] Server: Microsoft-IIS/10.0
304[i] Date: Tue, 24 Mar 2020 06:42:43 GMT
305[i] Connection: close
306[i] Content-Length: 0
307[i] HTTP/1.1 200 OK
308[i] Cache-Control: private
309[i] Content-Length: 252987
310[i] Content-Type: text/html; charset=utf-8
311[i] Server: Microsoft-IIS/10.0
312[i] Set-Cookie: ASP.NET_SessionId=aea5tzrhcfxnqgtib22w3l2a; path=/; HttpOnly; SameSite=Lax
313[i] Set-Cookie: ASP.NET_SessionId=aea5tzrhcfxnqgtib22w3l2a; path=/; HttpOnly; SameSite=Lax
314[i] Set-Cookie: __AntiXsrfToken=a4b9896b2bcb4b09aab7d4c243edf9e3; path=/; HttpOnly
315[i] X-AspNet-Version: 4.0.30319
316[i] X-Powered-By: ASP.NET
317[i] Date: Tue, 24 Mar 2020 06:42:45 GMT
318[i] Connection: close
319
320
321
322
323D N S L O O K U P
324===================
325
326notarioexpress.cl. 3599 IN A 40.113.247.175
327notarioexpress.cl. 21599 IN NS ns1-04.azure-dns.com.
328notarioexpress.cl. 21599 IN NS ns2-04.azure-dns.net.
329notarioexpress.cl. 21599 IN NS ns3-04.azure-dns.org.
330notarioexpress.cl. 21599 IN NS ns4-04.azure-dns.info.
331notarioexpress.cl. 3599 IN SOA ns1-04.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
332notarioexpress.cl. 3599 IN MX 1 aspmx.l.google.com.
333notarioexpress.cl. 3599 IN MX 5 alt1.aspmx.l.google.com.
334notarioexpress.cl. 3599 IN MX 5 alt2.aspmx.l.google.com.
335notarioexpress.cl. 3599 IN MX 10 alt3.aspmx.l.google.com.
336notarioexpress.cl. 3599 IN MX 10 alt4.aspmx.l.google.com.
337notarioexpress.cl. 3599 IN TXT "notarioexpress.azurewebsites.net"
338
339
340
341
342S U B N E T C A L C U L A T I O N
343====================================
344
345Address = 40.113.247.175
346Network = 40.113.247.175 / 32
347Netmask = 255.255.255.255
348Broadcast = not needed on Point-to-Point links
349Wildcard Mask = 0.0.0.0
350Hosts Bits = 0
351Max. Hosts = 1 (2^0 - 0)
352Host Range = { 40.113.247.175 - 40.113.247.175 }
353
354
355
356N M A P P O R T S C A N
357============================
358
359Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-24 06:42 UTC
360Nmap scan report for notarioexpress.cl (40.113.247.175)
361Host is up (0.035s latency).
362
363PORT STATE SERVICE
36421/tcp filtered ftp
36522/tcp filtered ssh
36680/tcp open http
367443/tcp open https
368
369Nmap done: 1 IP address (1 host up) scanned in 1.40 seconds
370
371################################################################################################################################
372[INFO] ------TARGET info------
373[*] TARGET: https://www.notarioexpress.cl/
374[*] TARGET IP: 40.113.247.175
375[INFO] NO load balancer detected for www.notarioexpress.cl...
376[*] DNS servers: notarioexpress.azurewebsites.net. prd1.azuredns-cloud.net.
377[*] TARGET server: Microsoft-IIS/10.0
378[*] CC: US
379[*] Country: United States
380[*] RegionCode: IA
381[*] RegionName: Iowa
382[*] City: Des Moines
383[*] ASN: AS8075
384[*] BGP_PREFIX: 40.64.0.0/10
385[*] ISP: MICROSOFT-CORP-MSN-AS-BLOCK, US
386[INFO] SSL/HTTPS certificate detected
387[*] Issuer: issuer=C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
388[*] Subject: subject=OU = Domain Control Validated, CN = notarioexpress.cl
389[INFO] DNS enumeration:
390[*] admin.notarioexpress.cl adminnotarioexpress.azurewebsites.net. ssl.adminnotarioexpress.azurewebsites.net. 40.113.239.58
391[INFO] Possible abuse mails are:
392[*] abuse@notarioexpress.cl
393[*] abuse@www.notarioexpress.cl
394[*] report_spam@hotmail.com
395[INFO] NO PAC (Proxy Auto Configuration) file FOUND
396[ALERT] robots.txt file FOUND in http://www.notarioexpress.cl/robots.txt
397[INFO] Checking for HTTP status codes recursively from http://www.notarioexpress.cl/robots.txt
398[INFO] Status code Folders
399[INFO] Starting FUZZing in http://www.notarioexpress.cl/FUzZzZzZzZz...
400[INFO] Status code Folders
401[*] 200 http://www.notarioexpress.cl/index
402[ALERT] Look in the source code. It may contain passwords
403[INFO] Links found from https://www.notarioexpress.cl/ http://40.113.247.175/:
404[*] http://30notaria.cl/
405[*] http://notariaerodriguez.cl/
406[*] http://notariaguerrero.cl/
407[*] http://notarialascar.cl/
408[*] http://notariamanquehual.cl/
409[*] http://notariarenatagonzalez.cl/
410[*] http://notariasanantonio.cl/
411[*] https://blogs.msdn.microsoft.com/appserviceteam/2017/08/08/faq-app-service-domain-preview-and-custom-domains/
412[*] https://docs.microsoft.com/en-us/azure/app-service-web/app-service-web-tutorial-custom-domain
413[*] https://notariagomila.cl/
414[*] https://notariaquintero.cl/
415[*] https://notariavega.cl/
416[*] https://notariavillarrica.cl/
417[*] https://notariavitacura.cl/
418[*] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
419[*] https://www.cbrmelipilla.cl/
420[*] https://www.conservador.cl/portal/certificado_vigencia_poder
421[*] https://www.dt.gob.cl/legislacion/1624/w3-propertyvalue-145960.html
422[*] https://www.dt.gob.cl/portal/1626/articles-104572_recurso_2.doc
423[*] https://www.dt.gob.cl/portal/1626/articles-104572_recurso_3.doc
424[*] https://www.facebook.com/NotarioExpress
425[*] https://www.googletagmanager.com/ns.html?id=GTM-5G7HGGD
426[*] https://www.linkedin.com/in/notarioexpress/
427[*] https://www.notariadiez.cl/
428[*] https://www.notariaespinosa.cl/
429[*] https://www.notariajuanrodriguez.cl/
430[*] https://www.notarioexpress.cl/
431[*] https://www.notarioexpress.cl/certificadodeantiguedadlaboral.aspx
432[*] https://www.notarioexpress.cl/certificadoderesidencia
433[*] https://www.notarioexpress.cl/comofunciona.aspx
434[*] https://www.notarioexpress.cl/Contacto.aspx
435[*] https://www.notarioexpress.cl/documentosnotariales
436[*] https://www.notarioexpress.cl/EjemploContratoTrabajoExtranjero.pdf
437[*] https://www.notarioexpress.cl/EjemploContratoTrabajo.pdf
438[*] https://www.notarioexpress.cl/mIndex
439[*] https://www.notarioexpress.cl/mIndex#carousel-review
440[*] https://www.notarioexpress.cl/notariasdechile.aspx
441[*] https://www.notarioexpress.cl/notariasdeturnoenchile.aspx
442[*] https://www.notarioexpress.cl/PoderSimpleSalvoconductoInstrucciones.pdf
443[*] https://www.notarioexpress.cl/PreguntasFrecuentes.aspx
444[*] https://www.notarioexpress.cl/prensa.aspx
445[*] https://www.notarioexpress.cl/Prensa.aspx
446[*] https://www.notarioexpress.cl/salvoconducto.aspx
447[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=10
448[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=11
449[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=12
450[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=19
451[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=20
452[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=21
453[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=22
454[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=23
455[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=24
456[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=25
457[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=26
458[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=27
459[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=28
460[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=29
461[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=30
462[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=300
463[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=301
464[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=302
465[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=31
466[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=32
467[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=39
468[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=4
469[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=40
470[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=41
471[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=42
472[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=43
473[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=44
474[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=45
475[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=46
476[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=47
477[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=5
478[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=6
479[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=60
480[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=61
481[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=62
482[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=63
483[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=64
484[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=65
485[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=66
486[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=67
487[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=68
488[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=69
489[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=7
490[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=76
491[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=8
492[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=83
493[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=89
494[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=9
495[*] https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=90
496[*] https://www.notarioexpress.cl/SobreNosotros.aspx
497[*] https://www.notarioexpress.cl/SolicitudNuevoDocumento
498[*] https://www.twitter.com/notarioexpress/
499[*] http://www.cbrrancagua.cl/html2/index.php
500[*] http://www.notariaarrieta.cl/
501[*] http://www.notariabosch.cl/
502[*] http://www.notariacortes.cl/
503[*] http://www.notariadelreal.cl/web/
504[*] http://www.notariaferrand.cl/
505[*] http://www.notariahernandez.cl/
506[*] http://www.notariahormazabal.cl/
507[*] http://www.notariahurtado.cl/
508[*] http://www.notarialacisterna.cl/
509[*] http://www.notarialaflorida.cl/
510[*] http://www.notariamendoza.cl/
511[*] http://www.notariaossa.cl/
512[*] http://www.notariaquintanilla.cl/
513[*] http://www.notariareinoso.cl/
514[*] http://www.notariaretamal.cl/
515[*] http://www.notariasantibanez.cl/
516[*] http://www.notariasotomayor.cl/
517[*] http://www.notariavila.cl/
518[*] http://www.tuempresaenundia.cl/
519cut: invalid field range
520Try 'cut --help' for more information.
521[INFO] BING shows 40.113.247.175 is shared with 17 hosts/vhosts
522[INFO] Shodan detected the following opened ports on 40.113.247.175:
523[*] 443
524[*] 80
525[INFO] ------VirusTotal SECTION------
526[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
527[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
528[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
529[INFO] ------Alexa Rank SECTION------
530[INFO] Percent of Visitors Rank in Country:
531[INFO] Percent of Search Traffic:
532[INFO] Percent of Unique Visits:
533[INFO] Total Sites Linking In:
534[*] Total Sites
535[INFO] Useful links related to www.notarioexpress.cl - 40.113.247.175:
536[*] https://www.virustotal.com/pt/ip-address/40.113.247.175/information/
537[*] https://www.hybrid-analysis.com/search?host=40.113.247.175
538[*] https://www.shodan.io/host/40.113.247.175
539[*] https://www.senderbase.org/lookup/?search_string=40.113.247.175
540[*] https://www.alienvault.com/open-threat-exchange/ip/40.113.247.175
541[*] http://pastebin.com/search?q=40.113.247.175
542[*] http://urlquery.net/search.php?q=40.113.247.175
543[*] http://www.alexa.com/siteinfo/www.notarioexpress.cl
544[*] http://www.google.com/safebrowsing/diagnostic?site=www.notarioexpress.cl
545[*] https://censys.io/ipv4/40.113.247.175
546[*] https://www.abuseipdb.com/check/40.113.247.175
547[*] https://urlscan.io/search/#40.113.247.175
548[*] https://github.com/search?q=40.113.247.175&type=Code
549[INFO] Useful links related to AS8075 - 40.64.0.0/10:
550[*] http://www.google.com/safebrowsing/diagnostic?site=AS:8075
551[*] https://www.senderbase.org/lookup/?search_string=40.64.0.0/10
552[*] http://bgp.he.net/AS8075
553[*] https://stat.ripe.net/AS8075
554[INFO] Date: 24/03/20 | Time: 02:45:31
555[INFO] Total time: 1 minute(s) and 39 second(s)
556################################################################################################################################
557[+] Starting At 2020-03-24 02:43:55.087365
558[+] Collecting Information On: https://www.notarioexpress.cl/
559[#] Status: 200
560--------------------------------------------------
561[#] Web Server Detected: Microsoft-IIS/10.0
562[#] X-Powered-By: ASP.NET
563[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
564- Cache-Control: private
565- Content-Length: 41644
566- Content-Type: text/html; charset=utf-8
567- Content-Encoding: gzip
568- Vary: Accept-Encoding
569- Server: Microsoft-IIS/10.0
570- Set-Cookie: ASP.NET_SessionId=km5yzbz3gdmlzse11ftznbma; path=/; HttpOnly; SameSite=Lax, ASP.NET_SessionId=km5yzbz3gdmlzse11ftznbma; path=/; HttpOnly; SameSite=Lax, __AntiXsrfToken=9a674e3a9d8646c98b79536a34969947; path=/; HttpOnly
571- X-AspNet-Version: 4.0.30319
572- X-Powered-By: ASP.NET
573- Date: Tue, 24 Mar 2020 06:43:50 GMT
574--------------------------------------------------
575[#] Finding Location..!
576[#] status: success
577[#] country: United States
578[#] countryCode: US
579[#] region: IA
580[#] regionName: Iowa
581[#] city: Des Moines
582[#] zip: 50309
583[#] lat: 41.5908
584[#] lon: -93.6208
585[#] timezone: America/Chicago
586[#] isp: Microsoft Corporation
587[#] org: Microsoft Azure Cloud (centralus)
588[#] as: AS8075 Microsoft Corporation
589[#] query: 40.113.247.175
590--------------------------------------------------
591[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
592--------------------------------------------------
593[#] Starting Reverse DNS
594[-] Failed ! Fail
595--------------------------------------------------
596[!] Scanning Open Port
597[#] 80/tcp open http
598[#] 443/tcp open https
599--------------------------------------------------
600[+] Getting SSL Info
601{'OCSP': ('http://ocsp.godaddy.com/',),
602 'caIssuers': ('http://certificates.godaddy.com/repository/gdig2.crt',),
603 'crlDistributionPoints': ('http://crl.godaddy.com/gdig2s1-1506.crl',),
604 'issuer': ((('countryName', 'US'),),
605 (('stateOrProvinceName', 'Arizona'),),
606 (('localityName', 'Scottsdale'),),
607 (('organizationName', 'GoDaddy.com, Inc.'),),
608 (('organizationalUnitName',
609 'http://certs.godaddy.com/repository/'),),
610 (('commonName', 'Go Daddy Secure Certificate Authority - G2'),)),
611 'notAfter': 'Nov 10 23:54:59 2020 GMT',
612 'notBefore': 'Nov 10 23:54:59 2019 GMT',
613 'serialNumber': 'DCED559CFE216E21',
614 'subject': ((('organizationalUnitName', 'Domain Control Validated'),),
615 (('commonName', 'notarioexpress.cl'),)),
616 'subjectAltName': (('DNS', 'notarioexpress.cl'),
617 ('DNS', 'www.notarioexpress.cl')),
618 'version': 3}
619-----BEGIN CERTIFICATE-----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654-----END CERTIFICATE-----
655
656--------------------------------------------------
657[+] Collecting Information Disclosure!
658[#] Detecting sitemap.xml file
659[!] sitemap.xml File Found: https://www.notarioexpress.cl//sitemap.xml
660[#] Detecting robots.txt file
661[!] robots.txt File Found: https://www.notarioexpress.cl//robots.txt
662[#] Detecting GNU Mailman
663[-] GNU Mailman App Not Detected!?
664--------------------------------------------------
665[+] Crawling Url Parameter On: https://www.notarioexpress.cl/
666--------------------------------------------------
667[#] Searching Html Form !
668[+] Html Form Discovered
669[#] action: ./
670[#] class: None
671[#] id: ctl01
672[#] method: post
673--------------------------------------------------
674[!] Found 76 dom parameter
675[#] https://www.notarioexpress.cl//#collapsePoderes
676[#] https://www.notarioexpress.cl//#collapsePlacasVehiculo
677[#] https://www.notarioexpress.cl//#collapseAlterarVehiculo
678[#] https://www.notarioexpress.cl//#collapseCobroPension
679[#] https://www.notarioexpress.cl//#collapseCobroFiniquito
680[#] https://www.notarioexpress.cl//#collapseAdmonInmueble
681[#] https://www.notarioexpress.cl//#collapsePoderBancarioSimple
682[#] https://www.notarioexpress.cl//#collapsePoderBancarioJuridico
683[#] https://www.notarioexpress.cl//#collapsePoderEspecialSII
684[#] https://www.notarioexpress.cl//#collapseVehiculo
685[#] https://www.notarioexpress.cl//#collapseHerencia
686[#] https://www.notarioexpress.cl//#collapseRetiroVehiculo
687[#] https://www.notarioexpress.cl//#collapseSimple
688[#] https://www.notarioexpress.cl//#collapsePoderEspecialJuridico
689[#] https://www.notarioexpress.cl//#collapsePoderEspecialNatural
690[#] https://www.notarioexpress.cl//#collapseViaje
691[#] https://www.notarioexpress.cl//#collapseComercial
692[#] https://www.notarioexpress.cl//#collapseMenor
693[#] https://www.notarioexpress.cl//#collapseViajeAmbos
694[#] https://www.notarioexpress.cl//#collapseViajePadre
695[#] https://www.notarioexpress.cl//#collapseViajeMadre
696[#] https://www.notarioexpress.cl//#collapseTerceroPadre
697[#] https://www.notarioexpress.cl//#collapseTerceroMadre
698[#] https://www.notarioexpress.cl//#collapseSinAcompanante
699[#] https://www.notarioexpress.cl//#collapseSinAcompananteAmbos
700[#] https://www.notarioexpress.cl//#collapseViajeAmbos
701[#] https://www.notarioexpress.cl//#collapseViajePadre
702[#] https://www.notarioexpress.cl//#collapseIngreso
703[#] https://www.notarioexpress.cl//#collapseAlcoholes
704[#] https://www.notarioexpress.cl//#collapseCivil
705[#] https://www.notarioexpress.cl//#collapseCivilTestigos
706[#] https://www.notarioexpress.cl//#collapseCivilSinTestigos
707[#] https://www.notarioexpress.cl//#collapseExpensas
708[#] https://www.notarioexpress.cl//#collapseDeclaraciónjurada
709[#] https://www.notarioexpress.cl//#collapseExtravio
710[#] https://www.notarioexpress.cl//#collapseExtravioLicencia
711[#] https://www.notarioexpress.cl//#collapseExtravioBoleta
712[#] https://www.notarioexpress.cl//#collapsePolitico
713[#] https://www.notarioexpress.cl//#collapseCesantia
714[#] https://www.notarioexpress.cl//#collapseNoDonante
715[#] https://www.notarioexpress.cl//#collapseContratoArriendoVehiculo
716[#] https://www.notarioexpress.cl//#collapseContratosTrabajo
717[#] https://www.notarioexpress.cl//#collapseContratoTerminoArriendo
718[#] https://www.notarioexpress.cl//#collapseContratoArriendo
719[#] https://www.notarioexpress.cl//#collapseTerminoArriendo
720[#] https://www.notarioexpress.cl//#collapseContratoChileno
721[#] https://www.notarioexpress.cl//#collapseContratoExtranjero
722[#] https://www.notarioexpress.cl//#collapseContratoDomesticoAbierto
723[#] https://www.notarioexpress.cl//#collapseContratoDomesticoAdentro
724[#] https://www.notarioexpress.cl//#collapseFiniquito
725[#] https://www.notarioexpress.cl//#collapseRenuncia
726[#] https://www.notarioexpress.cl//#collapseFotocopias
727[#] https://www.notarioexpress.cl//#collapseSalvoconducto
728[#] https://www.notarioexpress.cl//#collapseResidencia
729[#] https://www.notarioexpress.cl//#collapseAntiguedad
730[#] https://www.notarioexpress.cl//#collapseLaboral
731[#] https://www.notarioexpress.cl//#collapseLaboralEmpresas
732[#] https://www.notarioexpress.cl//#collapseEmpresaConstitucion
733[#] https://www.notarioexpress.cl//#collapseInvitacion
734[#] https://www.notarioexpress.cl//#collapseFiniquitoSeguro
735[#] https://www.notarioexpress.cl//#collapseEmpresaConstitucionI
736[#] https://www.notarioexpress.cl//#collapseEmpresaConstitucionII
737[#] https://www.notarioexpress.cl//#collapseEmpresaConstitucionIII
738[#] https://www.notarioexpress.cl//#collapseVehiculoSalida
739[#] https://www.notarioexpress.cl//#collapseLicenciaMenores
740[#] https://www.notarioexpress.cl//#collapseMandatoJudicial
741[#] https://www.notarioexpress.cl//#collapseSalidaVehiculo
742[#] https://www.notarioexpress.cl//#collapseSalidaVehiculoJuridico
743[#] https://www.notarioexpress.cl//#
744[#] https://www.notarioexpress.cl//#
745[#] https://www.notarioexpress.cl//#
746[#] https://www.notarioexpress.cl//#
747[#] https://www.notarioexpress.cl//#carousel-review
748[#] https://www.notarioexpress.cl//#carousel-review
749[#] https://www.notarioexpress.cl//#
750[#] https://www.notarioexpress.cl//#
751--------------------------------------------------
752[!] 50 Internal Dynamic Parameter Discovered
753[+] https://www.notarioexpress.cl///Content/css?v=1b0HU_Q8TJTRUybVra3ovYmLEPSZohx8XRo7_1--bK01
754[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=60
755[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=64
756[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=62
757[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=61
758[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=63
759[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=10
760[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=8
761[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=89
762[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=9
763[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=41
764[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=43
765[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=66
766[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=67
767[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=19
768[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=20
769[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=24
770[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=21
771[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=11
772[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=23
773[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=31
774[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=28
775[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=25
776[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=26
777[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=40
778[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=22
779[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=39
780[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=30
781[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=29
782[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=42
783[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=46
784[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=47
785[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=44
786[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=45
787[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=27
788[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=5
789[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=12
790[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=6
791[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=65
792[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=4
793[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=7
794[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=302
795[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=301
796[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=300
797[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=32
798[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=68
799[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=69
800[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=83
801[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=90
802[+] https://www.notarioexpress.cl//SeleccionNotaria.aspx?idDocumento=76
803--------------------------------------------------
804[!] 1 External Dynamic Parameter Discovered
805[#] https://fonts.googleapis.com/css?family=Montserrat:400,700
806--------------------------------------------------
807[!] 31 Internal links Discovered
808[+] https://www.notarioexpress.cl//images/favicon.png
809[+] https://www.notarioexpress.cl//css/bootstrap.min.css
810[+] https://www.notarioexpress.cl//css/animate.min.css
811[+] https://www.notarioexpress.cl//css/font-awesome.min.css
812[+] https://www.notarioexpress.cl//css/nivo-lightbox.css
813[+] https://www.notarioexpress.cl//css/nivo_themes/default/default.css
814[+] https://www.notarioexpress.cl//css/style02020.css
815[+] https://www.notarioexpress.cl//css/magicsuggest.css
816[+] https://www.notarioexpress.cl
817[+] https://www.notarioexpress.cl//SobreNosotros.aspx
818[+] https://www.notarioexpress.cl//documentosnotariales
819[+] https://www.notarioexpress.cl//notariasdechile.aspx
820[+] https://www.notarioexpress.cl//notariasdeturnoenchile.aspx
821[+] https://www.notarioexpress.cl//PreguntasFrecuentes.aspx
822[+] https://www.notarioexpress.cl//comofunciona.aspx
823[+] https://www.notarioexpress.cl//prensa.aspx
824[+] https://www.notarioexpress.cl//Contacto.aspx
825[+] https://www.notarioexpress.cl/contratodearriendo
826[+] https://www.notarioexpress.cl//EjemploContratoTrabajo.pdf
827[+] https://www.notarioexpress.cl//EjemploContratoTrabajo.pdf
828[+] https://www.notarioexpress.cl//EjemploContratoTrabajoExtranjero.pdf
829[+] https://www.notarioexpress.cl//EjemploContratoTrabajoExtranjero.pdf
830[+] https://www.notarioexpress.cl//certificadodeantiguedadlaboral.aspx
831[+] https://www.notarioexpress.cl//certificadodeantiguedadlaboral.aspx
832[+] https://www.notarioexpress.cl//salvoconducto.aspx
833[+] http://info.notarioexpress.cl/jurisdicciones/
834[+] https://www.notarioexpress.cl//PoderSimpleSalvoconductoInstrucciones.pdf
835[+] https://www.notarioexpress.cl/certificadoderesidencia
836[+] https://www.notarioexpress.cl/SolicitudNuevoDocumento
837[+] https://www.notarioexpress.cl//Prensa.aspx
838[+] https://www.notarioexpress.cl
839--------------------------------------------------
840[!] 55 External links Discovered
841[#] https://www.conservador.cl/portal/certificado_vigencia_poder
842[#] https://www.dt.gob.cl/legislacion/1624/w3-propertyvalue-145960.html
843[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
844[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
845[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
846[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
847[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
848[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
849[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
850[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
851[#] https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
852[#] https://www.dt.gob.cl/portal/1626/articles-104572_recurso_2.doc
853[#] https://www.dt.gob.cl/portal/1626/articles-104572_recurso_3.doc
854[#] https://www.conservador.cl/portal/certificado_vigencia_poder
855[#] http://www.tuempresaenundia.cl
856[#] http://www.tuempresaenundia.cl
857[#] http://www.tuempresaenundia.cl
858[#] https://notariavillarrica.cl/
859[#] https://www.notariadiez.cl
860[#] http://notariarenatagonzalez.cl
861[#] http://www.notariaossa.cl
862[#] http://www.notarialaflorida.cl
863[#] http://notariamanquehual.cl
864[#] http://www.notariamendoza.cl
865[#] http://www.notariareinoso.cl
866[#] http://notariasanantonio.cl
867[#] http://notariaguerrero.cl
868[#] http://notarialascar.cl
869[#] http://www.notariadelreal.cl/web/
870[#] http://www.notariacortes.cl
871[#] http://www.notariabosch.cl
872[#] http://www.notariavila.cl
873[#] https://www.cbrmelipilla.cl/
874[#] http://www.notariaquintanilla.cl
875[#] http://www.notariahernandez.cl
876[#] http://www.notariahurtado.cl
877[#] http://www.notariasantibanez.cl
878[#] http://www.notariahormazabal.cl
879[#] http://www.notariaferrand.cl
880[#] http://notariaerodriguez.cl
881[#] http://www.notariaretamal.cl
882[#] http://www.cbrrancagua.cl/html2/index.php
883[#] https://notariavega.cl
884[#] https://www.notariaespinosa.cl/
885[#] http://www.notariasotomayor.cl/
886[#] https://notariagomila.cl/
887[#] http://www.notarialacisterna.cl/
888[#] http://30notaria.cl/
889[#] https://notariaquintero.cl/
890[#] https://notariavitacura.cl/
891[#] https://www.notariajuanrodriguez.cl/
892[#] http://www.notariaarrieta.cl/
893[#] https://www.facebook.com/NotarioExpress
894[#] https://www.twitter.com/notarioexpress/
895[#] https://www.linkedin.com/in/notarioexpress/
896--------------------------------------------------
897[#] Mapping Subdomain..
898[!] Found 1 Subdomain
899- notarioexpress.cl
900--------------------------------------------------
901[!] Done At 2020-03-24 02:44:30.987479
902################################################################################################################################
903Trying "notarioexpress.cl"
904;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7501
905;; flags: qr rd ra; QUERY: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 4
906
907;; QUESTION SECTION:
908;notarioexpress.cl. IN ANY
909
910;; ANSWER SECTION:
911notarioexpress.cl. 3600 IN TXT "notarioexpress.azurewebsites.net"
912notarioexpress.cl. 3600 IN MX 5 alt2.aspmx.l.google.com.
913notarioexpress.cl. 3600 IN MX 5 alt1.aspmx.l.google.com.
914notarioexpress.cl. 3600 IN MX 1 aspmx.l.google.com.
915notarioexpress.cl. 3600 IN MX 10 alt4.aspmx.l.google.com.
916notarioexpress.cl. 3600 IN MX 10 alt3.aspmx.l.google.com.
917notarioexpress.cl. 3600 IN SOA ns1-04.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
918notarioexpress.cl. 3600 IN A 40.113.247.175
919notarioexpress.cl. 3599 IN NS ns3-04.azure-dns.org.
920notarioexpress.cl. 3599 IN NS ns2-04.azure-dns.net.
921notarioexpress.cl. 3599 IN NS ns4-04.azure-dns.info.
922notarioexpress.cl. 3599 IN NS ns1-04.azure-dns.com.
923
924;; ADDITIONAL SECTION:
925ns1-04.azure-dns.com. 24046 IN A 40.90.4.4
926ns2-04.azure-dns.net. 28346 IN A 64.4.48.4
927ns4-04.azure-dns.info. 11334 IN A 13.107.160.4
928ns1-04.azure-dns.com. 430 IN AAAA 2603:1061::4
929
930Received 490 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 457 ms
931################################################################################################################################
932; <<>> DiG 9.11.16-2-Debian <<>> +trace notarioexpress.cl any
933;; global options: +cmd
934. 86400 IN NS j.root-servers.net.
935. 86400 IN NS h.root-servers.net.
936. 86400 IN NS f.root-servers.net.
937. 86400 IN NS i.root-servers.net.
938. 86400 IN NS g.root-servers.net.
939. 86400 IN NS b.root-servers.net.
940. 86400 IN NS a.root-servers.net.
941. 86400 IN NS l.root-servers.net.
942. 86400 IN NS c.root-servers.net.
943. 86400 IN NS k.root-servers.net.
944. 86400 IN NS d.root-servers.net.
945. 86400 IN NS e.root-servers.net.
946. 86400 IN NS m.root-servers.net.
947. 86400 IN RRSIG NS 8 0 518400 20200406050000 20200324040000 33853 . Pts3iS9X02Jg5JpFi3qJfvD9J/zSBIMkk4aprpCDqmR/WU4Qrh7FyL71 jqmhMdpMoSINtEzWe+6cgEcOwnuRl3ptY9k1t1fjJVuRVdeBUkYRqhba Vtps/udDv+qFBM4NvMGMyflsxUkiK5Qcr2ZZb3ztoTTzvxLicY9UPVlD jVOq0T6/29cAI2zZPifkI/wy6IeCIiHoZfXZ8AIFSxAsskuE2b3zUCna 1VCuDneOWdlRBtiPKtOE4WXaU/GzcyNBMOSpDMThGcCmeS18mVT1Lzq6 4D9eZCubHfQVXzcGfakbB5RV6hdQSL0UnN6c9vf0jiUyXHLf7gxL1dld 1P/wBg==
948;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 407 ms
949
950cl. 172800 IN NS a.nic.cl.
951cl. 172800 IN NS b.nic.cl.
952cl. 172800 IN NS c.nic.cl.
953cl. 172800 IN NS cl1.dnsnode.net.
954cl. 172800 IN NS cl-ns.anycast.pch.net.
955cl. 172800 IN NS cl1-tld.d-zone.ca.
956cl. 172800 IN NS cl2-tld.d-zone.ca.
957cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
958cl. 86400 IN RRSIG DS 8 1 86400 20200406050000 20200324040000 33853 . 0LlnmesKqcu2VoRZbWetyiHmKlrdnN1kZnumXRwnc2gQyT+w0vd0SJYB L7kfVjkvGM13G9x2G6D2UjJnObckxosG1G3rctUTqQGuXnDOn05gPbVA jTnLg0o7M8jgG00JBDpogpGohWQ0veGN5XDgATpiIfKpYbUZCu00rS81 RXkNbyEBEIEwIxGGkqkFtad5y5SubLE8oOl/XVKVmz0BNR960pADgZ0U Y4XCZj133lXZlurGoXVTQrOgWb78bsO54dycFFEgl3bK1t7DQ48Jd4wA 0o/Lol1ao6cPsj8mlVxkqnUAJ2vlkFHYXx0eGrS0vCBl/52N5G49O+Uo tcUZ8A==
959;; Received 827 bytes from 2001:500:1::53#53(h.root-servers.net) in 42 ms
960
961notarioexpress.cl. 3600 IN NS ns1-04.azure-dns.com.
962notarioexpress.cl. 3600 IN NS ns3-04.azure-dns.org.
963notarioexpress.cl. 3600 IN NS ns2-04.azure-dns.net.
9644QBMV5HQ44Q4FC4C1LGEF9SHCMUMLRG7.cl. 900 IN NSEC3 1 1 2 47C94D988D5BA14CC65BDA845F3CFDBE 4RPNA8P5NK73BDFKM8BVVOR3CAAL7V7E NS SOA TXT RRSIG DNSKEY NSEC3PARAM
9654QBMV5HQ44Q4FC4C1LGEF9SHCMUMLRG7.cl. 900 IN RRSIG NSEC3 8 2 900 20200505095354 20200324053025 24384 cl. L3V7AcTJuYeFmHqnLlfrKNNPyx9d0b15GE+bpmpCoAmSU0Q5Cu7waL78 BzFeiGRTOvZEtdyR9ed8xIbm07MFNzH+Al6w3nnS947F6UhO1EjRWVJi /03xQD8jty/TbIwJBDnoFtpUTIj+1vW+/oKQJE3CwO5l8DciezO0i40U s30=
966MFQKJ4K7FE10EUDAQ66BT6Q16ET62SQL.cl. 900 IN NSEC3 1 1 2 47C94D988D5BA14CC65BDA845F3CFDBE MTQPVGO6471J99S8RAIH9LV1OETAUH0M NS DS RRSIG
967MFQKJ4K7FE10EUDAQ66BT6Q16ET62SQL.cl. 900 IN RRSIG NSEC3 8 2 900 20200506144244 20200324053025 24384 cl. uZ9d8FiqFToQ1pz8np4qPmxvwvmyjbgIGOiNtXU4O29xQKVnlqMAC/6W Y7ad8Nbr40jfpqWFNrXcnBmRIgy6iMvTM7SzylfFNBH9mTM8gS6NEnl2 3UbE2d+klnJqtBiuE6HCy6moMQsqlYFiiHh81DuoSMCXYcZs9ZMje+GM t9E=
968;; Received 691 bytes from 200.16.112.16#53(c.nic.cl) in 392 ms
969
970notarioexpress.cl. 3600 IN A 40.113.247.175
971notarioexpress.cl. 172800 IN NS ns1-04.azure-dns.com.
972notarioexpress.cl. 172800 IN NS ns2-04.azure-dns.net.
973notarioexpress.cl. 172800 IN NS ns3-04.azure-dns.org.
974notarioexpress.cl. 172800 IN NS ns4-04.azure-dns.info.
975notarioexpress.cl. 3600 IN SOA ns1-04.azure-dns.com. azuredns-hostmaster.microsoft.com. 1 3600 300 2419200 300
976notarioexpress.cl. 3600 IN MX 1 aspmx.l.google.com.
977notarioexpress.cl. 3600 IN MX 5 alt1.aspmx.l.google.com.
978notarioexpress.cl. 3600 IN MX 5 alt2.aspmx.l.google.com.
979notarioexpress.cl. 3600 IN MX 10 alt3.aspmx.l.google.com.
980notarioexpress.cl. 3600 IN MX 10 alt4.aspmx.l.google.com.
981notarioexpress.cl. 3600 IN TXT "notarioexpress.azurewebsites.net"
982;; Received 425 bytes from 13.107.24.4#53(ns3-04.azure-dns.org) in 194 ms
983
984################################################################################################################################
985[*] Performing General Enumeration of Domain: notarioexpress.cl
986[-] DNSSEC is not configured for notarioexpress.cl
987[*] SOA ns1-04.azure-dns.com 40.90.4.4
988[*] NS ns1-04.azure-dns.com 40.90.4.4
989[*] NS ns1-04.azure-dns.com 2603:1061::4
990[*] NS ns2-04.azure-dns.net 64.4.48.4
991[*] NS ns2-04.azure-dns.net 2620:1ec:8ec::4
992[*] NS ns3-04.azure-dns.org 13.107.24.4
993[*] NS ns3-04.azure-dns.org 2a01:111:4000::4
994[*] NS ns4-04.azure-dns.info 13.107.160.4
995[*] NS ns4-04.azure-dns.info 2620:1ec:bda::4
996[*] MX aspmx.l.google.com 74.125.133.27
997[*] MX alt1.aspmx.l.google.com 209.85.233.27
998[*] MX alt2.aspmx.l.google.com 142.250.4.27
999[*] MX alt3.aspmx.l.google.com 108.177.97.26
1000[*] MX alt4.aspmx.l.google.com 74.125.28.26
1001[*] MX aspmx.l.google.com 2a00:1450:400c:c09::1a
1002[*] MX alt1.aspmx.l.google.com 2a00:1450:4010:c03::1a
1003[*] MX alt2.aspmx.l.google.com 2404:6800:4003:c06::1a
1004[*] MX alt3.aspmx.l.google.com 2404:6800:4008:c00::1a
1005[*] MX alt4.aspmx.l.google.com 2607:f8b0:400e:c04::1b
1006[*] A notarioexpress.cl 40.113.247.175
1007[*] Enumerating SRV Records
1008[-] No SRV Records Found for notarioexpress.cl
1009[+] 0 Records Found
1010################################################################################################################################
1011 AVAILABLE PLUGINS
1012 -----------------
1013
1014 FallbackScsvPlugin
1015 SessionRenegotiationPlugin
1016 CompressionPlugin
1017 HttpHeadersPlugin
1018 CertificateInfoPlugin
1019 HeartbleedPlugin
1020 OpenSslCipherSuitesPlugin
1021 OpenSslCcsInjectionPlugin
1022 RobotPlugin
1023 SessionResumptionPlugin
1024
1025
1026
1027 CHECKING HOST(S) AVAILABILITY
1028 -----------------------------
1029
1030 40.113.247.175:443 => 40.113.247.175
1031
1032
1033
1034
1035 SCAN RESULTS FOR 40.113.247.175:443 - 40.113.247.175
1036 ----------------------------------------------------
1037
1038 * Session Renegotiation:
1039Unhandled exception while running --reneg:
1040error - [Errno 104] Connection reset by peer
1041
1042 * OpenSSL Heartbleed:
1043 OK - Not vulnerable to Heartbleed
1044
1045 * Resumption Support:
1046 With Session IDs: PARTIALLY SUPPORTED (1 successful, 4 failed, 0 errors, 5 total attempts).
1047 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
1048
1049 * TLSV1_3 Cipher Suites:
1050 Server rejected all cipher suites.
1051
1052 * ROBOT Attack:
1053 OK - Not vulnerable
1054
1055 * TLSV1 Cipher Suites:
1056 Forward Secrecy OK - Supported
1057 RC4 OK - Not Supported
1058
1059 Preferred:
1060 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH-256 bits 256 bits HTTP 404 Site Not Found
1061 Accepted:
1062 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH-256 bits 256 bits HTTP 404 Site Not Found
1063 TLS_RSA_WITH_AES_256_CBC_SHA - 256 bits HTTP 404 Site Not Found
1064 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH-256 bits 128 bits HTTP 404 Site Not Found
1065 TLS_RSA_WITH_AES_128_CBC_SHA - 128 bits HTTP 404 Site Not Found
1066
1067 * Downgrade Attacks:
1068 TLS_FALLBACK_SCSV: VULNERABLE - Signaling cipher suite not supported
1069
1070 * OpenSSL CCS Injection:
1071 OK - Not vulnerable to OpenSSL CCS injection
1072
1073 * Deflate Compression:
1074 OK - Compression disabled
1075
1076 * TLSV1_1 Cipher Suites:
1077 Forward Secrecy OK - Supported
1078 RC4 OK - Not Supported
1079
1080 Preferred:
1081 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH-256 bits 256 bits HTTP 404 Site Not Found
1082 Accepted:
1083 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH-256 bits 256 bits HTTP 404 Site Not Found
1084 TLS_RSA_WITH_AES_256_CBC_SHA - 256 bits HTTP 404 Site Not Found
1085 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH-256 bits 128 bits HTTP 404 Site Not Found
1086 TLS_RSA_WITH_AES_128_CBC_SHA - 128 bits HTTP 404 Site Not Found
1087
1088 * SSLV3 Cipher Suites:
1089 Server rejected all cipher suites.
1090
1091 * SSLV2 Cipher Suites:
1092 Server rejected all cipher suites.
1093
1094 * Certificate Information:
1095 Content
1096 SHA1 Fingerprint: 398e01a50c668a74f0104a836015a26e21554cce
1097 Common Name: *.azurewebsites.net
1098 Issuer: Microsoft IT TLS CA 5
1099 Serial Number: 1003537452960863138147407004506388215630627929
1100 Not Before: 2019-09-24 02:18:56
1101 Not After: 2021-09-24 02:18:56
1102 Signature Algorithm: sha256
1103 Public Key Algorithm: RSA
1104 Key Size: 2048
1105 Exponent: 65537 (0x10001)
1106 DNS Subject Alternative Names: [u'*.azurewebsites.net', u'*.scm.azurewebsites.net', u'*.azure-mobile.net', u'*.scm.azure-mobile.net', u'*.sso.azurewebsites.net']
1107
1108 Trust
1109 Hostname Validation: FAILED - Certificate does NOT match 40.113.247.175
1110 Android CA Store (8.1.0_r9): OK - Certificate is trusted
1111 iOS CA Store (11): OK - Certificate is trusted
1112 Java CA Store (jre-10.0.2): OK - Certificate is trusted
1113 macOS CA Store (High Sierra): OK - Certificate is trusted
1114 Mozilla CA Store (2018-04-12): OK - Certificate is trusted
1115 Windows CA Store (2018-06-30): OK - Certificate is trusted
1116 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
1117 Received Chain: *.azurewebsites.net --> Microsoft IT TLS CA 5
1118 Verified Chain: *.azurewebsites.net --> Microsoft IT TLS CA 5 --> Baltimore CyberTrust Root
1119 Received Chain Contains Anchor: OK - Anchor certificate not sent
1120 Received Chain Order: OK - Order is valid
1121 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1122
1123 Extensions
1124 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1125 Certificate Transparency: OK - 4 SCTs included
1126
1127 OCSP Stapling
1128 OCSP Response Status: successful
1129 Validation w/ Mozilla Store: OK - Response is trusted
1130 Responder Id: FD54E7ECA63A6C5FBD156710F384EFEE566C1B69
1131 Cert Status: good
1132 Cert Serial Number: 2D000B84592470C8C655A0DD5D0000000B8459
1133 This Update: Mar 20 12:04:16 2020 GMT
1134 Next Update: Mar 24 12:04:16 2020 GMT
1135
1136 * TLSV1_2 Cipher Suites:
1137 Forward Secrecy OK - Supported
1138 RC4 OK - Not Supported
1139
1140 Preferred:
1141 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH-256 bits 256 bits HTTP 404 Site Not Found
1142 Accepted:
1143 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH-256 bits 256 bits HTTP 404 Site Not Found
1144 TLS_RSA_WITH_AES_256_CBC_SHA256 - 256 bits HTTP 404 Site Not Found
1145 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH-256 bits 256 bits HTTP 404 Site Not Found
1146 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH-256 bits 256 bits HTTP 404 Site Not Found
1147 TLS_RSA_WITH_AES_256_CBC_SHA - 256 bits HTTP 404 Site Not Found
1148 TLS_RSA_WITH_AES_256_GCM_SHA384 - 256 bits HTTP 404 Site Not Found
1149 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH-256 bits 128 bits HTTP 404 Site Not Found
1150 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH-256 bits 128 bits HTTP 404 Site Not Found
1151 TLS_RSA_WITH_AES_128_CBC_SHA - 128 bits HTTP 404 Site Not Found
1152 TLS_RSA_WITH_AES_128_CBC_SHA256 - 128 bits HTTP 404 Site Not Found
1153 TLS_RSA_WITH_AES_128_GCM_SHA256 - 128 bits HTTP 404 Site Not Found
1154 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH-256 bits 128 bits HTTP 404 Site Not Found
1155
1156
1157 SCAN COMPLETED IN 21.94 S
1158 -------------------------
1159################################################################################################################################
1160traceroute to www.notarioexpress.cl (40.113.247.175), 30 hops max, 60 byte packets
1161 1 _gateway (10.203.14.1) 135.150 ms 135.121 ms 135.117 ms
1162 2 * * *
1163 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 135.804 ms 135.799 ms 136.008 ms
1164 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 140.440 ms 139.987 ms 140.425 ms
1165 5 be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 145.729 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 145.711 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 145.950 ms
1166 6 be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90) 146.095 ms be3376.ccr21.sto01.atlas.cogentco.com (130.117.50.226) 138.782 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90) 138.763 ms
1167 7 sting-networks-ab.demarc.cogentco.com (149.6.168.18) 143.105 ms 143.021 ms 143.029 ms
1168 8 ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161) 144.273 ms ae9-0.sto-96cbe-1b.ntwk.msn.net (104.44.224.139) 143.816 ms 143.825 ms
1169 9 * * *
117010 be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17) 275.797 ms 273.414 ms 269.360 ms
117111 be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131) 272.926 ms 275.472 ms 272.437 ms
117212 be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190) 272.404 ms 282.029 ms 278.626 ms
117313 be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50) 274.783 ms * 273.152 ms
117414 be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57) 273.775 ms 273.699 ms 273.885 ms
117515 * be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154) 275.066 ms 277.498 ms
117616 * * be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105) 272.207 ms
117717 be-6-0.ibr01.ch2.ntwk.msn.net (104.44.28.19) 272.535 ms * *
117818 be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116) 270.656 ms 275.407 ms 272.408 ms
117919 be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222) 270.213 ms 273.802 ms 273.825 ms
118020 be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253) 275.161 ms 276.065 ms 272.504 ms
118121 ae161-0.icr03.dsm05.ntwk.msn.net (104.44.22.190) 269.500 ms 269.886 ms *
1182################################################################################################################################
1183Domains still to check: 1
1184 Checking if the hostname notarioexpress.cl. given is in fact a domain...
1185
1186Analyzing domain: notarioexpress.cl.
1187 Checking NameServers using system default resolver...
1188 IP: 40.90.4.4 (United States)
1189 HostName: ns1-04.azure-dns.com Type: NS
1190 HostName: ns1-04.azure-dns.com Type: PTR
1191 IP: 64.4.48.4 (United States)
1192 HostName: ns2-04.azure-dns.net Type: NS
1193 HostName: ns2-04.azure-dns.net Type: PTR
1194 IP: 13.107.24.4 (United States)
1195 HostName: ns3-04.azure-dns.org Type: NS
1196 HostName: ns3-04.azure-dns.org Type: PTR
1197 IP: 13.107.160.4 (United States)
1198 HostName: ns4-04.azure-dns.info Type: NS
1199 HostName: ns4-04.azure-dns.info Type: PTR
1200
1201 Checking MailServers using system default resolver...
1202 IP: 64.233.167.27 (United States)
1203 HostName: aspmx.l.google.com Type: MX
1204 HostName: wl-in-f27.1e100.net Type: PTR
1205 IP: 209.85.233.26 (United States)
1206 HostName: alt1.aspmx.l.google.com Type: MX
1207 HostName: lr-in-f26.1e100.net Type: PTR
1208 IP: 142.250.4.27 (United States)
1209 HostName: alt2.aspmx.l.google.com Type: MX
1210 IP: 108.177.97.27 (United States)
1211 HostName: alt3.aspmx.l.google.com Type: MX
1212 HostName: tm-in-f27.1e100.net Type: PTR
1213 IP: 74.125.28.27 (United States)
1214 HostName: alt4.aspmx.l.google.com Type: MX
1215 HostName: pc-in-f27.1e100.net Type: PTR
1216
1217 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1218 No zone transfer found on nameserver 13.107.24.4
1219 No zone transfer found on nameserver 64.4.48.4
1220 No zone transfer found on nameserver 13.107.160.4
1221 No zone transfer found on nameserver 40.90.4.4
1222
1223 Checking SPF record...
1224
1225 Checking 192 most common hostnames using system default resolver...
1226 IP: 40.113.247.175 (United States)
1227 HostName: www.notarioexpress.cl. Type: A
1228
1229 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1230 Checking netblock 64.233.167.0
1231 Checking netblock 142.250.4.0
1232 Checking netblock 40.113.247.0
1233 Checking netblock 13.107.24.0
1234 Checking netblock 64.4.48.0
1235 Checking netblock 74.125.28.0
1236 Checking netblock 13.107.160.0
1237 Checking netblock 108.177.97.0
1238 Checking netblock 40.90.4.0
1239 Checking netblock 209.85.233.0
1240
1241 Searching for notarioexpress.cl. emails in Google
1242 contacto@notarioexpress.cl.
1243
1244 Checking 10 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1245 Host 64.233.167.27 is up (echo-reply ttl 39)
1246 Host 142.250.4.27 is up (syn-ack ttl 94)
1247 Host 40.113.247.175 is up (syn-ack ttl 104)
1248 Host 13.107.24.4 is up (udp-response ttl 110)
1249 Host 64.4.48.4 is up (udp-response ttl 113)
1250 Host 74.125.28.27 is up (echo-reply ttl 32)
1251 Host 13.107.160.4 is up (udp-response ttl 117)
1252 Host 108.177.97.27 is up (echo-reply ttl 32)
1253 Host 40.90.4.4 is up (udp-response ttl 117)
1254 Host 209.85.233.26 is up (echo-reply ttl 41)
1255
1256 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1257 Scanning ip 64.233.167.27 (wl-in-f27.1e100.net (PTR)):
1258 25/tcp open smtp syn-ack ttl 101 Google gsmtp
1259 | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1260 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 p5si3852831wro.80 - gsmtp
1261 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1262 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1263 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1264 | Public Key type: rsa
1265 | Public Key bits: 2048
1266 | Signature Algorithm: sha256WithRSAEncryption
1267 | Not valid before: 2020-03-03T09:44:15
1268 | Not valid after: 2020-05-26T09:44:15
1269 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1270 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1271 |_ssl-date: 2020-03-24T06:58:32+00:00; -5s from scanner time.
1272 OS Info: Service Info: Host: mx.google.com
1273 |_clock-skew: -5s
1274 Scanning ip 142.250.4.27 (alt2.aspmx.l.google.com):
1275 25/tcp open smtp syn-ack ttl 97 Google gsmtp
1276 | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1277 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 k64si12640805pge.374 - gsmtp
1278 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1279 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1280 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1281 | Public Key type: rsa
1282 | Public Key bits: 2048
1283 | Signature Algorithm: sha256WithRSAEncryption
1284 | Not valid before: 2020-03-03T09:44:15
1285 | Not valid after: 2020-05-26T09:44:15
1286 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1287 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1288 |_ssl-date: 2020-03-24T06:59:06+00:00; -6s from scanner time.
1289 OS Info: Service Info: Host: mx.google.com
1290 |_clock-skew: -6s
1291 Scanning ip 40.113.247.175 (www.notarioexpress.cl.):
1292 80/tcp open http syn-ack ttl 104 Microsoft IIS httpd 10.0
1293 |_http-server-header: Microsoft-IIS/10.0
1294 |_http-title: Microsoft Azure Web App - Error 404
1295 443/tcp open ssl/http syn-ack ttl 104 Microsoft IIS httpd 10.0
1296 |_http-server-header: Microsoft-IIS/10.0
1297 |_http-title: Microsoft Azure Web App - Error 404
1298 | ssl-cert: Subject: commonName=notarioexpress.cl
1299 | Subject Alternative Name: DNS:notarioexpress.cl, DNS:www.notarioexpress.cl
1300 | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
1301 | Public Key type: rsa
1302 | Public Key bits: 2048
1303 | Signature Algorithm: sha256WithRSAEncryption
1304 | Not valid before: 2019-11-10T23:54:59
1305 | Not valid after: 2020-11-10T23:54:59
1306 | MD5: 4b8e 3fcd ffdf 439e b6e6 5512 eb0b 4f43
1307 |_SHA-1: ea99 7a8e 98a9 9c8b 4e0e 0896 987c 649d dbd5 ca4d
1308 |_ssl-date: 2020-03-24T06:59:52+00:00; -6s from scanner time.
1309 | tls-alpn:
1310 | h2
1311 |_ http/1.1
1312 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1313 |_clock-skew: -6s
1314 Scanning ip 13.107.24.4 (ns3-04.azure-dns.org (PTR)):
1315 53/tcp open domain? syn-ack ttl 110
1316 | fingerprint-strings:
1317 | DNSVersionBindReqTCP:
1318 | version
1319 |_ bind
1320 Scanning ip 64.4.48.4 (ns2-04.azure-dns.net (PTR)):
1321 53/tcp open domain? syn-ack ttl 113
1322 | fingerprint-strings:
1323 | DNSVersionBindReqTCP:
1324 | version
1325 |_ bind
1326 Scanning ip 74.125.28.27 (pc-in-f27.1e100.net (PTR)):
1327 25/tcp open smtp syn-ack ttl 96 Google gsmtp
1328 | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1329 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 l72si12559623pge.296 - gsmtp
1330 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1331 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1332 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1333 | Public Key type: rsa
1334 | Public Key bits: 2048
1335 | Signature Algorithm: sha256WithRSAEncryption
1336 | Not valid before: 2020-03-03T09:44:15
1337 | Not valid after: 2020-05-26T09:44:15
1338 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1339 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1340 |_ssl-date: 2020-03-24T07:05:58+00:00; -5s from scanner time.
1341 OS Info: Service Info: Host: mx.google.com
1342 |_clock-skew: -5s
1343 Scanning ip 13.107.160.4 (ns4-04.azure-dns.info (PTR)):
1344 53/tcp open domain? syn-ack ttl 117
1345 | fingerprint-strings:
1346 | DNSVersionBindReqTCP:
1347 | version
1348 |_ bind
1349 Scanning ip 108.177.97.27 (tm-in-f27.1e100.net (PTR)):
1350 25/tcp open smtp syn-ack ttl 95 Google gsmtp
1351 | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1352 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 t3si1553157pjw.74 - gsmtp
1353 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1354 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1355 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1356 | Public Key type: rsa
1357 | Public Key bits: 2048
1358 | Signature Algorithm: sha256WithRSAEncryption
1359 | Not valid before: 2020-03-03T09:44:15
1360 | Not valid after: 2020-05-26T09:44:15
1361 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1362 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1363 |_ssl-date: 2020-03-24T07:09:23+00:00; -5s from scanner time.
1364 OS Info: Service Info: Host: mx.google.com
1365 |_clock-skew: -5s
1366 Scanning ip 40.90.4.4 (ns1-04.azure-dns.com (PTR)):
1367 53/tcp open domain? syn-ack ttl 117
1368 | fingerprint-strings:
1369 | DNSVersionBindReqTCP:
1370 | version
1371 |_ bind
1372 Scanning ip 209.85.233.26 (lr-in-f26.1e100.net (PTR)):
1373 25/tcp open smtp syn-ack ttl 104 Google gsmtp
1374 | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1375 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 r19si13169211ljp.248 - gsmtp
1376 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1377 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1378 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1379 | Public Key type: rsa
1380 | Public Key bits: 2048
1381 | Signature Algorithm: sha256WithRSAEncryption
1382 | Not valid before: 2020-03-03T09:44:15
1383 | Not valid after: 2020-05-26T09:44:15
1384 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1385 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1386 |_ssl-date: 2020-03-24T07:12:28+00:00; -6s from scanner time.
1387 OS Info: Service Info: Host: mx.google.com
1388 |_clock-skew: -6s
1389 WebCrawling domain's web servers... up to 50 max links.
1390
1391 + URL to crawl: http://www.notarioexpress.cl.
1392 + Date: 2020-03-24
1393
1394 + Crawling URL: http://www.notarioexpress.cl.:
1395 + Links:
1396 + Crawling http://www.notarioexpress.cl. (400 Bad Request)
1397 + Searching for directories...
1398 + Searching open folders...
1399
1400
1401 + URL to crawl: https://www.notarioexpress.cl.
1402 + Date: 2020-03-24
1403
1404 + Crawling URL: https://www.notarioexpress.cl.:
1405 + Links:
1406 + Crawling https://www.notarioexpress.cl.
1407 + Searching for directories...
1408 + Searching open folders...
1409
1410--Finished--
1411Summary information for domain notarioexpress.cl.
1412-----------------------------------------
1413 Domain Specific Information:
1414 Email: contacto@notarioexpress.cl.
1415
1416 Domain Ips Information:
1417 IP: 64.233.167.27
1418 HostName: aspmx.l.google.com Type: MX
1419 HostName: wl-in-f27.1e100.net Type: PTR
1420 Country: United States
1421 Is Active: True (echo-reply ttl 39)
1422 Port: 25/tcp open smtp syn-ack ttl 101 Google gsmtp
1423 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1424 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 p5si3852831wro.80 - gsmtp
1425 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1426 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1427 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1428 Script Info: | Public Key type: rsa
1429 Script Info: | Public Key bits: 2048
1430 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1431 Script Info: | Not valid before: 2020-03-03T09:44:15
1432 Script Info: | Not valid after: 2020-05-26T09:44:15
1433 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1434 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1435 Script Info: |_ssl-date: 2020-03-24T06:58:32+00:00; -5s from scanner time.
1436 Os Info: Host: mx.google.com
1437 Script Info: |_clock-skew: -5s
1438 IP: 142.250.4.27
1439 HostName: alt2.aspmx.l.google.com Type: MX
1440 Country: United States
1441 Is Active: True (syn-ack ttl 94)
1442 Port: 25/tcp open smtp syn-ack ttl 97 Google gsmtp
1443 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1444 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 k64si12640805pge.374 - gsmtp
1445 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1446 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1447 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1448 Script Info: | Public Key type: rsa
1449 Script Info: | Public Key bits: 2048
1450 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1451 Script Info: | Not valid before: 2020-03-03T09:44:15
1452 Script Info: | Not valid after: 2020-05-26T09:44:15
1453 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1454 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1455 Script Info: |_ssl-date: 2020-03-24T06:59:06+00:00; -6s from scanner time.
1456 Os Info: Host: mx.google.com
1457 Script Info: |_clock-skew: -6s
1458 IP: 40.113.247.175
1459 HostName: www.notarioexpress.cl. Type: A
1460 Country: United States
1461 Is Active: True (syn-ack ttl 104)
1462 Port: 80/tcp open http syn-ack ttl 104 Microsoft IIS httpd 10.0
1463 Script Info: |_http-server-header: Microsoft-IIS/10.0
1464 Script Info: |_http-title: Microsoft Azure Web App - Error 404
1465 Port: 443/tcp open ssl/http syn-ack ttl 104 Microsoft IIS httpd 10.0
1466 Script Info: |_http-server-header: Microsoft-IIS/10.0
1467 Script Info: |_http-title: Microsoft Azure Web App - Error 404
1468 Script Info: | ssl-cert: Subject: commonName=notarioexpress.cl
1469 Script Info: | Subject Alternative Name: DNS:notarioexpress.cl, DNS:www.notarioexpress.cl
1470 Script Info: | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
1471 Script Info: | Public Key type: rsa
1472 Script Info: | Public Key bits: 2048
1473 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1474 Script Info: | Not valid before: 2019-11-10T23:54:59
1475 Script Info: | Not valid after: 2020-11-10T23:54:59
1476 Script Info: | MD5: 4b8e 3fcd ffdf 439e b6e6 5512 eb0b 4f43
1477 Script Info: |_SHA-1: ea99 7a8e 98a9 9c8b 4e0e 0896 987c 649d dbd5 ca4d
1478 Script Info: |_ssl-date: 2020-03-24T06:59:52+00:00; -6s from scanner time.
1479 Script Info: | tls-alpn:
1480 Script Info: | h2
1481 Script Info: |_ http/1.1
1482 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1483 Script Info: |_clock-skew: -6s
1484 IP: 13.107.24.4
1485 HostName: ns3-04.azure-dns.org Type: NS
1486 HostName: ns3-04.azure-dns.org Type: PTR
1487 Country: United States
1488 Is Active: True (udp-response ttl 110)
1489 Port: 53/tcp open domain? syn-ack ttl 110
1490 Script Info: | fingerprint-strings:
1491 Script Info: | DNSVersionBindReqTCP:
1492 Script Info: | version
1493 Script Info: |_ bind
1494 IP: 64.4.48.4
1495 HostName: ns2-04.azure-dns.net Type: NS
1496 HostName: ns2-04.azure-dns.net Type: PTR
1497 Country: United States
1498 Is Active: True (udp-response ttl 113)
1499 Port: 53/tcp open domain? syn-ack ttl 113
1500 Script Info: | fingerprint-strings:
1501 Script Info: | DNSVersionBindReqTCP:
1502 Script Info: | version
1503 Script Info: |_ bind
1504 IP: 74.125.28.27
1505 HostName: alt4.aspmx.l.google.com Type: MX
1506 HostName: pc-in-f27.1e100.net Type: PTR
1507 Country: United States
1508 Is Active: True (echo-reply ttl 32)
1509 Port: 25/tcp open smtp syn-ack ttl 96 Google gsmtp
1510 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1511 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 l72si12559623pge.296 - gsmtp
1512 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1513 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1514 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1515 Script Info: | Public Key type: rsa
1516 Script Info: | Public Key bits: 2048
1517 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1518 Script Info: | Not valid before: 2020-03-03T09:44:15
1519 Script Info: | Not valid after: 2020-05-26T09:44:15
1520 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1521 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1522 Script Info: |_ssl-date: 2020-03-24T07:05:58+00:00; -5s from scanner time.
1523 Os Info: Host: mx.google.com
1524 Script Info: |_clock-skew: -5s
1525 IP: 13.107.160.4
1526 HostName: ns4-04.azure-dns.info Type: NS
1527 HostName: ns4-04.azure-dns.info Type: PTR
1528 Country: United States
1529 Is Active: True (udp-response ttl 117)
1530 Port: 53/tcp open domain? syn-ack ttl 117
1531 Script Info: | fingerprint-strings:
1532 Script Info: | DNSVersionBindReqTCP:
1533 Script Info: | version
1534 Script Info: |_ bind
1535 IP: 108.177.97.27
1536 HostName: alt3.aspmx.l.google.com Type: MX
1537 HostName: tm-in-f27.1e100.net Type: PTR
1538 Country: United States
1539 Is Active: True (echo-reply ttl 32)
1540 Port: 25/tcp open smtp syn-ack ttl 95 Google gsmtp
1541 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1542 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 t3si1553157pjw.74 - gsmtp
1543 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1544 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1545 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1546 Script Info: | Public Key type: rsa
1547 Script Info: | Public Key bits: 2048
1548 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1549 Script Info: | Not valid before: 2020-03-03T09:44:15
1550 Script Info: | Not valid after: 2020-05-26T09:44:15
1551 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1552 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1553 Script Info: |_ssl-date: 2020-03-24T07:09:23+00:00; -5s from scanner time.
1554 Os Info: Host: mx.google.com
1555 Script Info: |_clock-skew: -5s
1556 IP: 40.90.4.4
1557 HostName: ns1-04.azure-dns.com Type: NS
1558 HostName: ns1-04.azure-dns.com Type: PTR
1559 Country: United States
1560 Is Active: True (udp-response ttl 117)
1561 Port: 53/tcp open domain? syn-ack ttl 117
1562 Script Info: | fingerprint-strings:
1563 Script Info: | DNSVersionBindReqTCP:
1564 Script Info: | version
1565 Script Info: |_ bind
1566 IP: 209.85.233.26
1567 HostName: alt1.aspmx.l.google.com Type: MX
1568 HostName: lr-in-f26.1e100.net Type: PTR
1569 Country: United States
1570 Is Active: True (echo-reply ttl 41)
1571 Port: 25/tcp open smtp syn-ack ttl 104 Google gsmtp
1572 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.16], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1573 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 r19si13169211ljp.248 - gsmtp
1574 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1575 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1576 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1577 Script Info: | Public Key type: rsa
1578 Script Info: | Public Key bits: 2048
1579 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1580 Script Info: | Not valid before: 2020-03-03T09:44:15
1581 Script Info: | Not valid after: 2020-05-26T09:44:15
1582 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1583 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1584 Script Info: |_ssl-date: 2020-03-24T07:12:28+00:00; -6s from scanner time.
1585 Os Info: Host: mx.google.com
1586 Script Info: |_clock-skew: -6s
1587
1588--------------End Summary --------------
1589-----------------------------------------
1590################################################################################################################################
1591----- notarioexpress.cl -----
1592
1593
1594Host's addresses:
1595__________________
1596
1597notarioexpress.cl. 2318 IN A 40.113.247.175
1598
1599
1600Name Servers:
1601______________
1602
1603ns3-04.azure-dns.org. 25675 IN A 13.107.24.4
1604ns1-04.azure-dns.com. 28736 IN A 40.90.4.4
1605ns2-04.azure-dns.net. 25675 IN A 64.4.48.4
1606ns4-04.azure-dns.info. 25675 IN A 13.107.160.4
1607
1608
1609Mail (MX) Servers:
1610___________________
1611
1612aspmx.l.google.com. 12 IN A 64.233.167.27
1613alt1.aspmx.l.google.com. 11 IN A 209.85.233.26
1614alt2.aspmx.l.google.com. 10 IN A 142.250.4.27
1615alt3.aspmx.l.google.com. 11 IN A 108.177.97.27
1616alt4.aspmx.l.google.com. 12 IN A 74.125.28.27
1617
1618Brute forcing with /usr/share/dnsenum/dns.txt:
1619_______________________________________________
1620
1621admin.notarioexpress.cl. 3600 IN CNAME (
1622adminnotarioexpress.azurewebsites.net. 1800 IN CNAME (
1623ssl.adminnotarioexpress.azurewebsites.net. 300 IN A 40.113.239.58
1624www.notarioexpress.cl. 2245 IN CNAME notarioexpress.azurewebsites.net.
1625notarioexpress.azurewebsites.net. 445 IN CNAME (
1626ssl.notarioexpress.azurewebsites.net. 134 IN A 40.113.247.175
1627
1628
1629Launching Whois Queries:
1630_________________________
1631
1632 c class default: 40.113.247.0 -> 40.113.247.0/24 (whois netrange operation failed)
1633
1634
1635notarioexpress.cl_________________
1636
1637 40.113.247.0/24
1638################################################################################################################################
1639Source:
1640whois.arin.net
1641IP Address:
164240.113.247.175
1643Name:
1644MSFT
1645Handle:
1646NET-40-74-0-0-1
1647Registration Date:
16482/23/15
1649Range:
165040.74.0.0-40.125.127.255
1651Org:
1652Microsoft Corporation
1653Org Handle:
1654MSFT
1655Address:
1656One Microsoft Way
1657City:
1658Redmond
1659State/Province:
1660WA
1661Postal Code:
166298052
1663Country:
1664United States
1665Name Servers:
1666################################################################################################################################
1667URLCrazy Domain Report
1668Domain : www.notarioexpress.cl
1669Keyboard : qwerty
1670At : 2020-03-24 02:52:47 -0400
1671
1672# Please wait. 248 hostnames to process
1673
1674Typo Type Typo DNS-A CC-A DNS-MX Extn
1675--------------------------------------------------------------------------------------------------------------------------
1676Character Omission ww.notarioexpress.cl ? cl
1677Character Omission www.noarioexpress.cl ? cl
1678Character Omission www.notaioexpress.cl ? cl
1679Character Omission www.notariexpress.cl ? cl
1680Character Omission www.notarioepress.cl ? cl
1681Character Omission www.notarioexpess.cl ? cl
1682Character Omission www.notarioexpres.cl ? cl
1683Character Omission www.notarioexprss.cl ? cl
1684Character Omission www.notarioexress.cl ? cl
1685Character Omission www.notarioxpress.cl ? cl
1686Character Omission www.notaroexpress.cl ? cl
1687Character Omission www.notrioexpress.cl ? cl
1688Character Omission www.ntarioexpress.cl ? cl
1689Character Omission www.otarioexpress.cl ? cl
1690Character Omission wwwnotarioexpress.cl ? cl
1691Character Repeat www.nnotarioexpress.cl ? cl
1692Character Repeat www.nootarioexpress.cl ? cl
1693Character Repeat www.notaarioexpress.cl ? cl
1694Character Repeat www.notariioexpress.cl ? cl
1695Character Repeat www.notarioeexpress.cl ? cl
1696Character Repeat www.notarioexppress.cl ? cl
1697Character Repeat www.notarioexpreess.cl ? cl
1698Character Repeat www.notarioexpresss.cl ? cl
1699Character Repeat www.notarioexprress.cl ? cl
1700Character Repeat www.notarioexxpress.cl ? cl
1701Character Repeat www.notariooexpress.cl ? cl
1702Character Repeat www.notarrioexpress.cl ? cl
1703Character Repeat www.nottarioexpress.cl ? cl
1704Character Repeat wwww.notarioexpress.cl ? cl
1705Character Swap ww.wnotarioexpress.cl ? cl
1706Character Swap www.noatrioexpress.cl ? cl
1707Character Swap www.notairoexpress.cl ? cl
1708Character Swap www.notarieoxpress.cl ? cl
1709Character Swap www.notarioepxress.cl ? cl
1710Character Swap www.notarioexperss.cl ? cl
1711Character Swap www.notarioexpress.lc ? lc
1712Character Swap www.notarioexprses.cl ? cl
1713Character Swap www.notarioexrpess.cl ? cl
1714Character Swap www.notarioxepress.cl ? cl
1715Character Swap www.notaroiexpress.cl ? cl
1716Character Swap www.notraioexpress.cl ? cl
1717Character Swap www.ntoarioexpress.cl ? cl
1718Character Swap www.ontarioexpress.cl ? cl
1719Character Swap wwwn.otarioexpress.cl ? cl
1720Character Replacement eww.notarioexpress.cl ? cl
1721Character Replacement qww.notarioexpress.cl ? cl
1722Character Replacement wew.notarioexpress.cl ? cl
1723Character Replacement wqw.notarioexpress.cl ? cl
1724Character Replacement wwe.notarioexpress.cl ? cl
1725Character Replacement wwq.notarioexpress.cl ? cl
1726Character Replacement www.botarioexpress.cl ? cl
1727Character Replacement www.motarioexpress.cl ? cl
1728Character Replacement www.nitarioexpress.cl ? cl
1729Character Replacement www.norarioexpress.cl ? cl
1730Character Replacement www.notaeioexpress.cl ? cl
1731Character Replacement www.notariiexpress.cl ? cl
1732Character Replacement www.notarioecpress.cl ? cl
1733Character Replacement www.notarioexoress.cl ? cl
1734Character Replacement www.notarioexpeess.cl ? cl
1735Character Replacement www.notarioexpreas.cl ? cl
1736Character Replacement www.notarioexpreds.cl ? cl
1737Character Replacement www.notarioexpresa.cl ? cl
1738Character Replacement www.notarioexpresd.cl ? cl
1739Character Replacement www.notarioexprrss.cl ? cl
1740Character Replacement www.notarioexprwss.cl ? cl
1741Character Replacement www.notarioexptess.cl ? cl
1742Character Replacement www.notarioezpress.cl ? cl
1743Character Replacement www.notariorxpress.cl ? cl
1744Character Replacement www.notariowxpress.cl ? cl
1745Character Replacement www.notaripexpress.cl ? cl
1746Character Replacement www.notarooexpress.cl ? cl
1747Character Replacement www.notaruoexpress.cl ? cl
1748Character Replacement www.notatioexpress.cl ? cl
1749Character Replacement www.notsrioexpress.cl ? cl
1750Character Replacement www.noyarioexpress.cl ? cl
1751Character Replacement www.nptarioexpress.cl ? cl
1752Double Character Replacement eew.notarioexpress.cl ? cl
1753Double Character Replacement qqw.notarioexpress.cl ? cl
1754Double Character Replacement wee.notarioexpress.cl ? cl
1755Double Character Replacement wqq.notarioexpress.cl ? cl
1756Double Character Replacement www.notarioexpreaa.cl ? cl
1757Double Character Replacement www.notarioexpredd.cl ? cl
1758Character Insertion weww.notarioexpress.cl ? cl
1759Character Insertion wqww.notarioexpress.cl ? cl
1760Character Insertion wwew.notarioexpress.cl ? cl
1761Character Insertion wwqw.notarioexpress.cl ? cl
1762Character Insertion www.nbotarioexpress.cl ? cl
1763Character Insertion www.nmotarioexpress.cl ? cl
1764Character Insertion www.noitarioexpress.cl ? cl
1765Character Insertion www.noptarioexpress.cl ? cl
1766Character Insertion www.notareioexpress.cl ? cl
1767Character Insertion www.notarioerxpress.cl ? cl
1768Character Insertion www.notarioewxpress.cl ? cl
1769Character Insertion www.notarioexcpress.cl ? cl
1770Character Insertion www.notarioexporess.cl ? cl
1771Character Insertion www.notarioexprerss.cl ? cl
1772Character Insertion www.notarioexpresas.cl ? cl
1773Character Insertion www.notarioexpresds.cl ? cl
1774Character Insertion www.notarioexpressa.cl ? cl
1775Character Insertion www.notarioexpressd.cl ? cl
1776Character Insertion www.notarioexprewss.cl ? cl
1777Character Insertion www.notarioexprtess.cl ? cl
1778Character Insertion www.notarioexzpress.cl ? cl
1779Character Insertion www.notarioiexpress.cl ? cl
1780Character Insertion www.notariopexpress.cl ? cl
1781Character Insertion www.notariuoexpress.cl ? cl
1782Character Insertion www.notartioexpress.cl ? cl
1783Character Insertion www.notasrioexpress.cl ? cl
1784Character Insertion www.notrarioexpress.cl ? cl
1785Character Insertion www.notyarioexpress.cl ? cl
1786Character Insertion wwwe.notarioexpress.cl ? cl
1787Character Insertion wwwq.notarioexpress.cl ? cl
1788Missing Dot wwwwww.notarioexpress.cl ? cl
1789Singular or Pluralise notarioexpres.cl ? cl
1790Singular or Pluralise notarioexpresses.cl ? cl
1791Common Misspelling www.onotarioexpress.cl ? cl
1792Vowel Swap www.natariaexpress.cl ? cl
1793Vowel Swap www.netarieexpress.cl ? cl
1794Vowel Swap www.nitariiexpress.cl ? cl
1795Vowel Swap www.notaraoexpress.cl ? cl
1796Vowel Swap www.notareoexpress.cl ? cl
1797Vowel Swap www.notarioaxprass.cl ? cl
1798Vowel Swap www.notarioixpriss.cl ? cl
1799Vowel Swap www.notariooxpross.cl ? cl
1800Vowel Swap www.notariouxpruss.cl ? cl
1801Vowel Swap www.noterioexpress.cl ? cl
1802Vowel Swap www.notirioexpress.cl ? cl
1803Vowel Swap www.notorioexpress.cl ? cl
1804Vowel Swap www.noturioexpress.cl ? cl
1805Vowel Swap www.nutariuexpress.cl ? cl
1806Homophones www.knotarioexpress.cl ? cl
1807Homophones www.knowtarioexpress.cl ? cl
1808Homophones www.naughtarioexpress.cl ? cl
1809Homophones www.notarayeoexpress.cl ? cl
1810Homophones www.notareyeoexpress.cl ? cl
1811Bit Flipping 7ww.notarioexpress.cl ? cl
1812Bit Flipping gww.notarioexpress.cl ? cl
1813Bit Flipping sww.notarioexpress.cl ? cl
1814Bit Flipping uww.notarioexpress.cl ? cl
1815Bit Flipping vww.notarioexpress.cl ? cl
1816Bit Flipping w7w.notarioexpress.cl ? cl
1817Bit Flipping wgw.notarioexpress.cl ? cl
1818Bit Flipping wsw.notarioexpress.cl ? cl
1819Bit Flipping wuw.notarioexpress.cl ? cl
1820Bit Flipping wvw.notarioexpress.cl ? cl
1821Bit Flipping ww7.notarioexpress.cl ? cl
1822Bit Flipping wwg.notarioexpress.cl ? cl
1823Bit Flipping wws.notarioexpress.cl ? cl
1824Bit Flipping wwu.notarioexpress.cl ? cl
1825Bit Flipping wwv.notarioexpress.cl ? cl
1826Bit Flipping www.fotarioexpress.cl ? cl
1827Bit Flipping www.jotarioexpress.cl ? cl
1828Bit Flipping www.lotarioexpress.cl ? cl
1829Bit Flipping www.ngtarioexpress.cl ? cl
1830Bit Flipping www.nktarioexpress.cl ? cl
1831Bit Flipping www.nmtarioexpress.cl ? cl
1832Bit Flipping www.nntarioexpress.cl ? cl
1833Bit Flipping www.no4arioexpress.cl ? cl
1834Bit Flipping www.nodarioexpress.cl ? cl
1835Bit Flipping www.noparioexpress.cl ? cl
1836Bit Flipping www.nota2ioexpress.cl ? cl
1837Bit Flipping www.notabioexpress.cl ? cl
1838Bit Flipping www.notapioexpress.cl ? cl
1839Bit Flipping www.notarhoexpress.cl ? cl
1840Bit Flipping www.notarigexpress.cl ? cl
1841Bit Flipping www.notarikexpress.cl ? cl
1842Bit Flipping www.notarimexpress.cl ? cl
1843Bit Flipping www.notarinexpress.cl ? cl
1844Bit Flipping www.notarioaxpress.cl ? cl
1845Bit Flipping www.notariodxpress.cl ? cl
1846Bit Flipping www.notarioe8press.cl ? cl
1847Bit Flipping www.notarioehpress.cl ? cl
1848Bit Flipping www.notarioeppress.cl ? cl
1849Bit Flipping www.notarioex0ress.cl ? cl
1850Bit Flipping www.notarioexp2ess.cl ? cl
1851Bit Flipping www.notarioexpbess.cl ? cl
1852Bit Flipping www.notarioexppess.cl ? cl
1853Bit Flipping www.notarioexprass.cl ? cl
1854Bit Flipping www.notarioexprdss.cl ? cl
1855Bit Flipping www.notarioexpre3s.cl ? cl
1856Bit Flipping www.notarioexprecs.cl ? cl
1857Bit Flipping www.notarioexpreqs.cl ? cl
1858Bit Flipping www.notarioexprers.cl ? cl
1859Bit Flipping www.notarioexpres3.cl ? cl
1860Bit Flipping www.notarioexpresc.cl ? cl
1861Bit Flipping www.notarioexpresq.cl ? cl
1862Bit Flipping www.notarioexpresr.cl ? cl
1863Bit Flipping www.notarioexpress.cd ? cd
1864Bit Flipping www.notarioexpress.ch ? ch
1865Bit Flipping www.notarioexpress.cm ? cm
1866Bit Flipping www.notarioexpress.cn ? cn
1867Bit Flipping www.notarioexpress.gl ? gl
1868Bit Flipping www.notarioexpress.sl ? sl
1869Bit Flipping www.notarioexpresw.cl ? cl
1870Bit Flipping www.notarioexprews.cl ? cl
1871Bit Flipping www.notarioexprgss.cl ? cl
1872Bit Flipping www.notarioexprmss.cl ? cl
1873Bit Flipping www.notarioexpruss.cl ? cl
1874Bit Flipping www.notarioexpsess.cl ? cl
1875Bit Flipping www.notarioexpvess.cl ? cl
1876Bit Flipping www.notarioexpzess.cl ? cl
1877Bit Flipping www.notarioexqress.cl ? cl
1878Bit Flipping www.notarioexrress.cl ? cl
1879Bit Flipping www.notarioextress.cl ? cl
1880Bit Flipping www.notarioexxress.cl ? cl
1881Bit Flipping www.notarioeypress.cl ? cl
1882Bit Flipping www.notariogxpress.cl ? cl
1883Bit Flipping www.notariomxpress.cl ? cl
1884Bit Flipping www.notariouxpress.cl ? cl
1885Bit Flipping www.notarkoexpress.cl ? cl
1886Bit Flipping www.notarmoexpress.cl ? cl
1887Bit Flipping www.notaryoexpress.cl ? cl
1888Bit Flipping www.notasioexpress.cl ? cl
1889Bit Flipping www.notavioexpress.cl ? cl
1890Bit Flipping www.notazioexpress.cl ? cl
1891Bit Flipping www.notcrioexpress.cl ? cl
1892Bit Flipping www.notqrioexpress.cl ? cl
1893Bit Flipping www.nouarioexpress.cl ? cl
1894Bit Flipping www.novarioexpress.cl ? cl
1895Bit Flipping www.ootarioexpress.cl ? cl
1896Bit Flipping wwwnnotarioexpress.cl ? cl
1897Homoglyphs vvvvvv.notarioexpress.cl ? cl
1898Homoglyphs vvvvw.notarioexpress.cl ? cl
1899Homoglyphs vvwvv.notarioexpress.cl ? cl
1900Homoglyphs vvww.notarioexpress.cl ? cl
1901Homoglyphs wvvvv.notarioexpress.cl ? cl
1902Homoglyphs wvvw.notarioexpress.cl ? cl
1903Homoglyphs wwvv.notarioexpress.cl ? cl
1904Homoglyphs www.n0tari0express.cl ? cl
1905Homoglyphs www.n0tarioexpress.cl ? cl
1906Homoglyphs www.notari0express.cl ? cl
1907Homoglyphs www.notarloexpress.cl ? cl
1908Wrong TLD notarioexpress.ca ? ca
1909Wrong TLD notarioexpress.ch ? ch
1910Wrong TLD notarioexpress.com 67.227.226.240 US,UNITED STATES mx156.hostedmxserver.com com
1911Wrong TLD notarioexpress.de ? de
1912Wrong TLD notarioexpress.edu ? edu
1913Wrong TLD notarioexpress.es ? es
1914Wrong TLD notarioexpress.fr ? fr
1915Wrong TLD notarioexpress.it ? it
1916Wrong TLD notarioexpress.jp ? jp
1917Wrong TLD notarioexpress.net ? net
1918Wrong TLD notarioexpress.nl ? nl
1919Wrong TLD notarioexpress.no ? no
1920Wrong TLD notarioexpress.org ? org
1921Wrong TLD notarioexpress.ru ? ru
1922Wrong TLD notarioexpress.se ? se
1923Wrong TLD notarioexpress.us ? us
1924################################################################################################################################
1925 [x] Error downloading /advanced_search
1926[3/25] https://www.notarioexpress.cl/EjemploContratoTrabajo.pdf
1927 [x] Error in PDF metadata Creator
1928[4/25] https://www.notarioexpress.cl/terminosycondiciones.pdf
1929 [x] Error in PDF metadata Creator
1930[5/25] https://www.notarioexpress.cl/EjemploContratoTrabajoExtranjero.pdf
1931 [x] Error in PDF metadata Creator
1932[6/25] https://www.notarioexpress.cl/Ejemplo_Finiquito.pdf
1933[7/25] https://www.notarioexpress.cl/PoderSimpleSalvoconductoInstrucciones.pdf
1934 [x] Error in PDF metadata Creator
1935[8/25] https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo3.pdf
1936 [x] Error in PDF metadata Creator
1937[9/25] https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo4.pdf
1938 [x] Error in PDF metadata Creator
1939[10/25] https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo2.pdf
1940 [x] Error in PDF metadata Creator
1941[11/25] https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo1.pdf
1942 [x] Error in PDF metadata Creator
1943[12/25] https://www.notarioexpress.cl/images/documentos/5.pdf
1944
1945
1946[+] List of software found:
1947-----------------------------
1948Skia/PDF m75
1949Skia/PDF m67
1950Skia/PDF m70
1951Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
1952Skia/PDF m71
1953Skia/PDF m76
1954Skia/PDF m65
1955-------------------------------------------------------------------------------------------------------------------------------
1956################################################################################################################################
1957[+] www.notarioexpress.cl has no SPF record!
1958[*] No DMARC record found. Looking for organizational record
1959[+] No organizational DMARC record
1960[+] Spoofing possible for www.notarioexpress.cl!
1961################################################################################################################################
1962WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1963Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:04 EDT
1964Nmap scan report for www.notarioexpress.cl (40.113.247.175)
1965Host is up (0.27s latency).
1966Not shown: 494 filtered ports
1967Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1968PORT STATE SERVICE
196980/tcp open http
1970443/tcp open https
1971
1972Nmap done: 1 IP address (1 host up) scanned in 12.34 seconds
1973################################################################################################################################
1974Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:04 EDT
1975Nmap scan report for www.notarioexpress.cl (40.113.247.175)
1976Host is up.
1977
1978PORT STATE SERVICE
197953/udp open|filtered domain
198067/udp open|filtered dhcps
198168/udp open|filtered dhcpc
198269/udp open|filtered tftp
198388/udp open|filtered kerberos-sec
1984123/udp open|filtered ntp
1985137/udp open|filtered netbios-ns
1986138/udp open|filtered netbios-dgm
1987139/udp open|filtered netbios-ssn
1988161/udp open|filtered snmp
1989162/udp open|filtered snmptrap
1990389/udp open|filtered ldap
1991500/udp open|filtered isakmp
1992520/udp open|filtered route
19932049/udp open|filtered nfs
1994
1995Nmap done: 1 IP address (1 host up) scanned in 5.27 seconds
1996################################################################################################################################
1997HTTP/1.1 301 Moved Permanently
1998Content-Length: 0
1999Content-Type: text/html; charset=UTF-8
2000Location: https://www.notarioexpress.cl/
2001Server: Microsoft-IIS/10.0
2002Date: Tue, 24 Mar 2020 07:04:48 GMT
2003################################################################################################################################
2004/api/Documento
2005application/ld+json
2006/bundles/modernizr?v=wBEWDufH_8Md-Pbioxomt90vm6tJN2Pyy9u9zHtWsPo1
2007/bundles/MsAjaxJs?v=c42ygB2U07n37m_Sfa8ZbLGVu4Rr2gsBo7MvUEnJeZ81
2008/bundles/WebFormsJs?v=AAyiAYwMfvmwjNSBfIMrBAqfU5exDukMVhrRuZ-PDU01
2009/Content/css?v=1b0HU_Q8TJTRUybVra3ovYmLEPSZohx8XRo7_1--bK01
2010 /></head>
2011http://notarioexpress.cl/images/logos/b-w/angelita-hormazabal.png
2012http://notarioexpress.cl/images/logos/b-w/ferrand.png
2013http://notarioexpress.cl/images/logos/b-w/luis-eduardo-rodriguez.png
2014http://notarioexpress.cl/images/logos/b-w/melipilla.png
2015http://notarioexpress.cl/images/logos/b-w/notaria-alvaro-estrada.png
2016http://notarioexpress.cl/images/logos/b-w/notaria-antonieta.png
2017http://notarioexpress.cl/images/logos/b-w/notaria-bosch.png
2018http://notarioexpress.cl/images/logos/b-w/notaria-cerda.png
2019http://notarioexpress.cl/images/logos/b-w/notaria-cortes.png
2020http://notarioexpress.cl/images/logos/b-w/notaria-del-real.png
2021http://notarioexpress.cl/images/logos/b-w/notaria-diez.png
2022http://notarioexpress.cl/images/logos/b-w/notaria-dora-silva.png
2023http://notarioexpress.cl/images/logos/b-w/notaria-gabu.png
2024http://notarioexpress.cl/images/logos/b-w/notaria-gonzalo.png
2025http://notarioexpress.cl/images/logos/b-w/notaria-guerrero.png
2026http://notarioexpress.cl/images/logos/b-w/notaria-jurge-ossa.png
2027http://notarioexpress.cl/images/logos/b-w/notaria-krimar.png
2028http://notarioexpress.cl/images/logos/b-w/notaria-lascar.png
2029http://notarioexpress.cl/images/logos/b-w/notaria-manquehual.png
2030http://notarioexpress.cl/images/logos/b-w/notaria-maria-isabel.png
2031http://notarioexpress.cl/images/logos/b-w/notaria-renata-gonzales.png
2032http://notarioexpress.cl/images/logos/b-w/notaria-santibanes.png
2033http://notarioexpress.cl/images/logos/b-w/notaria-vila.png
2034http://notarioexpress.cl/images/logos/b-w/notaria-villarica.png
2035http://notarioexpress.cl/images/logos/b-w/quintanilla-leon.png
2036http://notarioexpress.cl/images/logos/b-w/rancagua.png
2037http://notarioexpress.cl/images/logos/b-w/retamal.png
2038http://notarioexpress.cl/images/logos/b-w/ruben-reinoso-herrera.png
2039https://ajax.googleapis.com/ajax/libs/angularjs/1.6.4/angular.min.js
2040https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
2041https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
2042https://www.conservador.cl/portal/certificado_vigencia_poder
2043https://www.dt.gob.cl/legislacion/1624/w3-propertyvalue-145960.html
2044https://www.dt.gob.cl/portal/1626/articles-104572_recurso_2.doc
2045https://www.dt.gob.cl/portal/1626/articles-104572_recurso_3.doc
2046https://www.facebook.com/NotarioExpress
2047https://www.facebook.com/tr?id=233815880566460&ev=PageView&noscript=1
2048https://www.googletagmanager.com/gtag/js?id=UA-118894061-1
2049https://www.googletagmanager.com/ns.html?id=GTM-5G7HGGD
2050https://www.googletagmanager.com/ns.html?id=GTM-W6ZJTBB
2051https://www.linkedin.com/in/notarioexpress/
2052https://www.notarioexpress.cl
2053https://www.notarioexpress.cl/SolicitudNuevoDocumento
2054https://www.twitter.com/notarioexpress/
2055https://www.youtube.com/embed/jpnl4yP-pzk?rel=1&showinfo=1
2056http://www.tuempresaenundia.cl
2057../images/banners/prensa.jpg
2058../images/comillas.png
2059images/docs_icons/declaración-de-estado-civil.png
2060images/docs_icons/icono-juzgado.png
2061images/docs_icons/icono-licencia.png
2062images/docs_icons/juridico.png
2063images/docs_icons/madre-autorizada-tercero.png
2064images/docs_icons/madre.png
2065images/docs_icons/natural.png
2066images/docs_icons/padre-autorizada-tercero.png
2067images/docs_icons/padre.png
2068../images/flecha-derecha.png
2069../images/flecha-izquierda.png
2070/images/footer/facebook-icon.png
2071/images/footer/icon-email.png
2072/images/footer/icon-web.png
2073/images/footer/linkedin-icon.png
2074/images/footer/twitter-icon.png
2075../images/icono-chat.png
2076../images/icono-femenino.png
2077../images/icono-masculino.png
2078/images/icons/flecha-scroll.png
2079../images/icons/icon-1.png
2080../images/icons/icon-2.png
2081../images/icons/icon-3.png
2082/images/logos/b-w/andres-vega.png
2083/images/logos/b-w/aravena-estobar.png
2084/images/logos/b-w/GOMILA.png
2085/images/logos/b-w/guitierrez-lopez.png
2086/images/logos/b-w/juan-espinosa.png
2087/images/logos/b-w/luis-contreras-fuentes.png
2088/images/logos/b-w/luis-poza-maldonado.png
2089/images/logos/b-w/nicolas-arrieta-concha.png
2090/images/logos/b-w/notaria-rodriguez.png
2091/images/logos/b-w/quintero.png
2092/images/logos/b-w/sotomayor.png
2093../images/logos-radios.png
2094js/custom.js
2095js/imagesloaded.min.js
2096js/isotope.js
2097js/jquery.js
2098js/magicsuggest.js
2099js/nivo-lightbox.min.js
2100js/Notaria.js
2101js/smoothscroll.js
2102js/wow.min.js
2103 /><meta name=
2104//platform-api.sharethis.com/js/sharethis.js#property=5bd9171c8a1fb80011151bfb&product=inline-share-buttons
2105Scripts/bootstrap.min.js
2106Scripts/respond.min.js
2107text/javascript
2108################################################################################################################################
2109http://www.notarioexpress.cl [301 Moved Permanently] Country[UNITED STATES][US], HTTPServer[Microsoft-IIS/10.0], IP[40.113.247.175], Microsoft-IIS[10.0], RedirectLocation[https://www.notarioexpress.cl/]
2110https://www.notarioexpress.cl/ [200 OK] ASP_NET[4.0.30319], Bootstrap[3.3.5], Cookies[ASP.NET_SessionId,__AntiXsrfToken], Country[UNITED STATES][US], Email[contacto@notarioexpress.cl], Frame, HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId,__AntiXsrfToken], IP[40.113.247.175], JQuery, Lightbox, Microsoft-IIS[10.0], Script[application/ld+json,text/javascript], Title[Notario Express - Menos de 10 minutos de espera promedio en la Notaria][Title element contains newline(s)!], X-Powered-By[ASP.NET], YouTube
2111################################################################################################################################
2112
2113wig - WebApp Information Gatherer
2114
2115
2116Scanning https://www.notarioexpress.cl...
2117___________________________ SITE INFO ____________________________
2118IP Title
211940.113.247.175 Notario Express - Menos de 10 minutos de
2120
2121____________________________ VERSION _____________________________
2122Name Versions Type
2123ASP.NET 4.7.3535.0 Platform
2124IIS 10.0 Platform
2125
2126__________________________ INTERESTING ___________________________
2127URL Note Type
2128/_layouts/create.aspx ASP.NET detailed error Interesting
2129
2130_____________________ PLATFORM OBSERVATIONS ______________________
2131Platform URL Type
2132ASP.NET 4.0.30319 / Observation
2133ASP.NET 4.7.3535.0 /_layouts/create.aspx Observation
2134
2135__________________________________________________________________
2136Time: 108.5 sec Urls: 660 Fingerprints: 40401
2137################################################################################################################################
2138Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:08 EDT
2139NSE: Loaded 161 scripts for scanning.
2140NSE: Script Pre-scanning.
2141Initiating NSE at 03:08
2142Completed NSE at 03:08, 0.00s elapsed
2143Initiating NSE at 03:08
2144Completed NSE at 03:08, 0.00s elapsed
2145Initiating Parallel DNS resolution of 1 host. at 03:08
2146Completed Parallel DNS resolution of 1 host. at 03:08, 0.02s elapsed
2147Initiating SYN Stealth Scan at 03:08
2148Scanning www.notarioexpress.cl (40.113.247.175) [1 port]
2149Discovered open port 80/tcp on 40.113.247.175
2150Completed SYN Stealth Scan at 03:08, 0.31s elapsed (1 total ports)
2151Initiating Service scan at 03:08
2152Scanning 1 service on www.notarioexpress.cl (40.113.247.175)
2153Completed Service scan at 03:08, 6.56s elapsed (1 service on 1 host)
2154Initiating OS detection (try #1) against www.notarioexpress.cl (40.113.247.175)
2155Retrying OS detection (try #2) against www.notarioexpress.cl (40.113.247.175)
2156Initiating Traceroute at 03:08
2157Completed Traceroute at 03:08, 6.01s elapsed
2158Initiating Parallel DNS resolution of 19 hosts. at 03:08
2159Completed Parallel DNS resolution of 19 hosts. at 03:08, 2.55s elapsed
2160NSE: Script scanning 40.113.247.175.
2161Initiating NSE at 03:08
2162Completed NSE at 03:09, 54.31s elapsed
2163Initiating NSE at 03:09
2164Completed NSE at 03:09, 1.11s elapsed
2165Nmap scan report for www.notarioexpress.cl (40.113.247.175)
2166Host is up (0.27s latency).
2167
2168PORT STATE SERVICE VERSION
216980/tcp open http Microsoft IIS httpd 10.0
2170| http-brute:
2171|_ Path "/" does not require authentication
2172|_http-chrono: Request times for /; avg: 791.52ms; min: 742.33ms; max: 882.45ms
2173|_http-csrf: Couldn't find any CSRF vulnerabilities.
2174|_http-date: Tue, 24 Mar 2020 07:08:27 GMT; -6s from local time.
2175|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2176|_http-dombased-xss: Couldn't find any DOM based XSS.
2177|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2178|_http-errors: Couldn't find any error pages.
2179|_http-feed: Couldn't find any feeds.
2180|_http-fetch: Please enter the complete path of the directory to save data in.
2181| http-headers:
2182| Content-Type: text/html; charset=UTF-8
2183| Location: https://www.notarioexpress.cl/
2184| Server: Microsoft-IIS/10.0
2185| Date: Tue, 24 Mar 2020 07:08:27 GMT
2186| Connection: close
2187| Content-Length: 0
2188|
2189|_ (Request type: GET)
2190|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2191| http-methods:
2192|_ Supported Methods: GET HEAD POST OPTIONS
2193|_http-mobileversion-checker: Found mobile version: /mIndex.aspx (Redirected to a different host)
2194| http-security-headers:
2195| Cache_Control:
2196|_ Header: Cache-Control: private
2197|_http-server-header: Microsoft-IIS/10.0
2198| http-sitemap-generator:
2199| Directory structure:
2200| Longest directory structure:
2201| Depth: 0
2202| Dir: /
2203| Total files found (by extension):
2204|_
2205|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2206|_http-title: Did not follow redirect to https://www.notarioexpress.cl/
2207| http-vhosts:
2208| 125 names had status 404
2209| admin.notarioexpress.cl : 301 -> https://admin.notarioexpress.cl/
2210|_www.notarioexpress.cl : 301 -> https://www.notarioexpress.cl/
2211|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2212|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2213|_http-xssed: No previously reported XSS vuln.
2214Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2215OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
2216No OS matches for host
2217Uptime guess: 0.001 days (since Tue Mar 24 03:08:06 2020)
2218TCP Sequence Prediction: Difficulty=262 (Good luck!)
2219IP ID Sequence Generation: Randomized
2220Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2221
2222TRACEROUTE (using port 80/tcp)
2223HOP RTT ADDRESS
22241 136.73 ms 10.203.14.1
22252 ...
22263 137.84 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
22274 137.73 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
22285 139.32 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
22296 139.54 ms be3376.ccr21.sto01.atlas.cogentco.com (130.117.50.226)
22307 139.50 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
22318 139.57 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
22329 164.45 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
223310 275.78 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
223411 273.39 ms be-4-0.ibr05.ams06.ntwk.msn.net (104.44.16.129)
223512 275.14 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
223613 271.95 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
223714 273.54 ms be-1-0.ibr01.lon22.ntwk.msn.net (104.44.16.55)
223815 ...
223916 279.92 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
224017 277.65 ms be-6-0.ibr01.ch2.ntwk.msn.net (104.44.28.19)
224118 272.54 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
224219 273.38 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
224320 275.65 ms be-5-0.ibr03.dsm05.ntwk.msn.net (104.44.17.161)
224421 275.66 ms ae143-0.icr02.dsm05.ntwk.msn.net (104.44.22.196)
224522 ... 30
2246
2247NSE: Script Post-scanning.
2248Initiating NSE at 03:09
2249Completed NSE at 03:09, 0.00s elapsed
2250Initiating NSE at 03:09
2251Completed NSE at 03:09, 0.00s elapsed
2252################################################################################################################################
2253------------------------------------------------------------------------------------------------------------------------
2254
2255[ ! ] Starting SCANNER INURLBR 2.1 at [24-03-2020 03:18:06]
2256[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2257It is the end user's responsibility to obey all applicable local, state and federal laws.
2258Developers assume no liability and are not responsible for any misuse or damage caused by this program
2259
2260[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.notarioexpress.cl/output/inurlbr-www.notarioexpress.cl ]
2261[ INFO ][ DORK ]::[ site:www.notarioexpress.cl ]
2262[ INFO ][ SEARCHING ]:: {
2263[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.ck ]
2264
2265[ INFO ][ SEARCHING ]::
2266-[:::]
2267[ INFO ][ ENGINE ]::[ GOOGLE API ]
2268
2269[ INFO ][ SEARCHING ]::
2270-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2271[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.my ID: 002901626849897788481:cpnctza84gq ]
2272
2273[ INFO ][ SEARCHING ]::
2274-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2275
2276[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2277
2278
2279 _[ - ]::--------------------------------------------------------------------------------------------------------------
2280|_[ + ] [ 0 / 100 ]-[03:18:30] [ - ]
2281|_[ + ] Target:: [ https://www.notarioexpress.cl/ ]
2282|_[ + ] Exploit::
2283|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2284|_[ + ] More details:: / - / , ISP:
2285|_[ + ] Found:: UNIDENTIFIED
2286
2287 _[ - ]::--------------------------------------------------------------------------------------------------------------
2288|_[ + ] [ 1 / 100 ]-[03:18:32] [ - ]
2289|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionestadocivil ]
2290|_[ + ] Exploit::
2291|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2292|_[ + ] More details:: / - / , ISP:
2293|_[ + ] Found:: UNIDENTIFIED
2294
2295 _[ - ]::--------------------------------------------------------------------------------------------------------------
2296|_[ + ] [ 2 / 100 ]-[03:18:35] [ - ]
2297|_[ + ] Target:: [ https://www.notarioexpress.cl/notariasdechile ]
2298|_[ + ] Exploit::
2299|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2300|_[ + ] More details:: / - / , ISP:
2301|_[ + ] Found:: UNIDENTIFIED
2302
2303 _[ - ]::--------------------------------------------------------------------------------------------------------------
2304|_[ + ] [ 3 / 100 ]-[03:18:37] [ - ]
2305|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizacionsalidavehiculo ]
2306|_[ + ] Exploit::
2307|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2308|_[ + ] More details:: / - / , ISP:
2309|_[ + ] Found:: UNIDENTIFIED
2310
2311 _[ - ]::--------------------------------------------------------------------------------------------------------------
2312|_[ + ] [ 4 / 100 ]-[03:18:39] [ - ]
2313|_[ + ] Target:: [ https://www.notarioexpress.cl/contratodearriendovehiculo ]
2314|_[ + ] Exploit::
2315|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2316|_[ + ] More details:: / - / , ISP:
2317|_[ + ] Found:: UNIDENTIFIED
2318
2319 _[ - ]::--------------------------------------------------------------------------------------------------------------
2320|_[ + ] [ 5 / 100 ]-[03:18:41] [ - ]
2321|_[ + ] Target:: [ https://www.notarioexpress.cl/PreguntasFrecuentes ]
2322|_[ + ] Exploit::
2323|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2324|_[ + ] More details:: / - / , ISP:
2325|_[ + ] Found:: UNIDENTIFIED
2326
2327 _[ - ]::--------------------------------------------------------------------------------------------------------------
2328|_[ + ] [ 6 / 100 ]-[03:18:43] [ - ]
2329|_[ + ] Target:: [ https://www.notarioexpress.cl/certificadoderesidencia ]
2330|_[ + ] Exploit::
2331|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2332|_[ + ] More details:: / - / , ISP:
2333|_[ + ] Found:: UNIDENTIFIED
2334
2335 _[ - ]::--------------------------------------------------------------------------------------------------------------
2336|_[ + ] [ 7 / 100 ]-[03:18:45] [ - ]
2337|_[ + ] Target:: [ https://www.notarioexpress.cl/poderbancario ]
2338|_[ + ] Exploit::
2339|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2340|_[ + ] More details:: / - / , ISP:
2341|_[ + ] Found:: UNIDENTIFIED
2342
2343 _[ - ]::--------------------------------------------------------------------------------------------------------------
2344|_[ + ] [ 8 / 100 ]-[03:18:47] [ - ]
2345|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadecesantia ]
2346|_[ + ] Exploit::
2347|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2348|_[ + ] More details:: / - / , ISP:
2349|_[ + ] Found:: UNIDENTIFIED
2350
2351 _[ - ]::--------------------------------------------------------------------------------------------------------------
2352|_[ + ] [ 9 / 100 ]-[03:18:49] [ - ]
2353|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadealcoholes ]
2354|_[ + ] Exploit::
2355|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2356|_[ + ] More details:: / - / , ISP:
2357|_[ + ] Found:: UNIDENTIFIED
2358
2359 _[ - ]::--------------------------------------------------------------------------------------------------------------
2360|_[ + ] [ 10 / 100 ]-[03:18:51] [ - ]
2361|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeingresos ]
2362|_[ + ] Exploit::
2363|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2364|_[ + ] More details:: / - / , ISP:
2365|_[ + ] Found:: UNIDENTIFIED
2366
2367 _[ - ]::--------------------------------------------------------------------------------------------------------------
2368|_[ + ] [ 11 / 100 ]-[03:18:53] [ - ]
2369|_[ + ] Target:: [ https://www.notarioexpress.cl/ContratosDeTrabajo ]
2370|_[ + ] Exploit::
2371|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2372|_[ + ] More details:: / - / , ISP:
2373|_[ + ] Found:: UNIDENTIFIED
2374
2375 _[ - ]::--------------------------------------------------------------------------------------------------------------
2376|_[ + ] [ 12 / 100 ]-[03:18:55] [ - ]
2377|_[ + ] Target:: [ https://www.notarioexpress.cl/poderespecialsii ]
2378|_[ + ] Exploit::
2379|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2380|_[ + ] More details:: / - / , ISP:
2381|_[ + ] Found:: UNIDENTIFIED
2382
2383 _[ - ]::--------------------------------------------------------------------------------------------------------------
2384|_[ + ] [ 13 / 100 ]-[03:18:57] [ - ]
2385|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjurada ]
2386|_[ + ] Exploit::
2387|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2388|_[ + ] More details:: / - / , ISP:
2389|_[ + ] Found:: UNIDENTIFIED
2390
2391 _[ - ]::--------------------------------------------------------------------------------------------------------------
2392|_[ + ] [ 14 / 100 ]-[03:18:59] [ - ]
2393|_[ + ] Target:: [ https://www.notarioexpress.cl/cartadeinvitacionextranjero ]
2394|_[ + ] Exploit::
2395|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2396|_[ + ] More details:: / - / , ISP:
2397|_[ + ] Found:: UNIDENTIFIED
2398
2399 _[ - ]::--------------------------------------------------------------------------------------------------------------
2400|_[ + ] [ 15 / 100 ]-[03:19:01] [ - ]
2401|_[ + ] Target:: [ https://www.notarioexpress.cl/MandatoJudicial ]
2402|_[ + ] Exploit::
2403|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2404|_[ + ] More details:: / - / , ISP:
2405|_[ + ] Found:: UNIDENTIFIED
2406
2407 _[ - ]::--------------------------------------------------------------------------------------------------------------
2408|_[ + ] [ 16 / 100 ]-[03:19:03] [ - ]
2409|_[ + ] Target:: [ https://www.notarioexpress.cl/documentosnotariales ]
2410|_[ + ] Exploit::
2411|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2412|_[ + ] More details:: / - / , ISP:
2413|_[ + ] Found:: UNIDENTIFIED
2414
2415 _[ - ]::--------------------------------------------------------------------------------------------------------------
2416|_[ + ] [ 17 / 100 ]-[03:19:05] [ - ]
2417|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciontrabajomenordeedad ]
2418|_[ + ] Exploit::
2419|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2420|_[ + ] More details:: / - / , ISP:
2421|_[ + ] Found:: UNIDENTIFIED
2422
2423 _[ - ]::--------------------------------------------------------------------------------------------------------------
2424|_[ + ] [ 18 / 100 ]-[03:19:07] [ - ]
2425|_[ + ] Target:: [ https://www.notarioexpress.cl/AdministracionInmueble ]
2426|_[ + ] Exploit::
2427|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2428|_[ + ] More details:: / - / , ISP:
2429|_[ + ] Found:: UNIDENTIFIED
2430
2431 _[ - ]::--------------------------------------------------------------------------------------------------------------
2432|_[ + ] [ 19 / 100 ]-[03:19:10] [ - ]
2433|_[ + ] Target:: [ https://www.notarioexpress.cl/TrabajadorPuertasAbiertas ]
2434|_[ + ] Exploit::
2435|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2436|_[ + ] More details:: / - / , ISP:
2437|_[ + ] Found:: UNIDENTIFIED
2438
2439 _[ - ]::--------------------------------------------------------------------------------------------------------------
2440|_[ + ] [ 20 / 100 ]-[03:19:12] [ - ]
2441|_[ + ] Target:: [ https://www.notarioexpress.cl/SobreNosotros ]
2442|_[ + ] Exploit::
2443|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2444|_[ + ] More details:: / - / , ISP:
2445|_[ + ] Found:: UNIDENTIFIED
2446
2447 _[ - ]::--------------------------------------------------------------------------------------------------------------
2448|_[ + ] [ 21 / 100 ]-[03:19:14] [ - ]
2449|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondomiciliocomercial ]
2450|_[ + ] Exploit::
2451|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2452|_[ + ] More details:: / - / , ISP:
2453|_[ + ] Found:: UNIDENTIFIED
2454
2455 _[ - ]::--------------------------------------------------------------------------------------------------------------
2456|_[ + ] [ 22 / 100 ]-[03:19:16] [ - ]
2457|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondeviajeparamenores ]
2458|_[ + ] Exploit::
2459|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2460|_[ + ] More details:: / - / , ISP:
2461|_[ + ] Found:: UNIDENTIFIED
2462
2463 _[ - ]::--------------------------------------------------------------------------------------------------------------
2464|_[ + ] [ 23 / 100 ]-[03:19:18] [ - ]
2465|_[ + ] Target:: [ https://www.notarioexpress.cl/TrabajadorPuertasAdentro ]
2466|_[ + ] Exploit::
2467|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2468|_[ + ] More details:: / - / , ISP:
2469|_[ + ] Found:: UNIDENTIFIED
2470
2471 _[ - ]::--------------------------------------------------------------------------------------------------------------
2472|_[ + ] [ 24 / 100 ]-[03:19:20] [ - ]
2473|_[ + ] Target:: [ https://www.notarioexpress.cl/certificadodeantiguedadlaboral ]
2474|_[ + ] Exploit::
2475|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2476|_[ + ] More details:: / - / , ISP:
2477|_[ + ] Found:: UNIDENTIFIED
2478
2479 _[ - ]::--------------------------------------------------------------------------------------------------------------
2480|_[ + ] [ 25 / 100 ]-[03:19:25] [ - ]
2481|_[ + ] Target:: [ https://www.notarioexpress.cl/finiquito ]
2482|_[ + ] Exploit::
2483|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2484|_[ + ] More details:: / - / , ISP:
2485|_[ + ] Found:: UNIDENTIFIED
2486
2487 _[ - ]::--------------------------------------------------------------------------------------------------------------
2488|_[ + ] [ 26 / 100 ]-[03:19:28] [ - ]
2489|_[ + ] Target:: [ https://www.notarioexpress.cl/mIndex ]
2490|_[ + ] Exploit::
2491|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2492|_[ + ] More details:: / - / , ISP:
2493|_[ + ] Found:: UNIDENTIFIED
2494
2495 _[ - ]::--------------------------------------------------------------------------------------------------------------
2496|_[ + ] [ 27 / 100 ]-[03:19:30] [ - ]
2497|_[ + ] Target:: [ https://www.notarioexpress.cl/contratodearriendo ]
2498|_[ + ] Exploit::
2499|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2500|_[ + ] More details:: / - / , ISP:
2501|_[ + ] Found:: UNIDENTIFIED
2502
2503 _[ - ]::--------------------------------------------------------------------------------------------------------------
2504|_[ + ] [ 28 / 100 ]-[03:19:32] [ - ]
2505|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderCobroFiniquito ]
2506|_[ + ] Exploit::
2507|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2508|_[ + ] More details:: / - / , ISP:
2509|_[ + ] Found:: UNIDENTIFIED
2510
2511 _[ - ]::--------------------------------------------------------------------------------------------------------------
2512|_[ + ] [ 29 / 100 ]-[03:19:34] [ - ]
2513|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeextraviodelicenciadeconducir ]
2514|_[ + ] Exploit::
2515|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2516|_[ + ] More details:: / - / , ISP:
2517|_[ + ] Found:: UNIDENTIFIED
2518
2519 _[ - ]::--------------------------------------------------------------------------------------------------------------
2520|_[ + ] [ 30 / 100 ]-[03:19:37] [ - ]
2521|_[ + ] Target:: [ https://www.notarioexpress.cl/notariasdeturnoenchile ]
2522|_[ + ] Exploit::
2523|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2524|_[ + ] More details:: / - / , ISP:
2525|_[ + ] Found:: UNIDENTIFIED
2526
2527 _[ - ]::--------------------------------------------------------------------------------------------------------------
2528|_[ + ] [ 31 / 100 ]-[03:19:39] [ - ]
2529|_[ + ] Target:: [ https://www.notarioexpress.cl/renunciavoluntaria ]
2530|_[ + ] Exploit::
2531|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2532|_[ + ] More details:: / - / , ISP:
2533|_[ + ] Found:: UNIDENTIFIED
2534
2535 _[ - ]::--------------------------------------------------------------------------------------------------------------
2536|_[ + ] [ 32 / 100 ]-[03:19:41] [ - ]
2537|_[ + ] Target:: [ https://www.notarioexpress.cl/salvoconducto ]
2538|_[ + ] Exploit::
2539|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2540|_[ + ] More details:: / - / , ISP:
2541|_[ + ] Found:: UNIDENTIFIED
2542
2543 _[ - ]::--------------------------------------------------------------------------------------------------------------
2544|_[ + ] [ 33 / 100 ]-[03:19:43] [ - ]
2545|_[ + ] Target:: [ https://www.notarioexpress.cl/prensa ]
2546|_[ + ] Exploit::
2547|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2548|_[ + ] More details:: / - / , ISP:
2549|_[ + ] Found:: UNIDENTIFIED
2550
2551 _[ - ]::--------------------------------------------------------------------------------------------------------------
2552|_[ + ] [ 34 / 100 ]-[03:19:45] [ - ]
2553|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderRetiroVehiculo ]
2554|_[ + ] Exploit::
2555|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2556|_[ + ] More details:: / - / , ISP:
2557|_[ + ] Found:: UNIDENTIFIED
2558
2559 _[ - ]::--------------------------------------------------------------------------------------------------------------
2560|_[ + ] [ 35 / 100 ]-[03:19:47] [ - ]
2561|_[ + ] Target:: [ https://www.notarioexpress.cl/poderventavehiculo ]
2562|_[ + ] Exploit::
2563|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2564|_[ + ] More details:: / - / , ISP:
2565|_[ + ] Found:: UNIDENTIFIED
2566
2567 _[ - ]::--------------------------------------------------------------------------------------------------------------
2568|_[ + ] [ 36 / 100 ]-[03:19:49] [ - ]
2569|_[ + ] Target:: [ https://www.notarioexpress.cl/notarioadomicilio ]
2570|_[ + ] Exploit::
2571|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2572|_[ + ] More details:: / - / , ISP:
2573|_[ + ] Found:: UNIDENTIFIED
2574
2575 _[ - ]::--------------------------------------------------------------------------------------------------------------
2576|_[ + ] [ 37 / 100 ]-[03:19:51] [ - ]
2577|_[ + ] Target:: [ https://www.notarioexpress.cl/tramitesnotarialesenchile ]
2578|_[ + ] Exploit::
2579|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2580|_[ + ] More details:: / - / , ISP:
2581|_[ + ] Found:: UNIDENTIFIED
2582
2583 _[ - ]::--------------------------------------------------------------------------------------------------------------
2584|_[ + ] [ 38 / 100 ]-[03:19:53] [ - ]
2585|_[ + ] Target:: [ https://www.notarioexpress.cl/comofunciona ]
2586|_[ + ] Exploit::
2587|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2588|_[ + ] More details:: / - / , ISP:
2589|_[ + ] Found:: UNIDENTIFIED
2590
2591 _[ - ]::--------------------------------------------------------------------------------------------------------------
2592|_[ + ] [ 39 / 100 ]-[03:19:55] [ - ]
2593|_[ + ] Target:: [ https://www.notarioexpress.cl/SolicitudDevolucion ]
2594|_[ + ] Exploit::
2595|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2596|_[ + ] More details:: / - / , ISP:
2597|_[ + ] Found:: UNIDENTIFIED
2598
2599 _[ - ]::--------------------------------------------------------------------------------------------------------------
2600|_[ + ] [ 40 / 100 ]-[03:19:57] [ - ]
2601|_[ + ] Target:: [ https://www.notarioexpress.cl/fotocopialegalizada ]
2602|_[ + ] Exploit::
2603|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2604|_[ + ] More details:: / - / , ISP:
2605|_[ + ] Found:: UNIDENTIFIED
2606
2607 _[ - ]::--------------------------------------------------------------------------------------------------------------
2608|_[ + ] [ 41 / 100 ]-[03:19:59] [ - ]
2609|_[ + ] Target:: [ https://www.notarioexpress.cl/Contacto ]
2610|_[ + ] Exploit::
2611|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2612|_[ + ] More details:: / - / , ISP:
2613|_[ + ] Found:: UNIDENTIFIED
2614
2615 _[ - ]::--------------------------------------------------------------------------------------------------------------
2616|_[ + ] [ 42 / 100 ]-[03:20:03] [ - ]
2617|_[ + ] Target:: [ https://www.notarioexpress.cl/SolicitudNuevoDocumento ]
2618|_[ + ] Exploit::
2619|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2620|_[ + ] More details:: / - / , ISP:
2621|_[ + ] Found:: UNIDENTIFIED
2622
2623 _[ - ]::--------------------------------------------------------------------------------------------------------------
2624|_[ + ] [ 43 / 100 ]-[03:20:06] [ - ]
2625|_[ + ] Target:: [ https://www.notarioexpress.cl/ValidadorEscrituraPublica ]
2626|_[ + ] Exploit::
2627|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2628|_[ + ] More details:: / - / , ISP:
2629|_[ + ] Found:: UNIDENTIFIED
2630
2631 _[ - ]::--------------------------------------------------------------------------------------------------------------
2632|_[ + ] [ 44 / 100 ]-[03:20:07] [ - ]
2633|_[ + ] Target:: [ https://www.notarioexpress.cl/ContactoLegal ]
2634|_[ + ] Exploit::
2635|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2636|_[ + ] More details:: / - / , ISP:
2637|_[ + ] Found:: UNIDENTIFIED
2638
2639 _[ - ]::--------------------------------------------------------------------------------------------------------------
2640|_[ + ] [ 45 / 100 ]-[03:20:09] [ - ]
2641|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeexpensas ]
2642|_[ + ] Exploit::
2643|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2644|_[ + ] More details:: / - / , ISP:
2645|_[ + ] Found:: UNIDENTIFIED
2646
2647 _[ - ]::--------------------------------------------------------------------------------------------------------------
2648|_[ + ] [ 46 / 100 ]-[03:20:11] [ - ]
2649|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondeviajeurgente ]
2650|_[ + ] Exploit::
2651|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2652|_[ + ] More details:: / - / , ISP:
2653|_[ + ] Found:: UNIDENTIFIED
2654
2655 _[ - ]::--------------------------------------------------------------------------------------------------------------
2656|_[ + ] [ 47 / 100 ]-[03:20:13] [ - ]
2657|_[ + ] Target:: [ https://www.notarioexpress.cl/Mobile ]
2658|_[ + ] Exploit::
2659|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2660|_[ + ] More details:: / - / , ISP:
2661|_[ + ] Found:: UNIDENTIFIED
2662
2663 _[ - ]::--------------------------------------------------------------------------------------------------------------
2664|_[ + ] [ 48 / 100 ]-[03:20:15] [ - ]
2665|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=41 ]
2666|_[ + ] Exploit::
2667|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
2668|_[ + ] More details:: / - / , ISP:
2669|_[ + ] Found:: UNIDENTIFIED
2670
2671 _[ - ]::--------------------------------------------------------------------------------------------------------------
2672|_[ + ] [ 49 / 100 ]-[03:20:17] [ - ]
2673|_[ + ] Target:: [ https://www.notarioexpress.cl/EjemploContratoTrabajo.pdf ]
2674|_[ + ] Exploit::
2675|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2676|_[ + ] More details:: / - / , ISP:
2677|_[ + ] Found:: UNIDENTIFIED
2678
2679 _[ - ]::--------------------------------------------------------------------------------------------------------------
2680|_[ + ] [ 50 / 100 ]-[03:20:19] [ - ]
2681|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=68 ]
2682|_[ + ] Exploit::
2683|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
2684|_[ + ] More details:: / - / , ISP:
2685|_[ + ] Found:: UNIDENTIFIED
2686
2687 _[ - ]::--------------------------------------------------------------------------------------------------------------
2688|_[ + ] [ 51 / 100 ]-[03:20:20] [ - ]
2689|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=83 ]
2690|_[ + ] Exploit::
2691|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
2692|_[ + ] More details:: / - / , ISP:
2693|_[ + ] Found:: UNIDENTIFIED
2694
2695 _[ - ]::--------------------------------------------------------------------------------------------------------------
2696|_[ + ] [ 52 / 100 ]-[03:20:22] [ - ]
2697|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=42 ]
2698|_[ + ] Exploit::
2699|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
2700|_[ + ] More details:: / - / , ISP:
2701|_[ + ] Found:: UNIDENTIFIED
2702
2703 _[ - ]::--------------------------------------------------------------------------------------------------------------
2704|_[ + ] [ 53 / 100 ]-[03:20:25] [ - ]
2705|_[ + ] Target:: [ https://www.notarioexpress.cl/terminosycondiciones.pdf ]
2706|_[ + ] Exploit::
2707|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2708|_[ + ] More details:: / - / , ISP:
2709|_[ + ] Found:: UNIDENTIFIED
2710
2711 _[ - ]::--------------------------------------------------------------------------------------------------------------
2712|_[ + ] [ 54 / 100 ]-[03:20:27] [ - ]
2713|_[ + ] Target:: [ https://www.notarioexpress.cl/EjemploContratoTrabajoExtranjero.pdf ]
2714|_[ + ] Exploit::
2715|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2716|_[ + ] More details:: / - / , ISP:
2717|_[ + ] Found:: UNIDENTIFIED
2718
2719 _[ - ]::--------------------------------------------------------------------------------------------------------------
2720|_[ + ] [ 55 / 100 ]-[03:20:29] [ - ]
2721|_[ + ] Target:: [ https://www.notarioexpress.cl/Ejemplo_Finiquito.pdf ]
2722|_[ + ] Exploit::
2723|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2724|_[ + ] More details:: / - / , ISP:
2725|_[ + ] Found:: UNIDENTIFIED
2726
2727 _[ - ]::--------------------------------------------------------------------------------------------------------------
2728|_[ + ] [ 56 / 100 ]-[03:20:32] [ - ]
2729|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderSimpleSalvoconductoInstrucciones.pdf ]
2730|_[ + ] Exploit::
2731|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2732|_[ + ] More details:: / - / , ISP:
2733|_[ + ] Found:: UNIDENTIFIED
2734
2735 _[ - ]::--------------------------------------------------------------------------------------------------------------
2736|_[ + ] [ 57 / 100 ]-[03:20:34] [ - ]
2737|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo3.pdf ]
2738|_[ + ] Exploit::
2739|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2740|_[ + ] More details:: / - / , ISP:
2741|_[ + ] Found:: UNIDENTIFIED
2742
2743 _[ - ]::--------------------------------------------------------------------------------------------------------------
2744|_[ + ] [ 58 / 100 ]-[03:20:36] [ - ]
2745|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=1 ]
2746|_[ + ] Exploit::
2747|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2748|_[ + ] More details:: / - / , ISP:
2749|_[ + ] Found:: UNIDENTIFIED
2750
2751 _[ - ]::--------------------------------------------------------------------------------------------------------------
2752|_[ + ] [ 59 / 100 ]-[03:20:38] [ - ]
2753|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=29 ]
2754|_[ + ] Exploit::
2755|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2756|_[ + ] More details:: / - / , ISP:
2757|_[ + ] Found:: UNIDENTIFIED
2758
2759 _[ - ]::--------------------------------------------------------------------------------------------------------------
2760|_[ + ] [ 60 / 100 ]-[03:20:41] [ - ]
2761|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=12 ]
2762|_[ + ] Exploit::
2763|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2764|_[ + ] More details:: / - / , ISP:
2765|_[ + ] Found:: UNIDENTIFIED
2766
2767 _[ - ]::--------------------------------------------------------------------------------------------------------------
2768|_[ + ] [ 61 / 100 ]-[03:20:43] [ - ]
2769|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=4 ]
2770|_[ + ] Exploit::
2771|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2772|_[ + ] More details:: / - / , ISP:
2773|_[ + ] Found:: UNIDENTIFIED
2774
2775 _[ - ]::--------------------------------------------------------------------------------------------------------------
2776|_[ + ] [ 62 / 100 ]-[03:20:45] [ - ]
2777|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=13&idDocumento=3 ]
2778|_[ + ] Exploit::
2779|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2780|_[ + ] More details:: / - / , ISP:
2781|_[ + ] Found:: UNIDENTIFIED
2782
2783 _[ - ]::--------------------------------------------------------------------------------------------------------------
2784|_[ + ] [ 63 / 100 ]-[03:20:47] [ - ]
2785|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=12 ]
2786|_[ + ] Exploit::
2787|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2788|_[ + ] More details:: / - / , ISP:
2789|_[ + ] Found:: UNIDENTIFIED
2790
2791 _[ - ]::--------------------------------------------------------------------------------------------------------------
2792|_[ + ] [ 64 / 100 ]-[03:20:49] [ - ]
2793|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=8 ]
2794|_[ + ] Exploit::
2795|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2796|_[ + ] More details:: / - / , ISP:
2797|_[ + ] Found:: UNIDENTIFIED
2798
2799 _[ - ]::--------------------------------------------------------------------------------------------------------------
2800|_[ + ] [ 65 / 100 ]-[03:20:51] [ - ]
2801|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=27&idDocumento=29 ]
2802|_[ + ] Exploit::
2803|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2804|_[ + ] More details:: / - / , ISP:
2805|_[ + ] Found:: UNIDENTIFIED
2806
2807 _[ - ]::--------------------------------------------------------------------------------------------------------------
2808|_[ + ] [ 66 / 100 ]-[03:20:53] [ - ]
2809|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=4 ]
2810|_[ + ] Exploit::
2811|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2812|_[ + ] More details:: / - / , ISP:
2813|_[ + ] Found:: UNIDENTIFIED
2814
2815 _[ - ]::--------------------------------------------------------------------------------------------------------------
2816|_[ + ] [ 67 / 100 ]-[03:20:56] [ - ]
2817|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=30&idDocumento=12 ]
2818|_[ + ] Exploit::
2819|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2820|_[ + ] More details:: / - / , ISP:
2821|_[ + ] Found:: UNIDENTIFIED
2822
2823 _[ - ]::--------------------------------------------------------------------------------------------------------------
2824|_[ + ] [ 68 / 100 ]-[03:20:58] [ - ]
2825|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=7 ]
2826|_[ + ] Exploit::
2827|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2828|_[ + ] More details:: / - / , ISP:
2829|_[ + ] Found:: UNIDENTIFIED
2830
2831 _[ - ]::--------------------------------------------------------------------------------------------------------------
2832|_[ + ] [ 69 / 100 ]-[03:21:00] [ - ]
2833|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=4&idDocumento=7 ]
2834|_[ + ] Exploit::
2835|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2836|_[ + ] More details:: / - / , ISP:
2837|_[ + ] Found:: UNIDENTIFIED
2838
2839 _[ - ]::--------------------------------------------------------------------------------------------------------------
2840|_[ + ] [ 70 / 100 ]-[03:21:02] [ - ]
2841|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=24 ]
2842|_[ + ] Exploit::
2843|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2844|_[ + ] More details:: / - / , ISP:
2845|_[ + ] Found:: UNIDENTIFIED
2846
2847 _[ - ]::--------------------------------------------------------------------------------------------------------------
2848|_[ + ] [ 71 / 100 ]-[03:21:04] [ - ]
2849|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=18&idDocumento=25 ]
2850|_[ + ] Exploit::
2851|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2852|_[ + ] More details:: / - / , ISP:
2853|_[ + ] Found:: UNIDENTIFIED
2854
2855 _[ - ]::--------------------------------------------------------------------------------------------------------------
2856|_[ + ] [ 72 / 100 ]-[03:21:07] [ - ]
2857|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=22&idDocumento=10 ]
2858|_[ + ] Exploit::
2859|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2860|_[ + ] More details:: / - / , ISP:
2861|_[ + ] Found:: UNIDENTIFIED
2862
2863 _[ - ]::--------------------------------------------------------------------------------------------------------------
2864|_[ + ] [ 73 / 100 ]-[03:21:09] [ - ]
2865|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=19 ]
2866|_[ + ] Exploit::
2867|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2868|_[ + ] More details:: / - / , ISP:
2869|_[ + ] Found:: UNIDENTIFIED
2870
2871 _[ - ]::--------------------------------------------------------------------------------------------------------------
2872|_[ + ] [ 74 / 100 ]-[03:21:11] [ - ]
2873|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo4.pdf ]
2874|_[ + ] Exploit::
2875|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2876|_[ + ] More details:: / - / , ISP:
2877|_[ + ] Found:: UNIDENTIFIED
2878
2879 _[ - ]::--------------------------------------------------------------------------------------------------------------
2880|_[ + ] [ 75 / 100 ]-[03:21:13] [ - ]
2881|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=11&idDocumento=39 ]
2882|_[ + ] Exploit::
2883|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2884|_[ + ] More details:: / - / , ISP:
2885|_[ + ] Found:: UNIDENTIFIED
2886
2887 _[ - ]::--------------------------------------------------------------------------------------------------------------
2888|_[ + ] [ 76 / 100 ]-[03:21:15] [ - ]
2889|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=29&idDocumento=28 ]
2890|_[ + ] Exploit::
2891|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2892|_[ + ] More details:: / - / , ISP:
2893|_[ + ] Found:: UNIDENTIFIED
2894
2895 _[ - ]::--------------------------------------------------------------------------------------------------------------
2896|_[ + ] [ 77 / 100 ]-[03:21:18] [ - ]
2897|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=23 ]
2898|_[ + ] Exploit::
2899|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2900|_[ + ] More details:: / - / , ISP:
2901|_[ + ] Found:: UNIDENTIFIED
2902
2903 _[ - ]::--------------------------------------------------------------------------------------------------------------
2904|_[ + ] [ 78 / 100 ]-[03:21:20] [ - ]
2905|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=1&idDocumento=1 ]
2906|_[ + ] Exploit::
2907|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2908|_[ + ] More details:: / - / , ISP:
2909|_[ + ] Found:: UNIDENTIFIED
2910
2911 _[ - ]::--------------------------------------------------------------------------------------------------------------
2912|_[ + ] [ 79 / 100 ]-[03:21:22] [ - ]
2913|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=18&idDocumento=10 ]
2914|_[ + ] Exploit::
2915|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2916|_[ + ] More details:: / - / , ISP:
2917|_[ + ] Found:: UNIDENTIFIED
2918
2919 _[ - ]::--------------------------------------------------------------------------------------------------------------
2920|_[ + ] [ 80 / 100 ]-[03:21:24] [ - ]
2921|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=5&idDocumento=9 ]
2922|_[ + ] Exploit::
2923|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2924|_[ + ] More details:: / - / , ISP:
2925|_[ + ] Found:: UNIDENTIFIED
2926
2927 _[ - ]::--------------------------------------------------------------------------------------------------------------
2928|_[ + ] [ 81 / 100 ]-[03:21:26] [ - ]
2929|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo2.pdf ]
2930|_[ + ] Exploit::
2931|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2932|_[ + ] More details:: / - / , ISP:
2933|_[ + ] Found:: UNIDENTIFIED
2934
2935 _[ - ]::--------------------------------------------------------------------------------------------------------------
2936|_[ + ] [ 82 / 100 ]-[03:21:28] [ - ]
2937|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=26&idDocumento=4 ]
2938|_[ + ] Exploit::
2939|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2940|_[ + ] More details:: / - / , ISP:
2941|_[ + ] Found:: UNIDENTIFIED
2942
2943 _[ - ]::--------------------------------------------------------------------------------------------------------------
2944|_[ + ] [ 83 / 100 ]-[03:21:31] [ - ]
2945|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=9 ]
2946|_[ + ] Exploit::
2947|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2948|_[ + ] More details:: / - / , ISP:
2949|_[ + ] Found:: UNIDENTIFIED
2950
2951 _[ - ]::--------------------------------------------------------------------------------------------------------------
2952|_[ + ] [ 84 / 100 ]-[03:21:33] [ - ]
2953|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=3 ]
2954|_[ + ] Exploit::
2955|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2956|_[ + ] More details:: / - / , ISP:
2957|_[ + ] Found:: UNIDENTIFIED
2958
2959 _[ - ]::--------------------------------------------------------------------------------------------------------------
2960|_[ + ] [ 85 / 100 ]-[03:21:35] [ - ]
2961|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=5 ]
2962|_[ + ] Exploit::
2963|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2964|_[ + ] More details:: / - / , ISP:
2965|_[ + ] Found:: UNIDENTIFIED
2966
2967 _[ - ]::--------------------------------------------------------------------------------------------------------------
2968|_[ + ] [ 86 / 100 ]-[03:21:37] [ - ]
2969|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=6 ]
2970|_[ + ] Exploit::
2971|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2972|_[ + ] More details:: / - / , ISP:
2973|_[ + ] Found:: UNIDENTIFIED
2974
2975 _[ - ]::--------------------------------------------------------------------------------------------------------------
2976|_[ + ] [ 87 / 100 ]-[03:21:39] [ - ]
2977|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=26&idDocumento=7 ]
2978|_[ + ] Exploit::
2979|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2980|_[ + ] More details:: / - / , ISP:
2981|_[ + ] Found:: UNIDENTIFIED
2982
2983 _[ - ]::--------------------------------------------------------------------------------------------------------------
2984|_[ + ] [ 88 / 100 ]-[03:21:42] [ - ]
2985|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=1 ]
2986|_[ + ] Exploit::
2987|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2988|_[ + ] More details:: / - / , ISP:
2989|_[ + ] Found:: UNIDENTIFIED
2990
2991 _[ - ]::--------------------------------------------------------------------------------------------------------------
2992|_[ + ] [ 89 / 100 ]-[03:21:44] [ - ]
2993|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=11&idDocumento=6 ]
2994|_[ + ] Exploit::
2995|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
2996|_[ + ] More details:: / - / , ISP:
2997|_[ + ] Found:: UNIDENTIFIED
2998
2999 _[ - ]::--------------------------------------------------------------------------------------------------------------
3000|_[ + ] [ 90 / 100 ]-[03:21:46] [ - ]
3001|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=4&idDocumento=43 ]
3002|_[ + ] Exploit::
3003|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3004|_[ + ] More details:: / - / , ISP:
3005|_[ + ] Found:: UNIDENTIFIED
3006
3007 _[ - ]::--------------------------------------------------------------------------------------------------------------
3008|_[ + ] [ 91 / 100 ]-[03:21:48] [ - ]
3009|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=4 ]
3010|_[ + ] Exploit::
3011|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3012|_[ + ] More details:: / - / , ISP:
3013|_[ + ] Found:: UNIDENTIFIED
3014
3015 _[ - ]::--------------------------------------------------------------------------------------------------------------
3016|_[ + ] [ 92 / 100 ]-[03:21:50] [ - ]
3017|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=24&idDocumento=6 ]
3018|_[ + ] Exploit::
3019|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3020|_[ + ] More details:: / - / , ISP:
3021|_[ + ] Found:: UNIDENTIFIED
3022
3023 _[ - ]::--------------------------------------------------------------------------------------------------------------
3024|_[ + ] [ 93 / 100 ]-[03:21:52] [ - ]
3025|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=8 ]
3026|_[ + ] Exploit::
3027|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3028|_[ + ] More details:: / - / , ISP:
3029|_[ + ] Found:: UNIDENTIFIED
3030
3031 _[ - ]::--------------------------------------------------------------------------------------------------------------
3032|_[ + ] [ 94 / 100 ]-[03:21:54] [ - ]
3033|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=22&idDocumento=2 ]
3034|_[ + ] Exploit::
3035|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3036|_[ + ] More details:: / - / , ISP:
3037|_[ + ] Found:: UNIDENTIFIED
3038
3039 _[ - ]::--------------------------------------------------------------------------------------------------------------
3040|_[ + ] [ 95 / 100 ]-[03:21:57] [ - ]
3041|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=13&idDocumento=26 ]
3042|_[ + ] Exploit::
3043|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3044|_[ + ] More details:: / - / , ISP:
3045|_[ + ] Found:: UNIDENTIFIED
3046
3047 _[ - ]::--------------------------------------------------------------------------------------------------------------
3048|_[ + ] [ 96 / 100 ]-[03:21:59] [ - ]
3049|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo1.pdf ]
3050|_[ + ] Exploit::
3051|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3052|_[ + ] More details:: / - / , ISP:
3053|_[ + ] Found:: UNIDENTIFIED
3054
3055 _[ - ]::--------------------------------------------------------------------------------------------------------------
3056|_[ + ] [ 97 / 100 ]-[03:22:01] [ - ]
3057|_[ + ] Target:: [ https://www.notarioexpress.cl/Blog/page/declaracion-de-estado-civil ]
3058|_[ + ] Exploit::
3059|_[ + ] Information Server:: HTTP/2 404 , , IP:40.113.247.175:443
3060|_[ + ] More details:: / - / , ISP:
3061|_[ + ] Found:: UNIDENTIFIED
3062
3063 _[ - ]::--------------------------------------------------------------------------------------------------------------
3064|_[ + ] [ 98 / 100 ]-[03:22:02] [ - ]
3065|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda.aspx?idNotaria=3&idDocumento=11 ]
3066|_[ + ] Exploit::
3067|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
3068|_[ + ] More details:: / - / , ISP:
3069|_[ + ] Found:: UNIDENTIFIED
3070
3071 _[ - ]::--------------------------------------------------------------------------------------------------------------
3072|_[ + ] [ 99 / 100 ]-[03:22:05] [ - ]
3073|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idDocumento=4&idNotaria=11&logoID=11 ]
3074|_[ + ] Exploit::
3075|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3076|_[ + ] More details:: / - / , ISP:
3077|_[ + ] Found:: UNIDENTIFIED
3078
3079[ INFO ] [ Shutting down ]
3080[ INFO ] [ End of process INURLBR at [24-03-2020 03:22:05]
3081[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3082[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.notarioexpress.cl/output/inurlbr-www.notarioexpress.cl ]
3083|_________________________________________________________________________________________
3084
3085\_________________________________________________________________________________________/
3086###############################################################################################################################
3087HTTP/2 200
3088cache-control: private
3089content-length: 252987
3090content-type: text/html; charset=utf-8
3091server: Microsoft-IIS/10.0
3092set-cookie: ASP.NET_SessionId=gr1ztjfrvz4sl455wstemm3k; path=/; HttpOnly; SameSite=Lax
3093set-cookie: ASP.NET_SessionId=gr1ztjfrvz4sl455wstemm3k; path=/; HttpOnly; SameSite=Lax
3094set-cookie: __AntiXsrfToken=be339eba34fa4b2e9e719105cc7627f6; path=/; HttpOnly
3095x-aspnet-version: 4.0.30319
3096x-powered-by: ASP.NET
3097date: Tue, 24 Mar 2020 07:22:04 GMT
3098################################################################################################################################
3099/api/Documento
3100application/ld+json
3101/bundles/modernizr?v=wBEWDufH_8Md-Pbioxomt90vm6tJN2Pyy9u9zHtWsPo1
3102/bundles/MsAjaxJs?v=c42ygB2U07n37m_Sfa8ZbLGVu4Rr2gsBo7MvUEnJeZ81
3103/bundles/WebFormsJs?v=AAyiAYwMfvmwjNSBfIMrBAqfU5exDukMVhrRuZ-PDU01
3104/Content/css?v=1b0HU_Q8TJTRUybVra3ovYmLEPSZohx8XRo7_1--bK01
3105 /></head>
3106http://notarioexpress.cl/images/logos/b-w/angelita-hormazabal.png
3107http://notarioexpress.cl/images/logos/b-w/ferrand.png
3108http://notarioexpress.cl/images/logos/b-w/luis-eduardo-rodriguez.png
3109http://notarioexpress.cl/images/logos/b-w/melipilla.png
3110http://notarioexpress.cl/images/logos/b-w/notaria-alvaro-estrada.png
3111http://notarioexpress.cl/images/logos/b-w/notaria-antonieta.png
3112http://notarioexpress.cl/images/logos/b-w/notaria-bosch.png
3113http://notarioexpress.cl/images/logos/b-w/notaria-cerda.png
3114http://notarioexpress.cl/images/logos/b-w/notaria-cortes.png
3115http://notarioexpress.cl/images/logos/b-w/notaria-del-real.png
3116http://notarioexpress.cl/images/logos/b-w/notaria-diez.png
3117http://notarioexpress.cl/images/logos/b-w/notaria-dora-silva.png
3118http://notarioexpress.cl/images/logos/b-w/notaria-gabu.png
3119http://notarioexpress.cl/images/logos/b-w/notaria-gonzalo.png
3120http://notarioexpress.cl/images/logos/b-w/notaria-guerrero.png
3121http://notarioexpress.cl/images/logos/b-w/notaria-jurge-ossa.png
3122http://notarioexpress.cl/images/logos/b-w/notaria-krimar.png
3123http://notarioexpress.cl/images/logos/b-w/notaria-lascar.png
3124http://notarioexpress.cl/images/logos/b-w/notaria-manquehual.png
3125http://notarioexpress.cl/images/logos/b-w/notaria-maria-isabel.png
3126http://notarioexpress.cl/images/logos/b-w/notaria-renata-gonzales.png
3127http://notarioexpress.cl/images/logos/b-w/notaria-santibanes.png
3128http://notarioexpress.cl/images/logos/b-w/notaria-vila.png
3129http://notarioexpress.cl/images/logos/b-w/notaria-villarica.png
3130http://notarioexpress.cl/images/logos/b-w/quintanilla-leon.png
3131http://notarioexpress.cl/images/logos/b-w/rancagua.png
3132http://notarioexpress.cl/images/logos/b-w/retamal.png
3133http://notarioexpress.cl/images/logos/b-w/ruben-reinoso-herrera.png
3134https://ajax.googleapis.com/ajax/libs/angularjs/1.6.4/angular.min.js
3135https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
3136https://registrocivilwp.srcei.cl/tramites/certificado-de-nacimiento/
3137https://www.conservador.cl/portal/certificado_vigencia_poder
3138https://www.dt.gob.cl/legislacion/1624/w3-propertyvalue-145960.html
3139https://www.dt.gob.cl/portal/1626/articles-104572_recurso_2.doc
3140https://www.dt.gob.cl/portal/1626/articles-104572_recurso_3.doc
3141https://www.facebook.com/NotarioExpress
3142https://www.facebook.com/tr?id=233815880566460&ev=PageView&noscript=1
3143https://www.googletagmanager.com/gtag/js?id=UA-118894061-1
3144https://www.googletagmanager.com/ns.html?id=GTM-5G7HGGD
3145https://www.googletagmanager.com/ns.html?id=GTM-W6ZJTBB
3146https://www.linkedin.com/in/notarioexpress/
3147https://www.notarioexpress.cl
3148https://www.notarioexpress.cl/SolicitudNuevoDocumento
3149https://www.twitter.com/notarioexpress/
3150https://www.youtube.com/embed/jpnl4yP-pzk?rel=1&showinfo=1
3151http://www.tuempresaenundia.cl
3152../images/banners/prensa.jpg
3153../images/comillas.png
3154images/docs_icons/declaración-de-estado-civil.png
3155images/docs_icons/icono-juzgado.png
3156images/docs_icons/icono-licencia.png
3157images/docs_icons/juridico.png
3158images/docs_icons/madre-autorizada-tercero.png
3159images/docs_icons/madre.png
3160images/docs_icons/natural.png
3161images/docs_icons/padre-autorizada-tercero.png
3162images/docs_icons/padre.png
3163../images/flecha-derecha.png
3164../images/flecha-izquierda.png
3165/images/footer/facebook-icon.png
3166/images/footer/icon-email.png
3167/images/footer/icon-web.png
3168/images/footer/linkedin-icon.png
3169/images/footer/twitter-icon.png
3170../images/icono-chat.png
3171../images/icono-femenino.png
3172../images/icono-masculino.png
3173/images/icons/flecha-scroll.png
3174../images/icons/icon-1.png
3175../images/icons/icon-2.png
3176../images/icons/icon-3.png
3177/images/logos/b-w/andres-vega.png
3178/images/logos/b-w/aravena-estobar.png
3179/images/logos/b-w/GOMILA.png
3180/images/logos/b-w/guitierrez-lopez.png
3181/images/logos/b-w/juan-espinosa.png
3182/images/logos/b-w/luis-contreras-fuentes.png
3183/images/logos/b-w/luis-poza-maldonado.png
3184/images/logos/b-w/nicolas-arrieta-concha.png
3185/images/logos/b-w/notaria-rodriguez.png
3186/images/logos/b-w/quintero.png
3187/images/logos/b-w/sotomayor.png
3188../images/logos-radios.png
3189js/custom.js
3190js/imagesloaded.min.js
3191js/isotope.js
3192js/jquery.js
3193js/magicsuggest.js
3194js/nivo-lightbox.min.js
3195js/Notaria.js
3196js/smoothscroll.js
3197js/wow.min.js
3198 /><meta name=
3199//platform-api.sharethis.com/js/sharethis.js#property=5bd9171c8a1fb80011151bfb&product=inline-share-buttons
3200Scripts/bootstrap.min.js
3201Scripts/respond.min.js
3202text/javascript
3203################################################################################################################################
3204https://www.notarioexpress.cl [200 OK] ASP_NET[4.0.30319], Bootstrap[3.3.5], Cookies[ASP.NET_SessionId,__AntiXsrfToken], Country[UNITED STATES][US], Email[contacto@notarioexpress.cl], Frame, HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId,__AntiXsrfToken], IP[40.113.247.175], JQuery, Lightbox, Microsoft-IIS[10.0], Script[application/ld+json,text/javascript], Title[Notario Express - Menos de 10 minutos de espera promedio en la Notaria][Title element contains newline(s)!], X-Powered-By[ASP.NET], YouTube
3205################################################################################################################################
3206
3207wig - WebApp Information Gatherer
3208
3209
3210Scanning https://www.notarioexpress.cl...
3211___________________________ SITE INFO ____________________________
3212IP Title
321340.113.247.175 Notario Express - Menos de 10 minutos de
3214
3215____________________________ VERSION _____________________________
3216Name Versions Type
3217ASP.NET 4.7.3535.0 Platform
3218IIS 10.0 Platform
3219
3220__________________________ INTERESTING ___________________________
3221URL Note Type
3222/_layouts/create.aspx ASP.NET detailed error Interesting
3223
3224_____________________ PLATFORM OBSERVATIONS ______________________
3225Platform URL Type
3226ASP.NET 4.0.30319 / Observation
3227ASP.NET 4.7.3535.0 /_layouts/create.aspx Observation
3228
3229__________________________________________________________________
3230Time: 1.9 sec Urls: 660 Fingerprints: 40401
3231###############################################################################################################################
3232Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:23 EDT
3233NSE: Loaded 161 scripts for scanning.
3234NSE: Script Pre-scanning.
3235Initiating NSE at 03:23
3236Completed NSE at 03:23, 0.00s elapsed
3237Initiating NSE at 03:23
3238Completed NSE at 03:23, 0.00s elapsed
3239Initiating Parallel DNS resolution of 1 host. at 03:23
3240Completed Parallel DNS resolution of 1 host. at 03:23, 0.02s elapsed
3241Initiating SYN Stealth Scan at 03:23
3242Scanning www.notarioexpress.cl (40.113.247.175) [1 port]
3243Discovered open port 443/tcp on 40.113.247.175
3244Completed SYN Stealth Scan at 03:23, 0.31s elapsed (1 total ports)
3245Initiating Service scan at 03:23
3246Scanning 1 service on www.notarioexpress.cl (40.113.247.175)
3247Completed Service scan at 03:23, 14.23s elapsed (1 service on 1 host)
3248Initiating OS detection (try #1) against www.notarioexpress.cl (40.113.247.175)
3249Retrying OS detection (try #2) against www.notarioexpress.cl (40.113.247.175)
3250Initiating Traceroute at 03:23
3251Completed Traceroute at 03:23, 3.72s elapsed
3252Initiating Parallel DNS resolution of 21 hosts. at 03:23
3253Completed Parallel DNS resolution of 21 hosts. at 03:23, 2.52s elapsed
3254NSE: Script scanning 40.113.247.175.
3255Initiating NSE at 03:23
3256Completed NSE at 03:25, 90.65s elapsed
3257Initiating NSE at 03:25
3258Completed NSE at 03:25, 2.23s elapsed
3259Nmap scan report for www.notarioexpress.cl (40.113.247.175)
3260Host is up (0.28s latency).
3261
3262PORT STATE SERVICE VERSION
3263443/tcp open ssl/http Microsoft IIS httpd 10.0
3264|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
3265| http-brute:
3266|_ Path "/" does not require authentication
3267|_http-chrono: Request times for /; avg: 3237.90ms; min: 2230.31ms; max: 4258.78ms
3268| http-csrf:
3269| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.notarioexpress.cl
3270| Found the following possible CSRF vulnerabilities:
3271|
3272| Path: https://www.notarioexpress.cl:443/
3273| Form id: ctl01
3274| Form action: ./
3275|
3276| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=89
3277| Form id: ctl01
3278| Form action: ./SeleccionNotaria?idDocumento=89
3279|
3280| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=8
3281| Form id: ctl01
3282| Form action: ./SeleccionNotaria?idDocumento=8
3283|
3284| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=43
3285| Form id: ctl01
3286| Form action: ./SeleccionNotaria?idDocumento=43
3287|
3288| Path: https://www.notarioexpress.cl:443/notarioadomicilio
3289| Form id: ctl01
3290| Form action: ./notarioadomicilio
3291|
3292| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=300
3293| Form id: ctl01
3294| Form action: ./SeleccionNotaria?idDocumento=300
3295|
3296| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=66
3297| Form id: ctl01
3298| Form action: ./SeleccionNotaria?idDocumento=66
3299|
3300| Path: https://www.notarioexpress.cl:443/prensa.aspx
3301| Form id: ctl01
3302| Form action: ./prensa
3303|
3304| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=301
3305| Form id: ctl01
3306| Form action: ./SeleccionNotaria?idDocumento=301
3307|
3308| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=28
3309| Form id: ctl01
3310| Form action: ./SeleccionNotaria?idDocumento=28
3311|
3312| Path: https://www.notarioexpress.cl:443/SeleccionNotaria.aspx?idDocumento=62
3313| Form id: ctl01
3314|_ Form action: ./SeleccionNotaria?idDocumento=62
3315|_http-date: Tue, 24 Mar 2020 07:23:59 GMT; -10s from local time.
3316|_http-devframework: ASP.NET detected. Found related header.
3317|_http-dombased-xss: Couldn't find any DOM based XSS.
3318|_http-feed: Couldn't find any feeds.
3319|_http-fetch: Please enter the complete path of the directory to save data in.
3320| http-grep:
3321| (1) https://www.notarioexpress.cl:443/:
3322| (1) email:
3323| + contacto@notarioexpress.cl
3324| (4) https://www.notarioexpress.cl:443/css/nivo_themes/default/default.css:
3325| (4) email:
3326| + loading@2x.gif
3327| + prev@2x.png
3328| + next@2x.png
3329|_ + close@2x.png
3330| http-headers:
3331| Cache-Control: private
3332| Content-Length: 253802
3333| Content-Type: text/html; charset=utf-8
3334| Server: Microsoft-IIS/10.0
3335| Set-Cookie: ASP.NET_SessionId=rfazgz43m5b0wcyptwr5pli4; path=/; HttpOnly; SameSite=Lax
3336| Set-Cookie: ASP.NET_SessionId=rfazgz43m5b0wcyptwr5pli4; path=/; HttpOnly; SameSite=Lax
3337| Set-Cookie: __AntiXsrfToken=74746650a4314ae88c58d8b85f7e82d4; path=/; HttpOnly
3338| X-AspNet-Version: 4.0.30319
3339| X-Powered-By: ASP.NET
3340| Date: Tue, 24 Mar 2020 07:23:52 GMT
3341| Connection: close
3342|
3343|_ (Request type: HEAD)
3344| http-methods:
3345| Supported Methods: GET HEAD OPTIONS TRACE POST
3346|_ Potentially risky methods: TRACE
3347|_http-mobileversion-checker: No mobile version detected.
3348| http-php-version: Logo query returned unknown hash 8459273557674732ff61f6662459cc65
3349|_Credits query returned unknown hash cef232cf24a77020b3f65219720368a7
3350| http-security-headers:
3351| Strict_Transport_Security:
3352| HSTS not configured in HTTPS Server
3353| Cache_Control:
3354|_ Header: Cache-Control: private
3355|_http-server-header: Microsoft-IIS/10.0
3356| http-sitemap-generator:
3357| Directory structure:
3358| /
3359| Other: 10; pdf: 1
3360| /css/
3361| css: 1
3362| /images/
3363| png: 2
3364| /images/banners/
3365| jpg: 1
3366| /images/docs_icons/
3367| png: 1
3368| /images/logos/b-w/
3369| png: 2
3370| /js/
3371| js: 2
3372| Longest directory structure:
3373| Depth: 3
3374| Dir: /images/logos/b-w/
3375| Total files found (by extension):
3376|_ Other: 10; css: 1; jpg: 1; js: 2; pdf: 1; png: 5
3377|_http-title: Notario Express - Menos de 10 minutos de espera promedio en la...
3378|_http-traceroute: ERROR: Script execution failed (use -d to debug)
3379|_http-unsafe-output-escaping: ERROR: Script execution failed (use -d to debug)
3380| http-vhosts:
3381| mail.notarioexpress.cl
3382| images.notarioexpress.cl
3383| www.notarioexpress.cl : 200
3384| admin.notarioexpress.cl : 200
3385|_123 names had status 404
3386|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
3387| http-waf-detect: IDS/IPS/WAF detected:
3388|_www.notarioexpress.cl:443/?p4yl04d3=<script>alert(document.cookie)</script>
3389|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
3390|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3391|_http-xssed: No previously reported XSS vuln.
3392Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3393OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
3394No OS matches for host
3395Uptime guess: 0.001 days (since Tue Mar 24 03:23:30 2020)
3396TCP Sequence Prediction: Difficulty=258 (Good luck!)
3397IP ID Sequence Generation: Randomized
3398Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3399
3400TRACEROUTE (using port 443/tcp)
3401HOP RTT ADDRESS
34021 138.11 ms 10.203.14.1
34032 ...
34043 138.82 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
34054 138.78 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
34065 144.27 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
34076 144.65 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
34087 144.24 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
34098 144.33 ms ae9-0.sto-96cbe-1b.ntwk.msn.net (104.44.224.139)
34109 164.12 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
341110 272.79 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
341211 278.72 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
341312 283.23 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
341413 276.81 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
341514 275.05 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
341615 275.57 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
341716 278.41 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
341817 277.35 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
341918 278.94 ms be-1-0.ibr01.cle30.ntwk.msn.net (104.44.7.91)
342019 273.12 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
342120 276.08 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
342221 268.82 ms ae161-0.icr03.dsm05.ntwk.msn.net (104.44.22.190)
342322 272.40 ms ae143-0.icr04.dsm05.ntwk.msn.net (104.44.22.184)
342423 ... 30
3425
3426NSE: Script Post-scanning.
3427Initiating NSE at 03:25
3428Completed NSE at 03:25, 0.00s elapsed
3429Initiating NSE at 03:25
3430Completed NSE at 03:25, 0.00s elapsed
3431################################################################################################################################
3432Version: 2.0.0-static
3433OpenSSL 1.1.1f-dev xx XXX xxxx
3434
3435Connected to 40.113.247.175
3436
3437Testing SSL server www.notarioexpress.cl on port 443 using SNI name www.notarioexpress.cl
3438
3439 SSL/TLS Protocols:
3440SSLv2 disabled
3441SSLv3 disabled
3442TLSv1.0 disabled
3443TLSv1.1 disabled
3444TLSv1.2 enabled
3445TLSv1.3 disabled
3446
3447 TLS Fallback SCSV:
3448Server supports TLS Fallback SCSV
3449
3450 TLS renegotiation:
3451Session renegotiation not supported
3452
3453 TLS Compression:
3454Compression disabled
3455
3456 Heartbleed:
3457TLSv1.2 not vulnerable to heartbleed
3458
3459 Supported Server Cipher(s):
3460Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3461Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3462Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
3463Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3464Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3465Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3466Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3467Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3468Accepted TLSv1.2 256 bits AES256-SHA256
3469Accepted TLSv1.2 128 bits AES128-SHA256
3470Accepted TLSv1.2 256 bits AES256-SHA
3471Accepted TLSv1.2 128 bits AES128-SHA
3472
3473 Server Signature Algorithm(s):
3474TLSv1.2 rsa_pkcs1_sha1
3475TLSv1.2 rsa_pkcs1_sha256
3476TLSv1.2 rsa_pkcs1_sha384
3477TLSv1.2 rsa_pkcs1_sha512
3478
3479 SSL Certificate:
3480Signature Algorithm: sha256WithRSAEncryption
3481RSA Key Strength: 2048
3482
3483Subject: notarioexpress.cl
3484Altnames: DNS:notarioexpress.cl, DNS:www.notarioexpress.cl
3485Issuer: Go Daddy Secure Certificate Authority - G2
3486
3487Not valid before: Nov 10 23:54:59 2019 GMT
3488Not valid after: Nov 10 23:54:59 2020 GMT
3489################################################################################################################################
3490------------------------------------------------------------------------------------------------------------------------
3491
3492[ ! ] Starting SCANNER INURLBR 2.1 at [24-03-2020 03:33:12]
3493[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3494It is the end user's responsibility to obey all applicable local, state and federal laws.
3495Developers assume no liability and are not responsible for any misuse or damage caused by this program
3496
3497[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.notarioexpress.cl/output/inurlbr-www.notarioexpress.cl ]
3498[ INFO ][ DORK ]::[ site:www.notarioexpress.cl ]
3499[ INFO ][ SEARCHING ]:: {
3500[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.au ]
3501
3502[ INFO ][ SEARCHING ]::
3503-[:::]
3504[ INFO ][ ENGINE ]::[ GOOGLE API ]
3505
3506[ INFO ][ SEARCHING ]::
3507-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3508[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.iq ID: 002901626849897788481:cpnctza84gq ]
3509
3510[ INFO ][ SEARCHING ]::
3511-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3512
3513[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
3514
3515
3516 _[ - ]::--------------------------------------------------------------------------------------------------------------
3517|_[ + ] [ 0 / 100 ]-[03:33:35] [ - ]
3518|_[ + ] Target:: [ https://www.notarioexpress.cl/ ]
3519|_[ + ] Exploit::
3520|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3521|_[ + ] More details:: / - / , ISP:
3522|_[ + ] Found:: UNIDENTIFIED
3523
3524 _[ - ]::--------------------------------------------------------------------------------------------------------------
3525|_[ + ] [ 1 / 100 ]-[03:33:37] [ - ]
3526|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionestadocivil ]
3527|_[ + ] Exploit::
3528|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3529|_[ + ] More details:: / - / , ISP:
3530|_[ + ] Found:: UNIDENTIFIED
3531
3532 _[ - ]::--------------------------------------------------------------------------------------------------------------
3533|_[ + ] [ 2 / 100 ]-[03:33:40] [ - ]
3534|_[ + ] Target:: [ https://www.notarioexpress.cl/notariasdechile ]
3535|_[ + ] Exploit::
3536|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3537|_[ + ] More details:: / - / , ISP:
3538|_[ + ] Found:: UNIDENTIFIED
3539
3540 _[ - ]::--------------------------------------------------------------------------------------------------------------
3541|_[ + ] [ 3 / 100 ]-[03:33:42] [ - ]
3542|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizacionsalidavehiculo ]
3543|_[ + ] Exploit::
3544|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3545|_[ + ] More details:: / - / , ISP:
3546|_[ + ] Found:: UNIDENTIFIED
3547
3548 _[ - ]::--------------------------------------------------------------------------------------------------------------
3549|_[ + ] [ 4 / 100 ]-[03:33:44] [ - ]
3550|_[ + ] Target:: [ https://www.notarioexpress.cl/contratodearriendovehiculo ]
3551|_[ + ] Exploit::
3552|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3553|_[ + ] More details:: / - / , ISP:
3554|_[ + ] Found:: UNIDENTIFIED
3555
3556 _[ - ]::--------------------------------------------------------------------------------------------------------------
3557|_[ + ] [ 5 / 100 ]-[03:33:46] [ - ]
3558|_[ + ] Target:: [ https://www.notarioexpress.cl/PreguntasFrecuentes ]
3559|_[ + ] Exploit::
3560|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3561|_[ + ] More details:: / - / , ISP:
3562|_[ + ] Found:: UNIDENTIFIED
3563
3564 _[ - ]::--------------------------------------------------------------------------------------------------------------
3565|_[ + ] [ 6 / 100 ]-[03:33:48] [ - ]
3566|_[ + ] Target:: [ https://www.notarioexpress.cl/certificadoderesidencia ]
3567|_[ + ] Exploit::
3568|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3569|_[ + ] More details:: / - / , ISP:
3570|_[ + ] Found:: UNIDENTIFIED
3571
3572 _[ - ]::--------------------------------------------------------------------------------------------------------------
3573|_[ + ] [ 7 / 100 ]-[03:33:50] [ - ]
3574|_[ + ] Target:: [ https://www.notarioexpress.cl/poderbancario ]
3575|_[ + ] Exploit::
3576|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3577|_[ + ] More details:: / - / , ISP:
3578|_[ + ] Found:: UNIDENTIFIED
3579
3580 _[ - ]::--------------------------------------------------------------------------------------------------------------
3581|_[ + ] [ 8 / 100 ]-[03:33:52] [ - ]
3582|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadecesantia ]
3583|_[ + ] Exploit::
3584|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3585|_[ + ] More details:: / - / , ISP:
3586|_[ + ] Found:: UNIDENTIFIED
3587
3588 _[ - ]::--------------------------------------------------------------------------------------------------------------
3589|_[ + ] [ 9 / 100 ]-[03:33:55] [ - ]
3590|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadealcoholes ]
3591|_[ + ] Exploit::
3592|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3593|_[ + ] More details:: / - / , ISP:
3594|_[ + ] Found:: UNIDENTIFIED
3595
3596 _[ - ]::--------------------------------------------------------------------------------------------------------------
3597|_[ + ] [ 10 / 100 ]-[03:33:57] [ - ]
3598|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeingresos ]
3599|_[ + ] Exploit::
3600|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3601|_[ + ] More details:: / - / , ISP:
3602|_[ + ] Found:: UNIDENTIFIED
3603
3604 _[ - ]::--------------------------------------------------------------------------------------------------------------
3605|_[ + ] [ 11 / 100 ]-[03:34:00] [ - ]
3606|_[ + ] Target:: [ https://www.notarioexpress.cl/ContratosDeTrabajo ]
3607|_[ + ] Exploit::
3608|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3609|_[ + ] More details:: / - / , ISP:
3610|_[ + ] Found:: UNIDENTIFIED
3611
3612 _[ - ]::--------------------------------------------------------------------------------------------------------------
3613|_[ + ] [ 12 / 100 ]-[03:34:02] [ - ]
3614|_[ + ] Target:: [ https://www.notarioexpress.cl/poderespecialsii ]
3615|_[ + ] Exploit::
3616|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3617|_[ + ] More details:: / - / , ISP:
3618|_[ + ] Found:: UNIDENTIFIED
3619
3620 _[ - ]::--------------------------------------------------------------------------------------------------------------
3621|_[ + ] [ 13 / 100 ]-[03:34:04] [ - ]
3622|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjurada ]
3623|_[ + ] Exploit::
3624|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3625|_[ + ] More details:: / - / , ISP:
3626|_[ + ] Found:: UNIDENTIFIED
3627
3628 _[ - ]::--------------------------------------------------------------------------------------------------------------
3629|_[ + ] [ 14 / 100 ]-[03:34:06] [ - ]
3630|_[ + ] Target:: [ https://www.notarioexpress.cl/cartadeinvitacionextranjero ]
3631|_[ + ] Exploit::
3632|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3633|_[ + ] More details:: / - / , ISP:
3634|_[ + ] Found:: UNIDENTIFIED
3635
3636 _[ - ]::--------------------------------------------------------------------------------------------------------------
3637|_[ + ] [ 15 / 100 ]-[03:34:08] [ - ]
3638|_[ + ] Target:: [ https://www.notarioexpress.cl/MandatoJudicial ]
3639|_[ + ] Exploit::
3640|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3641|_[ + ] More details:: / - / , ISP:
3642|_[ + ] Found:: UNIDENTIFIED
3643
3644 _[ - ]::--------------------------------------------------------------------------------------------------------------
3645|_[ + ] [ 16 / 100 ]-[03:34:10] [ - ]
3646|_[ + ] Target:: [ https://www.notarioexpress.cl/documentosnotariales ]
3647|_[ + ] Exploit::
3648|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3649|_[ + ] More details:: / - / , ISP:
3650|_[ + ] Found:: UNIDENTIFIED
3651
3652 _[ - ]::--------------------------------------------------------------------------------------------------------------
3653|_[ + ] [ 17 / 100 ]-[03:34:12] [ - ]
3654|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciontrabajomenordeedad ]
3655|_[ + ] Exploit::
3656|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3657|_[ + ] More details:: / - / , ISP:
3658|_[ + ] Found:: UNIDENTIFIED
3659
3660 _[ - ]::--------------------------------------------------------------------------------------------------------------
3661|_[ + ] [ 18 / 100 ]-[03:34:14] [ - ]
3662|_[ + ] Target:: [ https://www.notarioexpress.cl/AdministracionInmueble ]
3663|_[ + ] Exploit::
3664|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3665|_[ + ] More details:: / - / , ISP:
3666|_[ + ] Found:: UNIDENTIFIED
3667
3668 _[ - ]::--------------------------------------------------------------------------------------------------------------
3669|_[ + ] [ 19 / 100 ]-[03:34:16] [ - ]
3670|_[ + ] Target:: [ https://www.notarioexpress.cl/TrabajadorPuertasAbiertas ]
3671|_[ + ] Exploit::
3672|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3673|_[ + ] More details:: / - / , ISP:
3674|_[ + ] Found:: UNIDENTIFIED
3675
3676 _[ - ]::--------------------------------------------------------------------------------------------------------------
3677|_[ + ] [ 20 / 100 ]-[03:34:18] [ - ]
3678|_[ + ] Target:: [ https://www.notarioexpress.cl/SobreNosotros ]
3679|_[ + ] Exploit::
3680|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3681|_[ + ] More details:: / - / , ISP:
3682|_[ + ] Found:: UNIDENTIFIED
3683
3684 _[ - ]::--------------------------------------------------------------------------------------------------------------
3685|_[ + ] [ 21 / 100 ]-[03:34:20] [ - ]
3686|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondomiciliocomercial ]
3687|_[ + ] Exploit::
3688|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3689|_[ + ] More details:: / - / , ISP:
3690|_[ + ] Found:: UNIDENTIFIED
3691
3692 _[ - ]::--------------------------------------------------------------------------------------------------------------
3693|_[ + ] [ 22 / 100 ]-[03:34:22] [ - ]
3694|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondeviajeparamenores ]
3695|_[ + ] Exploit::
3696|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3697|_[ + ] More details:: / - / , ISP:
3698|_[ + ] Found:: UNIDENTIFIED
3699
3700 _[ - ]::--------------------------------------------------------------------------------------------------------------
3701|_[ + ] [ 23 / 100 ]-[03:34:24] [ - ]
3702|_[ + ] Target:: [ https://www.notarioexpress.cl/TrabajadorPuertasAdentro ]
3703|_[ + ] Exploit::
3704|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3705|_[ + ] More details:: / - / , ISP:
3706|_[ + ] Found:: UNIDENTIFIED
3707
3708 _[ - ]::--------------------------------------------------------------------------------------------------------------
3709|_[ + ] [ 24 / 100 ]-[03:34:27] [ - ]
3710|_[ + ] Target:: [ https://www.notarioexpress.cl/certificadodeantiguedadlaboral ]
3711|_[ + ] Exploit::
3712|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3713|_[ + ] More details:: / - / , ISP:
3714|_[ + ] Found:: UNIDENTIFIED
3715
3716 _[ - ]::--------------------------------------------------------------------------------------------------------------
3717|_[ + ] [ 25 / 100 ]-[03:34:29] [ - ]
3718|_[ + ] Target:: [ https://www.notarioexpress.cl/finiquito ]
3719|_[ + ] Exploit::
3720|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3721|_[ + ] More details:: / - / , ISP:
3722|_[ + ] Found:: UNIDENTIFIED
3723
3724 _[ - ]::--------------------------------------------------------------------------------------------------------------
3725|_[ + ] [ 26 / 100 ]-[03:34:31] [ - ]
3726|_[ + ] Target:: [ https://www.notarioexpress.cl/mIndex ]
3727|_[ + ] Exploit::
3728|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3729|_[ + ] More details:: / - / , ISP:
3730|_[ + ] Found:: UNIDENTIFIED
3731
3732 _[ - ]::--------------------------------------------------------------------------------------------------------------
3733|_[ + ] [ 27 / 100 ]-[03:34:34] [ - ]
3734|_[ + ] Target:: [ https://www.notarioexpress.cl/contratodearriendo ]
3735|_[ + ] Exploit::
3736|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3737|_[ + ] More details:: / - / , ISP:
3738|_[ + ] Found:: UNIDENTIFIED
3739
3740 _[ - ]::--------------------------------------------------------------------------------------------------------------
3741|_[ + ] [ 28 / 100 ]-[03:34:36] [ - ]
3742|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderCobroFiniquito ]
3743|_[ + ] Exploit::
3744|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3745|_[ + ] More details:: / - / , ISP:
3746|_[ + ] Found:: UNIDENTIFIED
3747
3748 _[ - ]::--------------------------------------------------------------------------------------------------------------
3749|_[ + ] [ 29 / 100 ]-[03:34:38] [ - ]
3750|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeextraviodelicenciadeconducir ]
3751|_[ + ] Exploit::
3752|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3753|_[ + ] More details:: / - / , ISP:
3754|_[ + ] Found:: UNIDENTIFIED
3755
3756 _[ - ]::--------------------------------------------------------------------------------------------------------------
3757|_[ + ] [ 30 / 100 ]-[03:34:40] [ - ]
3758|_[ + ] Target:: [ https://www.notarioexpress.cl/notariasdeturnoenchile ]
3759|_[ + ] Exploit::
3760|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3761|_[ + ] More details:: / - / , ISP:
3762|_[ + ] Found:: UNIDENTIFIED
3763
3764 _[ - ]::--------------------------------------------------------------------------------------------------------------
3765|_[ + ] [ 31 / 100 ]-[03:34:42] [ - ]
3766|_[ + ] Target:: [ https://www.notarioexpress.cl/renunciavoluntaria ]
3767|_[ + ] Exploit::
3768|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3769|_[ + ] More details:: / - / , ISP:
3770|_[ + ] Found:: UNIDENTIFIED
3771
3772 _[ - ]::--------------------------------------------------------------------------------------------------------------
3773|_[ + ] [ 32 / 100 ]-[03:34:44] [ - ]
3774|_[ + ] Target:: [ https://www.notarioexpress.cl/salvoconducto ]
3775|_[ + ] Exploit::
3776|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3777|_[ + ] More details:: / - / , ISP:
3778|_[ + ] Found:: UNIDENTIFIED
3779
3780 _[ - ]::--------------------------------------------------------------------------------------------------------------
3781|_[ + ] [ 33 / 100 ]-[03:34:46] [ - ]
3782|_[ + ] Target:: [ https://www.notarioexpress.cl/prensa ]
3783|_[ + ] Exploit::
3784|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3785|_[ + ] More details:: / - / , ISP:
3786|_[ + ] Found:: UNIDENTIFIED
3787
3788 _[ - ]::--------------------------------------------------------------------------------------------------------------
3789|_[ + ] [ 34 / 100 ]-[03:34:48] [ - ]
3790|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderRetiroVehiculo ]
3791|_[ + ] Exploit::
3792|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3793|_[ + ] More details:: / - / , ISP:
3794|_[ + ] Found:: UNIDENTIFIED
3795
3796 _[ - ]::--------------------------------------------------------------------------------------------------------------
3797|_[ + ] [ 35 / 100 ]-[03:34:51] [ - ]
3798|_[ + ] Target:: [ https://www.notarioexpress.cl/poderventavehiculo ]
3799|_[ + ] Exploit::
3800|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3801|_[ + ] More details:: / - / , ISP:
3802|_[ + ] Found:: UNIDENTIFIED
3803
3804 _[ - ]::--------------------------------------------------------------------------------------------------------------
3805|_[ + ] [ 36 / 100 ]-[03:34:53] [ - ]
3806|_[ + ] Target:: [ https://www.notarioexpress.cl/notarioadomicilio ]
3807|_[ + ] Exploit::
3808|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3809|_[ + ] More details:: / - / , ISP:
3810|_[ + ] Found:: UNIDENTIFIED
3811
3812 _[ - ]::--------------------------------------------------------------------------------------------------------------
3813|_[ + ] [ 37 / 100 ]-[03:34:55] [ - ]
3814|_[ + ] Target:: [ https://www.notarioexpress.cl/tramitesnotarialesenchile ]
3815|_[ + ] Exploit::
3816|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3817|_[ + ] More details:: / - / , ISP:
3818|_[ + ] Found:: UNIDENTIFIED
3819
3820 _[ - ]::--------------------------------------------------------------------------------------------------------------
3821|_[ + ] [ 38 / 100 ]-[03:34:57] [ - ]
3822|_[ + ] Target:: [ https://www.notarioexpress.cl/comofunciona ]
3823|_[ + ] Exploit::
3824|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3825|_[ + ] More details:: / - / , ISP:
3826|_[ + ] Found:: UNIDENTIFIED
3827
3828 _[ - ]::--------------------------------------------------------------------------------------------------------------
3829|_[ + ] [ 39 / 100 ]-[03:34:59] [ - ]
3830|_[ + ] Target:: [ https://www.notarioexpress.cl/SolicitudDevolucion ]
3831|_[ + ] Exploit::
3832|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3833|_[ + ] More details:: / - / , ISP:
3834|_[ + ] Found:: UNIDENTIFIED
3835
3836 _[ - ]::--------------------------------------------------------------------------------------------------------------
3837|_[ + ] [ 40 / 100 ]-[03:35:00] [ - ]
3838|_[ + ] Target:: [ https://www.notarioexpress.cl/fotocopialegalizada ]
3839|_[ + ] Exploit::
3840|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3841|_[ + ] More details:: / - / , ISP:
3842|_[ + ] Found:: UNIDENTIFIED
3843
3844 _[ - ]::--------------------------------------------------------------------------------------------------------------
3845|_[ + ] [ 41 / 100 ]-[03:35:02] [ - ]
3846|_[ + ] Target:: [ https://www.notarioexpress.cl/Contacto ]
3847|_[ + ] Exploit::
3848|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3849|_[ + ] More details:: / - / , ISP:
3850|_[ + ] Found:: UNIDENTIFIED
3851
3852 _[ - ]::--------------------------------------------------------------------------------------------------------------
3853|_[ + ] [ 42 / 100 ]-[03:35:04] [ - ]
3854|_[ + ] Target:: [ https://www.notarioexpress.cl/SolicitudNuevoDocumento ]
3855|_[ + ] Exploit::
3856|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3857|_[ + ] More details:: / - / , ISP:
3858|_[ + ] Found:: UNIDENTIFIED
3859
3860 _[ - ]::--------------------------------------------------------------------------------------------------------------
3861|_[ + ] [ 43 / 100 ]-[03:35:06] [ - ]
3862|_[ + ] Target:: [ https://www.notarioexpress.cl/ValidadorEscrituraPublica ]
3863|_[ + ] Exploit::
3864|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3865|_[ + ] More details:: / - / , ISP:
3866|_[ + ] Found:: UNIDENTIFIED
3867
3868 _[ - ]::--------------------------------------------------------------------------------------------------------------
3869|_[ + ] [ 44 / 100 ]-[03:35:08] [ - ]
3870|_[ + ] Target:: [ https://www.notarioexpress.cl/ContactoLegal ]
3871|_[ + ] Exploit::
3872|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3873|_[ + ] More details:: / - / , ISP:
3874|_[ + ] Found:: UNIDENTIFIED
3875
3876 _[ - ]::--------------------------------------------------------------------------------------------------------------
3877|_[ + ] [ 45 / 100 ]-[03:35:10] [ - ]
3878|_[ + ] Target:: [ https://www.notarioexpress.cl/declaracionjuradadeexpensas ]
3879|_[ + ] Exploit::
3880|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3881|_[ + ] More details:: / - / , ISP:
3882|_[ + ] Found:: UNIDENTIFIED
3883
3884 _[ - ]::--------------------------------------------------------------------------------------------------------------
3885|_[ + ] [ 46 / 100 ]-[03:35:12] [ - ]
3886|_[ + ] Target:: [ https://www.notarioexpress.cl/autorizaciondeviajeurgente ]
3887|_[ + ] Exploit::
3888|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3889|_[ + ] More details:: / - / , ISP:
3890|_[ + ] Found:: UNIDENTIFIED
3891
3892 _[ - ]::--------------------------------------------------------------------------------------------------------------
3893|_[ + ] [ 47 / 100 ]-[03:35:14] [ - ]
3894|_[ + ] Target:: [ https://www.notarioexpress.cl/Mobile ]
3895|_[ + ] Exploit::
3896|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3897|_[ + ] More details:: / - / , ISP:
3898|_[ + ] Found:: UNIDENTIFIED
3899
3900 _[ - ]::--------------------------------------------------------------------------------------------------------------
3901|_[ + ] [ 48 / 100 ]-[03:35:15] [ - ]
3902|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=41 ]
3903|_[ + ] Exploit::
3904|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
3905|_[ + ] More details:: / - / , ISP:
3906|_[ + ] Found:: UNIDENTIFIED
3907
3908 _[ - ]::--------------------------------------------------------------------------------------------------------------
3909|_[ + ] [ 49 / 100 ]-[03:35:18] [ - ]
3910|_[ + ] Target:: [ https://www.notarioexpress.cl/EjemploContratoTrabajo.pdf ]
3911|_[ + ] Exploit::
3912|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3913|_[ + ] More details:: / - / , ISP:
3914|_[ + ] Found:: UNIDENTIFIED
3915
3916 _[ - ]::--------------------------------------------------------------------------------------------------------------
3917|_[ + ] [ 50 / 100 ]-[03:35:19] [ - ]
3918|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=68 ]
3919|_[ + ] Exploit::
3920|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
3921|_[ + ] More details:: / - / , ISP:
3922|_[ + ] Found:: UNIDENTIFIED
3923
3924 _[ - ]::--------------------------------------------------------------------------------------------------------------
3925|_[ + ] [ 51 / 100 ]-[03:35:21] [ - ]
3926|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=83 ]
3927|_[ + ] Exploit::
3928|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
3929|_[ + ] More details:: / - / , ISP:
3930|_[ + ] Found:: UNIDENTIFIED
3931
3932 _[ - ]::--------------------------------------------------------------------------------------------------------------
3933|_[ + ] [ 52 / 100 ]-[03:35:23] [ - ]
3934|_[ + ] Target:: [ https://www.notarioexpress.cl/SeleccionNotaria.aspx?idDocumento=42 ]
3935|_[ + ] Exploit::
3936|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
3937|_[ + ] More details:: / - / , ISP:
3938|_[ + ] Found:: UNIDENTIFIED
3939
3940 _[ - ]::--------------------------------------------------------------------------------------------------------------
3941|_[ + ] [ 53 / 100 ]-[03:35:26] [ - ]
3942|_[ + ] Target:: [ https://www.notarioexpress.cl/terminosycondiciones.pdf ]
3943|_[ + ] Exploit::
3944|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3945|_[ + ] More details:: / - / , ISP:
3946|_[ + ] Found:: UNIDENTIFIED
3947
3948 _[ - ]::--------------------------------------------------------------------------------------------------------------
3949|_[ + ] [ 54 / 100 ]-[03:35:28] [ - ]
3950|_[ + ] Target:: [ https://www.notarioexpress.cl/EjemploContratoTrabajoExtranjero.pdf ]
3951|_[ + ] Exploit::
3952|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3953|_[ + ] More details:: / - / , ISP:
3954|_[ + ] Found:: UNIDENTIFIED
3955
3956 _[ - ]::--------------------------------------------------------------------------------------------------------------
3957|_[ + ] [ 55 / 100 ]-[03:35:31] [ - ]
3958|_[ + ] Target:: [ https://www.notarioexpress.cl/Ejemplo_Finiquito.pdf ]
3959|_[ + ] Exploit::
3960|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3961|_[ + ] More details:: / - / , ISP:
3962|_[ + ] Found:: UNIDENTIFIED
3963
3964 _[ - ]::--------------------------------------------------------------------------------------------------------------
3965|_[ + ] [ 56 / 100 ]-[03:35:34] [ - ]
3966|_[ + ] Target:: [ https://www.notarioexpress.cl/PoderSimpleSalvoconductoInstrucciones.pdf ]
3967|_[ + ] Exploit::
3968|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3969|_[ + ] More details:: / - / , ISP:
3970|_[ + ] Found:: UNIDENTIFIED
3971
3972 _[ - ]::--------------------------------------------------------------------------------------------------------------
3973|_[ + ] [ 57 / 100 ]-[03:35:36] [ - ]
3974|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo3.pdf ]
3975|_[ + ] Exploit::
3976|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3977|_[ + ] More details:: / - / , ISP:
3978|_[ + ] Found:: UNIDENTIFIED
3979
3980 _[ - ]::--------------------------------------------------------------------------------------------------------------
3981|_[ + ] [ 58 / 100 ]-[03:35:38] [ - ]
3982|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=1 ]
3983|_[ + ] Exploit::
3984|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3985|_[ + ] More details:: / - / , ISP:
3986|_[ + ] Found:: UNIDENTIFIED
3987
3988 _[ - ]::--------------------------------------------------------------------------------------------------------------
3989|_[ + ] [ 59 / 100 ]-[03:35:40] [ - ]
3990|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=29 ]
3991|_[ + ] Exploit::
3992|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
3993|_[ + ] More details:: / - / , ISP:
3994|_[ + ] Found:: UNIDENTIFIED
3995
3996 _[ - ]::--------------------------------------------------------------------------------------------------------------
3997|_[ + ] [ 60 / 100 ]-[03:35:42] [ - ]
3998|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=12 ]
3999|_[ + ] Exploit::
4000|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4001|_[ + ] More details:: / - / , ISP:
4002|_[ + ] Found:: UNIDENTIFIED
4003
4004 _[ - ]::--------------------------------------------------------------------------------------------------------------
4005|_[ + ] [ 61 / 100 ]-[03:35:45] [ - ]
4006|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=19&idDocumento=4 ]
4007|_[ + ] Exploit::
4008|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4009|_[ + ] More details:: / - / , ISP:
4010|_[ + ] Found:: UNIDENTIFIED
4011
4012 _[ - ]::--------------------------------------------------------------------------------------------------------------
4013|_[ + ] [ 62 / 100 ]-[03:35:47] [ - ]
4014|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=13&idDocumento=3 ]
4015|_[ + ] Exploit::
4016|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4017|_[ + ] More details:: / - / , ISP:
4018|_[ + ] Found:: UNIDENTIFIED
4019
4020 _[ - ]::--------------------------------------------------------------------------------------------------------------
4021|_[ + ] [ 63 / 100 ]-[03:35:49] [ - ]
4022|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=12 ]
4023|_[ + ] Exploit::
4024|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4025|_[ + ] More details:: / - / , ISP:
4026|_[ + ] Found:: UNIDENTIFIED
4027
4028 _[ - ]::--------------------------------------------------------------------------------------------------------------
4029|_[ + ] [ 64 / 100 ]-[03:35:51] [ - ]
4030|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=8 ]
4031|_[ + ] Exploit::
4032|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4033|_[ + ] More details:: / - / , ISP:
4034|_[ + ] Found:: UNIDENTIFIED
4035
4036 _[ - ]::--------------------------------------------------------------------------------------------------------------
4037|_[ + ] [ 65 / 100 ]-[03:35:53] [ - ]
4038|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=27&idDocumento=29 ]
4039|_[ + ] Exploit::
4040|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4041|_[ + ] More details:: / - / , ISP:
4042|_[ + ] Found:: UNIDENTIFIED
4043
4044 _[ - ]::--------------------------------------------------------------------------------------------------------------
4045|_[ + ] [ 66 / 100 ]-[03:35:56] [ - ]
4046|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=4 ]
4047|_[ + ] Exploit::
4048|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4049|_[ + ] More details:: / - / , ISP:
4050|_[ + ] Found:: UNIDENTIFIED
4051
4052 _[ - ]::--------------------------------------------------------------------------------------------------------------
4053|_[ + ] [ 67 / 100 ]-[03:35:58] [ - ]
4054|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=30&idDocumento=12 ]
4055|_[ + ] Exploit::
4056|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4057|_[ + ] More details:: / - / , ISP:
4058|_[ + ] Found:: UNIDENTIFIED
4059
4060 _[ - ]::--------------------------------------------------------------------------------------------------------------
4061|_[ + ] [ 68 / 100 ]-[03:36:00] [ - ]
4062|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=7 ]
4063|_[ + ] Exploit::
4064|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4065|_[ + ] More details:: / - / , ISP:
4066|_[ + ] Found:: UNIDENTIFIED
4067
4068 _[ - ]::--------------------------------------------------------------------------------------------------------------
4069|_[ + ] [ 69 / 100 ]-[03:36:02] [ - ]
4070|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=4&idDocumento=7 ]
4071|_[ + ] Exploit::
4072|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4073|_[ + ] More details:: / - / , ISP:
4074|_[ + ] Found:: UNIDENTIFIED
4075
4076 _[ - ]::--------------------------------------------------------------------------------------------------------------
4077|_[ + ] [ 70 / 100 ]-[03:36:04] [ - ]
4078|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=24 ]
4079|_[ + ] Exploit::
4080|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4081|_[ + ] More details:: / - / , ISP:
4082|_[ + ] Found:: UNIDENTIFIED
4083
4084 _[ - ]::--------------------------------------------------------------------------------------------------------------
4085|_[ + ] [ 71 / 100 ]-[03:36:06] [ - ]
4086|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=18&idDocumento=25 ]
4087|_[ + ] Exploit::
4088|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4089|_[ + ] More details:: / - / , ISP:
4090|_[ + ] Found:: UNIDENTIFIED
4091
4092 _[ - ]::--------------------------------------------------------------------------------------------------------------
4093|_[ + ] [ 72 / 100 ]-[03:36:09] [ - ]
4094|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=22&idDocumento=10 ]
4095|_[ + ] Exploit::
4096|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4097|_[ + ] More details:: / - / , ISP:
4098|_[ + ] Found:: UNIDENTIFIED
4099
4100 _[ - ]::--------------------------------------------------------------------------------------------------------------
4101|_[ + ] [ 73 / 100 ]-[03:36:11] [ - ]
4102|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=19 ]
4103|_[ + ] Exploit::
4104|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4105|_[ + ] More details:: / - / , ISP:
4106|_[ + ] Found:: UNIDENTIFIED
4107
4108 _[ - ]::--------------------------------------------------------------------------------------------------------------
4109|_[ + ] [ 74 / 100 ]-[03:36:13] [ - ]
4110|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo4.pdf ]
4111|_[ + ] Exploit::
4112|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4113|_[ + ] More details:: / - / , ISP:
4114|_[ + ] Found:: UNIDENTIFIED
4115
4116 _[ - ]::--------------------------------------------------------------------------------------------------------------
4117|_[ + ] [ 75 / 100 ]-[03:36:16] [ - ]
4118|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=11&idDocumento=39 ]
4119|_[ + ] Exploit::
4120|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4121|_[ + ] More details:: / - / , ISP:
4122|_[ + ] Found:: UNIDENTIFIED
4123
4124 _[ - ]::--------------------------------------------------------------------------------------------------------------
4125|_[ + ] [ 76 / 100 ]-[03:36:18] [ - ]
4126|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=29&idDocumento=28 ]
4127|_[ + ] Exploit::
4128|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4129|_[ + ] More details:: / - / , ISP:
4130|_[ + ] Found:: UNIDENTIFIED
4131
4132 _[ - ]::--------------------------------------------------------------------------------------------------------------
4133|_[ + ] [ 77 / 100 ]-[03:36:20] [ - ]
4134|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=23 ]
4135|_[ + ] Exploit::
4136|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4137|_[ + ] More details:: / - / , ISP:
4138|_[ + ] Found:: UNIDENTIFIED
4139
4140 _[ - ]::--------------------------------------------------------------------------------------------------------------
4141|_[ + ] [ 78 / 100 ]-[03:36:22] [ - ]
4142|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=1&idDocumento=1 ]
4143|_[ + ] Exploit::
4144|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4145|_[ + ] More details:: / - / , ISP:
4146|_[ + ] Found:: UNIDENTIFIED
4147
4148 _[ - ]::--------------------------------------------------------------------------------------------------------------
4149|_[ + ] [ 79 / 100 ]-[03:36:24] [ - ]
4150|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=18&idDocumento=10 ]
4151|_[ + ] Exploit::
4152|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4153|_[ + ] More details:: / - / , ISP:
4154|_[ + ] Found:: UNIDENTIFIED
4155
4156 _[ - ]::--------------------------------------------------------------------------------------------------------------
4157|_[ + ] [ 80 / 100 ]-[03:36:26] [ - ]
4158|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=5&idDocumento=9 ]
4159|_[ + ] Exploit::
4160|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4161|_[ + ] More details:: / - / , ISP:
4162|_[ + ] Found:: UNIDENTIFIED
4163
4164 _[ - ]::--------------------------------------------------------------------------------------------------------------
4165|_[ + ] [ 81 / 100 ]-[03:36:29] [ - ]
4166|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo2.pdf ]
4167|_[ + ] Exploit::
4168|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4169|_[ + ] More details:: / - / , ISP:
4170|_[ + ] Found:: UNIDENTIFIED
4171
4172 _[ - ]::--------------------------------------------------------------------------------------------------------------
4173|_[ + ] [ 82 / 100 ]-[03:36:31] [ - ]
4174|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=26&idDocumento=4 ]
4175|_[ + ] Exploit::
4176|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4177|_[ + ] More details:: / - / , ISP:
4178|_[ + ] Found:: UNIDENTIFIED
4179
4180 _[ - ]::--------------------------------------------------------------------------------------------------------------
4181|_[ + ] [ 83 / 100 ]-[03:36:33] [ - ]
4182|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=9 ]
4183|_[ + ] Exploit::
4184|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4185|_[ + ] More details:: / - / , ISP:
4186|_[ + ] Found:: UNIDENTIFIED
4187
4188 _[ - ]::--------------------------------------------------------------------------------------------------------------
4189|_[ + ] [ 84 / 100 ]-[03:36:35] [ - ]
4190|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=3 ]
4191|_[ + ] Exploit::
4192|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4193|_[ + ] More details:: / - / , ISP:
4194|_[ + ] Found:: UNIDENTIFIED
4195
4196 _[ - ]::--------------------------------------------------------------------------------------------------------------
4197|_[ + ] [ 85 / 100 ]-[03:36:37] [ - ]
4198|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=5 ]
4199|_[ + ] Exploit::
4200|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4201|_[ + ] More details:: / - / , ISP:
4202|_[ + ] Found:: UNIDENTIFIED
4203
4204 _[ - ]::--------------------------------------------------------------------------------------------------------------
4205|_[ + ] [ 86 / 100 ]-[03:36:40] [ - ]
4206|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=6 ]
4207|_[ + ] Exploit::
4208|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4209|_[ + ] More details:: / - / , ISP:
4210|_[ + ] Found:: UNIDENTIFIED
4211
4212 _[ - ]::--------------------------------------------------------------------------------------------------------------
4213|_[ + ] [ 87 / 100 ]-[03:36:42] [ - ]
4214|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=26&idDocumento=7 ]
4215|_[ + ] Exploit::
4216|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4217|_[ + ] More details:: / - / , ISP:
4218|_[ + ] Found:: UNIDENTIFIED
4219
4220 _[ - ]::--------------------------------------------------------------------------------------------------------------
4221|_[ + ] [ 88 / 100 ]-[03:36:44] [ - ]
4222|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=1 ]
4223|_[ + ] Exploit::
4224|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4225|_[ + ] More details:: / - / , ISP:
4226|_[ + ] Found:: UNIDENTIFIED
4227
4228 _[ - ]::--------------------------------------------------------------------------------------------------------------
4229|_[ + ] [ 89 / 100 ]-[03:36:46] [ - ]
4230|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=11&idDocumento=6 ]
4231|_[ + ] Exploit::
4232|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4233|_[ + ] More details:: / - / , ISP:
4234|_[ + ] Found:: UNIDENTIFIED
4235
4236 _[ - ]::--------------------------------------------------------------------------------------------------------------
4237|_[ + ] [ 90 / 100 ]-[03:36:48] [ - ]
4238|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=4&idDocumento=43 ]
4239|_[ + ] Exploit::
4240|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4241|_[ + ] More details:: / - / , ISP:
4242|_[ + ] Found:: UNIDENTIFIED
4243
4244 _[ - ]::--------------------------------------------------------------------------------------------------------------
4245|_[ + ] [ 91 / 100 ]-[03:36:50] [ - ]
4246|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=2&idDocumento=4 ]
4247|_[ + ] Exploit::
4248|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4249|_[ + ] More details:: / - / , ISP:
4250|_[ + ] Found:: UNIDENTIFIED
4251
4252 _[ - ]::--------------------------------------------------------------------------------------------------------------
4253|_[ + ] [ 92 / 100 ]-[03:36:52] [ - ]
4254|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=24&idDocumento=6 ]
4255|_[ + ] Exploit::
4256|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4257|_[ + ] More details:: / - / , ISP:
4258|_[ + ] Found:: UNIDENTIFIED
4259
4260 _[ - ]::--------------------------------------------------------------------------------------------------------------
4261|_[ + ] [ 93 / 100 ]-[03:36:55] [ - ]
4262|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=3&idDocumento=8 ]
4263|_[ + ] Exploit::
4264|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4265|_[ + ] More details:: / - / , ISP:
4266|_[ + ] Found:: UNIDENTIFIED
4267
4268 _[ - ]::--------------------------------------------------------------------------------------------------------------
4269|_[ + ] [ 94 / 100 ]-[03:36:57] [ - ]
4270|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=22&idDocumento=2 ]
4271|_[ + ] Exploit::
4272|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4273|_[ + ] More details:: / - / , ISP:
4274|_[ + ] Found:: UNIDENTIFIED
4275
4276 _[ - ]::--------------------------------------------------------------------------------------------------------------
4277|_[ + ] [ 95 / 100 ]-[03:36:59] [ - ]
4278|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idNotaria=13&idDocumento=26 ]
4279|_[ + ] Exploit::
4280|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4281|_[ + ] More details:: / - / , ISP:
4282|_[ + ] Found:: UNIDENTIFIED
4283
4284 _[ - ]::--------------------------------------------------------------------------------------------------------------
4285|_[ + ] [ 96 / 100 ]-[03:37:01] [ - ]
4286|_[ + ] Target:: [ https://www.notarioexpress.cl/download/ContratodeArrendamientoTipo1.pdf ]
4287|_[ + ] Exploit::
4288|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4289|_[ + ] More details:: / - / , ISP:
4290|_[ + ] Found:: UNIDENTIFIED
4291
4292 _[ - ]::--------------------------------------------------------------------------------------------------------------
4293|_[ + ] [ 97 / 100 ]-[03:37:03] [ - ]
4294|_[ + ] Target:: [ https://www.notarioexpress.cl/Blog/page/declaracion-de-estado-civil ]
4295|_[ + ] Exploit::
4296|_[ + ] Information Server:: HTTP/2 404 , , IP:40.113.247.175:443
4297|_[ + ] More details:: / - / , ISP:
4298|_[ + ] Found:: UNIDENTIFIED
4299
4300 _[ - ]::--------------------------------------------------------------------------------------------------------------
4301|_[ + ] [ 98 / 100 ]-[03:37:05] [ - ]
4302|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda.aspx?idNotaria=3&idDocumento=11 ]
4303|_[ + ] Exploit::
4304|_[ + ] Information Server:: HTTP/2 301 , , IP:40.113.247.175:443
4305|_[ + ] More details:: / - / , ISP:
4306|_[ + ] Found:: UNIDENTIFIED
4307
4308 _[ - ]::--------------------------------------------------------------------------------------------------------------
4309|_[ + ] [ 99 / 100 ]-[03:37:07] [ - ]
4310|_[ + ] Target:: [ https://www.notarioexpress.cl/Agenda?idDocumento=4&idNotaria=11&logoID=11 ]
4311|_[ + ] Exploit::
4312|_[ + ] Information Server:: HTTP/2 200 , , IP:40.113.247.175:443
4313|_[ + ] More details:: / - / , ISP:
4314|_[ + ] Found:: UNIDENTIFIED
4315
4316[ INFO ] [ Shutting down ]
4317[ INFO ] [ End of process INURLBR at [24-03-2020 03:37:07]
4318[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
4319[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.notarioexpress.cl/output/inurlbr-www.notarioexpress.cl ]
4320|_________________________________________________________________________________________
4321
4322\_________________________________________________________________________________________/
4323################################################################################################################################
4324Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 02:50 EDT
4325Nmap scan report for 40.113.247.175
4326Host is up (0.26s latency).
4327Not shown: 474 filtered ports
4328Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4329PORT STATE SERVICE VERSION
433080/tcp open http Microsoft IIS httpd 10.0
4331|_http-server-header: Microsoft-IIS/10.0
4332|_http-title: Microsoft Azure Web App - Error 404
4333443/tcp open ssl/http Microsoft IIS httpd 10.0
4334|_http-server-header: Microsoft-IIS/10.0
4335|_http-title: Microsoft Azure Web App - Error 404
4336| ssl-cert: Subject: commonName=notarioexpress.cl
4337| Subject Alternative Name: DNS:notarioexpress.cl, DNS:www.notarioexpress.cl
4338| Not valid before: 2019-11-10T23:54:59
4339|_Not valid after: 2020-11-10T23:54:59
4340|_ssl-date: 2020-03-24T06:51:31+00:00; -6s from scanner time.
4341| tls-alpn:
4342| h2
4343|_ http/1.1
4344Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4345OS fingerprint not ideal because: Timing level 5 (Insane) used
4346No OS matches for host
4347Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
4348
4349Host script results:
4350|_clock-skew: -6s
4351
4352TRACEROUTE (using port 443/tcp)
4353HOP RTT ADDRESS
43541 137.54 ms 10.203.14.1
43552 ...
43563 138.43 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
43574 138.40 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
43585 143.60 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
43596 143.69 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
43607 143.67 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
43618 140.43 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
43629 ...
436310 273.15 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
436411 275.14 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
436512 280.21 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
436613 275.12 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
436714 280.38 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
436815 274.41 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
436916 274.77 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
437017 272.51 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
437118 276.47 ms be-1-0.ibr01.cle30.ntwk.msn.net (104.44.7.91)
437219 273.22 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
437320 273.01 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
437421 273.59 ms be-7-0.ibr01.dsm05.ntwk.msn.net (104.44.19.251)
437522 274.76 ms ae143-0.icr04.dsm05.ntwk.msn.net (104.44.22.184)
437623 ... 30
4377################################################################################################################################
4378Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 02:51 EDT
4379Nmap scan report for 40.113.247.175
4380Host is up.
4381Not shown: 14 filtered ports
4382Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4383PORT STATE SERVICE VERSION
438453/udp open|filtered domain
438567/udp open|filtered dhcps
438668/udp open|filtered dhcpc
438769/udp open|filtered tftp
438888/udp open|filtered kerberos-sec
4389123/udp open|filtered ntp
4390137/udp open|filtered netbios-ns
4391138/udp open|filtered netbios-dgm
4392139/udp open|filtered netbios-ssn
4393161/udp open|filtered snmp
4394162/udp open|filtered snmptrap
4395389/udp open|filtered ldap
4396520/udp open|filtered route
43972049/udp open|filtered nfs
4398Too many fingerprints match this host to give specific OS details
4399
4400TRACEROUTE (using proto 1/icmp)
4401HOP RTT ADDRESS
44021 141.40 ms 10.203.14.1
44032 ...
44043 134.24 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
44054 134.10 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
44065 139.42 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
44076 140.27 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
44087 139.46 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
44098 139.85 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
44109 163.55 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
441110 271.92 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
441211 273.22 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
441312 276.42 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
441413 269.81 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
441514 276.60 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
441615 273.57 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
441716 277.37 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
441817 272.88 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
441918 268.87 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
442019 270.03 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
442120 277.34 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
442221 280.12 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
442322 ... 30
4424################################################################################################################################
4425Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 02:56 EDT
4426Nmap scan report for 40.113.247.175
4427Host is up.
4428
4429PORT STATE SERVICE VERSION
443067/tcp filtered dhcps
443167/udp open|filtered dhcps
4432|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
4433Too many fingerprints match this host to give specific OS details
4434
4435TRACEROUTE (using proto 1/icmp)
4436HOP RTT ADDRESS
44371 137.75 ms 10.203.14.1
44382 ...
44393 138.30 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
44404 138.13 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
44415 144.30 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
44426 140.29 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
44437 140.51 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
44448 140.50 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
44459 163.40 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
444610 272.73 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
444711 271.79 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
444812 271.77 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
444913 271.74 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
445014 275.12 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
445115 272.14 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
445216 275.53 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
445317 275.41 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
445418 273.66 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
445519 270.32 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
445620 273.54 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
445721 277.45 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
445822 ... 30
4459################################################################################################################################
4460Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 02:58 EDT
4461Nmap scan report for 40.113.247.175
4462Host is up.
4463
4464PORT STATE SERVICE VERSION
446568/tcp filtered dhcpc
446668/udp open|filtered dhcpc
4467Too many fingerprints match this host to give specific OS details
4468
4469TRACEROUTE (using proto 1/icmp)
4470HOP RTT ADDRESS
44711 136.92 ms 10.203.14.1
44722 ...
44733 137.93 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
44744 137.37 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
44755 143.15 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
44766 143.32 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
44777 143.20 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
44788 139.55 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
44799 167.56 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
448010 271.94 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
448111 272.27 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
448212 276.37 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
448313 276.18 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
448414 279.54 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
448515 272.56 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
448616 272.55 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
448717 276.09 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
448818 272.91 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
448919 273.71 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
449020 275.43 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
449121 276.99 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
449222 ... 30
4493################################################################################################################################
4494Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:00 EDT
4495Nmap scan report for 40.113.247.175
4496Host is up.
4497
4498PORT STATE SERVICE VERSION
449969/tcp filtered tftp
450069/udp open|filtered tftp
4501Too many fingerprints match this host to give specific OS details
4502
4503TRACEROUTE (using proto 1/icmp)
4504HOP RTT ADDRESS
45051 138.64 ms 10.203.14.1
45062 ...
45073 139.40 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
45084 139.24 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
45095 144.67 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
45106 145.10 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
45117 144.74 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
45128 141.30 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
45139 164.91 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
451410 273.62 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
451511 272.01 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
451612 271.93 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
451713 271.49 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
451814 275.71 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
451915 275.48 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
452016 273.71 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
452117 273.73 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
452218 273.50 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
452319 273.11 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
452420 274.20 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
452521 274.72 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
452622 ... 30
4527################################################################################################################################
4528http://40.113.247.175 [404 Not Found] Country[UNITED STATES][US], HTML5, HTTPServer[Microsoft-IIS/10.0], IP[40.113.247.175], Microsoft-IIS[10.0], Script[text/javascript], Title[Microsoft Azure Web App - Error 404]
4529################################################################################################################################
4530
4531wig - WebApp Information Gatherer
4532
4533
4534Scanning http://40.113.247.175...
4535_________________ SITE INFO __________________
4536IP Title
453740.113.247.175 Microsoft Azure Web App - Er
4538
4539__________________ VERSION ___________________
4540Name Versions Type
4541IIS 10.0 Platform
4542
4543______________________________________________
4544Time: 36.9 sec Urls: 599 Fingerprints: 40401
4545################################################################################################################################
4546HTTP/1.1 404 Site Not Found
4547Content-Length: 2778
4548Content-Type: text/html
4549Server: Microsoft-IIS/10.0
4550Date: Tue, 24 Mar 2020 07:03:35 GMT
4551Connection: close
4552
4553HTTP/1.1 404 Site Not Found
4554Content-Length: 2778
4555Content-Type: text/html
4556Server: Microsoft-IIS/10.0
4557Date: Tue, 24 Mar 2020 07:03:36 GMT
4558Connection: close
4559################################################################################################################################
4560Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:03 EDT
4561Nmap scan report for 40.113.247.175
4562Host is up.
4563
4564PORT STATE SERVICE VERSION
4565123/tcp filtered ntp
4566123/udp open|filtered ntp
4567Too many fingerprints match this host to give specific OS details
4568
4569TRACEROUTE (using proto 1/icmp)
4570HOP RTT ADDRESS
45711 136.96 ms 10.203.14.1
45722 ...
45733 137.68 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
45744 137.88 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
45755 143.09 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
45766 139.86 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
45777 140.21 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
45788 140.07 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
45799 168.35 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
458010 272.17 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
458111 273.28 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
458212 273.29 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
458313 272.87 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
458414 276.62 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
458515 ...
458616 273.27 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
458717 273.10 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
458818 272.89 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
458919 273.25 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
459020 272.86 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
459121 272.24 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
459222 ... 30
4593################################################################################################################################
4594https://40.113.247.175/ [404 Not Found] Country[UNITED STATES][US], HTML5, HTTPServer[Microsoft-IIS/10.0], IP[40.113.247.175], Microsoft-IIS[10.0], Script[text/javascript], Title[Microsoft Azure Web App - Error 404]
4595################################################################################################################################
4596Version: 2.0.0-static
4597OpenSSL 1.1.1f-dev xx XXX xxxx
4598
4599Connected to 40.113.247.175
4600
4601Testing SSL server 40.113.247.175 on port 443 using SNI name 40.113.247.175
4602
4603 SSL/TLS Protocols:
4604SSLv2 disabled
4605SSLv3 disabled
4606TLSv1.0 enabled
4607TLSv1.1 enabled
4608TLSv1.2 enabled
4609TLSv1.3 disabled
4610
4611 TLS Fallback SCSV:
4612Server does not support TLS Fallback SCSV
4613
4614 TLS renegotiation:
4615Secure session renegotiation supported
4616
4617 TLS Compression:
4618Compression disabled
4619
4620 Heartbleed:
4621TLSv1.2 not vulnerable to heartbleed
4622TLSv1.1 not vulnerable to heartbleed
4623TLSv1.0 not vulnerable to heartbleed
4624
4625 Supported Server Cipher(s):
4626Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
4627Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
4628Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
4629Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
4630Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4631Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4632Accepted TLSv1.2 256 bits AES256-GCM-SHA384
4633Accepted TLSv1.2 128 bits AES128-GCM-SHA256
4634Accepted TLSv1.2 256 bits AES256-SHA256
4635Accepted TLSv1.2 128 bits AES128-SHA256
4636Accepted TLSv1.2 256 bits AES256-SHA
4637Accepted TLSv1.2 128 bits AES128-SHA
4638Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4639Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4640Accepted TLSv1.1 256 bits AES256-SHA
4641Accepted TLSv1.1 128 bits AES128-SHA
4642Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4643Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4644Accepted TLSv1.0 256 bits AES256-SHA
4645Accepted TLSv1.0 128 bits AES128-SHA
4646
4647 Server Signature Algorithm(s):
4648TLSv1.2 rsa_pkcs1_sha1
4649TLSv1.2 rsa_pkcs1_sha256
4650TLSv1.2 rsa_pkcs1_sha384
4651TLSv1.2 rsa_pkcs1_sha512
4652
4653 SSL Certificate:
4654Signature Algorithm: sha256WithRSAEncryption
4655RSA Key Strength: 2048
4656
4657Subject: *.azurewebsites.net
4658Altnames: DNS:*.azurewebsites.net, DNS:*.scm.azurewebsites.net, DNS:*.azure-mobile.net, DNS:*.scm.azure-mobile.net, DNS:*.sso.azurewebsites.net
4659Issuer: Microsoft IT TLS CA 5
4660
4661Not valid before: Sep 24 02:18:56 2019 GMT
4662Not valid after: Sep 24 02:18:56 2021 GMT
4663################################################################################################################################
4664Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:13 EDT
4665Nmap scan report for 40.113.247.175
4666Host is up (0.27s latency).
4667Not shown: 65533 filtered ports
4668PORT STATE SERVICE VERSION
466980/tcp open http Microsoft IIS httpd 10.0
4670|_http-server-header: Microsoft-IIS/10.0
4671|_http-title: Microsoft Azure Web App - Error 404
4672443/tcp open ssl/http Microsoft IIS httpd 10.0
4673|_http-server-header: Microsoft-IIS/10.0
4674|_http-title: Microsoft Azure Web App - Error 404
4675| ssl-cert: Subject: commonName=notarioexpress.cl
4676| Subject Alternative Name: DNS:notarioexpress.cl, DNS:www.notarioexpress.cl
4677| Not valid before: 2019-11-10T23:54:59
4678|_Not valid after: 2020-11-10T23:54:59
4679|_ssl-date: 2020-03-24T07:18:44+00:00; -6s from scanner time.
4680| tls-alpn:
4681| h2
4682|_ http/1.1
4683Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4684OS fingerprint not ideal because: Timing level 5 (Insane) used
4685No OS matches for host
4686Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
4687
4688Host script results:
4689|_clock-skew: -6s
4690
4691TRACEROUTE (using port 443/tcp)
4692HOP RTT ADDRESS
46931 137.29 ms 10.203.14.1
46942 ...
46953 137.70 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
46964 137.37 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
46975 143.13 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
46986 143.17 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
46997 139.11 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
47008 139.17 ms ae1-0.sto-96cbe-1b.ntwk.msn.net (104.44.225.161)
47019 ...
470210 268.38 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
470311 274.46 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
470412 274.97 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
470513 271.57 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
470614 280.11 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
470715 279.97 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
470816 277.24 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
470917 276.60 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
471018 269.41 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
471119 273.54 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
471220 272.73 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
471321 271.48 ms ae161-0.icr03.dsm05.ntwk.msn.net (104.44.22.190)
471422 ... 30
4715################################################################################################################################
4716Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 03:18 EDT
4717Nmap scan report for 40.113.247.175
4718Host is up.
4719
4720PORT STATE SERVICE VERSION
472153/tcp filtered domain
472267/tcp filtered dhcps
472368/tcp filtered dhcpc
472469/tcp filtered tftp
472588/tcp filtered kerberos-sec
4726123/tcp filtered ntp
4727137/tcp filtered netbios-ns
4728138/tcp filtered netbios-dgm
4729139/tcp filtered netbios-ssn
4730161/tcp filtered snmp
4731162/tcp filtered snmptrap
4732389/tcp filtered ldap
4733520/tcp filtered efs
47342049/tcp filtered nfs
473553/udp open|filtered domain
473667/udp open|filtered dhcps
473768/udp open|filtered dhcpc
473869/udp open|filtered tftp
473988/udp open|filtered kerberos-sec
4740123/udp open|filtered ntp
4741137/udp open|filtered netbios-ns
4742138/udp open|filtered netbios-dgm
4743139/udp open|filtered netbios-ssn
4744161/udp open|filtered snmp
4745162/udp open|filtered snmptrap
4746389/udp open|filtered ldap
4747520/udp open|filtered route
47482049/udp open|filtered nfs
4749Too many fingerprints match this host to give specific OS details
4750
4751TRACEROUTE (using proto 1/icmp)
4752HOP RTT ADDRESS
47531 138.22 ms 10.203.14.1
47542 ...
47553 138.61 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
47564 138.40 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
47575 145.24 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
47586 144.05 ms be3377.ccr21.sto01.atlas.cogentco.com (154.54.36.90)
47597 144.03 ms sting-networks-ab.demarc.cogentco.com (149.6.168.18)
47608 145.10 ms ae9-0.sto-96cbe-1b.ntwk.msn.net (104.44.224.139)
47619 163.76 ms ae22-0.ear01.ham30.ntwk.msn.net (104.44.232.173)
476210 269.41 ms be-21-0.ibr02.ham30.ntwk.msn.net (104.44.21.17)
476311 274.81 ms be-4-0.ibr06.ams06.ntwk.msn.net (104.44.16.131)
476412 274.83 ms be-6-0.ibr02.ams21.ntwk.msn.net (104.44.18.190)
476513 270.80 ms be-3-0.ibr02.lon24.ntwk.msn.net (104.44.17.50)
476614 277.32 ms be-1-0.ibr02.lon22.ntwk.msn.net (104.44.16.57)
476715 276.29 ms be-7-0.ibr02.nyc30.ntwk.msn.net (104.44.18.154)
476816 277.33 ms be-3-0.ibr02.ewr30.ntwk.msn.net (104.44.7.105)
476917 276.24 ms be-2-0.ibr02.cle30.ntwk.msn.net (104.44.7.98)
477018 268.73 ms be-3-0.ibr02.ch4.ntwk.msn.net (104.44.7.116)
477119 272.16 ms be-1-0.ibr02.ch2.ntwk.msn.net (104.44.7.222)
477220 275.78 ms be-4-0.ibr02.dsm05.ntwk.msn.net (104.44.19.253)
477321 275.29 ms ae160-0.icr01.dsm05.ntwk.msn.net (104.44.22.186)
477422 ... 30
4775################################################################################################################################
4776Hosts
4777=====
4778
4779address mac name os_name os_flavor os_sp purpose info comments
4780------- --- ---- ------- --------- ----- ------- ---- --------
47813.83.211.23 ec2-3-83-211-23.compute-1.amazonaws.com embedded device
47823.216.98.236 ec2-3-216-98-236.compute-1.amazonaws.com Linux 3.X server
47835.45.67.166 dns.sflex.net Unknown device
478423.111.136.190 bhinteractive.net embedded device
478523.229.234.138 ip-23-229-234-138.ip.secureserver.net Linux 3.X server
478634.224.171.238 ec2-34-224-171-238.compute-1.amazonaws.com Linux server
478734.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
478834.253.89.155 ec2-34-253-89-155.eu-west-1.compute.amazonaws.com Linux 4.X server
478937.1.207.121 teens-sins.net 2-Series 3.X device
479040.113.247.175 Unknown device
479143.245.223.4 Linux 2.6.X server
479245.60.47.218 Linux 3.X server
479345.88.202.111 Linux 3.X server
479445.239.108.252 whale.ecohosting.cl Linux 3.X server
479552.1.2.24 ec2-52-1-2-24.compute-1.amazonaws.com Linux server
479652.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
479752.30.54.73 ec2-52-30-54-73.eu-west-1.compute.amazonaws.com Linux 4.X server
479852.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com Unknown device
479952.138.144.162 Unknown device
480054.36.158.42 lb.xtgem.com Linux 3.X server
480154.72.57.25 ec2-54-72-57-25.eu-west-1.compute.amazonaws.com Linux 4.X server
480254.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
480354.194.134.190 ec2-54-194-134-190.eu-west-1.compute.amazonaws.com Linux 4.X server
480464.69.94.253 Unknown device
480567.205.1.246 ps614624.dreamhost.com Android 5.X device
480669.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
480774.117.180.192 embedded device
480882.94.222.131 Unknown device
480982.94.222.134 Unknown device
481082.94.228.245 Linux 2.6.X server
481189.248.172.178 no-reverse-dns-configured.com Linux 3.X server
481289.248.172.200 89-248-172-200.constellationservers.net Linux 8.0 server
481392.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
481492.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
481594.102.51.111 Linux 2.6.X server
481694.102.51.112 no-reverse-dns-configured.com Linux 2.6.X server
481794.102.57.216 x.usib.tv Linux 3.X server
481895.181.179.47 pitecompho1976.example.com Unknown device
4819104.244.73.40 Unknown device
4820104.244.76.231 Linux 3.X server
4821104.244.77.188 Linux 3.X server
4822104.244.79.89 Linux 3.X server
4823107.180.28.114 ip-107-180-28-114.ip.secureserver.net Unknown device
4824111.90.145.39 web16.support-emilid.com Linux 2.6.X server
4825143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
4826146.83.222.104 callecalle5.uach.cl Unknown device
4827149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
4828151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
4829158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
4830162.244.35.13 xnlog.com FreeBSD 7.X device
4831163.247.48.46 Unknown device
4832163.247.127.20 Unknown device
4833163.247.130.114 embedded device
4834163.247.175.176 Unknown device
4835165.22.143.229 Linux 2.6.X server
4836165.227.99.239 Linux 3.X server
4837169.239.218.20 cp10.domains.co.za Linux 2.6.X server
4838170.239.85.227 gesaguas.cl Unknown device
4839173.214.244.169 173.214.244.169.serverel.net Unknown device
4840174.142.53.51 mail.marineland.ca Linux 3.X server
4841186.64.118.40 mail.blue127.dnsmisitio.net embedded device
4842188.127.251.161 byronbayoasisresort.com.au Linux 3.X server
4843190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
4844190.107.177.35 srv25.cpanelhost.cl Linux 2.6.X server
4845190.110.121.175 todofutbol.hn.cl Unknown device
4846190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
4847190.153.219.254 mail.evopoli.cl Linux 3.X server
4848192.185.134.58 ns36.accountservergroup.com Linux 3.X server
4849198.49.23.144 Unknown device
4850198.49.23.145 Unknown device
4851198.185.159.144 Unknown device
4852198.185.159.145 Unknown device
4853199.38.245.243 embedded device
4854200.2.249.28 Linux 3.X server
4855200.10.251.82 homer.sii.cl Unknown device
4856200.12.19.101 embedded device
4857200.29.0.33 cp33.puntoweb.cl Unknown device
4858200.54.92.108 Linux 9.0 server
4859200.54.230.247 plesk.tdata.cloud Linux 3.X server
4860200.55.198.228 Linux 2.4.X server
4861200.68.30.227 mail.gorecoquimbo.cl Unknown device
4862200.68.34.99 Unknown device
4863200.73.54.34 mail.maxtel.cl Linux 2.6.X server
4864200.91.40.252 200-91-40-252.avz.cl Unknown device
4865200.91.41.5 cruzblanca.cl Unknown device
4866200.126.100.83 toqui.gorearaucania.cl Unknown device
4867201.159.170.136 soloweb.sinc.cl Unknown device
4868204.93.193.141 suzuka.mochahost.com Unknown device
4869206.48.140.40 Unknown device
4870207.246.147.189 2-Series device
4871207.246.147.190 Linux 4.X server
4872207.246.147.247 Linux 4.X server
4873207.246.147.248 Linux 4.X server
4874211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
4875212.174.0.150 Windows 2012 server
4876216.172.184.117 Linux 3.X server
4877218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
4878################################################################################################################################
4879Services
4880========
4881
4882host port proto name state info
4883---- ---- ----- ---- ----- ----
48843.83.211.23 53 tcp domain filtered
48853.83.211.23 53 udp domain unknown
48863.83.211.23 67 tcp dhcps filtered
48873.83.211.23 67 udp dhcps unknown
48883.83.211.23 68 tcp dhcpc filtered
48893.83.211.23 68 udp dhcpc unknown
48903.83.211.23 69 tcp tftp filtered
48913.83.211.23 69 udp tftp unknown
48923.83.211.23 80 tcp http open Microsoft IIS httpd 10.0
48933.83.211.23 88 tcp kerberos-sec filtered
48943.83.211.23 88 udp kerberos-sec unknown
48953.83.211.23 123 tcp ntp filtered
48963.83.211.23 123 udp ntp unknown
48973.83.211.23 137 tcp netbios-ns filtered
48983.83.211.23 137 udp netbios-ns unknown
48993.83.211.23 138 tcp netbios-dgm filtered
49003.83.211.23 138 udp netbios-dgm unknown
49013.83.211.23 139 tcp netbios-ssn filtered
49023.83.211.23 139 udp netbios-ssn unknown
49033.83.211.23 161 tcp snmp filtered
49043.83.211.23 161 udp snmp unknown
49053.83.211.23 162 tcp snmptrap filtered
49063.83.211.23 162 udp snmptrap unknown
49073.83.211.23 389 tcp ldap filtered
49083.83.211.23 389 udp ldap unknown
49093.83.211.23 443 tcp ssl/http open Microsoft IIS httpd 10.0
49103.83.211.23 520 tcp efs filtered
49113.83.211.23 520 udp route unknown
49123.83.211.23 2049 tcp nfs filtered
49133.83.211.23 2049 udp nfs unknown
49143.216.98.236 53 tcp domain filtered
49153.216.98.236 53 udp domain unknown
49163.216.98.236 67 tcp dhcps filtered
49173.216.98.236 67 udp dhcps unknown
49183.216.98.236 68 tcp dhcpc filtered
49193.216.98.236 68 udp dhcpc unknown
49203.216.98.236 69 tcp tftp filtered
49213.216.98.236 69 udp tftp unknown
49223.216.98.236 80 tcp http open Microsoft IIS httpd 10.0
49233.216.98.236 88 tcp kerberos-sec filtered
49243.216.98.236 88 udp kerberos-sec unknown
49253.216.98.236 123 tcp ntp filtered
49263.216.98.236 123 udp ntp unknown
49273.216.98.236 137 tcp netbios-ns filtered
49283.216.98.236 137 udp netbios-ns unknown
49293.216.98.236 138 tcp netbios-dgm filtered
49303.216.98.236 138 udp netbios-dgm unknown
49313.216.98.236 139 tcp netbios-ssn filtered
49323.216.98.236 139 udp netbios-ssn unknown
49333.216.98.236 161 tcp snmp filtered
49343.216.98.236 161 udp snmp unknown
49353.216.98.236 162 tcp snmptrap filtered
49363.216.98.236 162 udp snmptrap unknown
49373.216.98.236 389 tcp ldap filtered
49383.216.98.236 389 udp ldap unknown
49393.216.98.236 443 tcp ssl/http open Microsoft IIS httpd 10.0
49403.216.98.236 520 tcp efs filtered
49413.216.98.236 520 udp route unknown
49423.216.98.236 2049 tcp nfs filtered
49433.216.98.236 2049 udp nfs unknown
49445.45.67.166 22 tcp ssh open SSH-2.0-OpenSSH_7.4
49455.45.67.166 53 tcp domain closed
49465.45.67.166 53 udp domain closed
49475.45.67.166 67 tcp dhcps closed
49485.45.67.166 67 udp dhcps closed
49495.45.67.166 68 tcp dhcpc closed
49505.45.67.166 68 udp dhcpc closed
49515.45.67.166 69 tcp tftp closed
49525.45.67.166 69 udp tftp closed
49535.45.67.166 88 tcp kerberos-sec closed
49545.45.67.166 88 udp kerberos-sec unknown
49555.45.67.166 123 tcp ntp closed
49565.45.67.166 123 udp ntp unknown
49575.45.67.166 137 tcp netbios-ns filtered
49585.45.67.166 137 udp netbios-ns unknown
49595.45.67.166 138 tcp netbios-dgm filtered
49605.45.67.166 138 udp netbios-dgm unknown
49615.45.67.166 139 tcp netbios-ssn filtered
49625.45.67.166 139 udp netbios-ssn closed
49635.45.67.166 161 tcp snmp closed
49645.45.67.166 161 udp snmp unknown
49655.45.67.166 162 tcp snmptrap closed
49665.45.67.166 162 udp snmptrap unknown
49675.45.67.166 389 tcp ldap closed
49685.45.67.166 389 udp ldap unknown
49695.45.67.166 520 tcp efs closed
49705.45.67.166 520 udp route closed
49715.45.67.166 2049 tcp nfs closed
49725.45.67.166 2049 udp nfs closed
497323.111.136.190 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 23:35. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
497423.111.136.190 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
497523.111.136.190 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
497623.111.136.190 67 tcp dhcps filtered
497723.111.136.190 67 udp dhcps unknown
497823.111.136.190 68 tcp dhcpc filtered
497923.111.136.190 68 udp dhcpc unknown
498023.111.136.190 69 tcp tftp filtered
498123.111.136.190 69 udp tftp unknown
498223.111.136.190 88 tcp kerberos-sec filtered
498323.111.136.190 88 udp kerberos-sec unknown
498423.111.136.190 123 tcp ntp filtered
498523.111.136.190 123 udp ntp unknown
498623.111.136.190 137 tcp netbios-ns filtered
498723.111.136.190 137 udp netbios-ns unknown
498823.111.136.190 138 tcp netbios-dgm filtered
498923.111.136.190 138 udp netbios-dgm unknown
499023.111.136.190 139 tcp netbios-ssn filtered
499123.111.136.190 139 udp netbios-ssn unknown
499223.111.136.190 161 tcp snmp filtered
499323.111.136.190 161 udp snmp unknown net-snmp; net-snmp SNMPv3 server
499423.111.136.190 162 tcp snmptrap filtered
499523.111.136.190 162 udp snmptrap unknown
499623.111.136.190 389 tcp ldap filtered
499723.111.136.190 389 udp ldap unknown
499823.111.136.190 520 tcp efs filtered
499923.111.136.190 520 udp route unknown
500023.111.136.190 2049 tcp nfs filtered
500123.111.136.190 2049 udp nfs unknown
500223.229.234.138 21 tcp ftp open Pure-FTPd
500323.229.234.138 22 tcp ssh open OpenSSH 5.3 protocol 2.0
500423.229.234.138 25 tcp smtp open
500523.229.234.138 53 udp domain unknown
500623.229.234.138 67 udp dhcps unknown
500723.229.234.138 68 udp dhcpc unknown
500823.229.234.138 69 udp tftp unknown
500923.229.234.138 80 tcp http open Apache httpd PHP 5.6.40
501023.229.234.138 88 udp kerberos-sec unknown
501123.229.234.138 110 tcp pop3 open Dovecot pop3d
501223.229.234.138 123 udp ntp unknown
501323.229.234.138 137 udp netbios-ns unknown
501423.229.234.138 138 udp netbios-dgm unknown
501523.229.234.138 139 udp netbios-ssn unknown
501623.229.234.138 143 tcp imap open Dovecot imapd
501723.229.234.138 161 udp snmp unknown
501823.229.234.138 162 udp snmptrap unknown
501923.229.234.138 389 udp ldap unknown
502023.229.234.138 443 tcp ssl/http open Apache httpd PHP 5.6.40
502123.229.234.138 465 tcp ssl/smtp open Exim smtpd 4.92
502223.229.234.138 520 udp route unknown
502323.229.234.138 587 tcp smtp open Exim smtpd 4.92
502423.229.234.138 993 tcp ssl/imaps open
502523.229.234.138 995 tcp ssl/pop3s open
502623.229.234.138 2049 udp nfs unknown
502723.229.234.138 3306 tcp mysql open MySQL 5.6.44-cll-lve
502834.224.171.238 53 tcp domain filtered
502934.224.171.238 53 udp domain unknown
503034.224.171.238 67 tcp dhcps filtered
503134.224.171.238 67 udp dhcps unknown
503234.224.171.238 68 tcp dhcpc filtered
503334.224.171.238 68 udp dhcpc unknown
503434.224.171.238 69 tcp tftp filtered
503534.224.171.238 69 udp tftp unknown
503634.224.171.238 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
503734.224.171.238 88 tcp kerberos-sec filtered
503834.224.171.238 88 udp kerberos-sec unknown
503934.224.171.238 123 tcp ntp filtered
504034.224.171.238 123 udp ntp unknown
504134.224.171.238 137 tcp netbios-ns filtered
504234.224.171.238 137 udp netbios-ns unknown
504334.224.171.238 138 tcp netbios-dgm filtered
504434.224.171.238 138 udp netbios-dgm unknown
504534.224.171.238 139 tcp netbios-ssn filtered
504634.224.171.238 139 udp netbios-ssn unknown
504734.224.171.238 161 tcp snmp filtered
504834.224.171.238 161 udp snmp unknown
504934.224.171.238 162 tcp snmptrap filtered
505034.224.171.238 162 udp snmptrap unknown
505134.224.171.238 389 tcp ldap filtered
505234.224.171.238 389 udp ldap unknown
505334.224.171.238 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
505434.224.171.238 520 tcp efs filtered
505534.224.171.238 520 udp route unknown
505634.224.171.238 2049 tcp nfs filtered
505734.224.171.238 2049 udp nfs unknown
505834.236.0.217 53 tcp domain filtered
505934.236.0.217 53 udp domain unknown
506034.236.0.217 67 tcp dhcps filtered
506134.236.0.217 67 udp dhcps unknown
506234.236.0.217 68 tcp dhcpc filtered
506334.236.0.217 68 udp dhcpc unknown
506434.236.0.217 69 tcp tftp filtered
506534.236.0.217 69 udp tftp unknown
506634.236.0.217 80 tcp http open nginx
506734.236.0.217 88 tcp kerberos-sec filtered
506834.236.0.217 88 udp kerberos-sec unknown
506934.236.0.217 123 tcp ntp filtered
507034.236.0.217 123 udp ntp unknown
507134.236.0.217 137 tcp netbios-ns filtered
507234.236.0.217 137 udp netbios-ns unknown
507334.236.0.217 138 tcp netbios-dgm filtered
507434.236.0.217 138 udp netbios-dgm unknown
507534.236.0.217 139 tcp netbios-ssn filtered
507634.236.0.217 139 udp netbios-ssn unknown
507734.236.0.217 161 tcp snmp filtered
507834.236.0.217 161 udp snmp unknown
507934.236.0.217 162 tcp snmptrap filtered
508034.236.0.217 162 udp snmptrap unknown
508134.236.0.217 389 tcp ldap filtered
508234.236.0.217 389 udp ldap unknown
508334.236.0.217 443 tcp ssl/http open nginx
508434.236.0.217 520 tcp efs filtered
508534.236.0.217 520 udp route unknown
508634.236.0.217 2049 tcp nfs filtered
508734.236.0.217 2049 udp nfs unknown
508834.253.89.155 53 tcp domain closed
508934.253.89.155 53 udp domain unknown
509034.253.89.155 67 tcp dhcps closed
509134.253.89.155 67 udp dhcps unknown
509234.253.89.155 68 tcp dhcpc closed
509334.253.89.155 68 udp dhcpc unknown
509434.253.89.155 69 tcp tftp closed
509534.253.89.155 69 udp tftp unknown
509634.253.89.155 80 tcp http open nginx
509734.253.89.155 88 tcp kerberos-sec closed
509834.253.89.155 88 udp kerberos-sec unknown
509934.253.89.155 123 tcp ntp closed
510034.253.89.155 123 udp ntp unknown
510134.253.89.155 137 tcp netbios-ns closed
510234.253.89.155 137 udp netbios-ns unknown
510334.253.89.155 138 tcp netbios-dgm closed
510434.253.89.155 138 udp netbios-dgm unknown
510534.253.89.155 139 tcp netbios-ssn closed
510634.253.89.155 139 udp netbios-ssn unknown
510734.253.89.155 161 tcp snmp closed
510834.253.89.155 161 udp snmp unknown
510934.253.89.155 162 tcp snmptrap closed
511034.253.89.155 162 udp snmptrap unknown
511134.253.89.155 389 tcp ldap closed
511234.253.89.155 389 udp ldap unknown
511334.253.89.155 443 tcp ssl/http open nginx
511434.253.89.155 520 tcp efs closed
511534.253.89.155 520 udp route unknown
511634.253.89.155 2049 tcp nfs closed
511734.253.89.155 2049 udp nfs unknown
511837.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
511937.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
512037.1.207.121 67 tcp dhcps filtered
512137.1.207.121 67 udp dhcps unknown
512237.1.207.121 68 tcp dhcpc filtered
512337.1.207.121 68 udp dhcpc filtered
512437.1.207.121 69 tcp tftp filtered
512537.1.207.121 69 udp tftp unknown
512637.1.207.121 88 tcp kerberos-sec filtered
512737.1.207.121 88 udp kerberos-sec filtered
512837.1.207.121 123 tcp ntp filtered
512937.1.207.121 123 udp ntp unknown
513037.1.207.121 137 tcp netbios-ns filtered
513137.1.207.121 137 udp netbios-ns unknown
513237.1.207.121 138 tcp netbios-dgm filtered
513337.1.207.121 138 udp netbios-dgm unknown
513437.1.207.121 139 tcp netbios-ssn filtered
513537.1.207.121 139 udp netbios-ssn unknown
513637.1.207.121 161 tcp snmp filtered
513737.1.207.121 161 udp snmp unknown
513837.1.207.121 162 tcp snmptrap filtered
513937.1.207.121 162 udp snmptrap unknown
514037.1.207.121 389 tcp ldap filtered
514137.1.207.121 389 udp ldap unknown
514237.1.207.121 520 tcp efs filtered
514337.1.207.121 520 udp route unknown
514437.1.207.121 2049 tcp nfs filtered
514537.1.207.121 2049 udp nfs filtered
514640.113.247.175 53 tcp domain filtered
514740.113.247.175 53 udp domain unknown
514840.113.247.175 67 tcp dhcps filtered
514940.113.247.175 67 udp dhcps unknown
515040.113.247.175 68 tcp dhcpc filtered
515140.113.247.175 68 udp dhcpc unknown
515240.113.247.175 69 tcp tftp filtered
515340.113.247.175 69 udp tftp unknown
515440.113.247.175 80 tcp http open Microsoft IIS httpd 10.0
515540.113.247.175 88 tcp kerberos-sec filtered
515640.113.247.175 88 udp kerberos-sec unknown
515740.113.247.175 123 tcp ntp filtered
515840.113.247.175 123 udp ntp unknown
515940.113.247.175 137 tcp netbios-ns filtered
516040.113.247.175 137 udp netbios-ns unknown
516140.113.247.175 138 tcp netbios-dgm filtered
516240.113.247.175 138 udp netbios-dgm unknown
516340.113.247.175 139 tcp netbios-ssn filtered
516440.113.247.175 139 udp netbios-ssn unknown
516540.113.247.175 161 tcp snmp filtered
516640.113.247.175 161 udp snmp unknown
516740.113.247.175 162 tcp snmptrap filtered
516840.113.247.175 162 udp snmptrap unknown
516940.113.247.175 389 tcp ldap filtered
517040.113.247.175 389 udp ldap unknown
517140.113.247.175 443 tcp ssl/http open Microsoft IIS httpd 10.0
517240.113.247.175 520 tcp efs filtered
517340.113.247.175 520 udp route unknown
517440.113.247.175 2049 tcp nfs filtered
517540.113.247.175 2049 udp nfs unknown
517643.245.223.4 80 tcp http open nginx
517743.245.223.4 443 tcp ssl/http open nginx
517843.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
517945.60.47.218 25 tcp http open Incapsula CDN httpd
518045.60.47.218 53 tcp domain open
518145.60.47.218 53 udp domain open
518245.60.47.218 67 udp dhcps unknown
518345.60.47.218 68 udp dhcpc unknown
518445.60.47.218 69 udp tftp unknown
518545.60.47.218 80 tcp http open Incapsula CDN httpd
518645.60.47.218 81 tcp http open Incapsula CDN httpd
518745.60.47.218 85 tcp http open Incapsula CDN httpd
518845.60.47.218 88 tcp http open Incapsula CDN httpd
518945.60.47.218 88 udp kerberos-sec unknown
519045.60.47.218 123 udp ntp unknown
519145.60.47.218 137 udp netbios-ns unknown
519245.60.47.218 138 udp netbios-dgm unknown
519345.60.47.218 139 udp netbios-ssn unknown
519445.60.47.218 161 udp snmp unknown
519545.60.47.218 162 udp snmptrap unknown
519645.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
519745.60.47.218 389 udp ldap unknown
519845.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
519945.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
520045.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
520145.60.47.218 446 tcp http open Incapsula CDN httpd
520245.60.47.218 520 udp route unknown
520345.60.47.218 587 tcp http open Incapsula CDN httpd
520445.60.47.218 631 tcp http open Incapsula CDN httpd
520545.60.47.218 888 tcp http open Incapsula CDN httpd
520645.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
520745.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
520845.60.47.218 999 tcp http open Incapsula CDN httpd
520945.60.47.218 1000 tcp http open Incapsula CDN httpd
521045.60.47.218 1024 tcp http open Incapsula CDN httpd
521145.60.47.218 1103 tcp http open Incapsula CDN httpd
521245.60.47.218 1234 tcp http open Incapsula CDN httpd
521345.60.47.218 1433 tcp http open Incapsula CDN httpd
521445.60.47.218 1494 tcp http open Incapsula CDN httpd
521545.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
521645.60.47.218 2001 tcp http open Incapsula CDN httpd
521745.60.47.218 2049 tcp http open Incapsula CDN httpd
521845.60.47.218 2049 udp nfs unknown
521945.60.47.218 2067 tcp http open Incapsula CDN httpd
522045.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
522145.60.47.218 2222 tcp http open Incapsula CDN httpd
522245.60.47.218 2598 tcp http open Incapsula CDN httpd
522345.60.47.218 3000 tcp http open Incapsula CDN httpd
522445.60.47.218 3050 tcp http open Incapsula CDN httpd
522545.60.47.218 3057 tcp http open Incapsula CDN httpd
522645.60.47.218 3299 tcp http open Incapsula CDN httpd
522745.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
522845.60.47.218 3333 tcp http open Incapsula CDN httpd
522945.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
523045.60.47.218 3500 tcp http open Incapsula CDN httpd
523145.60.47.218 3790 tcp http open Incapsula CDN httpd
523245.60.47.218 4000 tcp http open Incapsula CDN httpd
523345.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
523445.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
523545.60.47.218 4848 tcp http open Incapsula CDN httpd
523645.60.47.218 5000 tcp http open Incapsula CDN httpd
523745.60.47.218 5009 tcp http open Incapsula CDN httpd
523845.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
523945.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
524045.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
524145.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
524245.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
524345.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
524445.60.47.218 5555 tcp http open Incapsula CDN httpd
524545.60.47.218 5900 tcp http open Incapsula CDN httpd
524645.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
524745.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
524845.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
524945.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
525045.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
525145.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
525245.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
525345.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
525445.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
525545.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
525645.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
525745.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
525845.60.47.218 5985 tcp http open Incapsula CDN httpd
525945.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
526045.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
526145.60.47.218 6000 tcp http open Incapsula CDN httpd
526245.60.47.218 6060 tcp http open Incapsula CDN httpd
526345.60.47.218 6161 tcp http open Incapsula CDN httpd
526445.60.47.218 6379 tcp http open Incapsula CDN httpd
526545.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
526645.60.47.218 6789 tcp http open Incapsula CDN httpd
526745.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
526845.60.47.218 7001 tcp http open Incapsula CDN httpd
526945.60.47.218 7021 tcp http open Incapsula CDN httpd
527045.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
527145.60.47.218 7080 tcp http open Incapsula CDN httpd
527245.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
527345.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
527445.60.47.218 7700 tcp http open Incapsula CDN httpd
527545.60.47.218 7777 tcp http open Incapsula CDN httpd
527645.60.47.218 7778 tcp http open Incapsula CDN httpd
527745.60.47.218 8000 tcp http open Incapsula CDN httpd
527845.60.47.218 8001 tcp http open Incapsula CDN httpd
527945.60.47.218 8008 tcp http open Incapsula CDN httpd
528045.60.47.218 8014 tcp http open Incapsula CDN httpd
528145.60.47.218 8020 tcp http open Incapsula CDN httpd
528245.60.47.218 8023 tcp http open Incapsula CDN httpd
528345.60.47.218 8028 tcp http open Incapsula CDN httpd
528445.60.47.218 8030 tcp http open Incapsula CDN httpd
528545.60.47.218 8050 tcp http open Incapsula CDN httpd
528645.60.47.218 8051 tcp http open Incapsula CDN httpd
528745.60.47.218 8080 tcp http open Incapsula CDN httpd
528845.60.47.218 8081 tcp http open Incapsula CDN httpd
528945.60.47.218 8082 tcp http open Incapsula CDN httpd
529045.60.47.218 8085 tcp http open Incapsula CDN httpd
529145.60.47.218 8086 tcp http open Incapsula CDN httpd
529245.60.47.218 8087 tcp http open Incapsula CDN httpd
529345.60.47.218 8088 tcp http open Incapsula CDN httpd
529445.60.47.218 8090 tcp http open Incapsula CDN httpd
529545.60.47.218 8091 tcp http open Incapsula CDN httpd
529645.60.47.218 8095 tcp http open Incapsula CDN httpd
529745.60.47.218 8101 tcp http open Incapsula CDN httpd
529845.60.47.218 8161 tcp http open Incapsula CDN httpd
529945.60.47.218 8180 tcp http open Incapsula CDN httpd
530045.60.47.218 8222 tcp http open Incapsula CDN httpd
530145.60.47.218 8333 tcp http open Incapsula CDN httpd
530245.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
530345.60.47.218 8444 tcp http open Incapsula CDN httpd
530445.60.47.218 8445 tcp http open Incapsula CDN httpd
530545.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
530645.60.47.218 8686 tcp http open Incapsula CDN httpd
530745.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
530845.60.47.218 8787 tcp http open Incapsula CDN httpd
530945.60.47.218 8800 tcp http open Incapsula CDN httpd
531045.60.47.218 8812 tcp http open Incapsula CDN httpd
531145.60.47.218 8834 tcp http open Incapsula CDN httpd
531245.60.47.218 8880 tcp http open Incapsula CDN httpd
531345.60.47.218 8888 tcp http open Incapsula CDN httpd
531445.60.47.218 8889 tcp http open Incapsula CDN httpd
531545.60.47.218 8890 tcp http open Incapsula CDN httpd
531645.60.47.218 8899 tcp http open Incapsula CDN httpd
531745.60.47.218 8901 tcp http open Incapsula CDN httpd
531845.60.47.218 8902 tcp http open Incapsula CDN httpd
531945.60.47.218 8999 tcp http open Incapsula CDN httpd
532045.60.47.218 9000 tcp http open Incapsula CDN httpd
532145.60.47.218 9001 tcp http open Incapsula CDN httpd
532245.60.47.218 9002 tcp http open Incapsula CDN httpd
532345.60.47.218 9003 tcp http open Incapsula CDN httpd
532445.60.47.218 9004 tcp http open Incapsula CDN httpd
532545.60.47.218 9005 tcp http open Incapsula CDN httpd
532645.60.47.218 9010 tcp http open Incapsula CDN httpd
532745.60.47.218 9050 tcp http open Incapsula CDN httpd
532845.60.47.218 9080 tcp http open Incapsula CDN httpd
532945.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
533045.60.47.218 9084 tcp http open Incapsula CDN httpd
533145.60.47.218 9090 tcp http open Incapsula CDN httpd
533245.60.47.218 9099 tcp http open Incapsula CDN httpd
533345.60.47.218 9100 tcp jetdirect open
533445.60.47.218 9111 tcp http open Incapsula CDN httpd
533545.60.47.218 9200 tcp http open Incapsula CDN httpd
533645.60.47.218 9300 tcp http open Incapsula CDN httpd
533745.60.47.218 9500 tcp http open Incapsula CDN httpd
533845.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
533945.60.47.218 9991 tcp http open Incapsula CDN httpd
534045.60.47.218 9999 tcp http open Incapsula CDN httpd
534145.60.47.218 10000 tcp http open Incapsula CDN httpd
534245.60.47.218 10001 tcp http open Incapsula CDN httpd
534345.60.47.218 10008 tcp http open Incapsula CDN httpd
534445.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
534545.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
534645.60.47.218 12174 tcp http open Incapsula CDN httpd
534745.60.47.218 12203 tcp http open Incapsula CDN httpd
534845.60.47.218 12221 tcp http open Incapsula CDN httpd
534945.60.47.218 12345 tcp http open Incapsula CDN httpd
535045.60.47.218 12397 tcp http open Incapsula CDN httpd
535145.60.47.218 12401 tcp http open Incapsula CDN httpd
535245.60.47.218 14330 tcp http open Incapsula CDN httpd
535345.60.47.218 16000 tcp http open Incapsula CDN httpd
535445.60.47.218 20000 tcp http open Incapsula CDN httpd
535545.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
535645.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
535745.60.47.218 30000 tcp http open Incapsula CDN httpd
535845.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
535945.60.47.218 50000 tcp http open Incapsula CDN httpd
536045.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
536145.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
536245.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
536345.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
536445.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
536545.88.202.111 67 tcp dhcps closed
536645.88.202.111 67 udp dhcps unknown
536745.88.202.111 68 tcp dhcpc closed
536845.88.202.111 68 udp dhcpc unknown
536945.88.202.111 69 tcp tftp closed
537045.88.202.111 69 udp tftp closed
537145.88.202.111 80 tcp http open nginx
537245.88.202.111 88 tcp kerberos-sec closed
537345.88.202.111 88 udp kerberos-sec unknown
537445.88.202.111 123 tcp ntp closed
537545.88.202.111 123 udp ntp closed
537645.88.202.111 137 tcp netbios-ns closed
537745.88.202.111 137 udp netbios-ns filtered
537845.88.202.111 138 tcp netbios-dgm closed
537945.88.202.111 138 udp netbios-dgm filtered
538045.88.202.111 139 tcp netbios-ssn closed
538145.88.202.111 139 udp netbios-ssn closed
538245.88.202.111 161 tcp snmp closed
538345.88.202.111 161 udp snmp closed
538445.88.202.111 162 tcp snmptrap closed
538545.88.202.111 162 udp snmptrap closed
538645.88.202.111 179 tcp bgp filtered
538745.88.202.111 389 tcp ldap closed
538845.88.202.111 389 udp ldap unknown
538945.88.202.111 443 tcp ssl/http open nginx
539045.88.202.111 520 tcp efs closed
539145.88.202.111 520 udp route unknown
539245.88.202.111 2049 tcp nfs closed
539345.88.202.111 2049 udp nfs closed
539445.88.202.111 10050 tcp tcpwrapped open
539545.239.108.252 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
539645.239.108.252 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
539745.239.108.252 67 tcp dhcps filtered
539845.239.108.252 67 udp dhcps unknown
539945.239.108.252 68 tcp dhcpc filtered
540045.239.108.252 68 udp dhcpc unknown
540145.239.108.252 69 tcp tftp filtered
540245.239.108.252 69 udp tftp unknown
540345.239.108.252 88 tcp kerberos-sec filtered
540445.239.108.252 88 udp kerberos-sec unknown
540545.239.108.252 123 tcp ntp filtered
540645.239.108.252 123 udp ntp unknown
540745.239.108.252 137 tcp netbios-ns filtered
540845.239.108.252 137 udp netbios-ns unknown
540945.239.108.252 138 tcp netbios-dgm filtered
541045.239.108.252 138 udp netbios-dgm unknown
541145.239.108.252 139 tcp netbios-ssn filtered
541245.239.108.252 139 udp netbios-ssn unknown
541345.239.108.252 161 tcp snmp filtered
541445.239.108.252 161 udp snmp unknown
541545.239.108.252 162 tcp snmptrap filtered
541645.239.108.252 162 udp snmptrap unknown
541745.239.108.252 389 tcp ldap filtered
541845.239.108.252 389 udp ldap unknown
541945.239.108.252 520 tcp efs filtered
542045.239.108.252 520 udp route unknown
542145.239.108.252 2049 tcp nfs filtered
542245.239.108.252 2049 udp nfs unknown
542352.1.2.24 53 tcp domain filtered
542452.1.2.24 53 udp domain unknown
542552.1.2.24 67 tcp dhcps filtered
542652.1.2.24 67 udp dhcps unknown
542752.1.2.24 68 tcp dhcpc filtered
542852.1.2.24 68 udp dhcpc unknown
542952.1.2.24 69 tcp tftp filtered
543052.1.2.24 69 udp tftp unknown
543152.1.2.24 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
543252.1.2.24 88 tcp kerberos-sec filtered
543352.1.2.24 88 udp kerberos-sec unknown
543452.1.2.24 123 tcp ntp filtered
543552.1.2.24 123 udp ntp unknown
543652.1.2.24 137 tcp netbios-ns filtered
543752.1.2.24 137 udp netbios-ns unknown
543852.1.2.24 138 tcp netbios-dgm filtered
543952.1.2.24 138 udp netbios-dgm unknown
544052.1.2.24 139 tcp netbios-ssn filtered
544152.1.2.24 139 udp netbios-ssn unknown
544252.1.2.24 161 tcp snmp filtered
544352.1.2.24 161 udp snmp unknown
544452.1.2.24 162 tcp snmptrap filtered
544552.1.2.24 162 udp snmptrap unknown
544652.1.2.24 389 tcp ldap filtered
544752.1.2.24 389 udp ldap unknown
544852.1.2.24 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
544952.1.2.24 520 tcp efs filtered
545052.1.2.24 520 udp route unknown
545152.1.2.24 2049 tcp nfs filtered
545252.1.2.24 2049 udp nfs unknown
545352.1.174.10 53 tcp domain filtered
545452.1.174.10 53 udp domain unknown
545552.1.174.10 67 tcp dhcps filtered
545652.1.174.10 67 udp dhcps unknown
545752.1.174.10 68 tcp dhcpc filtered
545852.1.174.10 68 udp dhcpc unknown
545952.1.174.10 69 tcp tftp filtered
546052.1.174.10 69 udp tftp unknown
546152.1.174.10 80 tcp http open nginx
546252.1.174.10 88 tcp kerberos-sec filtered
546352.1.174.10 88 udp kerberos-sec unknown
546452.1.174.10 123 tcp ntp filtered
546552.1.174.10 123 udp ntp unknown
546652.1.174.10 137 tcp netbios-ns filtered
546752.1.174.10 137 udp netbios-ns unknown
546852.1.174.10 138 tcp netbios-dgm filtered
546952.1.174.10 138 udp netbios-dgm unknown
547052.1.174.10 139 tcp netbios-ssn filtered
547152.1.174.10 139 udp netbios-ssn unknown
547252.1.174.10 161 tcp snmp filtered
547352.1.174.10 161 udp snmp unknown
547452.1.174.10 162 tcp snmptrap filtered
547552.1.174.10 162 udp snmptrap unknown
547652.1.174.10 389 tcp ldap filtered
547752.1.174.10 389 udp ldap unknown
547852.1.174.10 443 tcp ssl/http open nginx
547952.1.174.10 520 tcp efs filtered
548052.1.174.10 520 udp route unknown
548152.1.174.10 2049 tcp nfs filtered
548252.1.174.10 2049 udp nfs unknown
548352.30.54.73 53 tcp domain closed
548452.30.54.73 53 udp domain unknown
548552.30.54.73 67 tcp dhcps closed
548652.30.54.73 67 udp dhcps unknown
548752.30.54.73 68 tcp dhcpc closed
548852.30.54.73 68 udp dhcpc unknown
548952.30.54.73 69 tcp tftp closed
549052.30.54.73 69 udp tftp unknown
549152.30.54.73 80 tcp http open nginx
549252.30.54.73 88 tcp kerberos-sec closed
549352.30.54.73 88 udp kerberos-sec unknown
549452.30.54.73 123 tcp ntp closed
549552.30.54.73 123 udp ntp unknown
549652.30.54.73 137 tcp netbios-ns closed
549752.30.54.73 137 udp netbios-ns unknown
549852.30.54.73 138 tcp netbios-dgm closed
549952.30.54.73 138 udp netbios-dgm unknown
550052.30.54.73 139 tcp netbios-ssn closed
550152.30.54.73 139 udp netbios-ssn unknown
550252.30.54.73 161 tcp snmp closed
550352.30.54.73 161 udp snmp unknown
550452.30.54.73 162 tcp snmptrap closed
550552.30.54.73 162 udp snmptrap unknown
550652.30.54.73 389 tcp ldap closed
550752.30.54.73 389 udp ldap unknown
550852.30.54.73 443 tcp ssl/http open nginx
550952.30.54.73 520 tcp efs closed
551052.30.54.73 520 udp route unknown
551152.30.54.73 2049 tcp nfs closed
551252.30.54.73 2049 udp nfs unknown
551352.52.234.222 53 tcp domain filtered
551452.52.234.222 53 udp domain unknown
551552.52.234.222 67 tcp dhcps filtered
551652.52.234.222 67 udp dhcps unknown
551752.52.234.222 68 tcp dhcpc filtered
551852.52.234.222 68 udp dhcpc unknown
551952.52.234.222 69 tcp tftp filtered
552052.52.234.222 69 udp tftp unknown
552152.52.234.222 88 tcp kerberos-sec filtered
552252.52.234.222 88 udp kerberos-sec unknown
552352.52.234.222 123 tcp ntp filtered
552452.52.234.222 123 udp ntp unknown
552552.52.234.222 137 tcp netbios-ns filtered
552652.52.234.222 137 udp netbios-ns unknown
552752.52.234.222 138 tcp netbios-dgm filtered
552852.52.234.222 138 udp netbios-dgm unknown
552952.52.234.222 139 tcp netbios-ssn filtered
553052.52.234.222 139 udp netbios-ssn unknown
553152.52.234.222 161 tcp snmp filtered
553252.52.234.222 161 udp snmp unknown
553352.52.234.222 162 tcp snmptrap filtered
553452.52.234.222 162 udp snmptrap unknown
553552.52.234.222 389 tcp ldap filtered
553652.52.234.222 389 udp ldap unknown
553752.52.234.222 520 tcp efs filtered
553852.52.234.222 520 udp route unknown
553952.52.234.222 2049 tcp nfs filtered
554052.52.234.222 2049 udp nfs unknown
554152.138.144.162 53 tcp domain filtered
554252.138.144.162 53 udp domain unknown
554352.138.144.162 67 tcp dhcps filtered
554452.138.144.162 67 udp dhcps unknown
554552.138.144.162 68 tcp dhcpc filtered
554652.138.144.162 68 udp dhcpc unknown
554752.138.144.162 69 tcp tftp filtered
554852.138.144.162 69 udp tftp unknown
554952.138.144.162 80 tcp http open Microsoft IIS httpd 7.5
555052.138.144.162 88 tcp kerberos-sec filtered
555152.138.144.162 88 udp kerberos-sec unknown
555252.138.144.162 123 tcp ntp filtered
555352.138.144.162 123 udp ntp unknown
555452.138.144.162 137 tcp netbios-ns filtered
555552.138.144.162 137 udp netbios-ns unknown
555652.138.144.162 138 tcp netbios-dgm filtered
555752.138.144.162 138 udp netbios-dgm unknown
555852.138.144.162 139 tcp netbios-ssn filtered
555952.138.144.162 139 udp netbios-ssn unknown
556052.138.144.162 161 tcp snmp filtered
556152.138.144.162 161 udp snmp unknown
556252.138.144.162 162 tcp snmptrap filtered
556352.138.144.162 162 udp snmptrap unknown
556452.138.144.162 389 tcp ldap filtered
556552.138.144.162 389 udp ldap unknown
556652.138.144.162 443 tcp ssl/http open Microsoft IIS httpd 7.5
556752.138.144.162 520 tcp efs filtered
556852.138.144.162 520 udp route unknown
556952.138.144.162 2049 tcp nfs filtered
557052.138.144.162 2049 udp nfs unknown
557152.138.144.162 3911 tcp http open Microsoft IIS httpd 7.5
557252.138.144.162 3912 tcp ssl/http open Microsoft IIS httpd 7.5
557352.138.144.162 7777 tcp http open Microsoft IIS httpd 7.5
557452.138.144.162 8080 tcp ssl/http open Microsoft IIS httpd 10.0
557552.138.144.162 8089 tcp ssl/http open Microsoft IIS httpd 7.5
557652.138.144.162 8888 tcp http open Microsoft IIS httpd 7.5
557752.138.144.162 9090 tcp http open Microsoft IIS httpd 7.5
557852.138.144.162 9191 tcp http open Microsoft IIS httpd 7.5
557952.138.144.162 9999 tcp http open Microsoft IIS httpd 7.5
558052.138.144.162 65503 tcp http open Microsoft HTTPAPI httpd 2.0 SSDP/UPnP
558152.138.144.162 65504 tcp http open Microsoft HTTPAPI httpd 2.0 SSDP/UPnP
558254.36.158.42 22 tcp ssh open OpenSSH 7.4 protocol 2.0
558354.36.158.42 53 udp domain unknown
558454.36.158.42 67 udp dhcps unknown
558554.36.158.42 68 udp dhcpc unknown
558654.36.158.42 80 tcp http-proxy open HAProxy http proxy 1.3.1 or later
558754.36.158.42 137 udp netbios-ns unknown
558854.36.158.42 139 udp netbios-ssn unknown
558954.36.158.42 443 tcp ssl/http-proxy open HAProxy http proxy 1.3.1 or later
559054.36.158.42 2049 udp nfs unknown
559154.36.158.42 5000 tcp http open Apache httpd
559254.36.158.42 8088 tcp radan-http open
559354.36.158.42 22222 tcp ssh open OpenSSH 7.4 protocol 2.0
559454.72.57.25 53 tcp domain closed
559554.72.57.25 53 udp domain unknown
559654.72.57.25 67 tcp dhcps closed
559754.72.57.25 67 udp dhcps unknown
559854.72.57.25 68 tcp dhcpc closed
559954.72.57.25 68 udp dhcpc unknown
560054.72.57.25 69 tcp tftp closed
560154.72.57.25 69 udp tftp unknown
560254.72.57.25 80 tcp http open nginx
560354.72.57.25 88 tcp kerberos-sec closed
560454.72.57.25 88 udp kerberos-sec unknown
560554.72.57.25 123 tcp ntp closed
560654.72.57.25 123 udp ntp unknown
560754.72.57.25 137 tcp netbios-ns closed
560854.72.57.25 137 udp netbios-ns unknown
560954.72.57.25 138 tcp netbios-dgm closed
561054.72.57.25 138 udp netbios-dgm unknown
561154.72.57.25 139 tcp netbios-ssn closed
561254.72.57.25 139 udp netbios-ssn unknown
561354.72.57.25 161 tcp snmp closed
561454.72.57.25 161 udp snmp unknown
561554.72.57.25 162 tcp snmptrap closed
561654.72.57.25 162 udp snmptrap unknown
561754.72.57.25 389 tcp ldap closed
561854.72.57.25 389 udp ldap unknown
561954.72.57.25 443 tcp ssl/http open nginx
562054.72.57.25 520 tcp efs closed
562154.72.57.25 520 udp route unknown
562254.72.57.25 2049 tcp nfs closed
562354.72.57.25 2049 udp nfs unknown
562454.85.59.109 53 tcp domain filtered
562554.85.59.109 53 udp domain unknown
562654.85.59.109 67 tcp dhcps filtered
562754.85.59.109 67 udp dhcps unknown
562854.85.59.109 68 tcp dhcpc filtered
562954.85.59.109 68 udp dhcpc unknown
563054.85.59.109 69 tcp tftp filtered
563154.85.59.109 69 udp tftp unknown
563254.85.59.109 80 tcp http open nginx
563354.85.59.109 88 tcp kerberos-sec filtered
563454.85.59.109 88 udp kerberos-sec unknown
563554.85.59.109 123 tcp ntp filtered
563654.85.59.109 123 udp ntp unknown
563754.85.59.109 137 tcp netbios-ns filtered
563854.85.59.109 137 udp netbios-ns unknown
563954.85.59.109 138 tcp netbios-dgm filtered
564054.85.59.109 138 udp netbios-dgm unknown
564154.85.59.109 139 tcp netbios-ssn filtered
564254.85.59.109 139 udp netbios-ssn unknown
564354.85.59.109 161 tcp snmp filtered
564454.85.59.109 161 udp snmp unknown
564554.85.59.109 162 tcp snmptrap filtered
564654.85.59.109 162 udp snmptrap unknown
564754.85.59.109 389 tcp ldap filtered
564854.85.59.109 389 udp ldap unknown
564954.85.59.109 443 tcp ssl/http open nginx
565054.85.59.109 520 tcp efs filtered
565154.85.59.109 520 udp route unknown
565254.85.59.109 2049 tcp nfs filtered
565354.85.59.109 2049 udp nfs unknown
565454.194.134.190 53 tcp domain closed
565554.194.134.190 53 udp domain unknown
565654.194.134.190 67 tcp dhcps closed
565754.194.134.190 67 udp dhcps unknown
565854.194.134.190 68 tcp dhcpc closed
565954.194.134.190 68 udp dhcpc unknown
566054.194.134.190 69 tcp tftp closed
566154.194.134.190 69 udp tftp unknown
566254.194.134.190 80 tcp http open nginx
566354.194.134.190 88 tcp kerberos-sec closed
566454.194.134.190 88 udp kerberos-sec unknown
566554.194.134.190 123 tcp ntp closed
566654.194.134.190 123 udp ntp unknown
566754.194.134.190 137 tcp netbios-ns closed
566854.194.134.190 137 udp netbios-ns unknown
566954.194.134.190 138 tcp netbios-dgm closed
567054.194.134.190 138 udp netbios-dgm unknown
567154.194.134.190 139 tcp netbios-ssn closed
567254.194.134.190 139 udp netbios-ssn unknown
567354.194.134.190 161 tcp snmp closed
567454.194.134.190 161 udp snmp unknown
567554.194.134.190 162 tcp snmptrap closed
567654.194.134.190 162 udp snmptrap unknown
567754.194.134.190 389 tcp ldap closed
567854.194.134.190 389 udp ldap unknown
567954.194.134.190 443 tcp ssl/http open nginx
568054.194.134.190 520 tcp efs closed
568154.194.134.190 520 udp route unknown
568254.194.134.190 2049 tcp nfs closed
568354.194.134.190 2049 udp nfs unknown
568464.69.94.253 53 tcp domain filtered
568564.69.94.253 53 udp domain unknown
568664.69.94.253 67 tcp dhcps filtered
568764.69.94.253 67 udp dhcps unknown
568864.69.94.253 68 tcp dhcpc filtered
568964.69.94.253 68 udp dhcpc unknown
569064.69.94.253 69 tcp tftp filtered
569164.69.94.253 69 udp tftp unknown
569264.69.94.253 88 tcp kerberos-sec filtered
569364.69.94.253 88 udp kerberos-sec unknown
569464.69.94.253 123 tcp ntp filtered
569564.69.94.253 123 udp ntp unknown
569664.69.94.253 137 tcp netbios-ns filtered
569764.69.94.253 137 udp netbios-ns unknown
569864.69.94.253 138 tcp netbios-dgm filtered
569964.69.94.253 138 udp netbios-dgm unknown
570064.69.94.253 139 tcp netbios-ssn filtered
570164.69.94.253 139 udp netbios-ssn unknown
570264.69.94.253 161 tcp snmp filtered
570364.69.94.253 161 udp snmp unknown
570464.69.94.253 162 tcp snmptrap filtered
570564.69.94.253 162 udp snmptrap unknown
570664.69.94.253 389 tcp ldap filtered
570764.69.94.253 389 udp ldap unknown
570864.69.94.253 520 tcp efs filtered
570964.69.94.253 520 udp route unknown
571064.69.94.253 2049 tcp nfs filtered
571164.69.94.253 2049 udp nfs unknown
571267.205.1.246 21 tcp ftp open ProFTPD
571367.205.1.246 22 tcp ssh open OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 Ubuntu Linux; protocol 2.0
571467.205.1.246 25 tcp smtp open Postfix smtpd
571567.205.1.246 53 tcp domain closed
571667.205.1.246 53 udp domain closed
571767.205.1.246 67 tcp dhcps closed
571867.205.1.246 67 udp dhcps closed
571967.205.1.246 68 tcp dhcpc closed
572067.205.1.246 68 udp dhcpc closed
572167.205.1.246 69 tcp tftp closed
572267.205.1.246 69 udp tftp unknown
572367.205.1.246 80 tcp http open Apache httpd
572467.205.1.246 88 tcp kerberos-sec closed
572567.205.1.246 88 udp kerberos-sec unknown
572667.205.1.246 111 tcp rpcbind filtered
572767.205.1.246 123 tcp ntp closed
572867.205.1.246 123 udp ntp unknown
572967.205.1.246 137 tcp netbios-ns closed
573067.205.1.246 137 udp netbios-ns closed
573167.205.1.246 138 tcp netbios-dgm closed
573267.205.1.246 138 udp netbios-dgm unknown
573367.205.1.246 139 tcp netbios-ssn closed
573467.205.1.246 139 udp netbios-ssn closed
573567.205.1.246 161 tcp snmp closed
573667.205.1.246 161 udp snmp unknown
573767.205.1.246 162 tcp snmptrap closed
573867.205.1.246 162 udp snmptrap unknown
573967.205.1.246 389 tcp ldap closed
574067.205.1.246 389 udp ldap unknown
574167.205.1.246 443 tcp ssl/http open Apache httpd
574267.205.1.246 520 tcp efs closed
574367.205.1.246 520 udp route unknown
574467.205.1.246 587 tcp smtp open Postfix smtpd
574567.205.1.246 1030 tcp iad1 filtered
574667.205.1.246 2049 tcp nfs closed
574767.205.1.246 2049 udp nfs unknown
574867.205.1.246 5666 tcp nrpe filtered
574967.205.1.246 8901 tcp jmb-cds2 filtered
575067.205.1.246 8902 tcp filtered
575169.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
575269.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
575369.163.233.4 25 tcp open
575469.163.233.4 53 tcp domain closed
575569.163.233.4 53 udp domain unknown
575669.163.233.4 67 tcp dhcps closed
575769.163.233.4 67 udp dhcps closed
575869.163.233.4 68 tcp dhcpc closed
575969.163.233.4 68 udp dhcpc unknown
576069.163.233.4 69 tcp tftp closed
576169.163.233.4 69 udp tftp closed
576269.163.233.4 88 tcp kerberos-sec closed
576369.163.233.4 88 udp kerberos-sec unknown
576469.163.233.4 123 tcp ntp closed
576569.163.233.4 123 udp ntp unknown
576669.163.233.4 137 tcp netbios-ns closed
576769.163.233.4 137 udp netbios-ns closed
576869.163.233.4 138 tcp netbios-dgm closed
576969.163.233.4 138 udp netbios-dgm closed
577069.163.233.4 139 tcp netbios-ssn closed
577169.163.233.4 139 udp netbios-ssn unknown
577269.163.233.4 161 tcp snmp closed
577369.163.233.4 161 udp snmp closed
577469.163.233.4 162 tcp snmptrap closed
577569.163.233.4 162 udp snmptrap closed
577669.163.233.4 389 tcp ldap closed
577769.163.233.4 389 udp ldap unknown
577869.163.233.4 520 tcp efs closed
577969.163.233.4 520 udp route closed
578069.163.233.4 2049 tcp nfs closed
578169.163.233.4 2049 udp nfs unknown
578274.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
578374.117.180.192 22 tcp ssh filtered
578474.117.180.192 25 tcp smtp filtered
578574.117.180.192 53 tcp domain closed
578674.117.180.192 53 udp domain unknown
578774.117.180.192 67 tcp dhcps closed
578874.117.180.192 67 udp dhcps unknown
578974.117.180.192 68 tcp dhcpc closed
579074.117.180.192 68 udp dhcpc closed
579174.117.180.192 69 tcp tftp closed
579274.117.180.192 69 udp tftp closed
579374.117.180.192 80 tcp http filtered
579474.117.180.192 88 tcp kerberos-sec closed
579574.117.180.192 88 udp kerberos-sec closed
579674.117.180.192 110 tcp pop3 filtered
579774.117.180.192 111 tcp rpcbind filtered
579874.117.180.192 123 tcp ntp closed
579974.117.180.192 123 udp ntp unknown
580074.117.180.192 137 tcp netbios-ns closed
580174.117.180.192 137 udp netbios-ns closed
580274.117.180.192 138 tcp netbios-dgm closed
580374.117.180.192 138 udp netbios-dgm unknown
580474.117.180.192 139 tcp netbios-ssn closed
580574.117.180.192 139 udp netbios-ssn unknown
580674.117.180.192 143 tcp imap filtered
580774.117.180.192 161 tcp snmp closed
580874.117.180.192 161 udp snmp closed
580974.117.180.192 162 tcp snmptrap closed
581074.117.180.192 162 udp snmptrap unknown
581174.117.180.192 323 tcp rpki-rtr filtered
581274.117.180.192 389 tcp ldap closed
581374.117.180.192 389 udp ldap closed
581474.117.180.192 443 tcp https filtered
581574.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
581674.117.180.192 520 tcp efs closed
581774.117.180.192 520 udp route unknown
581874.117.180.192 587 tcp submission filtered
581974.117.180.192 873 tcp rsync filtered
582074.117.180.192 993 tcp imaps filtered
582174.117.180.192 995 tcp pop3s filtered
582274.117.180.192 2049 tcp nfs closed
582374.117.180.192 2049 udp nfs closed
582474.117.180.192 2525 tcp smtp open Exim smtpd
582574.117.180.192 3306 tcp mysql filtered
582674.117.180.192 4949 tcp tcpwrapped open
582774.117.180.192 5666 tcp tcpwrapped open
582874.117.180.192 6380 tcp filtered
582974.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
583074.117.180.192 11211 tcp memcache filtered
583182.94.222.131 53 udp domain unknown
583282.94.222.131 67 udp dhcps unknown
583382.94.222.131 68 udp dhcpc unknown
583482.94.222.131 69 udp tftp unknown
583582.94.222.131 88 udp kerberos-sec unknown
583682.94.222.131 123 udp ntp unknown
583782.94.222.131 137 udp netbios-ns unknown
583882.94.222.131 138 udp netbios-dgm unknown
583982.94.222.131 139 udp netbios-ssn unknown
584082.94.222.131 161 udp snmp unknown
584182.94.222.131 162 udp snmptrap unknown
584282.94.222.131 389 udp ldap unknown
584382.94.222.131 520 udp route unknown
584482.94.222.131 2049 udp nfs unknown
584582.94.222.134 53 udp domain unknown
584682.94.222.134 67 udp dhcps unknown
584782.94.222.134 68 udp dhcpc unknown
584882.94.222.134 69 udp tftp unknown
584982.94.222.134 88 udp kerberos-sec unknown
585082.94.222.134 123 udp ntp unknown
585182.94.222.134 137 udp netbios-ns unknown
585282.94.222.134 138 udp netbios-dgm unknown
585382.94.222.134 139 udp netbios-ssn unknown
585482.94.222.134 161 udp snmp unknown
585582.94.222.134 162 udp snmptrap unknown
585682.94.222.134 389 udp ldap unknown
585782.94.222.134 520 udp route unknown
585882.94.222.134 2049 udp nfs unknown
585982.94.228.245 53 tcp domain filtered
586082.94.228.245 53 udp domain unknown
586182.94.228.245 67 tcp dhcps filtered
586282.94.228.245 67 udp dhcps unknown
586382.94.228.245 68 tcp dhcpc filtered
586482.94.228.245 68 udp dhcpc unknown
586582.94.228.245 69 tcp tftp filtered
586682.94.228.245 69 udp tftp unknown
586782.94.228.245 80 tcp http open nginx
586882.94.228.245 88 tcp kerberos-sec filtered
586982.94.228.245 88 udp kerberos-sec unknown
587082.94.228.245 122 tcp ssh open OpenSSH 6.0p1 Debian 4+deb7u7 protocol 2.0
587182.94.228.245 123 tcp ntp filtered
587282.94.228.245 123 udp ntp unknown
587382.94.228.245 137 tcp netbios-ns filtered
587482.94.228.245 137 udp netbios-ns unknown
587582.94.228.245 138 tcp netbios-dgm filtered
587682.94.228.245 138 udp netbios-dgm unknown
587782.94.228.245 139 tcp netbios-ssn filtered
587882.94.228.245 139 udp netbios-ssn unknown
587982.94.228.245 161 tcp snmp filtered
588082.94.228.245 161 udp snmp unknown
588182.94.228.245 162 tcp snmptrap filtered
588282.94.228.245 162 udp snmptrap unknown
588382.94.228.245 389 tcp ldap filtered
588482.94.228.245 389 udp ldap unknown
588582.94.228.245 443 tcp ssl/http open nginx
588682.94.228.245 520 tcp efs filtered
588782.94.228.245 520 udp route unknown
588882.94.228.245 2049 tcp nfs filtered
588982.94.228.245 2049 udp nfs unknown
589082.94.228.245 38754 tcp ssh open OpenSSH 6.0p1 Debian 4+deb7u7 protocol 2.0
589189.248.172.178 21 tcp ftp open ProFTPD or KnFTPD
589289.248.172.178 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
589389.248.172.178 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
589489.248.172.178 67 tcp dhcps filtered
589589.248.172.178 67 udp dhcps unknown
589689.248.172.178 68 tcp dhcpc filtered
589789.248.172.178 68 udp dhcpc unknown
589889.248.172.178 69 tcp tftp filtered
589989.248.172.178 69 udp tftp unknown
590089.248.172.178 80 tcp http open nginx 1.16.1
590189.248.172.178 88 tcp kerberos-sec filtered
590289.248.172.178 88 udp kerberos-sec unknown
590389.248.172.178 123 tcp ntp filtered
590489.248.172.178 123 udp ntp unknown
590589.248.172.178 137 tcp netbios-ns filtered
590689.248.172.178 137 udp netbios-ns unknown
590789.248.172.178 138 tcp netbios-dgm filtered
590889.248.172.178 138 udp netbios-dgm unknown
590989.248.172.178 139 tcp netbios-ssn filtered
591089.248.172.178 139 udp netbios-ssn unknown
591189.248.172.178 161 tcp snmp filtered
591289.248.172.178 161 udp snmp unknown
591389.248.172.178 162 tcp snmptrap filtered
591489.248.172.178 162 udp snmptrap unknown
591589.248.172.178 389 tcp ldap filtered
591689.248.172.178 389 udp ldap unknown
591789.248.172.178 520 tcp efs filtered
591889.248.172.178 520 udp route unknown
591989.248.172.178 2049 tcp nfs filtered
592089.248.172.178 2049 udp nfs unknown
592189.248.172.178 10050 tcp tcpwrapped open
592289.248.172.200 22 tcp ssh open SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
592389.248.172.200 53 tcp domain closed
592489.248.172.200 53 udp domain unknown
592589.248.172.200 67 tcp dhcps closed
592689.248.172.200 67 udp dhcps closed
592789.248.172.200 68 tcp dhcpc closed
592889.248.172.200 68 udp dhcpc closed
592989.248.172.200 69 tcp tftp closed
593089.248.172.200 69 udp tftp unknown
593189.248.172.200 88 tcp kerberos-sec closed
593289.248.172.200 88 udp kerberos-sec closed
593389.248.172.200 123 tcp ntp closed
593489.248.172.200 123 udp ntp unknown
593589.248.172.200 137 tcp netbios-ns closed
593689.248.172.200 137 udp netbios-ns closed
593789.248.172.200 138 tcp netbios-dgm closed
593889.248.172.200 138 udp netbios-dgm closed
593989.248.172.200 139 tcp netbios-ssn closed
594089.248.172.200 139 udp netbios-ssn unknown
594189.248.172.200 161 tcp snmp closed
594289.248.172.200 161 udp snmp unknown
594389.248.172.200 162 tcp snmptrap closed
594489.248.172.200 162 udp snmptrap closed
594589.248.172.200 389 tcp ldap closed
594689.248.172.200 389 udp ldap unknown
594789.248.172.200 520 tcp efs closed
594889.248.172.200 520 udp route unknown
594989.248.172.200 2049 tcp nfs closed
595089.248.172.200 2049 udp nfs closed
595192.123.250.35 53 tcp domain closed
595292.123.250.35 53 udp domain closed
595392.123.250.35 67 tcp dhcps filtered
595492.123.250.35 67 udp dhcps unknown
595592.123.250.35 68 tcp dhcpc filtered
595692.123.250.35 68 udp dhcpc unknown
595792.123.250.35 69 tcp tftp filtered
595892.123.250.35 69 udp tftp unknown
595992.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
596092.123.250.35 88 tcp kerberos-sec filtered
596192.123.250.35 88 udp kerberos-sec unknown
596292.123.250.35 123 tcp ntp filtered
596392.123.250.35 123 udp ntp unknown
596492.123.250.35 137 tcp netbios-ns filtered
596592.123.250.35 137 udp netbios-ns unknown
596692.123.250.35 138 tcp netbios-dgm filtered
596792.123.250.35 138 udp netbios-dgm unknown
596892.123.250.35 139 tcp netbios-ssn filtered
596992.123.250.35 139 udp netbios-ssn unknown
597092.123.250.35 161 tcp snmp filtered
597192.123.250.35 161 udp snmp unknown
597292.123.250.35 162 tcp snmptrap filtered
597392.123.250.35 162 udp snmptrap unknown
597492.123.250.35 389 tcp ldap filtered
597592.123.250.35 389 udp ldap unknown
597692.123.250.35 443 tcp ssl/https open
597792.123.250.35 520 tcp efs filtered
597892.123.250.35 520 udp route unknown
597992.123.250.35 2049 tcp nfs filtered
598092.123.250.35 2049 udp nfs unknown
598192.123.250.35 8883 tcp secure-mqtt open
598292.123.250.65 53 tcp domain filtered
598392.123.250.65 53 udp domain unknown
598492.123.250.65 67 tcp dhcps filtered
598592.123.250.65 67 udp dhcps unknown
598692.123.250.65 68 tcp dhcpc filtered
598792.123.250.65 68 udp dhcpc unknown
598892.123.250.65 69 tcp tftp filtered
598992.123.250.65 69 udp tftp unknown
599092.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
599192.123.250.65 88 tcp kerberos-sec filtered
599292.123.250.65 88 udp kerberos-sec unknown
599392.123.250.65 123 tcp ntp filtered
599492.123.250.65 123 udp ntp unknown
599592.123.250.65 137 tcp netbios-ns filtered
599692.123.250.65 137 udp netbios-ns unknown
599792.123.250.65 138 tcp netbios-dgm filtered
599892.123.250.65 138 udp netbios-dgm unknown
599992.123.250.65 139 tcp netbios-ssn filtered
600092.123.250.65 139 udp netbios-ssn unknown
600192.123.250.65 161 tcp snmp filtered
600292.123.250.65 161 udp snmp unknown
600392.123.250.65 162 tcp snmptrap filtered
600492.123.250.65 162 udp snmptrap unknown
600592.123.250.65 389 tcp ldap filtered
600692.123.250.65 389 udp ldap unknown
600792.123.250.65 443 tcp ssl/https open
600892.123.250.65 520 tcp efs filtered
600992.123.250.65 520 udp route unknown
601092.123.250.65 2049 tcp nfs filtered
601192.123.250.65 2049 udp nfs unknown
601292.123.250.65 8883 tcp secure-mqtt open
601394.102.51.111 22 tcp ssh open
601494.102.51.111 25 tcp smtp open Exim smtpd 4.89
601594.102.51.111 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
601694.102.51.111 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
601794.102.51.111 67 tcp dhcps filtered
601894.102.51.111 67 udp dhcps unknown
601994.102.51.111 68 tcp dhcpc filtered
602094.102.51.111 68 udp dhcpc unknown
602194.102.51.111 69 tcp tftp filtered
602294.102.51.111 69 udp tftp unknown
602394.102.51.111 80 tcp http open nginx
602494.102.51.111 88 tcp kerberos-sec filtered
602594.102.51.111 88 udp kerberos-sec unknown
602694.102.51.111 110 tcp pop3 open Dovecot pop3d
602794.102.51.111 123 tcp ntp filtered
602894.102.51.111 123 udp ntp unknown
602994.102.51.111 137 tcp netbios-ns filtered
603094.102.51.111 137 udp netbios-ns unknown
603194.102.51.111 138 tcp netbios-dgm filtered
603294.102.51.111 138 udp netbios-dgm unknown
603394.102.51.111 139 tcp netbios-ssn filtered
603494.102.51.111 139 udp netbios-ssn unknown
603594.102.51.111 143 tcp imap open Dovecot imapd
603694.102.51.111 161 tcp snmp filtered
603794.102.51.111 161 udp snmp unknown
603894.102.51.111 162 tcp snmptrap filtered
603994.102.51.111 162 udp snmptrap unknown
604094.102.51.111 389 tcp ldap filtered
604194.102.51.111 389 udp ldap unknown
604294.102.51.111 465 tcp ssl/smtp open Exim smtpd 4.89
604394.102.51.111 520 tcp efs filtered
604494.102.51.111 520 udp route unknown
604594.102.51.111 993 tcp ssl/imaps open
604694.102.51.111 995 tcp ssl/pop3s open
604794.102.51.111 2049 tcp nfs filtered
604894.102.51.111 2049 udp nfs unknown
604994.102.51.112 22 tcp ssh open
605094.102.51.112 25 tcp smtp open Exim smtpd 4.89
605194.102.51.112 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
605294.102.51.112 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
605394.102.51.112 67 tcp dhcps filtered
605494.102.51.112 67 udp dhcps unknown
605594.102.51.112 68 tcp dhcpc filtered
605694.102.51.112 68 udp dhcpc unknown
605794.102.51.112 69 tcp tftp filtered
605894.102.51.112 69 udp tftp unknown
605994.102.51.112 80 tcp http open nginx
606094.102.51.112 88 tcp kerberos-sec filtered
606194.102.51.112 88 udp kerberos-sec unknown
606294.102.51.112 110 tcp pop3 open Dovecot pop3d
606394.102.51.112 123 tcp ntp filtered
606494.102.51.112 123 udp ntp unknown
606594.102.51.112 137 tcp netbios-ns filtered
606694.102.51.112 137 udp netbios-ns unknown
606794.102.51.112 138 tcp netbios-dgm filtered
606894.102.51.112 138 udp netbios-dgm unknown
606994.102.51.112 139 tcp netbios-ssn filtered
607094.102.51.112 139 udp netbios-ssn unknown
607194.102.51.112 143 tcp imap open Dovecot imapd
607294.102.51.112 161 tcp snmp filtered
607394.102.51.112 161 udp snmp unknown
607494.102.51.112 162 tcp snmptrap filtered
607594.102.51.112 162 udp snmptrap unknown
607694.102.51.112 389 tcp ldap filtered
607794.102.51.112 389 udp ldap unknown
607894.102.51.112 465 tcp ssl/smtp open Exim smtpd 4.89
607994.102.51.112 520 tcp efs filtered
608094.102.51.112 520 udp route unknown
608194.102.51.112 993 tcp ssl/imaps open
608294.102.51.112 995 tcp ssl/pop3s open
608394.102.51.112 2049 tcp nfs filtered
608494.102.51.112 2049 udp nfs unknown
608594.102.57.216 21 tcp ftp open ProFTPD or KnFTPD
608694.102.57.216 22 tcp tcpwrapped open
608794.102.57.216 25 tcp smtp open Exim smtpd 4.92.3
608894.102.57.216 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
608994.102.57.216 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
609094.102.57.216 67 tcp dhcps filtered
609194.102.57.216 67 udp dhcps unknown
609294.102.57.216 68 tcp dhcpc filtered
609394.102.57.216 68 udp dhcpc unknown
609494.102.57.216 69 tcp tftp filtered
609594.102.57.216 69 udp tftp unknown
609694.102.57.216 80 tcp http open nginx 1.16.1
609794.102.57.216 88 tcp kerberos-sec filtered
609894.102.57.216 88 udp kerberos-sec unknown
609994.102.57.216 110 tcp pop3 open Dovecot pop3d
610094.102.57.216 123 tcp ntp filtered
610194.102.57.216 123 udp ntp unknown
610294.102.57.216 137 tcp netbios-ns filtered
610394.102.57.216 137 udp netbios-ns unknown
610494.102.57.216 138 tcp netbios-dgm filtered
610594.102.57.216 138 udp netbios-dgm filtered
610694.102.57.216 139 tcp netbios-ssn filtered
610794.102.57.216 139 udp netbios-ssn unknown
610894.102.57.216 143 tcp imap open Dovecot imapd
610994.102.57.216 161 tcp snmp filtered
611094.102.57.216 161 udp snmp unknown
611194.102.57.216 162 tcp snmptrap filtered
611294.102.57.216 162 udp snmptrap unknown
611394.102.57.216 389 tcp ldap filtered
611494.102.57.216 389 udp ldap unknown
611594.102.57.216 465 tcp ssl/smtp open Exim smtpd 4.92.3
611694.102.57.216 520 tcp efs filtered
611794.102.57.216 520 udp route unknown
611894.102.57.216 587 tcp smtp open Exim smtpd 4.92.3
611994.102.57.216 993 tcp ssl/imaps open
612094.102.57.216 995 tcp ssl/pop3s open
612194.102.57.216 1500 tcp ssl/vlsi-lm open
612294.102.57.216 2049 tcp nfs filtered
612394.102.57.216 2049 udp nfs unknown
612494.102.57.216 3306 tcp mysql open MariaDB unauthorized
612595.181.179.47 22 tcp ssh open SSH-2.0-OpenSSH_7.4
612695.181.179.47 53 tcp domain closed
612795.181.179.47 53 udp domain unknown
612895.181.179.47 67 tcp dhcps closed
612995.181.179.47 67 udp dhcps closed
613095.181.179.47 68 tcp dhcpc closed
613195.181.179.47 68 udp dhcpc unknown
613295.181.179.47 69 tcp tftp closed
613395.181.179.47 69 udp tftp closed
613495.181.179.47 88 tcp kerberos-sec closed
613595.181.179.47 88 udp kerberos-sec unknown
613695.181.179.47 123 tcp ntp closed
613795.181.179.47 123 udp ntp unknown
613895.181.179.47 137 tcp netbios-ns closed
613995.181.179.47 137 udp netbios-ns unknown
614095.181.179.47 138 tcp netbios-dgm closed
614195.181.179.47 138 udp netbios-dgm unknown
614295.181.179.47 139 tcp netbios-ssn closed
614395.181.179.47 139 udp netbios-ssn unknown
614495.181.179.47 161 tcp snmp closed
614595.181.179.47 161 udp snmp unknown
614695.181.179.47 162 tcp snmptrap closed
614795.181.179.47 162 udp snmptrap closed
614895.181.179.47 389 tcp ldap closed
614995.181.179.47 389 udp ldap closed
615095.181.179.47 520 tcp efs closed
615195.181.179.47 520 udp route unknown
615295.181.179.47 2049 tcp nfs closed
615395.181.179.47 2049 udp nfs closed
6154104.244.73.40 53 udp domain unknown
6155104.244.73.40 67 udp dhcps unknown
6156104.244.73.40 68 udp dhcpc unknown
6157104.244.73.40 69 udp tftp unknown
6158104.244.73.40 88 udp kerberos-sec unknown
6159104.244.73.40 123 udp ntp unknown
6160104.244.73.40 137 udp netbios-ns unknown
6161104.244.73.40 138 udp netbios-dgm unknown
6162104.244.73.40 139 udp netbios-ssn unknown
6163104.244.73.40 161 udp snmp unknown
6164104.244.73.40 162 udp snmptrap unknown
6165104.244.73.40 389 udp ldap unknown
6166104.244.73.40 520 udp route unknown
6167104.244.73.40 2049 udp nfs unknown
6168104.244.76.231 53 tcp domain filtered
6169104.244.76.231 53 udp domain unknown
6170104.244.76.231 67 tcp dhcps filtered
6171104.244.76.231 67 udp dhcps unknown
6172104.244.76.231 68 tcp dhcpc filtered
6173104.244.76.231 68 udp dhcpc unknown
6174104.244.76.231 69 tcp tftp filtered
6175104.244.76.231 69 udp tftp unknown
6176104.244.76.231 80 tcp http open nginx
6177104.244.76.231 88 tcp kerberos-sec filtered
6178104.244.76.231 88 udp kerberos-sec unknown
6179104.244.76.231 123 tcp ntp filtered
6180104.244.76.231 123 udp ntp unknown
6181104.244.76.231 137 tcp netbios-ns filtered
6182104.244.76.231 137 udp netbios-ns unknown
6183104.244.76.231 138 tcp netbios-dgm filtered
6184104.244.76.231 138 udp netbios-dgm unknown
6185104.244.76.231 139 tcp netbios-ssn filtered
6186104.244.76.231 139 udp netbios-ssn unknown
6187104.244.76.231 161 tcp snmp filtered
6188104.244.76.231 161 udp snmp unknown
6189104.244.76.231 162 tcp snmptrap filtered
6190104.244.76.231 162 udp snmptrap unknown
6191104.244.76.231 389 tcp ldap filtered
6192104.244.76.231 389 udp ldap unknown
6193104.244.76.231 443 tcp ssl/http open nginx
6194104.244.76.231 520 tcp efs filtered
6195104.244.76.231 520 udp route unknown
6196104.244.76.231 2049 tcp nfs filtered
6197104.244.76.231 2049 udp nfs unknown
6198104.244.76.231 5040 tcp unknown closed
6199104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
6200104.244.76.231 16221 tcp closed
6201104.244.76.231 23022 tcp closed
6202104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6203104.244.77.188 53 tcp domain filtered
6204104.244.77.188 53 udp domain unknown
6205104.244.77.188 67 tcp dhcps filtered
6206104.244.77.188 67 udp dhcps unknown
6207104.244.77.188 68 tcp dhcpc filtered
6208104.244.77.188 68 udp dhcpc unknown
6209104.244.77.188 69 tcp tftp filtered
6210104.244.77.188 69 udp tftp unknown
6211104.244.77.188 80 tcp http open nginx
6212104.244.77.188 88 tcp kerberos-sec filtered
6213104.244.77.188 88 udp kerberos-sec unknown
6214104.244.77.188 123 tcp ntp filtered
6215104.244.77.188 123 udp ntp unknown
6216104.244.77.188 137 tcp netbios-ns filtered
6217104.244.77.188 137 udp netbios-ns unknown
6218104.244.77.188 138 tcp netbios-dgm filtered
6219104.244.77.188 138 udp netbios-dgm unknown
6220104.244.77.188 139 tcp netbios-ssn filtered
6221104.244.77.188 139 udp netbios-ssn unknown
6222104.244.77.188 161 tcp snmp filtered
6223104.244.77.188 161 udp snmp unknown
6224104.244.77.188 162 tcp snmptrap filtered
6225104.244.77.188 162 udp snmptrap unknown
6226104.244.77.188 389 tcp ldap filtered
6227104.244.77.188 389 udp ldap unknown
6228104.244.77.188 443 tcp ssl/http open nginx
6229104.244.77.188 520 tcp efs filtered
6230104.244.77.188 520 udp route unknown
6231104.244.77.188 2049 tcp nfs filtered
6232104.244.77.188 2049 udp nfs unknown
6233104.244.77.188 5040 tcp unknown closed
6234104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
6235104.244.77.188 16221 tcp closed
6236104.244.77.188 23022 tcp closed
6237104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6238104.244.79.89 53 tcp domain filtered
6239104.244.79.89 53 udp domain unknown
6240104.244.79.89 67 tcp dhcps filtered
6241104.244.79.89 67 udp dhcps unknown
6242104.244.79.89 68 tcp dhcpc filtered
6243104.244.79.89 68 udp dhcpc unknown
6244104.244.79.89 69 tcp tftp filtered
6245104.244.79.89 69 udp tftp unknown
6246104.244.79.89 80 tcp http open nginx
6247104.244.79.89 88 tcp kerberos-sec filtered
6248104.244.79.89 88 udp kerberos-sec unknown
6249104.244.79.89 123 tcp ntp filtered
6250104.244.79.89 123 udp ntp unknown
6251104.244.79.89 137 tcp netbios-ns filtered
6252104.244.79.89 137 udp netbios-ns unknown
6253104.244.79.89 138 tcp netbios-dgm filtered
6254104.244.79.89 138 udp netbios-dgm unknown
6255104.244.79.89 139 tcp netbios-ssn filtered
6256104.244.79.89 139 udp netbios-ssn unknown
6257104.244.79.89 161 tcp snmp filtered
6258104.244.79.89 161 udp snmp unknown
6259104.244.79.89 162 tcp snmptrap filtered
6260104.244.79.89 162 udp snmptrap unknown
6261104.244.79.89 389 tcp ldap filtered
6262104.244.79.89 389 udp ldap unknown
6263104.244.79.89 443 tcp ssl/http open nginx
6264104.244.79.89 520 tcp efs filtered
6265104.244.79.89 520 udp route unknown
6266104.244.79.89 2049 tcp nfs filtered
6267104.244.79.89 2049 udp nfs unknown
6268104.244.79.89 7910 tcp ssl/http open nginx
6269104.244.79.89 7920 tcp unknown closed
6270104.244.79.89 7930 tcp closed
6271104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
6272104.244.79.89 16010 tcp ssl/http open nginx
6273104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6274104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6275107.180.28.114 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 500 allowed.\x0d\x0a220-Local time is now 05:54. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6276107.180.28.114 22 tcp ssh open SSH-2.0-OpenSSH_5.3
6277107.180.28.114 53 tcp domain filtered
6278107.180.28.114 53 udp domain unknown
6279107.180.28.114 67 tcp dhcps filtered
6280107.180.28.114 67 udp dhcps unknown
6281107.180.28.114 68 tcp dhcpc filtered
6282107.180.28.114 68 udp dhcpc unknown
6283107.180.28.114 69 tcp tftp filtered
6284107.180.28.114 69 udp tftp unknown
6285107.180.28.114 88 tcp kerberos-sec filtered
6286107.180.28.114 88 udp kerberos-sec unknown
6287107.180.28.114 123 tcp ntp filtered
6288107.180.28.114 123 udp ntp unknown
6289107.180.28.114 137 tcp netbios-ns filtered
6290107.180.28.114 137 udp netbios-ns unknown
6291107.180.28.114 138 tcp netbios-dgm filtered
6292107.180.28.114 138 udp netbios-dgm unknown
6293107.180.28.114 139 tcp netbios-ssn filtered
6294107.180.28.114 139 udp netbios-ssn unknown
6295107.180.28.114 161 tcp snmp filtered
6296107.180.28.114 161 udp snmp unknown
6297107.180.28.114 162 tcp snmptrap filtered
6298107.180.28.114 162 udp snmptrap unknown
6299107.180.28.114 389 tcp ldap filtered
6300107.180.28.114 389 udp ldap unknown
6301107.180.28.114 520 tcp efs filtered
6302107.180.28.114 520 udp route unknown
6303107.180.28.114 2049 tcp nfs filtered
6304107.180.28.114 2049 udp nfs unknown
6305111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6306111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6307111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6308111.90.145.39 67 tcp dhcps closed
6309111.90.145.39 67 udp dhcps closed
6310111.90.145.39 68 tcp dhcpc closed
6311111.90.145.39 68 udp dhcpc unknown
6312111.90.145.39 69 tcp tftp closed
6313111.90.145.39 69 udp tftp unknown
6314111.90.145.39 88 tcp kerberos-sec closed
6315111.90.145.39 88 udp kerberos-sec unknown
6316111.90.145.39 123 tcp ntp closed
6317111.90.145.39 123 udp ntp closed
6318111.90.145.39 137 tcp netbios-ns closed
6319111.90.145.39 137 udp netbios-ns unknown
6320111.90.145.39 138 tcp netbios-dgm closed
6321111.90.145.39 138 udp netbios-dgm unknown
6322111.90.145.39 139 tcp netbios-ssn filtered
6323111.90.145.39 139 udp netbios-ssn closed
6324111.90.145.39 161 tcp snmp closed
6325111.90.145.39 161 udp snmp unknown
6326111.90.145.39 162 tcp snmptrap closed
6327111.90.145.39 162 udp snmptrap closed
6328111.90.145.39 389 tcp ldap closed
6329111.90.145.39 389 udp ldap unknown
6330111.90.145.39 520 tcp efs closed
6331111.90.145.39 520 udp route closed
6332111.90.145.39 2049 tcp nfs closed
6333111.90.145.39 2049 udp nfs closed
6334143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6335143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6336143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6337143.95.110.248 67 tcp dhcps closed
6338143.95.110.248 67 udp dhcps unknown
6339143.95.110.248 68 tcp dhcpc closed
6340143.95.110.248 68 udp dhcpc unknown
6341143.95.110.248 69 tcp tftp closed
6342143.95.110.248 69 udp tftp unknown
6343143.95.110.248 88 tcp kerberos-sec closed
6344143.95.110.248 88 udp kerberos-sec unknown
6345143.95.110.248 123 tcp ntp closed
6346143.95.110.248 123 udp ntp unknown
6347143.95.110.248 137 tcp netbios-ns closed
6348143.95.110.248 137 udp netbios-ns unknown
6349143.95.110.248 138 tcp netbios-dgm closed
6350143.95.110.248 138 udp netbios-dgm closed
6351143.95.110.248 139 tcp netbios-ssn closed
6352143.95.110.248 139 udp netbios-ssn unknown
6353143.95.110.248 161 tcp snmp closed
6354143.95.110.248 161 udp snmp closed
6355143.95.110.248 162 tcp snmptrap closed
6356143.95.110.248 162 udp snmptrap unknown
6357143.95.110.248 389 tcp ldap closed
6358143.95.110.248 389 udp ldap closed
6359143.95.110.248 520 tcp efs closed
6360143.95.110.248 520 udp route unknown
6361143.95.110.248 2049 tcp nfs closed
6362143.95.110.248 2049 udp nfs unknown
6363146.83.222.104 53 tcp domain filtered
6364146.83.222.104 53 udp domain unknown
6365146.83.222.104 67 tcp dhcps filtered
6366146.83.222.104 67 udp dhcps unknown
6367146.83.222.104 68 tcp dhcpc filtered
6368146.83.222.104 68 udp dhcpc unknown
6369146.83.222.104 69 tcp tftp filtered
6370146.83.222.104 69 udp tftp filtered
6371146.83.222.104 88 tcp kerberos-sec filtered
6372146.83.222.104 88 udp kerberos-sec unknown
6373146.83.222.104 123 tcp ntp filtered
6374146.83.222.104 123 udp ntp unknown
6375146.83.222.104 137 tcp netbios-ns filtered
6376146.83.222.104 137 udp netbios-ns unknown
6377146.83.222.104 138 tcp netbios-dgm filtered
6378146.83.222.104 138 udp netbios-dgm unknown
6379146.83.222.104 139 tcp netbios-ssn filtered
6380146.83.222.104 139 udp netbios-ssn unknown
6381146.83.222.104 161 tcp snmp filtered
6382146.83.222.104 161 udp snmp unknown
6383146.83.222.104 162 tcp snmptrap filtered
6384146.83.222.104 162 udp snmptrap unknown
6385146.83.222.104 389 tcp ldap filtered
6386146.83.222.104 389 udp ldap unknown
6387146.83.222.104 520 tcp efs filtered
6388146.83.222.104 520 udp route unknown
6389146.83.222.104 2049 tcp nfs filtered
6390146.83.222.104 2049 udp nfs unknown
6391149.126.72.220 25 tcp smtp closed
6392149.126.72.220 51 tcp tcpwrapped open
6393149.126.72.220 53 tcp domain open
6394149.126.72.220 53 udp domain open
6395149.126.72.220 65 tcp tcpwrapped open
6396149.126.72.220 66 tcp tcpwrapped open
6397149.126.72.220 67 tcp dhcps filtered
6398149.126.72.220 67 udp dhcps unknown
6399149.126.72.220 68 tcp dhcpc filtered
6400149.126.72.220 68 udp dhcpc unknown
6401149.126.72.220 69 tcp tftp filtered
6402149.126.72.220 69 udp tftp unknown
6403149.126.72.220 80 tcp tcpwrapped open
6404149.126.72.220 81 tcp tcpwrapped open
6405149.126.72.220 82 tcp tcpwrapped open
6406149.126.72.220 83 tcp tcpwrapped open
6407149.126.72.220 84 tcp tcpwrapped open
6408149.126.72.220 85 tcp tcpwrapped open
6409149.126.72.220 86 tcp tcpwrapped open
6410149.126.72.220 88 tcp http open Incapsula CDN httpd
6411149.126.72.220 88 udp kerberos-sec unknown
6412149.126.72.220 89 tcp tcpwrapped open
6413149.126.72.220 90 tcp tcpwrapped open
6414149.126.72.220 91 tcp tcpwrapped open
6415149.126.72.220 92 tcp tcpwrapped open
6416149.126.72.220 98 tcp tcpwrapped open
6417149.126.72.220 99 tcp tcpwrapped open
6418149.126.72.220 123 tcp ntp filtered
6419149.126.72.220 123 udp ntp unknown
6420149.126.72.220 137 tcp netbios-ns filtered
6421149.126.72.220 137 udp netbios-ns filtered
6422149.126.72.220 138 tcp netbios-dgm filtered
6423149.126.72.220 138 udp netbios-dgm filtered
6424149.126.72.220 139 tcp netbios-ssn closed
6425149.126.72.220 139 udp netbios-ssn unknown
6426149.126.72.220 160 tcp sgmp-traps closed
6427149.126.72.220 161 tcp snmp filtered
6428149.126.72.220 161 udp snmp unknown
6429149.126.72.220 162 tcp snmptrap filtered
6430149.126.72.220 162 udp snmptrap unknown
6431149.126.72.220 189 tcp tcpwrapped open
6432149.126.72.220 190 tcp tcpwrapped open
6433149.126.72.220 192 tcp tcpwrapped open
6434149.126.72.220 243 tcp tcpwrapped open
6435149.126.72.220 285 tcp tcpwrapped open
6436149.126.72.220 314 tcp tcpwrapped open
6437149.126.72.220 343 tcp tcpwrapped open
6438149.126.72.220 347 tcp tcpwrapped open
6439149.126.72.220 385 tcp tcpwrapped open
6440149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
6441149.126.72.220 389 udp ldap unknown
6442149.126.72.220 400 tcp tcpwrapped open
6443149.126.72.220 440 tcp tcpwrapped open
6444149.126.72.220 441 tcp tcpwrapped open
6445149.126.72.220 442 tcp tcpwrapped open
6446149.126.72.220 443 tcp ssl/tcpwrapped open
6447149.126.72.220 444 tcp tcpwrapped open
6448149.126.72.220 445 tcp microsoft-ds closed
6449149.126.72.220 446 tcp tcpwrapped open
6450149.126.72.220 447 tcp tcpwrapped open
6451149.126.72.220 448 tcp tcpwrapped open
6452149.126.72.220 449 tcp tcpwrapped open
6453149.126.72.220 452 tcp tcpwrapped open
6454149.126.72.220 461 tcp tcpwrapped open
6455149.126.72.220 462 tcp tcpwrapped open
6456149.126.72.220 480 tcp tcpwrapped open
6457149.126.72.220 485 tcp tcpwrapped open
6458149.126.72.220 487 tcp tcpwrapped open
6459149.126.72.220 488 tcp tcpwrapped open
6460149.126.72.220 491 tcp tcpwrapped open
6461149.126.72.220 520 tcp efs filtered
6462149.126.72.220 520 udp route unknown
6463149.126.72.220 555 tcp tcpwrapped open
6464149.126.72.220 556 tcp tcpwrapped open
6465149.126.72.220 587 tcp tcpwrapped open
6466149.126.72.220 631 tcp tcpwrapped open
6467149.126.72.220 632 tcp tcpwrapped open
6468149.126.72.220 636 tcp tcpwrapped open
6469149.126.72.220 743 tcp tcpwrapped open
6470149.126.72.220 772 tcp tcpwrapped open
6471149.126.72.220 777 tcp tcpwrapped open
6472149.126.72.220 782 tcp tcpwrapped open
6473149.126.72.220 785 tcp tcpwrapped open
6474149.126.72.220 800 tcp tcpwrapped open
6475149.126.72.220 801 tcp tcpwrapped open
6476149.126.72.220 805 tcp tcpwrapped open
6477149.126.72.220 806 tcp tcpwrapped open
6478149.126.72.220 809 tcp tcpwrapped open
6479149.126.72.220 843 tcp tcpwrapped open
6480149.126.72.220 853 tcp tcpwrapped open
6481149.126.72.220 885 tcp tcpwrapped open
6482149.126.72.220 886 tcp tcpwrapped open
6483149.126.72.220 887 tcp tcpwrapped open
6484149.126.72.220 888 tcp tcpwrapped open
6485149.126.72.220 943 tcp tcpwrapped open
6486149.126.72.220 947 tcp tcpwrapped open
6487149.126.72.220 953 tcp tcpwrapped open
6488149.126.72.220 990 tcp tcpwrapped open
6489149.126.72.220 995 tcp tcpwrapped open
6490149.126.72.220 998 tcp tcpwrapped open
6491149.126.72.220 999 tcp tcpwrapped open
6492149.126.72.220 1000 tcp tcpwrapped open
6493149.126.72.220 1002 tcp tcpwrapped open
6494149.126.72.220 1024 tcp tcpwrapped open
6495149.126.72.220 1025 tcp tcpwrapped open
6496149.126.72.220 1028 tcp tcpwrapped open
6497149.126.72.220 1080 tcp tcpwrapped open
6498149.126.72.220 1103 tcp tcpwrapped open
6499149.126.72.220 1111 tcp tcpwrapped open
6500149.126.72.220 1180 tcp tcpwrapped open
6501149.126.72.220 1181 tcp tcpwrapped open
6502149.126.72.220 1207 tcp tcpwrapped open
6503149.126.72.220 1234 tcp tcpwrapped open
6504149.126.72.220 1250 tcp tcpwrapped open
6505149.126.72.220 1283 tcp tcpwrapped open
6506149.126.72.220 1291 tcp tcpwrapped open
6507149.126.72.220 1292 tcp tcpwrapped open
6508149.126.72.220 1293 tcp tcpwrapped open
6509149.126.72.220 1337 tcp tcpwrapped open
6510149.126.72.220 1344 tcp tcpwrapped open
6511149.126.72.220 1355 tcp tcpwrapped open
6512149.126.72.220 1364 tcp tcpwrapped open
6513149.126.72.220 1366 tcp tcpwrapped open
6514149.126.72.220 1377 tcp tcpwrapped open
6515149.126.72.220 1387 tcp tcpwrapped open
6516149.126.72.220 1388 tcp tcpwrapped open
6517149.126.72.220 1433 tcp tcpwrapped open
6518149.126.72.220 1443 tcp tcpwrapped open
6519149.126.72.220 1447 tcp tcpwrapped open
6520149.126.72.220 1450 tcp tcpwrapped open
6521149.126.72.220 1451 tcp tcpwrapped open
6522149.126.72.220 1452 tcp tcpwrapped open
6523149.126.72.220 1453 tcp tcpwrapped open
6524149.126.72.220 1454 tcp tcpwrapped open
6525149.126.72.220 1455 tcp tcpwrapped open
6526149.126.72.220 1456 tcp tcpwrapped open
6527149.126.72.220 1457 tcp tcpwrapped open
6528149.126.72.220 1458 tcp tcpwrapped open
6529149.126.72.220 1459 tcp tcpwrapped open
6530149.126.72.220 1460 tcp tcpwrapped open
6531149.126.72.220 1494 tcp tcpwrapped open
6532149.126.72.220 1935 tcp tcpwrapped open
6533149.126.72.220 1950 tcp tcpwrapped open
6534149.126.72.220 1951 tcp tcpwrapped open
6535149.126.72.220 1952 tcp tcpwrapped open
6536149.126.72.220 1953 tcp tcpwrapped open
6537149.126.72.220 1954 tcp tcpwrapped open
6538149.126.72.220 1955 tcp tcpwrapped open
6539149.126.72.220 1956 tcp tcpwrapped open
6540149.126.72.220 1957 tcp tcpwrapped open
6541149.126.72.220 1958 tcp tcpwrapped open
6542149.126.72.220 1959 tcp tcpwrapped open
6543149.126.72.220 1960 tcp tcpwrapped open
6544149.126.72.220 1964 tcp tcpwrapped open
6545149.126.72.220 1965 tcp tcpwrapped open
6546149.126.72.220 1966 tcp tcpwrapped open
6547149.126.72.220 1967 tcp tcpwrapped open
6548149.126.72.220 1968 tcp tcpwrapped open
6549149.126.72.220 1969 tcp tcpwrapped open
6550149.126.72.220 1970 tcp tcpwrapped open
6551149.126.72.220 1971 tcp tcpwrapped open
6552149.126.72.220 1972 tcp tcpwrapped open
6553149.126.72.220 1973 tcp tcpwrapped open
6554149.126.72.220 1974 tcp tcpwrapped open
6555149.126.72.220 1975 tcp tcpwrapped open
6556149.126.72.220 1976 tcp tcpwrapped open
6557149.126.72.220 1977 tcp tcpwrapped open
6558149.126.72.220 1978 tcp tcpwrapped open
6559149.126.72.220 1979 tcp tcpwrapped open
6560149.126.72.220 1980 tcp tcpwrapped open
6561149.126.72.220 1981 tcp tcpwrapped open
6562149.126.72.220 1982 tcp tcpwrapped open
6563149.126.72.220 1983 tcp tcpwrapped open
6564149.126.72.220 1984 tcp tcpwrapped open
6565149.126.72.220 1985 tcp tcpwrapped open
6566149.126.72.220 1986 tcp tcpwrapped open
6567149.126.72.220 1987 tcp tcpwrapped open
6568149.126.72.220 1988 tcp tcpwrapped open
6569149.126.72.220 1989 tcp tcpwrapped open
6570149.126.72.220 2000 tcp tcpwrapped open
6571149.126.72.220 2001 tcp tcpwrapped open
6572149.126.72.220 2006 tcp tcpwrapped open
6573149.126.72.220 2012 tcp tcpwrapped open
6574149.126.72.220 2020 tcp tcpwrapped open
6575149.126.72.220 2048 tcp tcpwrapped open
6576149.126.72.220 2049 tcp http open Incapsula CDN httpd
6577149.126.72.220 2049 udp nfs unknown
6578149.126.72.220 2050 tcp tcpwrapped open
6579149.126.72.220 2051 tcp tcpwrapped open
6580149.126.72.220 2052 tcp tcpwrapped open
6581149.126.72.220 2053 tcp tcpwrapped open
6582149.126.72.220 2054 tcp tcpwrapped open
6583149.126.72.220 2055 tcp tcpwrapped open
6584149.126.72.220 2056 tcp tcpwrapped open
6585149.126.72.220 2057 tcp tcpwrapped open
6586149.126.72.220 2058 tcp tcpwrapped open
6587149.126.72.220 2059 tcp tcpwrapped open
6588149.126.72.220 2060 tcp tcpwrapped open
6589149.126.72.220 2061 tcp tcpwrapped open
6590149.126.72.220 2062 tcp tcpwrapped open
6591149.126.72.220 2063 tcp tcpwrapped open
6592149.126.72.220 2064 tcp tcpwrapped open
6593149.126.72.220 2065 tcp tcpwrapped open
6594149.126.72.220 2066 tcp tcpwrapped open
6595149.126.72.220 2067 tcp tcpwrapped open
6596149.126.72.220 2068 tcp tcpwrapped open
6597149.126.72.220 2069 tcp tcpwrapped open
6598149.126.72.220 2070 tcp tcpwrapped open
6599149.126.72.220 2072 tcp tcpwrapped open
6600149.126.72.220 2082 tcp tcpwrapped open
6601149.126.72.220 2083 tcp tcpwrapped open
6602149.126.72.220 2087 tcp tcpwrapped open
6603149.126.72.220 2096 tcp tcpwrapped open
6604149.126.72.220 2100 tcp tcpwrapped open
6605149.126.72.220 2108 tcp tcpwrapped open
6606149.126.72.220 2200 tcp tcpwrapped open
6607149.126.72.220 2209 tcp tcpwrapped open
6608149.126.72.220 2222 tcp tcpwrapped open
6609149.126.72.220 2226 tcp tcpwrapped open
6610149.126.72.220 2248 tcp tcpwrapped open
6611149.126.72.220 2344 tcp tcpwrapped open
6612149.126.72.220 2345 tcp tcpwrapped open
6613149.126.72.220 2353 tcp tcpwrapped open
6614149.126.72.220 2363 tcp tcpwrapped open
6615149.126.72.220 2423 tcp tcpwrapped open
6616149.126.72.220 2433 tcp tcpwrapped open
6617149.126.72.220 2435 tcp tcpwrapped open
6618149.126.72.220 2443 tcp tcpwrapped open
6619149.126.72.220 2453 tcp tcpwrapped open
6620149.126.72.220 2480 tcp tcpwrapped open
6621149.126.72.220 2548 tcp tcpwrapped open
6622149.126.72.220 2549 tcp tcpwrapped open
6623149.126.72.220 2550 tcp tcpwrapped open
6624149.126.72.220 2551 tcp tcpwrapped open
6625149.126.72.220 2552 tcp tcpwrapped open
6626149.126.72.220 2553 tcp tcpwrapped open
6627149.126.72.220 2554 tcp tcpwrapped open
6628149.126.72.220 2555 tcp tcpwrapped open
6629149.126.72.220 2556 tcp tcpwrapped open
6630149.126.72.220 2557 tcp tcpwrapped open
6631149.126.72.220 2558 tcp tcpwrapped open
6632149.126.72.220 2559 tcp tcpwrapped open
6633149.126.72.220 2560 tcp tcpwrapped open
6634149.126.72.220 2561 tcp tcpwrapped open
6635149.126.72.220 2562 tcp tcpwrapped open
6636149.126.72.220 2563 tcp tcpwrapped open
6637149.126.72.220 2566 tcp tcpwrapped open
6638149.126.72.220 2567 tcp tcpwrapped open
6639149.126.72.220 2568 tcp tcpwrapped open
6640149.126.72.220 2569 tcp tcpwrapped open
6641149.126.72.220 2570 tcp tcpwrapped open
6642149.126.72.220 2572 tcp tcpwrapped open
6643149.126.72.220 2598 tcp tcpwrapped open
6644149.126.72.220 2599 tcp tcpwrapped open
6645149.126.72.220 2850 tcp tcpwrapped open
6646149.126.72.220 2985 tcp tcpwrapped open
6647149.126.72.220 2995 tcp tcpwrapped open
6648149.126.72.220 3000 tcp tcpwrapped open
6649149.126.72.220 3001 tcp tcpwrapped open
6650149.126.72.220 3002 tcp tcpwrapped open
6651149.126.72.220 3003 tcp tcpwrapped open
6652149.126.72.220 3004 tcp tcpwrapped open
6653149.126.72.220 3005 tcp tcpwrapped open
6654149.126.72.220 3006 tcp tcpwrapped open
6655149.126.72.220 3007 tcp tcpwrapped open
6656149.126.72.220 3008 tcp tcpwrapped open
6657149.126.72.220 3009 tcp tcpwrapped open
6658149.126.72.220 3010 tcp tcpwrapped open
6659149.126.72.220 3011 tcp tcpwrapped open
6660149.126.72.220 3012 tcp tcpwrapped open
6661149.126.72.220 3013 tcp tcpwrapped open
6662149.126.72.220 3014 tcp tcpwrapped open
6663149.126.72.220 3015 tcp tcpwrapped open
6664149.126.72.220 3016 tcp tcpwrapped open
6665149.126.72.220 3017 tcp tcpwrapped open
6666149.126.72.220 3018 tcp tcpwrapped open
6667149.126.72.220 3019 tcp tcpwrapped open
6668149.126.72.220 3020 tcp tcpwrapped open
6669149.126.72.220 3021 tcp tcpwrapped open
6670149.126.72.220 3022 tcp tcpwrapped open
6671149.126.72.220 3030 tcp tcpwrapped open
6672149.126.72.220 3047 tcp tcpwrapped open
6673149.126.72.220 3048 tcp tcpwrapped open
6674149.126.72.220 3049 tcp tcpwrapped open
6675149.126.72.220 3050 tcp tcpwrapped open
6676149.126.72.220 3051 tcp tcpwrapped open
6677149.126.72.220 3052 tcp tcpwrapped open
6678149.126.72.220 3053 tcp tcpwrapped open
6679149.126.72.220 3054 tcp tcpwrapped open
6680149.126.72.220 3055 tcp tcpwrapped open
6681149.126.72.220 3056 tcp tcpwrapped open
6682149.126.72.220 3057 tcp tcpwrapped open
6683149.126.72.220 3058 tcp tcpwrapped open
6684149.126.72.220 3059 tcp tcpwrapped open
6685149.126.72.220 3060 tcp tcpwrapped open
6686149.126.72.220 3061 tcp tcpwrapped open
6687149.126.72.220 3062 tcp tcpwrapped open
6688149.126.72.220 3063 tcp tcpwrapped open
6689149.126.72.220 3064 tcp tcpwrapped open
6690149.126.72.220 3065 tcp tcpwrapped open
6691149.126.72.220 3066 tcp tcpwrapped open
6692149.126.72.220 3067 tcp tcpwrapped open
6693149.126.72.220 3068 tcp tcpwrapped open
6694149.126.72.220 3069 tcp tcpwrapped open
6695149.126.72.220 3070 tcp tcpwrapped open
6696149.126.72.220 3071 tcp tcpwrapped open
6697149.126.72.220 3072 tcp tcpwrapped open
6698149.126.72.220 3073 tcp tcpwrapped open
6699149.126.72.220 3074 tcp tcpwrapped open
6700149.126.72.220 3075 tcp tcpwrapped open
6701149.126.72.220 3076 tcp tcpwrapped open
6702149.126.72.220 3077 tcp tcpwrapped open
6703149.126.72.220 3078 tcp tcpwrapped open
6704149.126.72.220 3079 tcp tcpwrapped open
6705149.126.72.220 3080 tcp tcpwrapped open
6706149.126.72.220 3081 tcp tcpwrapped open
6707149.126.72.220 3082 tcp tcpwrapped open
6708149.126.72.220 3083 tcp tcpwrapped open
6709149.126.72.220 3084 tcp tcpwrapped open
6710149.126.72.220 3085 tcp tcpwrapped open
6711149.126.72.220 3086 tcp tcpwrapped open
6712149.126.72.220 3087 tcp tcpwrapped open
6713149.126.72.220 3088 tcp tcpwrapped open
6714149.126.72.220 3089 tcp tcpwrapped open
6715149.126.72.220 3090 tcp tcpwrapped open
6716149.126.72.220 3091 tcp tcpwrapped open
6717149.126.72.220 3092 tcp tcpwrapped open
6718149.126.72.220 3093 tcp tcpwrapped open
6719149.126.72.220 3094 tcp tcpwrapped open
6720149.126.72.220 3095 tcp tcpwrapped open
6721149.126.72.220 3096 tcp tcpwrapped open
6722149.126.72.220 3097 tcp tcpwrapped open
6723149.126.72.220 3098 tcp tcpwrapped open
6724149.126.72.220 3099 tcp tcpwrapped open
6725149.126.72.220 3100 tcp tcpwrapped open
6726149.126.72.220 3101 tcp tcpwrapped open
6727149.126.72.220 3102 tcp tcpwrapped open
6728149.126.72.220 3103 tcp tcpwrapped open
6729149.126.72.220 3104 tcp tcpwrapped open
6730149.126.72.220 3105 tcp tcpwrapped open
6731149.126.72.220 3106 tcp tcpwrapped open
6732149.126.72.220 3107 tcp tcpwrapped open
6733149.126.72.220 3108 tcp tcpwrapped open
6734149.126.72.220 3109 tcp tcpwrapped open
6735149.126.72.220 3110 tcp tcpwrapped open
6736149.126.72.220 3111 tcp tcpwrapped open
6737149.126.72.220 3112 tcp tcpwrapped open
6738149.126.72.220 3113 tcp tcpwrapped open
6739149.126.72.220 3114 tcp tcpwrapped open
6740149.126.72.220 3115 tcp tcpwrapped open
6741149.126.72.220 3116 tcp tcpwrapped open
6742149.126.72.220 3117 tcp tcpwrapped open
6743149.126.72.220 3118 tcp tcpwrapped open
6744149.126.72.220 3119 tcp tcpwrapped open
6745149.126.72.220 3120 tcp tcpwrapped open
6746149.126.72.220 3121 tcp tcpwrapped open
6747149.126.72.220 3150 tcp tcpwrapped open
6748149.126.72.220 3155 tcp tcpwrapped open
6749149.126.72.220 3160 tcp tcpwrapped open
6750149.126.72.220 3165 tcp tcpwrapped open
6751149.126.72.220 3270 tcp tcpwrapped open
6752149.126.72.220 3299 tcp tcpwrapped open
6753149.126.72.220 3306 tcp tcpwrapped open
6754149.126.72.220 3333 tcp tcpwrapped open
6755149.126.72.220 3389 tcp tcpwrapped open
6756149.126.72.220 3391 tcp tcpwrapped open
6757149.126.72.220 3400 tcp tcpwrapped open
6758149.126.72.220 3401 tcp tcpwrapped open
6759149.126.72.220 3402 tcp tcpwrapped open
6760149.126.72.220 3403 tcp tcpwrapped open
6761149.126.72.220 3404 tcp tcpwrapped open
6762149.126.72.220 3405 tcp tcpwrapped open
6763149.126.72.220 3406 tcp tcpwrapped open
6764149.126.72.220 3407 tcp tcpwrapped open
6765149.126.72.220 3408 tcp tcpwrapped open
6766149.126.72.220 3409 tcp tcpwrapped open
6767149.126.72.220 3410 tcp tcpwrapped open
6768149.126.72.220 3412 tcp tcpwrapped open
6769149.126.72.220 3443 tcp tcpwrapped open
6770149.126.72.220 3500 tcp tcpwrapped open
6771149.126.72.220 3510 tcp tcpwrapped open
6772149.126.72.220 3521 tcp tcpwrapped open
6773149.126.72.220 3522 tcp tcpwrapped open
6774149.126.72.220 3523 tcp tcpwrapped open
6775149.126.72.220 3524 tcp tcpwrapped open
6776149.126.72.220 3530 tcp tcpwrapped open
6777149.126.72.220 3531 tcp tcpwrapped open
6778149.126.72.220 3540 tcp tcpwrapped open
6779149.126.72.220 3548 tcp tcpwrapped open
6780149.126.72.220 3549 tcp tcpwrapped open
6781149.126.72.220 3550 tcp tcpwrapped open
6782149.126.72.220 3551 tcp tcpwrapped open
6783149.126.72.220 3552 tcp tcpwrapped open
6784149.126.72.220 3553 tcp tcpwrapped open
6785149.126.72.220 3554 tcp tcpwrapped open
6786149.126.72.220 3555 tcp tcpwrapped open
6787149.126.72.220 3556 tcp tcpwrapped open
6788149.126.72.220 3557 tcp tcpwrapped open
6789149.126.72.220 3558 tcp tcpwrapped open
6790149.126.72.220 3559 tcp tcpwrapped open
6791149.126.72.220 3560 tcp tcpwrapped open
6792149.126.72.220 3561 tcp tcpwrapped open
6793149.126.72.220 3562 tcp tcpwrapped open
6794149.126.72.220 3563 tcp tcpwrapped open
6795149.126.72.220 3566 tcp tcpwrapped open
6796149.126.72.220 3567 tcp tcpwrapped open
6797149.126.72.220 3568 tcp tcpwrapped open
6798149.126.72.220 3569 tcp tcpwrapped open
6799149.126.72.220 3570 tcp tcpwrapped open
6800149.126.72.220 3572 tcp tcpwrapped open
6801149.126.72.220 3580 tcp tcpwrapped open
6802149.126.72.220 3590 tcp tcpwrapped open
6803149.126.72.220 3790 tcp tcpwrapped open
6804149.126.72.220 3791 tcp tcpwrapped open
6805149.126.72.220 3792 tcp tcpwrapped open
6806149.126.72.220 3793 tcp tcpwrapped open
6807149.126.72.220 3794 tcp tcpwrapped open
6808149.126.72.220 3838 tcp tcpwrapped open
6809149.126.72.220 3841 tcp tcpwrapped open
6810149.126.72.220 3842 tcp tcpwrapped open
6811149.126.72.220 3950 tcp tcpwrapped open
6812149.126.72.220 3951 tcp tcpwrapped open
6813149.126.72.220 3952 tcp tcpwrapped open
6814149.126.72.220 3953 tcp tcpwrapped open
6815149.126.72.220 3954 tcp adrep open
6816149.126.72.220 4000 tcp tcpwrapped open
6817149.126.72.220 4001 tcp newoak open
6818149.126.72.220 4002 tcp mlchat-proxy open
6819149.126.72.220 4021 tcp nexus-portal open
6820149.126.72.220 4022 tcp dnox open
6821149.126.72.220 4023 tcp esnm-zoning open
6822149.126.72.220 4043 tcp nirp open
6823149.126.72.220 4072 tcp zieto-sock open
6824149.126.72.220 4080 tcp lorica-in open
6825149.126.72.220 4085 tcp ezmessagesrv open
6826149.126.72.220 4120 tcp minirem open
6827149.126.72.220 4147 tcp vrxpservman open
6828149.126.72.220 4148 tcp hhb-handheld open
6829149.126.72.220 4150 tcp poweralert-nsa open
6830149.126.72.220 4155 tcp bzr open
6831149.126.72.220 4160 tcp jini-discovery open
6832149.126.72.220 4165 tcp altcp open
6833149.126.72.220 4172 tcp pcoip open
6834149.126.72.220 4243 tcp vrml-multi-use open
6835149.126.72.220 4244 tcp vrml-multi-use open
6836149.126.72.220 4250 tcp vrml-multi-use open
6837149.126.72.220 4300 tcp corelccam open
6838149.126.72.220 4333 tcp msql open
6839149.126.72.220 4343 tcp unicall open
6840149.126.72.220 4344 tcp vinainstall open
6841149.126.72.220 4400 tcp ds-srv open
6842149.126.72.220 4401 tcp tcpwrapped open
6843149.126.72.220 4402 tcp tcpwrapped open
6844149.126.72.220 4430 tcp tcpwrapped open
6845149.126.72.220 4431 tcp tcpwrapped open
6846149.126.72.220 4432 tcp tcpwrapped open
6847149.126.72.220 4434 tcp tcpwrapped open
6848149.126.72.220 4435 tcp tcpwrapped open
6849149.126.72.220 4436 tcp tcpwrapped open
6850149.126.72.220 4437 tcp tcpwrapped open
6851149.126.72.220 4439 tcp tcpwrapped open
6852149.126.72.220 4440 tcp tcpwrapped open
6853149.126.72.220 4443 tcp tcpwrapped open
6854149.126.72.220 4444 tcp tcpwrapped open
6855149.126.72.220 4445 tcp tcpwrapped open
6856149.126.72.220 4451 tcp tcpwrapped open
6857149.126.72.220 4455 tcp tcpwrapped open
6858149.126.72.220 4457 tcp tcpwrapped open
6859149.126.72.220 4459 tcp tcpwrapped open
6860149.126.72.220 4461 tcp tcpwrapped open
6861149.126.72.220 4463 tcp tcpwrapped open
6862149.126.72.220 4477 tcp tcpwrapped open
6863149.126.72.220 4482 tcp tcpwrapped open
6864149.126.72.220 4500 tcp tcpwrapped open
6865149.126.72.220 4502 tcp tcpwrapped open
6866149.126.72.220 4505 tcp tcpwrapped open
6867149.126.72.220 4572 tcp tcpwrapped open
6868149.126.72.220 4602 tcp tcpwrapped open
6869149.126.72.220 4620 tcp tcpwrapped open
6870149.126.72.220 4643 tcp tcpwrapped open
6871149.126.72.220 4848 tcp tcpwrapped open
6872149.126.72.220 4933 tcp tcpwrapped open
6873149.126.72.220 4993 tcp tcpwrapped open
6874149.126.72.220 5000 tcp tcpwrapped open
6875149.126.72.220 5001 tcp tcpwrapped open
6876149.126.72.220 5002 tcp tcpwrapped open
6877149.126.72.220 5003 tcp tcpwrapped open
6878149.126.72.220 5004 tcp tcpwrapped open
6879149.126.72.220 5005 tcp tcpwrapped open
6880149.126.72.220 5006 tcp tcpwrapped open
6881149.126.72.220 5007 tcp tcpwrapped open
6882149.126.72.220 5008 tcp tcpwrapped open
6883149.126.72.220 5009 tcp tcpwrapped open
6884149.126.72.220 5010 tcp tcpwrapped open
6885149.126.72.220 5011 tcp tcpwrapped open
6886149.126.72.220 5022 tcp tcpwrapped open
6887149.126.72.220 5050 tcp tcpwrapped open
6888149.126.72.220 5053 tcp tcpwrapped open
6889149.126.72.220 5060 tcp tcpwrapped open
6890149.126.72.220 5061 tcp tcpwrapped open
6891149.126.72.220 5080 tcp tcpwrapped open
6892149.126.72.220 5083 tcp tcpwrapped open
6893149.126.72.220 5089 tcp tcpwrapped open
6894149.126.72.220 5090 tcp tcpwrapped open
6895149.126.72.220 5100 tcp tcpwrapped open
6896149.126.72.220 5105 tcp tcpwrapped open
6897149.126.72.220 5119 tcp tcpwrapped open
6898149.126.72.220 5120 tcp tcpwrapped open
6899149.126.72.220 5130 tcp tcpwrapped open
6900149.126.72.220 5140 tcp tcpwrapped open
6901149.126.72.220 5150 tcp tcpwrapped open
6902149.126.72.220 5160 tcp tcpwrapped open
6903149.126.72.220 5180 tcp tcpwrapped open
6904149.126.72.220 5201 tcp tcpwrapped open
6905149.126.72.220 5222 tcp tcpwrapped open
6906149.126.72.220 5223 tcp tcpwrapped open
6907149.126.72.220 5224 tcp tcpwrapped open
6908149.126.72.220 5225 tcp tcpwrapped open
6909149.126.72.220 5226 tcp tcpwrapped open
6910149.126.72.220 5227 tcp tcpwrapped open
6911149.126.72.220 5228 tcp tcpwrapped open
6912149.126.72.220 5229 tcp tcpwrapped open
6913149.126.72.220 5230 tcp tcpwrapped open
6914149.126.72.220 5231 tcp tcpwrapped open
6915149.126.72.220 5232 tcp tcpwrapped open
6916149.126.72.220 5233 tcp tcpwrapped open
6917149.126.72.220 5234 tcp tcpwrapped open
6918149.126.72.220 5235 tcp tcpwrapped open
6919149.126.72.220 5236 tcp tcpwrapped open
6920149.126.72.220 5237 tcp tcpwrapped open
6921149.126.72.220 5238 tcp tcpwrapped open
6922149.126.72.220 5239 tcp tcpwrapped open
6923149.126.72.220 5240 tcp tcpwrapped open
6924149.126.72.220 5241 tcp tcpwrapped open
6925149.126.72.220 5242 tcp tcpwrapped open
6926149.126.72.220 5243 tcp tcpwrapped open
6927149.126.72.220 5244 tcp tcpwrapped open
6928149.126.72.220 5245 tcp tcpwrapped open
6929149.126.72.220 5246 tcp tcpwrapped open
6930149.126.72.220 5247 tcp tcpwrapped open
6931149.126.72.220 5248 tcp tcpwrapped open
6932149.126.72.220 5249 tcp tcpwrapped open
6933149.126.72.220 5250 tcp tcpwrapped open
6934149.126.72.220 5251 tcp tcpwrapped open
6935149.126.72.220 5252 tcp tcpwrapped open
6936149.126.72.220 5253 tcp tcpwrapped open
6937149.126.72.220 5254 tcp tcpwrapped open
6938149.126.72.220 5255 tcp tcpwrapped open
6939149.126.72.220 5256 tcp tcpwrapped open
6940149.126.72.220 5257 tcp tcpwrapped open
6941149.126.72.220 5258 tcp tcpwrapped open
6942149.126.72.220 5259 tcp tcpwrapped open
6943149.126.72.220 5260 tcp tcpwrapped open
6944149.126.72.220 5261 tcp tcpwrapped open
6945149.126.72.220 5262 tcp tcpwrapped open
6946149.126.72.220 5263 tcp tcpwrapped open
6947149.126.72.220 5264 tcp tcpwrapped open
6948149.126.72.220 5265 tcp tcpwrapped open
6949149.126.72.220 5266 tcp tcpwrapped open
6950149.126.72.220 5267 tcp tcpwrapped open
6951149.126.72.220 5268 tcp tcpwrapped open
6952149.126.72.220 5269 tcp tcpwrapped open
6953149.126.72.220 5270 tcp tcpwrapped open
6954149.126.72.220 5271 tcp tcpwrapped open
6955149.126.72.220 5272 tcp tcpwrapped open
6956149.126.72.220 5273 tcp tcpwrapped open
6957149.126.72.220 5274 tcp tcpwrapped open
6958149.126.72.220 5275 tcp tcpwrapped open
6959149.126.72.220 5276 tcp tcpwrapped open
6960149.126.72.220 5277 tcp tcpwrapped open
6961149.126.72.220 5278 tcp tcpwrapped open
6962149.126.72.220 5279 tcp tcpwrapped open
6963149.126.72.220 5280 tcp tcpwrapped open
6964149.126.72.220 5440 tcp tcpwrapped open
6965149.126.72.220 5443 tcp tcpwrapped open
6966149.126.72.220 5456 tcp tcpwrapped open
6967149.126.72.220 5494 tcp tcpwrapped open
6968149.126.72.220 5495 tcp tcpwrapped open
6969149.126.72.220 5500 tcp tcpwrapped open
6970149.126.72.220 5503 tcp tcpwrapped open
6971149.126.72.220 5552 tcp tcpwrapped open
6972149.126.72.220 5555 tcp tcpwrapped open
6973149.126.72.220 5556 tcp tcpwrapped open
6974149.126.72.220 5557 tcp tcpwrapped open
6975149.126.72.220 5567 tcp tcpwrapped open
6976149.126.72.220 5568 tcp tcpwrapped open
6977149.126.72.220 5569 tcp tcpwrapped open
6978149.126.72.220 5590 tcp tcpwrapped open
6979149.126.72.220 5591 tcp tcpwrapped open
6980149.126.72.220 5592 tcp tcpwrapped open
6981149.126.72.220 5593 tcp tcpwrapped open
6982149.126.72.220 5594 tcp tcpwrapped open
6983149.126.72.220 5595 tcp tcpwrapped open
6984149.126.72.220 5596 tcp tcpwrapped open
6985149.126.72.220 5597 tcp tcpwrapped open
6986149.126.72.220 5598 tcp tcpwrapped open
6987149.126.72.220 5599 tcp tcpwrapped open
6988149.126.72.220 5600 tcp tcpwrapped open
6989149.126.72.220 5601 tcp tcpwrapped open
6990149.126.72.220 5602 tcp tcpwrapped open
6991149.126.72.220 5603 tcp tcpwrapped open
6992149.126.72.220 5604 tcp tcpwrapped open
6993149.126.72.220 5605 tcp tcpwrapped open
6994149.126.72.220 5606 tcp tcpwrapped open
6995149.126.72.220 5607 tcp tcpwrapped open
6996149.126.72.220 5608 tcp tcpwrapped open
6997149.126.72.220 5609 tcp tcpwrapped open
6998149.126.72.220 5613 tcp tcpwrapped open
6999149.126.72.220 5614 tcp tcpwrapped open
7000149.126.72.220 5620 tcp tcpwrapped open
7001149.126.72.220 5630 tcp tcpwrapped open
7002149.126.72.220 5640 tcp tcpwrapped open
7003149.126.72.220 5650 tcp tcpwrapped open
7004149.126.72.220 5660 tcp tcpwrapped open
7005149.126.72.220 5671 tcp tcpwrapped open
7006149.126.72.220 5672 tcp tcpwrapped open
7007149.126.72.220 5673 tcp tcpwrapped open
7008149.126.72.220 5680 tcp tcpwrapped open
7009149.126.72.220 5696 tcp tcpwrapped open
7010149.126.72.220 5698 tcp tcpwrapped open
7011149.126.72.220 5701 tcp tcpwrapped open
7012149.126.72.220 5721 tcp tcpwrapped open
7013149.126.72.220 5900 tcp tcpwrapped open
7014149.126.72.220 5901 tcp tcpwrapped open
7015149.126.72.220 5902 tcp tcpwrapped open
7016149.126.72.220 5903 tcp tcpwrapped open
7017149.126.72.220 5904 tcp tcpwrapped open
7018149.126.72.220 5905 tcp tcpwrapped open
7019149.126.72.220 5906 tcp tcpwrapped open
7020149.126.72.220 5907 tcp tcpwrapped open
7021149.126.72.220 5908 tcp tcpwrapped open
7022149.126.72.220 5909 tcp tcpwrapped open
7023149.126.72.220 5910 tcp tcpwrapped open
7024149.126.72.220 5911 tcp tcpwrapped open
7025149.126.72.220 5912 tcp tcpwrapped open
7026149.126.72.220 5913 tcp tcpwrapped open
7027149.126.72.220 5914 tcp tcpwrapped open
7028149.126.72.220 5915 tcp tcpwrapped open
7029149.126.72.220 5916 tcp tcpwrapped open
7030149.126.72.220 5917 tcp tcpwrapped open
7031149.126.72.220 5918 tcp tcpwrapped open
7032149.126.72.220 5919 tcp tcpwrapped open
7033149.126.72.220 5920 tcp tcpwrapped open
7034149.126.72.220 5984 tcp tcpwrapped open
7035149.126.72.220 5985 tcp tcpwrapped open
7036149.126.72.220 5986 tcp tcpwrapped open
7037149.126.72.220 5987 tcp tcpwrapped open
7038149.126.72.220 5988 tcp tcpwrapped open
7039149.126.72.220 5989 tcp tcpwrapped open
7040149.126.72.220 5990 tcp tcpwrapped open
7041149.126.72.220 5991 tcp tcpwrapped open
7042149.126.72.220 5992 tcp tcpwrapped open
7043149.126.72.220 5993 tcp tcpwrapped open
7044149.126.72.220 5994 tcp tcpwrapped open
7045149.126.72.220 5995 tcp tcpwrapped open
7046149.126.72.220 5996 tcp tcpwrapped open
7047149.126.72.220 5997 tcp tcpwrapped open
7048149.126.72.220 5998 tcp tcpwrapped open
7049149.126.72.220 5999 tcp tcpwrapped open
7050149.126.72.220 6000 tcp tcpwrapped open
7051149.126.72.220 6001 tcp tcpwrapped open
7052149.126.72.220 6002 tcp tcpwrapped open
7053149.126.72.220 6003 tcp tcpwrapped open
7054149.126.72.220 6004 tcp tcpwrapped open
7055149.126.72.220 6005 tcp tcpwrapped open
7056149.126.72.220 6006 tcp tcpwrapped open
7057149.126.72.220 6007 tcp tcpwrapped open
7058149.126.72.220 6008 tcp tcpwrapped open
7059149.126.72.220 6009 tcp tcpwrapped open
7060149.126.72.220 6010 tcp tcpwrapped open
7061149.126.72.220 6011 tcp tcpwrapped open
7062149.126.72.220 6021 tcp tcpwrapped open
7063149.126.72.220 6060 tcp tcpwrapped open
7064149.126.72.220 6061 tcp tcpwrapped open
7065149.126.72.220 6081 tcp tcpwrapped open
7066149.126.72.220 6100 tcp tcpwrapped open
7067149.126.72.220 6102 tcp tcpwrapped open
7068149.126.72.220 6134 tcp tcpwrapped open
7069149.126.72.220 6161 tcp tcpwrapped open
7070149.126.72.220 6331 tcp tcpwrapped open
7071149.126.72.220 6348 tcp tcpwrapped open
7072149.126.72.220 6379 tcp tcpwrapped open
7073149.126.72.220 6380 tcp tcpwrapped open
7074149.126.72.220 6433 tcp tcpwrapped open
7075149.126.72.220 6440 tcp tcpwrapped open
7076149.126.72.220 6443 tcp tcpwrapped open
7077149.126.72.220 6488 tcp tcpwrapped open
7078149.126.72.220 6500 tcp tcpwrapped open
7079149.126.72.220 6505 tcp tcpwrapped open
7080149.126.72.220 6510 tcp tcpwrapped open
7081149.126.72.220 6511 tcp tcpwrapped open
7082149.126.72.220 6512 tcp tcpwrapped open
7083149.126.72.220 6514 tcp tcpwrapped open
7084149.126.72.220 6543 tcp tcpwrapped open
7085149.126.72.220 6544 tcp tcpwrapped open
7086149.126.72.220 6560 tcp tcpwrapped open
7087149.126.72.220 6561 tcp tcpwrapped open
7088149.126.72.220 6565 tcp tcpwrapped open
7089149.126.72.220 6580 tcp tcpwrapped open
7090149.126.72.220 6581 tcp tcpwrapped open
7091149.126.72.220 6590 tcp tcpwrapped open
7092149.126.72.220 6601 tcp tcpwrapped open
7093149.126.72.220 6603 tcp tcpwrapped open
7094149.126.72.220 6605 tcp tcpwrapped open
7095149.126.72.220 6661 tcp tcpwrapped open
7096149.126.72.220 6662 tcp tcpwrapped open
7097149.126.72.220 6666 tcp tcpwrapped open
7098149.126.72.220 6686 tcp tcpwrapped open
7099149.126.72.220 6688 tcp tcpwrapped open
7100149.126.72.220 6700 tcp tcpwrapped open
7101149.126.72.220 6755 tcp tcpwrapped open
7102149.126.72.220 6775 tcp tcpwrapped open
7103149.126.72.220 6779 tcp tcpwrapped open
7104149.126.72.220 6789 tcp tcpwrapped open
7105149.126.72.220 6799 tcp tcpwrapped open
7106149.126.72.220 7000 tcp tcpwrapped open
7107149.126.72.220 7001 tcp tcpwrapped open
7108149.126.72.220 7002 tcp tcpwrapped open
7109149.126.72.220 7003 tcp tcpwrapped open
7110149.126.72.220 7004 tcp tcpwrapped open
7111149.126.72.220 7005 tcp tcpwrapped open
7112149.126.72.220 7007 tcp tcpwrapped open
7113149.126.72.220 7010 tcp tcpwrapped open
7114149.126.72.220 7011 tcp tcpwrapped open
7115149.126.72.220 7021 tcp tcpwrapped open
7116149.126.72.220 7070 tcp tcpwrapped open
7117149.126.72.220 7071 tcp tcpwrapped open
7118149.126.72.220 7079 tcp tcpwrapped open
7119149.126.72.220 7080 tcp tcpwrapped open
7120149.126.72.220 7081 tcp tcpwrapped open
7121149.126.72.220 7082 tcp tcpwrapped open
7122149.126.72.220 7083 tcp tcpwrapped open
7123149.126.72.220 7084 tcp tcpwrapped open
7124149.126.72.220 7085 tcp tcpwrapped open
7125149.126.72.220 7086 tcp tcpwrapped open
7126149.126.72.220 7087 tcp tcpwrapped open
7127149.126.72.220 7088 tcp tcpwrapped open
7128149.126.72.220 7090 tcp tcpwrapped open
7129149.126.72.220 7171 tcp tcpwrapped open
7130149.126.72.220 7172 tcp tcpwrapped open
7131149.126.72.220 7272 tcp tcpwrapped open
7132149.126.72.220 7348 tcp tcpwrapped open
7133149.126.72.220 7403 tcp tcpwrapped open
7134149.126.72.220 7433 tcp tcpwrapped open
7135149.126.72.220 7441 tcp tcpwrapped open
7136149.126.72.220 7443 tcp tcpwrapped open
7137149.126.72.220 7444 tcp tcpwrapped open
7138149.126.72.220 7445 tcp tcpwrapped open
7139149.126.72.220 7473 tcp tcpwrapped open
7140149.126.72.220 7500 tcp tcpwrapped open
7141149.126.72.220 7537 tcp tcpwrapped open
7142149.126.72.220 7687 tcp tcpwrapped open
7143149.126.72.220 7700 tcp tcpwrapped open
7144149.126.72.220 7771 tcp tcpwrapped open
7145149.126.72.220 7773 tcp tcpwrapped open
7146149.126.72.220 7774 tcp tcpwrapped open
7147149.126.72.220 7775 tcp tcpwrapped open
7148149.126.72.220 7776 tcp tcpwrapped open
7149149.126.72.220 7777 tcp tcpwrapped open
7150149.126.72.220 7778 tcp tcpwrapped open
7151149.126.72.220 7779 tcp tcpwrapped open
7152149.126.72.220 7788 tcp tcpwrapped open
7153149.126.72.220 7799 tcp tcpwrapped open
7154149.126.72.220 7998 tcp tcpwrapped open
7155149.126.72.220 7999 tcp tcpwrapped open
7156149.126.72.220 8000 tcp tcpwrapped open
7157149.126.72.220 8001 tcp tcpwrapped open
7158149.126.72.220 8002 tcp tcpwrapped open
7159149.126.72.220 8003 tcp tcpwrapped open
7160149.126.72.220 8004 tcp tcpwrapped open
7161149.126.72.220 8005 tcp tcpwrapped open
7162149.126.72.220 8006 tcp tcpwrapped open
7163149.126.72.220 8007 tcp tcpwrapped open
7164149.126.72.220 8008 tcp tcpwrapped open
7165149.126.72.220 8009 tcp tcpwrapped open
7166149.126.72.220 8010 tcp tcpwrapped open
7167149.126.72.220 8011 tcp tcpwrapped open
7168149.126.72.220 8012 tcp tcpwrapped open
7169149.126.72.220 8013 tcp tcpwrapped open
7170149.126.72.220 8014 tcp tcpwrapped open
7171149.126.72.220 8015 tcp tcpwrapped open
7172149.126.72.220 8016 tcp tcpwrapped open
7173149.126.72.220 8017 tcp tcpwrapped open
7174149.126.72.220 8018 tcp tcpwrapped open
7175149.126.72.220 8019 tcp tcpwrapped open
7176149.126.72.220 8020 tcp tcpwrapped open
7177149.126.72.220 8021 tcp tcpwrapped open
7178149.126.72.220 8022 tcp tcpwrapped open
7179149.126.72.220 8023 tcp tcpwrapped open
7180149.126.72.220 8024 tcp tcpwrapped open
7181149.126.72.220 8025 tcp tcpwrapped open
7182149.126.72.220 8026 tcp tcpwrapped open
7183149.126.72.220 8027 tcp tcpwrapped open
7184149.126.72.220 8028 tcp tcpwrapped open
7185149.126.72.220 8029 tcp tcpwrapped open
7186149.126.72.220 8030 tcp tcpwrapped open
7187149.126.72.220 8031 tcp tcpwrapped open
7188149.126.72.220 8032 tcp tcpwrapped open
7189149.126.72.220 8033 tcp tcpwrapped open
7190149.126.72.220 8034 tcp tcpwrapped open
7191149.126.72.220 8035 tcp tcpwrapped open
7192149.126.72.220 8036 tcp tcpwrapped open
7193149.126.72.220 8037 tcp tcpwrapped open
7194149.126.72.220 8038 tcp tcpwrapped open
7195149.126.72.220 8039 tcp tcpwrapped open
7196149.126.72.220 8040 tcp tcpwrapped open
7197149.126.72.220 8041 tcp tcpwrapped open
7198149.126.72.220 8042 tcp tcpwrapped open
7199149.126.72.220 8043 tcp tcpwrapped open
7200149.126.72.220 8044 tcp tcpwrapped open
7201149.126.72.220 8045 tcp tcpwrapped open
7202149.126.72.220 8046 tcp tcpwrapped open
7203149.126.72.220 8047 tcp tcpwrapped open
7204149.126.72.220 8048 tcp tcpwrapped open
7205149.126.72.220 8049 tcp tcpwrapped open
7206149.126.72.220 8050 tcp tcpwrapped open
7207149.126.72.220 8051 tcp tcpwrapped open
7208149.126.72.220 8052 tcp tcpwrapped open
7209149.126.72.220 8053 tcp tcpwrapped open
7210149.126.72.220 8054 tcp tcpwrapped open
7211149.126.72.220 8055 tcp tcpwrapped open
7212149.126.72.220 8056 tcp tcpwrapped open
7213149.126.72.220 8057 tcp tcpwrapped open
7214149.126.72.220 8058 tcp tcpwrapped open
7215149.126.72.220 8060 tcp tcpwrapped open
7216149.126.72.220 8064 tcp tcpwrapped open
7217149.126.72.220 8065 tcp tcpwrapped open
7218149.126.72.220 8069 tcp tcpwrapped open
7219149.126.72.220 8070 tcp tcpwrapped open
7220149.126.72.220 8071 tcp tcpwrapped open
7221149.126.72.220 8072 tcp tcpwrapped open
7222149.126.72.220 8074 tcp tcpwrapped open
7223149.126.72.220 8079 tcp tcpwrapped open
7224149.126.72.220 8080 tcp tcpwrapped open
7225149.126.72.220 8081 tcp tcpwrapped open
7226149.126.72.220 8082 tcp tcpwrapped open
7227149.126.72.220 8083 tcp tcpwrapped open
7228149.126.72.220 8084 tcp tcpwrapped open
7229149.126.72.220 8085 tcp tcpwrapped open
7230149.126.72.220 8086 tcp tcpwrapped open
7231149.126.72.220 8087 tcp tcpwrapped open
7232149.126.72.220 8088 tcp tcpwrapped open
7233149.126.72.220 8089 tcp tcpwrapped open
7234149.126.72.220 8090 tcp tcpwrapped open
7235149.126.72.220 8091 tcp tcpwrapped open
7236149.126.72.220 8092 tcp tcpwrapped open
7237149.126.72.220 8093 tcp tcpwrapped open
7238149.126.72.220 8094 tcp tcpwrapped open
7239149.126.72.220 8095 tcp tcpwrapped open
7240149.126.72.220 8096 tcp tcpwrapped open
7241149.126.72.220 8097 tcp tcpwrapped open
7242149.126.72.220 8098 tcp tcpwrapped open
7243149.126.72.220 8099 tcp tcpwrapped open
7244149.126.72.220 8100 tcp tcpwrapped open
7245149.126.72.220 8101 tcp tcpwrapped open
7246149.126.72.220 8102 tcp tcpwrapped open
7247149.126.72.220 8103 tcp tcpwrapped open
7248149.126.72.220 8104 tcp tcpwrapped open
7249149.126.72.220 8105 tcp tcpwrapped open
7250149.126.72.220 8106 tcp tcpwrapped open
7251149.126.72.220 8107 tcp tcpwrapped open
7252149.126.72.220 8108 tcp tcpwrapped open
7253149.126.72.220 8109 tcp tcpwrapped open
7254149.126.72.220 8110 tcp tcpwrapped open
7255149.126.72.220 8113 tcp tcpwrapped open
7256149.126.72.220 8114 tcp tcpwrapped open
7257149.126.72.220 8115 tcp tcpwrapped open
7258149.126.72.220 8118 tcp tcpwrapped open
7259149.126.72.220 8119 tcp tcpwrapped open
7260149.126.72.220 8120 tcp tcpwrapped open
7261149.126.72.220 8121 tcp tcpwrapped open
7262149.126.72.220 8123 tcp tcpwrapped open
7263149.126.72.220 8125 tcp tcpwrapped open
7264149.126.72.220 8126 tcp tcpwrapped open
7265149.126.72.220 8128 tcp tcpwrapped open
7266149.126.72.220 8129 tcp tcpwrapped open
7267149.126.72.220 8130 tcp tcpwrapped open
7268149.126.72.220 8131 tcp tcpwrapped open
7269149.126.72.220 8132 tcp tcpwrapped open
7270149.126.72.220 8133 tcp tcpwrapped open
7271149.126.72.220 8136 tcp tcpwrapped open
7272149.126.72.220 8140 tcp tcpwrapped open
7273149.126.72.220 8142 tcp tcpwrapped open
7274149.126.72.220 8143 tcp tcpwrapped open
7275149.126.72.220 8144 tcp tcpwrapped open
7276149.126.72.220 8147 tcp tcpwrapped open
7277149.126.72.220 8148 tcp tcpwrapped open
7278149.126.72.220 8149 tcp tcpwrapped open
7279149.126.72.220 8150 tcp tcpwrapped open
7280149.126.72.220 8154 tcp tcpwrapped open
7281149.126.72.220 8156 tcp tcpwrapped open
7282149.126.72.220 8157 tcp tcpwrapped open
7283149.126.72.220 8158 tcp tcpwrapped open
7284149.126.72.220 8160 tcp tcpwrapped open
7285149.126.72.220 8161 tcp tcpwrapped open
7286149.126.72.220 8162 tcp tcpwrapped open
7287149.126.72.220 8163 tcp tcpwrapped open
7288149.126.72.220 8164 tcp tcpwrapped open
7289149.126.72.220 8165 tcp tcpwrapped open
7290149.126.72.220 8166 tcp tcpwrapped open
7291149.126.72.220 8167 tcp tcpwrapped open
7292149.126.72.220 8168 tcp tcpwrapped open
7293149.126.72.220 8169 tcp tcpwrapped open
7294149.126.72.220 8170 tcp tcpwrapped open
7295149.126.72.220 8171 tcp tcpwrapped open
7296149.126.72.220 8172 tcp tcpwrapped open
7297149.126.72.220 8173 tcp tcpwrapped open
7298149.126.72.220 8175 tcp tcpwrapped open
7299149.126.72.220 8176 tcp tcpwrapped open
7300149.126.72.220 8178 tcp tcpwrapped open
7301149.126.72.220 8179 tcp tcpwrapped open
7302149.126.72.220 8180 tcp tcpwrapped open
7303149.126.72.220 8181 tcp tcpwrapped open
7304149.126.72.220 8182 tcp tcpwrapped open
7305149.126.72.220 8183 tcp tcpwrapped open
7306149.126.72.220 8184 tcp tcpwrapped open
7307149.126.72.220 8185 tcp tcpwrapped open
7308149.126.72.220 8186 tcp tcpwrapped open
7309149.126.72.220 8187 tcp tcpwrapped open
7310149.126.72.220 8188 tcp tcpwrapped open
7311149.126.72.220 8189 tcp tcpwrapped open
7312149.126.72.220 8190 tcp tcpwrapped open
7313149.126.72.220 8191 tcp tcpwrapped open
7314149.126.72.220 8192 tcp tcpwrapped open
7315149.126.72.220 8193 tcp tcpwrapped open
7316149.126.72.220 8194 tcp tcpwrapped open
7317149.126.72.220 8195 tcp tcpwrapped open
7318149.126.72.220 8198 tcp tcpwrapped open
7319149.126.72.220 8199 tcp tcpwrapped open
7320149.126.72.220 8200 tcp tcpwrapped open
7321149.126.72.220 8203 tcp tcpwrapped open
7322149.126.72.220 8222 tcp tcpwrapped open
7323149.126.72.220 8230 tcp tcpwrapped open
7324149.126.72.220 8236 tcp tcpwrapped open
7325149.126.72.220 8237 tcp tcpwrapped open
7326149.126.72.220 8238 tcp tcpwrapped open
7327149.126.72.220 8239 tcp tcpwrapped open
7328149.126.72.220 8241 tcp tcpwrapped open
7329149.126.72.220 8243 tcp tcpwrapped open
7330149.126.72.220 8248 tcp tcpwrapped open
7331149.126.72.220 8249 tcp tcpwrapped open
7332149.126.72.220 8250 tcp tcpwrapped open
7333149.126.72.220 8251 tcp tcpwrapped open
7334149.126.72.220 8252 tcp tcpwrapped open
7335149.126.72.220 8280 tcp tcpwrapped open
7336149.126.72.220 8282 tcp tcpwrapped open
7337149.126.72.220 8333 tcp tcpwrapped open
7338149.126.72.220 8340 tcp tcpwrapped open
7339149.126.72.220 8343 tcp tcpwrapped open
7340149.126.72.220 8350 tcp tcpwrapped open
7341149.126.72.220 8381 tcp tcpwrapped open
7342149.126.72.220 8382 tcp tcpwrapped open
7343149.126.72.220 8383 tcp tcpwrapped open
7344149.126.72.220 8384 tcp tcpwrapped open
7345149.126.72.220 8385 tcp tcpwrapped open
7346149.126.72.220 8388 tcp tcpwrapped open
7347149.126.72.220 8393 tcp tcpwrapped open
7348149.126.72.220 8401 tcp tcpwrapped open
7349149.126.72.220 8402 tcp tcpwrapped open
7350149.126.72.220 8403 tcp tcpwrapped open
7351149.126.72.220 8404 tcp tcpwrapped open
7352149.126.72.220 8405 tcp tcpwrapped open
7353149.126.72.220 8406 tcp tcpwrapped open
7354149.126.72.220 8407 tcp tcpwrapped open
7355149.126.72.220 8408 tcp tcpwrapped open
7356149.126.72.220 8409 tcp tcpwrapped open
7357149.126.72.220 8410 tcp tcpwrapped open
7358149.126.72.220 8411 tcp tcpwrapped open
7359149.126.72.220 8412 tcp tcpwrapped open
7360149.126.72.220 8413 tcp tcpwrapped open
7361149.126.72.220 8414 tcp tcpwrapped open
7362149.126.72.220 8415 tcp tcpwrapped open
7363149.126.72.220 8416 tcp tcpwrapped open
7364149.126.72.220 8417 tcp tcpwrapped open
7365149.126.72.220 8418 tcp tcpwrapped open
7366149.126.72.220 8419 tcp tcpwrapped open
7367149.126.72.220 8420 tcp tcpwrapped open
7368149.126.72.220 8421 tcp tcpwrapped open
7369149.126.72.220 8422 tcp tcpwrapped open
7370149.126.72.220 8423 tcp tcpwrapped open
7371149.126.72.220 8424 tcp tcpwrapped open
7372149.126.72.220 8425 tcp tcpwrapped open
7373149.126.72.220 8426 tcp tcpwrapped open
7374149.126.72.220 8427 tcp tcpwrapped open
7375149.126.72.220 8428 tcp tcpwrapped open
7376149.126.72.220 8429 tcp tcpwrapped open
7377149.126.72.220 8430 tcp tcpwrapped open
7378149.126.72.220 8431 tcp tcpwrapped open
7379149.126.72.220 8432 tcp tcpwrapped open
7380149.126.72.220 8433 tcp tcpwrapped open
7381149.126.72.220 8435 tcp tcpwrapped open
7382149.126.72.220 8440 tcp tcpwrapped open
7383149.126.72.220 8441 tcp tcpwrapped open
7384149.126.72.220 8442 tcp tcpwrapped open
7385149.126.72.220 8443 tcp tcpwrapped open
7386149.126.72.220 8444 tcp tcpwrapped open
7387149.126.72.220 8445 tcp tcpwrapped open
7388149.126.72.220 8446 tcp tcpwrapped open
7389149.126.72.220 8447 tcp tcpwrapped open
7390149.126.72.220 8448 tcp tcpwrapped open
7391149.126.72.220 8449 tcp tcpwrapped open
7392149.126.72.220 8450 tcp tcpwrapped open
7393149.126.72.220 8451 tcp tcpwrapped open
7394149.126.72.220 8452 tcp tcpwrapped open
7395149.126.72.220 8453 tcp tcpwrapped open
7396149.126.72.220 8454 tcp tcpwrapped open
7397149.126.72.220 8455 tcp tcpwrapped open
7398149.126.72.220 8456 tcp tcpwrapped open
7399149.126.72.220 8457 tcp tcpwrapped open
7400149.126.72.220 8458 tcp tcpwrapped open
7401149.126.72.220 8459 tcp tcpwrapped open
7402149.126.72.220 8460 tcp tcpwrapped open
7403149.126.72.220 8461 tcp tcpwrapped open
7404149.126.72.220 8462 tcp tcpwrapped open
7405149.126.72.220 8463 tcp tcpwrapped open
7406149.126.72.220 8464 tcp tcpwrapped open
7407149.126.72.220 8465 tcp tcpwrapped open
7408149.126.72.220 8466 tcp tcpwrapped open
7409149.126.72.220 8467 tcp tcpwrapped open
7410149.126.72.220 8470 tcp tcpwrapped open
7411149.126.72.220 8472 tcp tcpwrapped open
7412149.126.72.220 8473 tcp tcpwrapped open
7413149.126.72.220 8475 tcp tcpwrapped open
7414149.126.72.220 8480 tcp tcpwrapped open
7415149.126.72.220 8481 tcp tcpwrapped open
7416149.126.72.220 8482 tcp tcpwrapped open
7417149.126.72.220 8484 tcp tcpwrapped open
7418149.126.72.220 8485 tcp tcpwrapped open
7419149.126.72.220 8488 tcp tcpwrapped open
7420149.126.72.220 8493 tcp tcpwrapped open
7421149.126.72.220 8494 tcp tcpwrapped open
7422149.126.72.220 8500 tcp tcpwrapped open
7423149.126.72.220 8502 tcp tcpwrapped open
7424149.126.72.220 8503 tcp tcpwrapped open
7425149.126.72.220 8504 tcp tcpwrapped open
7426149.126.72.220 8505 tcp tcpwrapped open
7427149.126.72.220 8506 tcp tcpwrapped open
7428149.126.72.220 8510 tcp tcpwrapped open
7429149.126.72.220 8513 tcp tcpwrapped open
7430149.126.72.220 8514 tcp tcpwrapped open
7431149.126.72.220 8515 tcp tcpwrapped open
7432149.126.72.220 8519 tcp tcpwrapped open
7433149.126.72.220 8520 tcp tcpwrapped open
7434149.126.72.220 8521 tcp tcpwrapped open
7435149.126.72.220 8523 tcp tcpwrapped open
7436149.126.72.220 8524 tcp tcpwrapped open
7437149.126.72.220 8525 tcp tcpwrapped open
7438149.126.72.220 8526 tcp tcpwrapped open
7439149.126.72.220 8528 tcp tcpwrapped open
7440149.126.72.220 8529 tcp tcpwrapped open
7441149.126.72.220 8530 tcp tcpwrapped open
7442149.126.72.220 8531 tcp tcpwrapped open
7443149.126.72.220 8532 tcp tcpwrapped open
7444149.126.72.220 8533 tcp tcpwrapped open
7445149.126.72.220 8536 tcp tcpwrapped open
7446149.126.72.220 8540 tcp tcpwrapped open
7447149.126.72.220 8543 tcp tcpwrapped open
7448149.126.72.220 8544 tcp tcpwrapped open
7449149.126.72.220 8548 tcp tcpwrapped open
7450149.126.72.220 8549 tcp tcpwrapped open
7451149.126.72.220 8550 tcp tcpwrapped open
7452149.126.72.220 8551 tcp tcpwrapped open
7453149.126.72.220 8553 tcp tcpwrapped open
7454149.126.72.220 8556 tcp tcpwrapped open
7455149.126.72.220 8557 tcp tcpwrapped open
7456149.126.72.220 8558 tcp tcpwrapped open
7457149.126.72.220 8560 tcp tcpwrapped open
7458149.126.72.220 8561 tcp tcpwrapped open
7459149.126.72.220 8562 tcp tcpwrapped open
7460149.126.72.220 8563 tcp tcpwrapped open
7461149.126.72.220 8564 tcp tcpwrapped open
7462149.126.72.220 8565 tcp tcpwrapped open
7463149.126.72.220 8566 tcp tcpwrapped open
7464149.126.72.220 8567 tcp tcpwrapped open
7465149.126.72.220 8568 tcp tcpwrapped open
7466149.126.72.220 8569 tcp tcpwrapped open
7467149.126.72.220 8570 tcp tcpwrapped open
7468149.126.72.220 8571 tcp tcpwrapped open
7469149.126.72.220 8573 tcp tcpwrapped open
7470149.126.72.220 8574 tcp tcpwrapped open
7471149.126.72.220 8575 tcp tcpwrapped open
7472149.126.72.220 8576 tcp tcpwrapped open
7473149.126.72.220 8577 tcp tcpwrapped open
7474149.126.72.220 8578 tcp tcpwrapped open
7475149.126.72.220 8579 tcp tcpwrapped open
7476149.126.72.220 8580 tcp tcpwrapped open
7477149.126.72.220 8581 tcp tcpwrapped open
7478149.126.72.220 8582 tcp tcpwrapped open
7479149.126.72.220 8583 tcp tcpwrapped open
7480149.126.72.220 8585 tcp tcpwrapped open
7481149.126.72.220 8586 tcp tcpwrapped open
7482149.126.72.220 8588 tcp tcpwrapped open
7483149.126.72.220 8589 tcp tcpwrapped open
7484149.126.72.220 8590 tcp tcpwrapped open
7485149.126.72.220 8591 tcp tcpwrapped open
7486149.126.72.220 8592 tcp tcpwrapped open
7487149.126.72.220 8593 tcp tcpwrapped open
7488149.126.72.220 8594 tcp tcpwrapped open
7489149.126.72.220 8595 tcp tcpwrapped open
7490149.126.72.220 8596 tcp tcpwrapped open
7491149.126.72.220 8597 tcp tcpwrapped open
7492149.126.72.220 8598 tcp tcpwrapped open
7493149.126.72.220 8599 tcp tcpwrapped open
7494149.126.72.220 8600 tcp tcpwrapped open
7495149.126.72.220 8601 tcp tcpwrapped open
7496149.126.72.220 8605 tcp tcpwrapped open
7497149.126.72.220 8606 tcp tcpwrapped open
7498149.126.72.220 8630 tcp tcpwrapped open
7499149.126.72.220 8640 tcp tcpwrapped open
7500149.126.72.220 8641 tcp tcpwrapped open
7501149.126.72.220 8643 tcp tcpwrapped open
7502149.126.72.220 8663 tcp tcpwrapped open
7503149.126.72.220 8666 tcp tcpwrapped open
7504149.126.72.220 8686 tcp tcpwrapped open
7505149.126.72.220 8688 tcp tcpwrapped open
7506149.126.72.220 8700 tcp tcpwrapped open
7507149.126.72.220 8701 tcp tcpwrapped open
7508149.126.72.220 8702 tcp tcpwrapped open
7509149.126.72.220 8703 tcp tcpwrapped open
7510149.126.72.220 8704 tcp tcpwrapped open
7511149.126.72.220 8705 tcp tcpwrapped open
7512149.126.72.220 8706 tcp tcpwrapped open
7513149.126.72.220 8707 tcp tcpwrapped open
7514149.126.72.220 8708 tcp tcpwrapped open
7515149.126.72.220 8709 tcp tcpwrapped open
7516149.126.72.220 8723 tcp tcpwrapped open
7517149.126.72.220 8724 tcp tcpwrapped open
7518149.126.72.220 8731 tcp tcpwrapped open
7519149.126.72.220 8732 tcp tcpwrapped open
7520149.126.72.220 8764 tcp tcpwrapped open
7521149.126.72.220 8765 tcp tcpwrapped open
7522149.126.72.220 8766 tcp tcpwrapped open
7523149.126.72.220 8767 tcp tcpwrapped open
7524149.126.72.220 8771 tcp tcpwrapped open
7525149.126.72.220 8787 tcp tcpwrapped open
7526149.126.72.220 8788 tcp tcpwrapped open
7527149.126.72.220 8789 tcp tcpwrapped open
7528149.126.72.220 8790 tcp tcpwrapped open
7529149.126.72.220 8791 tcp tcpwrapped open
7530149.126.72.220 8800 tcp tcpwrapped open
7531149.126.72.220 8801 tcp tcpwrapped open
7532149.126.72.220 8802 tcp tcpwrapped open
7533149.126.72.220 8803 tcp tcpwrapped open
7534149.126.72.220 8804 tcp tcpwrapped open
7535149.126.72.220 8805 tcp tcpwrapped open
7536149.126.72.220 8806 tcp tcpwrapped open
7537149.126.72.220 8807 tcp tcpwrapped open
7538149.126.72.220 8808 tcp tcpwrapped open
7539149.126.72.220 8809 tcp tcpwrapped open
7540149.126.72.220 8810 tcp tcpwrapped open
7541149.126.72.220 8811 tcp tcpwrapped open
7542149.126.72.220 8812 tcp tcpwrapped open
7543149.126.72.220 8813 tcp tcpwrapped open
7544149.126.72.220 8814 tcp tcpwrapped open
7545149.126.72.220 8815 tcp tcpwrapped open
7546149.126.72.220 8816 tcp tcpwrapped open
7547149.126.72.220 8817 tcp tcpwrapped open
7548149.126.72.220 8818 tcp tcpwrapped open
7549149.126.72.220 8819 tcp tcpwrapped open
7550149.126.72.220 8820 tcp tcpwrapped open
7551149.126.72.220 8821 tcp tcpwrapped open
7552149.126.72.220 8822 tcp tcpwrapped open
7553149.126.72.220 8823 tcp tcpwrapped open
7554149.126.72.220 8824 tcp tcpwrapped open
7555149.126.72.220 8825 tcp tcpwrapped open
7556149.126.72.220 8826 tcp tcpwrapped open
7557149.126.72.220 8827 tcp tcpwrapped open
7558149.126.72.220 8828 tcp tcpwrapped open
7559149.126.72.220 8829 tcp tcpwrapped open
7560149.126.72.220 8830 tcp tcpwrapped open
7561149.126.72.220 8831 tcp tcpwrapped open
7562149.126.72.220 8832 tcp tcpwrapped open
7563149.126.72.220 8833 tcp tcpwrapped open
7564149.126.72.220 8834 tcp tcpwrapped open
7565149.126.72.220 8835 tcp tcpwrapped open
7566149.126.72.220 8836 tcp tcpwrapped open
7567149.126.72.220 8837 tcp tcpwrapped open
7568149.126.72.220 8838 tcp tcpwrapped open
7569149.126.72.220 8839 tcp tcpwrapped open
7570149.126.72.220 8840 tcp tcpwrapped open
7571149.126.72.220 8841 tcp tcpwrapped open
7572149.126.72.220 8842 tcp tcpwrapped open
7573149.126.72.220 8843 tcp tcpwrapped open
7574149.126.72.220 8844 tcp tcpwrapped open
7575149.126.72.220 8845 tcp tcpwrapped open
7576149.126.72.220 8846 tcp tcpwrapped open
7577149.126.72.220 8847 tcp tcpwrapped open
7578149.126.72.220 8848 tcp tcpwrapped open
7579149.126.72.220 8849 tcp tcpwrapped open
7580149.126.72.220 8850 tcp tcpwrapped open
7581149.126.72.220 8851 tcp tcpwrapped open
7582149.126.72.220 8852 tcp tcpwrapped open
7583149.126.72.220 8853 tcp tcpwrapped open
7584149.126.72.220 8854 tcp tcpwrapped open
7585149.126.72.220 8855 tcp tcpwrapped open
7586149.126.72.220 8856 tcp tcpwrapped open
7587149.126.72.220 8857 tcp tcpwrapped open
7588149.126.72.220 8858 tcp tcpwrapped open
7589149.126.72.220 8859 tcp tcpwrapped open
7590149.126.72.220 8860 tcp tcpwrapped open
7591149.126.72.220 8861 tcp tcpwrapped open
7592149.126.72.220 8862 tcp tcpwrapped open
7593149.126.72.220 8863 tcp tcpwrapped open
7594149.126.72.220 8864 tcp tcpwrapped open
7595149.126.72.220 8865 tcp tcpwrapped open
7596149.126.72.220 8866 tcp tcpwrapped open
7597149.126.72.220 8867 tcp tcpwrapped open
7598149.126.72.220 8868 tcp tcpwrapped open
7599149.126.72.220 8869 tcp tcpwrapped open
7600149.126.72.220 8870 tcp tcpwrapped open
7601149.126.72.220 8871 tcp tcpwrapped open
7602149.126.72.220 8872 tcp tcpwrapped open
7603149.126.72.220 8873 tcp tcpwrapped open
7604149.126.72.220 8874 tcp tcpwrapped open
7605149.126.72.220 8875 tcp tcpwrapped open
7606149.126.72.220 8876 tcp tcpwrapped open
7607149.126.72.220 8877 tcp tcpwrapped open
7608149.126.72.220 8878 tcp tcpwrapped open
7609149.126.72.220 8879 tcp tcpwrapped open
7610149.126.72.220 8880 tcp tcpwrapped open
7611149.126.72.220 8881 tcp tcpwrapped open
7612149.126.72.220 8882 tcp tcpwrapped open
7613149.126.72.220 8883 tcp tcpwrapped open
7614149.126.72.220 8884 tcp tcpwrapped open
7615149.126.72.220 8885 tcp tcpwrapped open
7616149.126.72.220 8887 tcp tcpwrapped open
7617149.126.72.220 8888 tcp tcpwrapped open
7618149.126.72.220 8889 tcp tcpwrapped open
7619149.126.72.220 8890 tcp tcpwrapped open
7620149.126.72.220 8891 tcp tcpwrapped open
7621149.126.72.220 8899 tcp tcpwrapped open
7622149.126.72.220 8900 tcp tcpwrapped open
7623149.126.72.220 8901 tcp tcpwrapped open
7624149.126.72.220 8902 tcp tcpwrapped open
7625149.126.72.220 8905 tcp tcpwrapped open
7626149.126.72.220 8906 tcp tcpwrapped open
7627149.126.72.220 8907 tcp tcpwrapped open
7628149.126.72.220 8908 tcp tcpwrapped open
7629149.126.72.220 8910 tcp tcpwrapped open
7630149.126.72.220 8911 tcp tcpwrapped open
7631149.126.72.220 8912 tcp tcpwrapped open
7632149.126.72.220 8913 tcp tcpwrapped open
7633149.126.72.220 8915 tcp tcpwrapped open
7634149.126.72.220 8916 tcp tcpwrapped open
7635149.126.72.220 8935 tcp tcpwrapped open
7636149.126.72.220 8943 tcp tcpwrapped open
7637149.126.72.220 8969 tcp tcpwrapped open
7638149.126.72.220 8988 tcp tcpwrapped open
7639149.126.72.220 8989 tcp tcpwrapped open
7640149.126.72.220 8999 tcp tcpwrapped open
7641149.126.72.220 9000 tcp tcpwrapped open
7642149.126.72.220 9001 tcp tcpwrapped open
7643149.126.72.220 9002 tcp tcpwrapped open
7644149.126.72.220 9003 tcp tcpwrapped open
7645149.126.72.220 9004 tcp tcpwrapped open
7646149.126.72.220 9005 tcp tcpwrapped open
7647149.126.72.220 9006 tcp tcpwrapped open
7648149.126.72.220 9007 tcp tcpwrapped open
7649149.126.72.220 9008 tcp tcpwrapped open
7650149.126.72.220 9009 tcp tcpwrapped open
7651149.126.72.220 9010 tcp tcpwrapped open
7652149.126.72.220 9011 tcp tcpwrapped open
7653149.126.72.220 9012 tcp tcpwrapped open
7654149.126.72.220 9013 tcp tcpwrapped open
7655149.126.72.220 9014 tcp tcpwrapped open
7656149.126.72.220 9015 tcp tcpwrapped open
7657149.126.72.220 9016 tcp tcpwrapped open
7658149.126.72.220 9017 tcp tcpwrapped open
7659149.126.72.220 9018 tcp tcpwrapped open
7660149.126.72.220 9019 tcp tcpwrapped open
7661149.126.72.220 9020 tcp tcpwrapped open
7662149.126.72.220 9021 tcp tcpwrapped open
7663149.126.72.220 9022 tcp tcpwrapped open
7664149.126.72.220 9023 tcp tcpwrapped open
7665149.126.72.220 9024 tcp tcpwrapped open
7666149.126.72.220 9025 tcp tcpwrapped open
7667149.126.72.220 9026 tcp tcpwrapped open
7668149.126.72.220 9027 tcp tcpwrapped open
7669149.126.72.220 9028 tcp tcpwrapped open
7670149.126.72.220 9029 tcp tcpwrapped open
7671149.126.72.220 9030 tcp tcpwrapped open
7672149.126.72.220 9031 tcp tcpwrapped open
7673149.126.72.220 9032 tcp tcpwrapped open
7674149.126.72.220 9033 tcp tcpwrapped open
7675149.126.72.220 9034 tcp tcpwrapped open
7676149.126.72.220 9035 tcp tcpwrapped open
7677149.126.72.220 9036 tcp tcpwrapped open
7678149.126.72.220 9037 tcp tcpwrapped open
7679149.126.72.220 9038 tcp tcpwrapped open
7680149.126.72.220 9039 tcp tcpwrapped open
7681149.126.72.220 9040 tcp tcpwrapped open
7682149.126.72.220 9041 tcp tcpwrapped open
7683149.126.72.220 9042 tcp tcpwrapped open
7684149.126.72.220 9043 tcp tcpwrapped open
7685149.126.72.220 9044 tcp tcpwrapped open
7686149.126.72.220 9045 tcp tcpwrapped open
7687149.126.72.220 9046 tcp tcpwrapped open
7688149.126.72.220 9047 tcp tcpwrapped open
7689149.126.72.220 9048 tcp tcpwrapped open
7690149.126.72.220 9049 tcp tcpwrapped open
7691149.126.72.220 9050 tcp tcpwrapped open
7692149.126.72.220 9051 tcp tcpwrapped open
7693149.126.72.220 9052 tcp tcpwrapped open
7694149.126.72.220 9058 tcp tcpwrapped open
7695149.126.72.220 9060 tcp tcpwrapped open
7696149.126.72.220 9061 tcp tcpwrapped open
7697149.126.72.220 9070 tcp tcpwrapped open
7698149.126.72.220 9080 tcp tcpwrapped open
7699149.126.72.220 9081 tcp tcpwrapped open
7700149.126.72.220 9082 tcp tcpwrapped open
7701149.126.72.220 9084 tcp tcpwrapped open
7702149.126.72.220 9085 tcp tcpwrapped open
7703149.126.72.220 9086 tcp tcpwrapped open
7704149.126.72.220 9088 tcp tcpwrapped open
7705149.126.72.220 9089 tcp tcpwrapped open
7706149.126.72.220 9090 tcp tcpwrapped open
7707149.126.72.220 9091 tcp tcpwrapped open
7708149.126.72.220 9092 tcp tcpwrapped open
7709149.126.72.220 9093 tcp tcpwrapped open
7710149.126.72.220 9094 tcp tcpwrapped open
7711149.126.72.220 9095 tcp tcpwrapped open
7712149.126.72.220 9096 tcp tcpwrapped open
7713149.126.72.220 9097 tcp tcpwrapped open
7714149.126.72.220 9098 tcp tcpwrapped open
7715149.126.72.220 9099 tcp tcpwrapped open
7716149.126.72.220 9100 tcp jetdirect open
7717149.126.72.220 9101 tcp jetdirect open
7718149.126.72.220 9102 tcp jetdirect open
7719149.126.72.220 9103 tcp jetdirect open
7720149.126.72.220 9104 tcp jetdirect open
7721149.126.72.220 9105 tcp jetdirect open
7722149.126.72.220 9106 tcp jetdirect open
7723149.126.72.220 9107 tcp jetdirect open
7724149.126.72.220 9108 tcp tcpwrapped open
7725149.126.72.220 9109 tcp tcpwrapped open
7726149.126.72.220 9110 tcp tcpwrapped open
7727149.126.72.220 9111 tcp tcpwrapped open
7728149.126.72.220 9136 tcp tcpwrapped open
7729149.126.72.220 9143 tcp tcpwrapped open
7730149.126.72.220 9189 tcp tcpwrapped open
7731149.126.72.220 9199 tcp tcpwrapped open
7732149.126.72.220 9200 tcp tcpwrapped open
7733149.126.72.220 9201 tcp tcpwrapped open
7734149.126.72.220 9202 tcp tcpwrapped open
7735149.126.72.220 9203 tcp tcpwrapped open
7736149.126.72.220 9204 tcp tcpwrapped open
7737149.126.72.220 9205 tcp tcpwrapped open
7738149.126.72.220 9206 tcp tcpwrapped open
7739149.126.72.220 9207 tcp tcpwrapped open
7740149.126.72.220 9208 tcp tcpwrapped open
7741149.126.72.220 9209 tcp tcpwrapped open
7742149.126.72.220 9210 tcp tcpwrapped open
7743149.126.72.220 9211 tcp tcpwrapped open
7744149.126.72.220 9212 tcp tcpwrapped open
7745149.126.72.220 9213 tcp tcpwrapped open
7746149.126.72.220 9214 tcp tcpwrapped open
7747149.126.72.220 9215 tcp tcpwrapped open
7748149.126.72.220 9216 tcp tcpwrapped open
7749149.126.72.220 9217 tcp tcpwrapped open
7750149.126.72.220 9218 tcp tcpwrapped open
7751149.126.72.220 9219 tcp tcpwrapped open
7752149.126.72.220 9220 tcp tcpwrapped open
7753149.126.72.220 9221 tcp tcpwrapped open
7754149.126.72.220 9236 tcp tcpwrapped open
7755149.126.72.220 9251 tcp tcpwrapped open
7756149.126.72.220 9289 tcp tcpwrapped open
7757149.126.72.220 9299 tcp tcpwrapped open
7758149.126.72.220 9300 tcp tcpwrapped open
7759149.126.72.220 9301 tcp tcpwrapped open
7760149.126.72.220 9302 tcp tcpwrapped open
7761149.126.72.220 9303 tcp tcpwrapped open
7762149.126.72.220 9304 tcp tcpwrapped open
7763149.126.72.220 9305 tcp tcpwrapped open
7764149.126.72.220 9306 tcp tcpwrapped open
7765149.126.72.220 9307 tcp tcpwrapped open
7766149.126.72.220 9308 tcp tcpwrapped open
7767149.126.72.220 9309 tcp tcpwrapped open
7768149.126.72.220 9310 tcp tcpwrapped open
7769149.126.72.220 9311 tcp tcpwrapped open
7770149.126.72.220 9350 tcp tcpwrapped open
7771149.126.72.220 9383 tcp tcpwrapped open
7772149.126.72.220 9387 tcp tcpwrapped open
7773149.126.72.220 9389 tcp tcpwrapped open
7774149.126.72.220 9433 tcp tcpwrapped open
7775149.126.72.220 9443 tcp tcpwrapped open
7776149.126.72.220 9444 tcp tcpwrapped open
7777149.126.72.220 9446 tcp tcpwrapped open
7778149.126.72.220 9447 tcp tcpwrapped open
7779149.126.72.220 9500 tcp tcpwrapped open
7780149.126.72.220 9510 tcp tcpwrapped open
7781149.126.72.220 9530 tcp tcpwrapped open
7782149.126.72.220 9550 tcp tcpwrapped open
7783149.126.72.220 9600 tcp tcpwrapped open
7784149.126.72.220 9663 tcp tcpwrapped open
7785149.126.72.220 9690 tcp tcpwrapped open
7786149.126.72.220 9704 tcp tcpwrapped open
7787149.126.72.220 9710 tcp tcpwrapped open
7788149.126.72.220 9711 tcp tcpwrapped open
7789149.126.72.220 9765 tcp tcpwrapped open
7790149.126.72.220 9773 tcp tcpwrapped open
7791149.126.72.220 9779 tcp tcpwrapped open
7792149.126.72.220 9800 tcp tcpwrapped open
7793149.126.72.220 9803 tcp tcpwrapped open
7794149.126.72.220 9804 tcp tcpwrapped open
7795149.126.72.220 9950 tcp tcpwrapped open
7796149.126.72.220 9991 tcp tcpwrapped open
7797149.126.72.220 9992 tcp tcpwrapped open
7798149.126.72.220 9993 tcp tcpwrapped open
7799149.126.72.220 9994 tcp tcpwrapped open
7800149.126.72.220 9997 tcp tcpwrapped open
7801149.126.72.220 9998 tcp tcpwrapped open
7802149.126.72.220 9999 tcp tcpwrapped open
7803149.126.72.220 10000 tcp tcpwrapped open
7804149.126.72.220 10001 tcp tcpwrapped open
7805149.126.72.220 10002 tcp tcpwrapped open
7806149.126.72.220 10003 tcp tcpwrapped open
7807149.126.72.220 10004 tcp tcpwrapped open
7808149.126.72.220 10005 tcp tcpwrapped open
7809149.126.72.220 10006 tcp tcpwrapped open
7810149.126.72.220 10007 tcp tcpwrapped open
7811149.126.72.220 10008 tcp tcpwrapped open
7812149.126.72.220 10009 tcp tcpwrapped open
7813149.126.72.220 10010 tcp tcpwrapped open
7814149.126.72.220 10011 tcp tcpwrapped open
7815149.126.72.220 10012 tcp tcpwrapped open
7816149.126.72.220 10013 tcp tcpwrapped open
7817149.126.72.220 10014 tcp tcpwrapped open
7818149.126.72.220 10015 tcp tcpwrapped open
7819149.126.72.220 10016 tcp tcpwrapped open
7820149.126.72.220 10017 tcp tcpwrapped open
7821149.126.72.220 10018 tcp tcpwrapped open
7822149.126.72.220 10019 tcp tcpwrapped open
7823149.126.72.220 10020 tcp tcpwrapped open
7824149.126.72.220 10021 tcp tcpwrapped open
7825149.126.72.220 10022 tcp tcpwrapped open
7826149.126.72.220 10023 tcp tcpwrapped open
7827149.126.72.220 10024 tcp tcpwrapped open
7828149.126.72.220 10025 tcp tcpwrapped open
7829149.126.72.220 10026 tcp tcpwrapped open
7830149.126.72.220 10027 tcp tcpwrapped open
7831149.126.72.220 10028 tcp tcpwrapped open
7832149.126.72.220 10029 tcp tcpwrapped open
7833149.126.72.220 10030 tcp tcpwrapped open
7834149.126.72.220 10031 tcp tcpwrapped open
7835149.126.72.220 10032 tcp tcpwrapped open
7836149.126.72.220 10033 tcp tcpwrapped open
7837149.126.72.220 10034 tcp tcpwrapped open
7838149.126.72.220 10035 tcp tcpwrapped open
7839149.126.72.220 10036 tcp tcpwrapped open
7840149.126.72.220 10037 tcp tcpwrapped open
7841149.126.72.220 10038 tcp tcpwrapped open
7842149.126.72.220 10039 tcp tcpwrapped open
7843149.126.72.220 10040 tcp tcpwrapped open
7844149.126.72.220 10041 tcp tcpwrapped open
7845149.126.72.220 10042 tcp tcpwrapped open
7846149.126.72.220 10043 tcp tcpwrapped open
7847149.126.72.220 10044 tcp tcpwrapped open
7848149.126.72.220 10045 tcp tcpwrapped open
7849149.126.72.220 10046 tcp tcpwrapped open
7850149.126.72.220 10047 tcp tcpwrapped open
7851149.126.72.220 10048 tcp tcpwrapped open
7852149.126.72.220 10049 tcp tcpwrapped open
7853149.126.72.220 10065 tcp tcpwrapped open
7854149.126.72.220 10071 tcp tcpwrapped open
7855149.126.72.220 10075 tcp tcpwrapped open
7856149.126.72.220 10082 tcp tcpwrapped open
7857149.126.72.220 10084 tcp tcpwrapped open
7858149.126.72.220 10100 tcp tcpwrapped open
7859149.126.72.220 10123 tcp tcpwrapped open
7860149.126.72.220 10200 tcp tcpwrapped open
7861149.126.72.220 10443 tcp tcpwrapped open
7862149.126.72.220 10444 tcp tcpwrapped open
7863149.126.72.220 10892 tcp tcpwrapped open
7864149.126.72.220 10894 tcp tcpwrapped open
7865149.126.72.220 11001 tcp tcpwrapped open
7866149.126.72.220 11002 tcp tcpwrapped open
7867149.126.72.220 11007 tcp tcpwrapped open
7868149.126.72.220 11027 tcp tcpwrapped open
7869149.126.72.220 11065 tcp tcpwrapped open
7870149.126.72.220 11075 tcp tcpwrapped open
7871149.126.72.220 11082 tcp tcpwrapped open
7872149.126.72.220 11084 tcp tcpwrapped open
7873149.126.72.220 11110 tcp tcpwrapped open
7874149.126.72.220 11182 tcp tcpwrapped open
7875149.126.72.220 11184 tcp tcpwrapped open
7876149.126.72.220 11443 tcp tcpwrapped open
7877149.126.72.220 12016 tcp tcpwrapped open
7878149.126.72.220 12082 tcp tcpwrapped open
7879149.126.72.220 12084 tcp tcpwrapped open
7880149.126.72.220 12103 tcp tcpwrapped open
7881149.126.72.220 12104 tcp tcpwrapped open
7882149.126.72.220 12105 tcp tcpwrapped open
7883149.126.72.220 12106 tcp tcpwrapped open
7884149.126.72.220 12107 tcp tcpwrapped open
7885149.126.72.220 12108 tcp tcpwrapped open
7886149.126.72.220 12109 tcp tcpwrapped open
7887149.126.72.220 12110 tcp tcpwrapped open
7888149.126.72.220 12111 tcp tcpwrapped open
7889149.126.72.220 12112 tcp tcpwrapped open
7890149.126.72.220 12113 tcp tcpwrapped open
7891149.126.72.220 12114 tcp tcpwrapped open
7892149.126.72.220 12115 tcp tcpwrapped open
7893149.126.72.220 12116 tcp tcpwrapped open
7894149.126.72.220 12117 tcp tcpwrapped open
7895149.126.72.220 12118 tcp tcpwrapped open
7896149.126.72.220 12119 tcp tcpwrapped open
7897149.126.72.220 12120 tcp tcpwrapped open
7898149.126.72.220 12121 tcp tcpwrapped open
7899149.126.72.220 12122 tcp tcpwrapped open
7900149.126.72.220 12123 tcp tcpwrapped open
7901149.126.72.220 12124 tcp tcpwrapped open
7902149.126.72.220 12125 tcp tcpwrapped open
7903149.126.72.220 12126 tcp tcpwrapped open
7904149.126.72.220 12127 tcp tcpwrapped open
7905149.126.72.220 12128 tcp tcpwrapped open
7906149.126.72.220 12129 tcp tcpwrapped open
7907149.126.72.220 12130 tcp tcpwrapped open
7908149.126.72.220 12131 tcp tcpwrapped open
7909149.126.72.220 12132 tcp tcpwrapped open
7910149.126.72.220 12133 tcp tcpwrapped open
7911149.126.72.220 12134 tcp tcpwrapped open
7912149.126.72.220 12135 tcp tcpwrapped open
7913149.126.72.220 12136 tcp tcpwrapped open
7914149.126.72.220 12137 tcp tcpwrapped open
7915149.126.72.220 12138 tcp tcpwrapped open
7916149.126.72.220 12139 tcp tcpwrapped open
7917149.126.72.220 12140 tcp tcpwrapped open
7918149.126.72.220 12141 tcp tcpwrapped open
7919149.126.72.220 12142 tcp tcpwrapped open
7920149.126.72.220 12143 tcp tcpwrapped open
7921149.126.72.220 12144 tcp tcpwrapped open
7922149.126.72.220 12145 tcp tcpwrapped open
7923149.126.72.220 12146 tcp tcpwrapped open
7924149.126.72.220 12147 tcp tcpwrapped open
7925149.126.72.220 12148 tcp tcpwrapped open
7926149.126.72.220 12149 tcp tcpwrapped open
7927149.126.72.220 12150 tcp tcpwrapped open
7928149.126.72.220 12151 tcp tcpwrapped open
7929149.126.72.220 12152 tcp tcpwrapped open
7930149.126.72.220 12153 tcp tcpwrapped open
7931149.126.72.220 12154 tcp tcpwrapped open
7932149.126.72.220 12155 tcp tcpwrapped open
7933149.126.72.220 12156 tcp tcpwrapped open
7934149.126.72.220 12157 tcp tcpwrapped open
7935149.126.72.220 12158 tcp tcpwrapped open
7936149.126.72.220 12159 tcp tcpwrapped open
7937149.126.72.220 12160 tcp tcpwrapped open
7938149.126.72.220 12161 tcp tcpwrapped open
7939149.126.72.220 12162 tcp tcpwrapped open
7940149.126.72.220 12163 tcp tcpwrapped open
7941149.126.72.220 12164 tcp tcpwrapped open
7942149.126.72.220 12165 tcp tcpwrapped open
7943149.126.72.220 12166 tcp tcpwrapped open
7944149.126.72.220 12167 tcp tcpwrapped open
7945149.126.72.220 12168 tcp tcpwrapped open
7946149.126.72.220 12169 tcp tcpwrapped open
7947149.126.72.220 12170 tcp tcpwrapped open
7948149.126.72.220 12171 tcp tcpwrapped open
7949149.126.72.220 12172 tcp tcpwrapped open
7950149.126.72.220 12173 tcp tcpwrapped open
7951149.126.72.220 12174 tcp tcpwrapped open
7952149.126.72.220 12175 tcp tcpwrapped open
7953149.126.72.220 12176 tcp tcpwrapped open
7954149.126.72.220 12177 tcp tcpwrapped open
7955149.126.72.220 12178 tcp tcpwrapped open
7956149.126.72.220 12179 tcp tcpwrapped open
7957149.126.72.220 12180 tcp tcpwrapped open
7958149.126.72.220 12181 tcp tcpwrapped open
7959149.126.72.220 12182 tcp tcpwrapped open
7960149.126.72.220 12183 tcp tcpwrapped open
7961149.126.72.220 12184 tcp tcpwrapped open
7962149.126.72.220 12185 tcp tcpwrapped open
7963149.126.72.220 12186 tcp tcpwrapped open
7964149.126.72.220 12187 tcp tcpwrapped open
7965149.126.72.220 12188 tcp tcpwrapped open
7966149.126.72.220 12189 tcp tcpwrapped open
7967149.126.72.220 12190 tcp tcpwrapped open
7968149.126.72.220 12191 tcp tcpwrapped open
7969149.126.72.220 12192 tcp tcpwrapped open
7970149.126.72.220 12193 tcp tcpwrapped open
7971149.126.72.220 12194 tcp tcpwrapped open
7972149.126.72.220 12195 tcp tcpwrapped open
7973149.126.72.220 12196 tcp tcpwrapped open
7974149.126.72.220 12197 tcp tcpwrapped open
7975149.126.72.220 12198 tcp tcpwrapped open
7976149.126.72.220 12199 tcp tcpwrapped open
7977149.126.72.220 12200 tcp tcpwrapped open
7978149.126.72.220 12201 tcp tcpwrapped open
7979149.126.72.220 12202 tcp tcpwrapped open
7980149.126.72.220 12203 tcp tcpwrapped open
7981149.126.72.220 12204 tcp tcpwrapped open
7982149.126.72.220 12205 tcp tcpwrapped open
7983149.126.72.220 12206 tcp tcpwrapped open
7984149.126.72.220 12207 tcp tcpwrapped open
7985149.126.72.220 12208 tcp tcpwrapped open
7986149.126.72.220 12209 tcp tcpwrapped open
7987149.126.72.220 12210 tcp tcpwrapped open
7988149.126.72.220 12211 tcp tcpwrapped open
7989149.126.72.220 12212 tcp tcpwrapped open
7990149.126.72.220 12213 tcp tcpwrapped open
7991149.126.72.220 12214 tcp tcpwrapped open
7992149.126.72.220 12215 tcp tcpwrapped open
7993149.126.72.220 12216 tcp tcpwrapped open
7994149.126.72.220 12217 tcp tcpwrapped open
7995149.126.72.220 12218 tcp tcpwrapped open
7996149.126.72.220 12219 tcp tcpwrapped open
7997149.126.72.220 12220 tcp tcpwrapped open
7998149.126.72.220 12221 tcp tcpwrapped open
7999149.126.72.220 12222 tcp tcpwrapped open
8000149.126.72.220 12223 tcp tcpwrapped open
8001149.126.72.220 12224 tcp tcpwrapped open
8002149.126.72.220 12225 tcp tcpwrapped open
8003149.126.72.220 12226 tcp tcpwrapped open
8004149.126.72.220 12227 tcp tcpwrapped open
8005149.126.72.220 12228 tcp tcpwrapped open
8006149.126.72.220 12229 tcp tcpwrapped open
8007149.126.72.220 12230 tcp tcpwrapped open
8008149.126.72.220 12231 tcp tcpwrapped open
8009149.126.72.220 12232 tcp tcpwrapped open
8010149.126.72.220 12233 tcp tcpwrapped open
8011149.126.72.220 12234 tcp tcpwrapped open
8012149.126.72.220 12235 tcp tcpwrapped open
8013149.126.72.220 12236 tcp tcpwrapped open
8014149.126.72.220 12237 tcp tcpwrapped open
8015149.126.72.220 12238 tcp tcpwrapped open
8016149.126.72.220 12239 tcp tcpwrapped open
8017149.126.72.220 12240 tcp tcpwrapped open
8018149.126.72.220 12241 tcp tcpwrapped open
8019149.126.72.220 12242 tcp tcpwrapped open
8020149.126.72.220 12243 tcp tcpwrapped open
8021149.126.72.220 12244 tcp tcpwrapped open
8022149.126.72.220 12245 tcp tcpwrapped open
8023149.126.72.220 12246 tcp tcpwrapped open
8024149.126.72.220 12247 tcp tcpwrapped open
8025149.126.72.220 12248 tcp tcpwrapped open
8026149.126.72.220 12249 tcp tcpwrapped open
8027149.126.72.220 12250 tcp tcpwrapped open
8028149.126.72.220 12251 tcp tcpwrapped open
8029149.126.72.220 12252 tcp tcpwrapped open
8030149.126.72.220 12253 tcp tcpwrapped open
8031149.126.72.220 12254 tcp tcpwrapped open
8032149.126.72.220 12255 tcp tcpwrapped open
8033149.126.72.220 12256 tcp tcpwrapped open
8034149.126.72.220 12257 tcp tcpwrapped open
8035149.126.72.220 12258 tcp tcpwrapped open
8036149.126.72.220 12259 tcp tcpwrapped open
8037149.126.72.220 12260 tcp tcpwrapped open
8038149.126.72.220 12261 tcp tcpwrapped open
8039149.126.72.220 12262 tcp tcpwrapped open
8040149.126.72.220 12263 tcp tcpwrapped open
8041149.126.72.220 12264 tcp tcpwrapped open
8042149.126.72.220 12265 tcp tcpwrapped open
8043149.126.72.220 12266 tcp tcpwrapped open
8044149.126.72.220 12267 tcp tcpwrapped open
8045149.126.72.220 12268 tcp tcpwrapped open
8046149.126.72.220 12269 tcp tcpwrapped open
8047149.126.72.220 12270 tcp tcpwrapped open
8048149.126.72.220 12271 tcp tcpwrapped open
8049149.126.72.220 12272 tcp tcpwrapped open
8050149.126.72.220 12273 tcp tcpwrapped open
8051149.126.72.220 12274 tcp tcpwrapped open
8052149.126.72.220 12275 tcp tcpwrapped open
8053149.126.72.220 12276 tcp tcpwrapped open
8054149.126.72.220 12277 tcp tcpwrapped open
8055149.126.72.220 12278 tcp tcpwrapped open
8056149.126.72.220 12279 tcp tcpwrapped open
8057149.126.72.220 12280 tcp tcpwrapped open
8058149.126.72.220 12281 tcp tcpwrapped open
8059149.126.72.220 12282 tcp tcpwrapped open
8060149.126.72.220 12283 tcp tcpwrapped open
8061149.126.72.220 12284 tcp tcpwrapped open
8062149.126.72.220 12285 tcp tcpwrapped open
8063149.126.72.220 12286 tcp tcpwrapped open
8064149.126.72.220 12287 tcp tcpwrapped open
8065149.126.72.220 12288 tcp tcpwrapped open
8066149.126.72.220 12289 tcp tcpwrapped open
8067149.126.72.220 12290 tcp tcpwrapped open
8068149.126.72.220 12291 tcp tcpwrapped open
8069149.126.72.220 12292 tcp tcpwrapped open
8070149.126.72.220 12293 tcp tcpwrapped open
8071149.126.72.220 12294 tcp tcpwrapped open
8072149.126.72.220 12295 tcp tcpwrapped open
8073149.126.72.220 12296 tcp tcpwrapped open
8074149.126.72.220 12297 tcp tcpwrapped open
8075149.126.72.220 12298 tcp tcpwrapped open
8076149.126.72.220 12299 tcp tcpwrapped open
8077149.126.72.220 12300 tcp tcpwrapped open
8078149.126.72.220 12301 tcp tcpwrapped open
8079149.126.72.220 12302 tcp tcpwrapped open
8080149.126.72.220 12303 tcp tcpwrapped open
8081149.126.72.220 12304 tcp tcpwrapped open
8082149.126.72.220 12305 tcp tcpwrapped open
8083149.126.72.220 12306 tcp tcpwrapped open
8084149.126.72.220 12307 tcp tcpwrapped open
8085149.126.72.220 12308 tcp tcpwrapped open
8086149.126.72.220 12309 tcp tcpwrapped open
8087149.126.72.220 12310 tcp tcpwrapped open
8088149.126.72.220 12311 tcp tcpwrapped open
8089149.126.72.220 12312 tcp tcpwrapped open
8090149.126.72.220 12313 tcp tcpwrapped open
8091149.126.72.220 12314 tcp tcpwrapped open
8092149.126.72.220 12315 tcp tcpwrapped open
8093149.126.72.220 12316 tcp tcpwrapped open
8094149.126.72.220 12317 tcp tcpwrapped open
8095149.126.72.220 12318 tcp tcpwrapped open
8096149.126.72.220 12319 tcp tcpwrapped open
8097149.126.72.220 12320 tcp tcpwrapped open
8098149.126.72.220 12321 tcp tcpwrapped open
8099149.126.72.220 12322 tcp tcpwrapped open
8100149.126.72.220 12323 tcp tcpwrapped open
8101149.126.72.220 12324 tcp tcpwrapped open
8102149.126.72.220 12325 tcp tcpwrapped open
8103149.126.72.220 12326 tcp tcpwrapped open
8104149.126.72.220 12327 tcp tcpwrapped open
8105149.126.72.220 12328 tcp tcpwrapped open
8106149.126.72.220 12329 tcp tcpwrapped open
8107149.126.72.220 12330 tcp tcpwrapped open
8108149.126.72.220 12331 tcp tcpwrapped open
8109149.126.72.220 12332 tcp tcpwrapped open
8110149.126.72.220 12333 tcp tcpwrapped open
8111149.126.72.220 12334 tcp tcpwrapped open
8112149.126.72.220 12335 tcp tcpwrapped open
8113149.126.72.220 12336 tcp tcpwrapped open
8114149.126.72.220 12337 tcp tcpwrapped open
8115149.126.72.220 12338 tcp tcpwrapped open
8116149.126.72.220 12339 tcp tcpwrapped open
8117149.126.72.220 12340 tcp tcpwrapped open
8118149.126.72.220 12341 tcp tcpwrapped open
8119149.126.72.220 12342 tcp tcpwrapped open
8120149.126.72.220 12343 tcp tcpwrapped open
8121149.126.72.220 12344 tcp tcpwrapped open
8122149.126.72.220 12345 tcp tcpwrapped open
8123149.126.72.220 12346 tcp tcpwrapped open
8124149.126.72.220 12347 tcp tcpwrapped open
8125149.126.72.220 12348 tcp tcpwrapped open
8126149.126.72.220 12349 tcp tcpwrapped open
8127149.126.72.220 12350 tcp tcpwrapped open
8128149.126.72.220 12351 tcp tcpwrapped open
8129149.126.72.220 12352 tcp tcpwrapped open
8130149.126.72.220 12353 tcp tcpwrapped open
8131149.126.72.220 12354 tcp tcpwrapped open
8132149.126.72.220 12355 tcp tcpwrapped open
8133149.126.72.220 12356 tcp tcpwrapped open
8134149.126.72.220 12357 tcp tcpwrapped open
8135149.126.72.220 12358 tcp tcpwrapped open
8136149.126.72.220 12359 tcp tcpwrapped open
8137149.126.72.220 12360 tcp tcpwrapped open
8138149.126.72.220 12361 tcp tcpwrapped open
8139149.126.72.220 12362 tcp tcpwrapped open
8140149.126.72.220 12363 tcp tcpwrapped open
8141149.126.72.220 12364 tcp tcpwrapped open
8142149.126.72.220 12365 tcp tcpwrapped open
8143149.126.72.220 12366 tcp tcpwrapped open
8144149.126.72.220 12367 tcp tcpwrapped open
8145149.126.72.220 12368 tcp tcpwrapped open
8146149.126.72.220 12369 tcp tcpwrapped open
8147149.126.72.220 12370 tcp tcpwrapped open
8148149.126.72.220 12371 tcp tcpwrapped open
8149149.126.72.220 12372 tcp tcpwrapped open
8150149.126.72.220 12373 tcp tcpwrapped open
8151149.126.72.220 12374 tcp tcpwrapped open
8152149.126.72.220 12375 tcp tcpwrapped open
8153149.126.72.220 12376 tcp tcpwrapped open
8154149.126.72.220 12377 tcp tcpwrapped open
8155149.126.72.220 12378 tcp tcpwrapped open
8156149.126.72.220 12379 tcp tcpwrapped open
8157149.126.72.220 12380 tcp tcpwrapped open
8158149.126.72.220 12381 tcp tcpwrapped open
8159149.126.72.220 12382 tcp tcpwrapped open
8160149.126.72.220 12383 tcp tcpwrapped open
8161149.126.72.220 12384 tcp tcpwrapped open
8162149.126.72.220 12385 tcp tcpwrapped open
8163149.126.72.220 12386 tcp tcpwrapped open
8164149.126.72.220 12387 tcp tcpwrapped open
8165149.126.72.220 12388 tcp tcpwrapped open
8166149.126.72.220 12389 tcp tcpwrapped open
8167149.126.72.220 12390 tcp tcpwrapped open
8168149.126.72.220 12391 tcp tcpwrapped open
8169149.126.72.220 12392 tcp tcpwrapped open
8170149.126.72.220 12393 tcp tcpwrapped open
8171149.126.72.220 12394 tcp tcpwrapped open
8172149.126.72.220 12395 tcp tcpwrapped open
8173149.126.72.220 12396 tcp tcpwrapped open
8174149.126.72.220 12397 tcp tcpwrapped open
8175149.126.72.220 12398 tcp tcpwrapped open
8176149.126.72.220 12399 tcp tcpwrapped open
8177149.126.72.220 12400 tcp tcpwrapped open
8178149.126.72.220 12401 tcp tcpwrapped open
8179149.126.72.220 12402 tcp tcpwrapped open
8180149.126.72.220 12403 tcp tcpwrapped open
8181149.126.72.220 12404 tcp tcpwrapped open
8182149.126.72.220 12405 tcp tcpwrapped open
8183149.126.72.220 12406 tcp tcpwrapped open
8184149.126.72.220 12407 tcp tcpwrapped open
8185149.126.72.220 12408 tcp tcpwrapped open
8186149.126.72.220 12409 tcp tcpwrapped open
8187149.126.72.220 12410 tcp tcpwrapped open
8188149.126.72.220 12411 tcp tcpwrapped open
8189149.126.72.220 12412 tcp tcpwrapped open
8190149.126.72.220 12413 tcp tcpwrapped open
8191149.126.72.220 12414 tcp tcpwrapped open
8192149.126.72.220 12415 tcp tcpwrapped open
8193149.126.72.220 12416 tcp tcpwrapped open
8194149.126.72.220 12417 tcp tcpwrapped open
8195149.126.72.220 12418 tcp tcpwrapped open
8196149.126.72.220 12419 tcp tcpwrapped open
8197149.126.72.220 12420 tcp tcpwrapped open
8198149.126.72.220 12421 tcp tcpwrapped open
8199149.126.72.220 12422 tcp tcpwrapped open
8200149.126.72.220 12423 tcp tcpwrapped open
8201149.126.72.220 12424 tcp tcpwrapped open
8202149.126.72.220 12425 tcp tcpwrapped open
8203149.126.72.220 12426 tcp tcpwrapped open
8204149.126.72.220 12427 tcp tcpwrapped open
8205149.126.72.220 12428 tcp tcpwrapped open
8206149.126.72.220 12429 tcp tcpwrapped open
8207149.126.72.220 12430 tcp tcpwrapped open
8208149.126.72.220 12431 tcp tcpwrapped open
8209149.126.72.220 12432 tcp tcpwrapped open
8210149.126.72.220 12433 tcp tcpwrapped open
8211149.126.72.220 12434 tcp tcpwrapped open
8212149.126.72.220 12435 tcp tcpwrapped open
8213149.126.72.220 12436 tcp tcpwrapped open
8214149.126.72.220 12437 tcp tcpwrapped open
8215149.126.72.220 12438 tcp tcpwrapped open
8216149.126.72.220 12439 tcp tcpwrapped open
8217149.126.72.220 12440 tcp tcpwrapped open
8218149.126.72.220 12441 tcp tcpwrapped open
8219149.126.72.220 12442 tcp tcpwrapped open
8220149.126.72.220 12443 tcp tcpwrapped open
8221149.126.72.220 12444 tcp tcpwrapped open
8222149.126.72.220 12445 tcp tcpwrapped open
8223149.126.72.220 12446 tcp tcpwrapped open
8224149.126.72.220 12447 tcp tcpwrapped open
8225149.126.72.220 12448 tcp tcpwrapped open
8226149.126.72.220 12449 tcp tcpwrapped open
8227149.126.72.220 12450 tcp tcpwrapped open
8228149.126.72.220 12451 tcp tcpwrapped open
8229149.126.72.220 12452 tcp tcpwrapped open
8230149.126.72.220 12453 tcp tcpwrapped open
8231149.126.72.220 12454 tcp tcpwrapped open
8232149.126.72.220 12455 tcp tcpwrapped open
8233149.126.72.220 12456 tcp tcpwrapped open
8234149.126.72.220 12457 tcp tcpwrapped open
8235149.126.72.220 12458 tcp tcpwrapped open
8236149.126.72.220 12459 tcp tcpwrapped open
8237149.126.72.220 12460 tcp tcpwrapped open
8238149.126.72.220 12461 tcp tcpwrapped open
8239149.126.72.220 12462 tcp tcpwrapped open
8240149.126.72.220 12463 tcp tcpwrapped open
8241149.126.72.220 12464 tcp tcpwrapped open
8242149.126.72.220 12465 tcp tcpwrapped open
8243149.126.72.220 12466 tcp tcpwrapped open
8244149.126.72.220 12467 tcp tcpwrapped open
8245149.126.72.220 12468 tcp tcpwrapped open
8246149.126.72.220 12469 tcp tcpwrapped open
8247149.126.72.220 12470 tcp tcpwrapped open
8248149.126.72.220 12471 tcp tcpwrapped open
8249149.126.72.220 12472 tcp tcpwrapped open
8250149.126.72.220 12473 tcp tcpwrapped open
8251149.126.72.220 12474 tcp tcpwrapped open
8252149.126.72.220 12475 tcp tcpwrapped open
8253149.126.72.220 12476 tcp tcpwrapped open
8254149.126.72.220 12477 tcp tcpwrapped open
8255149.126.72.220 12478 tcp tcpwrapped open
8256149.126.72.220 12479 tcp tcpwrapped open
8257149.126.72.220 12480 tcp tcpwrapped open
8258149.126.72.220 12481 tcp tcpwrapped open
8259149.126.72.220 12482 tcp tcpwrapped open
8260149.126.72.220 12483 tcp tcpwrapped open
8261149.126.72.220 12484 tcp tcpwrapped open
8262149.126.72.220 12485 tcp tcpwrapped open
8263149.126.72.220 12486 tcp tcpwrapped open
8264149.126.72.220 12487 tcp tcpwrapped open
8265149.126.72.220 12488 tcp tcpwrapped open
8266149.126.72.220 12489 tcp tcpwrapped open
8267149.126.72.220 12490 tcp tcpwrapped open
8268149.126.72.220 12491 tcp tcpwrapped open
8269149.126.72.220 12492 tcp tcpwrapped open
8270149.126.72.220 12493 tcp tcpwrapped open
8271149.126.72.220 12494 tcp tcpwrapped open
8272149.126.72.220 12495 tcp tcpwrapped open
8273149.126.72.220 12496 tcp tcpwrapped open
8274149.126.72.220 12497 tcp tcpwrapped open
8275149.126.72.220 12498 tcp tcpwrapped open
8276149.126.72.220 12499 tcp tcpwrapped open
8277149.126.72.220 12500 tcp tcpwrapped open
8278149.126.72.220 12501 tcp tcpwrapped open
8279149.126.72.220 12502 tcp tcpwrapped open
8280149.126.72.220 12503 tcp tcpwrapped open
8281149.126.72.220 12504 tcp tcpwrapped open
8282149.126.72.220 12505 tcp tcpwrapped open
8283149.126.72.220 12506 tcp tcpwrapped open
8284149.126.72.220 12507 tcp tcpwrapped open
8285149.126.72.220 12508 tcp tcpwrapped open
8286149.126.72.220 12509 tcp tcpwrapped open
8287149.126.72.220 12510 tcp tcpwrapped open
8288149.126.72.220 12511 tcp tcpwrapped open
8289149.126.72.220 12512 tcp tcpwrapped open
8290149.126.72.220 12513 tcp tcpwrapped open
8291149.126.72.220 12514 tcp tcpwrapped open
8292149.126.72.220 12515 tcp tcpwrapped open
8293149.126.72.220 12516 tcp tcpwrapped open
8294149.126.72.220 12517 tcp tcpwrapped open
8295149.126.72.220 12518 tcp tcpwrapped open
8296149.126.72.220 12519 tcp tcpwrapped open
8297149.126.72.220 12520 tcp tcpwrapped open
8298149.126.72.220 12521 tcp tcpwrapped open
8299149.126.72.220 12522 tcp tcpwrapped open
8300149.126.72.220 12523 tcp tcpwrapped open
8301149.126.72.220 12524 tcp tcpwrapped open
8302149.126.72.220 12525 tcp tcpwrapped open
8303149.126.72.220 12526 tcp tcpwrapped open
8304149.126.72.220 12527 tcp tcpwrapped open
8305149.126.72.220 12528 tcp tcpwrapped open
8306149.126.72.220 12529 tcp tcpwrapped open
8307149.126.72.220 12530 tcp tcpwrapped open
8308149.126.72.220 12531 tcp tcpwrapped open
8309149.126.72.220 12532 tcp tcpwrapped open
8310149.126.72.220 12533 tcp tcpwrapped open
8311149.126.72.220 12534 tcp tcpwrapped open
8312149.126.72.220 12535 tcp tcpwrapped open
8313149.126.72.220 12536 tcp tcpwrapped open
8314149.126.72.220 12537 tcp tcpwrapped open
8315149.126.72.220 12538 tcp tcpwrapped open
8316149.126.72.220 12539 tcp tcpwrapped open
8317149.126.72.220 12540 tcp tcpwrapped open
8318149.126.72.220 12541 tcp tcpwrapped open
8319149.126.72.220 12542 tcp tcpwrapped open
8320149.126.72.220 12543 tcp tcpwrapped open
8321149.126.72.220 12544 tcp tcpwrapped open
8322149.126.72.220 12545 tcp tcpwrapped open
8323149.126.72.220 12546 tcp tcpwrapped open
8324149.126.72.220 12547 tcp tcpwrapped open
8325149.126.72.220 12548 tcp tcpwrapped open
8326149.126.72.220 12549 tcp tcpwrapped open
8327149.126.72.220 12550 tcp tcpwrapped open
8328149.126.72.220 12551 tcp tcpwrapped open
8329149.126.72.220 12552 tcp tcpwrapped open
8330149.126.72.220 12553 tcp tcpwrapped open
8331149.126.72.220 12554 tcp tcpwrapped open
8332149.126.72.220 12555 tcp tcpwrapped open
8333149.126.72.220 12556 tcp tcpwrapped open
8334149.126.72.220 12557 tcp tcpwrapped open
8335149.126.72.220 12558 tcp tcpwrapped open
8336149.126.72.220 12559 tcp tcpwrapped open
8337149.126.72.220 12560 tcp tcpwrapped open
8338149.126.72.220 12561 tcp tcpwrapped open
8339149.126.72.220 12562 tcp tcpwrapped open
8340149.126.72.220 12563 tcp tcpwrapped open
8341149.126.72.220 12564 tcp tcpwrapped open
8342149.126.72.220 12565 tcp tcpwrapped open
8343149.126.72.220 12566 tcp tcpwrapped open
8344149.126.72.220 12567 tcp tcpwrapped open
8345149.126.72.220 12568 tcp tcpwrapped open
8346149.126.72.220 12569 tcp tcpwrapped open
8347149.126.72.220 12570 tcp tcpwrapped open
8348149.126.72.220 12571 tcp tcpwrapped open
8349149.126.72.220 12572 tcp tcpwrapped open
8350149.126.72.220 12573 tcp tcpwrapped open
8351149.126.72.220 12574 tcp tcpwrapped open
8352149.126.72.220 12575 tcp tcpwrapped open
8353149.126.72.220 12576 tcp tcpwrapped open
8354149.126.72.220 12577 tcp tcpwrapped open
8355149.126.72.220 12578 tcp tcpwrapped open
8356149.126.72.220 12579 tcp tcpwrapped open
8357149.126.72.220 12580 tcp tcpwrapped open
8358149.126.72.220 12581 tcp tcpwrapped open
8359149.126.72.220 12582 tcp tcpwrapped open
8360149.126.72.220 12583 tcp tcpwrapped open
8361149.126.72.220 12584 tcp tcpwrapped open
8362149.126.72.220 12585 tcp tcpwrapped open
8363149.126.72.220 12586 tcp tcpwrapped open
8364149.126.72.220 12587 tcp tcpwrapped open
8365149.126.72.220 12588 tcp tcpwrapped open
8366149.126.72.220 12589 tcp tcpwrapped open
8367149.126.72.220 12590 tcp tcpwrapped open
8368149.126.72.220 13082 tcp tcpwrapped open
8369149.126.72.220 13084 tcp tcpwrapped open
8370149.126.72.220 13333 tcp tcpwrapped open
8371149.126.72.220 13443 tcp tcpwrapped open
8372149.126.72.220 14006 tcp tcpwrapped open
8373149.126.72.220 14082 tcp tcpwrapped open
8374149.126.72.220 14084 tcp tcpwrapped open
8375149.126.72.220 14104 tcp tcpwrapped open
8376149.126.72.220 14130 tcp tcpwrapped open
8377149.126.72.220 14182 tcp tcpwrapped open
8378149.126.72.220 14184 tcp tcpwrapped open
8379149.126.72.220 14330 tcp tcpwrapped open
8380149.126.72.220 14443 tcp tcpwrapped open
8381149.126.72.220 14825 tcp tcpwrapped open
8382149.126.72.220 15002 tcp tcpwrapped open
8383149.126.72.220 15006 tcp tcpwrapped open
8384149.126.72.220 15082 tcp tcpwrapped open
8385149.126.72.220 15084 tcp tcpwrapped open
8386149.126.72.220 15151 tcp tcpwrapped open
8387149.126.72.220 15555 tcp tcpwrapped open
8388149.126.72.220 16000 tcp tcpwrapped open
8389149.126.72.220 16001 tcp tcpwrapped open
8390149.126.72.220 16015 tcp tcpwrapped open
8391149.126.72.220 16016 tcp tcpwrapped open
8392149.126.72.220 16017 tcp tcpwrapped open
8393149.126.72.220 16082 tcp tcpwrapped open
8394149.126.72.220 16084 tcp tcpwrapped open
8395149.126.72.220 16311 tcp tcpwrapped open
8396149.126.72.220 16316 tcp tcpwrapped open
8397149.126.72.220 16443 tcp tcpwrapped open
8398149.126.72.220 16800 tcp tcpwrapped open
8399149.126.72.220 16888 tcp tcpwrapped open
8400149.126.72.220 17082 tcp tcpwrapped open
8401149.126.72.220 17084 tcp tcpwrapped open
8402149.126.72.220 17182 tcp tcpwrapped open
8403149.126.72.220 17184 tcp tcpwrapped open
8404149.126.72.220 17770 tcp tcpwrapped open
8405149.126.72.220 17771 tcp tcpwrapped open
8406149.126.72.220 17772 tcp tcpwrapped open
8407149.126.72.220 17773 tcp tcpwrapped open
8408149.126.72.220 17774 tcp tcpwrapped open
8409149.126.72.220 17775 tcp tcpwrapped open
8410149.126.72.220 17776 tcp tcpwrapped open
8411149.126.72.220 17777 tcp tcpwrapped open
8412149.126.72.220 17778 tcp tcpwrapped open
8413149.126.72.220 17779 tcp tcpwrapped open
8414149.126.72.220 17780 tcp tcpwrapped open
8415149.126.72.220 18000 tcp tcpwrapped open
8416149.126.72.220 18001 tcp tcpwrapped open
8417149.126.72.220 18002 tcp tcpwrapped open
8418149.126.72.220 18003 tcp tcpwrapped open
8419149.126.72.220 18004 tcp tcpwrapped open
8420149.126.72.220 18005 tcp tcpwrapped open
8421149.126.72.220 18006 tcp tcpwrapped open
8422149.126.72.220 18007 tcp tcpwrapped open
8423149.126.72.220 18008 tcp tcpwrapped open
8424149.126.72.220 18009 tcp tcpwrapped open
8425149.126.72.220 18010 tcp tcpwrapped open
8426149.126.72.220 18011 tcp tcpwrapped open
8427149.126.72.220 18012 tcp tcpwrapped open
8428149.126.72.220 18013 tcp tcpwrapped open
8429149.126.72.220 18014 tcp tcpwrapped open
8430149.126.72.220 18015 tcp tcpwrapped open
8431149.126.72.220 18016 tcp tcpwrapped open
8432149.126.72.220 18017 tcp tcpwrapped open
8433149.126.72.220 18018 tcp tcpwrapped open
8434149.126.72.220 18019 tcp tcpwrapped open
8435149.126.72.220 18020 tcp tcpwrapped open
8436149.126.72.220 18021 tcp tcpwrapped open
8437149.126.72.220 18022 tcp tcpwrapped open
8438149.126.72.220 18023 tcp tcpwrapped open
8439149.126.72.220 18024 tcp tcpwrapped open
8440149.126.72.220 18025 tcp tcpwrapped open
8441149.126.72.220 18026 tcp tcpwrapped open
8442149.126.72.220 18027 tcp tcpwrapped open
8443149.126.72.220 18028 tcp tcpwrapped open
8444149.126.72.220 18029 tcp tcpwrapped open
8445149.126.72.220 18030 tcp tcpwrapped open
8446149.126.72.220 18031 tcp tcpwrapped open
8447149.126.72.220 18032 tcp tcpwrapped open
8448149.126.72.220 18033 tcp tcpwrapped open
8449149.126.72.220 18034 tcp tcpwrapped open
8450149.126.72.220 18035 tcp tcpwrapped open
8451149.126.72.220 18036 tcp tcpwrapped open
8452149.126.72.220 18037 tcp tcpwrapped open
8453149.126.72.220 18038 tcp tcpwrapped open
8454149.126.72.220 18039 tcp tcpwrapped open
8455149.126.72.220 18040 tcp tcpwrapped open
8456149.126.72.220 18041 tcp tcpwrapped open
8457149.126.72.220 18042 tcp tcpwrapped open
8458149.126.72.220 18043 tcp tcpwrapped open
8459149.126.72.220 18044 tcp tcpwrapped open
8460149.126.72.220 18045 tcp tcpwrapped open
8461149.126.72.220 18046 tcp tcpwrapped open
8462149.126.72.220 18047 tcp tcpwrapped open
8463149.126.72.220 18048 tcp tcpwrapped open
8464149.126.72.220 18049 tcp tcpwrapped open
8465149.126.72.220 18050 tcp tcpwrapped open
8466149.126.72.220 18051 tcp tcpwrapped open
8467149.126.72.220 18052 tcp tcpwrapped open
8468149.126.72.220 18053 tcp tcpwrapped open
8469149.126.72.220 18054 tcp tcpwrapped open
8470149.126.72.220 18055 tcp tcpwrapped open
8471149.126.72.220 18056 tcp tcpwrapped open
8472149.126.72.220 18057 tcp tcpwrapped open
8473149.126.72.220 18058 tcp tcpwrapped open
8474149.126.72.220 18059 tcp tcpwrapped open
8475149.126.72.220 18060 tcp tcpwrapped open
8476149.126.72.220 18061 tcp tcpwrapped open
8477149.126.72.220 18062 tcp tcpwrapped open
8478149.126.72.220 18063 tcp tcpwrapped open
8479149.126.72.220 18064 tcp tcpwrapped open
8480149.126.72.220 18065 tcp tcpwrapped open
8481149.126.72.220 18066 tcp tcpwrapped open
8482149.126.72.220 18067 tcp tcpwrapped open
8483149.126.72.220 18068 tcp tcpwrapped open
8484149.126.72.220 18069 tcp tcpwrapped open
8485149.126.72.220 18070 tcp tcpwrapped open
8486149.126.72.220 18071 tcp tcpwrapped open
8487149.126.72.220 18072 tcp tcpwrapped open
8488149.126.72.220 18073 tcp tcpwrapped open
8489149.126.72.220 18074 tcp tcpwrapped open
8490149.126.72.220 18075 tcp tcpwrapped open
8491149.126.72.220 18076 tcp tcpwrapped open
8492149.126.72.220 18077 tcp tcpwrapped open
8493149.126.72.220 18078 tcp tcpwrapped open
8494149.126.72.220 18079 tcp tcpwrapped open
8495149.126.72.220 18080 tcp tcpwrapped open
8496149.126.72.220 18081 tcp tcpwrapped open
8497149.126.72.220 18082 tcp tcpwrapped open
8498149.126.72.220 18083 tcp tcpwrapped open
8499149.126.72.220 18084 tcp tcpwrapped open
8500149.126.72.220 18085 tcp tcpwrapped open
8501149.126.72.220 18086 tcp tcpwrapped open
8502149.126.72.220 18087 tcp tcpwrapped open
8503149.126.72.220 18088 tcp tcpwrapped open
8504149.126.72.220 18089 tcp tcpwrapped open
8505149.126.72.220 18090 tcp tcpwrapped open
8506149.126.72.220 18091 tcp tcpwrapped open
8507149.126.72.220 18092 tcp tcpwrapped open
8508149.126.72.220 18093 tcp tcpwrapped open
8509149.126.72.220 18094 tcp tcpwrapped open
8510149.126.72.220 18095 tcp tcpwrapped open
8511149.126.72.220 18096 tcp tcpwrapped open
8512149.126.72.220 18097 tcp tcpwrapped open
8513149.126.72.220 18098 tcp tcpwrapped open
8514149.126.72.220 18099 tcp tcpwrapped open
8515149.126.72.220 18100 tcp tcpwrapped open
8516149.126.72.220 18101 tcp tcpwrapped open
8517149.126.72.220 18102 tcp tcpwrapped open
8518149.126.72.220 18103 tcp tcpwrapped open
8519149.126.72.220 18104 tcp tcpwrapped open
8520149.126.72.220 18105 tcp tcpwrapped open
8521149.126.72.220 18106 tcp tcpwrapped open
8522149.126.72.220 18107 tcp tcpwrapped open
8523149.126.72.220 18108 tcp tcpwrapped open
8524149.126.72.220 18109 tcp tcpwrapped open
8525149.126.72.220 18110 tcp tcpwrapped open
8526149.126.72.220 18111 tcp tcpwrapped open
8527149.126.72.220 18112 tcp tcpwrapped open
8528149.126.72.220 18113 tcp tcpwrapped open
8529149.126.72.220 18200 tcp tcpwrapped open
8530149.126.72.220 18239 tcp tcpwrapped open
8531149.126.72.220 18443 tcp tcpwrapped open
8532149.126.72.220 18802 tcp tcpwrapped open
8533149.126.72.220 19013 tcp tcpwrapped open
8534149.126.72.220 19014 tcp tcpwrapped open
8535149.126.72.220 19015 tcp tcpwrapped open
8536149.126.72.220 19016 tcp tcpwrapped open
8537149.126.72.220 19017 tcp tcpwrapped open
8538149.126.72.220 19022 tcp tcpwrapped open
8539149.126.72.220 19080 tcp tcpwrapped open
8540149.126.72.220 19082 tcp tcpwrapped open
8541149.126.72.220 19084 tcp tcpwrapped open
8542149.126.72.220 19443 tcp tcpwrapped open
8543149.126.72.220 20000 tcp tcpwrapped open
8544149.126.72.220 20001 tcp tcpwrapped open
8545149.126.72.220 20010 tcp tcpwrapped open
8546149.126.72.220 20020 tcp tcpwrapped open
8547149.126.72.220 20030 tcp tcpwrapped open
8548149.126.72.220 20040 tcp tcpwrapped open
8549149.126.72.220 20050 tcp tcpwrapped open
8550149.126.72.220 20053 tcp tcpwrapped open
8551149.126.72.220 20060 tcp tcpwrapped open
8552149.126.72.220 20070 tcp tcpwrapped open
8553149.126.72.220 20080 tcp tcpwrapped open
8554149.126.72.220 20082 tcp tcpwrapped open
8555149.126.72.220 20084 tcp tcpwrapped open
8556149.126.72.220 20090 tcp tcpwrapped open
8557149.126.72.220 20100 tcp tcpwrapped open
8558149.126.72.220 20106 tcp tcpwrapped open
8559149.126.72.220 20107 tcp tcpwrapped open
8560149.126.72.220 20110 tcp tcpwrapped open
8561149.126.72.220 20150 tcp tcpwrapped open
8562149.126.72.220 20182 tcp tcpwrapped open
8563149.126.72.220 20184 tcp tcpwrapped open
8564149.126.72.220 20185 tcp tcpwrapped open
8565149.126.72.220 20200 tcp tcpwrapped open
8566149.126.72.220 20208 tcp tcpwrapped open
8567149.126.72.220 20325 tcp tcpwrapped open
8568149.126.72.220 20500 tcp tcpwrapped open
8569149.126.72.220 20512 tcp tcpwrapped open
8570149.126.72.220 20600 tcp tcpwrapped open
8571149.126.72.220 20800 tcp tcpwrapped open
8572149.126.72.220 20892 tcp tcpwrapped open
8573149.126.72.220 20894 tcp tcpwrapped open
8574149.126.72.220 20900 tcp tcpwrapped open
8575149.126.72.220 21081 tcp tcpwrapped open
8576149.126.72.220 21082 tcp tcpwrapped open
8577149.126.72.220 21083 tcp tcpwrapped open
8578149.126.72.220 21084 tcp tcpwrapped open
8579149.126.72.220 21100 tcp tcpwrapped open
8580149.126.72.220 21200 tcp tcpwrapped open
8581149.126.72.220 21300 tcp tcpwrapped open
8582149.126.72.220 21357 tcp tcpwrapped open
8583149.126.72.220 21381 tcp tcpwrapped open
8584149.126.72.220 21400 tcp tcpwrapped open
8585149.126.72.220 21500 tcp tcpwrapped open
8586149.126.72.220 21935 tcp tcpwrapped open
8587149.126.72.220 22082 tcp tcpwrapped open
8588149.126.72.220 22084 tcp tcpwrapped open
8589149.126.72.220 22103 tcp tcpwrapped open
8590149.126.72.220 22107 tcp tcpwrapped open
8591149.126.72.220 22206 tcp tcpwrapped open
8592149.126.72.220 22345 tcp tcpwrapped open
8593149.126.72.220 22403 tcp tcpwrapped open
8594149.126.72.220 22609 tcp tcpwrapped open
8595149.126.72.220 22703 tcp tcpwrapped open
8596149.126.72.220 22705 tcp tcpwrapped open
8597149.126.72.220 23082 tcp tcpwrapped open
8598149.126.72.220 23084 tcp tcpwrapped open
8599149.126.72.220 23182 tcp tcpwrapped open
8600149.126.72.220 23184 tcp tcpwrapped open
8601149.126.72.220 24082 tcp tcpwrapped open
8602149.126.72.220 24084 tcp tcpwrapped open
8603149.126.72.220 24472 tcp tcpwrapped open
8604149.126.72.220 24510 tcp tcpwrapped open
8605149.126.72.220 25000 tcp tcpwrapped open
8606149.126.72.220 25001 tcp tcpwrapped open
8607149.126.72.220 25002 tcp tcpwrapped open
8608149.126.72.220 25003 tcp tcpwrapped open
8609149.126.72.220 25004 tcp tcpwrapped open
8610149.126.72.220 25005 tcp tcpwrapped open
8611149.126.72.220 25006 tcp tcpwrapped open
8612149.126.72.220 25007 tcp tcpwrapped open
8613149.126.72.220 25008 tcp tcpwrapped open
8614149.126.72.220 25009 tcp tcpwrapped open
8615149.126.72.220 25010 tcp tcpwrapped open
8616149.126.72.220 25082 tcp tcpwrapped open
8617149.126.72.220 25084 tcp tcpwrapped open
8618149.126.72.220 25782 tcp tcpwrapped open
8619149.126.72.220 25952 tcp tcpwrapped open
8620149.126.72.220 27571 tcp tcpwrapped open
8621149.126.72.220 28001 tcp tcpwrapped open
8622149.126.72.220 28080 tcp tcpwrapped open
8623149.126.72.220 28818 tcp tcpwrapped open
8624149.126.72.220 29798 tcp tcpwrapped open
8625149.126.72.220 29799 tcp tcpwrapped open
8626149.126.72.220 30000 tcp tcpwrapped open
8627149.126.72.220 30001 tcp tcpwrapped open
8628149.126.72.220 30003 tcp tcpwrapped open
8629149.126.72.220 30005 tcp tcpwrapped open
8630149.126.72.220 30007 tcp tcpwrapped open
8631149.126.72.220 30009 tcp tcpwrapped open
8632149.126.72.220 30011 tcp tcpwrapped open
8633149.126.72.220 30013 tcp tcpwrapped open
8634149.126.72.220 30015 tcp tcpwrapped open
8635149.126.72.220 30017 tcp tcpwrapped open
8636149.126.72.220 30019 tcp tcpwrapped open
8637149.126.72.220 30021 tcp tcpwrapped open
8638149.126.72.220 30050 tcp tcpwrapped open
8639149.126.72.220 30106 tcp tcpwrapped open
8640149.126.72.220 30110 tcp tcpwrapped open
8641149.126.72.220 30111 tcp tcpwrapped open
8642149.126.72.220 30112 tcp tcpwrapped open
8643149.126.72.220 30113 tcp tcpwrapped open
8644149.126.72.220 30120 tcp tcpwrapped open
8645149.126.72.220 30121 tcp tcpwrapped open
8646149.126.72.220 30122 tcp tcpwrapped open
8647149.126.72.220 30123 tcp tcpwrapped open
8648149.126.72.220 30452 tcp tcpwrapped open
8649149.126.72.220 30468 tcp tcpwrapped open
8650149.126.72.220 30473 tcp tcpwrapped open
8651149.126.72.220 30479 tcp tcpwrapped open
8652149.126.72.220 30501 tcp tcpwrapped open
8653149.126.72.220 30700 tcp tcpwrapped open
8654149.126.72.220 30701 tcp tcpwrapped open
8655149.126.72.220 30892 tcp tcpwrapped open
8656149.126.72.220 30894 tcp tcpwrapped open
8657149.126.72.220 31337 tcp tcpwrapped open
8658149.126.72.220 32101 tcp tcpwrapped open
8659149.126.72.220 32102 tcp tcpwrapped open
8660149.126.72.220 32202 tcp tcpwrapped open
8661149.126.72.220 32303 tcp tcpwrapped open
8662149.126.72.220 32443 tcp tcpwrapped open
8663149.126.72.220 32444 tcp tcpwrapped open
8664149.126.72.220 32746 tcp tcpwrapped open
8665149.126.72.220 32800 tcp tcpwrapped open
8666149.126.72.220 34225 tcp tcpwrapped open
8667149.126.72.220 34500 tcp tcpwrapped open
8668149.126.72.220 35522 tcp tcpwrapped open
8669149.126.72.220 35524 tcp tcpwrapped open
8670149.126.72.220 35531 tcp tcpwrapped open
8671149.126.72.220 35554 tcp tcpwrapped open
8672149.126.72.220 35559 tcp tcpwrapped open
8673149.126.72.220 35560 tcp tcpwrapped open
8674149.126.72.220 36982 tcp tcpwrapped open
8675149.126.72.220 36983 tcp tcpwrapped open
8676149.126.72.220 36984 tcp tcpwrapped open
8677149.126.72.220 37080 tcp tcpwrapped open
8678149.126.72.220 38880 tcp tcpwrapped open
8679149.126.72.220 39001 tcp tcpwrapped open
8680149.126.72.220 40070 tcp tcpwrapped open
8681149.126.72.220 40099 tcp tcpwrapped open
8682149.126.72.220 40892 tcp tcpwrapped open
8683149.126.72.220 40894 tcp tcpwrapped open
8684149.126.72.220 42208 tcp tcpwrapped open
8685149.126.72.220 42424 tcp tcpwrapped open
8686149.126.72.220 42901 tcp tcpwrapped open
8687149.126.72.220 43008 tcp tcpwrapped open
8688149.126.72.220 43009 tcp tcpwrapped open
8689149.126.72.220 43200 tcp tcpwrapped open
8690149.126.72.220 44100 tcp tcpwrapped open
8691149.126.72.220 44300 tcp tcpwrapped open
8692149.126.72.220 44301 tcp tcpwrapped open
8693149.126.72.220 44302 tcp tcpwrapped open
8694149.126.72.220 44303 tcp tcpwrapped open
8695149.126.72.220 44304 tcp tcpwrapped open
8696149.126.72.220 44305 tcp tcpwrapped open
8697149.126.72.220 44306 tcp tcpwrapped open
8698149.126.72.220 44307 tcp tcpwrapped open
8699149.126.72.220 44308 tcp tcpwrapped open
8700149.126.72.220 44309 tcp tcpwrapped open
8701149.126.72.220 44310 tcp tcpwrapped open
8702149.126.72.220 44320 tcp tcpwrapped open
8703149.126.72.220 44332 tcp tcpwrapped open
8704149.126.72.220 44333 tcp tcpwrapped open
8705149.126.72.220 44334 tcp tcpwrapped open
8706149.126.72.220 44336 tcp tcpwrapped open
8707149.126.72.220 44337 tcp tcpwrapped open
8708149.126.72.220 44340 tcp tcpwrapped open
8709149.126.72.220 44341 tcp tcpwrapped open
8710149.126.72.220 44345 tcp tcpwrapped open
8711149.126.72.220 44400 tcp tcpwrapped open
8712149.126.72.220 44410 tcp tcpwrapped open
8713149.126.72.220 44420 tcp tcpwrapped open
8714149.126.72.220 45000 tcp tcpwrapped open
8715149.126.72.220 45555 tcp tcpwrapped open
8716149.126.72.220 45666 tcp tcpwrapped open
8717149.126.72.220 45667 tcp tcpwrapped open
8718149.126.72.220 45668 tcp tcpwrapped open
8719149.126.72.220 45677 tcp tcpwrapped open
8720149.126.72.220 45777 tcp tcpwrapped open
8721149.126.72.220 45788 tcp tcpwrapped open
8722149.126.72.220 45821 tcp tcpwrapped open
8723149.126.72.220 45886 tcp tcpwrapped open
8724149.126.72.220 45888 tcp tcpwrapped open
8725149.126.72.220 46000 tcp tcpwrapped open
8726149.126.72.220 46443 tcp tcpwrapped open
8727149.126.72.220 46862 tcp tcpwrapped open
8728149.126.72.220 47000 tcp tcpwrapped open
8729149.126.72.220 47080 tcp tcpwrapped open
8730149.126.72.220 47534 tcp tcpwrapped open
8731149.126.72.220 48888 tcp tcpwrapped open
8732149.126.72.220 48889 tcp tcpwrapped open
8733149.126.72.220 49200 tcp tcpwrapped open
8734149.126.72.220 49210 tcp tcpwrapped open
8735149.126.72.220 49443 tcp tcpwrapped open
8736149.126.72.220 49682 tcp tcpwrapped open
8737149.126.72.220 49684 tcp tcpwrapped open
8738149.126.72.220 49686 tcp tcpwrapped open
8739149.126.72.220 49688 tcp tcpwrapped open
8740149.126.72.220 49690 tcp tcpwrapped open
8741149.126.72.220 49692 tcp tcpwrapped open
8742149.126.72.220 49694 tcp tcpwrapped open
8743149.126.72.220 50000 tcp tcpwrapped open
8744149.126.72.220 50001 tcp tcpwrapped open
8745149.126.72.220 50042 tcp tcpwrapped open
8746149.126.72.220 50050 tcp tcpwrapped open
8747149.126.72.220 50073 tcp tcpwrapped open
8748149.126.72.220 50085 tcp tcpwrapped open
8749149.126.72.220 50101 tcp tcpwrapped open
8750149.126.72.220 50102 tcp tcpwrapped open
8751149.126.72.220 50103 tcp tcpwrapped open
8752149.126.72.220 50104 tcp tcpwrapped open
8753149.126.72.220 50105 tcp tcpwrapped open
8754149.126.72.220 50106 tcp tcpwrapped open
8755149.126.72.220 50107 tcp tcpwrapped open
8756149.126.72.220 50112 tcp tcpwrapped open
8757149.126.72.220 50113 tcp tcpwrapped open
8758149.126.72.220 50122 tcp tcpwrapped open
8759149.126.72.220 50160 tcp tcpwrapped open
8760149.126.72.220 50443 tcp tcpwrapped open
8761149.126.72.220 51002 tcp tcpwrapped open
8762149.126.72.220 51003 tcp tcpwrapped open
8763149.126.72.220 51434 tcp tcpwrapped open
8764149.126.72.220 52010 tcp tcpwrapped open
8765149.126.72.220 52230 tcp tcpwrapped open
8766149.126.72.220 52311 tcp tcpwrapped open
8767149.126.72.220 52536 tcp tcpwrapped open
8768149.126.72.220 53480 tcp tcpwrapped open
8769149.126.72.220 53481 tcp tcpwrapped open
8770149.126.72.220 53482 tcp tcpwrapped open
8771149.126.72.220 53483 tcp tcpwrapped open
8772149.126.72.220 53484 tcp tcpwrapped open
8773149.126.72.220 53485 tcp tcpwrapped open
8774149.126.72.220 53490 tcp tcpwrapped open
8775149.126.72.220 53805 tcp tcpwrapped open
8776149.126.72.220 53806 tcp tcpwrapped open
8777149.126.72.220 54327 tcp tcpwrapped open
8778149.126.72.220 54490 tcp tcpwrapped open
8779149.126.72.220 54545 tcp tcpwrapped open
8780149.126.72.220 55055 tcp tcpwrapped open
8781149.126.72.220 55080 tcp tcpwrapped open
8782149.126.72.220 55081 tcp tcpwrapped open
8783149.126.72.220 55350 tcp tcpwrapped open
8784149.126.72.220 55388 tcp tcpwrapped open
8785149.126.72.220 55470 tcp tcpwrapped open
8786149.126.72.220 55475 tcp tcpwrapped open
8787149.126.72.220 55481 tcp tcpwrapped open
8788149.126.72.220 55490 tcp tcpwrapped open
8789149.126.72.220 57778 tcp tcpwrapped open
8790149.126.72.220 57779 tcp tcpwrapped open
8791149.126.72.220 57780 tcp tcpwrapped open
8792149.126.72.220 57781 tcp tcpwrapped open
8793149.126.72.220 57782 tcp tcpwrapped open
8794149.126.72.220 57783 tcp tcpwrapped open
8795149.126.72.220 57784 tcp tcpwrapped open
8796149.126.72.220 57785 tcp tcpwrapped open
8797149.126.72.220 57786 tcp tcpwrapped open
8798149.126.72.220 57787 tcp tcpwrapped open
8799149.126.72.220 57788 tcp tcpwrapped open
8800149.126.72.220 58443 tcp tcpwrapped open
8801149.126.72.220 58585 tcp tcpwrapped open
8802149.126.72.220 59012 tcp tcpwrapped open
8803149.126.72.220 59443 tcp tcpwrapped open
8804149.126.72.220 60021 tcp tcpwrapped open
8805149.126.72.220 60023 tcp tcpwrapped open
8806149.126.72.220 60443 tcp tcpwrapped open
8807149.126.72.220 62080 tcp tcpwrapped open
8808149.126.72.220 62237 tcp tcpwrapped open
8809149.126.72.220 62443 tcp tcpwrapped open
8810149.126.72.220 62865 tcp tcpwrapped open
8811149.126.72.220 63443 tcp tcpwrapped open
8812149.126.72.220 64477 tcp tcpwrapped open
8813149.126.72.220 64671 tcp tcpwrapped open
8814151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8815151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8816151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8817151.106.38.107 67 tcp dhcps filtered
8818151.106.38.107 67 udp dhcps unknown
8819151.106.38.107 68 tcp dhcpc filtered
8820151.106.38.107 68 udp dhcpc unknown
8821151.106.38.107 69 tcp tftp filtered
8822151.106.38.107 69 udp tftp unknown
8823151.106.38.107 88 tcp kerberos-sec filtered
8824151.106.38.107 88 udp kerberos-sec unknown
8825151.106.38.107 123 tcp ntp filtered
8826151.106.38.107 123 udp ntp unknown
8827151.106.38.107 137 tcp netbios-ns filtered
8828151.106.38.107 137 udp netbios-ns unknown
8829151.106.38.107 138 tcp netbios-dgm filtered
8830151.106.38.107 138 udp netbios-dgm unknown
8831151.106.38.107 139 tcp netbios-ssn filtered
8832151.106.38.107 139 udp netbios-ssn unknown
8833151.106.38.107 161 tcp snmp filtered
8834151.106.38.107 161 udp snmp unknown
8835151.106.38.107 162 tcp snmptrap filtered
8836151.106.38.107 162 udp snmptrap unknown
8837151.106.38.107 389 tcp ldap filtered
8838151.106.38.107 389 udp ldap unknown
8839151.106.38.107 520 tcp efs filtered
8840151.106.38.107 520 udp route unknown
8841151.106.38.107 2049 tcp nfs filtered
8842151.106.38.107 2049 udp nfs unknown
8843158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
8844158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
8845158.69.13.254 53 tcp domain open unknown banner: get lost
8846158.69.13.254 53 udp domain open unknown banner: get lost
8847158.69.13.254 67 tcp dhcps filtered
8848158.69.13.254 67 udp dhcps unknown
8849158.69.13.254 68 tcp dhcpc filtered
8850158.69.13.254 68 udp dhcpc unknown
8851158.69.13.254 69 tcp tftp filtered
8852158.69.13.254 69 udp tftp unknown
8853158.69.13.254 80 tcp http open nginx
8854158.69.13.254 88 tcp kerberos-sec filtered
8855158.69.13.254 88 udp kerberos-sec unknown
8856158.69.13.254 123 tcp ntp filtered
8857158.69.13.254 123 udp ntp unknown
8858158.69.13.254 137 tcp netbios-ns filtered
8859158.69.13.254 137 udp netbios-ns unknown
8860158.69.13.254 138 tcp netbios-dgm filtered
8861158.69.13.254 138 udp netbios-dgm unknown
8862158.69.13.254 139 tcp netbios-ssn filtered
8863158.69.13.254 139 udp netbios-ssn unknown
8864158.69.13.254 161 tcp snmp filtered
8865158.69.13.254 161 udp snmp unknown
8866158.69.13.254 162 tcp snmptrap filtered
8867158.69.13.254 162 udp snmptrap unknown
8868158.69.13.254 389 tcp ldap filtered
8869158.69.13.254 389 udp ldap unknown
8870158.69.13.254 443 tcp ssl/http open nginx
8871158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
8872158.69.13.254 520 tcp efs filtered
8873158.69.13.254 520 udp route unknown
8874158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
8875158.69.13.254 2049 tcp nfs filtered
8876158.69.13.254 2049 udp nfs unknown
8877158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
8878158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
8879162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
8880162.244.35.13 25 tcp open
8881162.244.35.13 53 tcp domain open ISC BIND 9.10.6
8882162.244.35.13 53 udp domain open ISC BIND 9.10.6
8883162.244.35.13 67 tcp dhcps closed
8884162.244.35.13 67 udp dhcps closed
8885162.244.35.13 68 tcp dhcpc closed
8886162.244.35.13 68 udp dhcpc closed
8887162.244.35.13 69 tcp tftp closed
8888162.244.35.13 69 udp tftp closed
8889162.244.35.13 88 tcp kerberos-sec closed
8890162.244.35.13 88 udp kerberos-sec closed
8891162.244.35.13 123 tcp ntp closed
8892162.244.35.13 123 udp ntp closed
8893162.244.35.13 137 tcp netbios-ns filtered
8894162.244.35.13 137 udp netbios-ns unknown
8895162.244.35.13 138 tcp netbios-dgm filtered
8896162.244.35.13 138 udp netbios-dgm unknown
8897162.244.35.13 139 tcp netbios-ssn filtered
8898162.244.35.13 139 udp netbios-ssn unknown
8899162.244.35.13 161 tcp snmp closed
8900162.244.35.13 161 udp snmp closed
8901162.244.35.13 162 tcp snmptrap closed
8902162.244.35.13 162 udp snmptrap closed
8903162.244.35.13 389 tcp ldap closed
8904162.244.35.13 389 udp ldap closed
8905162.244.35.13 520 tcp efs closed
8906162.244.35.13 520 udp route closed
8907162.244.35.13 2049 tcp nfs closed
8908162.244.35.13 2049 udp nfs closed
8909163.247.48.46 53 tcp domain filtered
8910163.247.48.46 53 udp domain unknown
8911163.247.48.46 67 tcp dhcps filtered
8912163.247.48.46 67 udp dhcps unknown
8913163.247.48.46 68 tcp dhcpc filtered
8914163.247.48.46 68 udp dhcpc unknown
8915163.247.48.46 69 tcp tftp filtered
8916163.247.48.46 69 udp tftp unknown
8917163.247.48.46 88 tcp kerberos-sec filtered
8918163.247.48.46 88 udp kerberos-sec unknown
8919163.247.48.46 123 tcp ntp filtered
8920163.247.48.46 123 udp ntp unknown
8921163.247.48.46 137 tcp netbios-ns filtered
8922163.247.48.46 137 udp netbios-ns unknown
8923163.247.48.46 138 tcp netbios-dgm filtered
8924163.247.48.46 138 udp netbios-dgm unknown
8925163.247.48.46 139 tcp netbios-ssn filtered
8926163.247.48.46 139 udp netbios-ssn unknown
8927163.247.48.46 161 tcp snmp filtered
8928163.247.48.46 161 udp snmp unknown
8929163.247.48.46 162 tcp snmptrap filtered
8930163.247.48.46 162 udp snmptrap unknown
8931163.247.48.46 389 tcp ldap filtered
8932163.247.48.46 389 udp ldap unknown
8933163.247.48.46 520 tcp efs filtered
8934163.247.48.46 520 udp route unknown
8935163.247.48.46 2049 tcp nfs filtered
8936163.247.48.46 2049 udp nfs unknown
8937163.247.127.20 53 tcp domain filtered
8938163.247.127.20 53 udp domain unknown
8939163.247.127.20 67 tcp dhcps filtered
8940163.247.127.20 67 udp dhcps unknown
8941163.247.127.20 68 tcp dhcpc filtered
8942163.247.127.20 68 udp dhcpc unknown
8943163.247.127.20 69 tcp tftp filtered
8944163.247.127.20 69 udp tftp unknown
8945163.247.127.20 88 tcp kerberos-sec filtered
8946163.247.127.20 88 udp kerberos-sec unknown
8947163.247.127.20 123 tcp ntp filtered
8948163.247.127.20 123 udp ntp unknown
8949163.247.127.20 137 tcp netbios-ns filtered
8950163.247.127.20 137 udp netbios-ns unknown
8951163.247.127.20 138 tcp netbios-dgm filtered
8952163.247.127.20 138 udp netbios-dgm unknown
8953163.247.127.20 139 tcp netbios-ssn filtered
8954163.247.127.20 139 udp netbios-ssn unknown
8955163.247.127.20 161 tcp snmp filtered
8956163.247.127.20 161 udp snmp unknown
8957163.247.127.20 162 tcp snmptrap filtered
8958163.247.127.20 162 udp snmptrap unknown
8959163.247.127.20 389 tcp ldap filtered
8960163.247.127.20 389 udp ldap unknown
8961163.247.127.20 520 tcp efs filtered
8962163.247.127.20 520 udp route unknown
8963163.247.127.20 2049 tcp nfs filtered
8964163.247.127.20 2049 udp nfs unknown
8965163.247.130.114 53 tcp domain closed
8966163.247.130.114 53 udp domain unknown
8967163.247.130.114 67 tcp dhcps filtered
8968163.247.130.114 67 udp dhcps unknown
8969163.247.130.114 68 tcp dhcpc filtered
8970163.247.130.114 68 udp dhcpc unknown
8971163.247.130.114 69 tcp tftp filtered
8972163.247.130.114 69 udp tftp closed
8973163.247.130.114 88 tcp kerberos-sec filtered
8974163.247.130.114 88 udp kerberos-sec unknown
8975163.247.130.114 123 tcp ntp filtered
8976163.247.130.114 123 udp ntp unknown
8977163.247.130.114 137 tcp netbios-ns filtered
8978163.247.130.114 137 udp netbios-ns unknown
8979163.247.130.114 138 tcp netbios-dgm filtered
8980163.247.130.114 138 udp netbios-dgm unknown
8981163.247.130.114 139 tcp netbios-ssn filtered
8982163.247.130.114 139 udp netbios-ssn unknown
8983163.247.130.114 161 tcp snmp filtered
8984163.247.130.114 161 udp snmp open net-snmp; net-snmp SNMPv3 server
8985163.247.130.114 162 tcp snmptrap filtered
8986163.247.130.114 162 udp snmptrap unknown
8987163.247.130.114 389 tcp ldap filtered
8988163.247.130.114 389 udp ldap unknown
8989163.247.130.114 520 tcp efs filtered
8990163.247.130.114 520 udp route unknown
8991163.247.130.114 2049 tcp nfs filtered
8992163.247.130.114 2049 udp nfs unknown
8993163.247.175.176 53 tcp tcpwrapped open
8994163.247.175.176 53 udp domain unknown
8995163.247.175.176 67 tcp tcpwrapped open
8996163.247.175.176 67 udp dhcps unknown
8997163.247.175.176 68 tcp tcpwrapped open
8998163.247.175.176 68 udp dhcpc unknown
8999163.247.175.176 69 tcp tcpwrapped open
9000163.247.175.176 69 udp tftp unknown
9001163.247.175.176 88 tcp tcpwrapped open
9002163.247.175.176 88 udp kerberos-sec unknown
9003163.247.175.176 123 tcp tcpwrapped open
9004163.247.175.176 123 udp ntp unknown
9005163.247.175.176 137 tcp tcpwrapped open
9006163.247.175.176 137 udp netbios-ns unknown
9007163.247.175.176 138 tcp tcpwrapped open
9008163.247.175.176 138 udp netbios-dgm unknown
9009163.247.175.176 139 udp netbios-ssn unknown
9010163.247.175.176 161 tcp tcpwrapped open
9011163.247.175.176 161 udp snmp unknown
9012163.247.175.176 162 tcp tcpwrapped open
9013163.247.175.176 162 udp snmptrap unknown
9014163.247.175.176 389 tcp tcpwrapped open
9015163.247.175.176 389 udp ldap unknown
9016163.247.175.176 520 tcp tcpwrapped open
9017163.247.175.176 520 udp route unknown
9018163.247.175.176 2049 tcp tcpwrapped open
9019163.247.175.176 2049 udp nfs unknown
9020165.22.143.229 53 tcp domain closed
9021165.22.143.229 53 udp domain unknown
9022165.22.143.229 67 tcp dhcps closed
9023165.22.143.229 67 udp dhcps unknown
9024165.22.143.229 68 tcp dhcpc closed
9025165.22.143.229 68 udp dhcpc unknown
9026165.22.143.229 69 tcp tftp closed
9027165.22.143.229 69 udp tftp closed
9028165.22.143.229 88 tcp kerberos-sec closed
9029165.22.143.229 88 udp kerberos-sec unknown
9030165.22.143.229 123 tcp ntp closed
9031165.22.143.229 123 udp ntp open NTP v4 secondary server
9032165.22.143.229 137 tcp netbios-ns closed
9033165.22.143.229 137 udp netbios-ns closed
9034165.22.143.229 138 tcp netbios-dgm closed
9035165.22.143.229 138 udp netbios-dgm closed
9036165.22.143.229 139 tcp netbios-ssn closed
9037165.22.143.229 139 udp netbios-ssn unknown
9038165.22.143.229 161 tcp snmp closed
9039165.22.143.229 161 udp snmp closed
9040165.22.143.229 162 tcp snmptrap closed
9041165.22.143.229 162 udp snmptrap unknown
9042165.22.143.229 389 tcp ldap closed
9043165.22.143.229 389 udp ldap closed
9044165.22.143.229 520 tcp efs closed
9045165.22.143.229 520 udp route closed
9046165.22.143.229 2049 tcp nfs closed
9047165.22.143.229 2049 udp nfs closed
9048165.227.99.239 53 tcp domain filtered
9049165.227.99.239 53 udp domain unknown
9050165.227.99.239 67 tcp dhcps filtered
9051165.227.99.239 67 udp dhcps unknown
9052165.227.99.239 68 tcp dhcpc filtered
9053165.227.99.239 68 udp dhcpc unknown
9054165.227.99.239 69 tcp tftp filtered
9055165.227.99.239 69 udp tftp unknown
9056165.227.99.239 80 tcp http open nginx
9057165.227.99.239 88 tcp kerberos-sec filtered
9058165.227.99.239 88 udp kerberos-sec unknown
9059165.227.99.239 123 tcp ntp filtered
9060165.227.99.239 123 udp ntp unknown
9061165.227.99.239 137 tcp netbios-ns filtered
9062165.227.99.239 137 udp netbios-ns unknown
9063165.227.99.239 138 tcp netbios-dgm filtered
9064165.227.99.239 138 udp netbios-dgm unknown
9065165.227.99.239 139 tcp netbios-ssn filtered
9066165.227.99.239 139 udp netbios-ssn unknown
9067165.227.99.239 161 tcp snmp filtered
9068165.227.99.239 161 udp snmp open net-snmp; net-snmp SNMPv3 server
9069165.227.99.239 162 tcp snmptrap filtered
9070165.227.99.239 162 udp snmptrap closed
9071165.227.99.239 389 tcp ldap filtered
9072165.227.99.239 389 udp ldap unknown
9073165.227.99.239 443 tcp ssl/http open nginx
9074165.227.99.239 520 tcp efs filtered
9075165.227.99.239 520 udp route unknown
9076165.227.99.239 2049 tcp nfs filtered
9077165.227.99.239 2049 udp nfs unknown
9078169.239.218.20 25 tcp smtp closed
9079169.239.218.20 53 tcp domain filtered
9080169.239.218.20 53 udp domain unknown
9081169.239.218.20 67 tcp dhcps filtered
9082169.239.218.20 67 udp dhcps unknown
9083169.239.218.20 68 tcp dhcpc filtered
9084169.239.218.20 68 udp dhcpc unknown
9085169.239.218.20 69 tcp tftp filtered
9086169.239.218.20 69 udp tftp unknown
9087169.239.218.20 88 tcp kerberos-sec filtered
9088169.239.218.20 88 udp kerberos-sec unknown
9089169.239.218.20 113 tcp ident closed
9090169.239.218.20 123 tcp ntp filtered
9091169.239.218.20 123 udp ntp unknown
9092169.239.218.20 137 tcp netbios-ns filtered
9093169.239.218.20 137 udp netbios-ns filtered
9094169.239.218.20 138 tcp netbios-dgm filtered
9095169.239.218.20 138 udp netbios-dgm filtered
9096169.239.218.20 139 tcp netbios-ssn closed
9097169.239.218.20 139 udp netbios-ssn unknown
9098169.239.218.20 161 tcp snmp filtered
9099169.239.218.20 161 udp snmp unknown
9100169.239.218.20 162 tcp snmptrap filtered
9101169.239.218.20 162 udp snmptrap unknown
9102169.239.218.20 389 tcp ldap filtered
9103169.239.218.20 389 udp ldap unknown
9104169.239.218.20 445 tcp microsoft-ds closed
9105169.239.218.20 520 tcp efs filtered
9106169.239.218.20 520 udp route unknown
9107169.239.218.20 2049 tcp nfs filtered
9108169.239.218.20 2049 udp nfs unknown
9109169.239.218.20 8008 tcp tcpwrapped open
9110170.239.85.227 53 tcp domain closed
9111170.239.85.227 53 udp domain closed
9112170.239.85.227 67 tcp dhcps closed
9113170.239.85.227 67 udp dhcps unknown
9114170.239.85.227 68 tcp dhcpc closed
9115170.239.85.227 68 udp dhcpc closed
9116170.239.85.227 69 tcp tftp closed
9117170.239.85.227 69 udp tftp closed
9118170.239.85.227 88 tcp kerberos-sec closed
9119170.239.85.227 88 udp kerberos-sec unknown
9120170.239.85.227 123 tcp ntp closed
9121170.239.85.227 123 udp ntp closed
9122170.239.85.227 137 tcp netbios-ns closed
9123170.239.85.227 137 udp netbios-ns closed
9124170.239.85.227 138 tcp netbios-dgm closed
9125170.239.85.227 138 udp netbios-dgm unknown
9126170.239.85.227 139 tcp netbios-ssn closed
9127170.239.85.227 139 udp netbios-ssn closed
9128170.239.85.227 161 tcp snmp closed
9129170.239.85.227 161 udp snmp unknown
9130170.239.85.227 162 tcp snmptrap closed
9131170.239.85.227 162 udp snmptrap unknown
9132170.239.85.227 389 tcp ldap closed
9133170.239.85.227 389 udp ldap unknown
9134170.239.85.227 520 tcp efs closed
9135170.239.85.227 520 udp route unknown
9136170.239.85.227 2049 tcp nfs closed
9137170.239.85.227 2049 udp nfs closed
9138173.214.244.169 53 tcp domain filtered
9139173.214.244.169 53 udp domain unknown
9140173.214.244.169 67 tcp dhcps filtered
9141173.214.244.169 67 udp dhcps unknown
9142173.214.244.169 68 tcp dhcpc filtered
9143173.214.244.169 68 udp dhcpc unknown
9144173.214.244.169 69 tcp tftp filtered
9145173.214.244.169 69 udp tftp unknown
9146173.214.244.169 88 tcp kerberos-sec filtered
9147173.214.244.169 88 udp kerberos-sec unknown
9148173.214.244.169 123 tcp ntp filtered
9149173.214.244.169 123 udp ntp unknown
9150173.214.244.169 137 tcp netbios-ns filtered
9151173.214.244.169 137 udp netbios-ns unknown
9152173.214.244.169 138 tcp netbios-dgm filtered
9153173.214.244.169 138 udp netbios-dgm unknown
9154173.214.244.169 139 tcp netbios-ssn filtered
9155173.214.244.169 139 udp netbios-ssn unknown
9156173.214.244.169 161 tcp snmp filtered
9157173.214.244.169 161 udp snmp unknown
9158173.214.244.169 162 tcp snmptrap filtered
9159173.214.244.169 162 udp snmptrap unknown
9160173.214.244.169 389 tcp ldap filtered
9161173.214.244.169 389 udp ldap unknown
9162173.214.244.169 520 tcp efs filtered
9163173.214.244.169 520 udp route unknown
9164173.214.244.169 2049 tcp nfs filtered
9165173.214.244.169 2049 udp nfs unknown
9166174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
9167174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
9168174.142.53.51 25 tcp smtp closed
9169174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9170174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9171174.142.53.51 67 tcp dhcps filtered
9172174.142.53.51 67 udp dhcps unknown
9173174.142.53.51 68 tcp dhcpc filtered
9174174.142.53.51 68 udp dhcpc unknown
9175174.142.53.51 69 tcp tftp filtered
9176174.142.53.51 69 udp tftp unknown
9177174.142.53.51 88 tcp kerberos-sec filtered
9178174.142.53.51 88 udp kerberos-sec unknown
9179174.142.53.51 123 tcp ntp filtered
9180174.142.53.51 123 udp ntp unknown
9181174.142.53.51 137 tcp netbios-ns filtered
9182174.142.53.51 137 udp netbios-ns filtered
9183174.142.53.51 138 tcp netbios-dgm filtered
9184174.142.53.51 138 udp netbios-dgm filtered
9185174.142.53.51 139 tcp netbios-ssn closed
9186174.142.53.51 139 udp netbios-ssn unknown
9187174.142.53.51 161 tcp snmp filtered
9188174.142.53.51 161 udp snmp unknown
9189174.142.53.51 162 tcp snmptrap filtered
9190174.142.53.51 162 udp snmptrap unknown
9191174.142.53.51 389 tcp ldap filtered
9192174.142.53.51 389 udp ldap unknown
9193174.142.53.51 445 tcp microsoft-ds closed
9194174.142.53.51 520 tcp efs filtered
9195174.142.53.51 520 udp route unknown
9196174.142.53.51 2049 tcp nfs filtered
9197174.142.53.51 2049 udp nfs unknown
9198186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
9199186.64.118.40 53 tcp domain filtered
9200186.64.118.40 53 udp domain closed
9201186.64.118.40 67 tcp dhcps filtered
9202186.64.118.40 67 udp dhcps unknown
9203186.64.118.40 68 tcp dhcpc filtered
9204186.64.118.40 68 udp dhcpc unknown
9205186.64.118.40 69 tcp tftp filtered
9206186.64.118.40 69 udp tftp unknown
9207186.64.118.40 88 tcp kerberos-sec filtered
9208186.64.118.40 88 udp kerberos-sec unknown
9209186.64.118.40 123 tcp ntp filtered
9210186.64.118.40 123 udp ntp unknown
9211186.64.118.40 137 tcp netbios-ns filtered
9212186.64.118.40 137 udp netbios-ns unknown
9213186.64.118.40 138 tcp netbios-dgm filtered
9214186.64.118.40 138 udp netbios-dgm unknown
9215186.64.118.40 139 tcp netbios-ssn filtered
9216186.64.118.40 139 udp netbios-ssn unknown
9217186.64.118.40 161 tcp snmp filtered
9218186.64.118.40 161 udp snmp unknown
9219186.64.118.40 162 tcp snmptrap filtered
9220186.64.118.40 162 udp snmptrap unknown
9221186.64.118.40 389 tcp ldap filtered
9222186.64.118.40 389 udp ldap unknown
9223186.64.118.40 520 tcp efs filtered
9224186.64.118.40 520 udp route unknown
9225186.64.118.40 2049 tcp nfs closed
9226186.64.118.40 2049 udp nfs unknown
9227188.127.251.161 53 tcp domain filtered PowerDNS Authoritative Server 4.1.10
9228188.127.251.161 53 udp domain unknown PowerDNS Authoritative Server 4.1.10
9229188.127.251.161 67 tcp dhcps filtered
9230188.127.251.161 67 udp dhcps unknown
9231188.127.251.161 68 tcp dhcpc filtered
9232188.127.251.161 68 udp dhcpc unknown
9233188.127.251.161 69 tcp tftp filtered
9234188.127.251.161 69 udp tftp unknown
9235188.127.251.161 88 tcp kerberos-sec filtered
9236188.127.251.161 88 udp kerberos-sec unknown
9237188.127.251.161 123 tcp ntp filtered
9238188.127.251.161 123 udp ntp unknown
9239188.127.251.161 137 tcp netbios-ns filtered
9240188.127.251.161 137 udp netbios-ns unknown
9241188.127.251.161 138 tcp netbios-dgm filtered
9242188.127.251.161 138 udp netbios-dgm unknown
9243188.127.251.161 139 tcp netbios-ssn filtered
9244188.127.251.161 139 udp netbios-ssn unknown
9245188.127.251.161 161 tcp snmp filtered
9246188.127.251.161 161 udp snmp unknown
9247188.127.251.161 162 tcp snmptrap filtered
9248188.127.251.161 162 udp snmptrap unknown
9249188.127.251.161 389 tcp ldap filtered
9250188.127.251.161 389 udp ldap unknown
9251188.127.251.161 520 tcp efs filtered
9252188.127.251.161 520 udp route unknown
9253188.127.251.161 2049 tcp nfs filtered
9254188.127.251.161 2049 udp nfs unknown
9255190.98.209.37 53 tcp domain filtered
9256190.98.209.37 53 udp domain unknown
9257190.98.209.37 67 tcp dhcps filtered
9258190.98.209.37 67 udp dhcps unknown
9259190.98.209.37 68 tcp dhcpc filtered
9260190.98.209.37 68 udp dhcpc unknown
9261190.98.209.37 69 tcp tftp filtered
9262190.98.209.37 69 udp tftp unknown
9263190.98.209.37 88 tcp kerberos-sec filtered
9264190.98.209.37 88 udp kerberos-sec unknown
9265190.98.209.37 123 tcp ntp filtered
9266190.98.209.37 123 udp ntp unknown
9267190.98.209.37 137 tcp netbios-ns filtered
9268190.98.209.37 137 udp netbios-ns unknown
9269190.98.209.37 138 tcp netbios-dgm filtered
9270190.98.209.37 138 udp netbios-dgm unknown
9271190.98.209.37 139 tcp netbios-ssn filtered
9272190.98.209.37 139 udp netbios-ssn unknown
9273190.98.209.37 161 tcp snmp filtered
9274190.98.209.37 161 udp snmp unknown
9275190.98.209.37 162 tcp snmptrap filtered
9276190.98.209.37 162 udp snmptrap unknown
9277190.98.209.37 389 tcp ldap filtered
9278190.98.209.37 389 udp ldap unknown
9279190.98.209.37 520 tcp efs filtered
9280190.98.209.37 520 udp route unknown
9281190.98.209.37 2049 tcp nfs filtered
9282190.98.209.37 2049 udp nfs unknown
9283190.107.177.35 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9284190.107.177.35 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9285190.107.177.35 67 tcp dhcps filtered
9286190.107.177.35 67 udp dhcps unknown
9287190.107.177.35 68 tcp dhcpc filtered
9288190.107.177.35 68 udp dhcpc unknown
9289190.107.177.35 69 tcp tftp filtered
9290190.107.177.35 69 udp tftp unknown
9291190.107.177.35 88 tcp kerberos-sec filtered
9292190.107.177.35 88 udp kerberos-sec unknown
9293190.107.177.35 123 tcp ntp filtered
9294190.107.177.35 123 udp ntp unknown
9295190.107.177.35 137 tcp netbios-ns filtered
9296190.107.177.35 137 udp netbios-ns unknown
9297190.107.177.35 138 tcp netbios-dgm filtered
9298190.107.177.35 138 udp netbios-dgm unknown
9299190.107.177.35 139 tcp netbios-ssn filtered
9300190.107.177.35 139 udp netbios-ssn unknown
9301190.107.177.35 161 tcp snmp filtered
9302190.107.177.35 161 udp snmp unknown
9303190.107.177.35 162 tcp snmptrap filtered
9304190.107.177.35 162 udp snmptrap unknown
9305190.107.177.35 389 tcp ldap filtered
9306190.107.177.35 389 udp ldap unknown
9307190.107.177.35 520 tcp efs filtered
9308190.107.177.35 520 udp route unknown
9309190.107.177.35 2049 tcp nfs filtered
9310190.107.177.35 2049 udp nfs unknown
9311190.110.121.175 53 tcp domain filtered
9312190.110.121.175 53 udp domain unknown
9313190.110.121.175 67 tcp dhcps filtered
9314190.110.121.175 67 udp dhcps unknown
9315190.110.121.175 68 tcp dhcpc filtered
9316190.110.121.175 68 udp dhcpc unknown
9317190.110.121.175 69 tcp tftp filtered
9318190.110.121.175 69 udp tftp unknown
9319190.110.121.175 88 tcp kerberos-sec filtered
9320190.110.121.175 88 udp kerberos-sec unknown
9321190.110.121.175 123 tcp ntp filtered
9322190.110.121.175 123 udp ntp unknown
9323190.110.121.175 137 tcp netbios-ns filtered
9324190.110.121.175 137 udp netbios-ns unknown
9325190.110.121.175 138 tcp netbios-dgm filtered
9326190.110.121.175 138 udp netbios-dgm unknown
9327190.110.121.175 139 tcp netbios-ssn filtered
9328190.110.121.175 139 udp netbios-ssn unknown
9329190.110.121.175 161 tcp snmp filtered
9330190.110.121.175 161 udp snmp unknown
9331190.110.121.175 162 tcp snmptrap filtered
9332190.110.121.175 162 udp snmptrap unknown
9333190.110.121.175 389 tcp ldap filtered
9334190.110.121.175 389 udp ldap unknown
9335190.110.121.175 520 tcp efs filtered
9336190.110.121.175 520 udp route unknown
9337190.110.121.175 2049 tcp nfs filtered
9338190.110.121.175 2049 udp nfs unknown
9339190.153.209.187 53 tcp domain filtered
9340190.153.209.187 53 udp domain unknown
9341190.153.209.187 67 tcp dhcps filtered
9342190.153.209.187 67 udp dhcps unknown
9343190.153.209.187 68 tcp dhcpc filtered
9344190.153.209.187 68 udp dhcpc unknown
9345190.153.209.187 69 tcp tftp filtered
9346190.153.209.187 69 udp tftp unknown
9347190.153.209.187 88 tcp kerberos-sec filtered
9348190.153.209.187 88 udp kerberos-sec unknown
9349190.153.209.187 123 tcp ntp filtered
9350190.153.209.187 123 udp ntp unknown
9351190.153.209.187 137 tcp netbios-ns filtered
9352190.153.209.187 137 udp netbios-ns unknown
9353190.153.209.187 138 tcp netbios-dgm filtered
9354190.153.209.187 138 udp netbios-dgm unknown
9355190.153.209.187 139 tcp netbios-ssn filtered
9356190.153.209.187 139 udp netbios-ssn unknown
9357190.153.209.187 161 tcp snmp filtered
9358190.153.209.187 161 udp snmp unknown
9359190.153.209.187 162 tcp snmptrap filtered
9360190.153.209.187 162 udp snmptrap unknown
9361190.153.209.187 389 tcp ldap filtered
9362190.153.209.187 389 udp ldap unknown
9363190.153.209.187 520 tcp efs filtered
9364190.153.209.187 520 udp route unknown
9365190.153.209.187 2049 tcp nfs filtered
9366190.153.209.187 2049 udp nfs unknown
9367190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
9368190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9369190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9370190.153.219.254 67 tcp dhcps filtered
9371190.153.219.254 67 udp dhcps unknown
9372190.153.219.254 68 tcp dhcpc filtered
9373190.153.219.254 68 udp dhcpc unknown
9374190.153.219.254 69 tcp tftp filtered
9375190.153.219.254 69 udp tftp unknown
9376190.153.219.254 88 tcp kerberos-sec filtered
9377190.153.219.254 88 udp kerberos-sec unknown
9378190.153.219.254 123 tcp ntp filtered
9379190.153.219.254 123 udp ntp unknown
9380190.153.219.254 137 tcp netbios-ns filtered
9381190.153.219.254 137 udp netbios-ns unknown
9382190.153.219.254 138 tcp netbios-dgm filtered
9383190.153.219.254 138 udp netbios-dgm unknown
9384190.153.219.254 139 tcp netbios-ssn filtered
9385190.153.219.254 139 udp netbios-ssn unknown
9386190.153.219.254 161 tcp snmp filtered
9387190.153.219.254 161 udp snmp unknown
9388190.153.219.254 162 tcp snmptrap filtered
9389190.153.219.254 162 udp snmptrap unknown
9390190.153.219.254 389 tcp ldap filtered
9391190.153.219.254 389 udp ldap unknown
9392190.153.219.254 520 tcp efs filtered
9393190.153.219.254 520 udp route unknown
9394190.153.219.254 2049 tcp nfs filtered
9395190.153.219.254 2049 udp nfs unknown
9396192.185.134.58 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 150 allowed.\x0d\x0a220-Local time is now 22:31. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
9397192.185.134.58 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9398192.185.134.58 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9399192.185.134.58 67 tcp dhcps closed
9400192.185.134.58 67 udp dhcps unknown
9401192.185.134.58 68 tcp dhcpc closed
9402192.185.134.58 68 udp dhcpc unknown
9403192.185.134.58 69 tcp tftp closed
9404192.185.134.58 69 udp tftp closed
9405192.185.134.58 88 tcp kerberos-sec closed
9406192.185.134.58 88 udp kerberos-sec closed
9407192.185.134.58 123 tcp ntp closed
9408192.185.134.58 123 udp ntp unknown
9409192.185.134.58 137 tcp netbios-ns closed
9410192.185.134.58 137 udp netbios-ns closed
9411192.185.134.58 138 tcp netbios-dgm closed
9412192.185.134.58 138 udp netbios-dgm closed
9413192.185.134.58 139 tcp netbios-ssn closed
9414192.185.134.58 139 udp netbios-ssn closed
9415192.185.134.58 161 tcp snmp closed
9416192.185.134.58 161 udp snmp unknown
9417192.185.134.58 162 tcp snmptrap closed
9418192.185.134.58 162 udp snmptrap closed
9419192.185.134.58 389 tcp ldap closed
9420192.185.134.58 389 udp ldap unknown
9421192.185.134.58 520 tcp efs closed
9422192.185.134.58 520 udp route unknown
9423192.185.134.58 2049 tcp nfs closed
9424192.185.134.58 2049 udp nfs unknown
9425198.49.23.144 53 tcp domain filtered
9426198.49.23.144 53 udp domain unknown
9427198.49.23.144 67 tcp dhcps filtered
9428198.49.23.144 67 udp dhcps unknown
9429198.49.23.144 68 tcp dhcpc filtered
9430198.49.23.144 68 udp dhcpc unknown
9431198.49.23.144 69 tcp tftp filtered
9432198.49.23.144 69 udp tftp unknown
9433198.49.23.144 88 tcp kerberos-sec filtered
9434198.49.23.144 88 udp kerberos-sec unknown
9435198.49.23.144 123 tcp ntp filtered
9436198.49.23.144 123 udp ntp unknown
9437198.49.23.144 137 tcp netbios-ns filtered
9438198.49.23.144 137 udp netbios-ns unknown
9439198.49.23.144 138 tcp netbios-dgm filtered
9440198.49.23.144 138 udp netbios-dgm unknown
9441198.49.23.144 139 tcp netbios-ssn filtered
9442198.49.23.144 139 udp netbios-ssn unknown
9443198.49.23.144 161 tcp snmp filtered
9444198.49.23.144 161 udp snmp unknown
9445198.49.23.144 162 tcp snmptrap filtered
9446198.49.23.144 162 udp snmptrap unknown
9447198.49.23.144 389 tcp ldap filtered
9448198.49.23.144 389 udp ldap unknown
9449198.49.23.144 520 tcp efs filtered
9450198.49.23.144 520 udp route unknown
9451198.49.23.144 2049 tcp nfs filtered
9452198.49.23.144 2049 udp nfs unknown
9453198.49.23.145 53 tcp domain filtered
9454198.49.23.145 53 udp domain unknown
9455198.49.23.145 67 tcp dhcps filtered
9456198.49.23.145 67 udp dhcps unknown
9457198.49.23.145 68 tcp dhcpc filtered
9458198.49.23.145 68 udp dhcpc unknown
9459198.49.23.145 69 tcp tftp filtered
9460198.49.23.145 69 udp tftp unknown
9461198.49.23.145 80 tcp rtsp open
9462198.49.23.145 88 tcp kerberos-sec filtered
9463198.49.23.145 88 udp kerberos-sec unknown
9464198.49.23.145 123 tcp ntp filtered
9465198.49.23.145 123 udp ntp unknown
9466198.49.23.145 137 tcp netbios-ns filtered
9467198.49.23.145 137 udp netbios-ns unknown
9468198.49.23.145 138 tcp netbios-dgm filtered
9469198.49.23.145 138 udp netbios-dgm unknown
9470198.49.23.145 139 tcp netbios-ssn filtered
9471198.49.23.145 139 udp netbios-ssn unknown
9472198.49.23.145 161 tcp snmp filtered
9473198.49.23.145 161 udp snmp unknown
9474198.49.23.145 162 tcp snmptrap filtered
9475198.49.23.145 162 udp snmptrap unknown
9476198.49.23.145 389 tcp ldap filtered
9477198.49.23.145 389 udp ldap unknown
9478198.49.23.145 443 tcp ssl/rtsp open
9479198.49.23.145 520 tcp efs filtered
9480198.49.23.145 520 udp route unknown
9481198.49.23.145 2030 tcp device2 closed
9482198.49.23.145 2049 tcp nfs filtered
9483198.49.23.145 2049 udp nfs unknown
9484198.185.159.144 53 tcp domain filtered
9485198.185.159.144 53 udp domain unknown
9486198.185.159.144 67 tcp dhcps filtered
9487198.185.159.144 67 udp dhcps unknown
9488198.185.159.144 68 tcp dhcpc filtered
9489198.185.159.144 68 udp dhcpc unknown
9490198.185.159.144 69 tcp tftp filtered
9491198.185.159.144 69 udp tftp unknown
9492198.185.159.144 80 tcp rtsp open
9493198.185.159.144 88 tcp kerberos-sec filtered
9494198.185.159.144 88 udp kerberos-sec unknown
9495198.185.159.144 123 tcp ntp filtered
9496198.185.159.144 123 udp ntp unknown
9497198.185.159.144 137 tcp netbios-ns filtered
9498198.185.159.144 137 udp netbios-ns unknown
9499198.185.159.144 138 tcp netbios-dgm filtered
9500198.185.159.144 138 udp netbios-dgm unknown
9501198.185.159.144 139 tcp netbios-ssn filtered
9502198.185.159.144 139 udp netbios-ssn unknown
9503198.185.159.144 161 tcp snmp filtered
9504198.185.159.144 161 udp snmp unknown
9505198.185.159.144 162 tcp snmptrap filtered
9506198.185.159.144 162 udp snmptrap unknown
9507198.185.159.144 389 tcp ldap filtered
9508198.185.159.144 389 udp ldap unknown
9509198.185.159.144 443 tcp ssl/rtsp open
9510198.185.159.144 520 tcp efs filtered
9511198.185.159.144 520 udp route unknown
9512198.185.159.144 2030 tcp device2 closed
9513198.185.159.144 2049 tcp nfs filtered
9514198.185.159.144 2049 udp nfs unknown
9515198.185.159.145 53 tcp domain filtered
9516198.185.159.145 53 udp domain unknown
9517198.185.159.145 67 tcp dhcps filtered
9518198.185.159.145 67 udp dhcps unknown
9519198.185.159.145 68 tcp dhcpc filtered
9520198.185.159.145 68 udp dhcpc unknown
9521198.185.159.145 69 tcp tftp filtered
9522198.185.159.145 69 udp tftp unknown
9523198.185.159.145 88 tcp kerberos-sec filtered
9524198.185.159.145 88 udp kerberos-sec unknown
9525198.185.159.145 123 tcp ntp filtered
9526198.185.159.145 123 udp ntp unknown
9527198.185.159.145 137 tcp netbios-ns filtered
9528198.185.159.145 137 udp netbios-ns unknown
9529198.185.159.145 138 tcp netbios-dgm filtered
9530198.185.159.145 138 udp netbios-dgm unknown
9531198.185.159.145 139 tcp netbios-ssn filtered
9532198.185.159.145 139 udp netbios-ssn unknown
9533198.185.159.145 161 tcp snmp filtered
9534198.185.159.145 161 udp snmp unknown
9535198.185.159.145 162 tcp snmptrap filtered
9536198.185.159.145 162 udp snmptrap unknown
9537198.185.159.145 389 tcp ldap filtered
9538198.185.159.145 389 udp ldap unknown
9539198.185.159.145 520 tcp efs filtered
9540198.185.159.145 520 udp route unknown
9541198.185.159.145 2049 tcp nfs filtered
9542198.185.159.145 2049 udp nfs unknown
9543199.38.245.243 21 tcp ftp open Pure-FTPd
9544199.38.245.243 22 tcp ssh open OpenSSH 5.3 protocol 2.0
9545199.38.245.243 25 tcp smtp open Exim smtpd 4.92
9546199.38.245.243 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9547199.38.245.243 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9548199.38.245.243 67 tcp dhcps closed
9549199.38.245.243 67 udp dhcps unknown
9550199.38.245.243 68 tcp dhcpc closed
9551199.38.245.243 68 udp dhcpc unknown
9552199.38.245.243 69 tcp tftp closed
9553199.38.245.243 69 udp tftp unknown
9554199.38.245.243 80 tcp ssl/http open Apache/2
9555199.38.245.243 88 tcp kerberos-sec closed
9556199.38.245.243 88 udp kerberos-sec unknown
9557199.38.245.243 110 tcp pop3 open Dovecot DirectAdmin pop3d
9558199.38.245.243 123 tcp ntp closed
9559199.38.245.243 123 udp ntp unknown
9560199.38.245.243 137 tcp netbios-ns closed
9561199.38.245.243 137 udp netbios-ns unknown
9562199.38.245.243 138 tcp netbios-dgm closed
9563199.38.245.243 138 udp netbios-dgm unknown
9564199.38.245.243 139 tcp netbios-ssn closed
9565199.38.245.243 139 udp netbios-ssn unknown
9566199.38.245.243 143 tcp imap open Dovecot imapd
9567199.38.245.243 161 tcp snmp closed
9568199.38.245.243 161 udp snmp unknown
9569199.38.245.243 162 tcp snmptrap closed
9570199.38.245.243 162 udp snmptrap unknown
9571199.38.245.243 389 tcp ldap closed
9572199.38.245.243 389 udp ldap unknown
9573199.38.245.243 443 tcp ssl/ssl open Apache httpd SSL-only mode
9574199.38.245.243 465 tcp ssl/smtp open Exim smtpd 4.92
9575199.38.245.243 520 tcp efs closed
9576199.38.245.243 520 udp route unknown
9577199.38.245.243 587 tcp smtp open Exim smtpd 4.92
9578199.38.245.243 993 tcp ssl/imap open
9579199.38.245.243 995 tcp ssl/pop3 open Dovecot DirectAdmin pop3d
9580199.38.245.243 2049 tcp nfs closed
9581199.38.245.243 2049 udp nfs unknown
9582199.38.245.243 2222 tcp http open DirectAdmin httpd 1.57.1 Registered to Your Domain Goes Here, LLP
9583199.38.245.243 3306 tcp mysql open MySQL unauthorized
9584200.2.249.28 21 tcp ftp open vsftpd 3.0.2
9585200.2.249.28 53 udp domain unknown
9586200.2.249.28 67 udp dhcps unknown
9587200.2.249.28 68 udp dhcpc unknown
9588200.2.249.28 69 udp tftp unknown
9589200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
9590200.2.249.28 88 udp kerberos-sec unknown
9591200.2.249.28 123 udp ntp unknown
9592200.2.249.28 137 udp netbios-ns unknown
9593200.2.249.28 138 udp netbios-dgm unknown
9594200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
9595200.2.249.28 139 udp netbios-ssn unknown
9596200.2.249.28 161 udp snmp unknown
9597200.2.249.28 162 udp snmptrap unknown
9598200.2.249.28 389 udp ldap unknown
9599200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
9600200.2.249.28 520 udp route unknown
9601200.2.249.28 2049 udp nfs unknown
9602200.10.251.82 53 tcp domain filtered
9603200.10.251.82 53 udp domain unknown
9604200.10.251.82 67 tcp dhcps filtered
9605200.10.251.82 67 udp dhcps unknown
9606200.10.251.82 68 tcp dhcpc filtered
9607200.10.251.82 68 udp dhcpc unknown
9608200.10.251.82 69 tcp tftp filtered
9609200.10.251.82 69 udp tftp unknown
9610200.10.251.82 88 tcp kerberos-sec filtered
9611200.10.251.82 88 udp kerberos-sec unknown
9612200.10.251.82 123 tcp ntp filtered
9613200.10.251.82 123 udp ntp unknown
9614200.10.251.82 137 tcp netbios-ns filtered
9615200.10.251.82 137 udp netbios-ns unknown
9616200.10.251.82 138 tcp netbios-dgm filtered
9617200.10.251.82 138 udp netbios-dgm unknown
9618200.10.251.82 139 tcp netbios-ssn filtered
9619200.10.251.82 139 udp netbios-ssn unknown
9620200.10.251.82 161 tcp snmp filtered
9621200.10.251.82 161 udp snmp unknown
9622200.10.251.82 162 tcp snmptrap filtered
9623200.10.251.82 162 udp snmptrap unknown
9624200.10.251.82 389 tcp ldap filtered
9625200.10.251.82 389 udp ldap unknown
9626200.10.251.82 520 tcp efs filtered
9627200.10.251.82 520 udp route unknown
9628200.10.251.82 2049 tcp nfs filtered
9629200.10.251.82 2049 udp nfs unknown
9630200.12.19.101 21 tcp ftp open 220 Microsoft FTP Service\x0d\x0a
9631200.12.19.101 53 tcp domain filtered
9632200.12.19.101 53 udp domain unknown
9633200.12.19.101 67 tcp dhcps filtered
9634200.12.19.101 67 udp dhcps closed
9635200.12.19.101 68 tcp dhcpc closed
9636200.12.19.101 68 udp dhcpc closed
9637200.12.19.101 69 tcp tftp closed
9638200.12.19.101 69 udp tftp closed
9639200.12.19.101 88 tcp kerberos-sec closed
9640200.12.19.101 88 udp kerberos-sec closed
9641200.12.19.101 123 tcp ntp filtered
9642200.12.19.101 123 udp ntp unknown
9643200.12.19.101 137 tcp netbios-ns closed
9644200.12.19.101 137 udp netbios-ns unknown
9645200.12.19.101 138 tcp netbios-dgm closed
9646200.12.19.101 138 udp netbios-dgm closed
9647200.12.19.101 139 tcp netbios-ssn closed
9648200.12.19.101 139 udp netbios-ssn closed
9649200.12.19.101 161 tcp snmp closed
9650200.12.19.101 161 udp snmp unknown
9651200.12.19.101 162 tcp snmptrap closed
9652200.12.19.101 162 udp snmptrap closed
9653200.12.19.101 389 tcp ldap closed
9654200.12.19.101 389 udp ldap unknown
9655200.12.19.101 520 tcp efs filtered
9656200.12.19.101 520 udp route unknown
9657200.12.19.101 2049 tcp nfs closed
9658200.12.19.101 2049 udp nfs unknown
9659200.29.0.33 53 tcp domain filtered
9660200.29.0.33 53 udp domain unknown
9661200.29.0.33 67 tcp dhcps filtered
9662200.29.0.33 67 udp dhcps unknown
9663200.29.0.33 68 tcp dhcpc filtered
9664200.29.0.33 68 udp dhcpc unknown
9665200.29.0.33 69 tcp tftp filtered
9666200.29.0.33 69 udp tftp unknown
9667200.29.0.33 88 tcp kerberos-sec filtered
9668200.29.0.33 88 udp kerberos-sec unknown
9669200.29.0.33 123 tcp ntp filtered
9670200.29.0.33 123 udp ntp unknown
9671200.29.0.33 137 tcp netbios-ns filtered
9672200.29.0.33 137 udp netbios-ns unknown
9673200.29.0.33 138 tcp netbios-dgm filtered
9674200.29.0.33 138 udp netbios-dgm unknown
9675200.29.0.33 139 tcp netbios-ssn filtered
9676200.29.0.33 139 udp netbios-ssn unknown
9677200.29.0.33 161 tcp snmp filtered
9678200.29.0.33 161 udp snmp unknown
9679200.29.0.33 162 tcp snmptrap filtered
9680200.29.0.33 162 udp snmptrap unknown
9681200.29.0.33 389 tcp ldap filtered
9682200.29.0.33 389 udp ldap unknown
9683200.29.0.33 520 tcp efs filtered
9684200.29.0.33 520 udp route unknown
9685200.29.0.33 2049 tcp nfs filtered
9686200.29.0.33 2049 udp nfs unknown
9687200.54.92.108 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
9688200.54.92.108 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
9689200.54.92.108 53 tcp domain closed
9690200.54.92.108 53 udp domain unknown
9691200.54.92.108 67 tcp dhcps closed
9692200.54.92.108 67 udp dhcps unknown
9693200.54.92.108 68 tcp dhcpc closed
9694200.54.92.108 68 udp dhcpc unknown
9695200.54.92.108 69 tcp tftp closed
9696200.54.92.108 69 udp tftp unknown
9697200.54.92.108 88 tcp kerberos-sec closed
9698200.54.92.108 88 udp kerberos-sec unknown
9699200.54.92.108 123 tcp ntp closed
9700200.54.92.108 123 udp ntp unknown
9701200.54.92.108 137 tcp netbios-ns closed
9702200.54.92.108 137 udp netbios-ns unknown
9703200.54.92.108 138 tcp netbios-dgm closed
9704200.54.92.108 138 udp netbios-dgm unknown
9705200.54.92.108 139 tcp netbios-ssn closed
9706200.54.92.108 139 udp netbios-ssn unknown
9707200.54.92.108 161 tcp snmp closed
9708200.54.92.108 161 udp snmp unknown
9709200.54.92.108 162 tcp snmptrap closed
9710200.54.92.108 162 udp snmptrap unknown
9711200.54.92.108 389 tcp ldap closed
9712200.54.92.108 389 udp ldap unknown
9713200.54.92.108 520 tcp efs closed
9714200.54.92.108 520 udp route unknown
9715200.54.92.108 2049 tcp nfs closed
9716200.54.92.108 2049 udp nfs unknown
9717200.54.230.247 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [200.54.230.247]\x0d\x0a
9718200.54.230.247 22 tcp ssh open SSH-2.0-OpenSSH_7.4
9719200.54.230.247 53 tcp domain open unknown banner: none
9720200.54.230.247 53 udp domain open unknown banner: none
9721200.54.230.247 67 tcp dhcps filtered
9722200.54.230.247 67 udp dhcps unknown
9723200.54.230.247 68 tcp dhcpc filtered
9724200.54.230.247 68 udp dhcpc unknown
9725200.54.230.247 69 tcp tftp filtered
9726200.54.230.247 69 udp tftp unknown
9727200.54.230.247 88 tcp kerberos-sec filtered
9728200.54.230.247 88 udp kerberos-sec unknown
9729200.54.230.247 123 tcp ntp filtered
9730200.54.230.247 123 udp ntp unknown
9731200.54.230.247 137 tcp netbios-ns filtered
9732200.54.230.247 137 udp netbios-ns unknown
9733200.54.230.247 138 tcp netbios-dgm filtered
9734200.54.230.247 138 udp netbios-dgm unknown
9735200.54.230.247 139 tcp netbios-ssn filtered
9736200.54.230.247 139 udp netbios-ssn filtered
9737200.54.230.247 161 tcp snmp filtered
9738200.54.230.247 161 udp snmp unknown
9739200.54.230.247 162 tcp snmptrap filtered
9740200.54.230.247 162 udp snmptrap unknown
9741200.54.230.247 389 tcp ldap filtered
9742200.54.230.247 389 udp ldap filtered
9743200.54.230.247 520 tcp efs filtered
9744200.54.230.247 520 udp route filtered
9745200.54.230.247 2049 tcp nfs filtered
9746200.54.230.247 2049 udp nfs unknown
9747200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
9748200.55.198.228 53 tcp domain open
9749200.55.198.228 53 udp domain open
9750200.55.198.228 67 tcp dhcps filtered
9751200.55.198.228 67 udp dhcps unknown
9752200.55.198.228 68 tcp dhcpc filtered
9753200.55.198.228 68 udp dhcpc unknown
9754200.55.198.228 69 tcp tftp filtered
9755200.55.198.228 69 udp tftp unknown
9756200.55.198.228 88 tcp kerberos-sec filtered
9757200.55.198.228 88 udp kerberos-sec unknown
9758200.55.198.228 123 tcp ntp filtered
9759200.55.198.228 123 udp ntp unknown
9760200.55.198.228 137 tcp netbios-ns filtered
9761200.55.198.228 137 udp netbios-ns unknown
9762200.55.198.228 138 tcp netbios-dgm filtered
9763200.55.198.228 138 udp netbios-dgm unknown
9764200.55.198.228 139 tcp netbios-ssn filtered
9765200.55.198.228 139 udp netbios-ssn unknown
9766200.55.198.228 161 tcp snmp filtered
9767200.55.198.228 161 udp snmp unknown
9768200.55.198.228 162 tcp snmptrap filtered
9769200.55.198.228 162 udp snmptrap unknown
9770200.55.198.228 389 tcp ldap filtered
9771200.55.198.228 389 udp ldap unknown
9772200.55.198.228 520 tcp efs filtered
9773200.55.198.228 520 udp route closed
9774200.55.198.228 2049 tcp nfs filtered
9775200.55.198.228 2049 udp nfs unknown
9776200.68.30.227 53 tcp domain closed
9777200.68.30.227 53 udp domain unknown
9778200.68.30.227 67 tcp dhcps closed
9779200.68.30.227 67 udp dhcps filtered
9780200.68.30.227 68 tcp dhcpc closed
9781200.68.30.227 68 udp dhcpc unknown
9782200.68.30.227 69 tcp tftp closed
9783200.68.30.227 69 udp tftp unknown
9784200.68.30.227 88 tcp kerberos-sec closed
9785200.68.30.227 88 udp kerberos-sec unknown
9786200.68.30.227 123 tcp ntp closed
9787200.68.30.227 123 udp ntp filtered
9788200.68.30.227 137 tcp netbios-ns closed
9789200.68.30.227 137 udp netbios-ns filtered
9790200.68.30.227 138 tcp netbios-dgm closed
9791200.68.30.227 138 udp netbios-dgm filtered
9792200.68.30.227 139 tcp netbios-ssn closed
9793200.68.30.227 139 udp netbios-ssn filtered
9794200.68.30.227 161 tcp snmp closed
9795200.68.30.227 161 udp snmp filtered
9796200.68.30.227 162 tcp snmptrap closed
9797200.68.30.227 162 udp snmptrap filtered
9798200.68.30.227 389 tcp ldap closed
9799200.68.30.227 389 udp ldap unknown
9800200.68.30.227 520 tcp efs closed
9801200.68.30.227 520 udp route filtered
9802200.68.30.227 2049 tcp nfs closed
9803200.68.30.227 2049 udp nfs filtered
9804200.68.34.99 53 tcp domain filtered
9805200.68.34.99 53 udp domain unknown
9806200.68.34.99 67 tcp dhcps filtered
9807200.68.34.99 67 udp dhcps unknown
9808200.68.34.99 68 tcp dhcpc filtered
9809200.68.34.99 68 udp dhcpc unknown
9810200.68.34.99 69 tcp tftp filtered
9811200.68.34.99 69 udp tftp unknown
9812200.68.34.99 88 tcp kerberos-sec filtered
9813200.68.34.99 88 udp kerberos-sec unknown
9814200.68.34.99 123 tcp ntp filtered
9815200.68.34.99 123 udp ntp unknown
9816200.68.34.99 137 tcp netbios-ns filtered
9817200.68.34.99 137 udp netbios-ns unknown
9818200.68.34.99 138 tcp netbios-dgm filtered
9819200.68.34.99 138 udp netbios-dgm unknown
9820200.68.34.99 139 tcp netbios-ssn filtered
9821200.68.34.99 139 udp netbios-ssn unknown
9822200.68.34.99 161 tcp snmp filtered
9823200.68.34.99 161 udp snmp unknown
9824200.68.34.99 162 tcp snmptrap filtered
9825200.68.34.99 162 udp snmptrap unknown
9826200.68.34.99 389 tcp ldap filtered
9827200.68.34.99 389 udp ldap unknown
9828200.68.34.99 520 tcp efs filtered
9829200.68.34.99 520 udp route unknown
9830200.68.34.99 2049 tcp nfs filtered
9831200.68.34.99 2049 udp nfs unknown
9832200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9833200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9834200.73.54.34 67 tcp dhcps filtered
9835200.73.54.34 67 udp dhcps unknown
9836200.73.54.34 68 tcp dhcpc filtered
9837200.73.54.34 68 udp dhcpc unknown
9838200.73.54.34 69 tcp tftp filtered
9839200.73.54.34 69 udp tftp unknown
9840200.73.54.34 88 tcp kerberos-sec filtered
9841200.73.54.34 88 udp kerberos-sec unknown
9842200.73.54.34 123 tcp ntp filtered
9843200.73.54.34 123 udp ntp unknown
9844200.73.54.34 137 tcp netbios-ns filtered
9845200.73.54.34 137 udp netbios-ns unknown
9846200.73.54.34 138 tcp netbios-dgm filtered
9847200.73.54.34 138 udp netbios-dgm unknown
9848200.73.54.34 139 tcp netbios-ssn filtered
9849200.73.54.34 139 udp netbios-ssn unknown
9850200.73.54.34 161 tcp snmp filtered
9851200.73.54.34 161 udp snmp unknown
9852200.73.54.34 162 tcp snmptrap filtered
9853200.73.54.34 162 udp snmptrap unknown
9854200.73.54.34 389 tcp ldap filtered
9855200.73.54.34 389 udp ldap unknown
9856200.73.54.34 520 tcp efs filtered
9857200.73.54.34 520 udp route unknown
9858200.73.54.34 2049 tcp nfs filtered
9859200.73.54.34 2049 udp nfs unknown
9860200.91.40.252 53 tcp domain filtered
9861200.91.40.252 53 udp domain unknown
9862200.91.40.252 67 tcp dhcps filtered
9863200.91.40.252 67 udp dhcps unknown
9864200.91.40.252 68 tcp dhcpc filtered
9865200.91.40.252 68 udp dhcpc unknown
9866200.91.40.252 69 tcp tftp filtered
9867200.91.40.252 69 udp tftp unknown
9868200.91.40.252 88 tcp kerberos-sec filtered
9869200.91.40.252 88 udp kerberos-sec unknown
9870200.91.40.252 123 tcp ntp filtered
9871200.91.40.252 123 udp ntp unknown
9872200.91.40.252 137 tcp netbios-ns filtered
9873200.91.40.252 137 udp netbios-ns unknown
9874200.91.40.252 138 tcp netbios-dgm filtered
9875200.91.40.252 138 udp netbios-dgm unknown
9876200.91.40.252 139 tcp netbios-ssn filtered
9877200.91.40.252 139 udp netbios-ssn unknown
9878200.91.40.252 161 tcp snmp filtered
9879200.91.40.252 161 udp snmp unknown
9880200.91.40.252 162 tcp snmptrap filtered
9881200.91.40.252 162 udp snmptrap unknown
9882200.91.40.252 389 tcp ldap filtered
9883200.91.40.252 389 udp ldap unknown
9884200.91.40.252 520 tcp efs filtered
9885200.91.40.252 520 udp route unknown
9886200.91.40.252 2049 tcp nfs filtered
9887200.91.40.252 2049 udp nfs unknown
9888200.91.41.5 53 tcp domain filtered
9889200.91.41.5 53 udp domain unknown
9890200.91.41.5 67 tcp dhcps filtered
9891200.91.41.5 67 udp dhcps unknown
9892200.91.41.5 68 tcp dhcpc filtered
9893200.91.41.5 68 udp dhcpc unknown
9894200.91.41.5 69 tcp tftp filtered
9895200.91.41.5 69 udp tftp unknown
9896200.91.41.5 88 tcp kerberos-sec filtered
9897200.91.41.5 88 udp kerberos-sec unknown
9898200.91.41.5 123 tcp ntp filtered
9899200.91.41.5 123 udp ntp unknown
9900200.91.41.5 137 tcp netbios-ns filtered
9901200.91.41.5 137 udp netbios-ns unknown
9902200.91.41.5 138 tcp netbios-dgm filtered
9903200.91.41.5 138 udp netbios-dgm unknown
9904200.91.41.5 139 tcp netbios-ssn filtered
9905200.91.41.5 139 udp netbios-ssn unknown
9906200.91.41.5 161 tcp snmp filtered
9907200.91.41.5 161 udp snmp unknown
9908200.91.41.5 162 tcp snmptrap filtered
9909200.91.41.5 162 udp snmptrap unknown
9910200.91.41.5 389 tcp ldap filtered
9911200.91.41.5 389 udp ldap unknown
9912200.91.41.5 520 tcp efs filtered
9913200.91.41.5 520 udp route unknown
9914200.91.41.5 2049 tcp nfs filtered
9915200.91.41.5 2049 udp nfs unknown
9916200.126.100.83 53 tcp domain filtered
9917200.126.100.83 53 udp domain unknown
9918200.126.100.83 67 tcp dhcps filtered
9919200.126.100.83 67 udp dhcps unknown
9920200.126.100.83 68 tcp dhcpc filtered
9921200.126.100.83 68 udp dhcpc unknown
9922200.126.100.83 69 tcp tftp filtered
9923200.126.100.83 69 udp tftp unknown
9924200.126.100.83 88 tcp kerberos-sec filtered
9925200.126.100.83 88 udp kerberos-sec unknown
9926200.126.100.83 123 tcp ntp filtered
9927200.126.100.83 123 udp ntp unknown
9928200.126.100.83 137 tcp netbios-ns filtered
9929200.126.100.83 137 udp netbios-ns unknown
9930200.126.100.83 138 tcp netbios-dgm filtered
9931200.126.100.83 138 udp netbios-dgm unknown
9932200.126.100.83 139 tcp netbios-ssn filtered
9933200.126.100.83 139 udp netbios-ssn unknown
9934200.126.100.83 161 tcp snmp filtered
9935200.126.100.83 161 udp snmp unknown
9936200.126.100.83 162 tcp snmptrap filtered
9937200.126.100.83 162 udp snmptrap unknown
9938200.126.100.83 389 tcp ldap filtered
9939200.126.100.83 389 udp ldap unknown
9940200.126.100.83 520 tcp efs filtered
9941200.126.100.83 520 udp route unknown
9942200.126.100.83 2049 tcp nfs filtered
9943200.126.100.83 2049 udp nfs unknown
9944201.159.170.136 53 tcp domain filtered
9945201.159.170.136 53 udp domain unknown
9946201.159.170.136 67 tcp dhcps filtered
9947201.159.170.136 67 udp dhcps unknown
9948201.159.170.136 68 tcp dhcpc filtered
9949201.159.170.136 68 udp dhcpc unknown
9950201.159.170.136 69 tcp tftp filtered
9951201.159.170.136 69 udp tftp unknown
9952201.159.170.136 88 tcp kerberos-sec filtered
9953201.159.170.136 88 udp kerberos-sec unknown
9954201.159.170.136 123 tcp ntp filtered
9955201.159.170.136 123 udp ntp unknown
9956201.159.170.136 137 tcp netbios-ns filtered
9957201.159.170.136 137 udp netbios-ns unknown
9958201.159.170.136 138 tcp netbios-dgm filtered
9959201.159.170.136 138 udp netbios-dgm unknown
9960201.159.170.136 139 tcp netbios-ssn filtered
9961201.159.170.136 139 udp netbios-ssn unknown
9962201.159.170.136 161 tcp snmp filtered
9963201.159.170.136 161 udp snmp unknown
9964201.159.170.136 162 tcp snmptrap filtered
9965201.159.170.136 162 udp snmptrap unknown
9966201.159.170.136 389 tcp ldap filtered
9967201.159.170.136 389 udp ldap unknown
9968201.159.170.136 520 tcp efs filtered
9969201.159.170.136 520 udp route unknown
9970201.159.170.136 2049 tcp nfs filtered
9971201.159.170.136 2049 udp nfs unknown
9972204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
9973204.93.193.141 53 tcp domain filtered
9974204.93.193.141 53 udp domain unknown
9975204.93.193.141 67 tcp dhcps filtered
9976204.93.193.141 67 udp dhcps unknown
9977204.93.193.141 68 tcp dhcpc filtered
9978204.93.193.141 68 udp dhcpc unknown
9979204.93.193.141 69 tcp tftp filtered
9980204.93.193.141 69 udp tftp unknown
9981204.93.193.141 88 tcp kerberos-sec filtered
9982204.93.193.141 88 udp kerberos-sec unknown
9983204.93.193.141 123 tcp ntp filtered
9984204.93.193.141 123 udp ntp unknown
9985204.93.193.141 137 tcp netbios-ns filtered
9986204.93.193.141 137 udp netbios-ns unknown
9987204.93.193.141 138 tcp netbios-dgm filtered
9988204.93.193.141 138 udp netbios-dgm unknown
9989204.93.193.141 139 tcp netbios-ssn filtered
9990204.93.193.141 139 udp netbios-ssn unknown
9991204.93.193.141 161 tcp snmp filtered
9992204.93.193.141 161 udp snmp unknown
9993204.93.193.141 162 tcp snmptrap filtered
9994204.93.193.141 162 udp snmptrap unknown
9995204.93.193.141 389 tcp ldap filtered
9996204.93.193.141 389 udp ldap unknown
9997204.93.193.141 520 tcp efs filtered
9998204.93.193.141 520 udp route unknown
9999204.93.193.141 2049 tcp nfs filtered
10000204.93.193.141 2049 udp nfs unknown
10001206.48.140.40 53 tcp domain filtered
10002206.48.140.40 53 udp domain unknown
10003206.48.140.40 67 tcp dhcps filtered
10004206.48.140.40 67 udp dhcps unknown
10005206.48.140.40 68 tcp dhcpc filtered
10006206.48.140.40 68 udp dhcpc unknown
10007206.48.140.40 69 tcp tftp filtered
10008206.48.140.40 69 udp tftp unknown
10009206.48.140.40 88 tcp kerberos-sec filtered
10010206.48.140.40 88 udp kerberos-sec unknown
10011206.48.140.40 123 tcp ntp filtered
10012206.48.140.40 123 udp ntp unknown
10013206.48.140.40 137 tcp netbios-ns filtered
10014206.48.140.40 137 udp netbios-ns unknown
10015206.48.140.40 138 tcp netbios-dgm filtered
10016206.48.140.40 138 udp netbios-dgm unknown
10017206.48.140.40 139 tcp netbios-ssn filtered
10018206.48.140.40 139 udp netbios-ssn unknown
10019206.48.140.40 161 tcp snmp filtered
10020206.48.140.40 161 udp snmp unknown
10021206.48.140.40 162 tcp snmptrap filtered
10022206.48.140.40 162 udp snmptrap unknown
10023206.48.140.40 389 tcp ldap filtered
10024206.48.140.40 389 udp ldap unknown
10025206.48.140.40 520 tcp efs filtered
10026206.48.140.40 520 udp route unknown
10027206.48.140.40 2049 tcp nfs filtered
10028206.48.140.40 2049 udp nfs unknown
10029207.246.147.189 53 tcp domain filtered
10030207.246.147.189 53 udp domain unknown
10031207.246.147.189 67 tcp dhcps filtered
10032207.246.147.189 67 udp dhcps unknown
10033207.246.147.189 68 tcp dhcpc filtered
10034207.246.147.189 68 udp dhcpc unknown
10035207.246.147.189 69 tcp tftp filtered
10036207.246.147.189 69 udp tftp unknown
10037207.246.147.189 80 tcp http open nginx
10038207.246.147.189 88 tcp kerberos-sec filtered
10039207.246.147.189 88 udp kerberos-sec unknown
10040207.246.147.189 123 tcp ntp filtered
10041207.246.147.189 123 udp ntp unknown
10042207.246.147.189 137 tcp netbios-ns filtered
10043207.246.147.189 137 udp netbios-ns unknown
10044207.246.147.189 138 tcp netbios-dgm filtered
10045207.246.147.189 138 udp netbios-dgm unknown
10046207.246.147.189 139 tcp netbios-ssn filtered
10047207.246.147.189 139 udp netbios-ssn unknown
10048207.246.147.189 161 tcp snmp filtered
10049207.246.147.189 161 udp snmp unknown
10050207.246.147.189 162 tcp snmptrap filtered
10051207.246.147.189 162 udp snmptrap unknown
10052207.246.147.189 389 tcp ldap filtered
10053207.246.147.189 389 udp ldap unknown
10054207.246.147.189 443 tcp ssl/http open nginx
10055207.246.147.189 520 tcp efs filtered
10056207.246.147.189 520 udp route unknown
10057207.246.147.189 2049 tcp nfs filtered
10058207.246.147.189 2049 udp nfs unknown
10059207.246.147.190 53 tcp domain filtered
10060207.246.147.190 53 udp domain unknown
10061207.246.147.190 67 tcp dhcps filtered
10062207.246.147.190 67 udp dhcps unknown
10063207.246.147.190 68 tcp dhcpc filtered
10064207.246.147.190 68 udp dhcpc unknown
10065207.246.147.190 69 tcp tftp filtered
10066207.246.147.190 69 udp tftp unknown
10067207.246.147.190 80 tcp http open nginx
10068207.246.147.190 88 tcp kerberos-sec filtered
10069207.246.147.190 88 udp kerberos-sec unknown
10070207.246.147.190 123 tcp ntp filtered
10071207.246.147.190 123 udp ntp unknown
10072207.246.147.190 137 tcp netbios-ns filtered
10073207.246.147.190 137 udp netbios-ns unknown
10074207.246.147.190 138 tcp netbios-dgm filtered
10075207.246.147.190 138 udp netbios-dgm filtered
10076207.246.147.190 139 tcp netbios-ssn filtered
10077207.246.147.190 139 udp netbios-ssn unknown
10078207.246.147.190 161 tcp snmp filtered
10079207.246.147.190 161 udp snmp unknown
10080207.246.147.190 162 tcp snmptrap filtered
10081207.246.147.190 162 udp snmptrap unknown
10082207.246.147.190 389 tcp ldap filtered
10083207.246.147.190 389 udp ldap unknown
10084207.246.147.190 443 tcp ssl/http open nginx
10085207.246.147.190 520 tcp efs filtered
10086207.246.147.190 520 udp route unknown
10087207.246.147.190 2049 tcp nfs filtered
10088207.246.147.190 2049 udp nfs unknown
10089207.246.147.247 53 tcp domain filtered
10090207.246.147.247 53 udp domain filtered
10091207.246.147.247 67 tcp dhcps filtered
10092207.246.147.247 67 udp dhcps unknown
10093207.246.147.247 68 tcp dhcpc filtered
10094207.246.147.247 68 udp dhcpc unknown
10095207.246.147.247 69 tcp tftp filtered
10096207.246.147.247 69 udp tftp unknown
10097207.246.147.247 80 tcp http open nginx
10098207.246.147.247 88 tcp kerberos-sec filtered
10099207.246.147.247 88 udp kerberos-sec unknown
10100207.246.147.247 123 tcp ntp filtered
10101207.246.147.247 123 udp ntp unknown
10102207.246.147.247 137 tcp netbios-ns filtered
10103207.246.147.247 137 udp netbios-ns filtered
10104207.246.147.247 138 tcp netbios-dgm filtered
10105207.246.147.247 138 udp netbios-dgm unknown
10106207.246.147.247 139 tcp netbios-ssn filtered
10107207.246.147.247 139 udp netbios-ssn unknown
10108207.246.147.247 161 tcp snmp filtered
10109207.246.147.247 161 udp snmp unknown
10110207.246.147.247 162 tcp snmptrap filtered
10111207.246.147.247 162 udp snmptrap unknown
10112207.246.147.247 389 tcp ldap filtered
10113207.246.147.247 389 udp ldap unknown
10114207.246.147.247 443 tcp ssl/http open nginx
10115207.246.147.247 520 tcp efs filtered
10116207.246.147.247 520 udp route unknown
10117207.246.147.247 2049 tcp nfs filtered
10118207.246.147.247 2049 udp nfs unknown
10119207.246.147.248 53 tcp domain filtered
10120207.246.147.248 53 udp domain unknown
10121207.246.147.248 67 tcp dhcps filtered
10122207.246.147.248 67 udp dhcps unknown
10123207.246.147.248 68 tcp dhcpc filtered
10124207.246.147.248 68 udp dhcpc unknown
10125207.246.147.248 69 tcp tftp filtered
10126207.246.147.248 69 udp tftp unknown
10127207.246.147.248 80 tcp http open nginx
10128207.246.147.248 88 tcp kerberos-sec filtered
10129207.246.147.248 88 udp kerberos-sec unknown
10130207.246.147.248 123 tcp ntp filtered
10131207.246.147.248 123 udp ntp unknown
10132207.246.147.248 137 tcp netbios-ns filtered
10133207.246.147.248 137 udp netbios-ns unknown
10134207.246.147.248 138 tcp netbios-dgm filtered
10135207.246.147.248 138 udp netbios-dgm unknown
10136207.246.147.248 139 tcp netbios-ssn filtered
10137207.246.147.248 139 udp netbios-ssn unknown
10138207.246.147.248 161 tcp snmp filtered
10139207.246.147.248 161 udp snmp unknown
10140207.246.147.248 162 tcp snmptrap filtered
10141207.246.147.248 162 udp snmptrap unknown
10142207.246.147.248 389 tcp ldap filtered
10143207.246.147.248 389 udp ldap unknown
10144207.246.147.248 443 tcp ssl/http open nginx
10145207.246.147.248 520 tcp efs filtered
10146207.246.147.248 520 udp route unknown
10147207.246.147.248 2049 tcp nfs filtered
10148207.246.147.248 2049 udp nfs unknown
10149211.13.196.135 25 tcp smtp closed
10150211.13.196.135 53 tcp domain filtered
10151211.13.196.135 53 udp domain unknown
10152211.13.196.135 67 tcp dhcps filtered
10153211.13.196.135 67 udp dhcps unknown
10154211.13.196.135 68 tcp dhcpc filtered
10155211.13.196.135 68 udp dhcpc unknown
10156211.13.196.135 69 tcp tftp filtered
10157211.13.196.135 69 udp tftp unknown
10158211.13.196.135 80 tcp http open Apache httpd
10159211.13.196.135 88 tcp kerberos-sec filtered
10160211.13.196.135 88 udp kerberos-sec unknown
10161211.13.196.135 113 tcp ident closed
10162211.13.196.135 123 tcp ntp filtered
10163211.13.196.135 123 udp ntp unknown
10164211.13.196.135 137 tcp netbios-ns filtered
10165211.13.196.135 137 udp netbios-ns filtered
10166211.13.196.135 138 tcp netbios-dgm filtered
10167211.13.196.135 138 udp netbios-dgm filtered
10168211.13.196.135 139 tcp netbios-ssn closed
10169211.13.196.135 139 udp netbios-ssn unknown
10170211.13.196.135 161 tcp snmp filtered
10171211.13.196.135 161 udp snmp unknown
10172211.13.196.135 162 tcp snmptrap filtered
10173211.13.196.135 162 udp snmptrap unknown
10174211.13.196.135 389 tcp ldap filtered
10175211.13.196.135 389 udp ldap unknown
10176211.13.196.135 443 tcp ssl/http open Apache httpd
10177211.13.196.135 445 tcp microsoft-ds closed
10178211.13.196.135 520 tcp efs filtered
10179211.13.196.135 520 udp route unknown
10180211.13.196.135 2049 tcp nfs filtered
10181211.13.196.135 2049 udp nfs unknown
10182212.174.0.150 53 tcp domain filtered
10183212.174.0.150 53 udp domain unknown
10184212.174.0.150 67 tcp dhcps filtered
10185212.174.0.150 67 udp dhcps unknown
10186212.174.0.150 68 tcp dhcpc filtered
10187212.174.0.150 68 udp dhcpc unknown
10188212.174.0.150 69 tcp tftp filtered
10189212.174.0.150 69 udp tftp unknown
10190212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
10191212.174.0.150 88 tcp kerberos-sec filtered
10192212.174.0.150 88 udp kerberos-sec unknown
10193212.174.0.150 123 tcp ntp filtered
10194212.174.0.150 123 udp ntp unknown
10195212.174.0.150 137 tcp netbios-ns filtered
10196212.174.0.150 137 udp netbios-ns unknown
10197212.174.0.150 138 tcp netbios-dgm filtered
10198212.174.0.150 138 udp netbios-dgm unknown
10199212.174.0.150 139 tcp netbios-ssn filtered
10200212.174.0.150 139 udp netbios-ssn unknown
10201212.174.0.150 161 tcp snmp filtered
10202212.174.0.150 161 udp snmp unknown
10203212.174.0.150 162 tcp snmptrap filtered
10204212.174.0.150 162 udp snmptrap unknown
10205212.174.0.150 389 tcp ldap filtered
10206212.174.0.150 389 udp ldap unknown
10207212.174.0.150 520 tcp efs filtered
10208212.174.0.150 520 udp route unknown
10209212.174.0.150 2049 tcp nfs filtered
10210212.174.0.150 2049 udp nfs unknown
10211216.172.184.117 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 5 of 150 allowed.\x0d\x0a220-Local time is now 01:41. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
10212216.172.184.117 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10213216.172.184.117 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10214216.172.184.117 67 tcp dhcps closed
10215216.172.184.117 67 udp dhcps closed
10216216.172.184.117 68 tcp dhcpc closed
10217216.172.184.117 68 udp dhcpc unknown
10218216.172.184.117 69 tcp tftp closed
10219216.172.184.117 69 udp tftp unknown
10220216.172.184.117 88 tcp kerberos-sec closed
10221216.172.184.117 88 udp kerberos-sec unknown
10222216.172.184.117 123 tcp ntp closed
10223216.172.184.117 123 udp ntp unknown
10224216.172.184.117 137 tcp netbios-ns closed
10225216.172.184.117 137 udp netbios-ns unknown
10226216.172.184.117 138 tcp netbios-dgm closed
10227216.172.184.117 138 udp netbios-dgm closed
10228216.172.184.117 139 tcp netbios-ssn closed
10229216.172.184.117 139 udp netbios-ssn closed
10230216.172.184.117 161 tcp snmp closed
10231216.172.184.117 161 udp snmp unknown
10232216.172.184.117 162 tcp snmptrap closed
10233216.172.184.117 162 udp snmptrap closed
10234216.172.184.117 389 tcp ldap closed
10235216.172.184.117 389 udp ldap closed
10236216.172.184.117 520 tcp efs closed
10237216.172.184.117 520 udp route closed
10238216.172.184.117 2049 tcp nfs closed
10239216.172.184.117 2049 udp nfs unknown
10240218.45.5.97 25 tcp smtp closed
10241218.45.5.97 53 tcp domain filtered
10242218.45.5.97 53 udp domain unknown
10243218.45.5.97 67 tcp dhcps filtered
10244218.45.5.97 67 udp dhcps unknown
10245218.45.5.97 68 tcp dhcpc filtered
10246218.45.5.97 68 udp dhcpc unknown
10247218.45.5.97 69 tcp tftp filtered
10248218.45.5.97 69 udp tftp unknown
10249218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
10250218.45.5.97 88 tcp kerberos-sec filtered
10251218.45.5.97 88 udp kerberos-sec unknown
10252218.45.5.97 113 tcp ident closed
10253218.45.5.97 123 tcp ntp filtered
10254218.45.5.97 123 udp ntp unknown
10255218.45.5.97 137 tcp netbios-ns filtered
10256218.45.5.97 137 udp netbios-ns filtered
10257218.45.5.97 138 tcp netbios-dgm filtered
10258218.45.5.97 138 udp netbios-dgm filtered
10259218.45.5.97 139 tcp netbios-ssn closed
10260218.45.5.97 139 udp netbios-ssn unknown
10261218.45.5.97 161 tcp snmp filtered
10262218.45.5.97 161 udp snmp unknown
10263218.45.5.97 162 tcp snmptrap filtered
10264218.45.5.97 162 udp snmptrap unknown
10265218.45.5.97 389 tcp ldap filtered
10266218.45.5.97 389 udp ldap unknown
10267218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
10268218.45.5.97 445 tcp microsoft-ds closed
10269218.45.5.97 520 tcp efs filtered
10270218.45.5.97 520 udp route unknown
10271218.45.5.97 2049 tcp nfs filtered
10272218.45.5.97 2049 udp nfs unknown
10273################################################################################################################################
10274Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 02:50 EDT
10275Nmap scan report for 40.113.247.175
10276Host is up (0.27s latency).
10277Not shown: 998 filtered ports
10278PORT STATE SERVICE VERSION
1027980/tcp open http Microsoft IIS httpd 10.0
10280|_http-server-header: Microsoft-IIS/10.0
10281| vulscan: VulDB - https://vuldb.com:
10282| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
10283| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
10284| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
10285| [139953] Microsoft Internet Explorer 10/11 memory corruption
10286| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
10287| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
10288| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
10289| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
10290| [136279] Microsoft Internet Explorer 10/11 memory corruption
10291| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
10292| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10293| [134682] Microsoft Internet Explorer 10/11 memory corruption
10294| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10295| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10296| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
10297| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
10298| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10299| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10300| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10301| [131678] Microsoft Internet Explorer 10/11 memory corruption
10302| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
10303| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
10304| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
10305| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
10306| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
10307| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
10308| [131618] Microsoft Internet Explorer 10/11 memory corruption
10309| [130827] Microsoft Internet Explorer 10/11 information disclosure
10310| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
10311| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
10312| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
10313| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
10314| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
10315| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
10316| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
10317| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
10318| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
10319| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
10320| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10321| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
10322| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
10323| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
10324| [122846] Microsoft Internet Explorer 10/11 memory corruption
10325| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
10326| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10327| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
10328| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
10329| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
10330| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
10331| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
10332| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
10333| [115997] Microsoft Internet Explorer 10/11 memory corruption
10334| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
10335| [114567] Microsoft Internet Explorer 10/11 information disclosure
10336| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
10337| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
10338| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
10339| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
10340| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
10341| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
10342| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
10343| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
10344| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
10345| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
10346| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
10347| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
10348| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
10349| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
10350| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
10351| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10352| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10353| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
10354| [109365] Microsoft Internet Explorer 10/11 memory corruption
10355| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
10356| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
10357| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
10358| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
10359| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
10360| [102461] Microsoft Internet Explorer 10/11 memory corruption
10361| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
10362| [101007] Microsoft Internet Explorer 10/11 memory corruption
10363| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
10364| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
10365| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
10366| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
10367| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
10368| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
10369| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
10370| [97967] Microsoft Internet Explorer 10/11 memory corruption
10371| [97965] Microsoft Internet Explorer 10/11 memory corruption
10372| [94436] Microsoft Windows 10 Graphics memory corruption
10373| [94421] Microsoft Internet Explorer 10/11 information disclosure
10374| [94418] Microsoft Internet Explorer 10/11 privilege escalation
10375| [93427] Microsoft Internet Explorer 10/11 memory corruption
10376| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
10377| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
10378| [92561] Microsoft Internet Explorer 10/11 privilege escalation
10379| [92560] Microsoft Internet Explorer 10/11 privilege escalation
10380| [92557] Microsoft Internet Explorer 10/11 memory corruption
10381| [91560] Microsoft Windows 10 Object denial of service
10382| [91517] Microsoft Internet Explorer 10/11 memory corruption
10383| [91516] Microsoft Internet Explorer 10/11 privilege escalation
10384| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
10385| [90683] Microsoft Internet Explorer 10/11 information disclosure
10386| [89020] Microsoft Internet Explorer 10/11 information disclosure
10387| [89010] Microsoft Internet Explorer 10/11 memory corruption
10388| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
10389| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
10390| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
10391| [87139] Microsoft Internet Explorer 10/11 information disclosure
10392| [82246] Microsoft Internet Explorer 10/11 memory corruption
10393| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
10394| [81271] Microsoft Windows 10 PDF Library memory corruption
10395| [81249] Microsoft Internet Explorer 10/11 memory corruption
10396| [81243] Microsoft Internet Explorer 10 memory corruption
10397| [80845] Microsoft Internet Explorer 10 memory corruption
10398| [80843] Microsoft Internet Explorer 10 memory corruption
10399| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
10400| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
10401| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
10402| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
10403| [79515] Microsoft Windows 10 Kernel memory corruption
10404| [79473] Microsoft Internet Explorer 10 memory corruption
10405| [79466] Microsoft Internet Explorer 10/11 memory corruption
10406| [79463] Microsoft Internet Explorer 10 memory corruption
10407| [79158] Microsoft Internet Explorer 10/11 memory corruption
10408| [79157] Microsoft Internet Explorer 10/11 memory corruption
10409| [79139] Microsoft Internet Explorer 10/11 memory corruption
10410| [78383] Microsoft Internet Explorer 10/11 privilege escalation
10411| [78382] Microsoft Internet Explorer 10 memory corruption
10412| [77643] Microsoft Internet Explorer 10/11 memory corruption
10413| [77597] Microsoft Internet Explorer 10/11 File denial of service
10414| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
10415| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
10416| [77005] Microsoft Internet Explorer 10/11 memory corruption
10417| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
10418| [76488] Microsoft Internet Explorer 10/11 File information disclosure
10419| [76487] Microsoft Internet Explorer 10/11 memory corruption
10420| [76475] Microsoft Internet Explorer 10/11 memory corruption
10421| [76436] Microsoft Internet Explorer 10/11 memory corruption
10422| [75781] Microsoft Internet Explorer 10/11 memory corruption
10423| [75777] Microsoft Internet Explorer 10 memory corruption
10424| [75767] Microsoft Internet Explorer 10/11 privilege escalation
10425| [75766] Microsoft Internet Explorer 10/11 memory corruption
10426| [75765] Microsoft Internet Explorer 10/11 memory corruption
10427| [75762] Microsoft Internet Explorer 10/11 memory corruption
10428| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
10429| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
10430| [75324] Microsoft Internet Explorer 10/11 memory corruption
10431| [74857] Microsoft Internet Explorer 10/11 memory corruption
10432| [73944] Microsoft Internet Explorer 10/11 memory corruption
10433| [73942] Microsoft Internet Explorer 10 memory corruption
10434| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
10435| [69144] Microsoft Internet Explorer 10/11 memory corruption
10436| [69141] Microsoft Internet Explorer 10/11 privilege escalation
10437| [69138] Microsoft Internet Explorer 10/11 memory corruption
10438| [69126] Microsoft Internet Explorer 10/11 memory corruption
10439| [69122] Microsoft Internet Explorer 10/11 memory corruption
10440| [69117] Microsoft Internet Explorer 10/11 memory corruption
10441| [69115] Microsoft Internet Explorer 10 memory corruption
10442| [69114] Microsoft Internet Explorer 10 memory corruption
10443| [68398] Microsoft Internet Explorer 10 memory corruption
10444| [68180] Microsoft Internet Explorer 10/11 privilege escalation
10445| [68179] Microsoft Internet Explorer 10/11 privilege escalation
10446| [68168] Microsoft Internet Explorer 10/11 memory corruption
10447| [67810] Microsoft Internet Explorer 10/11 memory corruption
10448| [67504] Microsoft Internet Explorer 10/11 memory corruption
10449| [67495] Microsoft Internet Explorer 10 memory corruption
10450| [67493] Microsoft Internet Explorer 10/11 memory corruption
10451| [67491] Microsoft Internet Explorer 10/11 memory corruption
10452| [67486] Microsoft Internet Explorer 10 memory corruption
10453| [67482] Microsoft Internet Explorer 10/11 memory corruption
10454| [67352] Microsoft Internet Explorer 10/11 memory corruption
10455| [67347] Microsoft Internet Explorer 10/11 memory corruption
10456| [67344] Microsoft Internet Explorer 10/11 memory corruption
10457| [67341] Microsoft Internet Explorer 10/11 memory corruption
10458| [67334] Microsoft Internet Explorer 10 memory corruption
10459| [67330] Microsoft Internet Explorer 10/11 memory corruption
10460| [67329] Microsoft Internet Explorer 10/11 memory corruption
10461| [67004] Microsoft Internet Explorer 10/11 memory corruption
10462| [13537] Microsoft Internet Explorer 10/11 memory corruption
10463| [13535] Microsoft Internet Explorer 10/11 memory corruption
10464| [13530] Microsoft Internet Explorer 10/11 memory corruption
10465| [13529] Microsoft Internet Explorer 10/11 memory corruption
10466| [13523] Microsoft Internet Explorer 10/11 memory corruption
10467| [13516] Microsoft Internet Explorer 10/11 memory corruption
10468| [13513] Microsoft Internet Explorer 10/11 memory corruption
10469| [13510] Microsoft Internet Explorer 10/11 memory corruption
10470| [13507] Microsoft Internet Explorer 10 memory corruption
10471| [13506] Microsoft Internet Explorer 10 memory corruption
10472| [13498] Microsoft Internet Explorer 10/11 memory corruption
10473| [13495] Microsoft Internet Explorer 10/11 information disclosure
10474| [13491] Microsoft Internet Explorer 10/11 memory corruption
10475| [12546] Microsoft Internet Explorer 10/11 memory corruption
10476| [12544] Microsoft Internet Explorer 10/11 memory corruption
10477| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
10478| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
10479| [11433] Microsoft Internet Explorer 10 memory corruption
10480| [10625] Microsoft Internet Explorer 10 memory corruption
10481| [10624] Microsoft Internet Explorer 10 memory corruption
10482| [10621] Microsoft Internet Explorer 10 memory corruption
10483| [10620] Microsoft Internet Explorer 10 memory corruption
10484| [10219] Microsoft Internet Explorer 10 memory corruption
10485| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
10486| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
10487| [9411] Microsoft Internet Explorer 10 memory corruption
10488| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
10489| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
10490| [9090] Microsoft Internet Explorer 10 memory corruption
10491| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
10492| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
10493| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
10494| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
10495| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
10496| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
10497| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
10498|
10499| MITRE CVE - https://cve.mitre.org:
10500| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
10501| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
10502| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
10503| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
10504| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
10505| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
10506| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10507| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10508| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10509| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10510| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10511| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
10512| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
10513| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
10514| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
10515| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
10516| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
10517| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
10518| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
10519| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
10520| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
10521| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
10522| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
10523| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
10524| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
10525| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
10526| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
10527| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
10528| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
10529| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
10530| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
10531| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
10532| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
10533| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
10534| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
10535| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
10536| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
10537| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
10538| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
10539| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
10540| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
10541| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
10542| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
10543| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
10544| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
10545| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
10546| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
10547| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
10548| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
10549| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
10550| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
10551| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
10552| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
10553| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
10554| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
10555| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
10556| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
10557| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
10558| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
10559| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
10560| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
10561| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
10562| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
10563| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
10564| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
10565| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
10566| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
10567| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
10568| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
10569| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
10570| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
10571| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
10572| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
10573| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
10574| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
10575| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
10576| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
10577| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
10578| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
10579| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
10580| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
10581| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
10582| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
10583| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
10584| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
10585| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
10586| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
10587| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
10588| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
10589| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
10590| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
10591| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
10592| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
10593| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
10594| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
10595| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
10596| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
10597| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
10598| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
10599| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
10600| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
10601| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
10602| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
10603| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
10604|
10605| SecurityFocus - https://www.securityfocus.com/bid/:
10606| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
10607|
10608| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10609| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
10610| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
10611|
10612| Exploit-DB - https://www.exploit-db.com:
10613| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
10614| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
10615|
10616| OpenVAS (Nessus) - http://www.openvas.org:
10617| [855384] Solaris Update for snmp/mibiisa 108870-36
10618| [855273] Solaris Update for snmp/mibiisa 108869-36
10619| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
10620|
10621| SecurityTracker - https://www.securitytracker.com:
10622| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
10623|
10624| OSVDB - http://www.osvdb.org:
10625| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
10626| [87262] Microsoft IIS FTP Command Injection Information Disclosure
10627| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
10628| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
10629| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
10630| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
10631| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
10632| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
10633| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
10634| [71856] Microsoft IIS Status Header Handling Remote Overflow
10635| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
10636| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
10637| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
10638| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
10639| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
10640| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
10641| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
10642| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
10643| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
10644| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
10645| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
10646| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
10647| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
10648| [59892] Microsoft IIS Malformed Host Header Remote DoS
10649| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
10650| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
10651| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
10652| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
10653| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
10654| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
10655| [55269] Microsoft IIS Traversal GET Request Remote DoS
10656| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
10657| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
10658| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
10659| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
10660| [52238] Microsoft IIS IDC Extension XSS
10661| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
10662| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
10663| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
10664| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
10665| [43451] Microsoft IIS HTTP Request Smuggling
10666| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
10667| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
10668| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
10669| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
10670| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
10671| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
10672| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
10673| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
10674| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
10675| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
10676| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
10677| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
10678| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
10679| [27152] Microsoft Windows IIS ASP Page Processing Overflow
10680| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
10681| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
10682| [21805] Microsoft IIS Crafted URL Remote DoS
10683| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
10684| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
10685| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
10686| [17124] Microsoft IIS Malformed WebDAV Request DoS
10687| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
10688| [17122] Microsoft IIS Permission Weakness .COM File Upload
10689| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
10690| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
10691| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
10692| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
10693| [13760] Microsoft IIS Malformed URL Request DoS
10694| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
10695| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
10696| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
10697| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
10698| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
10699| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
10700| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
10701| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
10702| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
10703| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
10704| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
10705| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
10706| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
10707| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
10708| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
10709| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
10710| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
10711| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
10712| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
10713| [11257] Microsoft IIS Malformed GET Request DoS
10714| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
10715| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
10716| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
10717| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
10718| [9200] Microsoft IIS Unspecified XSS Variant
10719| [9199] Microsoft IIS shtml.dll XSS
10720| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
10721| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
10722| [7737] Microsoft IIS ASP Redirection Function XSS
10723| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
10724| [5851] Microsoft IIS Single Dot Source Code Disclosure
10725| [5736] Microsoft IIS Relative Path System Privilege Escalation
10726| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
10727| [5633] Microsoft IIS Invalid WebDAV Request DoS
10728| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
10729| [5584] Microsoft IIS URL Redirection Malformed Length DoS
10730| [5566] Microsoft IIS Form_VBScript.asp XSS
10731| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
10732| [4864] Microsoft IIS TRACK Logging Failure
10733| [4863] Microsoft IIS Active Server Page Header DoS
10734| [4791] Microsoft IIS Response Object DoS
10735| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
10736| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
10737| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
10738| [3500] Microsoft IIS fpcount.exe Remote Overflow
10739| [3341] Microsoft IIS Redirect Response XSS
10740| [3339] Microsoft IIS HTTP Error Page XSS
10741| [3338] Microsoft IIS Help File XSS
10742| [3328] Microsoft IIS FTP Status Request DoS
10743| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
10744| [3325] Microsoft IIS HTR ISAPI Overflow
10745| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
10746| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
10747| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
10748| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
10749| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
10750| [3231] Microsoft IIS Log Bypass
10751| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
10752| [1931] Microsoft IIS MIME Content-Type Header DoS
10753| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
10754| [1826] Microsoft IIS Domain Guest Account Disclosure
10755| [1824] Microsoft IIS FTP DoS
10756| [1804] Microsoft IIS Long Request Parsing Remote DoS
10757| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
10758| [1750] Microsoft IIS File Fragment Disclosure
10759| [1543] Microsoft NT/IIS Invalid URL Request DoS
10760| [1504] Microsoft IIS File Permission Canonicalization Bypass
10761| [1465] Microsoft IIS .htr Missing Variable DoS
10762| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
10763| [1322] Microsoft IIS Malformed .htr Request DoS
10764| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
10765| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
10766| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
10767| [1170] Microsoft IIS Escape Character URL Access Bypass
10768| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
10769| [1082] Microsoft IIS Domain Resolution Access Bypass
10770| [1041] Microsoft IIS Malformed HTTP Request Header DoS
10771| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
10772| [930] Microsoft IIS Shared ASP Cache Information Disclosure
10773| [929] Microsoft IIS FTP Server NLST Command Overflow
10774| [928] Microsoft IIS Long Request Log Evasion
10775| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
10776| [814] Microsoft IIS global.asa Remote Information Disclosure
10777| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
10778| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
10779| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
10780| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
10781| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
10782| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
10783| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
10784| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
10785| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
10786| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
10787| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
10788| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
10789| [473] Microsoft IIS Multiple .cnf File Information Disclosure
10790| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
10791| [470] Microsoft IIS Form_JScript.asp XSS
10792| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
10793| [436] Microsoft IIS Unicode Remote Command Execution
10794| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
10795| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
10796| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
10797| [308] Microsoft IIS Malformed File Extension URL DoS
10798| [285] Microsoft IIS repost.asp File Upload
10799| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
10800| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
10801| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
10802| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
10803| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
10804| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
10805| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
10806| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
10807| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
10808| [98] Microsoft IIS perl.exe HTTP Path Disclosure
10809| [97] Microsoft IIS ISM.DLL HTR Request Overflow
10810| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
10811| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
10812| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
10813| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
10814| [2] Microsoft IIS ExAir search.asp Direct Request DoS
10815| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
10816| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
10817| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
10818| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
10819| [96192] Microsoft IE EUC-JP Character Encoding XSS
10820| [96191] Microsoft IE Process Integrity Level Assignment Bypass
10821| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
10822| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
10823| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
10824| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
10825| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
10826| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
10827| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
10828| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
10829| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
10830| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
10831| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
10832| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
10833| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
10834| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
10835| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
10836| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
10837| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
10838| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
10839| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
10840| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
10841| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
10842| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
10843| [94984] Microsoft IE Shift JIS Character Encoding XSS
10844| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
10845| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
10846| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
10847| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
10848| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
10849| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
10850| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
10851| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
10852| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
10853| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
10854| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
10855| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
10856| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
10857| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
10858| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
10859| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
10860| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
10861| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
10862| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
10863| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
10864| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
10865| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
10866| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
10867| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
10868| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
10869| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
10870| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
10871| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
10872| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
10873| [94507] Microsoft IE Infinite Loop DoS
10874| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
10875| [94127] Microsoft Office PNG File Handling Buffer Overflow
10876| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
10877| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
10878| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
10879| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
10880| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
10881| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
10882| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
10883| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
10884| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
10885| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
10886| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
10887| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
10888| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
10889| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
10890| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
10891| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
10892| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
10893| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
10894| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
10895| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
10896| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
10897| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
10898| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
10899| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
10900| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
10901| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
10902| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
10903| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
10904| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
10905| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
10906| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
10907| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
10908| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
10909| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
10910| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
10911| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
10912| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
10913| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
10914| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
10915| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
10916| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
10917| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
10918| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
10919| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
10920| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
10921| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
10922| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
10923| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
10924| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
10925| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
10926| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
10927| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
10928| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
10929| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
10930| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
10931| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
10932| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
10933| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
10934| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
10935| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
10936| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
10937| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
10938| [92257] Microsoft IE CSS Import Handling Remote DoS
10939| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
10940| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
10941| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
10942| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
10943| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
10944| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
10945| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
10946| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
10947| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
10948| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
10949| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
10950| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
10951| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
10952| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
10953| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
10954| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
10955| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
10956| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
10957| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
10958| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
10959| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
10960| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
10961| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
10962| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
10963| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
10964| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
10965| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
10966| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
10967| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
10968| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
10969| [91150] Microsoft SharePoint Unspecified XSS
10970| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
10971| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
10972| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
10973| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
10974| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
10975| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
10976| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
10977| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
10978| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
10979| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
10980| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
10981| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
10982| [90933] Microsoft IE Arbitrary HTM File Execution
10983| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
10984| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
10985| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
10986| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
10987| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
10988| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
10989| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
10990| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
10991| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
10992| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
10993| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
10994| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
10995| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
10996| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
10997| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
10998| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
10999| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
11000| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
11001| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
11002| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
11003| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
11004| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
11005| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
11006| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
11007| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
11008| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
11009| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
11010| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
11011| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
11012| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
11013| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
11014| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
11015| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
11016| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
11017| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
11018| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
11019| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
11020| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
11021| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
11022| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
11023| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
11024| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
11025| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
11026| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
11027| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
11028| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
11029| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
11030| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
11031| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
11032| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
11033| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
11034| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
11035| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
11036| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
11037| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
11038| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
11039| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
11040| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
11041| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
11042| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
11043| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
11044| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
11045| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
11046| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
11047| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
11048| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
11049| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
11050| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
11051| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
11052| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
11053| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
11054| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
11055| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
11056| [88837] Microsoft Office Excel Memory Corruption DoS
11057| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
11058| [88811] Microsoft Visio VSD File Parsing Memory Corruption
11059| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
11060| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
11061| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
11062| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
11063| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
11064| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
11065| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
11066| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
11067| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
11068| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
11069| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
11070| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
11071| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
11072| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
11073| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
11074| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
11075| [87819] Microsoft Office OneNote File Handling Memory Corruption
11076| [87273] Microsoft Office Excel XLS File Handling Overflow
11077| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
11078| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
11079| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
11080| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
11081| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
11082| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
11083| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
11084| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
11085| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
11086| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
11087| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
11088| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
11089| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
11090| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
11091| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
11092| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
11093| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
11094| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
11095| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
11096| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
11097| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
11098| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
11099| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
11100| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
11101| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
11102| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
11103| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
11104| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
11105| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
11106| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
11107| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
11108| [86732] Microsoft Office DOC File Handling Stack Overflow
11109| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
11110| [86622] Microsoft SQL Server Local Authentication Bypass
11111| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
11112| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
11113| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
11114| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
11115| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
11116| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
11117| [86057] Microsoft SQL Server Report Manager Unspecified XSS
11118| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
11119| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
11120| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
11121| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
11122| [85833] Microsoft Outlook Concealed Attachment Weakness
11123| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
11124| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
11125| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
11126| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
11127| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
11128| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
11129| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
11130| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
11131| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
11132| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
11133| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
11134| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
11135| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
11136| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
11137| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
11138| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
11139| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
11140| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
11141| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
11142| [84606] Microsoft Visio DXF File Handling Overflow
11143| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
11144| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
11145| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
11146| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
11147| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
11148| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
11149| [84599] Microsoft Windows Print Spooler Service Remote Format String
11150| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
11151| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
11152| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
11153| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
11154| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
11155| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
11156| [84553] Microsoft Help &
11157| [83860] Microsoft IE XML Data Handling Arbitrary File Access
11158| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
11159| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
11160| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
11161| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
11162| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
11163| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
11164| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
11165| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
11166| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
11167| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
11168| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
11169| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
11170| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
11171| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
11172| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
11173| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
11174| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
11175| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
11176| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
11177| [83647] Microsoft SharePoint Username Unspecified XSS
11178| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
11179| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
11180| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
11181| [83439] Microsoft IE Long Unicode String Handling DoS
11182| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
11183| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
11184| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
11185| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
11186| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
11187| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
11188| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
11189| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
11190| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
11191| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
11192| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
11193| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
11194| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
11195| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
11196| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
11197| [82862] Microsoft IE EUC-JP Character Encoding XSS
11198| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
11199| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
11200| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
11201| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
11202| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
11203| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
11204| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
11205| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
11206| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
11207| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
11208| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
11209| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
11210| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
11211| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
11212| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
11213| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
11214| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
11215| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
11216| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
11217| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
11218| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
11219| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
11220| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
11221| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
11222| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
11223| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
11224| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
11225| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
11226| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
11227| [81732] Microsoft Office RTF Data Handling Memory Corruption
11228| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
11229| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
11230| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
11231| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
11232| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
11233| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
11234| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
11235| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
11236| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
11237| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
11238| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
11239| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
11240| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
11241| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
11242| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
11243| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
11244| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
11245| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
11246| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
11247| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
11248| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
11249| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
11250| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
11251| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
11252| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
11253| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
11254| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
11255| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
11256| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
11257| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
11258| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
11259| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
11260| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
11261| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
11262| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
11263| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
11264| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
11265| [80173] Microsoft IE Unspecified Overflow
11266| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
11267| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
11268| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
11269| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
11270| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
11271| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
11272| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
11273| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
11274| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
11275| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
11276| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
11277| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
11278| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
11279| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
11280| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
11281| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
11282| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
11283| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
11284| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
11285| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
11286| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
11287| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
11288| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
11289| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
11290| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
11291| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
11292| [79192] Microsoft IE Javascript Dialog Origin Spoofing
11293| [79186] Microsoft IE onunload Location Field Overwrite
11294| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
11295| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
11296| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
11297| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
11298| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
11299| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
11300| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
11301| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
11302| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
11303| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
11304| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
11305| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
11306| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
11307| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
11308| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
11309| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
11310| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
11311| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
11312| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
11313| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
11314| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
11315| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
11316| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
11317| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
11318| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
11319| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
11320| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
11321| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
11322| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
11323| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
11324| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
11325| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
11326| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
11327| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
11328| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
11329| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
11330| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
11331| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
11332| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
11333| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
11334| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
11335| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
11336| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
11337| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
11338| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
11339| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
11340| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
11341| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
11342| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
11343| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
11344| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
11345| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
11346| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
11347| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
11348| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
11349| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
11350| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
11351| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
11352| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
11353| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
11354| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
11355| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
11356| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
11357| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
11358| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
11359| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
11360| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
11361| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
11362| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
11363| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
11364| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
11365| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
11366| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
11367| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
11368| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
11369| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
11370| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
11371| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
11372| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
11373| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
11374| [75393] Microsoft SharePoint Unspecified URI XSS
11375| [75391] Microsoft SharePoint Contact Details XSS
11376| [75390] Microsoft SharePoint EditForm.aspx XSS
11377| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
11378| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
11379| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
11380| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
11381| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
11382| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
11383| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
11384| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
11385| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
11386| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
11387| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
11388| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
11389| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
11390| [75250] Microsoft IE Unspecified Remote Code Execution
11391| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
11392| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
11393| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
11394| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
11395| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
11396| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
11397| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
11398| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
11399| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
11400| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
11401| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
11402| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
11403| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
11404| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
11405| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
11406| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
11407| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
11408| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
11409| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
11410| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
11411| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
11412| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
11413| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
11414| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
11415| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
11416| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
11417| [74396] Microsoft Report Viewer Control Unspecified XSS
11418| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
11419| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
11420| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
11421| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
11422| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
11423| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
11424| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
11425| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
11426| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
11427| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
11428| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
11429| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
11430| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
11431| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
11432| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
11433| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
11434| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
11435| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
11436| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
11437| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
11438| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
11439| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
11440| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
11441| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
11442| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
11443| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
11444| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
11445| [73602] Microsoft Windows nsiproxy.sys Local DoS
11446| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
11447| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
11448| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
11449| [72960] Microsoft SMB Client Response Handling Remote Code Execution
11450| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
11451| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
11452| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
11453| [72953] Microsoft IE MIME Sniffing Information Disclosure
11454| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
11455| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
11456| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
11457| [72949] Microsoft IE Drag and Drop Information Disclosure
11458| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
11459| [72947] Microsoft IE Time Element Memory Corruption
11460| [72946] Microsoft IE Drag and Drop Memory Corruption
11461| [72944] Microsoft IE SafeHTML Function XSS
11462| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
11463| [72942] Microsoft IE Link Properties Handling Memory Corruption
11464| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
11465| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
11466| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
11467| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
11468| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
11469| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
11470| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
11471| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
11472| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
11473| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
11474| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
11475| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
11476| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
11477| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
11478| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
11479| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
11480| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
11481| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
11482| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
11483| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
11484| [72696] Microsoft Reader AOLL Chunk Array Overflow
11485| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
11486| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
11487| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
11488| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
11489| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
11490| [72680] Microsoft IE UTF-7 Local Redirection XSS
11491| [72679] Microsoft IE Tags javascript:[jscodz] XSS
11492| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
11493| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
11494| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
11495| [72672] Microsoft Windows AppFix systest.sdb Local DoS
11496| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
11497| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
11498| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
11499| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
11500| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
11501| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
11502| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
11503| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
11504| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
11505| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
11506| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
11507| [71777] Microsoft IE Frame Tag Handling Information Disclosure
11508| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
11509| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
11510| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
11511| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
11512| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
11513| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
11514| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
11515| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
11516| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
11517| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
11518| [71765] Microsoft Office Excel File Validation Record Handling Overflow
11519| [71761] Microsoft Office Excel File Handling Memory Corruption
11520| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
11521| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
11522| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
11523| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
11524| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
11525| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
11526| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
11527| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
11528| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
11529| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
11530| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
11531| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
11532| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
11533| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
11534| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
11535| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
11536| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
11537| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
11538| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
11539| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
11540| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
11541| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
11542| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
11543| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
11544| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
11545| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
11546| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
11547| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
11548| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
11549| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
11550| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
11551| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
11552| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
11553| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
11554| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
11555| [71724] Microsoft IE Layouts Handling Memory Corruption
11556| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
11557| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
11558| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
11559| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
11560| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
11561| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
11562| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
11563| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
11564| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
11565| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
11566| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
11567| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
11568| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
11569| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
11570| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
11571| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
11572| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
11573| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
11574| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
11575| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
11576| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
11577| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
11578| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
11579| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
11580| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
11581| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
11582| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
11583| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
11584| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
11585| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
11586| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
11587| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
11588| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
11589| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
11590| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
11591| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
11592| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
11593| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
11594| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
11595| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
11596| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
11597| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
11598| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
11599| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
11600| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
11601| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
11602| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
11603| [69828] Microsoft IE Recursive Select Element Remote Code Execution
11604| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
11605| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
11606| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
11607| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
11608| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
11609| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
11610| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
11611| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
11612| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
11613| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
11614| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
11615| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
11616| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
11617| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
11618| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
11619| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
11620| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
11621| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
11622| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
11623| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
11624| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
11625| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
11626| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
11627| [69804] Microsoft Office PICT Image Converter Overflow
11628| [69803] Microsoft Office CGM Image Converter Overflow
11629| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
11630| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
11631| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
11632| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
11633| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
11634| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
11635| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
11636| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
11637| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
11638| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
11639| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
11640| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
11641| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
11642| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
11643| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
11644| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
11645| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
11646| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
11647| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
11648| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
11649| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
11650| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
11651| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
11652| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
11653| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
11654| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
11655| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
11656| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
11657| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
11658| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
11659| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
11660| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
11661| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
11662| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
11663| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
11664| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
11665| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
11666| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
11667| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
11668| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
11669| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
11670| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
11671| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
11672| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
11673| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
11674| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
11675| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
11676| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
11677| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
11678| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
11679| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
11680| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
11681| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
11682| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
11683| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
11684| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
11685| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
11686| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
11687| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
11688| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
11689| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
11690| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
11691| [68548] Microsoft IE / SharePoint Unspecified XSS
11692| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
11693| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
11694| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
11695| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
11696| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
11697| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
11698| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
11699| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
11700| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
11701| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
11702| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
11703| [68438] Microsoft XSS Filter Library Bypass
11704| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
11705| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
11706| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
11707| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
11708| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
11709| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
11710| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
11711| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
11712| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
11713| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
11714| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
11715| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
11716| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
11717| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
11718| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
11719| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
11720| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
11721| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
11722| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
11723| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
11724| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
11725| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
11726| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
11727| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
11728| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
11729| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
11730| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
11731| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
11732| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
11733| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
11734| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
11735| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
11736| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
11737| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
11738| [67463] Microsoft IE location.replace Address Bar Spoofing
11739| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
11740| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
11741| [67258] Microsoft ClickOnce MITM Weakness
11742| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
11743| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
11744| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
11745| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
11746| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
11747| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
11748| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
11749| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
11750| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
11751| [67000] Microsoft IE boundElements Property Handling Memory Corruption
11752| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
11753| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
11754| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
11755| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
11756| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
11757| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
11758| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
11759| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
11760| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
11761| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
11762| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
11763| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
11764| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
11765| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
11766| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
11767| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
11768| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
11769| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
11770| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
11771| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
11772| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
11773| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
11774| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
11775| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
11776| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
11777| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
11778| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
11779| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
11780| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
11781| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
11782| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
11783| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
11784| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
11785| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
11786| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
11787| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
11788| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
11789| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
11790| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
11791| [65502] Microsoft IE Unspecified DoS
11792| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
11793| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
11794| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
11795| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
11796| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
11797| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
11798| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
11799| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
11800| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
11801| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
11802| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
11803| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
11804| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
11805| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
11806| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
11807| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
11808| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
11809| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
11810| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
11811| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
11812| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
11813| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
11814| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
11815| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
11816| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
11817| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
11818| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
11819| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
11820| [65213] Microsoft IE HTML Element Handling Memory Corruption
11821| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
11822| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
11823| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
11824| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
11825| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
11826| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
11827| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
11828| [64952] Microsoft IE img Tag Hijacking Weakness
11829| [64944] Microsoft Dynamics GP Default System Password
11830| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
11831| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
11832| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
11833| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
11834| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
11835| [64828] Microsoft IE history go ActiveX Overflow DoS
11836| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
11837| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
11838| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
11839| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
11840| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
11841| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
11842| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
11843| [64533] Microsoft IE document.createElement NULL Dereference DoS
11844| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
11845| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
11846| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
11847| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
11848| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
11849| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
11850| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
11851| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
11852| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
11853| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
11854| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
11855| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
11856| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
11857| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
11858| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
11859| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
11860| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
11861| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
11862| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
11863| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
11864| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
11865| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
11866| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
11867| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
11868| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
11869| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
11870| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
11871| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
11872| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
11873| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
11874| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
11875| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
11876| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
11877| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
11878| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
11879| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
11880| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
11881| [63334] Microsoft IE Post Encoding Information Disclosure
11882| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
11883| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
11884| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
11885| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
11886| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
11887| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
11888| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
11889| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
11890| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
11891| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
11892| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
11893| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
11894| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
11895| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
11896| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
11897| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
11898| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
11899| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
11900| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
11901| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
11902| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
11903| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
11904| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
11905| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
11906| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
11907| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
11908| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
11909| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
11910| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
11911| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
11912| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
11913| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
11914| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
11915| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
11916| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
11917| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
11918| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
11919| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
11920| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
11921| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
11922| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
11923| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
11924| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
11925| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
11926| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
11927| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
11928| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
11929| [62239] Microsoft Office Powerpoint File Path Handling Overflow
11930| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
11931| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
11932| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
11933| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
11934| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
11935| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
11936| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
11937| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
11938| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
11939| [61911] Microsoft IE Table Layout Reuse Memory Corruption
11940| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
11941| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
11942| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
11943| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
11944| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
11945| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
11946| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
11947| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
11948| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
11949| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
11950| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
11951| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
11952| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
11953| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
11954| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
11955| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
11956| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
11957| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
11958| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
11959| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
11960| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
11961| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
11962| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
11963| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
11964| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
11965| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
11966| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
11967| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
11968| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
11969| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
11970| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
11971| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
11972| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
11973| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
11974| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
11975| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
11976| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
11977| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
11978| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
11979| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
11980| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
11981| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
11982| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
11983| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
11984| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
11985| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
11986| [59957] Microsoft Windows SMB Response Handling Remote DoS
11987| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
11988| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
11989| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
11990| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
11991| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
11992| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
11993| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
11994| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
11995| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
11996| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
11997| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
11998| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
11999| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
12000| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
12001| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
12002| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
12003| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
12004| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
12005| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
12006| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
12007| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
12008| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
12009| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
12010| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
12011| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
12012| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
12013| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
12014| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
12015| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
12016| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
12017| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
12018| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
12019| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
12020| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
12021| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
12022| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
12023| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
12024| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
12025| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
12026| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
12027| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
12028| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
12029| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
12030| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
12031| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
12032| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
12033| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
12034| [59263] Microsoft IE IMG Tag width Handling DoS
12035| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
12036| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
12037| [59258] Microsoft Exchange ACL Modification Update Weakness
12038| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
12039| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
12040| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
12041| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
12042| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
12043| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
12044| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
12045| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
12046| [58870] Microsoft Office BMP Image Color Processing Overflow
12047| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
12048| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
12049| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
12050| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
12051| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
12052| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
12053| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
12054| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
12055| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
12056| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
12057| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
12058| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
12059| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
12060| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
12061| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
12062| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
12063| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
12064| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
12065| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
12066| [58843] Microsoft Windows Media Player ASF Handling Overflow
12067| [58817] Microsoft IE Nested marquee Tag Handling DoS
12068| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
12069| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
12070| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
12071| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
12072| [58399] Microsoft IE window.print Function Loop Remote DoS
12073| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
12074| [58350] Microsoft Patterns &
12075| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
12076| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
12077| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
12078| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
12079| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
12080| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
12081| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
12082| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
12083| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
12084| [57742] Microsoft SQL Cleartext User Passwords Disclosure
12085| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
12086| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
12087| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
12088| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
12089| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
12090| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
12091| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
12092| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
12093| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
12094| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
12095| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
12096| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
12097| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
12098| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
12099| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
12100| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
12101| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
12102| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
12103| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
12104| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
12105| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
12106| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
12107| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
12108| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
12109| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
12110| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
12111| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
12112| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
12113| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
12114| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
12115| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
12116| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
12117| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
12118| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
12119| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
12120| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
12121| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
12122| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
12123| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
12124| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
12125| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
12126| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
12127| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
12128| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
12129| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
12130| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
12131| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
12132| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
12133| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
12134| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
12135| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
12136| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
12137| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
12138| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
12139| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
12140| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
12141| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
12142| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
12143| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
12144| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
12145| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
12146| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
12147| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
12148| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
12149| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
12150| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
12151| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
12152| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
12153| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
12154| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
12155| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
12156| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
12157| [54955] Microsoft Office Excel Malformed Records Handling Overflow
12158| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
12159| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
12160| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
12161| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
12162| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
12163| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
12164| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
12165| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
12166| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
12167| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
12168| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
12169| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
12170| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
12171| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
12172| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
12173| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
12174| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
12175| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
12176| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
12177| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
12178| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
12179| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
12180| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
12181| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
12182| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
12183| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
12184| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
12185| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
12186| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
12187| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
12188| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
12189| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
12190| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
12191| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
12192| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
12193| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
12194| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
12195| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
12196| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
12197| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
12198| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
12199| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
12200| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
12201| [54183] Microsoft IE Unprintable Character Document Handling DoS
12202| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
12203| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
12204| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
12205| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
12206| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
12207| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
12208| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
12209| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
12210| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
12211| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
12212| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
12213| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
12214| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
12215| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
12216| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
12217| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
12218| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
12219| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
12220| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
12221| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
12222| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
12223| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
12224| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
12225| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
12226| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
12227| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
12228| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
12229| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
12230| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
12231| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
12232| [52694] Microsoft Windows Media Player Malformed GET Request DoS
12233| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
12234| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
12235| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
12236| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
12237| [52689] Microsoft Word Document Handling HTML Object Tag DoS
12238| [52688] Microsoft Word Document Handling HTML Object Tag XSS
12239| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
12240| [52685] Microsoft Windows FTP Client Multiple Command Overflows
12241| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
12242| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
12243| [52682] Microsoft Windows Explorer ZIP Handler DoS
12244| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
12245| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
12246| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
12247| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
12248| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
12249| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
12250| [52666] Microsoft IE Malformed file:// URI Handling DoS
12251| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
12252| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
12253| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
12254| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
12255| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
12256| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
12257| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
12258| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
12259| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
12260| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
12261| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
12262| [52517] Microsoft Windows DNS Server Query Validation Spoofing
12263| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
12264| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
12265| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
12266| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
12267| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
12268| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
12269| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
12270| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
12271| [51433] Microsoft Windows Crafted CHM File Handling Overflow
12272| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
12273| [51277] Microsoft Excel HTML Tag Interpretation XSS
12274| [51259] Microsoft IE onload=screen["
12275| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
12276| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
12277| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
12278| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
12279| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
12280| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
12281| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
12282| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
12283| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
12284| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
12285| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
12286| [50598] Microsoft Office Word Table Property Handling Overflow
12287| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
12288| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
12289| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
12290| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
12291| [50592] Microsoft Office Word Malformed Value Memory Corruption
12292| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
12293| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
12294| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
12295| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
12296| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
12297| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
12298| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
12299| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
12300| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
12301| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
12302| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
12303| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
12304| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
12305| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
12306| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
12307| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
12308| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
12309| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
12310| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
12311| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
12312| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
12313| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
12314| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
12315| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
12316| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
12317| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
12318| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
12319| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
12320| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
12321| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
12322| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
12323| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
12324| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
12325| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
12326| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
12327| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
12328| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
12329| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
12330| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
12331| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
12332| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
12333| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
12334| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
12335| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
12336| [49385] Microsoft ASP.NET Request Validation <
12337| [49384] Microsoft ASP.NET Request Validation <
12338| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
12339| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
12340| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
12341| [49118] Microsoft IE HTML Object Handling Memory Corruption
12342| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
12343| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
12344| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
12345| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
12346| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
12347| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
12348| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
12349| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
12350| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
12351| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
12352| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
12353| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
12354| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
12355| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
12356| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
12357| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
12358| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
12359| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
12360| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
12361| [48837] Microsoft Windows Vista Page Fault Handling DoS
12362| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
12363| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
12364| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
12365| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
12366| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
12367| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
12368| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
12369| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
12370| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
12371| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
12372| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
12373| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
12374| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
12375| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
12376| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
12377| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
12378| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
12379| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
12380| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
12381| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
12382| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
12383| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
12384| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
12385| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
12386| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
12387| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
12388| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
12389| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
12390| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
12391| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
12392| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
12393| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
12394| [47410] Microsoft Office Excel connections.xml Password String Persistence
12395| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
12396| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
12397| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
12398| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
12399| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
12400| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
12401| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
12402| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
12403| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
12404| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
12405| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
12406| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
12407| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
12408| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
12409| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
12410| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
12411| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
12412| [46935] Microsoft IE Pop Up Blocker Multiple Issues
12413| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
12414| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
12415| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
12416| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
12417| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
12418| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
12419| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
12420| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
12421| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
12422| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
12423| [46772] Microsoft SQL Server Convert Function Overflow
12424| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
12425| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
12426| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
12427| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
12428| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
12429| [46630] Microsoft IE location Window Object Handling XSS
12430| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
12431| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
12432| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
12433| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
12434| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
12435| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
12436| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
12437| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
12438| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
12439| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
12440| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
12441| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
12442| [45826] Microsoft IE Local Zone Saved File URI XSS
12443| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
12444| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
12445| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
12446| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
12447| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
12448| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
12449| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
12450| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
12451| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
12452| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
12453| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
12454| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
12455| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
12456| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
12457| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
12458| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
12459| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
12460| [45262] Microsoft ISA Server Host Header Log File Content Injection
12461| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
12462| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
12463| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
12464| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
12465| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
12466| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
12467| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
12468| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
12469| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
12470| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
12471| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
12472| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
12473| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
12474| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
12475| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
12476| [44979] Microsoft SQL Server Blank sa Password Set Weakness
12477| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
12478| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
12479| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
12480| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
12481| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
12482| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
12483| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
12484| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
12485| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
12486| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
12487| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
12488| [44303] Microsoft IE body Tag Infinite Loop DoS
12489| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
12490| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
12491| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
12492| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
12493| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
12494| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
12495| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
12496| [44205] Microsoft IE Data Stream Handling Memory Corruption
12497| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
12498| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
12499| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
12500| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
12501| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
12502| [44150] Microsoft Access Crafted MDB File Handling Overflow
12503| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
12504| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
12505| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
12506| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
12507| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
12508| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
12509| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
12510| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
12511| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
12512| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
12513| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
12514| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
12515| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
12516| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
12517| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
12518| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
12519| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
12520| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
12521| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
12522| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
12523| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
12524| [42724] Microsoft Excel Style Record Handling Memory Corruption
12525| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
12526| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
12527| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
12528| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
12529| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
12530| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
12531| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
12532| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
12533| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
12534| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
12535| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
12536| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
12537| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
12538| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
12539| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
12540| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
12541| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
12542| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
12543| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
12544| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
12545| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
12546| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
12547| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
12548| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
12549| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
12550| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
12551| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
12552| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
12553| [41155] Microsoft Windows Hardware-enforced DEP Bypass
12554| [41154] Microsoft Windows XP EFS Cleartext Password Storage
12555| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
12556| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
12557| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
12558| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
12559| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
12560| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
12561| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
12562| [41060] Microsoft .NET Unspecified XSS Filter Bypass
12563| [41059] Microsoft Windows ARP Saturation Remote DoS
12564| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
12565| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
12566| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
12567| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
12568| [41041] Microsoft IE Mouse Click self.resizeTo DoS
12569| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
12570| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
12571| [41035] Microsoft IE onload Localhost DoS
12572| [41026] Microsoft IE GET Request Overflow
12573| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
12574| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
12575| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
12576| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
12577| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
12578| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
12579| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
12580| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
12581| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
12582| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
12583| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
12584| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
12585| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
12586| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
12587| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
12588| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
12589| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
12590| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
12591| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
12592| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
12593| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
12594| [39121] Microsoft IE DHTML Object Memory Corruption
12595| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
12596| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
12597| [39118] Microsoft IE Object setExpression Function Memory Corruption
12598| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
12599| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
12600| [38955] Microsoft IE history.length Variable History Disclosure
12601| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
12602| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
12603| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
12604| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
12605| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
12606| [38495] Microsoft IE Outlook Express Address Book Activex DoS
12607| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
12608| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
12609| [38488] Microsoft ISA Server File Extension Filter Bypass
12610| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
12611| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
12612| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
12613| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
12614| [38212] Microsoft IE document.open() Function Address Bar Spoofing
12615| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
12616| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
12617| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
12618| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
12619| [37637] Microsoft Windows Crafted HLP File Overflow
12620| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
12621| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
12622| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
12623| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
12624| [37632] Microsoft Word Unspecified Memory Corruption
12625| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
12626| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
12627| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
12628| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
12629| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
12630| [37626] Microsoft IE Unspecified Address Bar Spoofing
12631| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
12632| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
12633| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
12634| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
12635| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
12636| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
12637| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
12638| [36936] Microsoft Visual Basic VBP File Handling Overflow
12639| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
12640| [36934] Microsoft Agent URL Handling Remote Code Execution
12641| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
12642| [36400] Microsoft IE HTML FTP Credential Disclosure
12643| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
12644| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
12645| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
12646| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
12647| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
12648| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
12649| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
12650| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
12651| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
12652| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
12653| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
12654| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
12655| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
12656| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
12657| [36385] Microsoft Windows Media Player Skin File Handling Overflow
12658| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
12659| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
12660| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
12661| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
12662| [36147] Microsoft IE Zone Domain Specification DoS
12663| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
12664| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
12665| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
12666| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
12667| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
12668| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
12669| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
12670| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
12671| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
12672| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
12673| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
12674| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
12675| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
12676| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
12677| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
12678| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
12679| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
12680| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
12681| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
12682| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
12683| [35637] Microsoft Windows Unspecified Remote Code Execution
12684| [35568] Microsoft IE Script Variable Length DoS
12685| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
12686| [35352] Microsoft IE navcancl.htm res: URI Phishing
12687| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
12688| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
12689| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
12690| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
12691| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
12692| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
12693| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
12694| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
12695| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
12696| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
12697| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
12698| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
12699| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
12700| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
12701| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
12702| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
12703| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
12704| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
12705| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
12706| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
12707| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
12708| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
12709| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
12710| [34401] Microsoft IE Property Method Handling Memory Corruption
12711| [34400] Microsoft IE Uninitialized Object Memory Corruption
12712| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
12713| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
12714| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
12715| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
12716| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
12717| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
12718| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
12719| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
12720| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
12721| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
12722| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
12723| [34387] Microsoft Word Data Array Handling Remote Code Execution
12724| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
12725| [34385] Microsoft Word Macro Content Arbitrary Code Execution
12726| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
12727| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
12728| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
12729| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
12730| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
12731| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
12732| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
12733| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
12734| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
12735| [34077] Microsoft IE navcancl.htm res: URI XSS
12736| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
12737| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
12738| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
12739| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
12740| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
12741| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
12742| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
12743| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
12744| [33667] Microsoft Windows Vista Persistent Established Teredo Address
12745| [33666] Microsoft Windows Vista Teredo nonce Spoofing
12746| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
12747| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
12748| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
12749| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
12750| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
12751| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
12752| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
12753| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
12754| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
12755| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
12756| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
12757| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
12758| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
12759| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
12760| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
12761| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
12762| [33271] Microsoft Word Crafted Frame CSRF
12763| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
12764| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
12765| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
12766| [32630] Microsoft IE Key Press Event Focus Redirection
12767| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
12768| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
12769| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
12770| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
12771| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
12772| [32624] Microsoft IE mhtml Overflow DoS
12773| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
12774| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
12775| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
12776| [32087] Microsoft IE onunload Event Address Bar Spoofing
12777| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
12778| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
12779| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
12780| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
12781| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
12782| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
12783| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
12784| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
12785| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
12786| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
12787| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
12788| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
12789| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
12790| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
12791| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
12792| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
12793| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
12794| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
12795| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
12796| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
12797| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
12798| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
12799| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
12800| [31645] Microsoft Windows DNS Recursive Query DoS
12801| [31333] Microsoft IE Image File Embedded Content XSS
12802| [31332] Microsoft IE Scrollbar CSS Property DoS
12803| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
12804| [31330] Microsoft IE File:// URI src Tag IFrame DoS
12805| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
12806| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
12807| [31326] Microsoft IE HTML Table Tag style Attribute DoS
12808| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
12809| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
12810| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
12811| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
12812| [31321] Microsoft IE Javascript self.location Refresh DoS
12813| [31258] Microsoft Excel Palette Record Handling Overflow
12814| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
12815| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
12816| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
12817| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
12818| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
12819| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
12820| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
12821| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
12822| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
12823| [30997] Microsoft Windows .manifest File Handling Local DoS
12824| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
12825| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
12826| [30826] Microsoft Visual Basic Click Event Procedure Overflow
12827| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
12828| [30824] Microsoft Word Malformed String Memory Corruption
12829| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
12830| [30822] Microsoft IE A Tag Long Title Attribute DoS
12831| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
12832| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
12833| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
12834| [30818] Microsoft Windows Media Player ASF Parsing Overflow
12835| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
12836| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
12837| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
12838| [30814] Microsoft IE DHTML Script Function Memory Corruption
12839| [30813] Microsoft IE Script Error Handling Memory Corruption
12840| [30811] Microsoft Windows SNMP Service Remote Overflow
12841| [30405] Microsoft Windows Active Directory Unspecified DoS
12842| [30402] Microsoft w3wp Crafted COM Component Request DoS
12843| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
12844| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
12845| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
12846| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
12847| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
12848| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
12849| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
12850| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
12851| [30087] Microsoft IE Empty APPLET Tag DoS
12852| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
12853| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
12854| [29720] Microsoft PowerPoint Unspecified Code Execution
12855| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
12856| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
12857| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
12858| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
12859| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
12860| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
12861| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
12862| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
12863| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
12864| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
12865| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
12866| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
12867| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
12868| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
12869| [29440] Microsoft Word memmove Integer Overflow
12870| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
12871| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
12872| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
12873| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
12874| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
12875| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
12876| [29426] Microsoft XML Core Services XSLT Processing Overflow
12877| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
12878| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
12879| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
12880| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
12881| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
12882| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
12883| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
12884| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
12885| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
12886| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
12887| [29129] Microsoft IE wininet.dll Content-Type DoS
12888| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
12889| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
12890| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
12891| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
12892| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
12893| [28730] Microsoft Publisher PUB File Font Parsing Overflow
12894| [28729] Microsoft Windows Indexing Service Unspecified XSS
12895| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
12896| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
12897| [28723] Microsoft Works Malformed Works Spreadsheet DoS
12898| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
12899| [28614] Microsoft IE input/div Tag width Conflict DoS
12900| [28539] Microsoft Word 2000 Unspecified Code Execution
12901| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
12902| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
12903| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
12904| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
12905| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
12906| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
12907| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
12908| [28381] Microsoft IE ActiveX SaveFile Handling DoS
12909| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
12910| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
12911| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
12912| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
12913| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
12914| [27854] Microsoft IE Chained CSS Imports Memory Corruption
12915| [27853] Microsoft IE HTML Rendering Memory Corruption
12916| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
12917| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
12918| [27850] Microsoft IE Cross Site Window Location Information Disclosure
12919| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
12920| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
12921| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
12922| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
12923| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
12924| [27844] Microsoft Windows DNS Client Service Record Response Overflow
12925| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
12926| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
12927| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
12928| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
12929| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
12930| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
12931| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
12932| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
12933| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
12934| [27373] Microsoft IE Native Function Iteration NULL Dereference
12935| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
12936| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
12937| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
12938| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
12939| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
12940| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
12941| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
12942| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
12943| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
12944| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
12945| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
12946| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
12947| [27150] Microsoft Office MSO.DLL String Processing Overflow
12948| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
12949| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
12950| [27147] Microsoft Office PNG Processing Unspecified Code Execution
12951| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
12952| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
12953| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
12954| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
12955| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
12956| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
12957| [27059] Microsoft IE FolderItem Object NULL Dereference
12958| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
12959| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
12960| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
12961| [27053] Microsoft Excel Asian Language Style Option Overflow
12962| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
12963| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
12964| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
12965| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
12966| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
12967| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
12968| [26837] Microsoft IE Frameset inside Table NULL Dereference
12969| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
12970| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
12971| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
12972| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
12973| [26527] Microsoft Excel Malformed URL String Handling Overflow
12974| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
12975| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
12976| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
12977| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
12978| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
12979| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
12980| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
12981| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
12982| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
12983| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
12984| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
12985| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
12986| [26434] Microsoft JScript Object Release Memory Corruption
12987| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
12988| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
12989| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
12990| [26430] Microsoft Windows Media Player PNG Processing Overflow
12991| [26193] Microsoft NetMeeting Unspecified Remote DoS
12992| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
12993| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
12994| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
12995| [25635] Microsoft Word Unspecified Code Execution
12996| [25501] Microsoft Windows itss.dll CHM Processing Overflow
12997| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
12998| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
12999| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
13000| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
13001| [25003] Microsoft Office mailto: Arbitrary File Access
13002| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
13003| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
13004| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
13005| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
13006| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
13007| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
13008| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
13009| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
13010| [24542] Microsoft IE Unspecified Address Bar Spoofing
13011| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
13012| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
13013| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
13014| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
13015| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
13016| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
13017| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
13018| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
13019| [24208] Microsoft .NET Framework ILDASM Overflow
13020| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
13021| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
13022| [24095] Microsoft IE Arbitrary HTA File Execution
13023| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
13024| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
13025| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
13026| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
13027| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
13028| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
13029| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
13030| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
13031| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
13032| [23657] Microsoft IE ActiveX Killbit Setting Bypass
13033| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
13034| [23608] Microsoft IE Iframe Folder Delete Weakness
13035| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
13036| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
13037| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
13038| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
13039| [23307] Microsoft IE window.status Memory Leak DoS
13040| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
13041| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
13042| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
13043| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
13044| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
13045| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
13046| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
13047| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
13048| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
13049| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
13050| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
13051| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
13052| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
13053| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
13054| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
13055| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
13056| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
13057| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
13058| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
13059| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
13060| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
13061| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
13062| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
13063| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
13064| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
13065| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
13066| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
13067| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
13068| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
13069| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
13070| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
13071| [22354] Microsoft IE Malformed table datasrc Tag DoS
13072| [22351] Microsoft IE Modal Security Dialog Race Condition
13073| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
13074| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
13075| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
13076| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
13077| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
13078| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
13079| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
13080| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
13081| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
13082| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
13083| [21562] Microsoft IE CSS Crafted p Element DoS
13084| [21536] Microsoft Windows backup File Name Extension Overflow
13085| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
13086| [21510] Microsoft Windows SynAttackProtect Bypass
13087| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
13088| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
13089| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
13090| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
13091| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
13092| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
13093| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
13094| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
13095| [20497] Microsoft Windows 98SE User32.dll Icon DoS
13096| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
13097| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
13098| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
13099| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
13100| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
13101| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
13102| [20271] Microsoft IE settimeout Function Recursion DoS
13103| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
13104| [20248] Microsoft IE Embedded Content Processing XSS
13105| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
13106| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
13107| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
13108| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
13109| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
13110| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
13111| [20199] Microsoft IE Image Saturation Handling DoS
13112| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
13113| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
13114| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
13115| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
13116| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
13117| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
13118| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
13119| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
13120| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
13121| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
13122| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
13123| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
13124| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
13125| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
13126| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
13127| [19905] Microsoft Collaboration Data Objects Remote Overflow
13128| [19904] Microsoft Windows DTC Packet Relay DoS
13129| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
13130| [19902] Microsoft Windows COM+ Remote Code Execution
13131| [19901] Microsoft Windows FTP Client Arbitrary File Write
13132| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
13133| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
13134| [19898] Microsoft Windows Web View Arbitrary Script Injection
13135| [19876] Microsoft AntiSpyware Registry Extension Bypass
13136| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
13137| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
13138| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
13139| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
13140| [19796] Microsoft IE Malformed IFRAME File Source DoS
13141| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
13142| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
13143| [19662] Microsoft IE XMLHTTP HTTP Request Injection
13144| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
13145| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
13146| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
13147| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
13148| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
13149| [19089] Microsoft IE Unspecified Remote Code Execution
13150| [19029] Microsoft IE Meta Refresh Parsing Weakness
13151| [19024] Microsoft IE Automatic MIME Detection Weakness
13152| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
13153| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
13154| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
13155| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
13156| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
13157| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
13158| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
13159| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
13160| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
13161| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
13162| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
13163| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
13164| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
13165| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
13166| [18681] Microsoft Windows XP User Account Manager Hidden User
13167| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
13168| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
13169| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
13170| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
13171| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
13172| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
13173| [18607] Microsoft Windows Print Spooler Service Remote Overflow
13174| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
13175| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
13176| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
13177| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
13178| [18493] Microsoft Windows USB Device Driver Overflow
13179| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
13180| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
13181| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
13182| [18459] Microsoft ActiveSync Sync Request Saturation DoS
13183| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
13184| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
13185| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
13186| [18152] Microsoft IE Image File Handling Remote DoS
13187| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
13188| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
13189| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
13190| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
13191| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
13192| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
13193| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
13194| [17829] Microsoft Office .doc Font Parsing Overflow
13195| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
13196| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
13197| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
13198| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
13199| [17707] Microsoft Front Page Malformed HTML Edit DoS
13200| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
13201| [17671] Microsoft Site Server viewcode.asp Information Disclosure
13202| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
13203| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
13204| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
13205| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
13206| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
13207| [17665] Microsoft Site Server Default.asp XSS
13208| [17664] Microsoft Site Server remind.asp Information Disclosure
13209| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
13210| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
13211| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
13212| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
13213| [17659] Microsoft Site Server vs.asp Information Disclosure
13214| [17658] Microsoft Site Server default.asp Information Disclosure
13215| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
13216| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
13217| [17655] Microsoft Site Server DSN.asp Information Disclosure
13218| [17654] Microsoft Site Server driver.asp Information Disclosure
13219| [17653] Microsoft Site Server domain.asp Information Disclosure
13220| [17652] Microsoft Site Server findserver.asp Information Disclosure
13221| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
13222| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
13223| [17342] Microsoft ISA Server Basic Credentials Exposure
13224| [17334] Microsoft IE Script Code Obfuscation (Ghost)
13225| [17314] Microsoft IE XML Redirect Information Disclosure
13226| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
13227| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
13228| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
13229| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
13230| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
13231| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
13232| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
13233| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
13234| [17305] Microsoft Windows HTML Help (CHM) File Overflow
13235| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
13236| [17218] Microsoft IE Stack Overflow Saturation DoS
13237| [17217] Microsoft IE Embedded File Recursion DoS
13238| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
13239| [17159] Microsoft IE Malformed FTP URL DoS
13240| [17158] Microsoft IE Crafted BMP Size Setting DoS
13241| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
13242| [17094] Microsoft IE window() Function Arbitrary Code Execution
13243| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
13244| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
13245| [16827] Microsoft WGA Multiple Method Validation Bypass
13246| [16814] Microsoft Word mcw File Processing Overflow
13247| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
13248| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
13249| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
13250| [16342] Microsoft IE Cross Site Mouse Click Disclosure
13251| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
13252| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
13253| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
13254| [15757] Microsoft SQL Server sa Account Default Null Password
13255| [15739] Microsoft Windows Malformed Image Rendering DoS
13256| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
13257| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
13258| [15480] Microsoft Outlook From Header Comma Parsing Failure
13259| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
13260| [15470] Microsoft Word Unspecified Overflow
13261| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
13262| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
13263| [15466] Microsoft IE Content Advisor Overflow
13264| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
13265| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
13266| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
13267| [15462] Microsoft Windows CSRSS Local Overflow
13268| [15461] Microsoft Windows Object Management Malformed Request DoS
13269| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
13270| [15459] Microsoft Windows Font Processing Local Privilege Escalation
13271| [15458] Microsoft Windows Message Queuing Remote Overflow
13272| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
13273| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
13274| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
13275| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
13276| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
13277| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
13278| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
13279| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
13280| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
13281| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
13282| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
13283| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
13284| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
13285| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
13286| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
13287| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
13288| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
13289| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
13290| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
13291| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
13292| [15219] Microsoft IE XML Object Arbitrary File Access
13293| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
13294| [15217] Microsoft IE input Tag Rendering DoS
13295| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
13296| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
13297| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
13298| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
13299| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
13300| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
13301| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
13302| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
13303| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
13304| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
13305| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
13306| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
13307| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
13308| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
13309| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
13310| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
13311| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
13312| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
13313| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
13314| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
13315| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
13316| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
13317| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
13318| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
13319| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
13320| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
13321| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
13322| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
13323| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
13324| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
13325| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
13326| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
13327| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
13328| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
13329| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
13330| [13609] Microsoft Windows Hyperlink Object Library Overflow
13331| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
13332| [13607] Microsoft IE CDF Cross-Domain Code Execution
13333| [13606] Microsoft IE createControlRange() Function Heap Corruption
13334| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
13335| [13604] Microsoft IE Drag-and-Drop File Injection
13336| [13602] Microsoft Windows OLE Input Validation Overflow
13337| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
13338| [13600] Microsoft Windows SMB Transaction Data Overflow
13339| [13599] Microsoft Windows License Logging Service Overflow
13340| [13597] Microsoft Windows Media Player PNG File Overflow
13341| [13596] Microsoft Windows XP Named Pipe Username Disclosure
13342| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
13343| [13594] Microsoft Office XP URL Overflow
13344| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
13345| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
13346| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
13347| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
13348| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
13349| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
13350| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
13351| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
13352| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
13353| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
13354| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
13355| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
13356| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
13357| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
13358| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
13359| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
13360| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
13361| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
13362| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
13363| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
13364| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
13365| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
13366| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
13367| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
13368| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
13369| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
13370| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
13371| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
13372| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
13373| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
13374| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
13375| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
13376| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
13377| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
13378| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
13379| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
13380| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
13381| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
13382| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
13383| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
13384| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
13385| [13330] Microsoft Windows HKLM Registry Key Locking DoS
13386| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
13387| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
13388| [13258] Microsoft IE Excel File Address Bar Spoofing
13389| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
13390| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
13391| [13132] Microsoft IE %20 URL Spoofing
13392| [13040] Microsoft IE Javascript Load Local File Path Disclosure
13393| [13020] Microsoft Windows XP RPC Cache Memory Leak
13394| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
13395| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
13396| [12862] Microsoft IE USER32.CharLowerA Exception DoS
13397| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
13398| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
13399| [12832] Microsoft Windows Indexing Service Query Overflow
13400| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
13401| [12709] Microsoft HTML Parser Malformed Javascript DoS
13402| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
13403| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
13404| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
13405| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
13406| [12625] Microsoft Windows winhlp32.exe Overflow
13407| [12624] Microsoft Windows Kernel ANI File Parsing DoS
13408| [12623] Microsoft Windows LoadImage API Overflow
13409| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
13410| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
13411| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
13412| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
13413| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
13414| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
13415| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
13416| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
13417| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
13418| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
13419| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
13420| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
13421| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
13422| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
13423| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
13424| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
13425| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
13426| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
13427| [12299] Microsoft IE FTP URL Arbitrary Command Injection
13428| [12277] Microsoft IE sysimage: Local File Existence Disclosure
13429| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
13430| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
13431| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
13432| [12163] Microsoft IE Save Picture As File Extension Spoofing
13433| [12123] Microsoft Windows ipconfig.exe Overflow
13434| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
13435| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
13436| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
13437| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
13438| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
13439| [11956] Microsoft Outlook/Express Message body NUL Character DoS
13440| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
13441| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
13442| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
13443| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
13444| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
13445| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
13446| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
13447| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
13448| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
13449| [11946] Microsoft IE/Outlook Malformed XBM File DoS
13450| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
13451| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
13452| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
13453| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
13454| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
13455| [11940] Microsoft Outlook Blocked Attachment Access
13456| [11939] Microsoft Outlook Attachment Spoofed Content Type
13457| [11938] Microsoft Outlook Express Attachment Filename Overflow
13458| [11937] Microsoft Outlook 98 Hidden Drive Access
13459| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
13460| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
13461| [11918] Microsoft IE execCommand() File Extension Spoofing
13462| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
13463| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
13464| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
13465| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
13466| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
13467| [11799] Microsoft Windows SMB Signing Group Policy Modification
13468| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
13469| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
13470| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
13471| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
13472| [11580] Microsoft IE res: URI Handler File Existence Disclosure
13473| [11479] Microsoft Windows NT Double Dot Samba Client DoS
13474| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
13475| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
13476| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
13477| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
13478| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
13479| [11473] Microsoft Windows NT Messenger Service Long Username DoS
13480| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
13481| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
13482| [11470] Microsoft Windows NT Help File Utility Overflow
13483| [11469] Microsoft Windows NT Malformed File Image Header DoS
13484| [11468] Microsoft Windows NT IOCTL Function DoS
13485| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
13486| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
13487| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
13488| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
13489| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
13490| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
13491| [11423] Microsoft Outlook Malformed Header DoS
13492| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
13493| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
13494| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
13495| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
13496| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
13497| [11416] Microsoft Outlook/Express Blank Header DoS
13498| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
13499| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
13500| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
13501| [11274] Microsoft IE "
13502| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
13503| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
13504| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
13505| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
13506| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
13507| [11170] Microsoft IE iframe Malformed base href DoS
13508| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
13509| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
13510| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
13511| [11158] Microsoft Windows NT Malformed Token Ring DoS
13512| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
13513| [11152] Microsoft IE Malformed HTML Style DoS
13514| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
13515| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
13516| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
13517| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
13518| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
13519| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
13520| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
13521| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
13522| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
13523| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
13524| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
13525| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
13526| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
13527| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
13528| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
13529| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
13530| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
13531| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
13532| [10975] Microsoft Windows NT Winpopup Long Username DoS
13533| [10967] Microsoft IE Javascript User Homepage Address Spoofing
13534| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
13535| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
13536| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
13537| [10935] Microsoft Word Macro Security Model Bypass
13538| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
13539| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
13540| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
13541| [10756] Microsoft MSN heartbeat.ocx Component Overflow
13542| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
13543| [10735] Microsoft Excel Virus Warning Mechanism Bypass
13544| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
13545| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
13546| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
13547| [10709] Microsoft IE SSL Cached Content Spoofing
13548| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
13549| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
13550| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
13551| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
13552| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
13553| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
13554| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
13555| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
13556| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
13557| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
13558| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
13559| [10693] Microsoft Windows Unspecified Kernel Local DoS
13560| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
13561| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
13562| [10690] Microsoft Windows Management APIs Local Privilege Escalation
13563| [10689] Microsoft Windows NetDDE Remote Overflow
13564| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
13565| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
13566| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
13567| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
13568| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
13569| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
13570| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
13571| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
13572| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
13573| [10615] Microsoft Windows NT linux smbmount Request DoS
13574| [10614] Microsoft Windows NT %systemroot% Path Inclusion
13575| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
13576| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
13577| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
13578| [10606] Microsoft Windows LSA NULL Policy Handle DoS
13579| [10604] Microsoft Windows NT PATH Working Directory Inclusion
13580| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
13581| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
13582| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
13583| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
13584| [10379] Microsoft SQL Server Large Query DoS
13585| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
13586| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
13587| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
13588| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
13589| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
13590| [10183] Microsoft SQL Server xp_sprintf Function DoS
13591| [10181] Microsoft SQL Server formatmessage Function DoS
13592| [10166] Microsoft SQL Server raiserror Function DoS
13593| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
13594| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
13595| [10157] Microsoft SQL Server BULK INSERT Query Overflow
13596| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
13597| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
13598| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
13599| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
13600| [10152] Microsoft SQL Server xp_printstatements Function Overflow
13601| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
13602| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
13603| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
13604| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
13605| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
13606| [10146] Microsoft SQL Server xp_sprintf Function Overflow
13607| [10145] Microsoft SQL Server formatmessage Function Overflow
13608| [10144] Microsoft SQL Server raiserror Function Overflow
13609| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
13610| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
13611| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
13612| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
13613| [10139] Microsoft SQL Server Agent Arbitrary File Creation
13614| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
13615| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
13616| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
13617| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
13618| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
13619| [10132] Microsoft SQL Server Authentication Function Remote Overflow
13620| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
13621| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
13622| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
13623| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
13624| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
13625| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
13626| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
13627| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
13628| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
13629| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
13630| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
13631| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
13632| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
13633| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
13634| [9671] Microsoft IE onUnload Address Bar Spoofing
13635| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
13636| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
13637| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
13638| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
13639| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
13640| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
13641| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
13642| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
13643| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
13644| [9348] Microsoft Windows NT Non-NTFS File System Insecure
13645| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
13646| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
13647| [9172] Microsoft IE File/Directory Existence Disclosure
13648| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
13649| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
13650| [9141] Microsoft Windows File Icon Spoofing
13651| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
13652| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
13653| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
13654| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
13655| [8941] Microsoft IE Merlin.speak Function CPU DoS
13656| [8706] Solaris mibiisa MIB Parsing Remote Overflow
13657| [8428] Microsoft NetMeeting Malformed Packets DoS
13658| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
13659| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
13660| [8335] Microsoft IE mshtml.dll Null Pointer DoS
13661| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
13662| [8277] Microsoft IE Malformed GIF Double-free DoS
13663| [8276] Microsoft IE Malformed BMP Overflow
13664| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
13665| [8243] Microsoft SMS Port 2702 DoS
13666| [8224] Microsoft IE CSS Memory Corruption DoS
13667| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
13668| [8210] Microsoft HTML Control Large Form Field DoS
13669| [8161] Microsoft Windows NT Invalid User Privileges
13670| [8160] Microsoft Windows NT File/Directory Invalid Permissions
13671| [8148] Microsoft IE Arbitrary File Write (What a Drag)
13672| [8129] Microsoft IE CSS Malformed div element DoS
13673| [8112] Microsoft Windows NT Weak Account Password Policy
13674| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
13675| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
13676| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
13677| [7963] Microsoft IE parent.window.open location.cache Script Execution
13678| [7951] Microsoft SMS Remote Control Client DoS
13679| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
13680| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
13681| [7914] Microsoft IE .FOLDER File Type Execution
13682| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
13683| [7912] Microsoft IE showHelp() Arbitrary File Execution
13684| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
13685| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
13686| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
13687| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
13688| [7905] Microsoft IE ie5setup.exe Multple Service Disable
13689| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
13690| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
13691| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
13692| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
13693| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
13694| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
13695| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
13696| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
13697| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
13698| [7895] Microsoft IE MS-DOS Device Name URL DoS
13699| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
13700| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
13701| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
13702| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
13703| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
13704| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
13705| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
13706| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
13707| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
13708| [7885] Microsoft Java Implementation Applet Tag DoS
13709| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
13710| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
13711| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
13712| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
13713| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
13714| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
13715| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
13716| [7877] Microsoft Java Virtual Machine Class.forName Overflow
13717| [7876] Microsoft IE .isp File Arbitrary Command Execution
13718| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
13719| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
13720| [7866] Microsoft IE Frame Spoofing Content Injection
13721| [7864] Microsoft IE URL History FTP Credential Disclosure
13722| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
13723| [7862] Microsoft IE User DAT File History Disclosure
13724| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
13725| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
13726| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
13727| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
13728| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
13729| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
13730| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
13731| [7854] Microsoft IE Chinese Character Scrolling DoS
13732| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
13733| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
13734| [7851] Microsoft IE Multiple Form Field DoS
13735| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
13736| [7849] Microsoft IE Javascript location.replace Recursive DoS
13737| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
13738| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
13739| [7846] Microsoft IE PNG Invalid Length Code DoS
13740| [7845] Microsoft IE Encoded URL Information Disclosure
13741| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
13742| [7843] Microsoft IE URLMON.DLL Multiple Overflows
13743| [7842] Microsoft IE File Upload Control Arbitrary File Access
13744| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
13745| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
13746| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
13747| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
13748| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
13749| [7836] Microsoft IE EMBED Tag Overflow
13750| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
13751| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
13752| [7833] Microsoft IE/OE res: Protocol Library Overflow
13753| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
13754| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
13755| [7830] Microsoft IE mk: URL Handling Remote Overflow
13756| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
13757| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
13758| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
13759| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
13760| [7825] Microsoft IE Domain Frame Arbitrary File Access
13761| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
13762| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
13763| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
13764| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
13765| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
13766| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
13767| [7818] Microsoft IE Page Redirect Authentication Credential Leak
13768| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
13769| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
13770| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
13771| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
13772| [7803] Microsoft Windows showHelp Arbitrary Code Execution
13773| [7802] Microsoft IE File Download Extension Spoofing
13774| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
13775| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
13776| [7798] Microsoft Windows Task Scheduler Remote Overflow
13777| [7793] Microsoft Outlook Express Header Validation DoS
13778| [7779] Microsoft IE AnchorClick Cross Zone Scripting
13779| [7778] Microsoft Outlook Window Opener Script Execution
13780| [7777] Microsoft Windows Media Control Preview Script Execution
13781| [7776] Microsoft IE Download Window Filename Filetype Spoofing
13782| [7775] Microsoft IE Channel Link Script Injection
13783| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
13784| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
13785| [7762] Microsoft Java Virtual Machine Cross-Site Communication
13786| [7739] Microsoft IE plugin.ocx Load() Method Overflow
13787| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
13788| [7608] Microsoft Index Server Internet Data Query Path Disclosure
13789| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
13790| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
13791| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
13792| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
13793| [7293] Microsoft Plus! Compressed Folder Password Disclosure
13794| [7202] Microsoft PowerPoint 2000 File Loader Overflow
13795| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
13796| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
13797| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
13798| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
13799| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
13800| [7117] Microsoft Windows RPC Locator Remote Overflow
13801| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
13802| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
13803| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
13804| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
13805| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
13806| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
13807| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
13808| [6965] Microsoft ISA Server 2000 SSL Packet DoS
13809| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
13810| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
13811| [6931] Microsoft IE/Outlook Double Null Character DoS
13812| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
13813| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
13814| [6742] Microsoft DirectPlay Packet Validation DoS
13815| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
13816| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
13817| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
13818| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
13819| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
13820| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
13821| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
13822| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
13823| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
13824| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
13825| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
13826| [6079] Microsoft Outlook Remote XML Loading
13827| [6074] Microsoft Windows Me HSC hcp:// URL XSS
13828| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
13829| [6031] Microsoft Exchange Multiple SMTP Command DoS
13830| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
13831| [5998] Microsoft Outlook Predictable File Caching
13832| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
13833| [5968] Microsoft Windows ARP Packet DoS
13834| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
13835| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
13836| [5936] Microsoft SMTP Service 4xx Error Code DoS
13837| [5887] Microsoft Access 97 Cleartext Password Storage
13838| [5884] Microsoft Site Server ASP Upload Remote Command Execution
13839| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
13840| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
13841| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
13842| [5694] Microsoft IE Address Bar URL Spoofing
13843| [5687] Microsoft Windows IE and Explorer Share Name Overflow
13844| [5686] Microsoft Windows Telnet Service Account Information Disclosure
13845| [5608] Microsoft NetMeeting Malformed String DoS
13846| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
13847| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
13848| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
13849| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
13850| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
13851| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
13852| [5390] Microsoft Exchange NTLM Null Session Mail Relay
13853| [5357] Microsoft Multiple Products for Mac File URL Overflow
13854| [5356] Microsoft IE for Mac Local AppleScript Invocation
13855| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
13856| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
13857| [5343] Microsoft SQL Server SQLXML root Parameter XSS
13858| [5342] Microsoft IE Malformed Web Page Zone Spoofing
13859| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
13860| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
13861| [5261] Microsoft Windows ASN.1 Double Free Code Execution
13862| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
13863| [5259] Microsoft Windows Negotiate SSP Code Execution
13864| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
13865| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
13866| [5256] Microsoft Windows Unspecified H.323 Code Execution
13867| [5255] Microsoft Windows Management Privilege Escalation
13868| [5254] Microsoft Windows Utility Manager Privilege Escalation
13869| [5253] Microsoft Windows Help and Support Center Command Execution
13870| [5252] Microsoft Windows Metafile Code Execution
13871| [5251] Microsoft Windows Winlogon Command Execution
13872| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
13873| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
13874| [5248] Microsoft Windows LSASS Remote Overflow
13875| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
13876| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
13877| [5245] Microsoft Windows RPCSS Large Length Field DoS
13878| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
13879| [5241] Microsoft Jet Database Engine Remote Code Execution
13880| [5179] Microsoft Windows 2000 microsoft-ds DoS
13881| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
13882| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
13883| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
13884| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
13885| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
13886| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
13887| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
13888| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
13889| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
13890| [5134] Microsoft IE Reference Local HTML Resource Script Execution
13891| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
13892| [5129] Microsoft IE Download File Origin Spoofing
13893| [5126] Microsoft BackOffice Authentication Bypass
13894| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
13895| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
13896| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
13897| [4951] Microsoft IE CLASSID Remote DoS
13898| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
13899| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
13900| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
13901| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
13902| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
13903| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
13904| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
13905| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
13906| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
13907| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
13908| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
13909| [4654] iisCart2000 File Upload
13910| [4627] Microsoft IE Text Control Overflow
13911| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
13912| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
13913| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
13914| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
13915| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
13916| [4186] Microsoft IE Cookie Path Traversal
13917| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
13918| [4168] Microsoft Outlook 2002 mailto URI Script Injection
13919| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
13920| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
13921| [3903] Microsoft Windows WINS Server Remote Overflow
13922| [3902] Microsoft Windows ASN.1 Library Integer Overflow
13923| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
13924| [3879] Microsoft IE File Identification Variant
13925| [3791] Microsoft IE Travel Log Arbitrary Script Execution
13926| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
13927| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
13928| [3501] Microsoft FrontPage form_results Information Disclosure
13929| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
13930| [3457] Microsoft MDAC Broadcast Reply Overflow
13931| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
13932| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
13933| [3384] Microsoft FrontPage htimage.exe Overflow
13934| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
13935| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
13936| [3381] Microsoft FrontPage imagemap.exe Overflow
13937| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
13938| [3313] Microsoft Word Form Protection Bypass
13939| [3307] Microsoft IE showHelp() Zone Restriction Bypass
13940| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
13941| [3225] Microsoft IE for Mac Information Disclosure
13942| [3213] SecureIIS Error Page Information Disclosure
13943| [3212] SecureIIS Encoded URI Arbitrary File Access
13944| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
13945| [3209] SecureIIS HTTP Request Overflow Protection Bypass
13946| [3195] Microsoft Exchange OWA REFERER Header XSS
13947| [3184] IISShield HTTP Request Bypass Ruleset
13948| [3183] iisPROTECT Encoded URL Authentication Bypass
13949| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
13950| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
13951| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
13952| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
13953| [3108] Microsoft Office 98 Macintosh Information Disclosure
13954| [3106] Microsoft Windows Password Authentication Security Point of Failure
13955| [3104] Microsoft IE PPC Overwrite Arbitrary Files
13956| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
13957| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
13958| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
13959| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
13960| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
13961| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
13962| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
13963| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
13964| [3066] Microsoft IE Custom HTTP Errors Script Injection
13965| [3065] Microsoft IE Unparsable XML File XSS
13966| [3056] Microsoft IE MSN/Alexa Information Leak
13967| [3055] Microsoft IE Spoofed URL
13968| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
13969| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
13970| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
13971| [3051] Microsoft IE MHT Web Archive Overflow
13972| [3050] Microsoft IE dragDrop Method Local File Reading
13973| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
13974| [3036] Microsoft IE dynsrc File Information Leak
13975| [3035] Microsoft WebBrowser Control t:video File Execution
13976| [3034] Microsoft IE JavaScript script src Local File Enumeration
13977| [3033] Microsoft IE Content Type/Disposition File Execution
13978| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
13979| [3031] Microsoft IE document.Open Same Origin Policy Violation
13980| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
13981| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
13982| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
13983| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
13984| [3010] Microsoft IE OWC XMLURL File Existence Verification
13985| [3009] Microsoft IE OWC Load File Existence Verification
13986| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
13987| [3007] Microsoft IE OWC LoadText Read Arbitrary File
13988| [3006] Microsoft IE OWC Script Execution
13989| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
13990| [3004] Microsoft IE Gopher Client Overflow
13991| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
13992| [3002] Microsoft IE File Extension Dot Parsing
13993| [3001] Microsoft IE XP HCP URI Handler File Deletion
13994| [2999] Microsoft IE Powerpoint Mouse-Over Execute
13995| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
13996| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
13997| [2996] Microsoft IE Object Zone Redirection
13998| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
13999| [2994] Microsoft IE (NewWindow).location.assign Save Reference
14000| [2993] Microsoft IE % URL Encoding XSS
14001| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
14002| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
14003| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
14004| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
14005| [2985] Microsoft IE execCommand Object Caching
14006| [2984] Microsoft IE getElementsByTagName Object Caching
14007| [2983] Microsoft IE getElementsByName Object Caching
14008| [2982] Microsoft IE getElementById Object Caching
14009| [2981] Microsoft IE elementFromPoint Object Caching
14010| [2980] Microsoft IE createRange Object Caching
14011| [2979] Microsoft IE external Object Caching
14012| [2978] Microsoft IE showModalDialog Object Caching
14013| [2977] Microsoft IE XML Datasource Read Local Files
14014| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
14015| [2975] Microsoft IE Back Button XSS
14016| [2974] Microsoft IE/Outlook Temporary Internet File Execution
14017| [2973] Microsoft IE Third Party Plugin Rendering XSS
14018| [2972] Microsoft IE showModalDialog Script Execution
14019| [2971] Microsoft WMP File Attachment Script Execution
14020| [2970] Microsoft IE cssText Arbitrary File Access
14021| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
14022| [2968] Microsoft IE File Download Dialog Overflow
14023| [2967] Microsoft IE Object Type Property Overflow
14024| [2966] Microsoft IE BR549.DLL Overflow
14025| [2965] Microsoft IE Cache Script Execution in My Zone
14026| [2963] Microsoft IE align HTML Converter Overflow
14027| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
14028| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
14029| [2917] Microsoft Access Known Database Attack
14030| [2801] Microsoft Word and Excel Execution of Arbitrary Code
14031| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
14032| [2784] Microsoft IE Component Function Information Disclosure
14033| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
14034| [2751] Microsoft Word Macro Name Handling Overflow
14035| [2745] Microsoft HTML Help Control Privilege Escalation
14036| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
14037| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
14038| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
14039| [2679] Microsoft Outlook Web Access XSS
14040| [2678] Microsoft Windows Overflow in ListBox and
14041| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
14042| [2675] Microsoft Windows HCP protocol Overflow
14043| [2674] Microsoft Exchange SMTP Extended Request Overflow
14044| [2670] Microsoft Windows RPC Race Condition DoS
14045| [2657] Microsoft Windows Message Queuing Service Heap Overflow
14046| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
14047| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
14048| [2642] Microsoft Windows Unauthorised Thread Termination
14049| [2592] Microsoft PowerPoint Modify Protection Bypass
14050| [2572] Microsoft BizTalk Server Insecure Permissions
14051| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
14052| [2544] Microsoft ASP.NET Request Validation Bypass
14053| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
14054| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
14055| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
14056| [2508] Microsoft Visual Basic for Applications Buffer Overflow
14057| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
14058| [2506] Microsoft Word/Works Automated Macro Execution
14059| [2453] Microsoft IE My Computer Zone Caching Issue
14060| [2451] Microsoft IE Object Data Header Type Safe File Execution
14061| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
14062| [2368] IISShield Crafted HTTP Request Filtering Bypass
14063| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
14064| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
14065| [2320] Microsoft ISA Server HTTP Error Handler XSS
14066| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
14067| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
14068| [2298] Microsoft ISA Server Error Page XSS
14069| [2291] Microsoft IE DOM Script Source Recursive DoS
14070| [2288] Microsoft Utility Manager Local Privilege Escalation
14071| [2283] Microsoft Exchange OWA Execute Arbitrary Code
14072| [2262] Microsoft Windows Media Player DHTML Local Zone Access
14073| [2247] Microsoft Windows Media Services Remote Command Execution #2
14074| [2244] Microsoft Windows 2000 ShellExecute() API Let
14075| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
14076| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
14077| [2100] Microsoft Windows RPC DCOM Interface Overflow
14078| [2096] Microsoft ISA Server SurfControl Web Filter
14079| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
14080| [2073] Microsoft Windows XP Network Share Provider Overflow
14081| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
14082| [2061] Microsoft Outlook HTML Mail Script Execution
14083| [2060] Microsoft IE Known Local File Script Execution
14084| [2051] Microsoft Windows User Shell Buffer Overflow
14085| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
14086| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
14087| [2046] Microsoft IE Forced Script Execution
14088| [2045] Microsoft IE HTML Document Directive Overflow
14089| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
14090| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
14091| [2041] Microsoft Office for Macintosh Network PID Checker DoS
14092| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
14093| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
14094| [2008] Microsoft IE Same Origin Policy Violation
14095| [2004] Microsoft IE Cross-frame Remote File Access
14096| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
14097| [1992] Microsoft IE Cookie Disclosure
14098| [1990] Microsoft Windows Terminal Services False IP Address
14099| [1982] Microsoft IE about: URI XSS
14100| [1978] Microsoft IE for Mac OS Download Execution
14101| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
14102| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
14103| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
14104| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
14105| [1957] Microsoft Exchange OWA Malformed Request DoS
14106| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
14107| [1934] Microsoft ISA Server Invalid URL Error Message XSS
14108| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
14109| [1932] Microsoft ISA Server H.323 Memory Leak DoS
14110| [1928] Microsoft Windows NNTP Malformed Post DoS
14111| [1915] Microsoft Windows Media Player .NSC File Overflow
14112| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
14113| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
14114| [1867] Microsoft Word Document Macro Execution
14115| [1864] Microsoft SQL Server Administrator Cached Connection
14116| [1861] Microsoft Windows Telnet Local System Call DoS
14117| [1860] Microsoft Windows Telnet Service Handle Leak DoS
14118| [1859] Microsoft Windows Telnet Multiple Sessions DoS
14119| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
14120| [1856] Microsoft Exchange OWA Embedded Script Execution
14121| [1852] Microsoft Outlook Address Book Spoofing Weakness
14122| [1840] Microsoft Windows Media Player Internet Shortcut Execution
14123| [1838] Microsoft Word .asd Macro File Execution
14124| [1837] Microsoft Word RTF Template Macro Execution
14125| [1832] Microsoft IE Spoofed SSL Certificates
14126| [1831] Microsoft IE Server Certificate Validation Failure
14127| [1820] Microsoft Index Server Search Parameter Overflow
14128| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
14129| [1764] Microsoft Windows 2000 Domain Controller DoS
14130| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
14131| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
14132| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
14133| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
14134| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
14135| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
14136| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
14137| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
14138| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
14139| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
14140| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
14141| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
14142| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
14143| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
14144| [1607] Microsoft Windows 9x Invalid Driver Type DoS
14145| [1606] Microsoft IE Cached Web Credentials Disclosure
14146| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
14147| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
14148| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
14149| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
14150| [1563] Microsoft Windows / Office DLL Search Path Weakness
14151| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
14152| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
14153| [1537] Microsoft Outlook Rich Text Format Information Disclosure
14154| [1530] Microsoft Money Cleartext Password Storage
14155| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
14156| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
14157| [1502] Microsoft IE Scriptlet Rendering
14158| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
14159| [1491] Microsoft Windows 9x IPX Ping Packet DoS
14160| [1475] Microsoft Outlook/Express Cache Bypass
14161| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
14162| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
14163| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
14164| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
14165| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
14166| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
14167| [1428] Microsoft IE/Office ActiveX Object Execution
14168| [1427] Microsoft IE VBA Code Execution
14169| [1399] Microsoft Windows 2000 Windows Station Access
14170| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
14171| [1369] Microsoft SQL Server DTS Password Disclosure
14172| [1368] Microsoft Media Encoder Request Parsing Local DoS
14173| [1358] Microsoft Windows NT HostAnnouncement DoS
14174| [1342] Microsoft IE DocumentComplete() Cross Frame Access
14175| [1341] Microsoft IE ActiveX Combined Component Attributes
14176| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
14177| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
14178| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
14179| [1297] Microsoft Windows 2000 Active Directory Object Attribute
14180| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
14181| [1272] Microsoft Excel XLM Arbitrary Macro Execution
14182| [1268] Microsoft Windows TCP/IP Printing Service DoS
14183| [1257] Microsoft Windows Media License Manager DoS
14184| [1251] Microsoft Windows MS DOS Device Name DoS
14185| [1250] Microsoft SQL Server Non-Validated Query
14186| [1244] Microsoft Clip Art Buffer Overflow
14187| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
14188| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
14189| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
14190| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
14191| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
14192| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
14193| [1188] Microsoft CIS IMAP Server Remote Overflow
14194| [1166] Microsoft Windows NT LsaLookupSids() DoS
14195| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
14196| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
14197| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
14198| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
14199| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
14200| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
14201| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
14202| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
14203| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
14204| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
14205| [1076] Microsoft Windows IP Source Routing
14206| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
14207| [1069] Microsoft IE Import/Export Favorites
14208| [1056] Microsoft Java Virtual Machine Sandbox Bypass
14209| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
14210| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
14211| [1046] Microsoft Windows telnet.exe Argument Overflow
14212| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
14213| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
14214| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
14215| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
14216| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
14217| [1010] Microsoft Windows NT Malformed LSA Request DoS
14218| [967] Microsoft Windows NT WINS Service Malformed Data DoS
14219| [945] Microsoft Windows 95/98 SMB Authentication Replay
14220| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
14221| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
14222| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
14223| [922] Microsoft NetMeeting Clipboard Remote Overflow
14224| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
14225| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
14226| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
14227| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
14228| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
14229| [863] Microsoft Exchange Malformed Mail Attribute DoS
14230| [858] Microsoft Windows NCM Handler Local Privilege Elevation
14231| [852] Microsoft Exchange EHLO Long Hostname Overflow
14232| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
14233| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
14234| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
14235| [773] Microsoft Windows 2000 Group Policy File Lock DoS
14236| [772] Microsoft Windows Multiple UNC Provider Request Overflow
14237| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
14238| [736] Microsoft Windows SMB Enumeration Information Disclosure
14239| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
14240| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
14241| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
14242| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
14243| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
14244| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
14245| [665] Microsoft Windows 95 Online Registration Information Disclosure
14246| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
14247| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
14248| [601] Microsoft Exchange Server LDAP Bind Function Overflow
14249| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
14250| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
14251| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
14252| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
14253| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
14254| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
14255| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
14256| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
14257| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
14258| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
14259| [457] Microsoft Exchange Malformed MIME Header DoS
14260| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
14261| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
14262| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
14263| [423] Microsoft Windows File Share Password Protection Bypass
14264| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
14265| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
14266| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
14267| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
14268| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
14269| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
14270| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
14271| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
14272| [334] Microsoft Windows Registry: Permission to Modify Common Paths
14273| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
14274| [331] Microsoft Windows Remote Registry Access
14275| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
14276| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
14277| [304] Microsoft Windows NT service pack level via remote registry access
14278| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
14279| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
14280| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
14281| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
14282| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
14283| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
14284| [129] Microsoft Windows NT FTP 'guest' Account
14285| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
14286| [68] Microsoft FrontPage Extensions .pwd File Permissions
14287| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
14288|_
14289443/tcp open ssl/http Microsoft IIS httpd 10.0
14290|_http-server-header: Microsoft-IIS/10.0
14291| vulscan: VulDB - https://vuldb.com:
14292| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
14293| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
14294| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
14295| [139953] Microsoft Internet Explorer 10/11 memory corruption
14296| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
14297| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
14298| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
14299| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
14300| [136279] Microsoft Internet Explorer 10/11 memory corruption
14301| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
14302| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14303| [134682] Microsoft Internet Explorer 10/11 memory corruption
14304| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14305| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14306| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
14307| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
14308| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14309| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14310| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14311| [131678] Microsoft Internet Explorer 10/11 memory corruption
14312| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
14313| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
14314| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
14315| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
14316| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
14317| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
14318| [131618] Microsoft Internet Explorer 10/11 memory corruption
14319| [130827] Microsoft Internet Explorer 10/11 information disclosure
14320| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
14321| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
14322| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
14323| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
14324| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
14325| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
14326| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
14327| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
14328| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
14329| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
14330| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14331| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
14332| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
14333| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
14334| [122846] Microsoft Internet Explorer 10/11 memory corruption
14335| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
14336| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14337| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
14338| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
14339| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
14340| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
14341| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
14342| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
14343| [115997] Microsoft Internet Explorer 10/11 memory corruption
14344| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
14345| [114567] Microsoft Internet Explorer 10/11 information disclosure
14346| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
14347| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
14348| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
14349| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
14350| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
14351| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
14352| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
14353| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
14354| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
14355| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
14356| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
14357| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
14358| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
14359| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
14360| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
14361| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14362| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14363| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
14364| [109365] Microsoft Internet Explorer 10/11 memory corruption
14365| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
14366| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
14367| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
14368| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
14369| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
14370| [102461] Microsoft Internet Explorer 10/11 memory corruption
14371| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
14372| [101007] Microsoft Internet Explorer 10/11 memory corruption
14373| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
14374| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
14375| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
14376| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
14377| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
14378| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
14379| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
14380| [97967] Microsoft Internet Explorer 10/11 memory corruption
14381| [97965] Microsoft Internet Explorer 10/11 memory corruption
14382| [94436] Microsoft Windows 10 Graphics memory corruption
14383| [94421] Microsoft Internet Explorer 10/11 information disclosure
14384| [94418] Microsoft Internet Explorer 10/11 privilege escalation
14385| [93427] Microsoft Internet Explorer 10/11 memory corruption
14386| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
14387| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
14388| [92561] Microsoft Internet Explorer 10/11 privilege escalation
14389| [92560] Microsoft Internet Explorer 10/11 privilege escalation
14390| [92557] Microsoft Internet Explorer 10/11 memory corruption
14391| [91560] Microsoft Windows 10 Object denial of service
14392| [91517] Microsoft Internet Explorer 10/11 memory corruption
14393| [91516] Microsoft Internet Explorer 10/11 privilege escalation
14394| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
14395| [90683] Microsoft Internet Explorer 10/11 information disclosure
14396| [89020] Microsoft Internet Explorer 10/11 information disclosure
14397| [89010] Microsoft Internet Explorer 10/11 memory corruption
14398| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
14399| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
14400| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
14401| [87139] Microsoft Internet Explorer 10/11 information disclosure
14402| [82246] Microsoft Internet Explorer 10/11 memory corruption
14403| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
14404| [81271] Microsoft Windows 10 PDF Library memory corruption
14405| [81249] Microsoft Internet Explorer 10/11 memory corruption
14406| [81243] Microsoft Internet Explorer 10 memory corruption
14407| [80845] Microsoft Internet Explorer 10 memory corruption
14408| [80843] Microsoft Internet Explorer 10 memory corruption
14409| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
14410| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
14411| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
14412| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
14413| [79515] Microsoft Windows 10 Kernel memory corruption
14414| [79473] Microsoft Internet Explorer 10 memory corruption
14415| [79466] Microsoft Internet Explorer 10/11 memory corruption
14416| [79463] Microsoft Internet Explorer 10 memory corruption
14417| [79158] Microsoft Internet Explorer 10/11 memory corruption
14418| [79157] Microsoft Internet Explorer 10/11 memory corruption
14419| [79139] Microsoft Internet Explorer 10/11 memory corruption
14420| [78383] Microsoft Internet Explorer 10/11 privilege escalation
14421| [78382] Microsoft Internet Explorer 10 memory corruption
14422| [77643] Microsoft Internet Explorer 10/11 memory corruption
14423| [77597] Microsoft Internet Explorer 10/11 File denial of service
14424| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
14425| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
14426| [77005] Microsoft Internet Explorer 10/11 memory corruption
14427| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
14428| [76488] Microsoft Internet Explorer 10/11 File information disclosure
14429| [76487] Microsoft Internet Explorer 10/11 memory corruption
14430| [76475] Microsoft Internet Explorer 10/11 memory corruption
14431| [76436] Microsoft Internet Explorer 10/11 memory corruption
14432| [75781] Microsoft Internet Explorer 10/11 memory corruption
14433| [75777] Microsoft Internet Explorer 10 memory corruption
14434| [75767] Microsoft Internet Explorer 10/11 privilege escalation
14435| [75766] Microsoft Internet Explorer 10/11 memory corruption
14436| [75765] Microsoft Internet Explorer 10/11 memory corruption
14437| [75762] Microsoft Internet Explorer 10/11 memory corruption
14438| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
14439| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
14440| [75324] Microsoft Internet Explorer 10/11 memory corruption
14441| [74857] Microsoft Internet Explorer 10/11 memory corruption
14442| [73944] Microsoft Internet Explorer 10/11 memory corruption
14443| [73942] Microsoft Internet Explorer 10 memory corruption
14444| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
14445| [69144] Microsoft Internet Explorer 10/11 memory corruption
14446| [69141] Microsoft Internet Explorer 10/11 privilege escalation
14447| [69138] Microsoft Internet Explorer 10/11 memory corruption
14448| [69126] Microsoft Internet Explorer 10/11 memory corruption
14449| [69122] Microsoft Internet Explorer 10/11 memory corruption
14450| [69117] Microsoft Internet Explorer 10/11 memory corruption
14451| [69115] Microsoft Internet Explorer 10 memory corruption
14452| [69114] Microsoft Internet Explorer 10 memory corruption
14453| [68398] Microsoft Internet Explorer 10 memory corruption
14454| [68180] Microsoft Internet Explorer 10/11 privilege escalation
14455| [68179] Microsoft Internet Explorer 10/11 privilege escalation
14456| [68168] Microsoft Internet Explorer 10/11 memory corruption
14457| [67810] Microsoft Internet Explorer 10/11 memory corruption
14458| [67504] Microsoft Internet Explorer 10/11 memory corruption
14459| [67495] Microsoft Internet Explorer 10 memory corruption
14460| [67493] Microsoft Internet Explorer 10/11 memory corruption
14461| [67491] Microsoft Internet Explorer 10/11 memory corruption
14462| [67486] Microsoft Internet Explorer 10 memory corruption
14463| [67482] Microsoft Internet Explorer 10/11 memory corruption
14464| [67352] Microsoft Internet Explorer 10/11 memory corruption
14465| [67347] Microsoft Internet Explorer 10/11 memory corruption
14466| [67344] Microsoft Internet Explorer 10/11 memory corruption
14467| [67341] Microsoft Internet Explorer 10/11 memory corruption
14468| [67334] Microsoft Internet Explorer 10 memory corruption
14469| [67330] Microsoft Internet Explorer 10/11 memory corruption
14470| [67329] Microsoft Internet Explorer 10/11 memory corruption
14471| [67004] Microsoft Internet Explorer 10/11 memory corruption
14472| [13537] Microsoft Internet Explorer 10/11 memory corruption
14473| [13535] Microsoft Internet Explorer 10/11 memory corruption
14474| [13530] Microsoft Internet Explorer 10/11 memory corruption
14475| [13529] Microsoft Internet Explorer 10/11 memory corruption
14476| [13523] Microsoft Internet Explorer 10/11 memory corruption
14477| [13516] Microsoft Internet Explorer 10/11 memory corruption
14478| [13513] Microsoft Internet Explorer 10/11 memory corruption
14479| [13510] Microsoft Internet Explorer 10/11 memory corruption
14480| [13507] Microsoft Internet Explorer 10 memory corruption
14481| [13506] Microsoft Internet Explorer 10 memory corruption
14482| [13498] Microsoft Internet Explorer 10/11 memory corruption
14483| [13495] Microsoft Internet Explorer 10/11 information disclosure
14484| [13491] Microsoft Internet Explorer 10/11 memory corruption
14485| [12546] Microsoft Internet Explorer 10/11 memory corruption
14486| [12544] Microsoft Internet Explorer 10/11 memory corruption
14487| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
14488| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
14489| [11433] Microsoft Internet Explorer 10 memory corruption
14490| [10625] Microsoft Internet Explorer 10 memory corruption
14491| [10624] Microsoft Internet Explorer 10 memory corruption
14492| [10621] Microsoft Internet Explorer 10 memory corruption
14493| [10620] Microsoft Internet Explorer 10 memory corruption
14494| [10219] Microsoft Internet Explorer 10 memory corruption
14495| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
14496| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
14497| [9411] Microsoft Internet Explorer 10 memory corruption
14498| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
14499| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
14500| [9090] Microsoft Internet Explorer 10 memory corruption
14501| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
14502| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
14503| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
14504| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
14505| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
14506| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
14507| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
14508|
14509| MITRE CVE - https://cve.mitre.org:
14510| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
14511| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
14512| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
14513| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
14514| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
14515| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
14516| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
14517| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
14518| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
14519| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
14520| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
14521| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
14522| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
14523| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
14524| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
14525| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
14526| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
14527| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
14528| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
14529| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
14530| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
14531| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
14532| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
14533| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
14534| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
14535| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
14536| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
14537| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
14538| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
14539| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
14540| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
14541| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
14542| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
14543| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
14544| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
14545| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
14546| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
14547| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
14548| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
14549| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
14550| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
14551| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
14552| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
14553| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
14554| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
14555| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
14556| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
14557| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
14558| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
14559| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
14560| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
14561| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
14562| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
14563| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
14564| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
14565| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
14566| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
14567| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
14568| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
14569| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
14570| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
14571| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
14572| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
14573| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
14574| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
14575| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
14576| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
14577| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
14578| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
14579| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
14580| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
14581| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
14582| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
14583| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
14584| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
14585| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
14586| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
14587| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
14588| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
14589| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
14590| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
14591| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
14592| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
14593| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
14594| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
14595| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
14596| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
14597| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
14598| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
14599| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
14600| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
14601| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
14602| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
14603| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
14604| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
14605| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
14606| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
14607| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
14608| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
14609| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
14610| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
14611| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
14612| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
14613| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
14614|
14615| SecurityFocus - https://www.securityfocus.com/bid/:
14616| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
14617|
14618| IBM X-Force - https://exchange.xforce.ibmcloud.com:
14619| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
14620| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
14621|
14622| Exploit-DB - https://www.exploit-db.com:
14623| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
14624| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
14625|
14626| OpenVAS (Nessus) - http://www.openvas.org:
14627| [855384] Solaris Update for snmp/mibiisa 108870-36
14628| [855273] Solaris Update for snmp/mibiisa 108869-36
14629| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
14630|
14631| SecurityTracker - https://www.securitytracker.com:
14632| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
14633|
14634| OSVDB - http://www.osvdb.org:
14635| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
14636| [87262] Microsoft IIS FTP Command Injection Information Disclosure
14637| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
14638| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
14639| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
14640| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
14641| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
14642| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
14643| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
14644| [71856] Microsoft IIS Status Header Handling Remote Overflow
14645| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
14646| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
14647| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
14648| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
14649| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
14650| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
14651| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
14652| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
14653| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
14654| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
14655| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
14656| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
14657| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
14658| [59892] Microsoft IIS Malformed Host Header Remote DoS
14659| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
14660| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
14661| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
14662| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
14663| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
14664| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
14665| [55269] Microsoft IIS Traversal GET Request Remote DoS
14666| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
14667| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
14668| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
14669| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
14670| [52238] Microsoft IIS IDC Extension XSS
14671| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
14672| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
14673| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
14674| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
14675| [43451] Microsoft IIS HTTP Request Smuggling
14676| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
14677| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
14678| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
14679| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
14680| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
14681| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
14682| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
14683| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
14684| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
14685| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
14686| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
14687| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
14688| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
14689| [27152] Microsoft Windows IIS ASP Page Processing Overflow
14690| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
14691| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
14692| [21805] Microsoft IIS Crafted URL Remote DoS
14693| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
14694| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
14695| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
14696| [17124] Microsoft IIS Malformed WebDAV Request DoS
14697| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
14698| [17122] Microsoft IIS Permission Weakness .COM File Upload
14699| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
14700| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
14701| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
14702| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
14703| [13760] Microsoft IIS Malformed URL Request DoS
14704| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
14705| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
14706| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
14707| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
14708| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
14709| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
14710| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
14711| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
14712| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
14713| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
14714| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
14715| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
14716| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
14717| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
14718| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
14719| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
14720| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
14721| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
14722| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
14723| [11257] Microsoft IIS Malformed GET Request DoS
14724| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
14725| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
14726| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
14727| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
14728| [9200] Microsoft IIS Unspecified XSS Variant
14729| [9199] Microsoft IIS shtml.dll XSS
14730| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
14731| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
14732| [7737] Microsoft IIS ASP Redirection Function XSS
14733| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
14734| [5851] Microsoft IIS Single Dot Source Code Disclosure
14735| [5736] Microsoft IIS Relative Path System Privilege Escalation
14736| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
14737| [5633] Microsoft IIS Invalid WebDAV Request DoS
14738| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
14739| [5584] Microsoft IIS URL Redirection Malformed Length DoS
14740| [5566] Microsoft IIS Form_VBScript.asp XSS
14741| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
14742| [4864] Microsoft IIS TRACK Logging Failure
14743| [4863] Microsoft IIS Active Server Page Header DoS
14744| [4791] Microsoft IIS Response Object DoS
14745| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
14746| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
14747| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
14748| [3500] Microsoft IIS fpcount.exe Remote Overflow
14749| [3341] Microsoft IIS Redirect Response XSS
14750| [3339] Microsoft IIS HTTP Error Page XSS
14751| [3338] Microsoft IIS Help File XSS
14752| [3328] Microsoft IIS FTP Status Request DoS
14753| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
14754| [3325] Microsoft IIS HTR ISAPI Overflow
14755| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
14756| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
14757| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
14758| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
14759| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
14760| [3231] Microsoft IIS Log Bypass
14761| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
14762| [1931] Microsoft IIS MIME Content-Type Header DoS
14763| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
14764| [1826] Microsoft IIS Domain Guest Account Disclosure
14765| [1824] Microsoft IIS FTP DoS
14766| [1804] Microsoft IIS Long Request Parsing Remote DoS
14767| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
14768| [1750] Microsoft IIS File Fragment Disclosure
14769| [1543] Microsoft NT/IIS Invalid URL Request DoS
14770| [1504] Microsoft IIS File Permission Canonicalization Bypass
14771| [1465] Microsoft IIS .htr Missing Variable DoS
14772| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
14773| [1322] Microsoft IIS Malformed .htr Request DoS
14774| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
14775| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
14776| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
14777| [1170] Microsoft IIS Escape Character URL Access Bypass
14778| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
14779| [1082] Microsoft IIS Domain Resolution Access Bypass
14780| [1041] Microsoft IIS Malformed HTTP Request Header DoS
14781| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
14782| [930] Microsoft IIS Shared ASP Cache Information Disclosure
14783| [929] Microsoft IIS FTP Server NLST Command Overflow
14784| [928] Microsoft IIS Long Request Log Evasion
14785| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
14786| [814] Microsoft IIS global.asa Remote Information Disclosure
14787| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
14788| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
14789| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
14790| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
14791| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
14792| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
14793| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
14794| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
14795| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
14796| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
14797| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
14798| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
14799| [473] Microsoft IIS Multiple .cnf File Information Disclosure
14800| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
14801| [470] Microsoft IIS Form_JScript.asp XSS
14802| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
14803| [436] Microsoft IIS Unicode Remote Command Execution
14804| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
14805| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
14806| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
14807| [308] Microsoft IIS Malformed File Extension URL DoS
14808| [285] Microsoft IIS repost.asp File Upload
14809| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
14810| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
14811| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
14812| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
14813| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
14814| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
14815| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
14816| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
14817| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
14818| [98] Microsoft IIS perl.exe HTTP Path Disclosure
14819| [97] Microsoft IIS ISM.DLL HTR Request Overflow
14820| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
14821| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
14822| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
14823| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
14824| [2] Microsoft IIS ExAir search.asp Direct Request DoS
14825| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
14826| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
14827| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
14828| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
14829| [96192] Microsoft IE EUC-JP Character Encoding XSS
14830| [96191] Microsoft IE Process Integrity Level Assignment Bypass
14831| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
14832| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
14833| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
14834| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
14835| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
14836| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
14837| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
14838| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
14839| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
14840| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
14841| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
14842| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
14843| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
14844| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
14845| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
14846| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
14847| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
14848| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
14849| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
14850| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
14851| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
14852| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
14853| [94984] Microsoft IE Shift JIS Character Encoding XSS
14854| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
14855| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
14856| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
14857| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
14858| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
14859| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
14860| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
14861| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
14862| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
14863| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
14864| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
14865| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
14866| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
14867| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
14868| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
14869| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
14870| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
14871| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
14872| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
14873| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
14874| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
14875| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
14876| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
14877| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
14878| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
14879| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
14880| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
14881| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
14882| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
14883| [94507] Microsoft IE Infinite Loop DoS
14884| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
14885| [94127] Microsoft Office PNG File Handling Buffer Overflow
14886| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
14887| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
14888| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
14889| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
14890| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
14891| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
14892| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
14893| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
14894| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
14895| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
14896| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
14897| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
14898| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
14899| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
14900| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
14901| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
14902| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
14903| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
14904| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
14905| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
14906| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
14907| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
14908| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
14909| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
14910| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
14911| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
14912| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
14913| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
14914| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
14915| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
14916| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
14917| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
14918| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
14919| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
14920| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
14921| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
14922| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
14923| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
14924| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
14925| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
14926| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
14927| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
14928| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
14929| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
14930| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
14931| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
14932| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
14933| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
14934| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
14935| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
14936| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
14937| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
14938| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
14939| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
14940| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
14941| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
14942| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
14943| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
14944| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
14945| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
14946| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
14947| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
14948| [92257] Microsoft IE CSS Import Handling Remote DoS
14949| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
14950| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
14951| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
14952| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
14953| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
14954| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
14955| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
14956| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
14957| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
14958| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
14959| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
14960| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
14961| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
14962| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
14963| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
14964| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
14965| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
14966| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
14967| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
14968| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
14969| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
14970| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
14971| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
14972| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
14973| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
14974| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
14975| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
14976| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
14977| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
14978| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
14979| [91150] Microsoft SharePoint Unspecified XSS
14980| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
14981| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
14982| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
14983| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
14984| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
14985| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
14986| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
14987| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
14988| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
14989| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
14990| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
14991| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
14992| [90933] Microsoft IE Arbitrary HTM File Execution
14993| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
14994| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
14995| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
14996| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
14997| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
14998| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
14999| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
15000| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
15001| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
15002| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
15003| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
15004| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
15005| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
15006| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
15007| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
15008| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
15009| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
15010| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
15011| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
15012| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
15013| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
15014| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
15015| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
15016| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
15017| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
15018| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
15019| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
15020| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
15021| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
15022| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
15023| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
15024| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
15025| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
15026| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
15027| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
15028| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
15029| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
15030| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
15031| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
15032| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
15033| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
15034| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
15035| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
15036| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
15037| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
15038| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
15039| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
15040| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
15041| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
15042| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
15043| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
15044| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
15045| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
15046| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
15047| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
15048| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
15049| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
15050| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
15051| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
15052| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
15053| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
15054| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
15055| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
15056| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
15057| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
15058| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
15059| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
15060| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
15061| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
15062| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
15063| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
15064| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
15065| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
15066| [88837] Microsoft Office Excel Memory Corruption DoS
15067| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
15068| [88811] Microsoft Visio VSD File Parsing Memory Corruption
15069| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
15070| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
15071| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
15072| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
15073| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
15074| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
15075| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
15076| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
15077| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
15078| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
15079| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
15080| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
15081| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
15082| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
15083| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
15084| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
15085| [87819] Microsoft Office OneNote File Handling Memory Corruption
15086| [87273] Microsoft Office Excel XLS File Handling Overflow
15087| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
15088| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
15089| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
15090| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
15091| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
15092| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
15093| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
15094| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
15095| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
15096| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
15097| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
15098| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
15099| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
15100| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
15101| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
15102| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
15103| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
15104| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
15105| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
15106| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
15107| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
15108| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
15109| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
15110| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
15111| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
15112| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
15113| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
15114| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
15115| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
15116| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
15117| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
15118| [86732] Microsoft Office DOC File Handling Stack Overflow
15119| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
15120| [86622] Microsoft SQL Server Local Authentication Bypass
15121| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
15122| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
15123| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
15124| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
15125| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
15126| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
15127| [86057] Microsoft SQL Server Report Manager Unspecified XSS
15128| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
15129| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
15130| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
15131| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
15132| [85833] Microsoft Outlook Concealed Attachment Weakness
15133| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
15134| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
15135| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
15136| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
15137| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
15138| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
15139| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
15140| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
15141| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
15142| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
15143| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
15144| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
15145| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
15146| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
15147| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
15148| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
15149| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
15150| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
15151| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
15152| [84606] Microsoft Visio DXF File Handling Overflow
15153| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
15154| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
15155| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
15156| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
15157| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
15158| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
15159| [84599] Microsoft Windows Print Spooler Service Remote Format String
15160| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
15161| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
15162| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
15163| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
15164| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
15165| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
15166| [84553] Microsoft Help &
15167| [83860] Microsoft IE XML Data Handling Arbitrary File Access
15168| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
15169| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
15170| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
15171| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
15172| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
15173| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
15174| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
15175| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
15176| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
15177| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
15178| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
15179| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
15180| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
15181| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
15182| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
15183| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
15184| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
15185| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
15186| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
15187| [83647] Microsoft SharePoint Username Unspecified XSS
15188| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
15189| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
15190| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
15191| [83439] Microsoft IE Long Unicode String Handling DoS
15192| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
15193| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
15194| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
15195| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
15196| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
15197| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
15198| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
15199| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
15200| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
15201| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
15202| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
15203| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
15204| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
15205| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
15206| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
15207| [82862] Microsoft IE EUC-JP Character Encoding XSS
15208| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
15209| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
15210| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
15211| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
15212| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
15213| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
15214| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
15215| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
15216| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
15217| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
15218| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
15219| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
15220| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
15221| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
15222| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
15223| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
15224| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
15225| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
15226| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
15227| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
15228| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
15229| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
15230| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
15231| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
15232| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
15233| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
15234| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
15235| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
15236| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
15237| [81732] Microsoft Office RTF Data Handling Memory Corruption
15238| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
15239| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
15240| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
15241| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
15242| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
15243| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
15244| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
15245| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
15246| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
15247| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
15248| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
15249| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
15250| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
15251| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
15252| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
15253| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
15254| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
15255| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
15256| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
15257| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
15258| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
15259| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
15260| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
15261| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
15262| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
15263| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
15264| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
15265| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
15266| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
15267| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
15268| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
15269| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
15270| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
15271| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
15272| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
15273| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
15274| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
15275| [80173] Microsoft IE Unspecified Overflow
15276| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
15277| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
15278| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
15279| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
15280| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
15281| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
15282| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
15283| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
15284| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
15285| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
15286| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
15287| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
15288| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
15289| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
15290| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
15291| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
15292| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
15293| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
15294| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
15295| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
15296| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
15297| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
15298| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
15299| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
15300| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
15301| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
15302| [79192] Microsoft IE Javascript Dialog Origin Spoofing
15303| [79186] Microsoft IE onunload Location Field Overwrite
15304| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
15305| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
15306| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
15307| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
15308| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
15309| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
15310| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
15311| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
15312| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
15313| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
15314| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
15315| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
15316| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
15317| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
15318| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
15319| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
15320| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
15321| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
15322| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
15323| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
15324| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
15325| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
15326| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
15327| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
15328| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
15329| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
15330| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
15331| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
15332| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
15333| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
15334| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
15335| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
15336| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
15337| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
15338| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
15339| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
15340| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
15341| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
15342| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
15343| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
15344| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
15345| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
15346| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
15347| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
15348| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
15349| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
15350| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
15351| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
15352| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
15353| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
15354| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
15355| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
15356| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
15357| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
15358| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
15359| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
15360| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
15361| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
15362| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
15363| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
15364| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
15365| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
15366| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
15367| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
15368| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
15369| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
15370| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
15371| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
15372| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
15373| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
15374| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
15375| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
15376| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
15377| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
15378| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
15379| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
15380| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
15381| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
15382| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
15383| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
15384| [75393] Microsoft SharePoint Unspecified URI XSS
15385| [75391] Microsoft SharePoint Contact Details XSS
15386| [75390] Microsoft SharePoint EditForm.aspx XSS
15387| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
15388| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
15389| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
15390| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
15391| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
15392| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
15393| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
15394| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
15395| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
15396| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
15397| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
15398| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
15399| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
15400| [75250] Microsoft IE Unspecified Remote Code Execution
15401| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
15402| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
15403| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
15404| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
15405| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
15406| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
15407| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
15408| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
15409| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
15410| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
15411| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
15412| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
15413| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
15414| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
15415| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
15416| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
15417| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
15418| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
15419| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
15420| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
15421| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
15422| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
15423| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
15424| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
15425| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
15426| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
15427| [74396] Microsoft Report Viewer Control Unspecified XSS
15428| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
15429| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
15430| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
15431| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
15432| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
15433| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
15434| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
15435| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
15436| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
15437| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
15438| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
15439| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
15440| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
15441| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
15442| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
15443| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
15444| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
15445| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
15446| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
15447| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
15448| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
15449| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
15450| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
15451| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
15452| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
15453| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
15454| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
15455| [73602] Microsoft Windows nsiproxy.sys Local DoS
15456| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
15457| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
15458| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
15459| [72960] Microsoft SMB Client Response Handling Remote Code Execution
15460| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
15461| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
15462| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
15463| [72953] Microsoft IE MIME Sniffing Information Disclosure
15464| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
15465| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
15466| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
15467| [72949] Microsoft IE Drag and Drop Information Disclosure
15468| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
15469| [72947] Microsoft IE Time Element Memory Corruption
15470| [72946] Microsoft IE Drag and Drop Memory Corruption
15471| [72944] Microsoft IE SafeHTML Function XSS
15472| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
15473| [72942] Microsoft IE Link Properties Handling Memory Corruption
15474| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
15475| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
15476| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
15477| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
15478| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
15479| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
15480| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
15481| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
15482| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
15483| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
15484| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
15485| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
15486| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
15487| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
15488| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
15489| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
15490| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
15491| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
15492| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
15493| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
15494| [72696] Microsoft Reader AOLL Chunk Array Overflow
15495| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
15496| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
15497| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
15498| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
15499| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
15500| [72680] Microsoft IE UTF-7 Local Redirection XSS
15501| [72679] Microsoft IE Tags javascript:[jscodz] XSS
15502| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
15503| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
15504| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
15505| [72672] Microsoft Windows AppFix systest.sdb Local DoS
15506| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
15507| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
15508| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
15509| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
15510| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
15511| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
15512| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
15513| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
15514| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
15515| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
15516| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
15517| [71777] Microsoft IE Frame Tag Handling Information Disclosure
15518| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
15519| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
15520| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
15521| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
15522| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
15523| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
15524| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
15525| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
15526| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
15527| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
15528| [71765] Microsoft Office Excel File Validation Record Handling Overflow
15529| [71761] Microsoft Office Excel File Handling Memory Corruption
15530| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
15531| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
15532| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
15533| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
15534| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
15535| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
15536| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
15537| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
15538| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
15539| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
15540| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
15541| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
15542| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
15543| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
15544| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
15545| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
15546| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
15547| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
15548| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
15549| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
15550| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
15551| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
15552| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
15553| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
15554| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
15555| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
15556| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
15557| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
15558| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
15559| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
15560| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
15561| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
15562| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
15563| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
15564| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
15565| [71724] Microsoft IE Layouts Handling Memory Corruption
15566| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
15567| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
15568| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
15569| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
15570| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
15571| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
15572| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
15573| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
15574| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
15575| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
15576| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
15577| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
15578| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
15579| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
15580| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
15581| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
15582| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
15583| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
15584| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
15585| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
15586| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
15587| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
15588| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
15589| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
15590| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
15591| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
15592| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
15593| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
15594| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
15595| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
15596| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
15597| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
15598| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
15599| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
15600| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
15601| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
15602| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
15603| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
15604| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
15605| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
15606| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
15607| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
15608| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
15609| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
15610| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
15611| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
15612| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
15613| [69828] Microsoft IE Recursive Select Element Remote Code Execution
15614| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
15615| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
15616| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
15617| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
15618| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
15619| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
15620| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
15621| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
15622| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
15623| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
15624| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
15625| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
15626| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
15627| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
15628| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
15629| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
15630| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
15631| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
15632| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
15633| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
15634| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
15635| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
15636| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
15637| [69804] Microsoft Office PICT Image Converter Overflow
15638| [69803] Microsoft Office CGM Image Converter Overflow
15639| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
15640| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
15641| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
15642| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
15643| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
15644| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
15645| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
15646| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
15647| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
15648| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
15649| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
15650| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
15651| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
15652| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
15653| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
15654| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
15655| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
15656| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
15657| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
15658| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
15659| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
15660| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
15661| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
15662| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
15663| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
15664| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
15665| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
15666| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
15667| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
15668| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
15669| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
15670| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
15671| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
15672| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
15673| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
15674| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
15675| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
15676| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
15677| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
15678| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
15679| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
15680| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
15681| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
15682| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
15683| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
15684| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
15685| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
15686| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
15687| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
15688| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
15689| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
15690| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
15691| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
15692| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
15693| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
15694| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
15695| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
15696| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
15697| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
15698| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
15699| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
15700| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
15701| [68548] Microsoft IE / SharePoint Unspecified XSS
15702| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
15703| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
15704| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
15705| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
15706| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
15707| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
15708| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
15709| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
15710| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
15711| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
15712| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
15713| [68438] Microsoft XSS Filter Library Bypass
15714| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
15715| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
15716| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
15717| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
15718| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
15719| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
15720| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
15721| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
15722| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
15723| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
15724| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
15725| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
15726| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
15727| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
15728| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
15729| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
15730| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
15731| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
15732| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
15733| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
15734| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
15735| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
15736| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
15737| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
15738| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
15739| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
15740| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
15741| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
15742| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
15743| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
15744| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
15745| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
15746| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
15747| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
15748| [67463] Microsoft IE location.replace Address Bar Spoofing
15749| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
15750| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
15751| [67258] Microsoft ClickOnce MITM Weakness
15752| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
15753| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
15754| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
15755| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
15756| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
15757| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
15758| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
15759| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
15760| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
15761| [67000] Microsoft IE boundElements Property Handling Memory Corruption
15762| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
15763| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
15764| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
15765| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
15766| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
15767| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
15768| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
15769| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
15770| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
15771| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
15772| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
15773| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
15774| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
15775| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
15776| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
15777| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
15778| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
15779| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
15780| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
15781| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
15782| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
15783| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
15784| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
15785| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
15786| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
15787| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
15788| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
15789| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
15790| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
15791| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
15792| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
15793| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
15794| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
15795| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
15796| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
15797| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
15798| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
15799| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
15800| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
15801| [65502] Microsoft IE Unspecified DoS
15802| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
15803| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
15804| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
15805| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
15806| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
15807| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
15808| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
15809| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
15810| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
15811| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
15812| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
15813| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
15814| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
15815| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
15816| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
15817| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
15818| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
15819| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
15820| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
15821| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
15822| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
15823| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
15824| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
15825| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
15826| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
15827| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
15828| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
15829| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
15830| [65213] Microsoft IE HTML Element Handling Memory Corruption
15831| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
15832| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
15833| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
15834| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
15835| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
15836| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
15837| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
15838| [64952] Microsoft IE img Tag Hijacking Weakness
15839| [64944] Microsoft Dynamics GP Default System Password
15840| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
15841| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
15842| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
15843| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
15844| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
15845| [64828] Microsoft IE history go ActiveX Overflow DoS
15846| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
15847| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
15848| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
15849| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
15850| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
15851| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
15852| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
15853| [64533] Microsoft IE document.createElement NULL Dereference DoS
15854| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
15855| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
15856| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
15857| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
15858| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
15859| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
15860| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
15861| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
15862| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
15863| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
15864| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
15865| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
15866| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
15867| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
15868| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
15869| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
15870| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
15871| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
15872| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
15873| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
15874| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
15875| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
15876| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
15877| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
15878| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
15879| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
15880| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
15881| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
15882| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
15883| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
15884| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
15885| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
15886| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
15887| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
15888| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
15889| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
15890| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
15891| [63334] Microsoft IE Post Encoding Information Disclosure
15892| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
15893| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
15894| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
15895| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
15896| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
15897| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
15898| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
15899| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
15900| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
15901| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
15902| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
15903| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
15904| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
15905| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
15906| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
15907| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
15908| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
15909| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
15910| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
15911| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
15912| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
15913| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
15914| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
15915| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
15916| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
15917| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
15918| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
15919| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
15920| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
15921| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
15922| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
15923| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
15924| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
15925| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
15926| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
15927| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
15928| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
15929| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
15930| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
15931| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
15932| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
15933| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
15934| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
15935| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
15936| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
15937| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
15938| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
15939| [62239] Microsoft Office Powerpoint File Path Handling Overflow
15940| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
15941| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
15942| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
15943| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
15944| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
15945| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
15946| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
15947| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
15948| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
15949| [61911] Microsoft IE Table Layout Reuse Memory Corruption
15950| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
15951| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
15952| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
15953| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
15954| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
15955| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
15956| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
15957| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
15958| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
15959| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
15960| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
15961| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
15962| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
15963| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
15964| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
15965| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
15966| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
15967| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
15968| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
15969| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
15970| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
15971| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
15972| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
15973| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
15974| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
15975| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
15976| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
15977| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
15978| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
15979| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
15980| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
15981| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
15982| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
15983| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
15984| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
15985| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
15986| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
15987| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
15988| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
15989| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
15990| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
15991| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
15992| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
15993| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
15994| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
15995| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
15996| [59957] Microsoft Windows SMB Response Handling Remote DoS
15997| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
15998| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
15999| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
16000| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
16001| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
16002| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
16003| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
16004| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
16005| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
16006| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
16007| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
16008| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
16009| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
16010| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
16011| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
16012| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
16013| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
16014| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
16015| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
16016| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
16017| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
16018| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
16019| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
16020| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
16021| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
16022| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
16023| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
16024| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
16025| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
16026| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
16027| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
16028| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
16029| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
16030| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
16031| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
16032| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
16033| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
16034| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
16035| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
16036| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
16037| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
16038| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
16039| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
16040| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
16041| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
16042| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
16043| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
16044| [59263] Microsoft IE IMG Tag width Handling DoS
16045| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
16046| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
16047| [59258] Microsoft Exchange ACL Modification Update Weakness
16048| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
16049| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
16050| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
16051| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
16052| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
16053| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
16054| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
16055| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
16056| [58870] Microsoft Office BMP Image Color Processing Overflow
16057| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
16058| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
16059| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
16060| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
16061| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
16062| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
16063| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
16064| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
16065| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
16066| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
16067| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
16068| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
16069| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
16070| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
16071| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
16072| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
16073| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
16074| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
16075| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
16076| [58843] Microsoft Windows Media Player ASF Handling Overflow
16077| [58817] Microsoft IE Nested marquee Tag Handling DoS
16078| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
16079| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
16080| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
16081| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
16082| [58399] Microsoft IE window.print Function Loop Remote DoS
16083| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
16084| [58350] Microsoft Patterns &
16085| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
16086| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
16087| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
16088| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
16089| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
16090| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
16091| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
16092| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
16093| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
16094| [57742] Microsoft SQL Cleartext User Passwords Disclosure
16095| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
16096| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
16097| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
16098| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
16099| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
16100| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
16101| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
16102| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
16103| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
16104| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
16105| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
16106| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
16107| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
16108| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
16109| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
16110| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
16111| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
16112| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
16113| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
16114| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
16115| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
16116| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
16117| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
16118| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
16119| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
16120| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
16121| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
16122| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
16123| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
16124| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
16125| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
16126| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
16127| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
16128| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
16129| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
16130| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
16131| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
16132| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
16133| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
16134| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
16135| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
16136| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
16137| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
16138| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
16139| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
16140| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
16141| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
16142| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
16143| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
16144| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
16145| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
16146| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
16147| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
16148| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
16149| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
16150| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
16151| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
16152| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
16153| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
16154| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
16155| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
16156| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
16157| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
16158| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
16159| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
16160| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
16161| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
16162| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
16163| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
16164| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
16165| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
16166| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
16167| [54955] Microsoft Office Excel Malformed Records Handling Overflow
16168| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
16169| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
16170| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
16171| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
16172| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
16173| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
16174| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
16175| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
16176| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
16177| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
16178| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
16179| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
16180| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
16181| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
16182| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
16183| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
16184| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
16185| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
16186| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
16187| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
16188| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
16189| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
16190| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
16191| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
16192| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
16193| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
16194| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
16195| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
16196| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
16197| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
16198| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
16199| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
16200| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
16201| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
16202| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
16203| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
16204| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
16205| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
16206| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
16207| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
16208| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
16209| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
16210| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
16211| [54183] Microsoft IE Unprintable Character Document Handling DoS
16212| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
16213| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
16214| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
16215| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
16216| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
16217| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
16218| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
16219| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
16220| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
16221| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
16222| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
16223| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
16224| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
16225| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
16226| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
16227| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
16228| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
16229| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
16230| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
16231| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
16232| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
16233| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
16234| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
16235| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
16236| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
16237| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
16238| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
16239| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
16240| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
16241| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
16242| [52694] Microsoft Windows Media Player Malformed GET Request DoS
16243| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
16244| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
16245| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
16246| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
16247| [52689] Microsoft Word Document Handling HTML Object Tag DoS
16248| [52688] Microsoft Word Document Handling HTML Object Tag XSS
16249| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
16250| [52685] Microsoft Windows FTP Client Multiple Command Overflows
16251| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
16252| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
16253| [52682] Microsoft Windows Explorer ZIP Handler DoS
16254| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
16255| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
16256| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
16257| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
16258| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
16259| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
16260| [52666] Microsoft IE Malformed file:// URI Handling DoS
16261| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
16262| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
16263| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
16264| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
16265| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
16266| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
16267| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
16268| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
16269| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
16270| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
16271| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
16272| [52517] Microsoft Windows DNS Server Query Validation Spoofing
16273| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
16274| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
16275| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
16276| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
16277| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
16278| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
16279| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
16280| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
16281| [51433] Microsoft Windows Crafted CHM File Handling Overflow
16282| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
16283| [51277] Microsoft Excel HTML Tag Interpretation XSS
16284| [51259] Microsoft IE onload=screen["
16285| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
16286| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
16287| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
16288| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
16289| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
16290| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
16291| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
16292| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
16293| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
16294| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
16295| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
16296| [50598] Microsoft Office Word Table Property Handling Overflow
16297| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
16298| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
16299| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
16300| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
16301| [50592] Microsoft Office Word Malformed Value Memory Corruption
16302| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
16303| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
16304| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
16305| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
16306| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
16307| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
16308| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
16309| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
16310| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
16311| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
16312| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
16313| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
16314| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
16315| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
16316| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
16317| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
16318| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
16319| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
16320| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
16321| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
16322| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
16323| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
16324| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
16325| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
16326| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
16327| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
16328| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
16329| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
16330| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
16331| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
16332| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
16333| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
16334| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
16335| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
16336| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
16337| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
16338| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
16339| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
16340| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
16341| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
16342| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
16343| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
16344| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
16345| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
16346| [49385] Microsoft ASP.NET Request Validation <
16347| [49384] Microsoft ASP.NET Request Validation <
16348| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
16349| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
16350| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
16351| [49118] Microsoft IE HTML Object Handling Memory Corruption
16352| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
16353| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
16354| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
16355| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
16356| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
16357| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
16358| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
16359| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
16360| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
16361| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
16362| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
16363| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
16364| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
16365| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
16366| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
16367| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
16368| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
16369| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
16370| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
16371| [48837] Microsoft Windows Vista Page Fault Handling DoS
16372| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
16373| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
16374| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
16375| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
16376| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
16377| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
16378| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
16379| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
16380| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
16381| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
16382| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
16383| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
16384| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
16385| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
16386| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
16387| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
16388| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
16389| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
16390| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
16391| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
16392| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
16393| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
16394| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
16395| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
16396| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
16397| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
16398| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
16399| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
16400| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
16401| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
16402| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
16403| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
16404| [47410] Microsoft Office Excel connections.xml Password String Persistence
16405| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
16406| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
16407| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
16408| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
16409| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
16410| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
16411| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
16412| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
16413| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
16414| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
16415| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
16416| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
16417| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
16418| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
16419| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
16420| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
16421| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
16422| [46935] Microsoft IE Pop Up Blocker Multiple Issues
16423| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
16424| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
16425| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
16426| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
16427| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
16428| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
16429| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
16430| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
16431| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
16432| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
16433| [46772] Microsoft SQL Server Convert Function Overflow
16434| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
16435| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
16436| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
16437| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
16438| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
16439| [46630] Microsoft IE location Window Object Handling XSS
16440| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
16441| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
16442| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
16443| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
16444| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
16445| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
16446| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
16447| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
16448| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
16449| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
16450| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
16451| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
16452| [45826] Microsoft IE Local Zone Saved File URI XSS
16453| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
16454| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
16455| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
16456| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
16457| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
16458| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
16459| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
16460| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
16461| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
16462| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
16463| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
16464| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
16465| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
16466| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
16467| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
16468| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
16469| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
16470| [45262] Microsoft ISA Server Host Header Log File Content Injection
16471| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
16472| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
16473| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
16474| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
16475| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
16476| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
16477| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
16478| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
16479| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
16480| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
16481| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
16482| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
16483| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
16484| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
16485| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
16486| [44979] Microsoft SQL Server Blank sa Password Set Weakness
16487| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
16488| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
16489| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
16490| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
16491| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
16492| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
16493| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
16494| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
16495| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
16496| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
16497| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
16498| [44303] Microsoft IE body Tag Infinite Loop DoS
16499| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
16500| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
16501| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
16502| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
16503| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
16504| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
16505| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
16506| [44205] Microsoft IE Data Stream Handling Memory Corruption
16507| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
16508| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
16509| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
16510| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
16511| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
16512| [44150] Microsoft Access Crafted MDB File Handling Overflow
16513| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
16514| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
16515| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
16516| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
16517| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
16518| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
16519| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
16520| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
16521| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
16522| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
16523| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
16524| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
16525| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
16526| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
16527| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
16528| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
16529| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
16530| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
16531| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
16532| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
16533| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
16534| [42724] Microsoft Excel Style Record Handling Memory Corruption
16535| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
16536| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
16537| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
16538| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
16539| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
16540| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
16541| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
16542| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
16543| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
16544| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
16545| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
16546| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
16547| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
16548| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
16549| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
16550| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
16551| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
16552| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
16553| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
16554| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
16555| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
16556| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
16557| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
16558| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
16559| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
16560| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
16561| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
16562| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
16563| [41155] Microsoft Windows Hardware-enforced DEP Bypass
16564| [41154] Microsoft Windows XP EFS Cleartext Password Storage
16565| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
16566| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
16567| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
16568| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
16569| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
16570| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
16571| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
16572| [41060] Microsoft .NET Unspecified XSS Filter Bypass
16573| [41059] Microsoft Windows ARP Saturation Remote DoS
16574| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
16575| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
16576| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
16577| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
16578| [41041] Microsoft IE Mouse Click self.resizeTo DoS
16579| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
16580| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
16581| [41035] Microsoft IE onload Localhost DoS
16582| [41026] Microsoft IE GET Request Overflow
16583| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
16584| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
16585| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
16586| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
16587| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
16588| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
16589| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
16590| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
16591| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
16592| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
16593| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
16594| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
16595| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
16596| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
16597| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
16598| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
16599| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
16600| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
16601| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
16602| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
16603| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
16604| [39121] Microsoft IE DHTML Object Memory Corruption
16605| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
16606| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
16607| [39118] Microsoft IE Object setExpression Function Memory Corruption
16608| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
16609| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
16610| [38955] Microsoft IE history.length Variable History Disclosure
16611| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
16612| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
16613| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
16614| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
16615| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
16616| [38495] Microsoft IE Outlook Express Address Book Activex DoS
16617| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
16618| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
16619| [38488] Microsoft ISA Server File Extension Filter Bypass
16620| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
16621| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
16622| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
16623| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
16624| [38212] Microsoft IE document.open() Function Address Bar Spoofing
16625| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
16626| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
16627| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
16628| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
16629| [37637] Microsoft Windows Crafted HLP File Overflow
16630| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
16631| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
16632| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
16633| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
16634| [37632] Microsoft Word Unspecified Memory Corruption
16635| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
16636| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
16637| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
16638| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
16639| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
16640| [37626] Microsoft IE Unspecified Address Bar Spoofing
16641| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
16642| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
16643| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
16644| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
16645| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
16646| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
16647| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
16648| [36936] Microsoft Visual Basic VBP File Handling Overflow
16649| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
16650| [36934] Microsoft Agent URL Handling Remote Code Execution
16651| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
16652| [36400] Microsoft IE HTML FTP Credential Disclosure
16653| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
16654| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
16655| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
16656| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
16657| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
16658| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
16659| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
16660| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
16661| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
16662| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
16663| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
16664| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
16665| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
16666| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
16667| [36385] Microsoft Windows Media Player Skin File Handling Overflow
16668| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
16669| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
16670| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
16671| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
16672| [36147] Microsoft IE Zone Domain Specification DoS
16673| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
16674| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
16675| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
16676| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
16677| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
16678| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
16679| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
16680| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
16681| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
16682| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
16683| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
16684| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
16685| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
16686| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
16687| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
16688| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
16689| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
16690| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
16691| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
16692| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
16693| [35637] Microsoft Windows Unspecified Remote Code Execution
16694| [35568] Microsoft IE Script Variable Length DoS
16695| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
16696| [35352] Microsoft IE navcancl.htm res: URI Phishing
16697| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
16698| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
16699| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
16700| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
16701| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
16702| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
16703| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
16704| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
16705| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
16706| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
16707| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
16708| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
16709| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
16710| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
16711| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
16712| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
16713| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
16714| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
16715| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
16716| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
16717| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
16718| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
16719| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
16720| [34401] Microsoft IE Property Method Handling Memory Corruption
16721| [34400] Microsoft IE Uninitialized Object Memory Corruption
16722| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
16723| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
16724| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
16725| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
16726| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
16727| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
16728| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
16729| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
16730| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
16731| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
16732| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
16733| [34387] Microsoft Word Data Array Handling Remote Code Execution
16734| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
16735| [34385] Microsoft Word Macro Content Arbitrary Code Execution
16736| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
16737| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
16738| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
16739| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
16740| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
16741| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
16742| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
16743| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
16744| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
16745| [34077] Microsoft IE navcancl.htm res: URI XSS
16746| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
16747| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
16748| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
16749| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
16750| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
16751| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
16752| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
16753| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
16754| [33667] Microsoft Windows Vista Persistent Established Teredo Address
16755| [33666] Microsoft Windows Vista Teredo nonce Spoofing
16756| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
16757| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
16758| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
16759| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
16760| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
16761| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
16762| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
16763| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
16764| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
16765| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
16766| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
16767| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
16768| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
16769| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
16770| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
16771| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
16772| [33271] Microsoft Word Crafted Frame CSRF
16773| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
16774| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
16775| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
16776| [32630] Microsoft IE Key Press Event Focus Redirection
16777| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
16778| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
16779| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
16780| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
16781| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
16782| [32624] Microsoft IE mhtml Overflow DoS
16783| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
16784| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
16785| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
16786| [32087] Microsoft IE onunload Event Address Bar Spoofing
16787| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
16788| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
16789| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
16790| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
16791| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
16792| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
16793| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
16794| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
16795| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
16796| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
16797| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
16798| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
16799| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
16800| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
16801| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
16802| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
16803| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
16804| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
16805| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
16806| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
16807| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
16808| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
16809| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
16810| [31645] Microsoft Windows DNS Recursive Query DoS
16811| [31333] Microsoft IE Image File Embedded Content XSS
16812| [31332] Microsoft IE Scrollbar CSS Property DoS
16813| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
16814| [31330] Microsoft IE File:// URI src Tag IFrame DoS
16815| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
16816| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
16817| [31326] Microsoft IE HTML Table Tag style Attribute DoS
16818| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
16819| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
16820| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
16821| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
16822| [31321] Microsoft IE Javascript self.location Refresh DoS
16823| [31258] Microsoft Excel Palette Record Handling Overflow
16824| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
16825| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
16826| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
16827| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
16828| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
16829| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
16830| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
16831| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
16832| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
16833| [30997] Microsoft Windows .manifest File Handling Local DoS
16834| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
16835| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
16836| [30826] Microsoft Visual Basic Click Event Procedure Overflow
16837| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
16838| [30824] Microsoft Word Malformed String Memory Corruption
16839| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
16840| [30822] Microsoft IE A Tag Long Title Attribute DoS
16841| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
16842| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
16843| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
16844| [30818] Microsoft Windows Media Player ASF Parsing Overflow
16845| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
16846| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
16847| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
16848| [30814] Microsoft IE DHTML Script Function Memory Corruption
16849| [30813] Microsoft IE Script Error Handling Memory Corruption
16850| [30811] Microsoft Windows SNMP Service Remote Overflow
16851| [30405] Microsoft Windows Active Directory Unspecified DoS
16852| [30402] Microsoft w3wp Crafted COM Component Request DoS
16853| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
16854| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
16855| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
16856| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
16857| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
16858| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
16859| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
16860| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
16861| [30087] Microsoft IE Empty APPLET Tag DoS
16862| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
16863| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
16864| [29720] Microsoft PowerPoint Unspecified Code Execution
16865| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
16866| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
16867| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
16868| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
16869| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
16870| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
16871| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
16872| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
16873| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
16874| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
16875| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
16876| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
16877| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
16878| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
16879| [29440] Microsoft Word memmove Integer Overflow
16880| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
16881| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
16882| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
16883| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
16884| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
16885| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
16886| [29426] Microsoft XML Core Services XSLT Processing Overflow
16887| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
16888| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
16889| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
16890| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
16891| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
16892| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
16893| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
16894| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
16895| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
16896| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
16897| [29129] Microsoft IE wininet.dll Content-Type DoS
16898| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
16899| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
16900| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
16901| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
16902| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
16903| [28730] Microsoft Publisher PUB File Font Parsing Overflow
16904| [28729] Microsoft Windows Indexing Service Unspecified XSS
16905| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
16906| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
16907| [28723] Microsoft Works Malformed Works Spreadsheet DoS
16908| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
16909| [28614] Microsoft IE input/div Tag width Conflict DoS
16910| [28539] Microsoft Word 2000 Unspecified Code Execution
16911| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
16912| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
16913| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
16914| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
16915| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
16916| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
16917| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
16918| [28381] Microsoft IE ActiveX SaveFile Handling DoS
16919| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
16920| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
16921| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
16922| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
16923| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
16924| [27854] Microsoft IE Chained CSS Imports Memory Corruption
16925| [27853] Microsoft IE HTML Rendering Memory Corruption
16926| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
16927| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
16928| [27850] Microsoft IE Cross Site Window Location Information Disclosure
16929| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
16930| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
16931| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
16932| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
16933| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
16934| [27844] Microsoft Windows DNS Client Service Record Response Overflow
16935| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
16936| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
16937| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
16938| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
16939| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
16940| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
16941| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
16942| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
16943| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
16944| [27373] Microsoft IE Native Function Iteration NULL Dereference
16945| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
16946| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
16947| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
16948| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
16949| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
16950| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
16951| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
16952| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
16953| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
16954| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
16955| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
16956| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
16957| [27150] Microsoft Office MSO.DLL String Processing Overflow
16958| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
16959| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
16960| [27147] Microsoft Office PNG Processing Unspecified Code Execution
16961| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
16962| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
16963| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
16964| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
16965| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
16966| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
16967| [27059] Microsoft IE FolderItem Object NULL Dereference
16968| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
16969| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
16970| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
16971| [27053] Microsoft Excel Asian Language Style Option Overflow
16972| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
16973| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
16974| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
16975| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
16976| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
16977| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
16978| [26837] Microsoft IE Frameset inside Table NULL Dereference
16979| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
16980| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
16981| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
16982| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
16983| [26527] Microsoft Excel Malformed URL String Handling Overflow
16984| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
16985| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
16986| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
16987| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
16988| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
16989| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
16990| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
16991| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
16992| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
16993| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
16994| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
16995| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
16996| [26434] Microsoft JScript Object Release Memory Corruption
16997| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
16998| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
16999| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
17000| [26430] Microsoft Windows Media Player PNG Processing Overflow
17001| [26193] Microsoft NetMeeting Unspecified Remote DoS
17002| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
17003| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
17004| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
17005| [25635] Microsoft Word Unspecified Code Execution
17006| [25501] Microsoft Windows itss.dll CHM Processing Overflow
17007| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
17008| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
17009| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
17010| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
17011| [25003] Microsoft Office mailto: Arbitrary File Access
17012| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
17013| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
17014| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
17015| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
17016| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
17017| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
17018| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
17019| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
17020| [24542] Microsoft IE Unspecified Address Bar Spoofing
17021| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
17022| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
17023| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
17024| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
17025| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
17026| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
17027| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
17028| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
17029| [24208] Microsoft .NET Framework ILDASM Overflow
17030| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
17031| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
17032| [24095] Microsoft IE Arbitrary HTA File Execution
17033| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
17034| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
17035| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
17036| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
17037| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
17038| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
17039| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
17040| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
17041| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
17042| [23657] Microsoft IE ActiveX Killbit Setting Bypass
17043| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
17044| [23608] Microsoft IE Iframe Folder Delete Weakness
17045| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
17046| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
17047| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
17048| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
17049| [23307] Microsoft IE window.status Memory Leak DoS
17050| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
17051| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
17052| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
17053| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
17054| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
17055| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
17056| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
17057| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
17058| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
17059| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
17060| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
17061| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
17062| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
17063| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
17064| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
17065| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
17066| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
17067| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
17068| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
17069| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
17070| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
17071| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
17072| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
17073| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
17074| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
17075| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
17076| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
17077| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
17078| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
17079| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
17080| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
17081| [22354] Microsoft IE Malformed table datasrc Tag DoS
17082| [22351] Microsoft IE Modal Security Dialog Race Condition
17083| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
17084| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
17085| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
17086| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
17087| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
17088| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
17089| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
17090| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
17091| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
17092| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
17093| [21562] Microsoft IE CSS Crafted p Element DoS
17094| [21536] Microsoft Windows backup File Name Extension Overflow
17095| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
17096| [21510] Microsoft Windows SynAttackProtect Bypass
17097| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
17098| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
17099| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
17100| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
17101| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
17102| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
17103| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
17104| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
17105| [20497] Microsoft Windows 98SE User32.dll Icon DoS
17106| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
17107| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
17108| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
17109| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
17110| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
17111| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
17112| [20271] Microsoft IE settimeout Function Recursion DoS
17113| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
17114| [20248] Microsoft IE Embedded Content Processing XSS
17115| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
17116| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
17117| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
17118| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
17119| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
17120| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
17121| [20199] Microsoft IE Image Saturation Handling DoS
17122| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
17123| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
17124| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
17125| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
17126| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
17127| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
17128| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
17129| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
17130| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
17131| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
17132| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
17133| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
17134| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
17135| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
17136| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
17137| [19905] Microsoft Collaboration Data Objects Remote Overflow
17138| [19904] Microsoft Windows DTC Packet Relay DoS
17139| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
17140| [19902] Microsoft Windows COM+ Remote Code Execution
17141| [19901] Microsoft Windows FTP Client Arbitrary File Write
17142| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
17143| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
17144| [19898] Microsoft Windows Web View Arbitrary Script Injection
17145| [19876] Microsoft AntiSpyware Registry Extension Bypass
17146| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
17147| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
17148| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
17149| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
17150| [19796] Microsoft IE Malformed IFRAME File Source DoS
17151| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
17152| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
17153| [19662] Microsoft IE XMLHTTP HTTP Request Injection
17154| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
17155| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
17156| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
17157| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
17158| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
17159| [19089] Microsoft IE Unspecified Remote Code Execution
17160| [19029] Microsoft IE Meta Refresh Parsing Weakness
17161| [19024] Microsoft IE Automatic MIME Detection Weakness
17162| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
17163| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
17164| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
17165| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
17166| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
17167| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
17168| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
17169| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
17170| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
17171| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
17172| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
17173| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
17174| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
17175| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
17176| [18681] Microsoft Windows XP User Account Manager Hidden User
17177| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
17178| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
17179| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
17180| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
17181| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
17182| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
17183| [18607] Microsoft Windows Print Spooler Service Remote Overflow
17184| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
17185| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
17186| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
17187| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
17188| [18493] Microsoft Windows USB Device Driver Overflow
17189| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
17190| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
17191| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
17192| [18459] Microsoft ActiveSync Sync Request Saturation DoS
17193| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
17194| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
17195| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
17196| [18152] Microsoft IE Image File Handling Remote DoS
17197| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
17198| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
17199| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
17200| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
17201| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
17202| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
17203| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
17204| [17829] Microsoft Office .doc Font Parsing Overflow
17205| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
17206| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
17207| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
17208| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
17209| [17707] Microsoft Front Page Malformed HTML Edit DoS
17210| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
17211| [17671] Microsoft Site Server viewcode.asp Information Disclosure
17212| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
17213| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
17214| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
17215| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
17216| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
17217| [17665] Microsoft Site Server Default.asp XSS
17218| [17664] Microsoft Site Server remind.asp Information Disclosure
17219| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
17220| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
17221| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
17222| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
17223| [17659] Microsoft Site Server vs.asp Information Disclosure
17224| [17658] Microsoft Site Server default.asp Information Disclosure
17225| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
17226| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
17227| [17655] Microsoft Site Server DSN.asp Information Disclosure
17228| [17654] Microsoft Site Server driver.asp Information Disclosure
17229| [17653] Microsoft Site Server domain.asp Information Disclosure
17230| [17652] Microsoft Site Server findserver.asp Information Disclosure
17231| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
17232| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
17233| [17342] Microsoft ISA Server Basic Credentials Exposure
17234| [17334] Microsoft IE Script Code Obfuscation (Ghost)
17235| [17314] Microsoft IE XML Redirect Information Disclosure
17236| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
17237| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
17238| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
17239| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
17240| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
17241| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
17242| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
17243| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
17244| [17305] Microsoft Windows HTML Help (CHM) File Overflow
17245| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
17246| [17218] Microsoft IE Stack Overflow Saturation DoS
17247| [17217] Microsoft IE Embedded File Recursion DoS
17248| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
17249| [17159] Microsoft IE Malformed FTP URL DoS
17250| [17158] Microsoft IE Crafted BMP Size Setting DoS
17251| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
17252| [17094] Microsoft IE window() Function Arbitrary Code Execution
17253| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
17254| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
17255| [16827] Microsoft WGA Multiple Method Validation Bypass
17256| [16814] Microsoft Word mcw File Processing Overflow
17257| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
17258| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
17259| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
17260| [16342] Microsoft IE Cross Site Mouse Click Disclosure
17261| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
17262| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
17263| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
17264| [15757] Microsoft SQL Server sa Account Default Null Password
17265| [15739] Microsoft Windows Malformed Image Rendering DoS
17266| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
17267| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
17268| [15480] Microsoft Outlook From Header Comma Parsing Failure
17269| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
17270| [15470] Microsoft Word Unspecified Overflow
17271| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
17272| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
17273| [15466] Microsoft IE Content Advisor Overflow
17274| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
17275| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
17276| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
17277| [15462] Microsoft Windows CSRSS Local Overflow
17278| [15461] Microsoft Windows Object Management Malformed Request DoS
17279| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
17280| [15459] Microsoft Windows Font Processing Local Privilege Escalation
17281| [15458] Microsoft Windows Message Queuing Remote Overflow
17282| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
17283| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
17284| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
17285| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
17286| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
17287| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
17288| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
17289| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
17290| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
17291| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
17292| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
17293| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
17294| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
17295| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
17296| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
17297| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
17298| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
17299| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
17300| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
17301| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
17302| [15219] Microsoft IE XML Object Arbitrary File Access
17303| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
17304| [15217] Microsoft IE input Tag Rendering DoS
17305| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
17306| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
17307| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
17308| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
17309| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
17310| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
17311| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
17312| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
17313| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
17314| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
17315| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
17316| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
17317| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
17318| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
17319| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
17320| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
17321| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
17322| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
17323| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
17324| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
17325| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
17326| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
17327| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
17328| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
17329| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
17330| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
17331| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
17332| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
17333| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
17334| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
17335| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
17336| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
17337| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
17338| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
17339| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
17340| [13609] Microsoft Windows Hyperlink Object Library Overflow
17341| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
17342| [13607] Microsoft IE CDF Cross-Domain Code Execution
17343| [13606] Microsoft IE createControlRange() Function Heap Corruption
17344| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
17345| [13604] Microsoft IE Drag-and-Drop File Injection
17346| [13602] Microsoft Windows OLE Input Validation Overflow
17347| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
17348| [13600] Microsoft Windows SMB Transaction Data Overflow
17349| [13599] Microsoft Windows License Logging Service Overflow
17350| [13597] Microsoft Windows Media Player PNG File Overflow
17351| [13596] Microsoft Windows XP Named Pipe Username Disclosure
17352| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
17353| [13594] Microsoft Office XP URL Overflow
17354| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
17355| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
17356| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
17357| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
17358| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
17359| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
17360| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
17361| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
17362| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
17363| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
17364| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
17365| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
17366| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
17367| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
17368| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
17369| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
17370| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
17371| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
17372| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
17373| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
17374| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
17375| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
17376| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
17377| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
17378| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
17379| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
17380| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
17381| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
17382| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
17383| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
17384| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
17385| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
17386| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
17387| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
17388| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
17389| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
17390| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
17391| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
17392| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
17393| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
17394| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
17395| [13330] Microsoft Windows HKLM Registry Key Locking DoS
17396| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
17397| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
17398| [13258] Microsoft IE Excel File Address Bar Spoofing
17399| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
17400| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
17401| [13132] Microsoft IE %20 URL Spoofing
17402| [13040] Microsoft IE Javascript Load Local File Path Disclosure
17403| [13020] Microsoft Windows XP RPC Cache Memory Leak
17404| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
17405| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
17406| [12862] Microsoft IE USER32.CharLowerA Exception DoS
17407| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
17408| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
17409| [12832] Microsoft Windows Indexing Service Query Overflow
17410| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
17411| [12709] Microsoft HTML Parser Malformed Javascript DoS
17412| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
17413| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
17414| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
17415| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
17416| [12625] Microsoft Windows winhlp32.exe Overflow
17417| [12624] Microsoft Windows Kernel ANI File Parsing DoS
17418| [12623] Microsoft Windows LoadImage API Overflow
17419| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
17420| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
17421| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
17422| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
17423| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
17424| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
17425| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
17426| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
17427| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
17428| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
17429| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
17430| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
17431| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
17432| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
17433| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
17434| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
17435| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
17436| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
17437| [12299] Microsoft IE FTP URL Arbitrary Command Injection
17438| [12277] Microsoft IE sysimage: Local File Existence Disclosure
17439| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
17440| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
17441| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
17442| [12163] Microsoft IE Save Picture As File Extension Spoofing
17443| [12123] Microsoft Windows ipconfig.exe Overflow
17444| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
17445| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
17446| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
17447| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
17448| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
17449| [11956] Microsoft Outlook/Express Message body NUL Character DoS
17450| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
17451| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
17452| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
17453| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
17454| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
17455| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
17456| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
17457| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
17458| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
17459| [11946] Microsoft IE/Outlook Malformed XBM File DoS
17460| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
17461| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
17462| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
17463| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
17464| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
17465| [11940] Microsoft Outlook Blocked Attachment Access
17466| [11939] Microsoft Outlook Attachment Spoofed Content Type
17467| [11938] Microsoft Outlook Express Attachment Filename Overflow
17468| [11937] Microsoft Outlook 98 Hidden Drive Access
17469| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
17470| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
17471| [11918] Microsoft IE execCommand() File Extension Spoofing
17472| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
17473| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
17474| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
17475| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
17476| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
17477| [11799] Microsoft Windows SMB Signing Group Policy Modification
17478| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
17479| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
17480| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
17481| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
17482| [11580] Microsoft IE res: URI Handler File Existence Disclosure
17483| [11479] Microsoft Windows NT Double Dot Samba Client DoS
17484| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
17485| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
17486| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
17487| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
17488| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
17489| [11473] Microsoft Windows NT Messenger Service Long Username DoS
17490| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
17491| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
17492| [11470] Microsoft Windows NT Help File Utility Overflow
17493| [11469] Microsoft Windows NT Malformed File Image Header DoS
17494| [11468] Microsoft Windows NT IOCTL Function DoS
17495| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
17496| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
17497| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
17498| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
17499| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
17500| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
17501| [11423] Microsoft Outlook Malformed Header DoS
17502| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
17503| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
17504| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
17505| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
17506| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
17507| [11416] Microsoft Outlook/Express Blank Header DoS
17508| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
17509| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
17510| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
17511| [11274] Microsoft IE "
17512| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
17513| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
17514| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
17515| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
17516| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
17517| [11170] Microsoft IE iframe Malformed base href DoS
17518| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
17519| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
17520| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
17521| [11158] Microsoft Windows NT Malformed Token Ring DoS
17522| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
17523| [11152] Microsoft IE Malformed HTML Style DoS
17524| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
17525| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
17526| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
17527| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
17528| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
17529| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
17530| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
17531| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
17532| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
17533| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
17534| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
17535| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
17536| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
17537| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
17538| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
17539| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
17540| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
17541| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
17542| [10975] Microsoft Windows NT Winpopup Long Username DoS
17543| [10967] Microsoft IE Javascript User Homepage Address Spoofing
17544| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
17545| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
17546| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
17547| [10935] Microsoft Word Macro Security Model Bypass
17548| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
17549| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
17550| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
17551| [10756] Microsoft MSN heartbeat.ocx Component Overflow
17552| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
17553| [10735] Microsoft Excel Virus Warning Mechanism Bypass
17554| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
17555| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
17556| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
17557| [10709] Microsoft IE SSL Cached Content Spoofing
17558| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
17559| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
17560| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
17561| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
17562| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
17563| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
17564| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
17565| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
17566| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
17567| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
17568| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
17569| [10693] Microsoft Windows Unspecified Kernel Local DoS
17570| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
17571| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
17572| [10690] Microsoft Windows Management APIs Local Privilege Escalation
17573| [10689] Microsoft Windows NetDDE Remote Overflow
17574| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
17575| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
17576| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
17577| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
17578| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
17579| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
17580| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
17581| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
17582| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
17583| [10615] Microsoft Windows NT linux smbmount Request DoS
17584| [10614] Microsoft Windows NT %systemroot% Path Inclusion
17585| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
17586| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
17587| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
17588| [10606] Microsoft Windows LSA NULL Policy Handle DoS
17589| [10604] Microsoft Windows NT PATH Working Directory Inclusion
17590| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
17591| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
17592| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
17593| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
17594| [10379] Microsoft SQL Server Large Query DoS
17595| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
17596| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
17597| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
17598| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
17599| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
17600| [10183] Microsoft SQL Server xp_sprintf Function DoS
17601| [10181] Microsoft SQL Server formatmessage Function DoS
17602| [10166] Microsoft SQL Server raiserror Function DoS
17603| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
17604| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
17605| [10157] Microsoft SQL Server BULK INSERT Query Overflow
17606| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
17607| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
17608| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
17609| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
17610| [10152] Microsoft SQL Server xp_printstatements Function Overflow
17611| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
17612| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
17613| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
17614| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
17615| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
17616| [10146] Microsoft SQL Server xp_sprintf Function Overflow
17617| [10145] Microsoft SQL Server formatmessage Function Overflow
17618| [10144] Microsoft SQL Server raiserror Function Overflow
17619| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
17620| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
17621| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
17622| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
17623| [10139] Microsoft SQL Server Agent Arbitrary File Creation
17624| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
17625| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
17626| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
17627| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
17628| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
17629| [10132] Microsoft SQL Server Authentication Function Remote Overflow
17630| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
17631| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
17632| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
17633| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
17634| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
17635| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
17636| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
17637| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
17638| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
17639| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
17640| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
17641| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
17642| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
17643| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
17644| [9671] Microsoft IE onUnload Address Bar Spoofing
17645| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
17646| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
17647| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
17648| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
17649| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
17650| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
17651| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
17652| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
17653| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
17654| [9348] Microsoft Windows NT Non-NTFS File System Insecure
17655| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
17656| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
17657| [9172] Microsoft IE File/Directory Existence Disclosure
17658| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
17659| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
17660| [9141] Microsoft Windows File Icon Spoofing
17661| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
17662| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
17663| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
17664| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
17665| [8941] Microsoft IE Merlin.speak Function CPU DoS
17666| [8706] Solaris mibiisa MIB Parsing Remote Overflow
17667| [8428] Microsoft NetMeeting Malformed Packets DoS
17668| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
17669| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
17670| [8335] Microsoft IE mshtml.dll Null Pointer DoS
17671| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
17672| [8277] Microsoft IE Malformed GIF Double-free DoS
17673| [8276] Microsoft IE Malformed BMP Overflow
17674| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
17675| [8243] Microsoft SMS Port 2702 DoS
17676| [8224] Microsoft IE CSS Memory Corruption DoS
17677| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
17678| [8210] Microsoft HTML Control Large Form Field DoS
17679| [8161] Microsoft Windows NT Invalid User Privileges
17680| [8160] Microsoft Windows NT File/Directory Invalid Permissions
17681| [8148] Microsoft IE Arbitrary File Write (What a Drag)
17682| [8129] Microsoft IE CSS Malformed div element DoS
17683| [8112] Microsoft Windows NT Weak Account Password Policy
17684| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
17685| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
17686| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
17687| [7963] Microsoft IE parent.window.open location.cache Script Execution
17688| [7951] Microsoft SMS Remote Control Client DoS
17689| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
17690| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
17691| [7914] Microsoft IE .FOLDER File Type Execution
17692| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
17693| [7912] Microsoft IE showHelp() Arbitrary File Execution
17694| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
17695| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
17696| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
17697| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
17698| [7905] Microsoft IE ie5setup.exe Multple Service Disable
17699| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
17700| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
17701| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
17702| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
17703| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
17704| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
17705| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
17706| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
17707| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
17708| [7895] Microsoft IE MS-DOS Device Name URL DoS
17709| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
17710| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
17711| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
17712| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
17713| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
17714| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
17715| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
17716| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
17717| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
17718| [7885] Microsoft Java Implementation Applet Tag DoS
17719| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
17720| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
17721| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
17722| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
17723| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
17724| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
17725| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
17726| [7877] Microsoft Java Virtual Machine Class.forName Overflow
17727| [7876] Microsoft IE .isp File Arbitrary Command Execution
17728| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
17729| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
17730| [7866] Microsoft IE Frame Spoofing Content Injection
17731| [7864] Microsoft IE URL History FTP Credential Disclosure
17732| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
17733| [7862] Microsoft IE User DAT File History Disclosure
17734| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
17735| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
17736| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
17737| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
17738| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
17739| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
17740| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
17741| [7854] Microsoft IE Chinese Character Scrolling DoS
17742| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
17743| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
17744| [7851] Microsoft IE Multiple Form Field DoS
17745| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
17746| [7849] Microsoft IE Javascript location.replace Recursive DoS
17747| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
17748| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
17749| [7846] Microsoft IE PNG Invalid Length Code DoS
17750| [7845] Microsoft IE Encoded URL Information Disclosure
17751| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
17752| [7843] Microsoft IE URLMON.DLL Multiple Overflows
17753| [7842] Microsoft IE File Upload Control Arbitrary File Access
17754| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
17755| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
17756| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
17757| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
17758| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
17759| [7836] Microsoft IE EMBED Tag Overflow
17760| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
17761| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
17762| [7833] Microsoft IE/OE res: Protocol Library Overflow
17763| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
17764| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
17765| [7830] Microsoft IE mk: URL Handling Remote Overflow
17766| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
17767| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
17768| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
17769| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
17770| [7825] Microsoft IE Domain Frame Arbitrary File Access
17771| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
17772| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
17773| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
17774| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
17775| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
17776| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
17777| [7818] Microsoft IE Page Redirect Authentication Credential Leak
17778| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
17779| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
17780| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
17781| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
17782| [7803] Microsoft Windows showHelp Arbitrary Code Execution
17783| [7802] Microsoft IE File Download Extension Spoofing
17784| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
17785| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
17786| [7798] Microsoft Windows Task Scheduler Remote Overflow
17787| [7793] Microsoft Outlook Express Header Validation DoS
17788| [7779] Microsoft IE AnchorClick Cross Zone Scripting
17789| [7778] Microsoft Outlook Window Opener Script Execution
17790| [7777] Microsoft Windows Media Control Preview Script Execution
17791| [7776] Microsoft IE Download Window Filename Filetype Spoofing
17792| [7775] Microsoft IE Channel Link Script Injection
17793| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
17794| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
17795| [7762] Microsoft Java Virtual Machine Cross-Site Communication
17796| [7739] Microsoft IE plugin.ocx Load() Method Overflow
17797| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
17798| [7608] Microsoft Index Server Internet Data Query Path Disclosure
17799| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
17800| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
17801| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
17802| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
17803| [7293] Microsoft Plus! Compressed Folder Password Disclosure
17804| [7202] Microsoft PowerPoint 2000 File Loader Overflow
17805| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
17806| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
17807| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
17808| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
17809| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
17810| [7117] Microsoft Windows RPC Locator Remote Overflow
17811| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
17812| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
17813| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
17814| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
17815| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
17816| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
17817| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
17818| [6965] Microsoft ISA Server 2000 SSL Packet DoS
17819| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
17820| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
17821| [6931] Microsoft IE/Outlook Double Null Character DoS
17822| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
17823| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
17824| [6742] Microsoft DirectPlay Packet Validation DoS
17825| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
17826| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
17827| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
17828| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
17829| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
17830| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
17831| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
17832| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
17833| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
17834| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
17835| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
17836| [6079] Microsoft Outlook Remote XML Loading
17837| [6074] Microsoft Windows Me HSC hcp:// URL XSS
17838| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
17839| [6031] Microsoft Exchange Multiple SMTP Command DoS
17840| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
17841| [5998] Microsoft Outlook Predictable File Caching
17842| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
17843| [5968] Microsoft Windows ARP Packet DoS
17844| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
17845| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
17846| [5936] Microsoft SMTP Service 4xx Error Code DoS
17847| [5887] Microsoft Access 97 Cleartext Password Storage
17848| [5884] Microsoft Site Server ASP Upload Remote Command Execution
17849| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
17850| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
17851| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
17852| [5694] Microsoft IE Address Bar URL Spoofing
17853| [5687] Microsoft Windows IE and Explorer Share Name Overflow
17854| [5686] Microsoft Windows Telnet Service Account Information Disclosure
17855| [5608] Microsoft NetMeeting Malformed String DoS
17856| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
17857| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
17858| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
17859| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
17860| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
17861| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
17862| [5390] Microsoft Exchange NTLM Null Session Mail Relay
17863| [5357] Microsoft Multiple Products for Mac File URL Overflow
17864| [5356] Microsoft IE for Mac Local AppleScript Invocation
17865| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
17866| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
17867| [5343] Microsoft SQL Server SQLXML root Parameter XSS
17868| [5342] Microsoft IE Malformed Web Page Zone Spoofing
17869| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
17870| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
17871| [5261] Microsoft Windows ASN.1 Double Free Code Execution
17872| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
17873| [5259] Microsoft Windows Negotiate SSP Code Execution
17874| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
17875| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
17876| [5256] Microsoft Windows Unspecified H.323 Code Execution
17877| [5255] Microsoft Windows Management Privilege Escalation
17878| [5254] Microsoft Windows Utility Manager Privilege Escalation
17879| [5253] Microsoft Windows Help and Support Center Command Execution
17880| [5252] Microsoft Windows Metafile Code Execution
17881| [5251] Microsoft Windows Winlogon Command Execution
17882| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
17883| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
17884| [5248] Microsoft Windows LSASS Remote Overflow
17885| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
17886| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
17887| [5245] Microsoft Windows RPCSS Large Length Field DoS
17888| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
17889| [5241] Microsoft Jet Database Engine Remote Code Execution
17890| [5179] Microsoft Windows 2000 microsoft-ds DoS
17891| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
17892| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
17893| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
17894| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
17895| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
17896| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
17897| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
17898| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
17899| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
17900| [5134] Microsoft IE Reference Local HTML Resource Script Execution
17901| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
17902| [5129] Microsoft IE Download File Origin Spoofing
17903| [5126] Microsoft BackOffice Authentication Bypass
17904| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
17905| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
17906| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
17907| [4951] Microsoft IE CLASSID Remote DoS
17908| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
17909| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
17910| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
17911| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
17912| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
17913| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
17914| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
17915| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
17916| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
17917| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
17918| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
17919| [4654] iisCart2000 File Upload
17920| [4627] Microsoft IE Text Control Overflow
17921| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
17922| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
17923| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
17924| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
17925| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
17926| [4186] Microsoft IE Cookie Path Traversal
17927| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
17928| [4168] Microsoft Outlook 2002 mailto URI Script Injection
17929| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
17930| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
17931| [3903] Microsoft Windows WINS Server Remote Overflow
17932| [3902] Microsoft Windows ASN.1 Library Integer Overflow
17933| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
17934| [3879] Microsoft IE File Identification Variant
17935| [3791] Microsoft IE Travel Log Arbitrary Script Execution
17936| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
17937| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
17938| [3501] Microsoft FrontPage form_results Information Disclosure
17939| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
17940| [3457] Microsoft MDAC Broadcast Reply Overflow
17941| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
17942| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
17943| [3384] Microsoft FrontPage htimage.exe Overflow
17944| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
17945| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
17946| [3381] Microsoft FrontPage imagemap.exe Overflow
17947| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
17948| [3313] Microsoft Word Form Protection Bypass
17949| [3307] Microsoft IE showHelp() Zone Restriction Bypass
17950| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
17951| [3225] Microsoft IE for Mac Information Disclosure
17952| [3213] SecureIIS Error Page Information Disclosure
17953| [3212] SecureIIS Encoded URI Arbitrary File Access
17954| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
17955| [3209] SecureIIS HTTP Request Overflow Protection Bypass
17956| [3195] Microsoft Exchange OWA REFERER Header XSS
17957| [3184] IISShield HTTP Request Bypass Ruleset
17958| [3183] iisPROTECT Encoded URL Authentication Bypass
17959| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
17960| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
17961| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
17962| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
17963| [3108] Microsoft Office 98 Macintosh Information Disclosure
17964| [3106] Microsoft Windows Password Authentication Security Point of Failure
17965| [3104] Microsoft IE PPC Overwrite Arbitrary Files
17966| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
17967| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
17968| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
17969| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
17970| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
17971| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
17972| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
17973| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
17974| [3066] Microsoft IE Custom HTTP Errors Script Injection
17975| [3065] Microsoft IE Unparsable XML File XSS
17976| [3056] Microsoft IE MSN/Alexa Information Leak
17977| [3055] Microsoft IE Spoofed URL
17978| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
17979| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
17980| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
17981| [3051] Microsoft IE MHT Web Archive Overflow
17982| [3050] Microsoft IE dragDrop Method Local File Reading
17983| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
17984| [3036] Microsoft IE dynsrc File Information Leak
17985| [3035] Microsoft WebBrowser Control t:video File Execution
17986| [3034] Microsoft IE JavaScript script src Local File Enumeration
17987| [3033] Microsoft IE Content Type/Disposition File Execution
17988| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
17989| [3031] Microsoft IE document.Open Same Origin Policy Violation
17990| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
17991| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
17992| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
17993| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
17994| [3010] Microsoft IE OWC XMLURL File Existence Verification
17995| [3009] Microsoft IE OWC Load File Existence Verification
17996| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
17997| [3007] Microsoft IE OWC LoadText Read Arbitrary File
17998| [3006] Microsoft IE OWC Script Execution
17999| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
18000| [3004] Microsoft IE Gopher Client Overflow
18001| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
18002| [3002] Microsoft IE File Extension Dot Parsing
18003| [3001] Microsoft IE XP HCP URI Handler File Deletion
18004| [2999] Microsoft IE Powerpoint Mouse-Over Execute
18005| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
18006| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
18007| [2996] Microsoft IE Object Zone Redirection
18008| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
18009| [2994] Microsoft IE (NewWindow).location.assign Save Reference
18010| [2993] Microsoft IE % URL Encoding XSS
18011| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
18012| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
18013| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
18014| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
18015| [2985] Microsoft IE execCommand Object Caching
18016| [2984] Microsoft IE getElementsByTagName Object Caching
18017| [2983] Microsoft IE getElementsByName Object Caching
18018| [2982] Microsoft IE getElementById Object Caching
18019| [2981] Microsoft IE elementFromPoint Object Caching
18020| [2980] Microsoft IE createRange Object Caching
18021| [2979] Microsoft IE external Object Caching
18022| [2978] Microsoft IE showModalDialog Object Caching
18023| [2977] Microsoft IE XML Datasource Read Local Files
18024| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
18025| [2975] Microsoft IE Back Button XSS
18026| [2974] Microsoft IE/Outlook Temporary Internet File Execution
18027| [2973] Microsoft IE Third Party Plugin Rendering XSS
18028| [2972] Microsoft IE showModalDialog Script Execution
18029| [2971] Microsoft WMP File Attachment Script Execution
18030| [2970] Microsoft IE cssText Arbitrary File Access
18031| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
18032| [2968] Microsoft IE File Download Dialog Overflow
18033| [2967] Microsoft IE Object Type Property Overflow
18034| [2966] Microsoft IE BR549.DLL Overflow
18035| [2965] Microsoft IE Cache Script Execution in My Zone
18036| [2963] Microsoft IE align HTML Converter Overflow
18037| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
18038| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
18039| [2917] Microsoft Access Known Database Attack
18040| [2801] Microsoft Word and Excel Execution of Arbitrary Code
18041| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
18042| [2784] Microsoft IE Component Function Information Disclosure
18043| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
18044| [2751] Microsoft Word Macro Name Handling Overflow
18045| [2745] Microsoft HTML Help Control Privilege Escalation
18046| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
18047| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
18048| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
18049| [2679] Microsoft Outlook Web Access XSS
18050| [2678] Microsoft Windows Overflow in ListBox and
18051| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
18052| [2675] Microsoft Windows HCP protocol Overflow
18053| [2674] Microsoft Exchange SMTP Extended Request Overflow
18054| [2670] Microsoft Windows RPC Race Condition DoS
18055| [2657] Microsoft Windows Message Queuing Service Heap Overflow
18056| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
18057| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
18058| [2642] Microsoft Windows Unauthorised Thread Termination
18059| [2592] Microsoft PowerPoint Modify Protection Bypass
18060| [2572] Microsoft BizTalk Server Insecure Permissions
18061| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
18062| [2544] Microsoft ASP.NET Request Validation Bypass
18063| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
18064| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
18065| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
18066| [2508] Microsoft Visual Basic for Applications Buffer Overflow
18067| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
18068| [2506] Microsoft Word/Works Automated Macro Execution
18069| [2453] Microsoft IE My Computer Zone Caching Issue
18070| [2451] Microsoft IE Object Data Header Type Safe File Execution
18071| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
18072| [2368] IISShield Crafted HTTP Request Filtering Bypass
18073| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
18074| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
18075| [2320] Microsoft ISA Server HTTP Error Handler XSS
18076| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
18077| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
18078| [2298] Microsoft ISA Server Error Page XSS
18079| [2291] Microsoft IE DOM Script Source Recursive DoS
18080| [2288] Microsoft Utility Manager Local Privilege Escalation
18081| [2283] Microsoft Exchange OWA Execute Arbitrary Code
18082| [2262] Microsoft Windows Media Player DHTML Local Zone Access
18083| [2247] Microsoft Windows Media Services Remote Command Execution #2
18084| [2244] Microsoft Windows 2000 ShellExecute() API Let
18085| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
18086| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
18087| [2100] Microsoft Windows RPC DCOM Interface Overflow
18088| [2096] Microsoft ISA Server SurfControl Web Filter
18089| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
18090| [2073] Microsoft Windows XP Network Share Provider Overflow
18091| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
18092| [2061] Microsoft Outlook HTML Mail Script Execution
18093| [2060] Microsoft IE Known Local File Script Execution
18094| [2051] Microsoft Windows User Shell Buffer Overflow
18095| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
18096| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
18097| [2046] Microsoft IE Forced Script Execution
18098| [2045] Microsoft IE HTML Document Directive Overflow
18099| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
18100| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
18101| [2041] Microsoft Office for Macintosh Network PID Checker DoS
18102| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
18103| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
18104| [2008] Microsoft IE Same Origin Policy Violation
18105| [2004] Microsoft IE Cross-frame Remote File Access
18106| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
18107| [1992] Microsoft IE Cookie Disclosure
18108| [1990] Microsoft Windows Terminal Services False IP Address
18109| [1982] Microsoft IE about: URI XSS
18110| [1978] Microsoft IE for Mac OS Download Execution
18111| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
18112| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
18113| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
18114| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
18115| [1957] Microsoft Exchange OWA Malformed Request DoS
18116| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
18117| [1934] Microsoft ISA Server Invalid URL Error Message XSS
18118| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
18119| [1932] Microsoft ISA Server H.323 Memory Leak DoS
18120| [1928] Microsoft Windows NNTP Malformed Post DoS
18121| [1915] Microsoft Windows Media Player .NSC File Overflow
18122| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
18123| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
18124| [1867] Microsoft Word Document Macro Execution
18125| [1864] Microsoft SQL Server Administrator Cached Connection
18126| [1861] Microsoft Windows Telnet Local System Call DoS
18127| [1860] Microsoft Windows Telnet Service Handle Leak DoS
18128| [1859] Microsoft Windows Telnet Multiple Sessions DoS
18129| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
18130| [1856] Microsoft Exchange OWA Embedded Script Execution
18131| [1852] Microsoft Outlook Address Book Spoofing Weakness
18132| [1840] Microsoft Windows Media Player Internet Shortcut Execution
18133| [1838] Microsoft Word .asd Macro File Execution
18134| [1837] Microsoft Word RTF Template Macro Execution
18135| [1832] Microsoft IE Spoofed SSL Certificates
18136| [1831] Microsoft IE Server Certificate Validation Failure
18137| [1820] Microsoft Index Server Search Parameter Overflow
18138| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
18139| [1764] Microsoft Windows 2000 Domain Controller DoS
18140| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
18141| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
18142| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
18143| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
18144| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
18145| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
18146| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
18147| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
18148| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
18149| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
18150| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
18151| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
18152| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
18153| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
18154| [1607] Microsoft Windows 9x Invalid Driver Type DoS
18155| [1606] Microsoft IE Cached Web Credentials Disclosure
18156| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
18157| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
18158| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
18159| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
18160| [1563] Microsoft Windows / Office DLL Search Path Weakness
18161| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
18162| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
18163| [1537] Microsoft Outlook Rich Text Format Information Disclosure
18164| [1530] Microsoft Money Cleartext Password Storage
18165| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
18166| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
18167| [1502] Microsoft IE Scriptlet Rendering
18168| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
18169| [1491] Microsoft Windows 9x IPX Ping Packet DoS
18170| [1475] Microsoft Outlook/Express Cache Bypass
18171| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
18172| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
18173| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
18174| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
18175| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
18176| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
18177| [1428] Microsoft IE/Office ActiveX Object Execution
18178| [1427] Microsoft IE VBA Code Execution
18179| [1399] Microsoft Windows 2000 Windows Station Access
18180| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
18181| [1369] Microsoft SQL Server DTS Password Disclosure
18182| [1368] Microsoft Media Encoder Request Parsing Local DoS
18183| [1358] Microsoft Windows NT HostAnnouncement DoS
18184| [1342] Microsoft IE DocumentComplete() Cross Frame Access
18185| [1341] Microsoft IE ActiveX Combined Component Attributes
18186| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
18187| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
18188| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
18189| [1297] Microsoft Windows 2000 Active Directory Object Attribute
18190| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
18191| [1272] Microsoft Excel XLM Arbitrary Macro Execution
18192| [1268] Microsoft Windows TCP/IP Printing Service DoS
18193| [1257] Microsoft Windows Media License Manager DoS
18194| [1251] Microsoft Windows MS DOS Device Name DoS
18195| [1250] Microsoft SQL Server Non-Validated Query
18196| [1244] Microsoft Clip Art Buffer Overflow
18197| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
18198| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
18199| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
18200| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
18201| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
18202| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
18203| [1188] Microsoft CIS IMAP Server Remote Overflow
18204| [1166] Microsoft Windows NT LsaLookupSids() DoS
18205| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
18206| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
18207| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
18208| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
18209| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
18210| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
18211| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
18212| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
18213| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
18214| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
18215| [1076] Microsoft Windows IP Source Routing
18216| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
18217| [1069] Microsoft IE Import/Export Favorites
18218| [1056] Microsoft Java Virtual Machine Sandbox Bypass
18219| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
18220| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
18221| [1046] Microsoft Windows telnet.exe Argument Overflow
18222| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
18223| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
18224| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
18225| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
18226| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
18227| [1010] Microsoft Windows NT Malformed LSA Request DoS
18228| [967] Microsoft Windows NT WINS Service Malformed Data DoS
18229| [945] Microsoft Windows 95/98 SMB Authentication Replay
18230| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
18231| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
18232| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
18233| [922] Microsoft NetMeeting Clipboard Remote Overflow
18234| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
18235| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
18236| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
18237| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
18238| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
18239| [863] Microsoft Exchange Malformed Mail Attribute DoS
18240| [858] Microsoft Windows NCM Handler Local Privilege Elevation
18241| [852] Microsoft Exchange EHLO Long Hostname Overflow
18242| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
18243| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
18244| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
18245| [773] Microsoft Windows 2000 Group Policy File Lock DoS
18246| [772] Microsoft Windows Multiple UNC Provider Request Overflow
18247| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
18248| [736] Microsoft Windows SMB Enumeration Information Disclosure
18249| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
18250| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
18251| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
18252| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
18253| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
18254| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
18255| [665] Microsoft Windows 95 Online Registration Information Disclosure
18256| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
18257| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
18258| [601] Microsoft Exchange Server LDAP Bind Function Overflow
18259| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
18260| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
18261| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
18262| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
18263| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
18264| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
18265| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
18266| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
18267| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
18268| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
18269| [457] Microsoft Exchange Malformed MIME Header DoS
18270| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
18271| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
18272| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
18273| [423] Microsoft Windows File Share Password Protection Bypass
18274| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
18275| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
18276| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
18277| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
18278| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
18279| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
18280| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
18281| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
18282| [334] Microsoft Windows Registry: Permission to Modify Common Paths
18283| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
18284| [331] Microsoft Windows Remote Registry Access
18285| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
18286| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
18287| [304] Microsoft Windows NT service pack level via remote registry access
18288| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
18289| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
18290| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
18291| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
18292| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
18293| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
18294| [129] Microsoft Windows NT FTP 'guest' Account
18295| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
18296| [68] Microsoft FrontPage Extensions .pwd File Permissions
18297| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
18298|_
18299Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
18300#################################################################################################################################
18301 Anonymous JTSEC #OpChili Full Recon #75