· 6 years ago · Mar 30, 2020, 11:05 PM
1##################################################################################################################################
2==================================================================================================================================
3Hostname www.investorab.com ISP Microsoft Corporation
4Continent Europe Flag
5NL
6Country Netherlands Country Code NL
7Region North Holland Local time 30 Mar 2020 22:44 CEST
8City Amsterdam Postal Code 1091
9IP Address 23.100.15.180 Latitude 52.353
10 Longitude 4.909
11==================================================================================================================================
12##################################################################################################################################
13Target:https://www.investorab.com/
14IP:23.100.15.180
15#################################################################################################################################
16> set type=A
17> www.investorab.com
18Server: 10.101.0.243
19Address: 10.101.0.243#53
20
21Non-authoritative answer:
22Name: www.investorab.com
23Address: 23.100.15.180
24> set type=NS
25> www.investorab.com
26Server: 10.101.0.243
27Address: 10.101.0.243#53
28
29Non-authoritative answer:
30*** Can't find www.investorab.com: No answer
31
32Authoritative answers can be found from:
33investorab.com
34 origin = dns1.cscdns.net
35 mail addr = hostmaster.cscdns.net
36 serial = 2015031987
37 refresh = 10800
38 retry = 3600
39 expire = 604800
40 minimum = 86400
41> set type=MX
42> www.investorab.com
43Server: 10.101.0.243
44Address: 10.101.0.243#53
45
46Non-authoritative answer:
47*** Can't find www.investorab.com: No answer
48
49Authoritative answers can be found from:
50investorab.com
51 origin = dns1.cscdns.net
52 mail addr = hostmaster.cscdns.net
53 serial = 2015031987
54 refresh = 10800
55 retry = 3600
56 expire = 604800
57 minimum = 86400
58>
59################################################################################################################################
60 Domain Name: INVESTORAB.COM
61 Registry Domain ID: 5137058_DOMAIN_COM-VRSN
62 Registrar WHOIS Server: whois.corporatedomains.com
63 Registrar URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
64 Updated Date: 2019-04-05T05:46:06Z
65 Creation Date: 1999-04-09T04:00:00Z
66 Registry Expiry Date: 2020-04-09T04:00:00Z
67 Registrar: CSC Corporate Domains, Inc.
68 Registrar IANA ID: 299
69 Registrar Abuse Contact Email: domainabuse@cscglobal.com
70 Registrar Abuse Contact Phone: 8887802723
71 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
72 Name Server: DNS1.CSCDNS.NET
73 Name Server: DNS2.CSCDNS.NET
74 DNSSEC: unsigned
75################################################################################################################################
76Domain Name: investorab.com
77Registry Domain ID: 5137058_DOMAIN_COM-VRSN
78Registrar WHOIS Server: whois.corporatedomains.com
79Registrar URL: www.cscprotectsbrands.com
80Updated Date: 2019-04-05T05:46:06Z
81Creation Date: 1999-04-09T04:00:00Z
82Registrar Registration Expiration Date: 2020-04-09T04:00:00Z
83Registrar: CSC CORPORATE DOMAINS, INC.
84Sponsoring Registrar IANA ID: 299
85Registrar Abuse Contact Email: domainabuse@cscglobal.com
86Registrar Abuse Contact Phone: +1.8887802723
87Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
88Registry Registrant ID:
89Registrant Name: IT Investor
90Registrant Organization: Investor AB
91Registrant Street:
92Registrant City: Stockholm
93Registrant State/Province: .
94Registrant Postal Code: SE-103 32
95Registrant Country: SE
96Registrant Phone: +46.86142000
97Registrant Phone Ext:
98Registrant Fax: +46.86142150
99Registrant Fax Ext:
100Registrant Email: dns.admin@investorab.com
101Registry Admin ID:
102Admin Name: IT Investor
103Admin Organization: Investor AB
104Admin Street:
105Admin City: Stockholm
106Admin State/Province: .
107Admin Postal Code: SE-103 32
108Admin Country: SE
109Admin Phone: +46.86142000
110Admin Phone Ext:
111Admin Fax: +46.86142150
112Admin Fax Ext:
113Admin Email: dns.admin@investorab.com
114Registry Tech ID:
115Tech Name: DNS Administrator
116Tech Organization: CSC Corporate Domains, Inc.
117Tech Street:
118Tech City: Wilmington
119Tech State/Province: DE
120Tech Postal Code: 19808
121Tech Country: US
122Tech Phone: +1.3026365400
123Tech Phone Ext:
124Tech Fax: +1.3026365454
125Tech Fax Ext:
126Tech Email: dns-admin@cscglobal.com
127Name Server: dns1.cscdns.net
128Name Server: dns2.cscdns.net
129DNSSEC: unsigned
130#################################################################################################################################
131Trying "investorab.com"
132;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16699
133;; flags: qr rd ra; QUERY: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 1
134
135;; QUESTION SECTION:
136;investorab.com. IN ANY
137
138;; ANSWER SECTION:
139investorab.com. 43200 IN A 165.160.13.20
140investorab.com. 43200 IN A 165.160.15.20
141investorab.com. 360 IN TXT "MS=ms68063239"
142investorab.com. 360 IN TXT "EzLVWbQfdcWNDWMegWslwRQ4K5yEheQrHLcjkkk9EnYe/cS2E9N/EiBx6qVT4HCTh00l1xV+KOhn2rFV+Uppxg=="
143investorab.com. 360 IN TXT "v=spf1 a:ems1.ems.investorab.com a:sto-adex01.investor.se a:mx4.investorab.com a:mx5.investorab.com include:spf.protection.outlook.com -all"
144investorab.com. 600 IN MX 0 investorab-com.mail.protection.outlook.com.
145investorab.com. 3600 IN SOA dns1.cscdns.net. hostmaster.cscdns.net. 2015031987 10800 3600 604800 86400
146investorab.com. 43037 IN NS dns2.cscdns.net.
147investorab.com. 43037 IN NS dns1.cscdns.net.
148
149;; ADDITIONAL SECTION:
150dns1.cscdns.net. 5756 IN A 156.154.130.100
151
152Received 509 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 32 ms
153#################################################################################################################################
154; <<>> DiG 9.11.16-2-Debian <<>> +trace investorab.com any
155;; global options: +cmd
156. 86400 IN NS a.root-servers.net.
157. 86400 IN NS b.root-servers.net.
158. 86400 IN NS c.root-servers.net.
159. 86400 IN NS d.root-servers.net.
160. 86400 IN NS e.root-servers.net.
161. 86400 IN NS f.root-servers.net.
162. 86400 IN NS g.root-servers.net.
163. 86400 IN NS h.root-servers.net.
164. 86400 IN NS i.root-servers.net.
165. 86400 IN NS j.root-servers.net.
166. 86400 IN NS k.root-servers.net.
167. 86400 IN NS l.root-servers.net.
168. 86400 IN NS m.root-servers.net.
169. 86400 IN RRSIG NS 8 0 518400 20200412170000 20200330160000 33853 . 0CZ/She0YSzr3cBeCWPkQ4fbgGTZ3XW7AZViR+vXPMIQnwGCfutTgISI 8DeQlatHn+5KmyHYAC17bzQ8jU21//7ZXEP6WDVewK8NblE1/8yCciN+ jd/J5wHY3MqWFa8CL7MyGjE+LsUu4M69XJ7tZ1WbBOqoyJVOJy2ckXv4 Ffd5Lzm7BgigN85BqdaEUZdOh80nQ/u0ic3DvWj8+cUchhmksRbO/w3M p5GEkeEvFp5rq1deCSPfZ86Ym2lqF+YYH9wvuegqja0X4JGzFH+PdWQn ED1dN6ZvPxRuIbyqx4Mcu7H8zkLSFFSBdJNJMD/ERv3TPd2yI+wRL4Qg WaTYtA==
170;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 663 ms
171
172com. 172800 IN NS h.gtld-servers.net.
173com. 172800 IN NS a.gtld-servers.net.
174com. 172800 IN NS c.gtld-servers.net.
175com. 172800 IN NS e.gtld-servers.net.
176com. 172800 IN NS d.gtld-servers.net.
177com. 172800 IN NS b.gtld-servers.net.
178com. 172800 IN NS m.gtld-servers.net.
179com. 172800 IN NS g.gtld-servers.net.
180com. 172800 IN NS k.gtld-servers.net.
181com. 172800 IN NS f.gtld-servers.net.
182com. 172800 IN NS l.gtld-servers.net.
183com. 172800 IN NS i.gtld-servers.net.
184com. 172800 IN NS j.gtld-servers.net.
185com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
186com. 86400 IN RRSIG DS 8 1 86400 20200412170000 20200330160000 33853 . dRuzQbWGkXEkoD8YbvxDuNuexVrNns3KYhewchvwo0kCUytFz0+gHXCI 56WEnEszpSfAFDqUUC2rcRTPNGQyKcHpK0qmz5UekxjKGLUGGiT0LbeS Is60M23IhpMbarF7iI6Czo8gxvlHV/DnK6OIB3d/crBe25qyqQ8BNe0b WGOdU4McQSbLdkq1EHGBODwdZpXGfKVopAuMDV+iVFFFQ8HZAfJy6L/K Sri6lIK7XFH/Efa+p4OrjDnnSgx11Xa/jezZCG6ZglNKH3VbdCf9Gp16 Rw8cKhf4bIEDTqPe/G221QPeBiyzNek67JBsrJa0e9lKaFZGcKiVutQr jco++Q==
187;; Received 1202 bytes from 2001:500:2::c#53(c.root-servers.net) in 33 ms
188
189investorab.com. 172800 IN NS dns1.cscdns.net.
190investorab.com. 172800 IN NS dns2.cscdns.net.
191CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
192CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20200403045024 20200327034024 56311 com. c6uPvcETse+c/D/ZkGPqZKIJwJ4z+XjCD7UjBR12FuskCK2Uo1jBx7F5 YIAcE+Peh5eQkX5qrTEkK/X5x2PnBxfGpW8txZ+J76nwreB96VZg2fld tGndAnEda8/ohuJHmnsPDzdY6D8uVZC9FbTvSCkYVLMouZWPuPICqDeR BlkpkIucF5/eEtXkMaF258HInTGrUwrwB2wwzqLklqTFUg==
193ASLK61CC9T6756P20BMQDQAVLNGQ7UHE.com. 86400 IN NSEC3 1 1 0 - ASLKRDKSC9R6DKN21AQBQFJCBMK6BL13 NS DS RRSIG
194ASLK61CC9T6756P20BMQDQAVLNGQ7UHE.com. 86400 IN RRSIG NSEC3 8 2 86400 20200405043744 20200329032744 56311 com. xplsNAUAUCbnb7Rxb3Godiaf3DWRmjYhsEDtGOAf7frIPGCgeyOjp1kW FQ+BI9+0cUqLaYDwvgjIM+NTJ1NqE3P1cCltlTlt5AwQ0gXSgGCigE6k XCLhnLVdMHkU9cEJZZ93HHsjP850+iIOg5QKPsLqRYDc+HiSnSH9ZRg9 3Vw0ODAnNV0RFMuL9lLfiaSA/K7u3V6woEqWVjm6c7Xopw==
195;; Received 640 bytes from 2001:502:8cc::30#53(h.gtld-servers.net) in 45 ms
196
197investorab.com. 3600 IN SOA dns1.cscdns.net. hostmaster.cscdns.net. 2015031987 10800 3600 604800 86400
198investorab.com. 86400 IN NS dns1.cscdns.net.
199investorab.com. 86400 IN NS dns2.cscdns.net.
200investorab.com. 600 IN MX 0 investorab-com.mail.protection.outlook.com.
201investorab.com. 360 IN TXT "EzLVWbQfdcWNDWMegWslwRQ4K5yEheQrHLcjkkk9EnYe/cS2E9N/EiBx6qVT4HCTh00l1xV+KOhn2rFV+Uppxg=="
202investorab.com. 3600 IN TXT "MS=ms68063239"
203investorab.com. 86400 IN TXT "v=spf1 a:ems1.ems.investorab.com a:sto-adex01.investor.se a:mx4.investorab.com a:mx5.investorab.com include:spf.protection.outlook.com -all"
204investorab.com. 86400 IN A 165.160.15.20
205investorab.com. 86400 IN A 165.160.13.20
206;; Received 504 bytes from 156.154.130.100#53(dns1.cscdns.net) in 382 ms
207################################################################################################################################
208[i] Scanning Site: https://www.investorab.com
209
210
211
212B A S I C I N F O
213====================
214
215
216[+] Site Title: Investor - Home
217[+] IP address: 23.100.15.180
218[+] Web Server: Could Not Detect
219[+] CMS: Could Not Detect
220[+] Cloudflare: Not Detected
221[+] Robots File: Could NOT Find robots.txt!
222
223
224
225
226W H O I S L O O K U P
227========================
228
229 Domain Name: INVESTORAB.COM
230 Registry Domain ID: 5137058_DOMAIN_COM-VRSN
231 Registrar WHOIS Server: whois.corporatedomains.com
232 Registrar URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
233 Updated Date: 2019-04-05T05:46:06Z
234 Creation Date: 1999-04-09T04:00:00Z
235 Registry Expiry Date: 2020-04-09T04:00:00Z
236 Registrar: CSC Corporate Domains, Inc.
237 Registrar IANA ID: 299
238 Registrar Abuse Contact Email: domainabuse@cscglobal.com
239 Registrar Abuse Contact Phone: 8887802723
240 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
241 Name Server: DNS1.CSCDNS.NET
242 Name Server: DNS2.CSCDNS.NET
243 DNSSEC: unsigned
244 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
245>>> Last update of whois database: 2020-03-30T20:57:59Z <<<
246
247For more information on Whois status codes, please visit https://icann.org/epp
248
249
250
251The Registry database contains ONLY .COM, .NET, .EDU domains and
252Registrars.
253
254
255
256
257G E O I P L O O K U P
258=========================
259
260[i] IP Address: 165.160.13.20
261[i] Country: United States
262[i] State:
263[i] City:
264[i] Latitude: 37.751
265[i] Longitude: -97.822
266
267
268
269
270H T T P H E A D E R S
271=======================
272
273
274[i] HTTP/1.1 200 OK
275[i] Cache-Control: private
276[i] Content-Length: 112550
277[i] Content-Type: text/html; charset=utf-8
278[i] Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
279[i] Date: Mon, 30 Mar 2020 20:58:12 GMT
280[i] Connection: close
281
282
283
284
285D N S L O O K U P
286===================
287
288investorab.com. 3599 IN SOA dns1.cscdns.net. hostmaster.cscdns.net. 2015031987 10800 3600 604800 86400
289investorab.com. 21599 IN NS dns1.cscdns.net.
290investorab.com. 21599 IN NS dns2.cscdns.net.
291investorab.com. 599 IN MX 0 investorab-com.mail.protection.outlook.com.
292investorab.com. 359 IN TXT "EzLVWbQfdcWNDWMegWslwRQ4K5yEheQrHLcjkkk9EnYe/cS2E9N/EiBx6qVT4HCTh00l1xV+KOhn2rFV+Uppxg=="
293investorab.com. 3599 IN TXT "MS=ms68063239"
294investorab.com. 21599 IN TXT "v=spf1 a:ems1.ems.investorab.com a:sto-adex01.investor.se a:mx4.investorab.com a:mx5.investorab.com include:spf.protection.outlook.com -all"
295investorab.com. 21599 IN A 165.160.13.20
296investorab.com. 21599 IN A 165.160.15.20
297
298
299
300
301S U B N E T C A L C U L A T I O N
302====================================
303
304Address = 165.160.13.20
305Network = 165.160.13.20 / 32
306Netmask = 255.255.255.255
307Broadcast = not needed on Point-to-Point links
308Wildcard Mask = 0.0.0.0
309Hosts Bits = 0
310Max. Hosts = 1 (2^0 - 0)
311Host Range = { 165.160.13.20 - 165.160.13.20 }
312
313
314
315N M A P P O R T S C A N
316============================
317
318Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-30 20:58 UTC
319Nmap scan report for investorab.com (165.160.15.20)
320Host is up (0.067s latency).
321Other addresses for investorab.com (not scanned): 165.160.13.20
322
323PORT STATE SERVICE
32421/tcp filtered ftp
32522/tcp filtered ssh
32680/tcp open http
327443/tcp filtered https
328
329Nmap done: 1 IP address (1 host up) scanned in 1.90 seconds
330
331
332
333S U B - D O M A I N F I N D E R
334==================================
335
336
337[i] Total Subdomains Found : 21
338
339[+] Subdomain: sto-wac01.investorab.com
340[-] IP: 80.169.185.11
341
342[+] Subdomain: mx4.investorab.com
343[-] IP: 80.169.185.7
344
345[+] Subdomain: mx5.investorab.com
346[-] IP: 80.169.182.217
347
348[+] Subdomain: owa.investorab.com
349[-] IP: 212.209.237.43
350
351[+] Subdomain: hybrid.investorab.com
352[-] IP: 80.169.184.240
353
354[+] Subdomain: ibe.investorab.com
355[-] IP: 80.169.185.5
356
357[+] Subdomain: subscribe.investorab.com
358[-] IP: 212.209.235.51
359
360[+] Subdomain: share.investorab.com
361[-] IP: 212.209.235.51
362
363[+] Subdomain: igcmig.investorab.com
364[-] IP: 66.43.99.188
365
366[+] Subdomain: exch.investorab.com
367[-] IP: 213.115.131.12
368
369[+] Subdomain: mail.investorab.com
370[-] IP: 80.169.185.8
371
372[+] Subdomain: vpn.investorab.com
373[-] IP: 80.169.184.235
374
375[+] Subdomain: adfs.investorab.com
376[-] IP: 80.169.184.240
377
378[+] Subdomain: ems1.ems.investorab.com
379[-] IP: 80.169.185.6
380
381[+] Subdomain: ems2.ems.investorab.com
382[-] IP: 80.169.185.11
383
384[+] Subdomain: hkwebaccess.investorab.com
385[-] IP: 203.193.62.53
386
387[+] Subdomain: navs.investorab.com
388[-] IP: 212.209.235.51
389
390[+] Subdomain: xconnect.investorab.com
391[-] IP: 80.169.185.9
392
393[+] Subdomain: extranet.investorab.com
394[-] IP: 80.169.185.10
395
396[+] Subdomain: guest.investorab.com
397[-] IP: 10.46.10.206
398
399[+] Subdomain: www.investorab.com
400[-] IP: 23.100.15.180
401#################################################################################################################################
402[*] Links found: 39
403---------------------
404https://www.linkedin.com/in/aaron-boehm-3733894b
405https://www.linkedin.com/in/abhijeet-lele-b1886414
406https://www.linkedin.com/in/adrian-burgueno-705185146
407https://www.linkedin.com/in/alfredo-barajas-9ab945116
408https://www.linkedin.com/in/andelius/de
409https://www.linkedin.com/in/annewojcicki
410https://www.linkedin.com/in/arna-rich-1b251a134
411https://www.linkedin.com/in/aya-kurata-1b780662
412https://www.linkedin.com/in/brandonycho
413https://www.linkedin.com/in/c-david-189217140
414https://www.linkedin.com/in/craigschrimsher
415https://www.linkedin.com/in/david-perez-06663a6
416https://www.linkedin.com/in/erica-bulger-488151130
417https://www.linkedin.com/in/frank-j-azor-36373010a
418https://www.linkedin.com/in/fred-wallenberg-1355b366/en
419https://www.linkedin.com/in/gabriela-vilaro-3244547
420https://www.linkedin.com/in/gogoya-william-000363195
421https://www.linkedin.com/in/green-richard-944b78120
422https://www.linkedin.com/in/helena-palm%25C3%25A9r-a5275211
423https://www.linkedin.com/in/jacolbi-courington-meier-94606577
424https://www.linkedin.com/in/jan-lernfelt-17270a36/de
425https://www.linkedin.com/in/jo%25C3%25A3o-honws-465b94144
426https://www.linkedin.com/in/jose-suarez-431bb6b/%257Bcountry%253Dcz%252C%2Blanguage%253Dcs%257D%3Ftrk%3Dpeople-guest_profile-result-card_result-card_full-click
427https://www.linkedin.com/in/juan-sepulveda-559845195lovesjo
428https://www.linkedin.com/in/kahn-kumar-146b16168
429https://www.linkedin.com/in/kevpet
430https://www.linkedin.com/in/laura-andrews-24002730
431https://www.linkedin.com/in/lorinda-kate-986655187
432https://www.linkedin.com/in/louise-kores-98533929
433https://www.linkedin.com/in/malgorzata-serafin-a17000166
434https://www.linkedin.com/in/mc-john-hamilton-0b9536184
435https://www.linkedin.com/in/niclas-m%2525C3%2525B6ller-94b43b33
436https://www.linkedin.com/in/noah-walley-0b4241
437https://www.linkedin.com/in/rickard-rehnberg-571305a4
438https://www.linkedin.com/in/robert-de-heus-3b35455/de
439https://www.linkedin.com/in/sergio-rodriguez-460167178
440https://www.linkedin.com/in/steve-campe-11a5666/de
441https://www.linkedin.com/in/teresa-dereniak-b514802
442https://www.linkedin.com/in/ther%2525C3%2525A9se-lennehag-002264
443[*] Searching Linkedin.
444
445[*] Users found: 153
446---------------------
447AF AF - General Manager - Investor AB
448Aaron Boehm - Real Estate Investor - AB
449Abhijeet Lele - Managing Director - Temasek
450Adolphus Koyi - Managing Director - Investor AB
451Adrian Burgueno - Investor - AB Financial
452Aja Silvio - putnum - Investor AB
453Akshay Pawar - Software Engineer - Investor AB
454Alan Bell - Property Investor - AB Property Solutions
455Aleksandar Dimic - Finance Advisor - Investor AB
456Alex Shiv G - Investor - Investor AB
457Alfredo and Britsi Nunez - Investor - AB Investments
458Anders Eckerwall - Head of Finance - Investor AB
459Angie Price - Self Employed - Investor AB
460Anna Backentoft - Executive Assistant - Investor AB
461Anne Kim - Founder - Academy Pret
462Anne Wojcicki - Co-Founder and CEO - 23andMe
463Anney Smith - Investor - Investor AB
464Anthony Lomack - Head Coach - Investor AB
465Antonio McAllister - Business Owner - Investor AB
466Arna Rich - Real Estate Investor - AB Investors
467Aron Hjertberg - Director Group Treasurer - Gambro
468Asabelle taylor - Investment Manager - Investor AB
469Aya Kurata - Associate - InvestorAB
470Benson Harrison - agent at inverstor AB - Investor AB
471Bhole Sen - Saloon - Investor AB
472Bygge Johan - cfo - Investor AB
473C DAvid - ff - Investor AB
474Carlo Raimondo - Owner - MONDO Landscapes
475Catharina Thornell - Head of Treasury - Investor AB
476Claes Von Post - Senior Advisor - Investor AB
477Conni Jonsson - Chairman - EQT Partners
478Corey James - Fund Manager - Investor AB
479Daniel Wirmark - Infra group - Investor AB
480Diana Tan - Ms - Investor AB
481Erica Bulger - AP Accountant - Sobi - North America
482Erik Arbnor - IT Systems Manager - Investor AB
483Eva Anglander - receptionist - Investor AB
484Eva Stapelfeldt - Team assistant - Investor AB
485Filip Mitanoski - Assistant Manager - Aspia
486Filippa Stenberg - Investment Manager - Investor AB
487Frank J Azor - Real Estate Investor - AB Homes Group
488Frichi noke - Director - Investor AB
489Gabriela Vilaro - Advisor - BreakawayGrowth Fund
490George Ronald - Principal CEO - Investor AB
491Gogoya william - Military - Investor AB
492Graham Farlow - Retired - Investor AB
493Green Richard - Business Manager - Investor AB
494HASHIM MUSTAFA - CEO - Investor AB
495Helena Saxon - CFO - Investor AB
496Henrik Gustafsson - Senior associate - Investor AB
497Irina Podvolodskikh - Chief Economist - Investor AB
498Jack Kenneth Phillips - Retired - Investor AB
499Jakob Lindberg - CEO - Oncopeptides AB
500James Burton - Bitcoin Trader - Investor AB
501James Farke - Bitcoin Trader - Investor AB
502Jay Dhruna - Managing Director - Investor AB
503Jeff Fleming - investor - Investor AB
504Jenny Rydingstam - Koncern controller - Investor AB
505Jeremy Bill Craft - Real Estate Investor - AB
506Jose Cheng - Managing Director - Fung Capital Asia
507Jose Suarez - Managing Director - Patricia Industries
508Joy Iroham - Business Banking Specialist - Investor AB
509Juan Sepulveda - Manager - Investor AB
510Juh Uhg - Investment Specialist - Investor AB
511Juhi Parekh - Administrator - Investor AB
512Kahn Kumar - Investment Consultant - Investment AB
513Kairat Osmonov - investment banker - Investor AB
514Kevin Peterson - CEO - WGI Limited
515Kian Bourse - Financial Analyst - Investor AB
516Kim Bronson - president - Investor AB
517Krasimir Shishmanov - Student - Investor AB
518Kwaku A. - Business Professional - Investor AB
519LAVIORE KING - Trade - Investor AB
520Laiman Wong - Managing Director - UBS
521Larry Hodson - Pres. - Investor AB
522Lena Hofman - Senior Associate - Finance - Investor AB
523Lily Ying - Manager - Investor AB
524Louis De Geer - Legal Counsel - Investor AB
525Louise Kores - Investment Professional - Patricia Industries
526Malgorzata Serafin - Business Specialist - Investor AB
527Manny Manny - Self - Investor AB
528Marie Tammerfors - IT Support - ITS Nordic AB
529Martin Lundin - Senior Associate - Investor AB
530Martin Persson - Portfolio Manager - Investor AB
531Mathias Bent - Investor - Investor AB
532Mattias Granditsky - IT Drifttekniker - Skandia Norden
533Mc John Hamilton - Block manager - Bitcoin Mining
534Michael Zeff - CEO - Investor AB
535Micheal Davis - Bitcoin Trader - Investor AB
536Mike Lemahieu - Senior Consultant - Investor AB
537Mo Saine - Vice President - Investor AB
538Mohiaddin Rasouli - Invesment manager - Investor AB
539Monika Zok - Investment Analyst - Investor AB
540Mostafa Kian - Financial Analyst - Investor AB
541Nanthini Salvam - Relationship Manager - Investor AB
542Nina Collin Sundqvist - Senior Associate - Investor AB
543Ogonda Chima ryan - Investor - Investor AB
544Olga lucia Angelone - Contable - Investor AB
545PRASHANT KOHALE - Financial Advisor - Investor AB
546Paul Abad - Investor - AB Investments
547Peter Barkhordar - Owner - Investor AB
548Peter Sellei - Vice President - Investor AB
549Petra Bowring - Executive Assistant - Investor AB
550Petra Hedengran
551Petra Hedengran - Managing Director - Investor AB
552Randy Frakes - Self - Investor AB
553Rickard Tageson - Associate - Investor AB
554Robert Kufel - Associate - RedCloud Capital
555Robert R. Andrews - Consultant - Investor AB
556Roman Fx - Foreign Exchange Trader - Investor AB
557Sandeep Malviya - I am college dropout - Investor AB
558Santosh bind - Disinar - Investor AB
559Sarah Jones - Investor - Investor AB
560Searching Connects - Investigator - Investor AB
561Selin Palon - Investment Consultant - Investor AB
562Sergio Rodriguez - Mortgage Banker - Investor AB
563Sofia Jonsson - Sustainability Specialist - Investor AB
564Solomon Spiro - retired - Investor AB
565Sonja Nasehi - Founder - Mojo stocks
566Sylvia Chong - Western University - Hong Kong
567Tina Lindgren - Office support - Investor AB
568Tremon Coleman - Engineer - Investor AB
569Vijay Chandnani - Marketing Specialist - Investor AB
570Viktoria Wirell - Associate - The Boston Consulting Group
571Vinod Dhamspurkar - Assistant Sales Manager - Investor AB
572Willson Flora - Blogger - Investor AB
573Zeca Soares - Company Manager - Investor AB
574aryanna scrimshaw - Investigator - Investor AB
575bruice keith - Managing Director - Investor AB
576bryson smith - bitcoin investor - Investor AB
577chen chun-hwa - stictly investment - Investor AB
578chris Grayling - Investment Consultant - Investor AB
579glory win - Investment Professional - Investor AB
580h.e mitchell - mars - Investor AB
581harish k - Software Engineer - Investor AB
582jacob wallenberg - Chairman - Investor AB
583kumar malireddy - Project Manager - Investor AB
584lani smiths - Portfolio Manager - Investor AB
585prince Sandhu - Stock Trader - Investor AB
586sagar ferriy - Software Engineer - Investor AB
587sanaz rouzifarakh - IT EXPERT - Investor AB
588suzan darrah - Accountant - Investor AB
589tinh doan - Self Employed - Investor AB
590tom long - agent - Investor AB
591vaghela harshadbhai - Project Manager - Investor AB
592yani tiger - owner - Investor AB
593yesid rincon - Ingeniero - Investor AB
594
595[*] IPs found: 58
596-------------------
59710.46.10.206
59823.54.19.105
59923.59.188.32
60023.100.15.180
60134.248.193.68
60234.251.23.167
60340.97.147.24
60445.60.63.3
60552.16.123.156
60652.18.73.83
60752.18.158.215
60852.18.222.5
60952.18.239.64
61052.19.6.141
61152.19.10.244
61252.19.226.115
61352.30.159.170
61452.31.87.250
61552.48.184.210
61652.48.226.244
61752.50.206.56
61852.51.98.116
61952.51.132.190
62052.208.34.84
62152.208.130.217
62252.209.18.136
62352.209.65.98
62452.209.189.117
62552.211.241.243
62652.212.86.214
62754.76.218.76
62854.171.230.244
62954.194.58.175
63054.194.244.182
63166.43.99.188
63280.169.182.217
63380.169.184.235
63480.169.184.240
63580.169.185.5
63680.169.185.6
63780.169.185.7
63880.169.185.8
63980.169.185.9
64080.169.185.10
64180.169.185.11
642104.80.89.185
643165.160.13.20
644165.160.15.20
645192.230.67.229
646199.83.134.229
647203.193.62.53
648212.209.235.51
649212.209.237.43
650213.115.131.12
651217.28.193.199
652
653[*] Emails found: 23
654----------------------
655elinor.carlsson@investorab.com
656fredrik.kenmo@investorab.com
657helen.jonsson@investorab.com
658helpdesk@investorab.com
659info@investorab.com
660internship@investorab.com
661johan.forssell@investorab.com
662last@investorab.com
663magnus.dahlhammar@investorab.com
664magnus.dalhammar@investorab.com
665matt.krna@investorab.com
666peter.wallenberg@investorab.com
667peter.wallenbergjr@investorab.com
668petra.hedengran@investorab.com
669susanna.sjodin@investorab.com
670thomas.eklund@investorab.com
671viveka.hirdman-ryrberg@investorab.com
672
673[*] Hosts found: 95
674---------------------
675adfs.investorab.com:80.169.184.240
676adfs.investorab.com:80.169.184.240
677autodiscover.investorab.com:80.169.184.240
678autodiscover.investorab.com:80.169.184.240
679career.investorab.com:165.227.75.22, 165.227.72.149, 64.225.11.59
680career.investorab.com:165.227.75.22, 165.227.72.149, 64.225.11.59
681career.investorab.com:165.227.75.22, 165.227.72.149, 64.225.11.59
682career.investorab.com:165.227.75.22, 165.227.72.149, 64.225.11.59
683career.investorab.com:165.227.75.22, 165.227.72.149, 64.225.11.59
684ems1.ems.investorab.com:80.169.185.6
685ems1.ems.investorab.com:80.169.185.6
686ems1.ems.investorab.com:80.169.185.6
687ems2.ems.investorab.com:80.169.185.11
688ems2.ems.investorab.com:80.169.185.11
689ems2.ems.investorab.com:80.169.185.11
690exch.investorab.com:213.115.131.12
691extranet.investorab.com:80.169.185.10
692extranet.investorab.com:80.169.185.10
693extranet.investorab.com:80.169.185.10
694guest.investorab.com:10.46.10.206
695guest.investorab.com:10.46.10.206
696guest.investorab.com:10.46.10.206
697hkwebaccess.investorab.com:203.193.62.53
698hybrid.investorab.com:80.169.184.240
699ibe.investorab.com:80.169.185.5
700ibe.investorab.com:80.169.185.5
701ibe.investorab.com:80.169.185.5
702igcmig.investorab.com:66.43.99.188
703investorab.com:165.160.15.20, 165.160.13.20
704investorab.com:165.160.15.20, 165.160.13.20
705investorab.se:165.160.15.20, 165.160.13.20
706ir.investorab.com:190.98.144.195, 190.98.144.197
707ir.investorab.com:190.98.144.195, 190.98.144.197
708ir.investorab.com:190.98.144.197, 190.98.144.195
709ir.investorab.com:190.98.144.195, 190.98.144.197
710ir.investorab.com:190.98.144.195, 190.98.144.197
711ir.investorab.com:190.98.144.197, 190.98.144.195
712ir.investorab.com:190.98.144.195, 190.98.144.197
713ir.investorab.com:190.98.144.197, 190.98.144.195
714ir.investorab.com:190.98.144.197, 190.98.144.195
715mail.investorab.com:80.169.185.8
716mail.investorab.com:80.169.185.8
717mx4.investorab.com:80.169.185.7
718mx4.investorab.com:80.169.185.7
719mx4.investorab.com:80.169.185.7
720mx5.investorab.com:80.169.182.217
721mx5.investorab.com:80.169.182.217
722mx5.investorab.com:80.169.182.217
723navs.investorab.com:212.209.235.51
724owa.investorab.com:212.209.237.43
725patriciaindustries.com:165.160.15.20, 165.160.13.20
726share.investorab.com:212.209.235.51
727sto-wac01.investorab.com:80.169.185.11
728sto-wac01.investorab.com:80.169.185.11
729subscribe.investorab.com:212.209.235.51
730vpn.investorab.com:80.169.184.235
731www.ems2.ems.investorab.com:
732www.guest.investorab.com:
733www.investorab.com:23.100.15.180
734www.investorab.com:23.100.15.180
735www.investorab.com:23.100.15.180
736www.investorab.com:23.100.15.180
737www.investorab.com:23.100.15.180
738www.investorab.com:23.100.15.180
739www.investorab.com:23.100.15.180
740www.investorab.com:23.100.15.180
741www.investorab.com:23.100.15.180
742www.investorab.se:165.160.15.20, 165.160.13.20
743www.patriciaindustries.com:80.169.185.5
744xconnect.investorab.com:80.169.185.9
745xconnect.investorab.com:80.169.185.9
746
747[*] Trello URLs found: 1
748--------------------
749https://trello.com/c/txjzasva/35-alphabet-gv-ceo-bill-maris-is-said-to-leave-vc-arm-he-started
750################################################################################################################################
751[*] Performing General Enumeration of Domain:investorab.com
752[-] DNSSEC is not configured for investorab.com
753[*] SOA dns1.cscdns.net 156.154.130.100
754[*] NS dns1.cscdns.net 156.154.130.100
755[*] Bind Version for 156.154.130.100 b'UltraDNS Resolver'
756[*] NS dns1.cscdns.net 2610:a1:1022::100
757[*] Bind Version for 2610:a1:1022::100 b'UltraDNS Resolver'
758[*] NS dns2.cscdns.net 156.154.131.100
759[*] Bind Version for 156.154.131.100 b'UltraDNS Resolver'
760[*] NS dns2.cscdns.net 2610:a1:1023::100
761[*] Bind Version for 2610:a1:1023::100 b'UltraDNS Resolver'
762[*] MX investorab-com.mail.protection.outlook.com 104.47.6.36
763[*] MX investorab-com.mail.protection.outlook.com 104.47.5.36
764[*] A investorab.com 165.160.13.20
765[*] A investorab.com 165.160.15.20
766[*] Enumerating SRV Records
767[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 52.112.64.140 443 1
768[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:7::b 443 1
769[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:2::b 443 1
770[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:5::b 443 1
771[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:e::f 443 1
772[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:c::f 443 1
773[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:a::b 443 1
774[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037:0:4::b 443 1
775[*] SRV _sip._tls.investorab.com sipdir.online.lync.com 2603:1037::b 443 1
776[*] SRV _sipfederationtls._tcp.investorab.com sipfed.online.lync.com 52.112.65.203 5061 1
777[*] SRV _sipfederationtls._tcp.investorab.com sipfed.online.lync.com 2603:1037:0:7::b 5061 1
778[+] 11 Records Found
779################################################################################################################################
780[+] Target : https://www.investorab.com
781
782[+] IP Address : 23.100.15.180
783
784[+] Headers :
785
786[+] Cache-Control : private
787[+] Content-Length : 22308
788[+] Content-Type : text/html; charset=utf-8
789[+] Content-Encoding : gzip
790[+] Vary : Accept-Encoding
791[+] Set-Cookie : ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
792[+] Date : Mon, 30 Mar 2020 21:05:42 GMT
793
794[!] SSL Certificate Information :
795
796[+] commonName : www.investorab.com
797[+] countryName : US
798[+] organizationName : Let's Encrypt
799[+] commonName : Let's Encrypt Authority X3
800[+] version : 3
801[+] serialNumber : 04D622740AC15ED663C6E5A8498A00DFDC74
802[+] notBefore : Mar 20 23:13:24 2020 GMT
803[+] notAfter : Jun 18 23:13:24 2020 GMT
804[+] OCSP : http://ocsp.int-x3.letsencrypt.org
805[+] caIssuers : http://cert.int-x3.letsencrypt.org/
806
807[!] Whois Lookup :
808
809[+] asn_registry : arin
810[+] asn : 8075
811[+] asn_cidr : 23.100.0.0/15
812[+] asn_country_code : US
813[+] asn_date : 2013-06-18
814[+] query : 23.100.15.180
815[+] cidr : 23.96.0.0/13
816[+] name : MSFT
817[+] handle : NET-23-96-0-0-1
818[+] range : 23.96.0.0 - 23.103.255.255
819[+] description : Microsoft Corporation
820[+] country : US
821[+] state : WA
822[+] city : Redmond
823[+] address : One Microsoft Way
824[+] postal_code : 98052
825[+] emails : ['msndcc@microsoft.com' 'IOC@microsoft.com' 'abuse@microsoft.com']
826[+] created : 2013-06-18
827[+] updated : 2013-06-18
828
829[!] Starting DNS Enumeration...
830
831[+] investorab.com. 21599 IN NS dns2.cscdns.net.
832[+] investorab.com. 21599 IN A 165.160.15.20
833[+] investorab.com. 21599 IN NS dns1.cscdns.net.
834[+] investorab.com. 599 IN MX 0 investorab-com.mail.protection.outlook.com.
835[+] investorab.com. 3599 IN TXT "MS=ms68063239"
836[+] investorab.com. 21599 IN A 165.160.13.20
837[+] investorab.com. 359 IN TXT "EzLVWbQfdcWNDWMegWslwRQ4K5yEheQrHLcjkkk9EnYe/cS2E9N/EiBx6qVT4HCTh00l1xV+KOhn2rFV+Uppxg=="
838[+] investorab.com. 21599 IN TXT "v=spf1 a:ems1.ems.investorab.com a:sto-adex01.investor.se a:mx4.investorab.com a:mx5.investorab.com include:spf.protection.outlook.com -all"
839[+] investorab.com. 1799 IN SOA dns1.cscdns.net. hostmaster.cscdns.net. 2015031987 10800 3600 604800 86400
840[+] investorab.com. 3599 IN SOA dns1.cscdns.net. hostmaster.cscdns.net. 2015031987 10800 3600 604800 86400
841[+] _dmarc.investorab.com. 599 IN TXT "v=DMARC1; p=none; pct=50; rua=mailto:helpdesk@investorab.com; ruf=mailto:helpdesk@investorab.com; adkim=r; aspf=r; rf=afrf"
842
843[!] Starting Sub-Domain Enumeration...
844
845[!] Requesting BuffOver
846[!] Requesting ThreadCrowd
847[!] Requesting crt.sh
848[!] Requesting AnubisDB
849[!] Requesting ThreatMiner
850
851[+] Results :
852
853[+] mx4.investorab.com
854[+] 213.115.131.12
855[+] career.investorab.com
856[+] ems2.ems.investorab.com
857[+] 10.46.10.206
858[+] www.investorab.com
859[+] 80.169.185.8
860[+] vpn.investorab.com
861[+] www.mail.investorab.com
862[+] exch.investorab.com
863[+] mx5.investorab.com
864[+] sto-wac01.investorab.com
865[+] www.extranet.investorab.com
866[+] adfs.investorab.com
867[+] xconnect.investorab.com
868[+] mail.investorab.com
869[+] 212.209.237.43
870[+] 80.169.185.10
871[+] www.guest.investorab.com
872[+] owa.investorab.com
873[+] 80.169.185.7
874[+] www.nywebaccess.investorab.com
875[+] ems1.ems.investorab.com
876[+] extranet.investorab.com
877[+] 212.209.235.51
878[+] www.adfs.investorab.com
879[+] nywebaccess.investorab.com
880[+] guest.investorab.com
881[+] enterpriseregistration.investorab.com
882[+] ir.investorab.com
883[+] 80.169.185.11
884[+] 80.169.184.240
885[+] 66.43.99.188
886[+] autodiscover.investorab.com
887[+] 203.193.62.53
888[+] share.investorab.com
889[+] e15919.b.akamaiedge.net
890[+] www.ems2.ems.investorab.com
891[+] ibe.investorab.com
892[+] 23.100.15.180
893[+] map11-100.s.section.io
894[+] 80.169.185.9
895[+] hkwebaccess.investorab.com
896[+] igcmig.investorab.com
897[+] www.mx5.investorab.com
898[+] 80.169.185.6
899[+] 80.169.184.235
900[+] 80.169.182.217
901[+] 80.169.185.5
902[+] subscribe.investorab.com
903[+] hybrid.investorab.com
904[+] navs.investorab.com
905
906[+] Total Found : 52
907
908[+] Port : 33434
909[+] Timeout : 1.0
910
911[!] Starting UDP Traceroute...
912
913HOPS IP HOST
914
9151 10.202.1.1 _gateway
9162 190.105.229.1 Unknown
9173 181.119.68.33 Unknown
9184 200.61.128.254 ge-0-0-0.ARBUE.m20x1
9195 216.241.0.2 static.ifxnw.cl
9206 * * *
9217 104.44.226.75 ae14-0.scl01-96cbe-1b.ntwk.msn.net
9228 104.44.11.111 be-24-0.ibr01.scl01.ntwk.msn.net
9239 104.44.17.178 be-2-0.ibr01.mia.ntwk.msn.net
92410 104.44.28.63 be-4-0.ibr01.atl30.ntwk.msn.net
92511 104.44.7.144 be-2-0.ibr01.atl31.ntwk.msn.net
92612 104.44.7.146 be-3-0.ibr03.bn6.ntwk.msn.net
92713 104.44.7.75 be-2-0.ibr03.bl7.ntwk.msn.net
92814 104.44.16.19 be-7-0.ibr01.ewr30.ntwk.msn.net
92915 104.44.17.153 be-4-0.ibr01.sxl71.ntwk.msn.net
93016 104.44.16.113 be-5-0.ibr01.dub07.ntwk.msn.net
93117 104.44.19.213 be-8-0.ibr01.ams21.ntwk.msn.net
93218 104.44.22.216 ae102-0.icr02.ams30.ntwk.msn.net
93319 * * *
93420 * * *
93521 * * *
93622 * * *
93723 * * *
93824 * * *
93925 * * *
94026 * * *
94127 * * *
94228 * * *
94329 * * *
94430 * * *
945
946[!] Starting Port Scan...
947
948[+] Testing Top 1000 Ports...
949
950[+] 80 http
951[+] 443 https
952
953[!] Starting Crawler...
954
955[+] Looking for robots.txt........[ Not Found ]
956[+] Looking for sitemap.xml.......[ Not Found ]
957[+] Extracting CSS Links..........[ 1 ]
958[+] Extracting Javascript Links...[ 2 ]
959[+] Extracting Internal Links.....[ 1 ]
960[+] Extracting External Links.....[ 3 ]
961[+] Extracting Images.............[ 1 ]
962[+] Crawling Sitemaps.............[ 0 ]
963[+] Crawling Javascripts..........[ 7 ]
964
965[+] Total Unique Links Extracted : 15
966
967[!] Starting Directory Search...
968
969[+] Threads : 50
970[+] Timeout : 10.0
971[+] Wordlist : wordlists/dirb_common.txt
972[+] Allow Redirects : False
973[+] SSL Verification : True
974[+] DNS Servers : 1.1.1.1
975
976[+] 200 | https://www.investorab.com/
977[+] 302 | https://www.investorab.com/aux
978[+] 302 | https://www.investorab.com/com1
979[+] 302 | https://www.investorab.com/com2
980[+] 302 | https://www.investorab.com/com3
981[+] 302 | https://www.investorab.com/con
982[+] 200 | https://www.investorab.com/contact
983[+] 200 | https://www.investorab.com/Contact
984[+] 200 | https://www.investorab.com/cookies
985[+] 200 | https://www.investorab.com/favicon.ico
986[+] 200 | https://www.investorab.com/home
987[+] 200 | https://www.investorab.com/Home
988[+] 302 | https://www.investorab.com/install
989[+] 301 | https://www.investorab.com/kontakt
990[+] 302 | https://www.investorab.com/lpt1
991[+] 302 | https://www.investorab.com/lpt2
992[+] 302 | https://www.investorab.com/nul
993[+] 302 | https://www.investorab.com/prn
994[+] 200 | https://www.investorab.com/sitemap
995[+] 200 | https://www.investorab.com/SiteMap
996[+] 307 | https://www.investorab.com/subscriptions
997[+] 200 | https://www.investorab.com/sv
998[+] 200 | https://www.investorab.com/umbraco
999
1000[+] Directories Found : 23
1001[+] Directories Skipped : 4495
1002[+] Total Requests : 4518
1003
1004[+] Completed in 0:06:32.216183
1005################################################################################################################################
1006[*] Processing domain investorab.com
1007[*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1008[+] Getting nameservers
1009156.154.130.100 - dns1.cscdns.net
1010156.154.131.100 - dns2.cscdns.net
1011[-] Zone transfer failed
1012
1013[+] TXT records found
1014"EzLVWbQfdcWNDWMegWslwRQ4K5yEheQrHLcjkkk9EnYe/cS2E9N/EiBx6qVT4HCTh00l1xV+KOhn2rFV+Uppxg=="
1015"MS=ms68063239"
1016"v=spf1 a:ems1.ems.investorab.com a:sto-adex01.investor.se a:mx4.investorab.com a:mx5.investorab.com include:spf.protection.outlook.com -all"
1017
1018[+] DMARC records found
1019"v=DMARC1; p=none; pct=50; rua=mailto:helpdesk@investorab.com; ruf=mailto:helpdesk@investorab.com; adkim=r; aspf=r; rf=afrf"
1020
1021[+] MX records found, added to target list
10220 investorab-com.mail.protection.outlook.com.
1023
1024[*] Scanning investorab.com for A records
1025165.160.13.20 - investorab.com
1026165.160.15.20 - investorab.com
102780.169.184.240 - autodiscover.investorab.com
1028212.209.235.51 - bt.investorab.com
102980.169.185.10 - extranet.investorab.com
103010.46.10.206 - guest.investorab.com
1031212.209.235.51 - ip.investorab.com
1032212.209.235.51 - m.investorab.com
103380.169.185.8 - mail.investorab.com
1034212.209.237.41 - ns1.investorab.com
1035212.209.235.51 - share.investorab.com
103652.112.64.11 - sip.investorab.com
103780.169.184.235 - vpn.investorab.com
103823.100.15.180 - www.investorab.com
1039#################################################################################################################################
1040adding 23.100.15.180/32 mode `TCPscan' ports `7,9,11,13,18,19,21-23,25,37,39,42,49,50,53,65,67-70,79-81,88,98,100,105-107,109-111,113,118,119,123,129,135,137-139,143,150,161-164,174,177-179,191,199-202,204,206,209,210,213,220,345,346,347,369-372,389,406,407,422,443-445,487,500,512-514,517,518,520,525,533,538,548,554,563,587,610-612,631-634,636,642,653,655,657,666,706,750-752,765,779,808,873,901,923,941,946,992-995,1001,1023-1030,1080,1210,1214,1234,1241,1334,1349,1352,1423-1425,1433,1434,1524,1525,1645,1646,1649,1701,1718,1719,1720,1723,1755,1812,1813,2048-2050,2101-2104,2140,2150,2233,2323,2345,2401,2430,2431,2432,2433,2583,2628,2776,2777,2988,2989,3050,3130,3150,3232,3306,3389,3456,3493,3542-3545,3632,3690,3801,4000,4400,4321,4567,4899,5002,5136-5139,5150,5151,5222,5269,5308,5354,5355,5422-5425,5432,5503,5555,5556,5678,6000-6007,6346,6347,6543,6544,6789,6838,6666-6670,7000-7009,7028,7100,7983,8079-8082,8088,8787,8879,9090,9101-9103,9325,9359,10000,10026,10027,10067,10080,10081,10167,10498,11201,15345,17001-17003,18753,20011,20012,21554,22273,26274,27374,27444,27573,31335-31338,31787,31789,31790,31791,32668,32767-32780,33390,47262,49301,54320,54321,57341,58008,58009,58666,59211,60000,60006,61000,61348,61466,61603,63485,63808,63809,64429,65000,65506,65530-65535' pps 300
1041using interface(s) eth0
1042added module payload for port 518 proto 17
1043added module payload for port 53 proto 17
1044added module payload for port 80 proto 6
1045added module payload for port 1900 proto 17
1046added module payload for port 80 proto 6
1047added module payload for port 5060 proto 17
1048scaning 1.00e+00 total hosts with 3.38e+02 total packets, should take a little longer than 8 Seconds
1049drone type Unknown on fd 4 is version 1.1
1050drone type Unknown on fd 3 is version 1.1
1051added module payload for port 518 proto 17
1052added module payload for port 53 proto 17
1053added module payload for port 80 proto 6
1054added module payload for port 1900 proto 17
1055added module payload for port 80 proto 6
1056added module payload for port 5060 proto 17
1057scan iteration 1 out of 1
1058using pcap filter: `dst 192.168.0.52 and ! src 192.168.0.52 and (tcp)'
1059using TSC delay
1060sender statistics 299.7 pps with 338 packets sent total
1061listener statistics 144 packets recieved 0 packets droped and 0 interface drops
1062#################################################################################################################################
1063[INFO] ------TARGET info------
1064[*] TARGET: https://www.investorab.com/
1065[*] TARGET IP: 23.100.15.180
1066[INFO] NO load balancer detected for www.investorab.com...
1067[*] DNS servers: dns1.cscdns.net.
1068[*] TARGET server: Microsoft-IIS/8.5
1069[*] CC: NL
1070[*] Country: Netherlands
1071[*] RegionCode: NH
1072[*] RegionName: North Holland
1073[*] City: Amsterdam
1074[*] ASN: AS8075
1075[*] BGP_PREFIX: 23.100.0.0/15
1076[*] ISP: MICROSOFT-CORP-MSN-AS-BLOCK, US
1077[INFO] SSL/HTTPS certificate detected
1078[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
1079[*] Subject: subject=CN = www.investorab.com
1080[ALERT] Let's Encrypt is commonly used for Phishing
1081[INFO] DNS enumeration:
1082[*] m.investorab.com 212.209.235.51
1083[*] mail.investorab.com 80.169.185.8
1084[*] ns1.investorab.com 212.209.237.41
1085[*] ns2.investorab.com 212.209.235.42
1086[*] vpn.investorab.com 80.169.184.235
1087[INFO] Possible abuse mails are:
1088[*] abuse@investorab.com
1089[*] abuse@www.investorab.com
1090[*] report_spam@hotmail.com
1091[INFO] NO PAC (Proxy Auto Configuration) file FOUND
1092[INFO] Starting FUZZing in http://www.investorab.com/FUzZzZzZzZz...
1093[INFO] Status code Folders
1094[ALERT] Look in the source code. It may contain passwords
1095[INFO] Links found from https://www.investorab.com/ http://23.100.15.180/:
1096[*] https://investor.teamtailor.com/
1097[*] https://vp053.alertir.com/afw/files/press/investor/202003263627-1.pdf
1098[*] https://www.investorab.com/
1099[*] https://www.investorab.com/about-investor/
1100[*] https://www.investorab.com/about-investor/board-management/
1101[*] https://www.investorab.com/about-investor/board-management/board-of-directors/
1102[*] https://www.investorab.com/about-investor/board-management/board-of-directors/grace-reksten-skaugen/
1103[*] https://www.investorab.com/about-investor/board-management/board-of-directors/gunnar-brock/
1104[*] https://www.investorab.com/about-investor/board-management/board-of-directors/hans-straberg/
1105[*] https://www.investorab.com/about-investor/board-management/board-of-directors/jacob-wallenberg/
1106[*] https://www.investorab.com/about-investor/board-management/board-of-directors/johan-forssell/
1107[*] https://www.investorab.com/about-investor/board-management/board-of-directors/lena-treschow-torell/
1108[*] https://www.investorab.com/about-investor/board-management/board-of-directors/magdalena-gerger/
1109[*] https://www.investorab.com/about-investor/board-management/board-of-directors/marcus-wallenberg/
1110[*] https://www.investorab.com/about-investor/board-management/board-of-directors/sara-mazur/
1111[*] https://www.investorab.com/about-investor/board-management/board-of-directors/tom-johnstone-cbe/
1112[*] https://www.investorab.com/about-investor/board-management/management-group/
1113[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/
1114[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/daniel-nodhall/
1115[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/helena-saxon/
1116[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/johan-forssell/
1117[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/petra-hedengran/
1118[*] https://www.investorab.com/about-investor/board-management/management-group/management-group/viveka-hirdman-ryrberg/
1119[*] https://www.investorab.com/about-investor/board-management/management-group/members-of-the-extended-management-group/
1120[*] https://www.investorab.com/about-investor/board-management/management-group/members-of-the-extended-management-group/christian-cederholm/
1121[*] https://www.investorab.com/about-investor/board-management/management-group/members-of-the-extended-management-group/jessica-haggstrom/
1122[*] https://www.investorab.com/about-investor/board-management/management-group/members-of-the-extended-management-group/noah-walley/
1123[*] https://www.investorab.com/about-investor/business-areas/
1124[*] https://www.investorab.com/about-investor/business-areas/investments-in-eqt/
1125[*] https://www.investorab.com/about-investor/business-areas/listed-companies/
1126[*] https://www.investorab.com/about-investor/business-areas/patricia-industries/
1127[*] https://www.investorab.com/about-investor/corporate-governance/
1128[*] https://www.investorab.com/about-investor/corporate-governance/annual-general-meeting/
1129[*] https://www.investorab.com/about-investor/corporate-governance/annual-general-meeting/agm-2019/
1130[*] https://www.investorab.com/about-investor/corporate-governance/annual-general-meeting/agm-2019/johan-forssell-agm-speech-2019/
1131[*] https://www.investorab.com/about-investor/corporate-governance/annual-general-meeting/agm-2020/
1132[*] https://www.investorab.com/about-investor/corporate-governance/annual-general-meeting/archive-agm/
1133[*] https://www.investorab.com/about-investor/corporate-governance/articles-of-association/
1134[*] https://www.investorab.com/about-investor/corporate-governance/auditors/
1135[*] https://www.investorab.com/about-investor/corporate-governance/board-of-directors/
1136[*] https://www.investorab.com/about-investor/corporate-governance/board-of-directors/board-committees/
1137[*] https://www.investorab.com/about-investor/corporate-governance/control-functions/
1138[*] https://www.investorab.com/about-investor/corporate-governance/corporate-governance-report/
1139[*] https://www.investorab.com/about-investor/corporate-governance/corporate-governance-report/corporate-governance-report-archive/
1140[*] https://www.investorab.com/about-investor/corporate-governance/management/
1141[*] https://www.investorab.com/about-investor/corporate-governance/nomination-committee/
1142[*] https://www.investorab.com/about-investor/corporate-governance/remuneration-management/
1143[*] https://www.investorab.com/about-investor/corporate-governance/remuneration-the-board/
1144[*] https://www.investorab.com/about-investor/employees-your-career/
1145[*] https://www.investorab.com/about-investor/employees-your-career/core-values/
1146[*] https://www.investorab.com/about-investor/employees-your-career/diversity-inclusion/
1147[*] https://www.investorab.com/about-investor/employees-your-career/employees/
1148[*] https://www.investorab.com/about-investor/how-we-do-it/
1149[*] https://www.investorab.com/about-investor/how-we-do-it/operating-priorities/
1150[*] https://www.investorab.com/about-investor/investor-s-history/
1151[*] https://www.investorab.com/about-investor/investor-s-history/1916-1929/
1152[*] https://www.investorab.com/about-investor/investor-s-history/1929-1963/
1153[*] https://www.investorab.com/about-investor/investor-s-history/1963-1978/
1154[*] https://www.investorab.com/about-investor/investor-s-history/1978-1984/
1155[*] https://www.investorab.com/about-investor/investor-s-history/1984-1994/
1156[*] https://www.investorab.com/about-investor/investor-s-history/1994-2004/
1157[*] https://www.investorab.com/about-investor/investor-s-history/2005/
1158[*] https://www.investorab.com/about-investor/our-business-model/
1159[*] https://www.investorab.com/about-investor/targets-and-outcome/
1160[*] https://www.investorab.com/about-investor/targets-and-outcome/created-impact/
1161[*] https://www.investorab.com/contact/
1162[*] https://www.investorab.com/contact/jessica-haggstrom/
1163[*] https://www.investorab.com/contact/magnus-dalhammar/
1164[*] https://www.investorab.com/contact/sofia-jonsson/
1165[*] https://www.investorab.com/contact/viveka-hirdman-ryrberg/
1166[*] https://www.investorab.com/cookies/
1167[*] https://www.investorab.com/investors-media/
1168[*] https://www.investorab.com/investors-media/bondholders/
1169[*] https://www.investorab.com/investors-media/bondholders/loan-programs-and-facilities/
1170[*] https://www.investorab.com/investors-media/bondholders/maturity-profile/
1171[*] https://www.investorab.com/investors-media/bondholders/outstanding-public-bonds/
1172[*] https://www.investorab.com/investors-media/events-calendar/
1173[*] https://www.investorab.com/investors-media/events-calendar/events-calendar-archive/
1174[*] https://www.investorab.com/investors-media/image-gallery/
1175[*] https://www.investorab.com/investors-media/image-gallery/logotype/
1176[*] https://www.investorab.com/investors-media/investor-in-figures/
1177[*] https://www.investorab.com/investors-media/investor-in-figures/accounting-policies/
1178[*] https://www.investorab.com/investors-media/investor-in-figures/accounting-policies/accounting-and-valuation-of-holdings/
1179[*] https://www.investorab.com/investors-media/investor-in-figures/accounting-policies/equity-related-investments/
1180[*] https://www.investorab.com/investors-media/investor-in-figures/definitions/
1181[*] https://www.investorab.com/investors-media/investor-in-figures/financial-statements/
1182[*] https://www.investorab.com/investors-media/investor-in-figures/key-figures/
1183[*] https://www.investorab.com/investors-media/press-releases-news/
1184[*] https://www.investorab.com/investors-media/press-releases-news/ceo-richard-twomey-leaves-molnlycke/
1185[*] https://www.investorab.com/investors-media/press-releases-news/?id=1791906
1186[*] https://www.investorab.com/investors-media/reports-presentations/
1187[*] https://www.investorab.com/investors-media/reports-presentations/2012/
1188[*] https://www.investorab.com/investors-media/reports-presentations/2013/
1189[*] https://www.investorab.com/investors-media/reports-presentations/2014/
1190[*] https://www.investorab.com/investors-media/reports-presentations/2015/
1191[*] https://www.investorab.com/investors-media/reports-presentations/2016/
1192[*] https://www.investorab.com/investors-media/reports-presentations/2017/
1193[*] https://www.investorab.com/investors-media/reports-presentations/2018/
1194[*] https://www.investorab.com/investors-media/reports-presentations/2019/
1195[*] https://www.investorab.com/investors-media/reports-presentations/archive/
1196[*] https://www.investorab.com/investors-media/reports-presentations/cmd-2017/
1197[*] https://www.investorab.com/investors-media/shareholders/
1198[*] https://www.investorab.com/investors-media/shareholders/analysts/
1199[*] https://www.investorab.com/investors-media/shareholders/dividend-and-dividend-policy/
1200[*] https://www.investorab.com/investors-media/shareholders/dividend-and-dividend-policy/dividend/
1201[*] https://www.investorab.com/investors-media/shareholders/historical-share-data/
1202[*] https://www.investorab.com/investors-media/shareholders/ownership-structure/
1203[*] https://www.investorab.com/investors-media/shareholders/repurchase-of-own-shares/
1204[*] https://www.investorab.com/investors-media/shareholders/share-price-calculator/
1205[*] https://www.investorab.com/investors-media/shareholders/total-shareholder-return/
1206[*] https://www.investorab.com/investors-media/subscription-services/
1207[*] https://www.investorab.com/investors-media/subscription-services/order-printed-information/
1208[*] https://www.investorab.com/media/qkgenhia/190509_code-of-conduct.pdf
1209[*] https://www.investorab.com/our-investment/listed companies/
1210[*] https://www.investorab.com/our-investment/listed companies/abb/
1211[*] https://www.investorab.com/our-investment/listed companies/astrazeneca/
1212[*] https://www.investorab.com/our-investment/listed companies/atlas-copco/
1213[*] https://www.investorab.com/our-investment/listed companies/electrolux/
1214[*] https://www.investorab.com/our-investment/listed companies/electrolux-professional/
1215[*] https://www.investorab.com/our-investment/listed companies/epiroc/
1216[*] https://www.investorab.com/our-investment/listed companies/ericsson/
1217[*] https://www.investorab.com/our-investment/listed companies/husqvarna-group/
1218[*] https://www.investorab.com/our-investment/listed companies/nasdaq/
1219[*] https://www.investorab.com/our-investment/listed companies/saab/
1220[*] https://www.investorab.com/our-investment/listed companies/seb/
1221[*] https://www.investorab.com/our-investment/listed companies/sobi/
1222[*] https://www.investorab.com/our-investment/listed companies/wartsila/
1223[*] https://www.investorab.com/our-investments/
1224[*] https://www.investorab.com/our-investments/?category=investments-in-eqt
1225[*] https://www.investorab.com/our-investments/?category=listed-companies
1226[*] https://www.investorab.com/our-investments/?category=patricia-industries
1227[*] https://www.investorab.com/our-investments/investments-in-eqt/
1228[*] https://www.investorab.com/our-investments/investments-in-eqt/eqt/
1229[*] https://www.investorab.com/our-investments/patricia-industries/
1230[*] https://www.investorab.com/our-investments/patricia-industries/3-scandinavia/
1231[*] https://www.investorab.com/our-investments/patricia-industries/braunability/
1232[*] https://www.investorab.com/our-investments/patricia-industries/financial-investments/
1233[*] https://www.investorab.com/our-investments/patricia-industries/laborie/
1234[*] https://www.investorab.com/our-investments/patricia-industries/molnlycke/
1235[*] https://www.investorab.com/our-investments/patricia-industries/permobil/
1236[*] https://www.investorab.com/our-investments/patricia-industries/piab/
1237[*] https://www.investorab.com/our-investments/patricia-industries/sarnova/
1238[*] https://www.investorab.com/our-investments/patricia-industries/the-grand-group/
1239[*] https://www.investorab.com/our-investments/patricia-industries/vectura/
1240[*] https://www.investorab.com/privacy-notice/
1241[*] https://www.investorab.com/sustainability/
1242[*] https://www.investorab.com/sustainability/business-ethics-governance/
1243[*] https://www.investorab.com/sustainability/climate-resource-efficiency/
1244[*] https://www.investorab.com/sustainability/code-of-conduct/
1245[*] https://www.investorab.com/sustainability/diversity-inclusion/
1246[*] https://www.investorab.com/sustainability/un-global-goals/
1247[*] https://www.investorab.com/sustainability/whistleblowing/
1248[*] https://www.investorab.com/sv/
1249[*] https://www.linkedin.com/company/investor-ab
1250cut: intervalle de champ incorrecte
1251Saisissez « cut --help » pour plus d'informations.
1252[INFO] Shodan detected the following opened ports on 23.100.15.180:
1253[*] 443
1254[*] 80
1255[INFO] ------VirusTotal SECTION------
1256[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
1257[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
1258[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
1259[INFO] ------Alexa Rank SECTION------
1260[INFO] Percent of Visitors Rank in Country:
1261[INFO] Percent of Search Traffic:
1262[INFO] Percent of Unique Visits:
1263[INFO] Total Sites Linking In:
1264[*] Total Sites
1265[INFO] Useful links related to www.investorab.com - 23.100.15.180:
1266[*] https://www.virustotal.com/pt/ip-address/23.100.15.180/information/
1267[*] https://www.hybrid-analysis.com/search?host=23.100.15.180
1268[*] https://www.shodan.io/host/23.100.15.180
1269[*] https://www.senderbase.org/lookup/?search_string=23.100.15.180
1270[*] https://www.alienvault.com/open-threat-exchange/ip/23.100.15.180
1271[*] http://pastebin.com/search?q=23.100.15.180
1272[*] http://urlquery.net/search.php?q=23.100.15.180
1273[*] http://www.alexa.com/siteinfo/www.investorab.com
1274[*] http://www.google.com/safebrowsing/diagnostic?site=www.investorab.com
1275[*] https://censys.io/ipv4/23.100.15.180
1276[*] https://www.abuseipdb.com/check/23.100.15.180
1277[*] https://urlscan.io/search/#23.100.15.180
1278[*] https://github.com/search?q=23.100.15.180&type=Code
1279[INFO] Useful links related to AS8075 - 23.100.0.0/15:
1280[*] http://www.google.com/safebrowsing/diagnostic?site=AS:8075
1281[*] https://www.senderbase.org/lookup/?search_string=23.100.0.0/15
1282[*] http://bgp.he.net/AS8075
1283[*] https://stat.ripe.net/AS8075
1284[INFO] Date: 30/03/20 | Time: 17:16:55
1285[INFO] Total time: 3 minute(s) and 57 second(s)
1286#################################################################################################################################
1287[+] Starting At 2020-03-30 17:13:02.131640
1288[+] Collecting Information On: https://www.investorab.com/
1289[#] Status: 200
1290--------------------------------------------------
1291[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
1292- Cache-Control: private
1293- Content-Length: 22308
1294- Content-Type: text/html; charset=utf-8
1295- Content-Encoding: gzip
1296- Vary: Accept-Encoding
1297- Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
1298- Date: Mon, 30 Mar 2020 21:13:05 GMT
1299--------------------------------------------------
1300[#] Finding Location..!
1301[#] status: success
1302[#] country: United States
1303[#] countryCode: US
1304[#] region: DC
1305[#] regionName: District of Columbia
1306[#] city: Washington
1307[#] zip: 20068
1308[#] lat: 38.9072
1309[#] lon: -77.0369
1310[#] timezone: America/New_York
1311[#] isp: Corporation Service Company
1312[#] org: Corporation Service Company
1313[#] as: AS19574 Corporation Service Company
1314[#] query: 165.160.13.20
1315--------------------------------------------------
1316[x] Didn't Detect WAF Presence on: https://www.investorab.com/
1317--------------------------------------------------
1318[#] Starting Reverse DNS
1319[!] Found 1000 any Domain
1320- 0900money.com
1321- 0rvis.com
1322- 1-1com.com
1323- 1-800-flores.com.br
1324- 1-800-flowers.com.br
1325- 100brookwoodplace.net
1326- 1033thezone.com
1327- 1067mix.com
1328- 10secondstest.com
1329- 1130citynews.ca
1330- 124c.com
1331- 1331lounge.com
1332- 13thstreet.nl
1333- 1800flowers.com.br
1334- 1adjustablebed.com
1335- 1autotrader.com
1336- 1stcommand.org
1337- 1stcommandbank.com
1338- 1stcommandbank.net
1339- 1stcommandfinancialplanning.com
1340- 1stcommandfinancialservices.com
1341- 1stcommandfinancialservices.org
1342- 1stcommandgroup.com
1343- 1stcommandtrustservices.net
1344- 1to1advertising.com
1345- 1to1com.com
1346- 1to1com.net
1347- 1to1healthcare.com
1348- 1to4c.com
1349- 1weddings.com
1350- 1world1party.com
1351- 2006fifawm.com
1352- 2010fifaworldcup.org
1353- 2010fifaworldcupsouthafrica.com
1354- 2011.walkforhemophilia.com
1355- 2013cheapwatches.net
1356- 2013purseonline.net
1357- 2014rb-outlet.com
1358- 2cents.dailyreckoning.com
1359- 2essentgld2004.com
1360- 2getpizza.com
1361- 2houstoncenter.com
1362- 2pontozero.com.br
1363- 30anscarglass.fr
1364- 35under35.org
1365- 360spacesaver.com
1366- 3cooljewels.com
1367- 3sixtymedia.com
1368- 400.lm.com
1369- 401ksystem.com
1370- 43co.com
1371- 442tickets.com
1372- 45mx.com
1373- 4easycar.com
1374- 4frontresearch.com
1375- 4glte.com.mx
1376- 4pumps.net
1377- 4waypriceprotection.com
1378- 5minuteofficeworkout.com
1379- 5starbyproform.org
1380- 5starfitnessprogram.com
1381- 5starfitnesssystem.com
1382- 5starpackage.com
1383- 7daypainpatch.com
1384- 7daypainrelief.org
1385- 800-flowers.com.br
1386- 97store.com
1387- a--loft.com
1388- a-lofts.com
1389- a1cnow.net
1390- a1travelselect.com
1391- aaahandbagsmarket.com
1392- aaarc.com
1393- aalbo.com
1394- aandeelhoudereuronext.com
1395- abandbackflex.com
1396- abbey.com
1397- abbeymoneymarkets.com
1398- abbvia.com
1399- aberchrombieandfitch.com
1400- abercrombie.com.tw
1401- abercrombieandfintch.com
1402- aberdeenscotland.net
1403- abingdonberks.com
1404- abloy.com.br
1405- abnamro.it
1406- about-hepatitisc.net
1407- aboutbloomberg.com
1408- abouthepatitisc.com
1409- abouthepc.com
1410- aboutmichaelbloomberg.com
1411- aboutmichaelrbloomberg.org
1412- aboutsummitacceleratorfund.net
1413- absolutehuman.com
1414- absolutlounge.com.br
1415- absolutparty.com.br
1416- absolutvodka.com.br
1417- acba.lm.com
1418- accembargos.com
1419- accessallstate.org
1420- accolate.com.br
1421- accompliephoto.net
1422- accoonahelp.com
1423- accor.com
1424- accord-consumer-finance.com
1425- accordfinans.com
1426- acelion.com
1427- ackermerrall.org
1428- acoona.com
1429- acquitygroup.com
1430- acrodize.com
1431- acroflur.com
1432- actaflex.com
1433- actaflexblows.net
1434- actaflexdoesntwork.com
1435- actaflexstinks.net
1436- actaflexsucks.net
1437- actaflexsux.com
1438- acticontraining.com
1439- actim.org
1440- actimindex.org
1441- activation-comcast.net
1442- activeinternational.com.br
1443- activia.ca
1444- actonlondon.net
1445- actorkevinspacey.com
1446- adaflexstinks.org
1447- adaflexsucks.com
1448- adaptivequantiser.com
1449- addabaaji.com
1450- adesa.karportal.net
1451- adesaopenlane.com
1452- adesaopenlane.net
1453- adesawebservices.net
1454- adioskbhome.org
1455- adioskbhomes.com
1456- adioskbhomes.net
1457- adioskbhomes.org
1458- admagazine.com.br
1459- adminjobsatabbey.com
1460- adtmiami.net
1461- adtpulse.com.br
1462- advancemalesling.com
1463- advantagecrossbow.net
1464- advantagecrossbow.org
1465- advantagescore.com
1466- advantire.com
1467- aegion.com.br
1468- aeromanager-online.com
1469- aetnconsumerproducts.com
1470- afc.karportal.net
1471- africansingles.com
1472- afterthefalljuices.net
1473- agchemstewardship.com
1474- ageofconan-beta.com
1475- agricentro.it
1476- agrosilicio.com.br
1477- agstewardshipcouncil.com
1478- agtoolbox.com
1479- ahasunglasses.com
1480- ahima.echelp.org
1481- ahorosaludable.com
1482- aigenforcements.com
1483- aiowireless.net
1484- air-ride.com
1485- airblade.com.br
1486- airfare-online.net
1487- airfare-orbitz.com
1488- airline-ticket-price-online.com
1489- airline-tickets-orbitz.com
1490- airmultiplier.com.br
1491- airoperatedpump.net
1492- airproducts.net.br
1493- airsleepstore.com
1494- aiyijerseyonsale.com
1495- akoona.org
1496- alamocarbrasil.com.br
1497- alderkingpropertyconsultants.org
1498- aldi24.de
1499- aldoshoes.cl
1500- aldwychlondon.com
1501- aldwychlondon.net
1502- alere.co.il
1503- aleveextrafuerte.com
1504- alexrcohen.com
1505- alicelady.com
1506- alivewithtaste.com
1507- all-about-hepc.com
1508- allabouthepc.net
1509- allaboutkevin-spacey.com
1510- allaboutkevinspacey.com
1511- allaboutlevitra.com
1512- allaboutmalibu.com
1513- allaboutspacey.com
1514- allaboutvendera.com
1515- allenandroth.com
1516- allenbrothers.com
1517- allernex.com
1518- allhandbagsbar.com
1519- alliesells.info
1520- allison.com
1521- allstatebankhomeloans.org
1522- allstatebankmortgages.com
1523- allstatebankmortgages.org
1524- allstatebankonline.com
1525- allstatecorporation.com
1526- allstatefinancialadvisors.com
1527- allstatefinancialsucks.com
1528- allstatepfr.org
1529- almaden.com.br
1530- aloft.com.br
1531- aloftarundelmillshotel.com
1532- aloftbeiginghaidian.com
1533- aloftbeijing.com
1534- aloftcharlottehotel.com
1535- aloftchesapeake.com
1536- aloftchicagoairport.com
1537- aloftconference.com
1538- aloftconferences.net
1539- aloftdenveraristanorthwest.com
1540- aloftdulles.com
1541- alofteats.com
1542- aloftglendalehotel.com
1543- aloftgrapevinehotel.com
1544- aloftgreenvilleairport.com
1545- aloftguests.com
1546- alofthoneymoon.net
1547- alofthotel.com
1548- alofthotelbeijinghaidian.com
1549- alofthotelconferences.net
1550- alofthotelevents.net
1551- alofthotelgreenvilleairport.com
1552- alofthotelleawood.com
1553- alofthotellincolnshire.com
1554- alofthotelminneapolis.com
1555- alofthotelphoenixairport.com
1556- alofthotelplano.com
1557- alofthotelseats.com
1558- alofthotelsydneyairport.com
1559- aloftlaval.com
1560- aloftlincolnshirehotel.com
1561- aloftmillenniumcenterhotel.com
1562- aloftminneapolis.com
1563- aloftmontrealhotel.com
1564- aloftnorfolk.com
1565- aloftontario-rc.com
1566- aloftphiladelphiaaiprort.com
1567- aloftphiladelphiadowntown.com
1568- aloftplainfieldhotel.com
1569- aloftranchocucamongahotel.com
1570- alofts.net
1571- aloftscottsdale.com
1572- aloftvacations.com
1573- aloftvacations.net
1574- aloftvaughan.com
1575- aloftwoodfieldcrossinghotel.com
1576- alois.de
1577- alpenland-online.at
1578- alpertonlondon.com
1579- alphahuman.com
1580- alpharettamarriottweddings.com
1581- alternativespaces.net
1582- alterungsschutz.info
1583- altonacp.net
1584- altonaprivateequity.com
1585- altonatechnology.net
1586- altonatechnologypartners.com
1587- altonatechnologyventures.net
1588- altonaventurecapital.net
1589- altria.com
1590- alufor.com
1591- alufor.net
1592- aluma.cl
1593- amarylconnectionow.com
1594- amateurspayperview.com
1595- amercorealestate.net
1596- americanalliedcapital.com
1597- americantoydreamers.com
1598- americantransportationcorp.com
1599- amershambucks.com
1600- amigoclaro.mx
1601- amkoservice.com
1602- amkoservice.net
1603- amodrill.com
1604- amope.cl
1605- amsinnovations.com
1606- amsminiarcprecise.net
1607- amstelfallas.com
1608- analysts-inc.net
1609- ancor.com
1610- andrewwk2.com
1611- angeliqsideeffects.com
1612- angina.it
1613- anglestores.com
1614- angryatuhaul.net
1615- angryatuhaul.org
1616- annapurna.com
1617- anncares.com
1618- annetaylorloft.com
1619- anntaylorloft.com.cn
1620- anntaylorsucks.net
1621- ansimagdrive.com
1622- anticoagulacao.com.br
1623- anuvajjalla.com
1624- aolnews.us
1625- aootime.com
1626- ap9-24protectplus.org
1627- ap9-americanrxplan.org
1628- ap9-businessmax.com
1629- ap9-dealpass.net
1630- ap9-galleriausa.com
1631- ap9-homeworks.net
1632- ap9-homeworksplus.com
1633- ap9-mainstreetsavings.com
1634- ap9-moneymaster.org
1635- ap9-primesplasirs.org
1636- ap9-privacymatters.org
1637- ap9-privacyplus.net
1638- ap9-redwhiteandfun.com
1639- ap9-redwhiteandfun.net
1640- ap9-shoppingessentials.org
1641- ap9-themarketplaza.com
1642- ap9-yoursavingsclubca.org
1643- ap9chexsoi.com
1644- ap9dealpass.net
1645- ap9privacyprotection.org
1646- apa.rs
1647- apex-llc.com
1648- apex-mall.com
1649- apex-online.com
1650- apex-store.com
1651- apex-store.net
1652- apex-stores.net
1653- apex-stores.org
1654- apexathome.com
1655- apexautocenters.com
1656- apexcar.com
1657- apexcardonline.com
1658- apexclothing.com
1659- apexdepartmentstore.com
1660- apexdepartmentstores.com
1661- apexexpress.com
1662- apexfashion.com
1663- apexgiftregistry.com
1664- apexmall.net
1665- apexmallonline.com
1666- apexshops.com
1667- apexstores.com
1668- apexstores.net
1669- apextireandservice.org
1670- apextirenservice.com
1671- apextirenservice.net
1672- apextires.com
1673- api.abika.net
1674- api.claroapps.com.do
1675- api.viu.co.id
1676- apnota.4g.mycricket.com
1677- app.maverick.com
1678- appdelivery.net
1679- appealsboardauthority.net
1680- applicationdelivery.org
1681- applyforaclassiccard.com
1682- applynow.cititcards.com
1683- apreeva.com
1684- aprotinin.com
1685- aptalis-pharma.com.br
1686- aptalis-pharmaceuticals.com.br
1687- aptalis.com.br
1688- aptalisbio.com.br
1689- aptalisbiotech.com.br
1690- aptalisbiotechnology.com.br
1691- aptlocators.net
1692- aquahart.com
1693- aquahart.net
1694- aquamaster.com
1695- aquatechpumps.com
1696- aquatecpump.com
1697- arabia.starzplay.net
1698- aramis-jp.com
1699- aramis-jp.org
1700- aramisjapan.com
1701- arbinetthexchange.net
1702- arbonneinternational.com
1703- arbonnemail.net
1704- arbonnenews.com
1705- arbonnewest.com
1706- arborparkshoppingcenter.com
1707- archcoal.org
1708- architectsofpleasure.net
1709- architecturaldigest.info
1710- areyoutypeo.com
1711- areyoutypeo.net
1712- ariat.cl
1713- arlafoods.com
1714- arlorecords.net
1715- aromaonline.com
1716- arrowvalue.eco.br
1717- arrowvaluerecovery.eco.br
1718- artistsstudio.com
1719- artwalk-design.com
1720- ascendweddingmenu.com
1721- ascentar.com
1722- ascentsucks.org
1723- ascom.com
1724- ascotberks.com
1725- ashfordmiddx.com
1726- ashfordmiddx.net
1727- ashleyhomecenters.com
1728- asiajobs.brandrepublic.com
1729- asiasgottalent.net
1730- asipenguin.com.br
1731- askmichaelblomberg.net
1732- askmikebloomberg.com
1733- asktheesc.com
1734- asma-salute.com
1735- aspn.com
1736- assa.se
1737- asshownontv.com
1738- asthmanex.com
1739- asthmastorybook.com
1740- astimartini.ru
1741- at-home.info
1742- at-homes.com
1743- atautoenrolmentmanager.co.uk
1744- atfjuices.net
1745- athletesingles.com
1746- athleticsmanagement.com
1747- athome-mall.com
1748- athome-shop.com
1749- athome-shops.com
1750- athome-stores.com
1751- athomeadvisors.com
1752- athomeappliance.com
1753- athomeart.com
1754- athomeartgallery.com
1755- athomearts.com
1756- athomeauction.com
1757- athomebabyregistry.com
1758- athomebargains.com
1759- athomebedandbath.com
1760- athomebridal.com
1761- athomebridalregistry.com
1762- athomebride.com
1763- athomebuying.com
1764- athomecard.com
1765- athomecards.com
1766- athomechristmas.com
1767- athomechristmasshoppe.com
1768- athomecinema.com
1769- athomecooking.com
1770- athomedecorating.com
1771- athomeessentials.com
1772- athomeexpress.com
1773- athomefamilymemories.com
1774- athomegarden.com
1775- athomegardenandpatio.com
1776- athomegift.com
1777- athomegiftregistry.com
1778- athomegifts.com
1779- athomekidsclub.com
1780- athomekitchen.com
1781- athomekitchens.com
1782- athomelife.com
1783- athomelink.com
1784- athomeliving.com
1785- athomelivingroom.com
1786- athomeloan.com
1787- athomeloans.com
1788- athomemortgage.com
1789- athomemovies.com
1790- athomepatio.com
1791- athomeregistry.com
1792- athomes.com
1793- athomesale.com
1794- athomeservice.com
1795- athomeshipping.com
1796- athomeshops.com
1797- athomestore.com
1798- athomestores.com
1799- athometheater.com
1800- athometheatre.com
1801- athomevacuums.com
1802- athomevideos.com
1803- athomewedding.com
1804- athomeweddingregistry.com
1805- athomexpress.com
1806- athomezoo.com
1807- atitudessaudaveis.com.br
1808- atlantaautos.atlanta.com
1809- atlantamarriottmarquisevents.com
1810- atlantasheraton.com
1811- atlascopco.co.za
1812- atlasgp.com
1813- atlasgrandprix.com
1814- atmel.fr
1815- atrovent.com.br
1816- att.ca
1817- att.it
1818- att4bc.com
1819- attcall-advantage.net
1820- attuverseoffer.com
1821- attwifi.com
1822- attworldnet.nl
1823- auchanphoto.com
1824- aula-arienzo.com
1825- auotraderclassics.com
1826- austravellive.com
1827- authorhousepenguin.com.br
1828- authorsolutions.com.br
1829- auto-batteries.com
1830- auto-seller.net
1831- auto-trader-clasics.com
1832- auto-traderclassic.com
1833- autobattery.com
1834- automotivemediagroup.com
1835- autopharmacy.net
1836- autosport.co.uk
1837- autotrader-magazine.com
1838- autotrader2k.com
1839- autotraderauctions.net
1840- autotradercassic.com
1841- autotraderclasics.com
1842- autotraderclassic.com
1843- autotradergreen.net
1844- autotradergrenn.net
1845- autotradergrenn.org
1846- autotradermagazines.net
1847- autotradersandiego.com
1848- autotradersclasic.com
1849- autotraderzone.com
1850- autotradrclassics.com
1851- autotrderclassics.com
1852- autre-voyage.com
1853- avalox.com.br
1854- avandiamd.com
1855- avarofloxacin.net
1856- avarofloxacin.org
1857- avawards.com
1858- avedajapan.net
1859- aveedhcp.org
1860- aveedsupport.org
1861- aveedus.com
1862- aveedus.net
1863- aveedusa.org
1864- avent.com.br
1865- aventbrasil.com.br
1866- aventuraeducativa.com
1867- aventures.com
1868- avidcircle.com
1869- avitara.com
1870- aviva.fr
1871- avocent.de
1872- axa-epargneentreprise.com
1873- axa-framlington.org
1874- axa-im.net
1875- axa-imprivateequity.com
1876- axa-investmentmanagers.com
1877- axa-privateequity.com
1878- axa-realestate.com
1879- axa-ventures.com
1880- axaim.org
1881- axainnovation.com
1882- axainvestmentmanagers.com
1883- axamultimanager.com
1884- axareim.com
1885- axialxl-herbicide.com
1886- b-wild.com
1887- b2blatgrocer.com
1888- b2blatgrocer.net
1889- b2blatingroceries.com
1890- b2blatingroceries.org
1891- b2bquerica.org
1892- b2x.org
1893- b31r.com
1894- bababepantolbaby.com.br
1895- baby-express.com
1896- babyboys.com
1897- babycarriage.com
1898- babyexpress.com
1899- babyjoy.com
1900- babystroller.com
1901- bacardi-limon.nl
1902- bacardi.be
1903- bacardi.de
1904- bacardiandcola.net
1905- bacardiandcola.org
1906- bacardideejays.com
1907- bacardifreestyle.com
1908- bacardioro.com
1909- bacardipr.com
1910- bacardiredapple.com
1911- bacardireserva.com
1912- baccardi.com
1913- backtocampus.com
1914- backtoschoolexpress.com
1915- bactalk.com
1916- badlads.itv.com
1917- baesystems.com
1918- bagguonline.com
1919- bagscoupon009.com
1920- baileys.com.br
1921- balbi.com.br
1922- balhamlondon.net
1923- ballantineale.com
1924- ballantines-goplay.com
1925- balmain.fr
1926- baltimorewaterfrontweddings.com
1927- bandbsociety.com
1928- bandh.com.br
1929- banjopump.com
1930- bank-worms.net
1931- bankofamerica.org
1932- banque-accord.fr
1933- banyantree.com
1934- baraima.com
1935- barbiefun.com
1936- barcardi.org
1937- bareescentuals.pt
1938- bareescentualscareers.com
1939- bareminerals-br.com.br
1940- bareminerals.com
1941- bareminerals.net.br
1942- barings.com.br
1943- barkinglondon.com
1944- barneslondon.net
1945- barrelpumps.net
1946- barrons.com.br
1947- barrons.in
1948- bartenders2bartenders.com
1949- basildonessex.com
1950- basildonessex.net
1951- batbash.com
1952- battlestationsmidway.com
1953- bausch-lomb.de
1954- bausch.co.uk
1955- bausch.fr
1956- bayer-iconnect.com
1957- bayer-jardin.com
1958- bayer-pharmacy.com
1959- bayeraspirinhcp.com
1960- bayerbiological.com
1961- bayercropscience.de
1962- bayercropscience.org
1963- bayergarden.com
1964- bayerhealthcarepro.com
1965- bayerinternational.com
1966- bayermaterialscience.de
1967- bayersheetasia.org
1968- bayervital.com
1969- bayharboraloft.com
1970- baypreg.com
1971- bayvue.net
1972- bbc.co
1973- bbcjeans.com
1974- bbcurl.org
1975- bbg-kidzone.com
1976- bbg-marketplace.com
1977- bbg.com
1978- bbgonline.net
1979- bbm.com
1980- bbuuss.com
1981- bcm-europe-michelin.com
1982- bdbeaware.com
1983- bdcatalog.com
1984- be-happy.com
1985- beaconsfieldbucks.com
1986- beaconsfieldbucks.net
1987- beamsuntory.com
1988- beats-seller.com
1989- beatsbydre-headphonesshop.com
1990- beatsbydre-irelandonline.com
1991- beatsmusic.cl
1992- beatsoutlets.com
1993- beautybankinc.net
1994- bebo.ie
1995- beckenhamkent.com
1996- becks.at
1997- becktondickenson.com
1998- bed-bathonline.com
1999- bedandbathonline.com
2000- beddingtonlondon.com
2001- beddingtonlondon.net
2002- bednbathonline.com
2003- beehappy.com
2004- beerducate.com
2005- beerhouse.com
2006- behappy.org
2007- beis.cl
2008- belgravialondon.net
2009- belkdepartmentstore.com
2010- belkhudson.com
2011- belkinc.com
2012- belksimpson.com
2013- belksstores.org
2014- belkstore.com
2015- belkstores.com
2016- bellevueelement.com
2017- benchmark-garage.com
2018- benelliregistry.com
2019- bengalisingles.com
2020- benlista.biz
2021- benlista.com
2022- benlista.net
2023- benlysta-rems.org
2024- benlystarems.org
2025- berg.com
2026- berlex-foundation.com
2027- berlex-foundation.org
2028- berluti.fr
2029- bermondseylondon.com
2030- besam.com.br
2031- best-buy-michelin-tires.com
2032- best-travel.com
2033- bestbeautyproductoftheyear.com
2034- bestbeltforsale.com
2035- bestfriendstv.com
2036- bestnewbeautyproductoftheyear.com
2037- bestretailbrands.com
2038- bestshave.com
2039- bestsunglassesshop.com
2040- bet.fourfourtwo.com
2041- betaloc.com.br
2042- bethesdanorthmarirottweddings.com
2043- bethesdarnjobs.com
2044- bethnalgreenlondon.com
2045- betterthanfresh.net
2046- bia.at
2047- bic.com
2048- bic.com.vn
2049- bicgraphic.com.au
2050- bidefordrfc.co.uk
2051- biffiactuators.com.br
2052- bigbus.biz
2053- bigip.com
2054- bigrayban.com
2055- bigtums.com
2056- billetesdescuentos.com
2057- billeteseconomicos.com
2058- bin1700.com
2059- bing.com
2060- bingcasinos.com
2061- bingtubestore.com
2062- biopharma-manufacturingnetworks.net
2063- biosite.com
2064- biostar.com
2065- bipharmasolutions.com.br
2066- birminghamengland.net
2067- bis.com
2068- biservices.com.br
2069- biskuatsemangat.com
2070- bispingen-resort.com
2071- bittersweet.com
2072- bizmortgages.com
2073- bizprocessing.net
2074- bizrate.com
2075- bizwholesaleshop.com
2076- bkjonasbrothers.com
2077- blabkberry.com
2078- blackberry8330.fr
2079- blackberry9000.com
2080- blackberryapporld.com
2081- blackberryeparl.com
2082- blackberrynewsletter.com
2083- blackberryp3arl.com
2084- blackberrypaerl.com
2085- blackberrypdarl.com
2086- blackberrypea5l.com
2087- blackberrypealr.com
2088- blackberrypearl8120.com
2089- blackberrypearll.com
2090- blackberrypearo.com
2091- blackberrypearrl.com
2092- blackberrypeearl.com
2093- blackberrypeqrl.com
2094- blackberrypesrl.com
2095- blackberrypewrl.com
2096- blackberrypezrl.com
2097- blackberryphones.com
2098- blackberryprarl.com
2099- blackberrystore.com
2100- blackberrytelephone.net
2101- blackberrytour9630.com
2102- blackberrytradein.com
2103- blackberryunite.com
2104- blackberryworld.com
2105- blackberryxg.com
2106- blackbertypearl.com
2107- blackbetrypearl.com
2108- blackbwrrypearl.com
2109- blackebrrypearl.com
2110- blackfriarslondon.com
2111- blackhistorymap.com
2112- blacklicorice.com
2113- blackstonecenter.com
2114- blackstonecommon.com
2115- blinds.com
2116- blisslondon.com
2117- bloodtransfusion.com
2118- bloomberg2007.org
2119- bloombergalcalde2007.com
2120- bloombergalcalde2008.com
2121- bloombergalpoder.com
2122- bloombergalpoder.org
2123- bloombergnumero1.org
2124- bloombergparaalcalde2008.com
2125- bloombergparaalcalde2008.net
2126- bloombergparael2007.com
2127- bloombergparael2007.net
2128- bloombergparatodos.com
2129- bloombergparatodos.net
2130- bloombergsolucion2008.com
2131- bloombergsolucion2008.net
2132- bloombergtuamigo.com
2133- bloombergyes.org
2134- bloombersolucionparanyc.org
2135- bloomsburylondon.com
2136- blublip.net
2137- blue-coat.com
2138- bluebay.nl
2139- bluebirdsucks.com
2140- bluecoat.com.br
2141- bluecoat.net
2142- bluecoatmobile.com
2143- blueconnect.info
2144- bluemix.com
2145- bms-customer-services.com
2146- boatsgofaster.com
2147- bobbibrownessentials-jp.com
2148- bobcatfinancialservice.com
2149- boblevitan.com
2150- bocouture.es
2151- bodyfittsa.com
2152- bodyshopmall.net
2153- boen.ru
2154- bohnproducts.com
2155- boletosalaganga.com
2156- boletosdescuentos.com
2157- boletosremates.com
2158- boletosremates.net
2159- boletossuperbaratos.com
2160- boletossuperbaratos.net
2161- boletossuperganga.net
2162- bombay.com
2163- bombaygin.com
2164- bombaysaphire.com
2165- bombaysapphirebars.com
2166- bombaysapphireblueroom.com
2167- bombaysapphiredesigners.com
2168- bonafont.com
2169- bonnecarrepowercompany.com
2170- bookcountry.com.br
2171- bookcountrybooktango.com.br
2172- booker.co.uk
2173- booty-magic.com
2174- bootyfirmsystem.com
2175- bosentana.com.br
2176- boss.co.il
2177- bovineserumalbumin.com
2178- bowlondon.net
2179- boxersonline.com
2180- bphelios.com
2181- bplubricants.com.ru
2182- bpmelubes.com
2183- bponlinestore.com
2184- bpswealthmanagement.com
2185- braava.es
2186- bradford-bingley.org
2187- bradfordandbingleygroup.org
2188- bradfordbingley.com
2189- bradfordyorks.com
2190- bradfordyorks.net
2191- brahma.com
2192- braintrustinitiative.com
2193- braintrustinitiative.org
2194- bralinta.com.br
2195- brallinta.com.br
2196- branchmanagerguide.com
2197- brandbagsonlinesale.com
2198- brandnk.com
2199- brandrepublic.com.br
2200- brandrepublicjobs.com
2201- brandrepublicvirtualsummit.com
2202- brands-shoes.com
2203- brandsglasses.com
2204- braveris.com
2205- braxla.com
2206- braxla.org
2207- breathagain.com
2208- breathofthewild.com
2209- bredelpump.com
2210- breezer-twist.com
2211- brentwoodessex.net
2212- brestan.com
2213- bretaris.es
2214- brevettocomunitario.biz
2215- brevettocomunitario.com
2216- brevettocomunitario.info
2217- brexidol.com
2218- bridgelandcommunity.com
2219- bridgelandcustomsales.com
2220- bridgelandgalleria.com
2221- bridgelandrealty.net
2222- bridgelandtexashomes.com
2223- bridgelandtx.com
2224- brilique.com.br
2225- brintellix.com
2226- bris-penguin.com.br
2227- britishcouncil.al
2228- britishcouncil.bg
2229- britishcouncil.co
2230- britishcouncil.es
2231- britishcouncil.in
2232- britishcouncil.kz
2233- britishcouncil.org
2234- britishcouncil.org.tr
2235- britishcouncil.pk
2236- britishcouncil.ru
2237- brochures.jeld-wen.co.uk
2238- brockleylondon.com
2239- brokercitimortgage.com
2240- brokersportal.co.uk
2241- bromleykent.net
2242- bromleylondon.net
2243- brucekaratzsucks.org
2244- brusselsairportsheratonhotel.com
2245- brutproducts.com
2246- brutracing.com
2247- brylandhomes.com
2248- brylanegifts.com
2249- brylanehomeessentials.com
2250- brylanehomekitchen.org
2251- brylanekitchen.org
2252- brylanhomes.com
2253- bsaregistry.com
2254- bsigroup.com.au
2255- bsm-onsalenow.com
2256- btprelief.org
2257- buckandhickman.com
2258- budlight.be
2259- bultacoregistry.com
2260- bumbleandbumble-jp.net
2261- bumbleandbumblejapan.net
2262- bumbleandbumblejapan.org
2263- buna-cb.com
2264- buna.com
2265- bungealimentos.com
2266- bungefertilizantes.com
2267- bungefertilizers.com
2268- burberry-handbag.com
2269- burberry-london.com
2270- burberry-pet-products.com
2271- burberry-usa.com
2272- burberry.nl
2273- burberry4handbags.com
2274- burberry4u.com
2275- burberrybag.net
2276- burberrybeat.net.br
2277- burberrybrit.com
2278- burberrybrit.net
2279- burberrycanadaoutlet.ca
2280- burberrycoats.com
2281- burberrydiscount.com
2282- burberrydream.com
2283- burberrygloves.com
2284- burberryhandbags.com
2285- burberryhandbags.org
2286- burberrykorea.net
2287- burberrylimited.com
2288- burberrylondon.com
2289- burberrylondon.net.br
2290- burberryoflondon.com
2291- burberryonline.com
2292- burberryonline.net.br
2293- burberryoutlet-burberryscarf.com
2294- burberryoutlet.com
2295- burberryoutletatlanta.com
2296- burberryoutletonline.com
2297- burberryoutletsus.com
2298- burberryoutletusa.com
2299- burberrysale.com
2300- burberrysbrit.com
2301- burberryshoponlineuk.com
2302- burberrystate.com
2303- burberrysux.net.br
2304- burberrytendertouch.com
2305- burberryukclub.com
2306- burberryus.com
2307- burberysmagasin.com
2308- burgerking.co
2309- burgerking.co.id
2310- burgerking.co.uk
2311- burgerking.fr
2312- burj-jumeira.com
2313- burn.ae
2314- business-tim.net
2315- business-tim.org
2316- businesstim.com
2317- businesstim.org
2318- busyblackberry.com
2319- investorab.com
2320--------------------------------------------------
2321[!] Scanning Open Port
2322--------------------------------------------------
2323[+] Getting SSL Info
2324[Errno 110] Connection timed out
2325--------------------------------------------------
2326[+] Collecting Information Disclosure!
2327[#] Detecting sitemap.xml file
2328[-] sitemap.xml file not Found!?
2329[#] Detecting robots.txt file
2330[-] robots.txt file not Found!?
2331[#] Detecting GNU Mailman
2332[-] GNU Mailman App Not Detected!?
2333--------------------------------------------------
2334[+] Crawling Url Parameter On: https://www.investorab.com/
2335--------------------------------------------------
2336[#] Searching Html Form !
2337[-] No Html Form Found!?
2338--------------------------------------------------
2339[-] No DOM Paramter Found!?
2340--------------------------------------------------
2341[!] 4 Internal Dynamic Parameter Discovered
2342[+] https://www.investorab.com///our-investments/?category=listed-companies
2343[+] https://www.investorab.com///our-investments/?category=patricia-industries
2344[+] https://www.investorab.com///our-investments/?category=investments-in-eqt
2345[+] https://www.investorab.com///investors-media/press-releases-news/?id=1791906
2346--------------------------------------------------
2347[-] No external Dynamic Paramter Found!?
2348--------------------------------------------------
2349[!] 242 Internal links Discovered
2350[+] https://www.investorab.com/
2351[+] https://www.investorab.com///apple-touch-icon-57x57.png
2352[+] https://www.investorab.com///apple-touch-icon-114x114.png
2353[+] https://www.investorab.com///apple-touch-icon-72x72.png
2354[+] https://www.investorab.com///apple-touch-icon-144x144.png
2355[+] https://www.investorab.com///apple-touch-icon-60x60.png
2356[+] https://www.investorab.com///apple-touch-icon-120x120.png
2357[+] https://www.investorab.com///apple-touch-icon-76x76.png
2358[+] https://www.investorab.com///apple-touch-icon-152x152.png
2359[+] https://www.investorab.com///favicon-196x196.png
2360[+] https://www.investorab.com///favicon-96x96.png
2361[+] https://www.investorab.com///favicon-32x32.png
2362[+] https://www.investorab.com///favicon-16x16.png
2363[+] https://www.investorab.com///favicon-128.png
2364[+] https://www.investorab.com///Assets/css/main.css
2365[+] https://www.investorab.com///
2366[+] https://www.investorab.com///about-investor/
2367[+] https://www.investorab.com///about-investor/our-business-model/
2368[+] https://www.investorab.com///about-investor/how-we-do-it/
2369[+] https://www.investorab.com///about-investor/targets-and-outcome/
2370[+] https://www.investorab.com///about-investor/business-areas/
2371[+] https://www.investorab.com///about-investor/employees-your-career/
2372[+] https://www.investorab.com///about-investor/corporate-governance/
2373[+] https://www.investorab.com///about-investor/board-management/
2374[+] https://www.investorab.com///about-investor/investor-s-history/
2375[+] https://www.investorab.com///our-investments/
2376[+] https://www.investorab.com///sustainability/
2377[+] https://www.investorab.com///sustainability/business-ethics-governance/
2378[+] https://www.investorab.com///sustainability/climate-resource-efficiency/
2379[+] https://www.investorab.com///sustainability/diversity-inclusion/
2380[+] https://www.investorab.com///sustainability/un-global-goals/
2381[+] https://www.investorab.com///sustainability/whistleblowing/
2382[+] https://www.investorab.com///sustainability/code-of-conduct/
2383[+] https://www.investorab.com///investors-media/
2384[+] https://www.investorab.com///investors-media/press-releases-news/
2385[+] https://www.investorab.com///investors-media/reports-presentations/
2386[+] https://www.investorab.com///investors-media/investor-in-figures/
2387[+] https://www.investorab.com///investors-media/shareholders/
2388[+] https://www.investorab.com///investors-media/bondholders/
2389[+] https://www.investorab.com///investors-media/subscription-services/
2390[+] https://www.investorab.com///investors-media/events-calendar/
2391[+] https://www.investorab.com///investors-media/image-gallery/
2392[+] https://www.investorab.com///sv/
2393[+] https://www.investorab.com///
2394[+] https://www.investorab.com///contact/
2395[+] https://www.investorab.com///about-investor/
2396[+] https://www.investorab.com///about-investor/our-business-model/
2397[+] https://www.investorab.com///about-investor/how-we-do-it/
2398[+] https://www.investorab.com///about-investor/how-we-do-it/operating-priorities/
2399[+] https://www.investorab.com///about-investor/targets-and-outcome/
2400[+] https://www.investorab.com///about-investor/targets-and-outcome/created-impact/
2401[+] https://www.investorab.com///about-investor/business-areas/
2402[+] https://www.investorab.com///about-investor/business-areas/listed-companies/
2403[+] https://www.investorab.com///about-investor/business-areas/patricia-industries/
2404[+] https://www.investorab.com///about-investor/business-areas/investments-in-eqt/
2405[+] https://www.investorab.com///about-investor/employees-your-career/
2406[+] https://www.investorab.com///about-investor/employees-your-career/employees/
2407[+] https://www.investorab.com///about-investor/employees-your-career/core-values/
2408[+] https://www.investorab.com///about-investor/employees-your-career/diversity-inclusion/
2409[+] https://www.investorab.com///about-investor/corporate-governance/
2410[+] https://www.investorab.com///about-investor/corporate-governance/corporate-governance-report/
2411[+] https://www.investorab.com///about-investor/corporate-governance/corporate-governance-report/corporate-governance-report-archive/
2412[+] https://www.investorab.com///about-investor/corporate-governance/articles-of-association/
2413[+] https://www.investorab.com///about-investor/corporate-governance/annual-general-meeting/
2414[+] https://www.investorab.com///about-investor/corporate-governance/annual-general-meeting/agm-2020/
2415[+] https://www.investorab.com///about-investor/corporate-governance/annual-general-meeting/agm-2019/
2416[+] https://www.investorab.com///about-investor/corporate-governance/annual-general-meeting/agm-2019/johan-forssell-agm-speech-2019/
2417[+] https://www.investorab.com///about-investor/corporate-governance/annual-general-meeting/archive-agm/
2418[+] https://www.investorab.com///about-investor/corporate-governance/nomination-committee/
2419[+] https://www.investorab.com///about-investor/corporate-governance/board-of-directors/
2420[+] https://www.investorab.com///about-investor/corporate-governance/board-of-directors/board-committees/
2421[+] https://www.investorab.com///about-investor/corporate-governance/auditors/
2422[+] https://www.investorab.com///about-investor/corporate-governance/management/
2423[+] https://www.investorab.com///about-investor/corporate-governance/control-functions/
2424[+] https://www.investorab.com///about-investor/corporate-governance/remuneration-management/
2425[+] https://www.investorab.com///about-investor/corporate-governance/remuneration-the-board/
2426[+] https://www.investorab.com///about-investor/board-management/
2427[+] https://www.investorab.com///about-investor/board-management/board-of-directors/
2428[+] https://www.investorab.com///about-investor/board-management/board-of-directors/jacob-wallenberg/
2429[+] https://www.investorab.com///about-investor/board-management/board-of-directors/marcus-wallenberg/
2430[+] https://www.investorab.com///about-investor/board-management/board-of-directors/gunnar-brock/
2431[+] https://www.investorab.com///about-investor/board-management/board-of-directors/johan-forssell/
2432[+] https://www.investorab.com///about-investor/board-management/board-of-directors/magdalena-gerger/
2433[+] https://www.investorab.com///about-investor/board-management/board-of-directors/tom-johnstone-cbe/
2434[+] https://www.investorab.com///about-investor/board-management/board-of-directors/sara-mazur/
2435[+] https://www.investorab.com///about-investor/board-management/board-of-directors/grace-reksten-skaugen/
2436[+] https://www.investorab.com///about-investor/board-management/board-of-directors/hans-straberg/
2437[+] https://www.investorab.com///about-investor/board-management/board-of-directors/lena-treschow-torell/
2438[+] https://www.investorab.com///about-investor/board-management/management-group/
2439[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/
2440[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/johan-forssell/
2441[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/helena-saxon/
2442[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/petra-hedengran/
2443[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/daniel-nodhall/
2444[+] https://www.investorab.com///about-investor/board-management/management-group/management-group/viveka-hirdman-ryrberg/
2445[+] https://www.investorab.com///about-investor/board-management/management-group/members-of-the-extended-management-group/
2446[+] https://www.investorab.com///about-investor/board-management/management-group/members-of-the-extended-management-group/jessica-haggstrom/
2447[+] https://www.investorab.com///about-investor/board-management/management-group/members-of-the-extended-management-group/christian-cederholm/
2448[+] https://www.investorab.com///about-investor/board-management/management-group/members-of-the-extended-management-group/noah-walley/
2449[+] https://www.investorab.com///about-investor/investor-s-history/
2450[+] https://www.investorab.com///about-investor/investor-s-history/1916-1929/
2451[+] https://www.investorab.com///about-investor/investor-s-history/1929-1963/
2452[+] https://www.investorab.com///about-investor/investor-s-history/1963-1978/
2453[+] https://www.investorab.com///about-investor/investor-s-history/1978-1984/
2454[+] https://www.investorab.com///about-investor/investor-s-history/1984-1994/
2455[+] https://www.investorab.com///about-investor/investor-s-history/1994-2004/
2456[+] https://www.investorab.com///about-investor/investor-s-history/2005/
2457[+] https://www.investorab.com///our-investments/
2458[+] https://www.investorab.com///our-investment/listed%20companies/
2459[+] https://www.investorab.com///our-investment/listed%20companies/atlas-copco/
2460[+] https://www.investorab.com///our-investment/listed%20companies/abb/
2461[+] https://www.investorab.com///our-investment/listed%20companies/astrazeneca/
2462[+] https://www.investorab.com///our-investment/listed%20companies/seb/
2463[+] https://www.investorab.com///our-investment/listed%20companies/epiroc/
2464[+] https://www.investorab.com///our-investment/listed%20companies/ericsson/
2465[+] https://www.investorab.com///our-investment/listed%20companies/nasdaq/
2466[+] https://www.investorab.com///our-investment/listed%20companies/sobi/
2467[+] https://www.investorab.com///our-investment/listed%20companies/saab/
2468[+] https://www.investorab.com///our-investment/listed%20companies/electrolux/
2469[+] https://www.investorab.com///our-investment/listed%20companies/electrolux-professional/
2470[+] https://www.investorab.com///our-investment/listed%20companies/wartsila/
2471[+] https://www.investorab.com///our-investment/listed%20companies/husqvarna-group/
2472[+] https://www.investorab.com///our-investments/patricia-industries/
2473[+] https://www.investorab.com///our-investments/patricia-industries/molnlycke/
2474[+] https://www.investorab.com///our-investments/patricia-industries/permobil/
2475[+] https://www.investorab.com///our-investments/patricia-industries/laborie/
2476[+] https://www.investorab.com///our-investments/patricia-industries/sarnova/
2477[+] https://www.investorab.com///our-investments/patricia-industries/braunability/
2478[+] https://www.investorab.com///our-investments/patricia-industries/piab/
2479[+] https://www.investorab.com///our-investments/patricia-industries/vectura/
2480[+] https://www.investorab.com///our-investments/patricia-industries/the-grand-group/
2481[+] https://www.investorab.com///our-investments/patricia-industries/3-scandinavia/
2482[+] https://www.investorab.com///our-investments/patricia-industries/financial-investments/
2483[+] https://www.investorab.com///our-investments/investments-in-eqt/
2484[+] https://www.investorab.com///our-investments/investments-in-eqt/eqt/
2485[+] https://www.investorab.com///investors-media/
2486[+] https://www.investorab.com///investors-media/press-releases-news/
2487[+] https://www.investorab.com///investors-media/reports-presentations/
2488[+] https://www.investorab.com///investors-media/reports-presentations/2019/
2489[+] https://www.investorab.com///investors-media/reports-presentations/2018/
2490[+] https://www.investorab.com///investors-media/reports-presentations/2017/
2491[+] https://www.investorab.com///investors-media/reports-presentations/cmd-2017/
2492[+] https://www.investorab.com///investors-media/reports-presentations/2016/
2493[+] https://www.investorab.com///investors-media/reports-presentations/2015/
2494[+] https://www.investorab.com///investors-media/reports-presentations/2014/
2495[+] https://www.investorab.com///investors-media/reports-presentations/2013/
2496[+] https://www.investorab.com///investors-media/reports-presentations/2012/
2497[+] https://www.investorab.com///investors-media/reports-presentations/archive/
2498[+] https://www.investorab.com///investors-media/investor-in-figures/
2499[+] https://www.investorab.com///investors-media/investor-in-figures/key-figures/
2500[+] https://www.investorab.com///investors-media/investor-in-figures/financial-statements/
2501[+] https://www.investorab.com///investors-media/investor-in-figures/accounting-policies/
2502[+] https://www.investorab.com///investors-media/investor-in-figures/accounting-policies/accounting-and-valuation-of-holdings/
2503[+] https://www.investorab.com///investors-media/investor-in-figures/accounting-policies/equity-related-investments/
2504[+] https://www.investorab.com///investors-media/investor-in-figures/definitions/
2505[+] https://www.investorab.com///investors-media/shareholders/
2506[+] https://www.investorab.com///investors-media/shareholders/share-price-calculator/
2507[+] https://www.investorab.com///investors-media/shareholders/total-shareholder-return/
2508[+] https://www.investorab.com///investors-media/shareholders/dividend-and-dividend-policy/
2509[+] https://www.investorab.com///investors-media/shareholders/dividend-and-dividend-policy/dividend/
2510[+] https://www.investorab.com///investors-media/shareholders/ownership-structure/
2511[+] https://www.investorab.com///investors-media/shareholders/repurchase-of-own-shares/
2512[+] https://www.investorab.com///investors-media/shareholders/historical-share-data/
2513[+] https://www.investorab.com///investors-media/shareholders/analysts/
2514[+] https://www.investorab.com///investors-media/bondholders/
2515[+] https://www.investorab.com///investors-media/bondholders/maturity-profile/
2516[+] https://www.investorab.com///investors-media/bondholders/loan-programs-and-facilities/
2517[+] https://www.investorab.com///investors-media/bondholders/outstanding-public-bonds/
2518[+] https://www.investorab.com///investors-media/subscription-services/
2519[+] https://www.investorab.com///investors-media/subscription-services/order-printed-information/
2520[+] https://www.investorab.com///investors-media/events-calendar/
2521[+] https://www.investorab.com///investors-media/events-calendar/events-calendar-archive/
2522[+] https://www.investorab.com///investors-media/image-gallery/
2523[+] https://www.investorab.com///investors-media/image-gallery/logotype/
2524[+] https://www.investorab.com///sustainability/
2525[+] https://www.investorab.com///sustainability/business-ethics-governance/
2526[+] https://www.investorab.com///sustainability/climate-resource-efficiency/
2527[+] https://www.investorab.com///sustainability/diversity-inclusion/
2528[+] https://www.investorab.com///sustainability/un-global-goals/
2529[+] https://www.investorab.com///sustainability/whistleblowing/
2530[+] https://www.investorab.com///media/qkgenhia/190509_code-of-conduct.pdf
2531[+] https://www.investorab.com///contact/
2532[+] https://www.investorab.com///contact/viveka-hirdman-ryrberg/
2533[+] https://www.investorab.com///contact/magnus-dalhammar/
2534[+] https://www.investorab.com///contact/sofia-jonsson/
2535[+] https://www.investorab.com///contact/jessica-haggstrom/
2536[+] https://www.investorab.com///cookies/
2537[+] https://www.investorab.com///privacy-notice/
2538[+] https://www.investorab.com///sv/
2539[+] https://www.investorab.com///
2540[+] https://www.investorab.com///contact/
2541[+] https://www.investorab.com///our-investments/
2542[+] https://www.investorab.com///investors-media/shareholders/
2543[+] https://www.investorab.com///investors-media/press-releases-news/ceo-richard-twomey-leaves-molnlycke/
2544[+] https://www.investorab.com///our-investments/
2545[+] https://www.investorab.com///investors-media/shareholders/
2546[+] https://www.investorab.com///sustainability/diversity-inclusion/
2547[+] https://www.investorab.com///sustainability/
2548[+] https://www.investorab.com///sustainability/
2549[+] https://www.investorab.com///contact/
2550[+] https://www.investorab.com///about-investor/employees-your-career/
2551[+] https://www.investorab.com///about-investor/our-business-model/
2552[+] https://www.investorab.com///sustainability/diversity-inclusion/
2553[+] https://www.investorab.com///about-investor/our-business-model/
2554[+] https://www.investorab.com///sustainability/
2555[+] https://www.investorab.com///our-investments/
2556[+] https://www.investorab.com///investors-media/shareholders/
2557[+] https://www.investorab.com//mailto:info@investorab.com
2558[+] https://www.investorab.com//tel:+46 8 614 20 00
2559[+] https://www.investorab.com///sustainability/whistleblowing/
2560[+] https://www.investorab.com//data:img/png;base64,iVBORw0KGgoAAAANSUhEUgAAADYAAAAhCAYAAACSllj+AAAB/0lEQVRYhdWWMVLCQBSGf7CxsLBMJ0eItTMZvQHcQI5AkV7rFHIDuQHcQCeFrRwBu5QWHsBZfJF/lg3JhrfD8s0wMEuyef/u+xYGSZZfA1gCuMeOh6os3nEGJFlu6n6jSk3dkyGAsRXKsJTAUUObwpgs42FVFgsAK+tL1w0xspRamZXJNJSBKYCNnTzJ8qdYE0ltdqdtJAsGdGEK4NMxR3S+Obyqua3KYm0+1zsGGZg5Lo7KtwavDLM6FDgY/sLNz8C3Jq/mPDDEPtH61uYVM9i7O1LfunjFuHYsOt+6esU4gyE+3zp5xTQGE07um49XjNMxa+KT+ebrFdO2YyfzLcnyUUPbT9tCoUsw7HxbWMPXDauphcurhfy3baVTMMHsmr1SaZLlL9qJZM7UGm7qHCetjlkPTGWX7JWcVGVhn6C9SLJ87GjBb3G6tQVrvIJJuEcAr44HG6HtE9R37pEcVPbCTbu2YI1PK26RB7h80/h9O8orxjuYoO6bhleMdytSIWq+aXnF9A4GJd80vWL6tuIWJd/UvGKOCib09k3bK+aoVqzp41sIrxiVYPD0LZRXjEYrbvH0LYhXjFowodW3kF4xaq1Yc8g3eQ/mFaMeDId9Q0ivmAvtCQ0/Xx/rq5u7kdVyl/JijFfPIWrQdoxx+caoe8UEacWaA74F8eofAL+Bygl2tV1Z/gAAAABJRU5ErkJggg==
2561[+] https://www.investorab.com///about-investor/our-business-model/
2562[+] https://www.investorab.com///about-investor/how-we-do-it/
2563[+] https://www.investorab.com///about-investor/targets-and-outcome/
2564[+] https://www.investorab.com///about-investor/business-areas/
2565[+] https://www.investorab.com///about-investor/employees-your-career/
2566[+] https://www.investorab.com///about-investor/corporate-governance/
2567[+] https://www.investorab.com///about-investor/board-management/
2568[+] https://www.investorab.com///about-investor/investor-s-history/
2569[+] https://www.investorab.com///cookies/
2570[+] https://www.investorab.com///privacy-notice/
2571[+] https://www.investorab.com//data:img/png;base64,iVBORw0KGgoAAAANSUhEUgAAADYAAAAhCAYAAACSllj+AAAB/0lEQVRYhdWWMVLCQBSGf7CxsLBMJ0eItTMZvQHcQI5AkV7rFHIDuQHcQCeFrRwBu5QWHsBZfJF/lg3JhrfD8s0wMEuyef/u+xYGSZZfA1gCuMeOh6os3nEGJFlu6n6jSk3dkyGAsRXKsJTAUUObwpgs42FVFgsAK+tL1w0xspRamZXJNJSBKYCNnTzJ8qdYE0ltdqdtJAsGdGEK4NMxR3S+Obyqua3KYm0+1zsGGZg5Lo7KtwavDLM6FDgY/sLNz8C3Jq/mPDDEPtH61uYVM9i7O1LfunjFuHYsOt+6esU4gyE+3zp5xTQGE07um49XjNMxa+KT+ebrFdO2YyfzLcnyUUPbT9tCoUsw7HxbWMPXDauphcurhfy3baVTMMHsmr1SaZLlL9qJZM7UGm7qHCetjlkPTGWX7JWcVGVhn6C9SLJ87GjBb3G6tQVrvIJJuEcAr44HG6HtE9R37pEcVPbCTbu2YI1PK26RB7h80/h9O8orxjuYoO6bhleMdytSIWq+aXnF9A4GJd80vWL6tuIWJd/UvGKOCib09k3bK+aoVqzp41sIrxiVYPD0LZRXjEYrbvH0LYhXjFowodW3kF4xaq1Yc8g3eQ/mFaMeDId9Q0ivmAvtCQ0/Xx/rq5u7kdVyl/JijFfPIWrQdoxx+caoe8UEacWaA74F8eofAL+Bygl2tV1Z/gAAAABJRU5ErkJggg==
2572[+] https://www.investorab.com///our-investment/listed%20companies/
2573[+] https://www.investorab.com///our-investments/patricia-industries/
2574[+] https://www.investorab.com///our-investments/investments-in-eqt/
2575[+] https://www.investorab.com//data:img/png;base64,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
2576[+] https://www.investorab.com///sustainability/climate-resource-efficiency/
2577[+] https://www.investorab.com///sustainability/diversity-inclusion/
2578[+] https://www.investorab.com///sustainability/business-ethics-governance/
2579[+] https://www.investorab.com///sustainability/un-global-goals/
2580[+] https://www.investorab.com///sustainability/whistleblowing/
2581[+] https://www.investorab.com//data:img/png;base64,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
2582[+] https://www.investorab.com///investors-media/press-releases-news/
2583[+] https://www.investorab.com///investors-media/investor-in-figures/
2584[+] https://www.investorab.com///investors-media/shareholders/
2585[+] https://www.investorab.com///investors-media/bondholders/
2586[+] https://www.investorab.com///investors-media/subscription-services/
2587[+] https://www.investorab.com///investors-media/events-calendar/
2588[+] https://www.investorab.com///contact/
2589[+] https://www.investorab.com///cookies/
2590[+] https://www.investorab.com///privacy-notice/
2591[+] https://www.investorab.com///cookies/
2592--------------------------------------------------
2593[!] 4 External links Discovered
2594[#] https://investor.teamtailor.com/
2595[#] https://vp053.alertir.com/afw/files/press/investor/202003263627-1.pdf
2596[#] https://vp053.alertir.com/afw/files/press/investor/202003263627-1.pdf
2597[#] https://www.linkedin.com/company/investor-ab
2598--------------------------------------------------
2599[#] Mapping Subdomain..
2600[-] No Any Subdomain Found
2601[!] Found 0 Subdomain
2602--------------------------------------------------
2603[!] Done At 2020-03-30 17:15:48.189311
2604#################################################################################################################################
2605raceroute to www.investorab.com (23.100.15.180), 30 hops max, 60 byte packets
2606 1 _gateway (10.202.1.1) 379.202 ms 568.891 ms 568.877 ms
2607 2 190.105.229.1 (190.105.229.1) 568.860 ms 568.818 ms 568.801 ms
2608 3 181.119.68.33 (181.119.68.33) 568.791 ms 568.731 ms 568.712 ms
2609 4 ge-0-0-0.ARBUE.m20x1 (200.61.128.254) 568.672 ms 568.660 ms 568.634 ms
2610 5 static.ifxnw.cl (216.241.0.2) 568.621 ms 568.575 ms 568.532 ms
2611 6 * * *
2612 7 ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75) 530.530 ms 616.661 ms 616.696 ms
2613 8 be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111) 616.732 ms 616.739 ms 616.745 ms
2614 9 be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131) 763.730 ms 763.708 ms be-2-0.ibr01.mia.ntwk.msn.net (104.44.17.178) 763.728 ms
261510 be-4-0.ibr01.atl30.ntwk.msn.net (104.44.28.63) 616.720 ms 763.701 ms 763.634 ms
261611 be-2-0.ibr01.atl31.ntwk.msn.net (104.44.7.144) 763.699 ms 649.247 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232) 607.774 ms
261712 be-3-0.ibr03.bn6.ntwk.msn.net (104.44.7.146) 753.152 ms 753.121 ms 753.090 ms
261813 be-2-0.ibr03.bl7.ntwk.msn.net (104.44.7.75) 607.576 ms 607.521 ms 460.771 ms
261914 be-7-0.ibr01.ewr30.ntwk.msn.net (104.44.16.19) 460.691 ms 460.686 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17) 606.107 ms
262015 be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155) 460.670 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153) 606.087 ms 618.511 ms
262116 be-5-0.ibr01.dub07.ntwk.msn.net (104.44.16.113) 760.015 ms 715.347 ms 715.341 ms
262217 be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215) 715.345 ms be-7-0.ibr01.ams30.ntwk.msn.net (104.44.17.57) 715.243 ms 715.260 ms
262318 ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244) 715.309 ms ae102-0.icr02.ams30.ntwk.msn.net (104.44.22.216) 715.273 ms 760.080 ms
262419 * * *
2625#################################################################################################################################
2626ding 23.100.15.180/32 mode `TCPscan' ports `7,9,11,13,18,19,21-23,25,37,39,42,49,50,53,65,67-70,79-81,88,98,100,105-107,109-111,113,118,119,123,129,135,137-139,143,150,161-164,174,177-179,191,199-202,204,206,209,210,213,220,345,346,347,369-372,389,406,407,422,443-445,487,500,512-514,517,518,520,525,533,538,548,554,563,587,610-612,631-634,636,642,653,655,657,666,706,750-752,765,779,808,873,901,923,941,946,992-995,1001,1023-1030,1080,1210,1214,1234,1241,1334,1349,1352,1423-1425,1433,1434,1524,1525,1645,1646,1649,1701,1718,1719,1720,1723,1755,1812,1813,2048-2050,2101-2104,2140,2150,2233,2323,2345,2401,2430,2431,2432,2433,2583,2628,2776,2777,2988,2989,3050,3130,3150,3232,3306,3389,3456,3493,3542-3545,3632,3690,3801,4000,4400,4321,4567,4899,5002,5136-5139,5150,5151,5222,5269,5308,5354,5355,5422-5425,5432,5503,5555,5556,5678,6000-6007,6346,6347,6543,6544,6789,6838,6666-6670,7000-7009,7028,7100,7983,8079-8082,8088,8787,8879,9090,9101-9103,9325,9359,10000,10026,10027,10067,10080,10081,10167,10498,11201,15345,17001-17003,18753,20011,20012,21554,22273,26274,27374,27444,27573,31335-31338,31787,31789,31790,31791,32668,32767-32780,33390,47262,49301,54320,54321,57341,58008,58009,58666,59211,60000,60006,61000,61348,61466,61603,63485,63808,63809,64429,65000,65506,65530-65535' pps 300
2627using interface(s) eth0
2628added module payload for port 518 proto 17
2629added module payload for port 53 proto 17
2630added module payload for port 80 proto 6
2631added module payload for port 1900 proto 17
2632added module payload for port 80 proto 6
2633added module payload for port 5060 proto 17
2634scaning 1.00e+00 total hosts with 3.38e+02 total packets, should take a little longer than 8 Seconds
2635drone type Unknown on fd 4 is version 1.1
2636drone type Unknown on fd 3 is version 1.1
2637added module payload for port 518 proto 17
2638added module payload for port 53 proto 17
2639added module payload for port 80 proto 6
2640added module payload for port 1900 proto 17
2641added module payload for port 80 proto 6
2642added module payload for port 5060 proto 17
2643scan iteration 1 out of 1
2644using pcap filter: `dst 192.168.0.52 and ! src 192.168.0.52 and (tcp)'
2645using TSC delay
2646sender statistics 299.7 pps with 338 packets sent total
2647listener statistics 188 packets recieved 0 packets droped and 0 interface drops
2648################################################################################################################################
2649dnsmap 0.35 - DNS Network Mapper
2650
2651[+] searching (sub)domains for investorab.com using built-in wordlist
2652[+] using maximum random delay of 10 millisecond(s) between requests
2653
2654bt.investorab.com
2655IP address #1: 212.209.235.51
2656
2657ch.investorab.com
2658IP address #1: 212.209.235.51
2659
2660ci.investorab.com
2661IP address #1: 212.209.235.51
2662
2663extranet.investorab.com
2664IP address #1: 80.169.185.10
2665
2666guest.investorab.com
2667IP address #1: 10.46.10.206
2668[+] warning: internal IP address disclosed
2669
2670ip.investorab.com
2671IP address #1: 212.209.235.51
2672
2673ir.investorab.com
2674IP address #1: 190.98.144.197
2675IP address #2: 190.98.144.195
2676
2677ki.investorab.com
2678IP address #1: 212.209.235.51
2679
2680m.investorab.com
2681IP address #1: 212.209.235.51
2682
2683mail.investorab.com
2684IP address #1: 80.169.185.8
2685
2686ni.investorab.com
2687IP address #1: 212.209.235.51
2688
2689ns1.investorab.com
2690IP address #1: 212.209.237.41
2691
2692ns2.investorab.com
2693IP address #1: 212.209.235.42
2694
2695owa.investorab.com
2696IP address #1: 212.209.237.43
2697
2698pe.investorab.com
2699IP address #1: 212.209.235.51
2700
2701vpn.investorab.com
2702IP address #1: 80.169.184.235
2703
2704www.investorab.com
2705IP address #1: 23.100.15.180
2706
2707[+] 17 (sub)domains and 18 IP address(es) found
2708[+] 1 internal IP address(es) disclosed
2709[+] completion time: 3357 second(s)
2710#################################################################################################################################
2711Domains still to check: 1
2712 Checking if the hostname investorab.com. given is in fact a domain...
2713
2714Analyzing domain: investorab.com.
2715 Checking NameServers using system default resolver...
2716 IP: 156.154.130.100 (United States)
2717 HostName: dns1.cscdns.net Type: NS
2718 HostName: ns5.netnames.net Type: PTR
2719 IP: 156.154.131.100 (United States)
2720 HostName: dns2.cscdns.net Type: NS
2721 HostName: nusdns06.digitalarchives.com Type: PTR
2722
2723 Checking MailServers using system default resolver...
2724 IP: 104.47.6.36 (Austria)
2725 HostName: investorab-com.mail.protection.outlook.com Type: MX
2726 HostName: mail-ve1eur020036.inbound.protection.outlook.com Type: PTR
2727 IP: 104.47.5.36 (Finland)
2728 HostName: investorab-com.mail.protection.outlook.com Type: MX
2729 HostName: mail-he1eur020036.inbound.protection.outlook.com Type: PTR
2730
2731 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
2732 No zone transfer found on nameserver 156.154.131.100
2733 No zone transfer found on nameserver 156.154.130.100
2734
2735 Checking SPF record...
2736 New hostname found: ems1
2737 New hostname found: sto-adex01
2738 New hostname found: mx4
2739 New hostname found: mx5
2740
2741 Checking SPF record...
2742 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
2743 New IP found: 40.92.0.0
2744 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
2745 New IP found: 40.107.0.0
2746 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
2747 New IP found: 52.100.0.0
2748 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
2749 New IP found: 104.47.0.0
2750 There are no IPv4 addresses in the SPF. Maybe IPv6.
2751 There are no IPv4 addresses in the SPF. Maybe IPv6.
2752
2753 Checking 196 most common hostnames using system default resolver...
2754 IP: 23.100.15.180 (Netherlands)
2755 HostName: www.investorab.com. Type: A
2756 IP: 80.169.185.8 (United Kingdom)
2757 HostName: mail.investorab.com. Type: A
2758 IP: 212.209.237.41 (Sweden)
2759 HostName: ns1.investorab.com. Type: A
2760 IP: 212.209.235.42 (Sweden)
2761 HostName: ns2.investorab.com. Type: A
2762 IP: 212.209.237.43 (Sweden)
2763 HostName: owa.investorab.com. Type: A
2764 IP: 80.169.185.7 (United Kingdom)
2765 HostName: mx4.investorab.com. Type: A
2766 IP: 80.169.182.217 (United Kingdom)
2767 HostName: mx5.investorab.com. Type: A
2768
2769 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
2770 Checking netblock 52.100.0.0
2771 Checking netblock 23.100.15.0
2772 Checking netblock 80.169.185.0
2773 Checking netblock 212.209.237.0
2774 Checking netblock 104.47.6.0
2775 Checking netblock 104.47.5.0
2776 Checking netblock 156.154.130.0
2777 Checking netblock 104.47.0.0
2778 Checking netblock 212.209.235.0
2779 Checking netblock 40.107.0.0
2780 Checking netblock 156.154.131.0
2781 Checking netblock 40.92.0.0
2782 Checking netblock 80.169.182.0
2783
2784 Searching for investorab.com. emails in Google
2785 helpdesk@investorab.com,
2786 magnus.dahlhammar@investorab.com,
2787 last@investorab.com
2788 elinor.carlsson@investorab.com,
2789 prd@investorab.com
2790
2791 Checking 15 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
2792 Host 52.100.0.0 is down
2793 Host 23.100.15.180 is up (syn-ack ttl 107)
2794 Host 80.169.185.7 is up (echo-reply ttl 50)
2795 Host 212.209.237.41 is down
2796 Host 212.209.237.43 is down
2797 Host 104.47.6.36 is up (syn-ack ttl 107)
2798 Host 80.169.185.8 is down
2799 Host 104.47.5.36 is up (syn-ack ttl 104)
2800 Host 156.154.130.100 is up (echo-reply ttl 52)
2801 Host 104.47.0.0 is down
2802 Host 212.209.235.42 is down
2803 Host 40.107.0.0 is down
2804 Host 156.154.131.100 is up (echo-reply ttl 49)
2805 Host 40.92.0.0 is down
2806 Host 80.169.182.217 is down
2807
2808 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
2809 Scanning ip 23.100.15.180 (www.investorab.com.):
2810 80/tcp open http syn-ack ttl 104 Microsoft IIS httpd 8.5
2811 |_http-server-header: Microsoft-IIS/8.5
2812 |_http-title: WAP Websites - Site Error
2813 443/tcp open ssl/http syn-ack ttl 105 Microsoft IIS httpd 8.5
2814 |_http-title: WAP Websites - Site Error
2815 | ssl-cert: Subject: commonName=umbraco.io/organizationName=Umbraco A/S/stateOrProvinceName=Hovedstaden/countryName=DK
2816 | Subject Alternative Name: DNS:umbraco.io, DNS:*.s1.umbraco.io, DNS:*.scm.s1.umbraco.io, DNS:*.scm.umbraco.io, DNS:*.umbraco.io
2817 | Issuer: commonName=Sectigo RSA Organization Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
2818 | Public Key type: rsa
2819 | Public Key bits: 2048
2820 | Signature Algorithm: sha256WithRSAEncryption
2821 | Not valid before: 2020-01-31T00:00:00
2822 | Not valid after: 2022-03-31T23:59:59
2823 | MD5: 02b6 6c21 ca76 efea 3e94 e72c 6aa9 134b
2824 |_SHA-1: 0f46 27e0 449f b9a0 5775 e8b8 a75e 9e57 cb1d 5254
2825 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2826 Scanning ip 80.169.185.7 (mx4.investorab.com.):
2827 Scanning ip 104.47.6.36 (mail-ve1eur020036.inbound.protection.outlook.com (PTR)):
2828 25/tcp open smtp syn-ack ttl 107 Microsoft Exchange smtpd
2829 | smtp-commands: VE1EUR02FT030.mail.protection.outlook.com Hello [190.105.229.20], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2830 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2831 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2832 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2833 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2834 | Public Key type: rsa
2835 | Public Key bits: 2048
2836 | Signature Algorithm: sha256WithRSAEncryption
2837 | Not valid before: 2020-02-24T18:33:10
2838 | Not valid after: 2022-02-24T18:33:10
2839 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2840 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2841 |_ssl-date: 2020-03-30T21:55:03+00:00; -1s from scanner time.
2842 OS Info: Service Info: Host: VE1EUR02FT008.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2843 |_clock-skew: -1s
2844 Scanning ip 104.47.5.36 (mail-he1eur020036.inbound.protection.outlook.com (PTR)):
2845 25/tcp open smtp syn-ack ttl 103 Microsoft Exchange smtpd
2846 | smtp-commands: HE1EUR02FT064.mail.protection.outlook.com Hello [190.105.229.20], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2847 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2848 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2849 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2850 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2851 | Public Key type: rsa
2852 | Public Key bits: 2048
2853 | Signature Algorithm: sha256WithRSAEncryption
2854 | Not valid before: 2020-02-24T18:33:10
2855 | Not valid after: 2022-02-24T18:33:10
2856 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2857 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2858 |_ssl-date: 2020-03-30T21:55:52+00:00; -1s from scanner time.
2859 OS Info: Service Info: Host: HE1EUR02FT004.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2860 |_clock-skew: -1s
2861 Scanning ip 156.154.130.100 (ns5.netnames.net (PTR)):
2862 53/tcp open tcpwrapped syn-ack ttl 52
2863 | dns-nsid:
2864 |_ bind.version: UltraDNS Resolver
2865 Device type: webcam|general purpose|media device|load balancer|storage-misc|specialized
2866 Running (JUST GUESSING): Geovision embedded (93%), Linux 3.X|2.6.X (93%), Kemp embedded (93%), Western Digital embedded (93%)
2867 Scanning ip 156.154.131.100 (nusdns06.digitalarchives.com (PTR)):
2868 53/tcp open tcpwrapped syn-ack ttl 49
2869 | dns-nsid:
2870 |_ bind.version: UltraDNS Resolver
2871 Device type: webcam|general purpose|media device|load balancer|storage-misc|specialized
2872 Running (JUST GUESSING): Geovision embedded (93%), Linux 3.X|2.6.X (93%), Kemp embedded (93%), Western Digital embedded (93%)
2873 WebCrawling domain's web servers... up to 50 max links.
2874
2875 + URL to crawl: http://www.investorab.com.
2876 + Date: 2020-03-30
2877
2878 + Crawling URL: http://www.investorab.com.:
2879 + Links:
2880 + Crawling http://www.investorab.com. (400 Bad Request)
2881 + Searching for directories...
2882 + Searching open folders...
2883
2884
2885 + URL to crawl: https://www.investorab.com.
2886 + Date: 2020-03-30
2887
2888 + Crawling URL: https://www.investorab.com.:
2889 + Links:
2890 + Crawling https://www.investorab.com. ([Errno 104] Connection reset by peer)
2891 + Searching for directories...
2892 + Searching open folders...
2893
2894--Finished--
2895Summary information for domain investorab.com.
2896-----------------------------------------
2897 Domain Specific Information:
2898 Email: helpdesk@investorab.com,
2899 Email: magnus.dahlhammar@investorab.com,
2900 Email: last@investorab.com
2901 Email: elinor.carlsson@investorab.com,
2902 Email: prd@investorab.com
2903
2904 Domain Ips Information:
2905 IP: 52.100.0.0
2906 Type: SPF
2907 Is Active: False
2908 IP: 23.100.15.180
2909 HostName: www.investorab.com. Type: A
2910 Country: Netherlands
2911 Is Active: True (syn-ack ttl 107)
2912 Port: 80/tcp open http syn-ack ttl 104 Microsoft IIS httpd 8.5
2913 Script Info: |_http-server-header: Microsoft-IIS/8.5
2914 Script Info: |_http-title: WAP Websites - Site Error
2915 Port: 443/tcp open ssl/http syn-ack ttl 105 Microsoft IIS httpd 8.5
2916 Script Info: |_http-title: WAP Websites - Site Error
2917 Script Info: | ssl-cert: Subject: commonName=umbraco.io/organizationName=Umbraco A/S/stateOrProvinceName=Hovedstaden/countryName=DK
2918 Script Info: | Subject Alternative Name: DNS:umbraco.io, DNS:*.s1.umbraco.io, DNS:*.scm.s1.umbraco.io, DNS:*.scm.umbraco.io, DNS:*.umbraco.io
2919 Script Info: | Issuer: commonName=Sectigo RSA Organization Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
2920 Script Info: | Public Key type: rsa
2921 Script Info: | Public Key bits: 2048
2922 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2923 Script Info: | Not valid before: 2020-01-31T00:00:00
2924 Script Info: | Not valid after: 2022-03-31T23:59:59
2925 Script Info: | MD5: 02b6 6c21 ca76 efea 3e94 e72c 6aa9 134b
2926 Script Info: |_SHA-1: 0f46 27e0 449f b9a0 5775 e8b8 a75e 9e57 cb1d 5254
2927 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2928 IP: 80.169.185.7
2929 HostName: mx4.investorab.com. Type: A
2930 Country: United Kingdom
2931 Is Active: True (echo-reply ttl 50)
2932 IP: 212.209.237.41
2933 HostName: ns1.investorab.com. Type: A
2934 Country: Sweden
2935 Is Active: False
2936 IP: 212.209.237.43
2937 HostName: owa.investorab.com. Type: A
2938 Country: Sweden
2939 Is Active: False
2940 IP: 104.47.6.36
2941 HostName: investorab-com.mail.protection.outlook.com Type: MX
2942 HostName: mail-ve1eur020036.inbound.protection.outlook.com Type: PTR
2943 Country: Austria
2944 Is Active: True (syn-ack ttl 107)
2945 Port: 25/tcp open smtp syn-ack ttl 107 Microsoft Exchange smtpd
2946 Script Info: | smtp-commands: VE1EUR02FT030.mail.protection.outlook.com Hello [190.105.229.20], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2947 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2948 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2949 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2950 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2951 Script Info: | Public Key type: rsa
2952 Script Info: | Public Key bits: 2048
2953 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2954 Script Info: | Not valid before: 2020-02-24T18:33:10
2955 Script Info: | Not valid after: 2022-02-24T18:33:10
2956 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2957 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2958 Script Info: |_ssl-date: 2020-03-30T21:55:03+00:00; -1s from scanner time.
2959 Os Info: Host: VE1EUR02FT008.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2960 Script Info: |_clock-skew: -1s
2961 IP: 80.169.185.8
2962 HostName: mail.investorab.com. Type: A
2963 Country: United Kingdom
2964 Is Active: False
2965 IP: 104.47.5.36
2966 HostName: investorab-com.mail.protection.outlook.com Type: MX
2967 HostName: mail-he1eur020036.inbound.protection.outlook.com Type: PTR
2968 Country: Finland
2969 Is Active: True (syn-ack ttl 104)
2970 Port: 25/tcp open smtp syn-ack ttl 103 Microsoft Exchange smtpd
2971 Script Info: | smtp-commands: HE1EUR02FT064.mail.protection.outlook.com Hello [190.105.229.20], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2972 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2973 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2974 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2975 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2976 Script Info: | Public Key type: rsa
2977 Script Info: | Public Key bits: 2048
2978 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2979 Script Info: | Not valid before: 2020-02-24T18:33:10
2980 Script Info: | Not valid after: 2022-02-24T18:33:10
2981 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2982 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2983 Script Info: |_ssl-date: 2020-03-30T21:55:52+00:00; -1s from scanner time.
2984 Os Info: Host: HE1EUR02FT004.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2985 Script Info: |_clock-skew: -1s
2986 IP: 156.154.130.100
2987 HostName: dns1.cscdns.net Type: NS
2988 HostName: ns5.netnames.net Type: PTR
2989 Country: United States
2990 Is Active: True (echo-reply ttl 52)
2991 Port: 53/tcp open tcpwrapped syn-ack ttl 52
2992 Script Info: | dns-nsid:
2993 Script Info: |_ bind.version: UltraDNS Resolver
2994 Script Info: Device type: webcam|general purpose|media device|load balancer|storage-misc|specialized
2995 Script Info: Running (JUST GUESSING): Geovision embedded (93%), Linux 3.X|2.6.X (93%), Kemp embedded (93%), Western Digital embedded (93%)
2996 IP: 104.47.0.0
2997 Type: SPF
2998 Is Active: False
2999 IP: 212.209.235.42
3000 HostName: ns2.investorab.com. Type: A
3001 Country: Sweden
3002 Is Active: False
3003 IP: 40.107.0.0
3004 Type: SPF
3005 Is Active: False
3006 IP: 156.154.131.100
3007 HostName: dns2.cscdns.net Type: NS
3008 HostName: nusdns06.digitalarchives.com Type: PTR
3009 Country: United States
3010 Is Active: True (echo-reply ttl 49)
3011 Port: 53/tcp open tcpwrapped syn-ack ttl 49
3012 Script Info: | dns-nsid:
3013 Script Info: |_ bind.version: UltraDNS Resolver
3014 Script Info: Device type: webcam|general purpose|media device|load balancer|storage-misc|specialized
3015 Script Info: Running (JUST GUESSING): Geovision embedded (93%), Linux 3.X|2.6.X (93%), Kemp embedded (93%), Western Digital embedded (93%)
3016 IP: 40.92.0.0
3017 Type: SPF
3018 Is Active: False
3019 IP: 80.169.182.217
3020 HostName: mx5.investorab.com. Type: A
3021 Country: United Kingdom
3022 Is Active: False
3023
3024--------------End Summary --------------
3025-----------------------------------------
3026################################################################################################################################
3027----- investorab.com -----
3028
3029
3030Host's addresses:
3031__________________
3032
3033investorab.com. 86400 IN A 165.160.15.20
3034investorab.com. 86400 IN A 165.160.13.20
3035
3036
3037Name Servers:
3038______________
3039
3040dns2.cscdns.net. 11301 IN A 156.154.131.100
3041dns1.cscdns.net. 11300 IN A 156.154.130.100
3042
3043
3044Mail (MX) Servers:
3045___________________
3046
3047investorab-com.mail.protection.outlook.com. 10 IN A 104.47.5.36
3048investorab-com.mail.protection.outlook.com. 10 IN A 104.47.6.36
3049
3050Google Results:
3051________________
3052
3053ir.investorab.com. 86400 IN CNAME app.alertir.com.
3054app.alertir.com. 300 IN CNAME alertir.com.edgekey.net.
3055alertir.com.edgekey.net. 21600 IN CNAME e15919.b.akamaiedge.net.
3056e15919.b.akamaiedge.net. 20 IN A 190.98.144.195
3057e15919.b.akamaiedge.net. 20 IN A 190.98.144.197
3058
3059
3060Brute forcing with /usr/share/dnsenum/dns.txt:
3061_______________________________________________
3062
3063extranet.investorab.com. 86015 IN A 80.169.185.10
3064mail.investorab.com. 86400 IN A 80.169.185.8
3065nav.investorab.com. 86400 IN A 212.209.235.51
3066ns1.investorab.com. 86400 IN A 212.209.237.41
3067ns2.investorab.com. 86399 IN A 212.209.235.42
3068owa.investorab.com. 86400 IN A 212.209.237.43
3069vpn.investorab.com. 86400 IN A 80.169.184.235
3070webaccess.investorab.com. 86399 IN A 212.209.235.51
3071www.investorab.com. 144 IN A 23.100.15.180
3072
3073
3074Launching Whois Queries:
3075_________________________
3076
3077 whois ip result: 23.100.15.0 -> 23.96.0.0/13
3078 whois ip result: 165.160.13.0 -> 165.160.0.0/16
3079 whois ip result: 80.169.184.0 -> 80.169.184.0/26
3080 whois ip result: 80.169.185.0 -> 80.169.185.0/28
3081 whois ip result: 212.209.235.0 -> 212.209.0.0/16
3082 whois ip result: 212.209.237.0 -> 212.209.237.0/28
3083
3084
3085investorab.com______________
3086
3087 212.209.237.0/28
3088 212.209.0.0/16
3089 23.96.0.0/13
3090 80.169.184.0/26
3091 80.169.185.0/28
3092 165.160.0.0/16
3093################################################################################################################################
3094Source:
3095whois.arin.net
3096IP Address:
309723.100.15.180
3098Name:
3099MSFT
3100Handle:
3101NET-23-96-0-0-1
3102Registration Date:
31036/18/13
3104Range:
310523.96.0.0-23.103.255.255
3106Org:
3107Microsoft Corporation
3108Org Handle:
3109MSFT
3110Address:
3111One Microsoft Way
3112City:
3113Redmond
3114State/Province:
3115WA
3116Postal Code:
311798052
3118Country:
3119United States
3120Name Servers:
3121################################################################################################################################
3122URLCrazy Domain Report
3123Domain : www.investorab.com
3124Keyboard : qwerty
3125At : 2020-03-30 17:49:02 -0400
3126
3127# Please wait. 189 hostnames to process
3128
3129Typo Type Typo DNS-A CC-A DNS-MX Extn
3130-----------------------------------------------------------------------------------------------------------------------------------------
3131Character Omission ww.investorab.com ? com
3132Character Omission www.inestorab.com ? com
3133Character Omission www.invesorab.com ? com
3134Character Omission www.investoab.com ? com
3135Character Omission www.investora.com 89.31.143.1 DE,GERMANY com
3136Character Omission www.investorab.cm ? cm
3137Character Omission www.investorb.com 52.0.217.44 US,UNITED STATES com
3138Character Omission www.investrab.com ? com
3139Character Omission www.invetorab.com ? com
3140Character Omission www.invstorab.com ? com
3141Character Omission www.ivestorab.com ? com
3142Character Omission www.nvestorab.com ? com
3143Character Omission wwwinvestorab.com ? com
3144Character Repeat www.iinvestorab.com ? com
3145Character Repeat www.innvestorab.com ? com
3146Character Repeat www.inveestorab.com ? com
3147Character Repeat www.invesstorab.com ? com
3148Character Repeat www.investoorab.com ? com
3149Character Repeat www.investoraab.com ? com
3150Character Repeat www.investorabb.com ? com
3151Character Repeat www.investorrab.com ? com
3152Character Repeat www.investtorab.com ? com
3153Character Repeat www.invvestorab.com ? com
3154Character Repeat wwww.investorab.com ? com
3155Character Swap ww.winvestorab.com ? com
3156Character Swap www.inevstorab.com ? com
3157Character Swap www.invesotrab.com ? com
3158Character Swap www.investoarb.com ? com
3159Character Swap www.investorba.com ? com
3160Character Swap www.investroab.com ? com
3161Character Swap www.invetsorab.com ? com
3162Character Swap www.invsetorab.com ? com
3163Character Swap www.ivnestorab.com ? com
3164Character Swap www.nivestorab.com ? com
3165Character Swap wwwi.nvestorab.com ? com
3166Character Replacement eww.investorab.com ? com
3167Character Replacement qww.investorab.com ? com
3168Character Replacement wew.investorab.com ? com
3169Character Replacement wqw.investorab.com ? com
3170Character Replacement wwe.investorab.com ? com
3171Character Replacement wwq.investorab.com ? com
3172Character Replacement www.ibvestorab.com ? com
3173Character Replacement www.imvestorab.com ? com
3174Character Replacement www.inbestorab.com ? com
3175Character Replacement www.incestorab.com ? com
3176Character Replacement www.inveatorab.com ? com
3177Character Replacement www.invedtorab.com ? com
3178Character Replacement www.invesrorab.com ? com
3179Character Replacement www.investirab.com ? com
3180Character Replacement www.investoeab.com ? com
3181Character Replacement www.investoran.com ? com
3182Character Replacement www.investorav.com ? com
3183Character Replacement www.investorsb.com ? com
3184Character Replacement www.investotab.com ? com
3185Character Replacement www.investprab.com ? com
3186Character Replacement www.invesyorab.com ? com
3187Character Replacement www.invrstorab.com ? com
3188Character Replacement www.invwstorab.com ? com
3189Character Replacement www.onvestorab.com ? com
3190Character Replacement www.unvestorab.com ? com
3191Double Character Replacement eew.investorab.com ? com
3192Double Character Replacement qqw.investorab.com ? com
3193Double Character Replacement wee.investorab.com ? com
3194Double Character Replacement wqq.investorab.com ? com
3195Character Insertion weww.investorab.com ? com
3196Character Insertion wqww.investorab.com ? com
3197Character Insertion wwew.investorab.com ? com
3198Character Insertion wwqw.investorab.com ? com
3199Character Insertion www.inbvestorab.com ? com
3200Character Insertion www.inmvestorab.com ? com
3201Character Insertion www.invbestorab.com ? com
3202Character Insertion www.invcestorab.com ? com
3203Character Insertion www.inverstorab.com ? com
3204Character Insertion www.invesatorab.com ? com
3205Character Insertion www.invesdtorab.com ? com
3206Character Insertion www.investoirab.com ? com
3207Character Insertion www.investoprab.com ? com
3208Character Insertion www.investorabn.com ? com
3209Character Insertion www.investorabv.com ? com
3210Character Insertion www.investorasb.com ? com
3211Character Insertion www.investoreab.com ? com
3212Character Insertion www.investortab.com ? com
3213Character Insertion www.investrorab.com ? com
3214Character Insertion www.investyorab.com ? com
3215Character Insertion www.invewstorab.com ? com
3216Character Insertion www.ionvestorab.com ? com
3217Character Insertion www.iunvestorab.com ? com
3218Character Insertion wwwe.investorab.com ? com
3219Character Insertion wwwq.investorab.com ? com
3220Missing Dot wwwwww.investorab.com ? com
3221Singular or Pluralise investorab.com 165.160.15.20 US,UNITED STATES investorab-com.mail.protection.outlook.com com
3222Singular or Pluralise investorabs.com ? com
3223Vowel Swap www.anvestorab.com ? com
3224Vowel Swap www.envestorab.com ? com
3225Vowel Swap www.invastorab.com ? com
3226Vowel Swap www.investoreb.com ? com
3227Vowel Swap www.investorib.com ? com
3228Vowel Swap www.investorob.com ? com
3229Vowel Swap www.investorub.com ? com
3230Vowel Swap www.invistorab.com ? com
3231Vowel Swap www.invostorab.com ? com
3232Vowel Swap www.invustorab.com ? com
3233Homophones www.ayenvestorab.com ? com
3234Homophones www.eyenvestorab.com ? com
3235Homophones www.investoarab.com ? com
3236Homophones www.investworab.com ? com
3237Bit Flipping 7ww.investorab.com ? com
3238Bit Flipping gww.investorab.com ? com
3239Bit Flipping sww.investorab.com ? com
3240Bit Flipping uww.investorab.com ? com
3241Bit Flipping vww.investorab.com ? com
3242Bit Flipping w7w.investorab.com ? com
3243Bit Flipping wgw.investorab.com ? com
3244Bit Flipping wsw.investorab.com ? com
3245Bit Flipping wuw.investorab.com ? com
3246Bit Flipping wvw.investorab.com ? com
3247Bit Flipping ww7.investorab.com ? com
3248Bit Flipping wwg.investorab.com ? com
3249Bit Flipping wws.investorab.com ? com
3250Bit Flipping wwu.investorab.com ? com
3251Bit Flipping wwv.investorab.com ? com
3252Bit Flipping www.hnvestorab.com ? com
3253Bit Flipping www.i.vestorab.com ? com
3254Bit Flipping www.ifvestorab.com ? com
3255Bit Flipping www.ijvestorab.com ? com
3256Bit Flipping www.ilvestorab.com ? com
3257Bit Flipping www.in6estorab.com ? com
3258Bit Flipping www.infestorab.com ? com
3259Bit Flipping www.inrestorab.com ? com
3260Bit Flipping www.intestorab.com ? com
3261Bit Flipping www.invdstorab.com ? com
3262Bit Flipping www.inve3torab.com ? com
3263Bit Flipping www.invectorab.com ? com
3264Bit Flipping www.inveqtorab.com ? com
3265Bit Flipping www.invertorab.com ? com
3266Bit Flipping www.inves4orab.com ? com
3267Bit Flipping www.invesdorab.com ? com
3268Bit Flipping www.invesporab.com ? com
3269Bit Flipping www.investgrab.com 184.168.221.56 5, com
3270Bit Flipping www.investkrab.com ? com
3271Bit Flipping www.investmrab.com ? com
3272Bit Flipping www.investnrab.com ? com
3273Bit Flipping www.investo2ab.com ? com
3274Bit Flipping www.investobab.com ? com
3275Bit Flipping www.investopab.com ? com
3276Bit Flipping www.investorac.com ? com
3277Bit Flipping www.investoraf.com ? com
3278Bit Flipping www.investoraj.com ? com
3279Bit Flipping www.investorar.com ? com
3280Bit Flipping www.investorcb.com ? com
3281Bit Flipping www.investorqb.com ? com
3282Bit Flipping www.investosab.com ? com
3283Bit Flipping www.investovab.com ? com
3284Bit Flipping www.investozab.com ? com
3285Bit Flipping www.invesuorab.com ? com
3286Bit Flipping www.invesvorab.com ? com
3287Bit Flipping www.invewtorab.com ? com
3288Bit Flipping www.invgstorab.com ? com
3289Bit Flipping www.invmstorab.com ? com
3290Bit Flipping www.inwestorab.com ? com
3291Bit Flipping www.iovestorab.com ? com
3292Bit Flipping www.knvestorab.com ? com
3293Bit Flipping www.mnvestorab.com ? com
3294Bit Flipping www.ynvestorab.com ? com
3295Bit Flipping wwwninvestorab.com ? com
3296Homoglyphs vvvvvv.investorab.com ? com
3297Homoglyphs vvvvw.investorab.com ? com
3298Homoglyphs vvwvv.investorab.com ? com
3299Homoglyphs vvww.investorab.com ? com
3300Homoglyphs wvvvv.investorab.com ? com
3301Homoglyphs wvvw.investorab.com ? com
3302Homoglyphs wwvv.investorab.com ? com
3303Homoglyphs www.invest0rab.com ? com
3304Homoglyphs www.lnvestorab.com ? com
3305Wrong TLD investorab.ca ? ca
3306Wrong TLD investorab.ch ? ch
3307Wrong TLD investorab.de ? de
3308Wrong TLD investorab.edu ? edu
3309Wrong TLD investorab.es ? es
3310Wrong TLD investorab.fr ? fr
3311Wrong TLD investorab.it ? it
3312Wrong TLD investorab.jp ? jp
3313Wrong TLD investorab.net 212.209.237.41 SE,SWEDEN net
3314Wrong TLD investorab.nl ? nl
3315Wrong TLD investorab.no ? no
3316Wrong TLD investorab.org 212.209.237.41 SE,SWEDEN org
3317Wrong TLD investorab.ru ? ru
3318Wrong TLD investorab.se 165.160.15.20 US,UNITED STATES se
3319Wrong TLD investorab.us ? us
3320################################################################################################################################
3321--------------------------------------------------------------------------------------------------------------------------------
3322[3/25] https://www.investorab.com/media/05mieta1/bolagsstyrningsrapport2008.pdf
3323 [x] Error in the parsing process
3324[4/25] https://www.investorab.com/media/bkujydae/molnlycke_health_care_2010.pdf
3325[5/25] https://www.investorab.com/media/kl2gcisa/notice_of_agm_investor_ab.pdf
3326[6/25] https://www.investorab.com/media/lwdpxx2p/q22006.pdf
3327[7/25] https://www.investorab.com/media/jldhgpzd/bolagsstyrningsrapport2007.pdf
3328[8/25] https://www.investorab.com/media/yuthocgz/bolagsordning.pdf
3329[9/25] https://www.investorab.com/media/wc1dhcta/conditions_for_remuneration_of_board_of_directors.pdf
3330[10/25] https://www.investorab.com/media/afcjpifj/q2presentation2010.pdf
3331[11/25] https://www.investorab.com/media/zufabhc3/work_of_the_board_in_2013.pdf
3332[12/25] https://www.investorab.com/media/kygaoylr/yearendreport2010.pdf
3333[13/25] https://www.investorab.com/media/vzzfaug3/employees_and_payroll_costs_2014.pdf
3334[14/25] https://www.investorab.com/media/wbce1h45/aerocrine_investor_growth_capital_healthcare_seminar_2006.pdf
3335[15/25] https://www.investorab.com/media/4zvmwbsk/year_end_2006.pdf
3336[16/25] https://www.investorab.com/media/1kuhseyw/nomination_committee_s_proposal_for_decision.pdf
3337[17/25] https://www.investorab.com/media/arlo224b/borje_ekholm_introduction_2010.pdf
3338 [x] Error in PDF metadata Creator
3339[18/25] https://www.investorab.com/media/ojgkq5wz/b_rje_ekholm_speech_at_the_agm_2013_final.pdf
3340[19/25] https://www.investorab.com/media/auhbawgd/bee_20agm_20speech_20final.pdf
3341[20/25] https://www.investorab.com/media/uxddw0ae/investor_kommenterar_styrelseordf_randen_och_vd_om_skatter.pdf
3342[21/25] https://www.investorab.com/media/nsydauwz/motivated_opinion_nomination_committee.pdf
3343[22/25] https://www.investorab.com/media/dold4ssm/presentation_q3_2013.pdf
3344[23/25] https://www.investorab.com/media/bdro0gfq/investoracquiresaleris_2010.pdf
3345[24/25] https://www.investorab.com/media/ychbzc0g/presentation_q4_2013.pdf
3346[25/25] https://www.investorab.com/media/4m5hmnwe/stephen_campe_investor_growth_capital_2010.pdf
3347-------------------------------------------------------------------------------------------------------------------------------
3348[+] List of users found:
3349--------------------------
3350nim
3351Munthe Nilsson, Charlotte
3352Charlotte Nilsson
3353LDG2895
3354Investor
3355anan
3356Sj�din, Susanna
3357Niklas Mossvik
3358Stege Unger, Oscar
3359hj
3360Tamme, Paulina
3361John Boghossian
3362Investor AB
3363
3364[+] List of software found:
3365-----------------------------
3366Acrobat Distiller 8.2.2 (Windows)
3367PScript5.dll Version 5.2.2
3368��Microsoft� Word 2013
3369Adobe Acrobat 6.0
3370Adobe Illustrator CS2
3371Adobe PDF Library 8.0
3372Adobe InDesign CS3 (5.0.1)
3373��Microsoft� Office PowerPoint� 2007
3374Adobe PDF Library 9.9
3375Adobe InDesign CS5 (7.0.1)
3376Adobe PDF Library 9.0
3377Acrobat PDFMaker 9.1 for PowerPoint
3378Adobe InDesign CS5.5 (7.5.3)
3379Acrobat Distiller 6.0 (Windows)
3380Microsoft� Office PowerPoint� 2007
3381Adobe PDF Library 11.0
3382Acrobat PDFMaker 11 for Word
3383Adobe PDF Library 10.0
3384Acrobat PDFMaker 10.1 for Word
3385Acrobat PDFMaker 10.1 for PowerPoint
3386Microsoft� Word 2010
3387��Microsoft� Word 2010
3388Acrobat PDFMaker 10.0 for PowerPoint
3389��Microsoft� PowerPoint� 2013
3390Microsoft Excel
3391
3392[+] List of paths and servers found:
3393---------------------------------------
3394
3395[+] List of e-mails found:
3396----------------------------
3397InvestorAGM@investorab.com.
3398-------------------------------------------------------------------------------------------------------------------------------
3399################################################################################################################################
3400[+] www.investorab.com has no SPF record!
3401[*] No DMARC record found. Looking for organizational record
3402[*] Found organizational DMARC record:
3403[*] v=DMARC1; p=none; pct=50; rua=mailto:helpdesk@investorab.com; ruf=mailto:helpdesk@investorab.com; adkim=r; aspf=r; rf=afrf
3404[*] No explicit organizational subdomain policy. Defaulting to organizational policy
3405[+] DMARC policy set to none
3406[+] Spoofing possible for www.investorab.com!
3407################################################################################################################################
3408WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
3409Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:57 EDT
3410Nmap scan report for www.investorab.com (23.100.15.180)
3411Host is up (0.57s latency).
3412Not shown: 494 filtered ports
3413Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3414PORT STATE SERVICE
341580/tcp open http
3416443/tcp open https
3417
3418Nmap done: 1 IP address (1 host up) scanned in 26.14 seconds
3419################################################################################################################################
3420Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:58 EDT
3421Nmap scan report for www.investorab.com (23.100.15.180)
3422Host is up.
3423
3424PORT STATE SERVICE
342553/udp open|filtered domain
342667/udp open|filtered dhcps
342768/udp open|filtered dhcpc
342869/udp open|filtered tftp
342988/udp open|filtered kerberos-sec
3430123/udp open|filtered ntp
3431137/udp open|filtered netbios-ns
3432138/udp open|filtered netbios-dgm
3433139/udp open|filtered netbios-ssn
3434161/udp open|filtered snmp
3435162/udp open|filtered snmptrap
3436389/udp open|filtered ldap
3437500/udp open|filtered isakmp
3438520/udp open|filtered route
34392049/udp open|filtered nfs
3440
3441Nmap done: 1 IP address (1 host up) scanned in 5.65 seconds
3442################################################################################################################################
3443HTTP/1.1 301 Moved Permanently
3444Content-Length: 150
3445Content-Type: text/html; charset=UTF-8
3446Location: https://www.investorab.com/
3447Server: Microsoft-IIS/8.5
3448Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
3449Date: Mon, 30 Mar 2020 21:58:30 GMT
3450################################################################################################################################
3451/
3452/about-investor/
3453/about-investor/board-management/
3454/about-investor/business-areas/
3455/about-investor/corporate-governance/
3456/about-investor/employees-your-career/
3457/about-investor/how-we-do-it/
3458/about-investor/investor-s-history/
3459/about-investor/our-business-model/
3460/about-investor/targets-and-outcome/
3461/assets/images/svg/logo-vit.svg
3462/assets/js/app.bundle.js
3463/assets/js/vendor.bundle.js
3464/contact/
3465/cookies/
3466https://vp053.alertir.com/afw/files/press/investor/202003263627-1.pdf
3467https://www.linkedin.com/company/investor-ab
3468http://www.w3.org/2000/svg
3469/investors-media/
3470/investors-media/bondholders/
3471/investors-media/events-calendar/
3472/investors-media/image-gallery/
3473/investors-media/investor-in-figures/
3474/investors-media/press-releases-news/
3475/investors-media/press-releases-news/ceo-richard-twomey-leaves-molnlycke/
3476/investors-media/press-releases-news/?id=1791906
3477/investors-media/reports-presentations/
3478/investors-media/shareholders/
3479/investors-media/subscription-services/
3480/our-investment/listed%20companies/
3481/our-investments/
3482/our-investments/?category=investments-in-eqt
3483/our-investments/?category=listed-companies
3484/our-investments/?category=patricia-industries
3485/our-investments/investments-in-eqt/
3486/our-investments/patricia-industries/
3487/privacy-notice/
3488/sustainability/
3489/sustainability/business-ethics-governance/
3490/sustainability/climate-resource-efficiency/
3491/sustainability/code-of-conduct/
3492/sustainability/diversity-inclusion/
3493/sustainability/un-global-goals/
3494/sustainability/whistleblowing/
3495/sv/
3496#################################################################################################################################
3497http://www.investorab.com [301 Moved Permanently] AzureCloud, Cookies[ARRAffinity], Country[UNITED STATES][US], HTTPServer[Microsoft-IIS/8.5], IP[23.100.15.180], Microsoft-IIS[8.5], RedirectLocation[https://www.investorab.com/], Title[Document Moved]
3498https://www.investorab.com/ [200 OK] AzureCloud, Cookies[ARRAffinity], Country[UNITED STATES][US], Email[info@investorab.com], Google-Analytics[Universal][UA-1803638-1], HTML5, IP[23.100.15.180], MetaGenerator[Umbraco], Open-Graph-Protocol[website], Script, Title[Investor - Home], X-UA-Compatible[ie=edge]
3499################################################################################################################################
3500
3501wig - WebApp Information Gatherer
3502
3503
3504Scanning https://www.investorab.com...
3505_______________________________________________ SITE INFO ________________________________________________
3506IP Title
350723.100.15.180 Investor - Home
3508
3509________________________________________________ VERSION _________________________________________________
3510Name Versions Type
3511Umbraco 7.0.0 | 7.0.0-RC | 7.0.0-alpha | 7.0.0-beta | 7.0.1 | 7.0.2 CMS
3512 7.0.3 | 7.0.4 | 7.1.0 | 7.1.0-RC | 7.1.0-beta | 7.1.1
3513 7.1.2 | 7.1.3 | 7.1.4 | 7.1.5 | 7.1.6 | 7.1.7 | 7.1.8
3514 7.1.9 | 7.2.0 | 7.2.0-RC | 7.2.0-alpha | 7.2.0-beta
3515 7.2.0-beta2 | 7.2.1 | 7.2.2 | 7.2.3 | 7.2.4 | 7.2.5
3516 7.2.5-RC | 7.2.6 | 7.2.7 | 7.2.8 | 7.3.0 | 7.3.0-RC
3517 7.3.0-beta | 7.3.0-beta | 7.3.0-beta2 | 7.3.0-beta3 | 7.3.1
3518 7.3.2 | 7.3.3 | 7.3.4 | 7.3.5 | 7.3.6 | 7.3.7 | 7.3.8
3519 7.4.0 | 7.4.0-RC1 | 7.4.0-beta2 | 7.4.1 | 7.4.2 | 7.4.3
3520 7.5.0 | 7.5.0-beta | 7.5.0-beta2 | 7.5.1 | 7.5.2 | 7.5.3
3521IIS 8.5 Platform
3522Microsoft Windows Server 2012 R2 OS
3523
3524__________________________________________________________________________________________________________
3525Time: 221.1 sec Urls: 571 Fingerprints: 40401
3526################################################################################################################################
3527Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 18:03 EDT
3528NSE: Loaded 161 scripts for scanning.
3529NSE: Script Pre-scanning.
3530Initiating NSE at 18:03
3531Completed NSE at 18:03, 0.00s elapsed
3532Initiating NSE at 18:03
3533Completed NSE at 18:03, 0.00s elapsed
3534Initiating Parallel DNS resolution of 1 host. at 18:03
3535Completed Parallel DNS resolution of 1 host. at 18:03, 0.09s elapsed
3536Initiating SYN Stealth Scan at 18:03
3537Scanning www.investorab.com (23.100.15.180) [1 port]
3538Discovered open port 80/tcp on 23.100.15.180
3539Completed SYN Stealth Scan at 18:03, 0.54s elapsed (1 total ports)
3540Initiating Service scan at 18:03
3541Scanning 1 service on www.investorab.com (23.100.15.180)
3542Completed Service scan at 18:03, 7.12s elapsed (1 service on 1 host)
3543Initiating OS detection (try #1) against www.investorab.com (23.100.15.180)
3544Retrying OS detection (try #2) against www.investorab.com (23.100.15.180)
3545Initiating Traceroute at 18:04
3546Completed Traceroute at 18:04, 7.07s elapsed
3547Initiating Parallel DNS resolution of 17 hosts. at 18:04
3548Completed Parallel DNS resolution of 17 hosts. at 18:04, 2.55s elapsed
3549NSE: Script scanning 23.100.15.180.
3550Initiating NSE at 18:04
3551Completed NSE at 18:05, 90.23s elapsed
3552Initiating NSE at 18:05
3553Completed NSE at 18:05, 2.81s elapsed
3554Nmap scan report for www.investorab.com (23.100.15.180)
3555Host is up (0.73s latency).
3556
3557PORT STATE SERVICE VERSION
355880/tcp open http Microsoft IIS httpd 8.5
3559| http-brute:
3560|_ Path "/" does not require authentication
3561|_http-chrono: Request times for /; avg: 1606.01ms; min: 1518.90ms; max: 1777.13ms
3562|_http-csrf: Couldn't find any CSRF vulnerabilities.
3563|_http-date: Mon, 30 Mar 2020 22:04:30 GMT; -2s from local time.
3564|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3565|_http-dombased-xss: Couldn't find any DOM based XSS.
3566|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
3567|_http-errors: Couldn't find any error pages.
3568|_http-feed: Couldn't find any feeds.
3569|_http-fetch: Please enter the complete path of the directory to save data in.
3570| http-headers:
3571| Content-Length: 150
3572| Content-Type: text/html; charset=UTF-8
3573| Location: https://www.investorab.com/
3574| Server: Microsoft-IIS/8.5
3575| Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
3576| Date: Mon, 30 Mar 2020 22:04:35 GMT
3577| Connection: close
3578|
3579|_ (Request type: GET)
3580|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3581| http-methods:
3582|_ Supported Methods: GET HEAD POST OPTIONS
3583|_http-mobileversion-checker: No mobile version detected.
3584| http-security-headers:
3585| Cache_Control:
3586|_ Header: Cache-Control: private
3587|_http-server-header: Microsoft-IIS/8.5
3588| http-sitemap-generator:
3589| Directory structure:
3590| Longest directory structure:
3591| Depth: 0
3592| Dir: /
3593| Total files found (by extension):
3594|_
3595|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3596|_http-title: Did not follow redirect to https://www.investorab.com/
3597|_http-traceroute: ERROR: Script execution failed (use -d to debug)
3598| http-vhosts:
3599| www.investorab.com : 301 -> https://www.investorab.com/
3600|_126 names had status 404
3601|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
3602|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3603|_http-xssed: No previously reported XSS vuln.
3604Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3605OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
3606No OS matches for host
3607Uptime guess: 0.001 days (since Mon Mar 30 18:03:55 2020)
3608TCP Sequence Prediction: Difficulty=261 (Good luck!)
3609IP ID Sequence Generation: Randomized
3610Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3611
3612TRACEROUTE (using port 80/tcp)
3613HOP RTT ADDRESS
36141 457.80 ms 10.202.1.1
36152 457.88 ms 190.105.229.1
36163 457.93 ms 181.119.68.33
36174 457.91 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
36185 457.96 ms static.ifxnw.cl (216.241.0.2)
36196 ...
36207 649.22 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
36218 649.24 ms be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111)
36229 649.30 ms be-2-0.ibr01.mia.ntwk.msn.net (104.44.17.178)
362310 649.30 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
362411 562.25 ms be-2-0.ibr01.atl31.ntwk.msn.net (104.44.7.144)
362512 562.18 ms be-3-0.ibr03.bn6.ntwk.msn.net (104.44.7.146)
362613 562.09 ms be-2-0.ibr03.bl7.ntwk.msn.net (104.44.7.75)
362714 562.12 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
362815 562.12 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153)
362916 559.78 ms be-5-0.ibr01.dub07.ntwk.msn.net (104.44.16.113)
363017 559.72 ms be-7-0.ibr01.ams30.ntwk.msn.net (104.44.17.57)
363118 559.71 ms ae102-0.icr02.ams30.ntwk.msn.net (104.44.22.216)
363219 ... 30
3633
3634NSE: Script Post-scanning.
3635Initiating NSE at 18:05
3636Completed NSE at 18:05, 0.00s elapsed
3637Initiating NSE at 18:05
3638Completed NSE at 18:05, 0.00s elapsed
3639################################################################################################################################
3640------------------------------------------------------------------------------------------------------------------------
3641
3642[ ! ] Starting SCANNER INURLBR 2.1 at [30-03-2020 18:08:51]
3643[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3644It is the end user's responsibility to obey all applicable local, state and federal laws.
3645Developers assume no liability and are not responsible for any misuse or damage caused by this program
3646
3647[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.investorab.com/output/inurlbr-www.investorab.com ]
3648[ INFO ][ DORK ]::[ site:www.investorab.com ]
3649[ INFO ][ SEARCHING ]:: {
3650[ INFO ][ ENGINE ]::[ GOOGLE - www.google.vu ]
3651
3652[ INFO ][ SEARCHING ]::
3653-[:::]
3654[ INFO ][ ENGINE ]::[ GOOGLE API ]
3655
3656[ INFO ][ SEARCHING ]::
3657-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3658[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.jo ID: 003917828085772992913:gmoeray5sa8 ]
3659
3660[ INFO ][ SEARCHING ]::
3661-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3662
3663[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
3664
3665
3666 _[ - ]::--------------------------------------------------------------------------------------------------------------
3667|_[ + ] [ 0 / 100 ]-[18:09:33] [ - ]
3668|_[ + ] Target:: [ https://www.investorab.com/404/ ]
3669|_[ + ] Exploit::
3670|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3671|_[ + ] More details:: / - / , ISP:
3672|_[ + ] Found:: UNIDENTIFIED
3673
3674 _[ - ]::--------------------------------------------------------------------------------------------------------------
3675|_[ + ] [ 1 / 100 ]-[18:09:40] [ - ]
3676|_[ + ] Target:: [ https://www.investorab.com/sustainability/ ]
3677|_[ + ] Exploit::
3678|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3679|_[ + ] More details:: / - / , ISP:
3680|_[ + ] Found:: UNIDENTIFIED
3681
3682 _[ - ]::--------------------------------------------------------------------------------------------------------------
3683|_[ + ] [ 2 / 100 ]-[18:09:46] [ - ]
3684|_[ + ] Target:: [ https://www.investorab.com/contact/ ]
3685|_[ + ] Exploit::
3686|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3687|_[ + ] More details:: / - / , ISP:
3688|_[ + ] Found:: UNIDENTIFIED
3689
3690 _[ - ]::--------------------------------------------------------------------------------------------------------------
3691|_[ + ] [ 3 / 100 ]-[18:09:53] [ - ]
3692|_[ + ] Target:: [ https://www.investorab.com/ ]
3693|_[ + ] Exploit::
3694|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3695|_[ + ] More details:: / - / , ISP:
3696|_[ + ] Found:: UNIDENTIFIED
3697
3698 _[ - ]::--------------------------------------------------------------------------------------------------------------
3699|_[ + ] [ 4 / 100 ]-[18:10:00] [ - ]
3700|_[ + ] Target:: [ https://www.investorab.com/sustainability/whistleblowing/ ]
3701|_[ + ] Exploit::
3702|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3703|_[ + ] More details:: / - / , ISP:
3704|_[ + ] Found:: UNIDENTIFIED
3705
3706 _[ - ]::--------------------------------------------------------------------------------------------------------------
3707|_[ + ] [ 5 / 100 ]-[18:10:07] [ - ]
3708|_[ + ] Target:: [ https://www.investorab.com/sv/personuppgiftsbehandling/ ]
3709|_[ + ] Exploit::
3710|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3711|_[ + ] More details:: / - / , ISP:
3712|_[ + ] Found:: UNIDENTIFIED
3713
3714 _[ - ]::--------------------------------------------------------------------------------------------------------------
3715|_[ + ] [ 6 / 100 ]-[18:10:13] [ - ]
3716|_[ + ] Target:: [ https://www.investorab.com/our-investments/ ]
3717|_[ + ] Exploit::
3718|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3719|_[ + ] More details:: / - / , ISP:
3720|_[ + ] Found:: UNIDENTIFIED
3721
3722 _[ - ]::--------------------------------------------------------------------------------------------------------------
3723|_[ + ] [ 7 / 100 ]-[18:10:20] [ - ]
3724|_[ + ] Target:: [ https://www.investorab.com/sv/kontakt/ ]
3725|_[ + ] Exploit::
3726|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3727|_[ + ] More details:: / - / , ISP:
3728|_[ + ] Found:: UNIDENTIFIED
3729
3730 _[ - ]::--------------------------------------------------------------------------------------------------------------
3731|_[ + ] [ 8 / 100 ]-[18:10:26] [ - ]
3732|_[ + ] Target:: [ https://www.investorab.com/about-investor/ ]
3733|_[ + ] Exploit::
3734|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3735|_[ + ] More details:: / - / , ISP:
3736|_[ + ] Found:: UNIDENTIFIED
3737
3738 _[ - ]::--------------------------------------------------------------------------------------------------------------
3739|_[ + ] [ 9 / 100 ]-[18:10:33] [ - ]
3740|_[ + ] Target:: [ https://www.investorab.com/investors-media/ ]
3741|_[ + ] Exploit::
3742|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3743|_[ + ] More details:: / - / , ISP:
3744|_[ + ] Found:: UNIDENTIFIED
3745
3746 _[ - ]::--------------------------------------------------------------------------------------------------------------
3747|_[ + ] [ 10 / 100 ]-[18:10:40] [ - ]
3748|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/ ]
3749|_[ + ] Exploit::
3750|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3751|_[ + ] More details:: / - / , ISP:
3752|_[ + ] Found:: UNIDENTIFIED
3753
3754 _[ - ]::--------------------------------------------------------------------------------------------------------------
3755|_[ + ] [ 11 / 100 ]-[18:10:47] [ - ]
3756|_[ + ] Target:: [ https://www.investorab.com/privacy-notice/ ]
3757|_[ + ] Exploit::
3758|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3759|_[ + ] More details:: / - / , ISP:
3760|_[ + ] Found:: UNIDENTIFIED
3761
3762 _[ - ]::--------------------------------------------------------------------------------------------------------------
3763|_[ + ] [ 12 / 100 ]-[18:10:54] [ - ]
3764|_[ + ] Target:: [ https://www.investorab.com/sv/ ]
3765|_[ + ] Exploit::
3766|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3767|_[ + ] More details:: / - / , ISP:
3768|_[ + ] Found:: UNIDENTIFIED
3769
3770 _[ - ]::--------------------------------------------------------------------------------------------------------------
3771|_[ + ] [ 13 / 100 ]-[18:11:00] [ - ]
3772|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/ ]
3773|_[ + ] Exploit::
3774|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3775|_[ + ] More details:: / - / , ISP:
3776|_[ + ] Found:: UNIDENTIFIED
3777
3778 _[ - ]::--------------------------------------------------------------------------------------------------------------
3779|_[ + ] [ 14 / 100 ]-[18:11:07] [ - ]
3780|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/ ]
3781|_[ + ] Exploit::
3782|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3783|_[ + ] More details:: / - / , ISP:
3784|_[ + ] Found:: UNIDENTIFIED
3785
3786 _[ - ]::--------------------------------------------------------------------------------------------------------------
3787|_[ + ] [ 15 / 100 ]-[18:11:14] [ - ]
3788|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/visselblasning/ ]
3789|_[ + ] Exploit::
3790|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3791|_[ + ] More details:: / - / , ISP:
3792|_[ + ] Found:: UNIDENTIFIED
3793
3794 _[ - ]::--------------------------------------------------------------------------------------------------------------
3795|_[ + ] [ 16 / 100 ]-[18:11:20] [ - ]
3796|_[ + ] Target:: [ https://www.investorab.com/investors-media/bondholders/ ]
3797|_[ + ] Exploit::
3798|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3799|_[ + ] More details:: / - / , ISP:
3800|_[ + ] Found:: UNIDENTIFIED
3801
3802 _[ - ]::--------------------------------------------------------------------------------------------------------------
3803|_[ + ] [ 17 / 100 ]-[18:11:27] [ - ]
3804|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/ ]
3805|_[ + ] Exploit::
3806|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3807|_[ + ] More details:: / - / , ISP:
3808|_[ + ] Found:: UNIDENTIFIED
3809
3810 _[ - ]::--------------------------------------------------------------------------------------------------------------
3811|_[ + ] [ 18 / 100 ]-[18:11:34] [ - ]
3812|_[ + ] Target:: [ https://www.investorab.com/sv/vaara-investeringar/ ]
3813|_[ + ] Exploit::
3814|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3815|_[ + ] More details:: / - / , ISP:
3816|_[ + ] Found:: UNIDENTIFIED
3817
3818 _[ - ]::--------------------------------------------------------------------------------------------------------------
3819|_[ + ] [ 19 / 100 ]-[18:11:41] [ - ]
3820|_[ + ] Target:: [ https://www.investorab.com/sustainability/diversity-inclusion/ ]
3821|_[ + ] Exploit::
3822|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3823|_[ + ] More details:: / - / , ISP:
3824|_[ + ] Found:: UNIDENTIFIED
3825
3826 _[ - ]::--------------------------------------------------------------------------------------------------------------
3827|_[ + ] [ 20 / 100 ]-[18:11:48] [ - ]
3828|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/skuldinvesterare/ ]
3829|_[ + ] Exploit::
3830|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3831|_[ + ] More details:: / - / , ISP:
3832|_[ + ] Found:: UNIDENTIFIED
3833
3834 _[ - ]::--------------------------------------------------------------------------------------------------------------
3835|_[ + ] [ 21 / 100 ]-[18:11:53] [ - ]
3836|_[ + ] Target:: [ https://www.investorab.com/sustainability/people-and-communities/ ]
3837|_[ + ] Exploit::
3838|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
3839|_[ + ] More details:: / - / , ISP:
3840|_[ + ] Found:: UNIDENTIFIED
3841
3842 _[ - ]::--------------------------------------------------------------------------------------------------------------
3843|_[ + ] [ 22 / 100 ]-[18:12:00] [ - ]
3844|_[ + ] Target:: [ https://www.investorab.com/investors-media/image-gallery/ ]
3845|_[ + ] Exploit::
3846|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3847|_[ + ] More details:: / - / , ISP:
3848|_[ + ] Found:: UNIDENTIFIED
3849
3850 _[ - ]::--------------------------------------------------------------------------------------------------------------
3851|_[ + ] [ 23 / 100 ]-[18:12:07] [ - ]
3852|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/mangfald-inkludering/ ]
3853|_[ + ] Exploit::
3854|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3855|_[ + ] More details:: / - / , ISP:
3856|_[ + ] Found:: UNIDENTIFIED
3857
3858 _[ - ]::--------------------------------------------------------------------------------------------------------------
3859|_[ + ] [ 24 / 100 ]-[18:12:13] [ - ]
3860|_[ + ] Target:: [ https://www.investorab.com/about-investor/business-areas/ ]
3861|_[ + ] Exploit::
3862|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3863|_[ + ] More details:: / - / , ISP:
3864|_[ + ] Found:: UNIDENTIFIED
3865
3866 _[ - ]::--------------------------------------------------------------------------------------------------------------
3867|_[ + ] [ 25 / 100 ]-[18:12:20] [ - ]
3868|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/ ]
3869|_[ + ] Exploit::
3870|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3871|_[ + ] More details:: / - / , ISP:
3872|_[ + ] Found:: UNIDENTIFIED
3873
3874 _[ - ]::--------------------------------------------------------------------------------------------------------------
3875|_[ + ] [ 26 / 100 ]-[18:12:27] [ - ]
3876|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/ ]
3877|_[ + ] Exploit::
3878|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3879|_[ + ] More details:: / - / , ISP:
3880|_[ + ] Found:: UNIDENTIFIED
3881
3882 _[ - ]::--------------------------------------------------------------------------------------------------------------
3883|_[ + ] [ 27 / 100 ]-[18:12:34] [ - ]
3884|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/prenumerationstjanst/ ]
3885|_[ + ] Exploit::
3886|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3887|_[ + ] More details:: / - / , ISP:
3888|_[ + ] Found:: UNIDENTIFIED
3889
3890 _[ - ]::--------------------------------------------------------------------------------------------------------------
3891|_[ + ] [ 28 / 100 ]-[18:12:41] [ - ]
3892|_[ + ] Target:: [ https://www.investorab.com/media/05mieta1/bolagsstyrningsrapport2008.pdf ]
3893|_[ + ] Exploit::
3894|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3895|_[ + ] More details:: / - / , ISP:
3896|_[ + ] Found:: UNIDENTIFIED
3897
3898 _[ - ]::--------------------------------------------------------------------------------------------------------------
3899|_[ + ] [ 29 / 100 ]-[18:12:47] [ - ]
3900|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/bildarkiv/ ]
3901|_[ + ] Exploit::
3902|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3903|_[ + ] More details:: / - / , ISP:
3904|_[ + ] Found:: UNIDENTIFIED
3905
3906 _[ - ]::--------------------------------------------------------------------------------------------------------------
3907|_[ + ] [ 30 / 100 ]-[18:12:54] [ - ]
3908|_[ + ] Target:: [ https://www.investorab.com/sustainability/un-global-goals/ ]
3909|_[ + ] Exploit::
3910|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3911|_[ + ] More details:: / - / , ISP:
3912|_[ + ] Found:: UNIDENTIFIED
3913
3914 _[ - ]::--------------------------------------------------------------------------------------------------------------
3915|_[ + ] [ 31 / 100 ]-[18:13:01] [ - ]
3916|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/klimat-resurseffektivitet/ ]
3917|_[ + ] Exploit::
3918|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3919|_[ + ] More details:: / - / , ISP:
3920|_[ + ] Found:: UNIDENTIFIED
3921
3922 _[ - ]::--------------------------------------------------------------------------------------------------------------
3923|_[ + ] [ 32 / 100 ]-[18:13:08] [ - ]
3924|_[ + ] Target:: [ https://www.investorab.com/about-investor/board-management/ ]
3925|_[ + ] Exploit::
3926|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3927|_[ + ] More details:: / - / , ISP:
3928|_[ + ] Found:: UNIDENTIFIED
3929
3930 _[ - ]::--------------------------------------------------------------------------------------------------------------
3931|_[ + ] [ 33 / 100 ]-[18:13:14] [ - ]
3932|_[ + ] Target:: [ https://www.investorab.com/sustainability/climate-resource-efficiency/ ]
3933|_[ + ] Exploit::
3934|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3935|_[ + ] More details:: / - / , ISP:
3936|_[ + ] Found:: UNIDENTIFIED
3937
3938 _[ - ]::--------------------------------------------------------------------------------------------------------------
3939|_[ + ] [ 34 / 100 ]-[18:13:20] [ - ]
3940|_[ + ] Target:: [ https://www.investorab.com/sustainability/whistleblowing/reports-2018/ ]
3941|_[ + ] Exploit::
3942|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
3943|_[ + ] More details:: / - / , ISP:
3944|_[ + ] Found:: UNIDENTIFIED
3945
3946 _[ - ]::--------------------------------------------------------------------------------------------------------------
3947|_[ + ] [ 35 / 100 ]-[18:13:25] [ - ]
3948|_[ + ] Target:: [ https://www.investorab.com/our-investments/patricia-industries/ ]
3949|_[ + ] Exploit::
3950|_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:23.100.15.180:443
3951|_[ + ] More details:: / - / , ISP:
3952|_[ + ] Found:: UNIDENTIFIED
3953
3954 _[ - ]::--------------------------------------------------------------------------------------------------------------
3955|_[ + ] [ 36 / 100 ]-[18:13:32] [ - ]
3956|_[ + ] Target:: [ https://www.investorab.com/sustainability/business-ethics-governance/ ]
3957|_[ + ] Exploit::
3958|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3959|_[ + ] More details:: / - / , ISP:
3960|_[ + ] Found:: UNIDENTIFIED
3961
3962 _[ - ]::--------------------------------------------------------------------------------------------------------------
3963|_[ + ] [ 37 / 100 ]-[18:13:39] [ - ]
3964|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/affarsetik-styrning/ ]
3965|_[ + ] Exploit::
3966|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3967|_[ + ] More details:: / - / , ISP:
3968|_[ + ] Found:: UNIDENTIFIED
3969
3970 _[ - ]::--------------------------------------------------------------------------------------------------------------
3971|_[ + ] [ 38 / 100 ]-[18:13:46] [ - ]
3972|_[ + ] Target:: [ https://www.investorab.com/investors-media/subscription-services/ ]
3973|_[ + ] Exploit::
3974|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3975|_[ + ] More details:: / - / , ISP:
3976|_[ + ] Found:: UNIDENTIFIED
3977
3978 _[ - ]::--------------------------------------------------------------------------------------------------------------
3979|_[ + ] [ 39 / 100 ]-[18:13:53] [ - ]
3980|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/ ]
3981|_[ + ] Exploit::
3982|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3983|_[ + ] More details:: / - / , ISP:
3984|_[ + ] Found:: UNIDENTIFIED
3985
3986 _[ - ]::--------------------------------------------------------------------------------------------------------------
3987|_[ + ] [ 40 / 100 ]-[18:13:59] [ - ]
3988|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/analysts/ ]
3989|_[ + ] Exploit::
3990|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3991|_[ + ] More details:: / - / , ISP:
3992|_[ + ] Found:: UNIDENTIFIED
3993
3994 _[ - ]::--------------------------------------------------------------------------------------------------------------
3995|_[ + ] [ 41 / 100 ]-[18:14:06] [ - ]
3996|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/affarsomraden/ ]
3997|_[ + ] Exploit::
3998|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
3999|_[ + ] More details:: / - / , ISP:
4000|_[ + ] Found:: UNIDENTIFIED
4001
4002 _[ - ]::--------------------------------------------------------------------------------------------------------------
4003|_[ + ] [ 42 / 100 ]-[18:14:13] [ - ]
4004|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/bolagsstyrningsrapport/ ]
4005|_[ + ] Exploit::
4006|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4007|_[ + ] More details:: / - / , ISP:
4008|_[ + ] Found:: UNIDENTIFIED
4009
4010 _[ - ]::--------------------------------------------------------------------------------------------------------------
4011|_[ + ] [ 43 / 100 ]-[18:14:20] [ - ]
4012|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2019/ ]
4013|_[ + ] Exploit::
4014|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4015|_[ + ] More details:: / - / , ISP:
4016|_[ + ] Found:: UNIDENTIFIED
4017
4018 _[ - ]::--------------------------------------------------------------------------------------------------------------
4019|_[ + ] [ 44 / 100 ]-[18:14:26] [ - ]
4020|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/skuldinvesterare/forfallostruktur/ ]
4021|_[ + ] Exploit::
4022|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4023|_[ + ] More details:: / - / , ISP:
4024|_[ + ] Found:: UNIDENTIFIED
4025
4026 _[ - ]::--------------------------------------------------------------------------------------------------------------
4027|_[ + ] [ 45 / 100 ]-[18:14:32] [ - ]
4028|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/visselblasning/rapporter-2018/ ]
4029|_[ + ] Exploit::
4030|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
4031|_[ + ] More details:: / - / , ISP:
4032|_[ + ] Found:: UNIDENTIFIED
4033
4034 _[ - ]::--------------------------------------------------------------------------------------------------------------
4035|_[ + ] [ 46 / 100 ]-[18:14:39] [ - ]
4036|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2014/ ]
4037|_[ + ] Exploit::
4038|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4039|_[ + ] More details:: / - / , ISP:
4040|_[ + ] Found:: UNIDENTIFIED
4041
4042 _[ - ]::--------------------------------------------------------------------------------------------------------------
4043|_[ + ] [ 47 / 100 ]-[18:14:46] [ - ]
4044|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/bildarkiv/logotyp/ ]
4045|_[ + ] Exploit::
4046|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4047|_[ + ] More details:: / - / , ISP:
4048|_[ + ] Found:: UNIDENTIFIED
4049
4050 _[ - ]::--------------------------------------------------------------------------------------------------------------
4051|_[ + ] [ 48 / 100 ]-[18:14:53] [ - ]
4052|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/styrelse/ ]
4053|_[ + ] Exploit::
4054|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4055|_[ + ] More details:: / - / , ISP:
4056|_[ + ] Found:: UNIDENTIFIED
4057
4058 _[ - ]::--------------------------------------------------------------------------------------------------------------
4059|_[ + ] [ 49 / 100 ]-[18:14:59] [ - ]
4060|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/kontrollfunktioner/ ]
4061|_[ + ] Exploit::
4062|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4063|_[ + ] More details:: / - / , ISP:
4064|_[ + ] Found:: UNIDENTIFIED
4065
4066 _[ - ]::--------------------------------------------------------------------------------------------------------------
4067|_[ + ] [ 50 / 100 ]-[18:15:06] [ - ]
4068|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2013/ ]
4069|_[ + ] Exploit::
4070|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4071|_[ + ] More details:: / - / , ISP:
4072|_[ + ] Found:: UNIDENTIFIED
4073
4074 _[ - ]::--------------------------------------------------------------------------------------------------------------
4075|_[ + ] [ 51 / 100 ]-[18:15:13] [ - ]
4076|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/management/ ]
4077|_[ + ] Exploit::
4078|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4079|_[ + ] More details:: / - / , ISP:
4080|_[ + ] Found:: UNIDENTIFIED
4081
4082 _[ - ]::--------------------------------------------------------------------------------------------------------------
4083|_[ + ] [ 52 / 100 ]-[18:15:21] [ - ]
4084|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/investors-historia/ ]
4085|_[ + ] Exploit::
4086|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4087|_[ + ] More details:: / - / , ISP:
4088|_[ + ] Found:: UNIDENTIFIED
4089
4090 _[ - ]::--------------------------------------------------------------------------------------------------------------
4091|_[ + ] [ 53 / 100 ]-[18:15:28] [ - ]
4092|_[ + ] Target:: [ https://www.investorab.com/investors-media/investor-in-figures/ ]
4093|_[ + ] Exploit::
4094|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4095|_[ + ] More details:: / - / , ISP:
4096|_[ + ] Found:: UNIDENTIFIED
4097
4098 _[ - ]::--------------------------------------------------------------------------------------------------------------
4099|_[ + ] [ 54 / 100 ]-[18:15:35] [ - ]
4100|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/archive/ ]
4101|_[ + ] Exploit::
4102|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4103|_[ + ] More details:: / - / , ISP:
4104|_[ + ] Found:: UNIDENTIFIED
4105
4106 _[ - ]::--------------------------------------------------------------------------------------------------------------
4107|_[ + ] [ 55 / 100 ]-[18:15:41] [ - ]
4108|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2017/ ]
4109|_[ + ] Exploit::
4110|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4111|_[ + ] More details:: / - / , ISP:
4112|_[ + ] Found:: UNIDENTIFIED
4113
4114 _[ - ]::--------------------------------------------------------------------------------------------------------------
4115|_[ + ] [ 56 / 100 ]-[18:15:48] [ - ]
4116|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/valberedning/ ]
4117|_[ + ] Exploit::
4118|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4119|_[ + ] More details:: / - / , ISP:
4120|_[ + ] Found:: UNIDENTIFIED
4121
4122 _[ - ]::--------------------------------------------------------------------------------------------------------------
4123|_[ + ] [ 57 / 100 ]-[18:15:55] [ - ]
4124|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/ownership-structure/ ]
4125|_[ + ] Exploit::
4126|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4127|_[ + ] More details:: / - / , ISP:
4128|_[ + ] Found:: UNIDENTIFIED
4129
4130 _[ - ]::--------------------------------------------------------------------------------------------------------------
4131|_[ + ] [ 58 / 100 ]-[18:16:02] [ - ]
4132|_[ + ] Target:: [ https://www.investorab.com/investors-media/bondholders/maturity-profile/ ]
4133|_[ + ] Exploit::
4134|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4135|_[ + ] More details:: / - / , ISP:
4136|_[ + ] Found:: UNIDENTIFIED
4137
4138 _[ - ]::--------------------------------------------------------------------------------------------------------------
4139|_[ + ] [ 59 / 100 ]-[18:16:07] [ - ]
4140|_[ + ] Target:: [ https://www.investorab.com/our-investments/patricia-industries/permobil/ ]
4141|_[ + ] Exploit::
4142|_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:23.100.15.180:443
4143|_[ + ] More details:: / - / , ISP:
4144|_[ + ] Found:: UNIDENTIFIED
4145
4146 _[ - ]::--------------------------------------------------------------------------------------------------------------
4147|_[ + ] [ 60 / 100 ]-[18:16:14] [ - ]
4148|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2015/ ]
4149|_[ + ] Exploit::
4150|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4151|_[ + ] More details:: / - / , ISP:
4152|_[ + ] Found:: UNIDENTIFIED
4153
4154 _[ - ]::--------------------------------------------------------------------------------------------------------------
4155|_[ + ] [ 61 / 100 ]-[18:16:20] [ - ]
4156|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/pressmeddelanden-nyheter/ ]
4157|_[ + ] Exploit::
4158|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4159|_[ + ] More details:: / - / , ISP:
4160|_[ + ] Found:: UNIDENTIFIED
4161
4162 _[ - ]::--------------------------------------------------------------------------------------------------------------
4163|_[ + ] [ 62 / 100 ]-[18:16:27] [ - ]
4164|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/analytiker/ ]
4165|_[ + ] Exploit::
4166|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4167|_[ + ] More details:: / - / , ISP:
4168|_[ + ] Found:: UNIDENTIFIED
4169
4170 _[ - ]::--------------------------------------------------------------------------------------------------------------
4171|_[ + ] [ 63 / 100 ]-[18:16:34] [ - ]
4172|_[ + ] Target:: [ https://www.investorab.com/investors-media/image-gallery/logotype/ ]
4173|_[ + ] Exploit::
4174|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4175|_[ + ] More details:: / - / , ISP:
4176|_[ + ] Found:: UNIDENTIFIED
4177
4178 _[ - ]::--------------------------------------------------------------------------------------------------------------
4179|_[ + ] [ 64 / 100 ]-[18:16:41] [ - ]
4180|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/ledningsgrupp/ ]
4181|_[ + ] Exploit::
4182|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4183|_[ + ] More details:: / - / , ISP:
4184|_[ + ] Found:: UNIDENTIFIED
4185
4186 _[ - ]::--------------------------------------------------------------------------------------------------------------
4187|_[ + ] [ 65 / 100 ]-[18:16:48] [ - ]
4188|_[ + ] Target:: [ https://www.investorab.com/investors-media/press-releases-news/ ]
4189|_[ + ] Exploit::
4190|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4191|_[ + ] More details:: / - / , ISP:
4192|_[ + ] Found:: UNIDENTIFIED
4193
4194 _[ - ]::--------------------------------------------------------------------------------------------------------------
4195|_[ + ] [ 66 / 100 ]-[18:16:55] [ - ]
4196|_[ + ] Target:: [ https://www.investorab.com/about-investor/our-business-model/ ]
4197|_[ + ] Exploit::
4198|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4199|_[ + ] More details:: / - / , ISP:
4200|_[ + ] Found:: UNIDENTIFIED
4201
4202 _[ - ]::--------------------------------------------------------------------------------------------------------------
4203|_[ + ] [ 67 / 100 ]-[18:17:01] [ - ]
4204|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2018/ ]
4205|_[ + ] Exploit::
4206|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4207|_[ + ] More details:: / - / , ISP:
4208|_[ + ] Found:: UNIDENTIFIED
4209
4210 _[ - ]::--------------------------------------------------------------------------------------------------------------
4211|_[ + ] [ 68 / 100 ]-[18:17:08] [ - ]
4212|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2016/ ]
4213|_[ + ] Exploit::
4214|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4215|_[ + ] More details:: / - / , ISP:
4216|_[ + ] Found:: UNIDENTIFIED
4217
4218 _[ - ]::--------------------------------------------------------------------------------------------------------------
4219|_[ + ] [ 69 / 100 ]-[18:17:15] [ - ]
4220|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/auditors/ ]
4221|_[ + ] Exploit::
4222|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4223|_[ + ] More details:: / - / , ISP:
4224|_[ + ] Found:: UNIDENTIFIED
4225
4226 _[ - ]::--------------------------------------------------------------------------------------------------------------
4227|_[ + ] [ 70 / 100 ]-[18:17:21] [ - ]
4228|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/revisorer/ ]
4229|_[ + ] Exploit::
4230|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4231|_[ + ] More details:: / - / , ISP:
4232|_[ + ] Found:: UNIDENTIFIED
4233
4234 _[ - ]::--------------------------------------------------------------------------------------------------------------
4235|_[ + ] [ 71 / 100 ]-[18:17:29] [ - ]
4236|_[ + ] Target:: [ https://www.investorab.com/about-investor/employees-your-career/ ]
4237|_[ + ] Exploit::
4238|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4239|_[ + ] More details:: / - / , ISP:
4240|_[ + ] Found:: UNIDENTIFIED
4241
4242 _[ - ]::--------------------------------------------------------------------------------------------------------------
4243|_[ + ] [ 72 / 100 ]-[18:17:36] [ - ]
4244|_[ + ] Target:: [ https://www.investorab.com/about-investor/investor-s-history/ ]
4245|_[ + ] Exploit::
4246|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4247|_[ + ] More details:: / - / , ISP:
4248|_[ + ] Found:: UNIDENTIFIED
4249
4250 _[ - ]::--------------------------------------------------------------------------------------------------------------
4251|_[ + ] [ 73 / 100 ]-[18:17:41] [ - ]
4252|_[ + ] Target:: [ https://www.investorab.com/about-investor/objectives-and-outcome/ ]
4253|_[ + ] Exploit::
4254|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
4255|_[ + ] More details:: / - / , ISP:
4256|_[ + ] Found:: UNIDENTIFIED
4257
4258 _[ - ]::--------------------------------------------------------------------------------------------------------------
4259|_[ + ] [ 74 / 100 ]-[18:17:48] [ - ]
4260|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/styrelse-ledningsgrupp/ ]
4261|_[ + ] Exploit::
4262|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4263|_[ + ] More details:: / - / , ISP:
4264|_[ + ] Found:: UNIDENTIFIED
4265
4266 _[ - ]::--------------------------------------------------------------------------------------------------------------
4267|_[ + ] [ 75 / 100 ]-[18:17:54] [ - ]
4268|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/fn-s-hallbarhetsmal/ ]
4269|_[ + ] Exploit::
4270|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4271|_[ + ] More details:: / - / , ISP:
4272|_[ + ] Found:: UNIDENTIFIED
4273
4274 _[ - ]::--------------------------------------------------------------------------------------------------------------
4275|_[ + ] [ 76 / 100 ]-[18:18:02] [ - ]
4276|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/arsstamma/ ]
4277|_[ + ] Exploit::
4278|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4279|_[ + ] More details:: / - / , ISP:
4280|_[ + ] Found:: UNIDENTIFIED
4281
4282 _[ - ]::--------------------------------------------------------------------------------------------------------------
4283|_[ + ] [ 77 / 100 ]-[18:18:08] [ - ]
4284|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/agarstruktur/ ]
4285|_[ + ] Exploit::
4286|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4287|_[ + ] More details:: / - / , ISP:
4288|_[ + ] Found:: UNIDENTIFIED
4289
4290 _[ - ]::--------------------------------------------------------------------------------------------------------------
4291|_[ + ] [ 78 / 100 ]-[18:18:15] [ - ]
4292|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2012/ ]
4293|_[ + ] Exploit::
4294|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4295|_[ + ] More details:: / - / , ISP:
4296|_[ + ] Found:: UNIDENTIFIED
4297
4298 _[ - ]::--------------------------------------------------------------------------------------------------------------
4299|_[ + ] [ 79 / 100 ]-[18:18:22] [ - ]
4300|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/affarsetik-styrning/antikorruption/ ]
4301|_[ + ] Exploit::
4302|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4303|_[ + ] More details:: / - / , ISP:
4304|_[ + ] Found:: UNIDENTIFIED
4305
4306 _[ - ]::--------------------------------------------------------------------------------------------------------------
4307|_[ + ] [ 80 / 100 ]-[18:18:27] [ - ]
4308|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/manniskor-och-samhallen/ ]
4309|_[ + ] Exploit::
4310|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
4311|_[ + ] More details:: / - / , ISP:
4312|_[ + ] Found:: UNIDENTIFIED
4313
4314 _[ - ]::--------------------------------------------------------------------------------------------------------------
4315|_[ + ] [ 81 / 100 ]-[18:18:34] [ - ]
4316|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/var-affarsmodell/ ]
4317|_[ + ] Exploit::
4318|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4319|_[ + ] More details:: / - / , ISP:
4320|_[ + ] Found:: UNIDENTIFIED
4321
4322 _[ - ]::--------------------------------------------------------------------------------------------------------------
4323|_[ + ] [ 82 / 100 ]-[18:18:41] [ - ]
4324|_[ + ] Target:: [ https://www.investorab.com/about-investor/targets-and-outcome/ ]
4325|_[ + ] Exploit::
4326|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4327|_[ + ] More details:: / - / , ISP:
4328|_[ + ] Found:: UNIDENTIFIED
4329
4330 _[ - ]::--------------------------------------------------------------------------------------------------------------
4331|_[ + ] [ 83 / 100 ]-[18:18:47] [ - ]
4332|_[ + ] Target:: [ https://www.investorab.com/contact/magnus-dalhammar/ ]
4333|_[ + ] Exploit::
4334|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4335|_[ + ] More details:: / - / , ISP:
4336|_[ + ] Found:: UNIDENTIFIED
4337
4338 _[ - ]::--------------------------------------------------------------------------------------------------------------
4339|_[ + ] [ 84 / 100 ]-[18:18:54] [ - ]
4340|_[ + ] Target:: [ https://www.investorab.com/contact/jessica-haggstrom/ ]
4341|_[ + ] Exploit::
4342|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4343|_[ + ] More details:: / - / , ISP:
4344|_[ + ] Found:: UNIDENTIFIED
4345
4346 _[ - ]::--------------------------------------------------------------------------------------------------------------
4347|_[ + ] [ 85 / 100 ]-[18:19:01] [ - ]
4348|_[ + ] Target:: [ https://www.investorab.com/contact/sofia-jonsson/ ]
4349|_[ + ] Exploit::
4350|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4351|_[ + ] More details:: / - / , ISP:
4352|_[ + ] Found:: UNIDENTIFIED
4353
4354 _[ - ]::--------------------------------------------------------------------------------------------------------------
4355|_[ + ] [ 86 / 100 ]-[18:19:07] [ - ]
4356|_[ + ] Target:: [ https://www.investorab.com/about-investor/business-areas/patricia-industries/ ]
4357|_[ + ] Exploit::
4358|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4359|_[ + ] More details:: / - / , ISP:
4360|_[ + ] Found:: UNIDENTIFIED
4361
4362 _[ - ]::--------------------------------------------------------------------------------------------------------------
4363|_[ + ] [ 87 / 100 ]-[18:19:14] [ - ]
4364|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2013/ ]
4365|_[ + ] Exploit::
4366|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4367|_[ + ] More details:: / - / , ISP:
4368|_[ + ] Found:: UNIDENTIFIED
4369
4370 _[ - ]::--------------------------------------------------------------------------------------------------------------
4371|_[ + ] [ 88 / 100 ]-[18:19:21] [ - ]
4372|_[ + ] Target:: [ https://www.investorab.com/investors-media/investor-in-figures/definitions/ ]
4373|_[ + ] Exploit::
4374|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4375|_[ + ] More details:: / - / , ISP:
4376|_[ + ] Found:: UNIDENTIFIED
4377
4378 _[ - ]::--------------------------------------------------------------------------------------------------------------
4379|_[ + ] [ 89 / 100 ]-[18:19:28] [ - ]
4380|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/historiska-aktiefakta/ ]
4381|_[ + ] Exploit::
4382|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4383|_[ + ] More details:: / - / , ISP:
4384|_[ + ] Found:: UNIDENTIFIED
4385
4386 _[ - ]::--------------------------------------------------------------------------------------------------------------
4387|_[ + ] [ 90 / 100 ]-[18:19:34] [ - ]
4388|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2012/ ]
4389|_[ + ] Exploit::
4390|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4391|_[ + ] More details:: / - / , ISP:
4392|_[ + ] Found:: UNIDENTIFIED
4393
4394 _[ - ]::--------------------------------------------------------------------------------------------------------------
4395|_[ + ] [ 91 / 100 ]-[18:19:42] [ - ]
4396|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2017/ ]
4397|_[ + ] Exploit::
4398|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4399|_[ + ] More details:: / - / , ISP:
4400|_[ + ] Found:: UNIDENTIFIED
4401
4402 _[ - ]::--------------------------------------------------------------------------------------------------------------
4403|_[ + ] [ 92 / 100 ]-[18:19:48] [ - ]
4404|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/nomination-committee/ ]
4405|_[ + ] Exploit::
4406|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4407|_[ + ] More details:: / - / , ISP:
4408|_[ + ] Found:: UNIDENTIFIED
4409
4410 _[ - ]::--------------------------------------------------------------------------------------------------------------
4411|_[ + ] [ 93 / 100 ]-[18:19:55] [ - ]
4412|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/investors-historia/2005/ ]
4413|_[ + ] Exploit::
4414|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4415|_[ + ] More details:: / - / , ISP:
4416|_[ + ] Found:: UNIDENTIFIED
4417
4418 _[ - ]::--------------------------------------------------------------------------------------------------------------
4419|_[ + ] [ 94 / 100 ]-[18:20:02] [ - ]
4420|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/affarsomraden/patricia-industries/ ]
4421|_[ + ] Exploit::
4422|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4423|_[ + ] More details:: / - / , ISP:
4424|_[ + ] Found:: UNIDENTIFIED
4425
4426 _[ - ]::--------------------------------------------------------------------------------------------------------------
4427|_[ + ] [ 95 / 100 ]-[18:20:09] [ - ]
4428|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2016/ ]
4429|_[ + ] Exploit::
4430|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4431|_[ + ] More details:: / - / , ISP:
4432|_[ + ] Found:: UNIDENTIFIED
4433
4434 _[ - ]::--------------------------------------------------------------------------------------------------------------
4435|_[ + ] [ 96 / 100 ]-[18:20:16] [ - ]
4436|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/medarbetare-din-karriar/ ]
4437|_[ + ] Exploit::
4438|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4439|_[ + ] More details:: / - / , ISP:
4440|_[ + ] Found:: UNIDENTIFIED
4441
4442 _[ - ]::--------------------------------------------------------------------------------------------------------------
4443|_[ + ] [ 97 / 100 ]-[18:20:23] [ - ]
4444|_[ + ] Target:: [ https://www.investorab.com/about-investor/how-we-do-it/ ]
4445|_[ + ] Exploit::
4446|_[ + ] Information Server:: , , IP:23.100.15.180:443
4447|_[ + ] More details:: / - / , ISP:
4448|_[ + ] Found:: UNIDENTIFIED
4449
4450 _[ - ]::--------------------------------------------------------------------------------------------------------------
4451|_[ + ] [ 98 / 100 ]-[18:20:30] [ - ]
4452|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2018/ ]
4453|_[ + ] Exploit::
4454|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4455|_[ + ] More details:: / - / , ISP:
4456|_[ + ] Found:: UNIDENTIFIED
4457
4458 _[ - ]::--------------------------------------------------------------------------------------------------------------
4459|_[ + ] [ 99 / 100 ]-[18:20:37] [ - ]
4460|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/investor-i-siffror/ ]
4461|_[ + ] Exploit::
4462|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4463|_[ + ] More details:: / - / , ISP:
4464|_[ + ] Found:: UNIDENTIFIED
4465
4466[ INFO ] [ Shutting down ]
4467[ INFO ] [ End of process INURLBR at [30-03-2020 18:20:37]
4468[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
4469[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.investorab.com/output/inurlbr-www.investorab.com ]
4470|_________________________________________________________________________________________
4471
4472\_________________________________________________________________________________________/
4473################################################################################################################################
4474HTTP/1.1 200 OK
4475Cache-Control: private
4476Content-Length: 112550
4477Content-Type: text/html; charset=utf-8
4478Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
4479Date: Mon, 30 Mar 2020 22:20:46 GMT
4480################################################################################################################################
4481/
4482/about-investor/
4483/about-investor/board-management/
4484/about-investor/business-areas/
4485/about-investor/corporate-governance/
4486/about-investor/employees-your-career/
4487/about-investor/how-we-do-it/
4488/about-investor/investor-s-history/
4489/about-investor/our-business-model/
4490/about-investor/targets-and-outcome/
4491/assets/images/svg/logo-vit.svg
4492/assets/js/app.bundle.js
4493/assets/js/vendor.bundle.js
4494/contact/
4495/cookies/
4496https://vp053.alertir.com/afw/files/press/investor/202003263627-1.pdf
4497https://www.linkedin.com/company/investor-ab
4498http://www.w3.org/2000/svg
4499/investors-media/
4500/investors-media/bondholders/
4501/investors-media/events-calendar/
4502/investors-media/image-gallery/
4503/investors-media/investor-in-figures/
4504/investors-media/press-releases-news/
4505/investors-media/press-releases-news/ceo-richard-twomey-leaves-molnlycke/
4506/investors-media/press-releases-news/?id=1791906
4507/investors-media/reports-presentations/
4508/investors-media/shareholders/
4509/investors-media/subscription-services/
4510/our-investment/listed%20companies/
4511/our-investments/
4512/our-investments/?category=investments-in-eqt
4513/our-investments/?category=listed-companies
4514/our-investments/?category=patricia-industries
4515/our-investments/investments-in-eqt/
4516/our-investments/patricia-industries/
4517/privacy-notice/
4518/sustainability/
4519/sustainability/business-ethics-governance/
4520/sustainability/climate-resource-efficiency/
4521/sustainability/code-of-conduct/
4522/sustainability/diversity-inclusion/
4523/sustainability/un-global-goals/
4524/sustainability/whistleblowing/
4525/sv/
4526################################################################################################################################
4527https://www.investorab.com [200 OK] AzureCloud, Cookies[ARRAffinity], Country[UNITED STATES][US], Email[info@investorab.com], Google-Analytics[Universal][UA-1803638-1], HTML5, IP[23.100.15.180], MetaGenerator[Umbraco], Open-Graph-Protocol[website], Script, Title[Investor - Home], X-UA-Compatible[ie=edge]
4528################################################################################################################################
4529
4530wig - WebApp Information Gatherer
4531
4532
4533Scanning https://www.investorab.com...
4534_______________________________________________ SITE INFO ________________________________________________
4535IP Title
453623.100.15.180 Investor - Home
4537
4538________________________________________________ VERSION _________________________________________________
4539Name Versions Type
4540Umbraco 7.0.0 | 7.0.0-RC | 7.0.0-alpha | 7.0.0-beta | 7.0.1 | 7.0.2 CMS
4541 7.0.3 | 7.0.4 | 7.1.0 | 7.1.0-RC | 7.1.0-beta | 7.1.1
4542 7.1.2 | 7.1.3 | 7.1.4 | 7.1.5 | 7.1.6 | 7.1.7 | 7.1.8
4543 7.1.9 | 7.2.0 | 7.2.0-RC | 7.2.0-alpha | 7.2.0-beta
4544 7.2.0-beta2 | 7.2.1 | 7.2.2 | 7.2.3 | 7.2.4 | 7.2.5
4545 7.2.5-RC | 7.2.6 | 7.2.7 | 7.2.8 | 7.3.0 | 7.3.0-RC
4546 7.3.0-beta | 7.3.0-beta | 7.3.0-beta2 | 7.3.0-beta3 | 7.3.1
4547 7.3.2 | 7.3.3 | 7.3.4 | 7.3.5 | 7.3.6 | 7.3.7 | 7.3.8
4548 7.4.0 | 7.4.0-RC1 | 7.4.0-beta2 | 7.4.1 | 7.4.2 | 7.4.3
4549 7.5.0 | 7.5.0-beta | 7.5.0-beta2 | 7.5.1 | 7.5.2 | 7.5.3
4550IIS 8.5 Platform
4551Microsoft Windows Server 2012 R2 OS
4552
4553__________________________________________________________________________________________________________
4554Time: 2.1 sec Urls: 571 Fingerprints: 40401
4555################################################################################################################################
4556Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 18:21 EDT
4557NSE: Loaded 161 scripts for scanning.
4558NSE: Script Pre-scanning.
4559Initiating NSE at 18:21
4560Completed NSE at 18:21, 0.00s elapsed
4561Initiating NSE at 18:21
4562Completed NSE at 18:21, 0.00s elapsed
4563Initiating Parallel DNS resolution of 1 host. at 18:21
4564Completed Parallel DNS resolution of 1 host. at 18:21, 0.10s elapsed
4565Initiating SYN Stealth Scan at 18:21
4566Scanning www.investorab.com (23.100.15.180) [1 port]
4567Discovered open port 443/tcp on 23.100.15.180
4568Completed SYN Stealth Scan at 18:21, 0.58s elapsed (1 total ports)
4569Initiating Service scan at 18:21
4570Scanning 1 service on www.investorab.com (23.100.15.180)
4571Completed Service scan at 18:22, 16.76s elapsed (1 service on 1 host)
4572Initiating OS detection (try #1) against www.investorab.com (23.100.15.180)
4573Retrying OS detection (try #2) against www.investorab.com (23.100.15.180)
4574Initiating Traceroute at 18:22
4575Completed Traceroute at 18:22, 7.27s elapsed
4576Initiating Parallel DNS resolution of 17 hosts. at 18:22
4577Completed Parallel DNS resolution of 17 hosts. at 18:22, 6.41s elapsed
4578NSE: Script scanning 23.100.15.180.
4579Initiating NSE at 18:22
4580NSE: [http-wordpress-enum 23.100.15.180:443] got no answers from pipelined queries
4581Completed NSE at 18:24, 91.21s elapsed
4582Initiating NSE at 18:24
4583Completed NSE at 18:24, 5.20s elapsed
4584Nmap scan report for www.investorab.com (23.100.15.180)
4585Host is up (0.63s latency).
4586
4587PORT STATE SERVICE VERSION
4588443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
4589| http-brute:
4590|_ Path "/" does not require authentication
4591|_http-date: Mon, 30 Mar 2020 22:22:56 GMT; -2s from local time.
4592|_http-dombased-xss: Couldn't find any DOM based XSS.
4593|_http-errors: Couldn't find any error pages.
4594|_http-fetch: Please enter the complete path of the directory to save data in.
4595|_http-generator: Umbraco
4596| http-grep:
4597| (1) https://www.investorab.com:443/:
4598| (1) email:
4599|_ + info@investorab.com
4600| http-headers:
4601| Cache-Control: private
4602| Content-Length: 108770
4603| Content-Type: text/html; charset=utf-8
4604| Set-Cookie: ARRAffinity=a02626eb8f042cd9d5e18d5640cdb1450114aac19075d06290a6dd3a19b06ce5;Path=/;Domain=www.investorab.com
4605| Date: Mon, 30 Mar 2020 22:22:59 GMT
4606| Connection: close
4607|
4608|_ (Request type: HEAD)
4609| http-methods:
4610|_ Supported Methods: GET HEAD OPTIONS
4611|_http-mobileversion-checker: No mobile version detected.
4612|_http-php-version: Logo query returned unknown hash 87248f316329c6c07e64a379fa7e3cc8
4613| http-security-headers:
4614| Strict_Transport_Security:
4615| HSTS not configured in HTTPS Server
4616| Cache_Control:
4617|_ Header: Cache-Control: private
4618|_http-server-header: Microsoft-HTTPAPI/2.0
4619|_http-traceroute: ERROR: Script execution failed (use -d to debug)
4620| http-vhosts:
4621| ssh.investorab.com
4622| ldap.investorab.com
4623| ftp0.investorab.com
4624| ads.investorab.com
4625| whois.investorab.com
4626| devsql.investorab.com
4627| 120 names had status 400
4628|_www.investorab.com : 200
4629|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
4630|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
4631|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
4632|_http-xssed: No previously reported XSS vuln.
4633Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4634OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
4635No OS matches for host
4636Uptime guess: 0.001 days (since Mon Mar 30 18:22:09 2020)
4637TCP Sequence Prediction: Difficulty=260 (Good luck!)
4638IP ID Sequence Generation: Randomized
4639Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
4640
4641TRACEROUTE (using port 443/tcp)
4642HOP RTT ADDRESS
46431 440.87 ms 10.202.1.1
46442 440.92 ms 190.105.229.1
46453 440.94 ms 181.119.68.33
46464 440.97 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
46475 441.00 ms static.ifxnw.cl (216.241.0.2)
46486 ...
46497 441.05 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
46508 631.06 ms be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111)
46519 631.11 ms be-2-0.ibr01.mia.ntwk.msn.net (104.44.17.178)
465210 631.14 ms be-4-0.ibr01.atl30.ntwk.msn.net (104.44.28.63)
465311 797.62 ms be-6-0.ibr01.bn6.ntwk.msn.net (104.44.17.230)
465412 797.61 ms be-2-0.ibr03.bl20.ntwk.msn.net (104.44.19.5)
465513 797.72 ms be-8-0.ibr01.nyc30.ntwk.msn.net (104.44.19.195)
465614 797.46 ms be-7-0.ibr01.ewr30.ntwk.msn.net (104.44.16.19)
465715 797.68 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153)
465816 797.64 ms be-7-0.ibr01.dub08.ntwk.msn.net (104.44.16.117)
465917 796.76 ms be-8-0.ibr01.ams21.ntwk.msn.net (104.44.19.213)
466018 796.70 ms ae102-0.icr02.ams21.ntwk.msn.net (104.44.22.236)
466119 ... 30
4662
4663NSE: Script Post-scanning.
4664Initiating NSE at 18:24
4665Completed NSE at 18:24, 0.00s elapsed
4666Initiating NSE at 18:24
4667Completed NSE at 18:24, 0.00s elapsed
4668################################################################################################################################
4669Version: 2.0.0-static
4670OpenSSL 1.1.1f-dev xx XXX xxxx
4671
4672Connected to 23.100.15.180
4673
4674Testing SSL server www.investorab.com on port 443 using SNI name www.investorab.com
4675
4676 SSL/TLS Protocols:
4677SSLv2 disabled
4678SSLv3 disabled
4679TLSv1.0 disabled
4680TLSv1.1 disabled
4681TLSv1.2 enabled
4682TLSv1.3 disabled
4683
4684 TLS Fallback SCSV:
4685Server supports TLS Fallback SCSV
4686
4687 TLS renegotiation:
4688Session renegotiation not supported
4689
4690 TLS Compression:
4691Compression disabled
4692
4693 Heartbleed:
4694TLSv1.2 not vulnerable to heartbleed
4695
4696 Supported Server Cipher(s):
4697Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-521 DHE 521
4698Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-521 DHE 521
4699Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
4700Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
4701Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
4702Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
4703Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4704Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4705
4706 Server Signature Algorithm(s):
4707TLSv1.2 rsa_pkcs1_sha256
4708
4709 SSL Certificate:
4710Signature Algorithm: sha256WithRSAEncryption
4711RSA Key Strength: 2048
4712
4713Subject: www.investorab.com
4714Altnames: DNS:www.investorab.com
4715Issuer: Let's Encrypt Authority X3
4716
4717Not valid before: Mar 20 23:13:24 2020 GMT
4718Not valid after: Jun 18 23:13:24 2020 GMT
4719################################################################################################################################
4720------------------------------------------------------------------------------------------------------------------------
4721
4722[ ! ] Starting SCANNER INURLBR 2.1 at [30-03-2020 18:30:57]
4723[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4724It is the end user's responsibility to obey all applicable local, state and federal laws.
4725Developers assume no liability and are not responsible for any misuse or damage caused by this program
4726
4727[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.investorab.com/output/inurlbr-www.investorab.com ]
4728[ INFO ][ DORK ]::[ site:www.investorab.com ]
4729[ INFO ][ SEARCHING ]:: {
4730[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.uk ]
4731
4732[ INFO ][ SEARCHING ]::
4733-[:::]
4734[ INFO ][ ENGINE ]::[ GOOGLE API ]
4735
4736[ INFO ][ SEARCHING ]::
4737-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4738[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.na ID: 003917828085772992913:gmoeray5sa8 ]
4739
4740[ INFO ][ SEARCHING ]::
4741-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4742
4743[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4744
4745
4746 _[ - ]::--------------------------------------------------------------------------------------------------------------
4747|_[ + ] [ 0 / 100 ]-[18:31:39] [ - ]
4748|_[ + ] Target:: [ https://www.investorab.com/404/ ]
4749|_[ + ] Exploit::
4750|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4751|_[ + ] More details:: / - / , ISP:
4752|_[ + ] Found:: UNIDENTIFIED
4753
4754 _[ - ]::--------------------------------------------------------------------------------------------------------------
4755|_[ + ] [ 1 / 100 ]-[18:31:46] [ - ]
4756|_[ + ] Target:: [ https://www.investorab.com/sustainability/ ]
4757|_[ + ] Exploit::
4758|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4759|_[ + ] More details:: / - / , ISP:
4760|_[ + ] Found:: UNIDENTIFIED
4761
4762 _[ - ]::--------------------------------------------------------------------------------------------------------------
4763|_[ + ] [ 2 / 100 ]-[18:31:53] [ - ]
4764|_[ + ] Target:: [ https://www.investorab.com/contact/ ]
4765|_[ + ] Exploit::
4766|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4767|_[ + ] More details:: / - / , ISP:
4768|_[ + ] Found:: UNIDENTIFIED
4769
4770 _[ - ]::--------------------------------------------------------------------------------------------------------------
4771|_[ + ] [ 3 / 100 ]-[18:32:00] [ - ]
4772|_[ + ] Target:: [ https://www.investorab.com/ ]
4773|_[ + ] Exploit::
4774|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4775|_[ + ] More details:: / - / , ISP:
4776|_[ + ] Found:: UNIDENTIFIED
4777
4778 _[ - ]::--------------------------------------------------------------------------------------------------------------
4779|_[ + ] [ 4 / 100 ]-[18:32:07] [ - ]
4780|_[ + ] Target:: [ https://www.investorab.com/sustainability/whistleblowing/ ]
4781|_[ + ] Exploit::
4782|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4783|_[ + ] More details:: / - / , ISP:
4784|_[ + ] Found:: UNIDENTIFIED
4785
4786 _[ - ]::--------------------------------------------------------------------------------------------------------------
4787|_[ + ] [ 5 / 100 ]-[18:32:13] [ - ]
4788|_[ + ] Target:: [ https://www.investorab.com/sv/personuppgiftsbehandling/ ]
4789|_[ + ] Exploit::
4790|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4791|_[ + ] More details:: / - / , ISP:
4792|_[ + ] Found:: UNIDENTIFIED
4793
4794 _[ - ]::--------------------------------------------------------------------------------------------------------------
4795|_[ + ] [ 6 / 100 ]-[18:32:20] [ - ]
4796|_[ + ] Target:: [ https://www.investorab.com/our-investments/ ]
4797|_[ + ] Exploit::
4798|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4799|_[ + ] More details:: / - / , ISP:
4800|_[ + ] Found:: UNIDENTIFIED
4801
4802 _[ - ]::--------------------------------------------------------------------------------------------------------------
4803|_[ + ] [ 7 / 100 ]-[18:32:27] [ - ]
4804|_[ + ] Target:: [ https://www.investorab.com/sv/kontakt/ ]
4805|_[ + ] Exploit::
4806|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4807|_[ + ] More details:: / - / , ISP:
4808|_[ + ] Found:: UNIDENTIFIED
4809
4810 _[ - ]::--------------------------------------------------------------------------------------------------------------
4811|_[ + ] [ 8 / 100 ]-[18:32:33] [ - ]
4812|_[ + ] Target:: [ https://www.investorab.com/about-investor/ ]
4813|_[ + ] Exploit::
4814|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4815|_[ + ] More details:: / - / , ISP:
4816|_[ + ] Found:: UNIDENTIFIED
4817
4818 _[ - ]::--------------------------------------------------------------------------------------------------------------
4819|_[ + ] [ 9 / 100 ]-[18:32:40] [ - ]
4820|_[ + ] Target:: [ https://www.investorab.com/investors-media/ ]
4821|_[ + ] Exploit::
4822|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4823|_[ + ] More details:: / - / , ISP:
4824|_[ + ] Found:: UNIDENTIFIED
4825
4826 _[ - ]::--------------------------------------------------------------------------------------------------------------
4827|_[ + ] [ 10 / 100 ]-[18:32:47] [ - ]
4828|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/ ]
4829|_[ + ] Exploit::
4830|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4831|_[ + ] More details:: / - / , ISP:
4832|_[ + ] Found:: UNIDENTIFIED
4833
4834 _[ - ]::--------------------------------------------------------------------------------------------------------------
4835|_[ + ] [ 11 / 100 ]-[18:32:54] [ - ]
4836|_[ + ] Target:: [ https://www.investorab.com/privacy-notice/ ]
4837|_[ + ] Exploit::
4838|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4839|_[ + ] More details:: / - / , ISP:
4840|_[ + ] Found:: UNIDENTIFIED
4841
4842 _[ - ]::--------------------------------------------------------------------------------------------------------------
4843|_[ + ] [ 12 / 100 ]-[18:33:00] [ - ]
4844|_[ + ] Target:: [ https://www.investorab.com/sv/ ]
4845|_[ + ] Exploit::
4846|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4847|_[ + ] More details:: / - / , ISP:
4848|_[ + ] Found:: UNIDENTIFIED
4849
4850 _[ - ]::--------------------------------------------------------------------------------------------------------------
4851|_[ + ] [ 13 / 100 ]-[18:33:07] [ - ]
4852|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/ ]
4853|_[ + ] Exploit::
4854|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4855|_[ + ] More details:: / - / , ISP:
4856|_[ + ] Found:: UNIDENTIFIED
4857
4858 _[ - ]::--------------------------------------------------------------------------------------------------------------
4859|_[ + ] [ 14 / 100 ]-[18:33:14] [ - ]
4860|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/ ]
4861|_[ + ] Exploit::
4862|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4863|_[ + ] More details:: / - / , ISP:
4864|_[ + ] Found:: UNIDENTIFIED
4865
4866 _[ - ]::--------------------------------------------------------------------------------------------------------------
4867|_[ + ] [ 15 / 100 ]-[18:33:20] [ - ]
4868|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/visselblasning/ ]
4869|_[ + ] Exploit::
4870|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4871|_[ + ] More details:: / - / , ISP:
4872|_[ + ] Found:: UNIDENTIFIED
4873
4874 _[ - ]::--------------------------------------------------------------------------------------------------------------
4875|_[ + ] [ 16 / 100 ]-[18:33:27] [ - ]
4876|_[ + ] Target:: [ https://www.investorab.com/investors-media/bondholders/ ]
4877|_[ + ] Exploit::
4878|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4879|_[ + ] More details:: / - / , ISP:
4880|_[ + ] Found:: UNIDENTIFIED
4881
4882 _[ - ]::--------------------------------------------------------------------------------------------------------------
4883|_[ + ] [ 17 / 100 ]-[18:33:34] [ - ]
4884|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/ ]
4885|_[ + ] Exploit::
4886|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4887|_[ + ] More details:: / - / , ISP:
4888|_[ + ] Found:: UNIDENTIFIED
4889
4890 _[ - ]::--------------------------------------------------------------------------------------------------------------
4891|_[ + ] [ 18 / 100 ]-[18:33:41] [ - ]
4892|_[ + ] Target:: [ https://www.investorab.com/sv/vaara-investeringar/ ]
4893|_[ + ] Exploit::
4894|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4895|_[ + ] More details:: / - / , ISP:
4896|_[ + ] Found:: UNIDENTIFIED
4897
4898 _[ - ]::--------------------------------------------------------------------------------------------------------------
4899|_[ + ] [ 19 / 100 ]-[18:33:48] [ - ]
4900|_[ + ] Target:: [ https://www.investorab.com/sustainability/diversity-inclusion/ ]
4901|_[ + ] Exploit::
4902|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4903|_[ + ] More details:: / - / , ISP:
4904|_[ + ] Found:: UNIDENTIFIED
4905
4906 _[ - ]::--------------------------------------------------------------------------------------------------------------
4907|_[ + ] [ 20 / 100 ]-[18:33:54] [ - ]
4908|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/skuldinvesterare/ ]
4909|_[ + ] Exploit::
4910|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4911|_[ + ] More details:: / - / , ISP:
4912|_[ + ] Found:: UNIDENTIFIED
4913
4914 _[ - ]::--------------------------------------------------------------------------------------------------------------
4915|_[ + ] [ 21 / 100 ]-[18:34:01] [ - ]
4916|_[ + ] Target:: [ https://www.investorab.com/sustainability/people-and-communities/ ]
4917|_[ + ] Exploit::
4918|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
4919|_[ + ] More details:: / - / , ISP:
4920|_[ + ] Found:: UNIDENTIFIED
4921
4922 _[ - ]::--------------------------------------------------------------------------------------------------------------
4923|_[ + ] [ 22 / 100 ]-[18:34:08] [ - ]
4924|_[ + ] Target:: [ https://www.investorab.com/investors-media/image-gallery/ ]
4925|_[ + ] Exploit::
4926|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4927|_[ + ] More details:: / - / , ISP:
4928|_[ + ] Found:: UNIDENTIFIED
4929
4930 _[ - ]::--------------------------------------------------------------------------------------------------------------
4931|_[ + ] [ 23 / 100 ]-[18:34:15] [ - ]
4932|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/mangfald-inkludering/ ]
4933|_[ + ] Exploit::
4934|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4935|_[ + ] More details:: / - / , ISP:
4936|_[ + ] Found:: UNIDENTIFIED
4937
4938 _[ - ]::--------------------------------------------------------------------------------------------------------------
4939|_[ + ] [ 24 / 100 ]-[18:34:22] [ - ]
4940|_[ + ] Target:: [ https://www.investorab.com/about-investor/business-areas/ ]
4941|_[ + ] Exploit::
4942|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4943|_[ + ] More details:: / - / , ISP:
4944|_[ + ] Found:: UNIDENTIFIED
4945
4946 _[ - ]::--------------------------------------------------------------------------------------------------------------
4947|_[ + ] [ 25 / 100 ]-[18:34:29] [ - ]
4948|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/ ]
4949|_[ + ] Exploit::
4950|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4951|_[ + ] More details:: / - / , ISP:
4952|_[ + ] Found:: UNIDENTIFIED
4953
4954 _[ - ]::--------------------------------------------------------------------------------------------------------------
4955|_[ + ] [ 26 / 100 ]-[18:34:36] [ - ]
4956|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/ ]
4957|_[ + ] Exploit::
4958|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4959|_[ + ] More details:: / - / , ISP:
4960|_[ + ] Found:: UNIDENTIFIED
4961
4962 _[ - ]::--------------------------------------------------------------------------------------------------------------
4963|_[ + ] [ 27 / 100 ]-[18:34:42] [ - ]
4964|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/prenumerationstjanst/ ]
4965|_[ + ] Exploit::
4966|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4967|_[ + ] More details:: / - / , ISP:
4968|_[ + ] Found:: UNIDENTIFIED
4969
4970 _[ - ]::--------------------------------------------------------------------------------------------------------------
4971|_[ + ] [ 28 / 100 ]-[18:34:49] [ - ]
4972|_[ + ] Target:: [ https://www.investorab.com/media/05mieta1/bolagsstyrningsrapport2008.pdf ]
4973|_[ + ] Exploit::
4974|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4975|_[ + ] More details:: / - / , ISP:
4976|_[ + ] Found:: UNIDENTIFIED
4977
4978 _[ - ]::--------------------------------------------------------------------------------------------------------------
4979|_[ + ] [ 29 / 100 ]-[18:34:55] [ - ]
4980|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/bildarkiv/ ]
4981|_[ + ] Exploit::
4982|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4983|_[ + ] More details:: / - / , ISP:
4984|_[ + ] Found:: UNIDENTIFIED
4985
4986 _[ - ]::--------------------------------------------------------------------------------------------------------------
4987|_[ + ] [ 30 / 100 ]-[18:35:02] [ - ]
4988|_[ + ] Target:: [ https://www.investorab.com/sustainability/un-global-goals/ ]
4989|_[ + ] Exploit::
4990|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4991|_[ + ] More details:: / - / , ISP:
4992|_[ + ] Found:: UNIDENTIFIED
4993
4994 _[ - ]::--------------------------------------------------------------------------------------------------------------
4995|_[ + ] [ 31 / 100 ]-[18:35:09] [ - ]
4996|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/klimat-resurseffektivitet/ ]
4997|_[ + ] Exploit::
4998|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
4999|_[ + ] More details:: / - / , ISP:
5000|_[ + ] Found:: UNIDENTIFIED
5001
5002 _[ - ]::--------------------------------------------------------------------------------------------------------------
5003|_[ + ] [ 32 / 100 ]-[18:35:16] [ - ]
5004|_[ + ] Target:: [ https://www.investorab.com/about-investor/board-management/ ]
5005|_[ + ] Exploit::
5006|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5007|_[ + ] More details:: / - / , ISP:
5008|_[ + ] Found:: UNIDENTIFIED
5009
5010 _[ - ]::--------------------------------------------------------------------------------------------------------------
5011|_[ + ] [ 33 / 100 ]-[18:35:23] [ - ]
5012|_[ + ] Target:: [ https://www.investorab.com/sustainability/climate-resource-efficiency/ ]
5013|_[ + ] Exploit::
5014|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5015|_[ + ] More details:: / - / , ISP:
5016|_[ + ] Found:: UNIDENTIFIED
5017
5018 _[ - ]::--------------------------------------------------------------------------------------------------------------
5019|_[ + ] [ 34 / 100 ]-[18:35:28] [ - ]
5020|_[ + ] Target:: [ https://www.investorab.com/sustainability/whistleblowing/reports-2018/ ]
5021|_[ + ] Exploit::
5022|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
5023|_[ + ] More details:: / - / , ISP:
5024|_[ + ] Found:: UNIDENTIFIED
5025
5026 _[ - ]::--------------------------------------------------------------------------------------------------------------
5027|_[ + ] [ 35 / 100 ]-[18:35:33] [ - ]
5028|_[ + ] Target:: [ https://www.investorab.com/our-investments/patricia-industries/ ]
5029|_[ + ] Exploit::
5030|_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:23.100.15.180:443
5031|_[ + ] More details:: / - / , ISP:
5032|_[ + ] Found:: UNIDENTIFIED
5033
5034 _[ - ]::--------------------------------------------------------------------------------------------------------------
5035|_[ + ] [ 36 / 100 ]-[18:35:40] [ - ]
5036|_[ + ] Target:: [ https://www.investorab.com/sustainability/business-ethics-governance/ ]
5037|_[ + ] Exploit::
5038|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5039|_[ + ] More details:: / - / , ISP:
5040|_[ + ] Found:: UNIDENTIFIED
5041
5042 _[ - ]::--------------------------------------------------------------------------------------------------------------
5043|_[ + ] [ 37 / 100 ]-[18:35:47] [ - ]
5044|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/affarsetik-styrning/ ]
5045|_[ + ] Exploit::
5046|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5047|_[ + ] More details:: / - / , ISP:
5048|_[ + ] Found:: UNIDENTIFIED
5049
5050 _[ - ]::--------------------------------------------------------------------------------------------------------------
5051|_[ + ] [ 38 / 100 ]-[18:35:54] [ - ]
5052|_[ + ] Target:: [ https://www.investorab.com/investors-media/subscription-services/ ]
5053|_[ + ] Exploit::
5054|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5055|_[ + ] More details:: / - / , ISP:
5056|_[ + ] Found:: UNIDENTIFIED
5057
5058 _[ - ]::--------------------------------------------------------------------------------------------------------------
5059|_[ + ] [ 39 / 100 ]-[18:36:01] [ - ]
5060|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/ ]
5061|_[ + ] Exploit::
5062|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5063|_[ + ] More details:: / - / , ISP:
5064|_[ + ] Found:: UNIDENTIFIED
5065
5066 _[ - ]::--------------------------------------------------------------------------------------------------------------
5067|_[ + ] [ 40 / 100 ]-[18:36:08] [ - ]
5068|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/analysts/ ]
5069|_[ + ] Exploit::
5070|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5071|_[ + ] More details:: / - / , ISP:
5072|_[ + ] Found:: UNIDENTIFIED
5073
5074 _[ - ]::--------------------------------------------------------------------------------------------------------------
5075|_[ + ] [ 41 / 100 ]-[18:36:14] [ - ]
5076|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/affarsomraden/ ]
5077|_[ + ] Exploit::
5078|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5079|_[ + ] More details:: / - / , ISP:
5080|_[ + ] Found:: UNIDENTIFIED
5081
5082 _[ - ]::--------------------------------------------------------------------------------------------------------------
5083|_[ + ] [ 42 / 100 ]-[18:36:21] [ - ]
5084|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/bolagsstyrningsrapport/ ]
5085|_[ + ] Exploit::
5086|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5087|_[ + ] More details:: / - / , ISP:
5088|_[ + ] Found:: UNIDENTIFIED
5089
5090 _[ - ]::--------------------------------------------------------------------------------------------------------------
5091|_[ + ] [ 43 / 100 ]-[18:36:27] [ - ]
5092|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2019/ ]
5093|_[ + ] Exploit::
5094|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5095|_[ + ] More details:: / - / , ISP:
5096|_[ + ] Found:: UNIDENTIFIED
5097
5098 _[ - ]::--------------------------------------------------------------------------------------------------------------
5099|_[ + ] [ 44 / 100 ]-[18:36:34] [ - ]
5100|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/skuldinvesterare/forfallostruktur/ ]
5101|_[ + ] Exploit::
5102|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5103|_[ + ] More details:: / - / , ISP:
5104|_[ + ] Found:: UNIDENTIFIED
5105
5106 _[ - ]::--------------------------------------------------------------------------------------------------------------
5107|_[ + ] [ 45 / 100 ]-[18:36:40] [ - ]
5108|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/visselblasning/rapporter-2018/ ]
5109|_[ + ] Exploit::
5110|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
5111|_[ + ] More details:: / - / , ISP:
5112|_[ + ] Found:: UNIDENTIFIED
5113
5114 _[ - ]::--------------------------------------------------------------------------------------------------------------
5115|_[ + ] [ 46 / 100 ]-[18:36:46] [ - ]
5116|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2014/ ]
5117|_[ + ] Exploit::
5118|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5119|_[ + ] More details:: / - / , ISP:
5120|_[ + ] Found:: UNIDENTIFIED
5121
5122 _[ - ]::--------------------------------------------------------------------------------------------------------------
5123|_[ + ] [ 47 / 100 ]-[18:36:53] [ - ]
5124|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/bildarkiv/logotyp/ ]
5125|_[ + ] Exploit::
5126|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5127|_[ + ] More details:: / - / , ISP:
5128|_[ + ] Found:: UNIDENTIFIED
5129
5130 _[ - ]::--------------------------------------------------------------------------------------------------------------
5131|_[ + ] [ 48 / 100 ]-[18:37:00] [ - ]
5132|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/styrelse/ ]
5133|_[ + ] Exploit::
5134|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5135|_[ + ] More details:: / - / , ISP:
5136|_[ + ] Found:: UNIDENTIFIED
5137
5138 _[ - ]::--------------------------------------------------------------------------------------------------------------
5139|_[ + ] [ 49 / 100 ]-[18:37:07] [ - ]
5140|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/kontrollfunktioner/ ]
5141|_[ + ] Exploit::
5142|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5143|_[ + ] More details:: / - / , ISP:
5144|_[ + ] Found:: UNIDENTIFIED
5145
5146 _[ - ]::--------------------------------------------------------------------------------------------------------------
5147|_[ + ] [ 50 / 100 ]-[18:37:14] [ - ]
5148|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2013/ ]
5149|_[ + ] Exploit::
5150|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5151|_[ + ] More details:: / - / , ISP:
5152|_[ + ] Found:: UNIDENTIFIED
5153
5154 _[ - ]::--------------------------------------------------------------------------------------------------------------
5155|_[ + ] [ 51 / 100 ]-[18:37:21] [ - ]
5156|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/management/ ]
5157|_[ + ] Exploit::
5158|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5159|_[ + ] More details:: / - / , ISP:
5160|_[ + ] Found:: UNIDENTIFIED
5161
5162 _[ - ]::--------------------------------------------------------------------------------------------------------------
5163|_[ + ] [ 52 / 100 ]-[18:37:28] [ - ]
5164|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/investors-historia/ ]
5165|_[ + ] Exploit::
5166|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5167|_[ + ] More details:: / - / , ISP:
5168|_[ + ] Found:: UNIDENTIFIED
5169
5170 _[ - ]::--------------------------------------------------------------------------------------------------------------
5171|_[ + ] [ 53 / 100 ]-[18:37:34] [ - ]
5172|_[ + ] Target:: [ https://www.investorab.com/investors-media/investor-in-figures/ ]
5173|_[ + ] Exploit::
5174|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5175|_[ + ] More details:: / - / , ISP:
5176|_[ + ] Found:: UNIDENTIFIED
5177
5178 _[ - ]::--------------------------------------------------------------------------------------------------------------
5179|_[ + ] [ 54 / 100 ]-[18:37:41] [ - ]
5180|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/archive/ ]
5181|_[ + ] Exploit::
5182|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5183|_[ + ] More details:: / - / , ISP:
5184|_[ + ] Found:: UNIDENTIFIED
5185
5186 _[ - ]::--------------------------------------------------------------------------------------------------------------
5187|_[ + ] [ 55 / 100 ]-[18:37:48] [ - ]
5188|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2017/ ]
5189|_[ + ] Exploit::
5190|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5191|_[ + ] More details:: / - / , ISP:
5192|_[ + ] Found:: UNIDENTIFIED
5193
5194 _[ - ]::--------------------------------------------------------------------------------------------------------------
5195|_[ + ] [ 56 / 100 ]-[18:37:55] [ - ]
5196|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/valberedning/ ]
5197|_[ + ] Exploit::
5198|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5199|_[ + ] More details:: / - / , ISP:
5200|_[ + ] Found:: UNIDENTIFIED
5201
5202 _[ - ]::--------------------------------------------------------------------------------------------------------------
5203|_[ + ] [ 57 / 100 ]-[18:38:02] [ - ]
5204|_[ + ] Target:: [ https://www.investorab.com/investors-media/shareholders/ownership-structure/ ]
5205|_[ + ] Exploit::
5206|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5207|_[ + ] More details:: / - / , ISP:
5208|_[ + ] Found:: UNIDENTIFIED
5209
5210 _[ - ]::--------------------------------------------------------------------------------------------------------------
5211|_[ + ] [ 58 / 100 ]-[18:38:09] [ - ]
5212|_[ + ] Target:: [ https://www.investorab.com/investors-media/bondholders/maturity-profile/ ]
5213|_[ + ] Exploit::
5214|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5215|_[ + ] More details:: / - / , ISP:
5216|_[ + ] Found:: UNIDENTIFIED
5217
5218 _[ - ]::--------------------------------------------------------------------------------------------------------------
5219|_[ + ] [ 59 / 100 ]-[18:38:14] [ - ]
5220|_[ + ] Target:: [ https://www.investorab.com/our-investments/patricia-industries/permobil/ ]
5221|_[ + ] Exploit::
5222|_[ + ] Information Server:: HTTP/1.1 302 Found, , IP:23.100.15.180:443
5223|_[ + ] More details:: / - / , ISP:
5224|_[ + ] Found:: UNIDENTIFIED
5225
5226 _[ - ]::--------------------------------------------------------------------------------------------------------------
5227|_[ + ] [ 60 / 100 ]-[18:38:21] [ - ]
5228|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2015/ ]
5229|_[ + ] Exploit::
5230|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5231|_[ + ] More details:: / - / , ISP:
5232|_[ + ] Found:: UNIDENTIFIED
5233
5234 _[ - ]::--------------------------------------------------------------------------------------------------------------
5235|_[ + ] [ 61 / 100 ]-[18:38:28] [ - ]
5236|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/pressmeddelanden-nyheter/ ]
5237|_[ + ] Exploit::
5238|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5239|_[ + ] More details:: / - / , ISP:
5240|_[ + ] Found:: UNIDENTIFIED
5241
5242 _[ - ]::--------------------------------------------------------------------------------------------------------------
5243|_[ + ] [ 62 / 100 ]-[18:38:34] [ - ]
5244|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/analytiker/ ]
5245|_[ + ] Exploit::
5246|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5247|_[ + ] More details:: / - / , ISP:
5248|_[ + ] Found:: UNIDENTIFIED
5249
5250 _[ - ]::--------------------------------------------------------------------------------------------------------------
5251|_[ + ] [ 63 / 100 ]-[18:38:42] [ - ]
5252|_[ + ] Target:: [ https://www.investorab.com/investors-media/image-gallery/logotype/ ]
5253|_[ + ] Exploit::
5254|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5255|_[ + ] More details:: / - / , ISP:
5256|_[ + ] Found:: UNIDENTIFIED
5257
5258 _[ - ]::--------------------------------------------------------------------------------------------------------------
5259|_[ + ] [ 64 / 100 ]-[18:38:48] [ - ]
5260|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/ledningsgrupp/ ]
5261|_[ + ] Exploit::
5262|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5263|_[ + ] More details:: / - / , ISP:
5264|_[ + ] Found:: UNIDENTIFIED
5265
5266 _[ - ]::--------------------------------------------------------------------------------------------------------------
5267|_[ + ] [ 65 / 100 ]-[18:38:55] [ - ]
5268|_[ + ] Target:: [ https://www.investorab.com/investors-media/press-releases-news/ ]
5269|_[ + ] Exploit::
5270|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5271|_[ + ] More details:: / - / , ISP:
5272|_[ + ] Found:: UNIDENTIFIED
5273
5274 _[ - ]::--------------------------------------------------------------------------------------------------------------
5275|_[ + ] [ 66 / 100 ]-[18:39:02] [ - ]
5276|_[ + ] Target:: [ https://www.investorab.com/about-investor/our-business-model/ ]
5277|_[ + ] Exploit::
5278|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5279|_[ + ] More details:: / - / , ISP:
5280|_[ + ] Found:: UNIDENTIFIED
5281
5282 _[ - ]::--------------------------------------------------------------------------------------------------------------
5283|_[ + ] [ 67 / 100 ]-[18:39:08] [ - ]
5284|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2018/ ]
5285|_[ + ] Exploit::
5286|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5287|_[ + ] More details:: / - / , ISP:
5288|_[ + ] Found:: UNIDENTIFIED
5289
5290 _[ - ]::--------------------------------------------------------------------------------------------------------------
5291|_[ + ] [ 68 / 100 ]-[18:39:15] [ - ]
5292|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2016/ ]
5293|_[ + ] Exploit::
5294|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5295|_[ + ] More details:: / - / , ISP:
5296|_[ + ] Found:: UNIDENTIFIED
5297
5298 _[ - ]::--------------------------------------------------------------------------------------------------------------
5299|_[ + ] [ 69 / 100 ]-[18:39:22] [ - ]
5300|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/auditors/ ]
5301|_[ + ] Exploit::
5302|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5303|_[ + ] More details:: / - / , ISP:
5304|_[ + ] Found:: UNIDENTIFIED
5305
5306 _[ - ]::--------------------------------------------------------------------------------------------------------------
5307|_[ + ] [ 70 / 100 ]-[18:39:29] [ - ]
5308|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/revisorer/ ]
5309|_[ + ] Exploit::
5310|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5311|_[ + ] More details:: / - / , ISP:
5312|_[ + ] Found:: UNIDENTIFIED
5313
5314 _[ - ]::--------------------------------------------------------------------------------------------------------------
5315|_[ + ] [ 71 / 100 ]-[18:39:36] [ - ]
5316|_[ + ] Target:: [ https://www.investorab.com/about-investor/employees-your-career/ ]
5317|_[ + ] Exploit::
5318|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5319|_[ + ] More details:: / - / , ISP:
5320|_[ + ] Found:: UNIDENTIFIED
5321
5322 _[ - ]::--------------------------------------------------------------------------------------------------------------
5323|_[ + ] [ 72 / 100 ]-[18:39:43] [ - ]
5324|_[ + ] Target:: [ https://www.investorab.com/about-investor/investor-s-history/ ]
5325|_[ + ] Exploit::
5326|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5327|_[ + ] More details:: / - / , ISP:
5328|_[ + ] Found:: UNIDENTIFIED
5329
5330 _[ - ]::--------------------------------------------------------------------------------------------------------------
5331|_[ + ] [ 73 / 100 ]-[18:39:49] [ - ]
5332|_[ + ] Target:: [ https://www.investorab.com/about-investor/objectives-and-outcome/ ]
5333|_[ + ] Exploit::
5334|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
5335|_[ + ] More details:: / - / , ISP:
5336|_[ + ] Found:: UNIDENTIFIED
5337
5338 _[ - ]::--------------------------------------------------------------------------------------------------------------
5339|_[ + ] [ 74 / 100 ]-[18:39:56] [ - ]
5340|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/styrelse-ledningsgrupp/ ]
5341|_[ + ] Exploit::
5342|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5343|_[ + ] More details:: / - / , ISP:
5344|_[ + ] Found:: UNIDENTIFIED
5345
5346 _[ - ]::--------------------------------------------------------------------------------------------------------------
5347|_[ + ] [ 75 / 100 ]-[18:40:02] [ - ]
5348|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/fn-s-hallbarhetsmal/ ]
5349|_[ + ] Exploit::
5350|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5351|_[ + ] More details:: / - / , ISP:
5352|_[ + ] Found:: UNIDENTIFIED
5353
5354 _[ - ]::--------------------------------------------------------------------------------------------------------------
5355|_[ + ] [ 76 / 100 ]-[18:40:09] [ - ]
5356|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/bolagsstyrning/arsstamma/ ]
5357|_[ + ] Exploit::
5358|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5359|_[ + ] More details:: / - / , ISP:
5360|_[ + ] Found:: UNIDENTIFIED
5361
5362 _[ - ]::--------------------------------------------------------------------------------------------------------------
5363|_[ + ] [ 77 / 100 ]-[18:40:16] [ - ]
5364|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/agarstruktur/ ]
5365|_[ + ] Exploit::
5366|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5367|_[ + ] More details:: / - / , ISP:
5368|_[ + ] Found:: UNIDENTIFIED
5369
5370 _[ - ]::--------------------------------------------------------------------------------------------------------------
5371|_[ + ] [ 78 / 100 ]-[18:40:23] [ - ]
5372|_[ + ] Target:: [ https://www.investorab.com/investors-media/reports-presentations/2012/ ]
5373|_[ + ] Exploit::
5374|_[ + ] Information Server:: , , IP:23.100.15.180:443
5375|_[ + ] More details:: / - / , ISP:
5376|_[ + ] Found:: UNIDENTIFIED
5377
5378 _[ - ]::--------------------------------------------------------------------------------------------------------------
5379|_[ + ] [ 79 / 100 ]-[18:40:30] [ - ]
5380|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/affarsetik-styrning/antikorruption/ ]
5381|_[ + ] Exploit::
5382|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5383|_[ + ] More details:: / - / , ISP:
5384|_[ + ] Found:: UNIDENTIFIED
5385
5386 _[ - ]::--------------------------------------------------------------------------------------------------------------
5387|_[ + ] [ 80 / 100 ]-[18:40:35] [ - ]
5388|_[ + ] Target:: [ https://www.investorab.com/sv/hallbarhet/manniskor-och-samhallen/ ]
5389|_[ + ] Exploit::
5390|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Microsoft-IIS/8.5 , IP:23.100.15.180:443
5391|_[ + ] More details:: / - / , ISP:
5392|_[ + ] Found:: UNIDENTIFIED
5393
5394 _[ - ]::--------------------------------------------------------------------------------------------------------------
5395|_[ + ] [ 81 / 100 ]-[18:40:42] [ - ]
5396|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/var-affarsmodell/ ]
5397|_[ + ] Exploit::
5398|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5399|_[ + ] More details:: / - / , ISP:
5400|_[ + ] Found:: UNIDENTIFIED
5401
5402 _[ - ]::--------------------------------------------------------------------------------------------------------------
5403|_[ + ] [ 82 / 100 ]-[18:40:49] [ - ]
5404|_[ + ] Target:: [ https://www.investorab.com/about-investor/targets-and-outcome/ ]
5405|_[ + ] Exploit::
5406|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5407|_[ + ] More details:: / - / , ISP:
5408|_[ + ] Found:: UNIDENTIFIED
5409
5410 _[ - ]::--------------------------------------------------------------------------------------------------------------
5411|_[ + ] [ 83 / 100 ]-[18:40:56] [ - ]
5412|_[ + ] Target:: [ https://www.investorab.com/contact/magnus-dalhammar/ ]
5413|_[ + ] Exploit::
5414|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5415|_[ + ] More details:: / - / , ISP:
5416|_[ + ] Found:: UNIDENTIFIED
5417
5418 _[ - ]::--------------------------------------------------------------------------------------------------------------
5419|_[ + ] [ 84 / 100 ]-[18:41:03] [ - ]
5420|_[ + ] Target:: [ https://www.investorab.com/contact/jessica-haggstrom/ ]
5421|_[ + ] Exploit::
5422|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5423|_[ + ] More details:: / - / , ISP:
5424|_[ + ] Found:: UNIDENTIFIED
5425
5426 _[ - ]::--------------------------------------------------------------------------------------------------------------
5427|_[ + ] [ 85 / 100 ]-[18:41:09] [ - ]
5428|_[ + ] Target:: [ https://www.investorab.com/contact/sofia-jonsson/ ]
5429|_[ + ] Exploit::
5430|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5431|_[ + ] More details:: / - / , ISP:
5432|_[ + ] Found:: UNIDENTIFIED
5433
5434 _[ - ]::--------------------------------------------------------------------------------------------------------------
5435|_[ + ] [ 86 / 100 ]-[18:41:16] [ - ]
5436|_[ + ] Target:: [ https://www.investorab.com/about-investor/business-areas/patricia-industries/ ]
5437|_[ + ] Exploit::
5438|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5439|_[ + ] More details:: / - / , ISP:
5440|_[ + ] Found:: UNIDENTIFIED
5441
5442 _[ - ]::--------------------------------------------------------------------------------------------------------------
5443|_[ + ] [ 87 / 100 ]-[18:41:23] [ - ]
5444|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2013/ ]
5445|_[ + ] Exploit::
5446|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5447|_[ + ] More details:: / - / , ISP:
5448|_[ + ] Found:: UNIDENTIFIED
5449
5450 _[ - ]::--------------------------------------------------------------------------------------------------------------
5451|_[ + ] [ 88 / 100 ]-[18:41:30] [ - ]
5452|_[ + ] Target:: [ https://www.investorab.com/investors-media/investor-in-figures/definitions/ ]
5453|_[ + ] Exploit::
5454|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5455|_[ + ] More details:: / - / , ISP:
5456|_[ + ] Found:: UNIDENTIFIED
5457
5458 _[ - ]::--------------------------------------------------------------------------------------------------------------
5459|_[ + ] [ 89 / 100 ]-[18:41:36] [ - ]
5460|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/aktieagare/historiska-aktiefakta/ ]
5461|_[ + ] Exploit::
5462|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5463|_[ + ] More details:: / - / , ISP:
5464|_[ + ] Found:: UNIDENTIFIED
5465
5466 _[ - ]::--------------------------------------------------------------------------------------------------------------
5467|_[ + ] [ 90 / 100 ]-[18:41:43] [ - ]
5468|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2012/ ]
5469|_[ + ] Exploit::
5470|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5471|_[ + ] More details:: / - / , ISP:
5472|_[ + ] Found:: UNIDENTIFIED
5473
5474 _[ - ]::--------------------------------------------------------------------------------------------------------------
5475|_[ + ] [ 91 / 100 ]-[18:41:50] [ - ]
5476|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2017/ ]
5477|_[ + ] Exploit::
5478|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5479|_[ + ] More details:: / - / , ISP:
5480|_[ + ] Found:: UNIDENTIFIED
5481
5482 _[ - ]::--------------------------------------------------------------------------------------------------------------
5483|_[ + ] [ 92 / 100 ]-[18:41:57] [ - ]
5484|_[ + ] Target:: [ https://www.investorab.com/about-investor/corporate-governance/nomination-committee/ ]
5485|_[ + ] Exploit::
5486|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5487|_[ + ] More details:: / - / , ISP:
5488|_[ + ] Found:: UNIDENTIFIED
5489
5490 _[ - ]::--------------------------------------------------------------------------------------------------------------
5491|_[ + ] [ 93 / 100 ]-[18:42:03] [ - ]
5492|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/investors-historia/2005/ ]
5493|_[ + ] Exploit::
5494|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5495|_[ + ] More details:: / - / , ISP:
5496|_[ + ] Found:: UNIDENTIFIED
5497
5498 _[ - ]::--------------------------------------------------------------------------------------------------------------
5499|_[ + ] [ 94 / 100 ]-[18:42:10] [ - ]
5500|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/affarsomraden/patricia-industries/ ]
5501|_[ + ] Exploit::
5502|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5503|_[ + ] More details:: / - / , ISP:
5504|_[ + ] Found:: UNIDENTIFIED
5505
5506 _[ - ]::--------------------------------------------------------------------------------------------------------------
5507|_[ + ] [ 95 / 100 ]-[18:42:17] [ - ]
5508|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2016/ ]
5509|_[ + ] Exploit::
5510|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5511|_[ + ] More details:: / - / , ISP:
5512|_[ + ] Found:: UNIDENTIFIED
5513
5514 _[ - ]::--------------------------------------------------------------------------------------------------------------
5515|_[ + ] [ 96 / 100 ]-[18:42:24] [ - ]
5516|_[ + ] Target:: [ https://www.investorab.com/sv/om-investor/medarbetare-din-karriar/ ]
5517|_[ + ] Exploit::
5518|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5519|_[ + ] More details:: / - / , ISP:
5520|_[ + ] Found:: UNIDENTIFIED
5521
5522 _[ - ]::--------------------------------------------------------------------------------------------------------------
5523|_[ + ] [ 97 / 100 ]-[18:42:31] [ - ]
5524|_[ + ] Target:: [ https://www.investorab.com/about-investor/how-we-do-it/ ]
5525|_[ + ] Exploit::
5526|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5527|_[ + ] More details:: / - / , ISP:
5528|_[ + ] Found:: UNIDENTIFIED
5529
5530 _[ - ]::--------------------------------------------------------------------------------------------------------------
5531|_[ + ] [ 98 / 100 ]-[18:42:37] [ - ]
5532|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/rapporter-presentationer/2018/ ]
5533|_[ + ] Exploit::
5534|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5535|_[ + ] More details:: / - / , ISP:
5536|_[ + ] Found:: UNIDENTIFIED
5537
5538 _[ - ]::--------------------------------------------------------------------------------------------------------------
5539|_[ + ] [ 99 / 100 ]-[18:42:44] [ - ]
5540|_[ + ] Target:: [ https://www.investorab.com/sv/investerare-media/investor-i-siffror/ ]
5541|_[ + ] Exploit::
5542|_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:23.100.15.180:443
5543|_[ + ] More details:: / - / , ISP:
5544|_[ + ] Found:: UNIDENTIFIED
5545
5546[ INFO ] [ Shutting down ]
5547[ INFO ] [ End of process INURLBR at [30-03-2020 18:42:44]
5548[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
5549[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.investorab.com/output/inurlbr-www.investorab.com ]
5550|_________________________________________________________________________________________
5551
5552\_________________________________________________________________________________________/
5553################################################################################################################################
5554Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:46 EDT
5555Nmap scan report for 23.100.15.180
5556Host is up (0.55s latency).
5557Not shown: 474 filtered ports
5558Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5559PORT STATE SERVICE VERSION
556080/tcp open http Microsoft IIS httpd 8.5
5561|_http-server-header: Microsoft-IIS/8.5
5562|_http-title: WAP Websites - Site Error
5563443/tcp open ssl/http Microsoft IIS httpd 8.5
5564| ssl-cert: Subject: commonName=umbraco.io/organizationName=Umbraco A/S/stateOrProvinceName=Hovedstaden/countryName=DK
5565| Subject Alternative Name: DNS:umbraco.io, DNS:*.s1.umbraco.io, DNS:*.scm.s1.umbraco.io, DNS:*.scm.umbraco.io, DNS:*.umbraco.io
5566| Not valid before: 2020-01-31T00:00:00
5567|_Not valid after: 2022-03-31T23:59:59
5568Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5569OS fingerprint not ideal because: Timing level 5 (Insane) used
5570No OS matches for host
5571Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5572
5573TRACEROUTE (using port 80/tcp)
5574HOP RTT ADDRESS
55751 255.24 ms 10.202.1.1
55762 255.25 ms 190.105.229.1
55773 255.26 ms 181.119.68.33
55784 255.26 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
55795 449.98 ms static.ifxnw.cl (216.241.0.2)
55806 ...
55817 450.01 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
55828 591.09 ms be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111)
55839 591.13 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
558410 591.17 ms be-4-0.ibr01.atl30.ntwk.msn.net (104.44.28.63)
558511 565.47 ms be-2-0.ibr01.atl31.ntwk.msn.net (104.44.7.144)
558612 755.76 ms be-3-0.ibr03.bn6.ntwk.msn.net (104.44.7.146)
558713 755.75 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
558814 755.72 ms be-7-0.ibr01.ewr30.ntwk.msn.net (104.44.16.19)
558915 564.31 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153)
559016 564.28 ms be-7-0.ibr01.dub08.ntwk.msn.net (104.44.16.117)
559117 613.74 ms be-7-0.ibr01.ams30.ntwk.msn.net (104.44.17.57)
559218 613.73 ms ae102-0.icr02.ams30.ntwk.msn.net (104.44.22.216)
559319 ... 30
5594################################################################################################################################
5595Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:50 EDT
5596Nmap scan report for 23.100.15.180
5597Host is up.
5598Not shown: 14 filtered ports
5599Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5600PORT STATE SERVICE VERSION
560153/udp open|filtered domain
560267/udp open|filtered dhcps
560368/udp open|filtered dhcpc
560469/udp open|filtered tftp
560588/udp open|filtered kerberos-sec
5606123/udp open|filtered ntp
5607137/udp open|filtered netbios-ns
5608138/udp open|filtered netbios-dgm
5609139/udp open|filtered netbios-ssn
5610161/udp open|filtered snmp
5611162/udp open|filtered snmptrap
5612389/udp open|filtered ldap
5613520/udp open|filtered route
56142049/udp open|filtered nfs
5615Too many fingerprints match this host to give specific OS details
5616
5617TRACEROUTE (using proto 1/icmp)
5618HOP RTT ADDRESS
56191 428.50 ms 10.202.1.1
56202 428.54 ms 190.105.229.1
56213 428.57 ms 181.119.68.33
56224 428.55 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
56235 428.52 ms static.ifxnw.cl (216.241.0.2)
56246 ...
56257 428.63 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
56268 428.74 ms be-28-0.ibr02.scl01.ntwk.msn.net (104.44.22.55)
56279 428.74 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
562810 490.59 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
562911 466.59 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232)
563012 538.86 ms be-2-0.ibr04.bl20.ntwk.msn.net (104.44.19.153)
563113 539.00 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
563214 466.57 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
563315 466.51 ms be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155)
563416 466.57 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
563517 539.03 ms be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215)
563618 539.00 ms ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244)
563719 ... 30
5638################################################################################################################################
5639Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:55 EDT
5640Nmap scan report for 23.100.15.180
5641Host is up.
5642
5643PORT STATE SERVICE VERSION
564467/tcp filtered dhcps
564567/udp open|filtered dhcps
5646|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
5647Too many fingerprints match this host to give specific OS details
5648
5649TRACEROUTE (using proto 1/icmp)
5650HOP RTT ADDRESS
56511 388.72 ms 10.202.1.1
56522 388.74 ms 190.105.229.1
56533 388.76 ms 181.119.68.33
56544 388.79 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
56555 388.85 ms static.ifxnw.cl (216.241.0.2)
56566 ...
56577 388.88 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
56588 578.28 ms be-28-0.ibr02.scl01.ntwk.msn.net (104.44.22.55)
56599 578.28 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
566010 578.31 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
566111 509.88 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232)
566212 509.88 ms be-2-0.ibr04.bl20.ntwk.msn.net (104.44.19.153)
566313 509.89 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
566414 509.83 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
566515 509.77 ms be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155)
566616 509.82 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
566717 591.97 ms be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215)
566818 591.92 ms ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244)
566919 ... 30
5670################################################################################################################################
5671Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:57 EDT
5672Nmap scan report for 23.100.15.180
5673Host is up.
5674
5675PORT STATE SERVICE VERSION
567668/tcp filtered dhcpc
567768/udp open|filtered dhcpc
5678Too many fingerprints match this host to give specific OS details
5679
5680TRACEROUTE (using proto 1/icmp)
5681HOP RTT ADDRESS
56821 372.65 ms 10.202.1.1
56832 372.67 ms 190.105.229.1
56843 372.68 ms 181.119.68.33
56854 372.69 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
56865 568.55 ms static.ifxnw.cl (216.241.0.2)
56876 ...
56887 568.58 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
56898 757.50 ms be-28-0.ibr02.scl01.ntwk.msn.net (104.44.22.55)
56909 757.49 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
569110 757.53 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
569211 762.63 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232)
569312 762.62 ms be-2-0.ibr04.bl20.ntwk.msn.net (104.44.19.153)
569413 762.61 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
569514 762.60 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
569615 750.21 ms be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155)
569716 750.20 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
569817 747.31 ms be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215)
569918 747.28 ms ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244)
570019 ... 30
5701################################################################################################################################
5702Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:59 EDT
5703Nmap scan report for 23.100.15.180
5704Host is up.
5705
5706PORT STATE SERVICE VERSION
570769/tcp filtered tftp
570869/udp open|filtered tftp
5709Too many fingerprints match this host to give specific OS details
5710
5711TRACEROUTE (using proto 1/icmp)
5712HOP RTT ADDRESS
57131 274.87 ms 10.202.1.1
57142 274.90 ms 190.105.229.1
57153 274.93 ms 181.119.68.33
57164 274.96 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
57175 464.83 ms static.ifxnw.cl (216.241.0.2)
57186 ...
57197 464.88 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
57208 524.58 ms be-28-0.ibr02.scl01.ntwk.msn.net (104.44.22.55)
57219 524.55 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
572210 524.64 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
572311 497.36 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232)
572412 497.34 ms be-2-0.ibr04.bl20.ntwk.msn.net (104.44.19.153)
572513 560.41 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
572614 497.30 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
572715 521.61 ms be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155)
572816 521.58 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
572917 458.34 ms be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215)
573018 458.30 ms ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244)
573119 ... 30
5732################################################################################################################################
5733
5734wig - WebApp Information Gatherer
5735
5736
5737Scanning http://23.100.15.180...
5738______________________ SITE INFO _______________________
5739IP Title
574023.100.15.180 WAP Websites - Site Error
5741
5742_______________________ VERSION ________________________
5743Name Versions Type
5744IIS 8.5 Platform
5745Microsoft Windows Server 2012 R2 OS
5746
5747________________________________________________________
5748Time: 79.7 sec Urls: 599 Finger
5749################################################################################################################################
5750HTTP/1.1 404 Site Not Found
5751Content-Length: 4545
5752Content-Type: text/html
5753Server: Microsoft-IIS/8.5
5754Date: Mon, 30 Mar 2020 22:03:40 GMT
5755
5756HTTP/1.1 404 Site Not Found
5757Content-Length: 4545
5758Content-Type: text/html
5759Server: Microsoft-IIS/8.5
5760Date: Mon, 30 Mar 2020 22:03:40 GMT
5761################################################################################################################################
5762Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 18:03 EDT
5763Nmap scan report for 23.100.15.180
5764Host is up.
5765
5766PORT STATE SERVICE VERSION
5767123/tcp filtered ntp
5768123/udp open|filtered ntp
5769Too many fingerprints match this host to give specific OS details
5770
5771TRACEROUTE (using proto 1/icmp)
5772HOP RTT ADDRESS
57731 383.28 ms 10.202.1.1
57742 383.32 ms 190.105.229.1
57753 383.34 ms 181.119.68.33
57764 383.35 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
57775 383.39 ms static.ifxnw.cl (216.241.0.2)
57786 ...
57797 383.42 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
57808 448.39 ms be-28-0.ibr02.scl01.ntwk.msn.net (104.44.22.55)
57819 448.41 ms be-2-0.ibr02.mia.ntwk.msn.net (104.44.28.131)
578210 448.44 ms be-5-0.ibr02.atl30.ntwk.msn.net (104.44.28.105)
578311 629.14 ms be-6-0.ibr02.bn6.ntwk.msn.net (104.44.17.232)
578412 629.29 ms be-2-0.ibr04.bl20.ntwk.msn.net (104.44.19.153)
578513 758.21 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
578614 629.14 ms be-7-0.ibr02.ewr30.ntwk.msn.net (104.44.16.17)
578715 629.07 ms be-4-0.ibr02.sxl71.ntwk.msn.net (104.44.17.155)
578816 629.11 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
578917 687.47 ms be-9-0.ibr02.ams21.ntwk.msn.net (104.44.19.215)
579018 687.38 ms ae122-0.icr02.ams21.ntwk.msn.net (104.44.22.244)
579119 ... 30
5792################################################################################################################################
5793Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 18:26 EDT
5794Nmap scan report for 23.100.15.180
5795Host is up.
5796
5797PORT STATE SERVICE VERSION
579853/tcp filtered domain
579967/tcp filtered dhcps
580068/tcp filtered dhcpc
580169/tcp filtered tftp
580288/tcp filtered kerberos-sec
5803123/tcp filtered ntp
5804137/tcp filtered netbios-ns
5805138/tcp filtered netbios-dgm
5806139/tcp filtered netbios-ssn
5807161/tcp filtered snmp
5808162/tcp filtered snmptrap
5809389/tcp filtered ldap
5810520/tcp filtered efs
58112049/tcp filtered nfs
581253/udp open|filtered domain
581367/udp open|filtered dhcps
581468/udp open|filtered dhcpc
581569/udp open|filtered tftp
581688/udp open|filtered kerberos-sec
5817123/udp open|filtered ntp
5818137/udp open|filtered netbios-ns
5819138/udp open|filtered netbios-dgm
5820139/udp open|filtered netbios-ssn
5821161/udp open|filtered snmp
5822162/udp open|filtered snmptrap
5823389/udp open|filtered ldap
5824520/udp open|filtered route
58252049/udp open|filtered nfs
5826Too many fingerprints match this host to give specific OS details
5827
5828TRACEROUTE (using proto 1/icmp)
5829HOP RTT ADDRESS
58301 503.25 ms 10.202.1.1
58312 503.33 ms 190.105.229.1
58323 503.30 ms 181.119.68.33
58334 503.33 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
58345 503.36 ms static.ifxnw.cl (216.241.0.2)
58356 ...
58367 503.39 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
58378 694.33 ms be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111)
58389 694.39 ms be-2-0.ibr01.mia.ntwk.msn.net (104.44.17.178)
583910 694.42 ms be-4-0.ibr01.atl30.ntwk.msn.net (104.44.28.63)
584011 ...
584112 805.42 ms be-2-0.ibr03.bl20.ntwk.msn.net (104.44.19.5)
584213 805.42 ms be-8-0.ibr01.nyc30.ntwk.msn.net (104.44.19.195)
584314 615.50 ms be-5-0.ibr01.ewr30.ntwk.msn.net (104.44.7.103)
584415 805.40 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153)
584516 805.34 ms be-7-0.ibr01.dub08.ntwk.msn.net (104.44.16.117)
584617 802.57 ms be-8-0.ibr01.ams21.ntwk.msn.net (104.44.19.213)
584718 802.51 ms ae102-0.icr02.ams21.ntwk.msn.net (104.44.22.236)
584819 ... 30
5849################################################################################################################################
5850Hosts
5851=====
5852
5853address mac name os_name os_flavor os_sp purpose info comments
5854------- --- ---- ------- --------- ----- ------- ---- --------
585523.100.15.180 Unknown device
585652.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com embedded device
585791.211.89.189 embedded device
585893.174.93.84 Linux 3.X server
585994.140.114.104 Linux 3.X server
5860201.148.104.59 hcenter10459.dedicados.cl Unknown device
5861################################################################################################################################
5862Services
5863========
5864
5865host port proto name state info
5866---- ---- ----- ---- ----- ----
586723.100.15.180 53 tcp domain filtered
586823.100.15.180 53 udp domain unknown
586923.100.15.180 67 tcp dhcps filtered
587023.100.15.180 67 udp dhcps unknown
587123.100.15.180 68 tcp dhcpc filtered
587223.100.15.180 68 udp dhcpc unknown
587323.100.15.180 69 tcp tftp filtered
587423.100.15.180 69 udp tftp unknown
587523.100.15.180 88 tcp kerberos-sec filtered
587623.100.15.180 88 udp kerberos-sec unknown
587723.100.15.180 123 tcp ntp filtered
587823.100.15.180 123 udp ntp unknown
587923.100.15.180 137 tcp netbios-ns filtered
588023.100.15.180 137 udp netbios-ns unknown
588123.100.15.180 138 tcp netbios-dgm filtered
588223.100.15.180 138 udp netbios-dgm unknown
588323.100.15.180 139 tcp netbios-ssn filtered
588423.100.15.180 139 udp netbios-ssn unknown
588523.100.15.180 161 tcp snmp filtered
588623.100.15.180 161 udp snmp unknown
588723.100.15.180 162 tcp snmptrap filtered
588823.100.15.180 162 udp snmptrap unknown
588923.100.15.180 389 tcp ldap filtered
589023.100.15.180 389 udp ldap unknown
589123.100.15.180 520 tcp efs filtered
589223.100.15.180 520 udp route unknown
589323.100.15.180 2049 tcp nfs filtered
589423.100.15.180 2049 udp nfs unknown
589552.52.234.222 53 tcp domain filtered
589652.52.234.222 53 udp domain unknown
589752.52.234.222 67 tcp dhcps filtered
589852.52.234.222 67 udp dhcps unknown
589952.52.234.222 68 tcp dhcpc filtered
590052.52.234.222 68 udp dhcpc unknown
590152.52.234.222 69 tcp tftp filtered
590252.52.234.222 69 udp tftp unknown
590352.52.234.222 80 tcp http open Apache httpd 2.2.34
590452.52.234.222 88 tcp kerberos-sec filtered
590552.52.234.222 88 udp kerberos-sec unknown
590652.52.234.222 123 tcp ntp filtered
590752.52.234.222 123 udp ntp unknown
590852.52.234.222 137 tcp netbios-ns filtered
590952.52.234.222 137 udp netbios-ns unknown
591052.52.234.222 138 tcp netbios-dgm filtered
591152.52.234.222 138 udp netbios-dgm unknown
591252.52.234.222 139 tcp netbios-ssn filtered
591352.52.234.222 139 udp netbios-ssn unknown
591452.52.234.222 161 tcp snmp filtered
591552.52.234.222 161 udp snmp unknown
591652.52.234.222 162 tcp snmptrap filtered
591752.52.234.222 162 udp snmptrap unknown
591852.52.234.222 389 tcp ldap filtered
591952.52.234.222 389 udp ldap unknown
592052.52.234.222 443 tcp ssl/http open Apache Tomcat/Coyote JSP engine 1.1
592152.52.234.222 520 tcp efs filtered
592252.52.234.222 520 udp route unknown
592352.52.234.222 2049 tcp nfs filtered
592452.52.234.222 2049 udp nfs unknown
592591.211.89.189 53 tcp domain closed
592691.211.89.189 53 udp domain closed
592791.211.89.189 67 tcp dhcps filtered
592891.211.89.189 67 udp dhcps closed
592991.211.89.189 68 tcp dhcpc closed
593091.211.89.189 68 udp dhcpc unknown
593191.211.89.189 69 tcp tftp closed
593291.211.89.189 69 udp tftp closed
593391.211.89.189 88 tcp kerberos-sec filtered
593491.211.89.189 88 udp kerberos-sec closed
593591.211.89.189 123 tcp ntp closed
593691.211.89.189 123 udp ntp closed
593791.211.89.189 137 tcp netbios-ns closed
593891.211.89.189 137 udp netbios-ns closed
593991.211.89.189 138 tcp netbios-dgm closed
594091.211.89.189 138 udp netbios-dgm unknown
594191.211.89.189 139 tcp netbios-ssn filtered
594291.211.89.189 139 udp netbios-ssn unknown
594391.211.89.189 161 tcp snmp filtered
594491.211.89.189 161 udp snmp unknown
594591.211.89.189 162 tcp snmptrap closed
594691.211.89.189 162 udp snmptrap closed
594791.211.89.189 389 tcp ldap closed
594891.211.89.189 389 udp ldap closed
594991.211.89.189 520 tcp efs filtered
595091.211.89.189 520 udp route unknown
595191.211.89.189 2049 tcp nfs closed
595291.211.89.189 2049 udp nfs closed
595393.174.93.84 53 tcp domain filtered
595493.174.93.84 53 udp domain unknown
595593.174.93.84 67 tcp dhcps filtered
595693.174.93.84 67 udp dhcps unknown
595793.174.93.84 68 tcp dhcpc filtered
595893.174.93.84 68 udp dhcpc unknown
595993.174.93.84 69 tcp tftp filtered
596093.174.93.84 69 udp tftp unknown
596193.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
596293.174.93.84 88 tcp kerberos-sec filtered
596393.174.93.84 88 udp kerberos-sec unknown
596493.174.93.84 123 tcp ntp filtered
596593.174.93.84 123 udp ntp filtered
596693.174.93.84 137 tcp netbios-ns filtered
596793.174.93.84 137 udp netbios-ns unknown
596893.174.93.84 138 tcp netbios-dgm filtered
596993.174.93.84 138 udp netbios-dgm filtered
597093.174.93.84 139 tcp netbios-ssn filtered
597193.174.93.84 139 udp netbios-ssn filtered
597293.174.93.84 161 tcp snmp filtered
597393.174.93.84 161 udp snmp unknown
597493.174.93.84 162 tcp snmptrap filtered
597593.174.93.84 162 udp snmptrap filtered
597693.174.93.84 389 tcp ldap filtered
597793.174.93.84 389 udp ldap unknown
597893.174.93.84 520 tcp efs filtered
597993.174.93.84 520 udp route unknown
598093.174.93.84 2049 tcp nfs filtered
598193.174.93.84 2049 udp nfs unknown
598293.174.93.84 3030 tcp http-proxy open tinyproxy 1.8.3
598394.140.114.104 22 tcp ssh open OpenSSH 7.4 protocol 2.0
598494.140.114.104 53 tcp domain closed
598594.140.114.104 53 udp domain closed
598694.140.114.104 67 tcp dhcps closed
598794.140.114.104 67 udp dhcps unknown
598894.140.114.104 68 tcp dhcpc closed
598994.140.114.104 68 udp dhcpc unknown
599094.140.114.104 69 tcp tftp closed
599194.140.114.104 69 udp tftp closed
599294.140.114.104 80 tcp http open nginx 1.16.1
599394.140.114.104 88 tcp kerberos-sec closed
599494.140.114.104 88 udp kerberos-sec closed
599594.140.114.104 111 tcp rpcbind open 2-4 RPC #100000
599694.140.114.104 123 tcp ntp closed
599794.140.114.104 123 udp ntp unknown
599894.140.114.104 135 tcp msrpc filtered
599994.140.114.104 137 tcp netbios-ns filtered
600094.140.114.104 137 udp netbios-ns unknown
600194.140.114.104 138 tcp netbios-dgm filtered
600294.140.114.104 138 udp netbios-dgm unknown
600394.140.114.104 139 tcp netbios-ssn closed
600494.140.114.104 139 udp netbios-ssn closed
600594.140.114.104 161 tcp snmp closed
600694.140.114.104 161 udp snmp closed
600794.140.114.104 162 tcp snmptrap closed
600894.140.114.104 162 udp snmptrap unknown
600994.140.114.104 389 tcp ldap closed
601094.140.114.104 389 udp ldap unknown
601194.140.114.104 520 tcp efs closed
601294.140.114.104 520 udp route closed
601394.140.114.104 2049 tcp nfs closed
601494.140.114.104 2049 udp nfs unknown
6015201.148.104.59 21 tcp ftp open The firewall on this server is blocking your connection. You need to contact the server owner or hosting provider for further information. Your blocked IP address is: 190.105.229.22 This server's hostname is: hcenter10459.dedicados.cl \x0d\x0a
6016201.148.104.59 53 tcp domain filtered
6017201.148.104.59 53 udp domain unknown
6018201.148.104.59 67 tcp dhcps filtered
6019201.148.104.59 67 udp dhcps unknown
6020201.148.104.59 68 tcp dhcpc filtered
6021201.148.104.59 68 udp dhcpc unknown
6022201.148.104.59 69 tcp tftp filtered
6023201.148.104.59 69 udp tftp unknown
6024201.148.104.59 88 tcp kerberos-sec filtered
6025201.148.104.59 88 udp kerberos-sec unknown
6026201.148.104.59 123 tcp ntp filtered
6027201.148.104.59 123 udp ntp unknown
6028201.148.104.59 137 tcp netbios-ns filtered
6029201.148.104.59 137 udp netbios-ns unknown
6030201.148.104.59 138 tcp netbios-dgm filtered
6031201.148.104.59 138 udp netbios-dgm unknown
6032201.148.104.59 139 tcp netbios-ssn filtered
6033201.148.104.59 139 udp netbios-ssn unknown
6034201.148.104.59 161 tcp snmp filtered
6035201.148.104.59 161 udp snmp unknown
6036201.148.104.59 162 tcp snmptrap filtered
6037201.148.104.59 162 udp snmptrap unknown
6038201.148.104.59 389 tcp ldap filtered
6039201.148.104.59 389 udp ldap unknown
6040201.148.104.59 520 tcp efs filtered
6041201.148.104.59 520 udp route unknown
6042201.148.104.59 2049 tcp nfs filtered
6043201.148.104.59 2049 udp nfs unknown
6044################################################################################################################################
6045Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:29 EDT
6046NSE: Loaded 151 scripts for scanning.
6047NSE: Script Pre-scanning.
6048Initiating NSE at 17:29
6049Completed NSE at 17:29, 0.00s elapsed
6050Initiating NSE at 17:29
6051Completed NSE at 17:29, 0.00s elapsed
6052Initiating NSE at 17:29
6053Completed NSE at 17:29, 0.00s elapsed
6054Initiating Ping Scan at 17:29
6055Scanning 23.100.15.180 [4 ports]
6056Completed Ping Scan at 17:29, 0.63s elapsed (1 total hosts)
6057Initiating Parallel DNS resolution of 1 host. at 17:29
6058Completed Parallel DNS resolution of 1 host. at 17:29, 0.02s elapsed
6059Initiating SYN Stealth Scan at 17:29
6060Scanning 23.100.15.180 [1000 ports]
6061Discovered open port 443/tcp on 23.100.15.180
6062Discovered open port 80/tcp on 23.100.15.180
6063Completed SYN Stealth Scan at 17:29, 25.94s elapsed (1000 total ports)
6064Initiating Service scan at 17:29
6065Scanning 2 services on 23.100.15.180
6066Completed Service scan at 17:29, 17.32s elapsed (2 services on 1 host)
6067Initiating OS detection (try #1) against 23.100.15.180
6068Retrying OS detection (try #2) against 23.100.15.180
6069Initiating Traceroute at 17:29
6070Completed Traceroute at 17:30, 7.20s elapsed
6071Initiating Parallel DNS resolution of 17 hosts. at 17:30
6072Completed Parallel DNS resolution of 17 hosts. at 17:30, 2.67s elapsed
6073NSE: Script scanning 23.100.15.180.
6074Initiating NSE at 17:30
6075Completed NSE at 17:30, 29.09s elapsed
6076Initiating NSE at 17:30
6077Completed NSE at 17:30, 3.31s elapsed
6078Initiating NSE at 17:30
6079Completed NSE at 17:30, 0.00s elapsed
6080Nmap scan report for 23.100.15.180
6081Host is up (0.65s latency).
6082Not shown: 998 filtered ports
6083PORT STATE SERVICE VERSION
608480/tcp open http Microsoft IIS httpd 8.5
6085|_http-server-header: Microsoft-IIS/8.5
6086|_http-title: WAP Websites - Site Error
6087443/tcp open ssl/http Microsoft IIS httpd 8.5
6088|_http-title: WAP Websites - Site Error
6089| ssl-cert: Subject: commonName=umbraco.io/organizationName=Umbraco A/S/stateOrProvinceName=Hovedstaden/countryName=DK
6090| Subject Alternative Name: DNS:umbraco.io, DNS:*.s1.umbraco.io, DNS:*.scm.s1.umbraco.io, DNS:*.scm.umbraco.io, DNS:*.umbraco.io
6091| Issuer: commonName=Sectigo RSA Organization Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
6092| Public Key type: rsa
6093| Public Key bits: 2048
6094| Signature Algorithm: sha256WithRSAEncryption
6095| Not valid before: 2020-01-31T00:00:00
6096| Not valid after: 2022-03-31T23:59:59
6097| MD5: 02b6 6c21 ca76 efea 3e94 e72c 6aa9 134b
6098|_SHA-1: 0f46 27e0 449f b9a0 5775 e8b8 a75e 9e57 cb1d 5254
6099Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6100OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
6101No OS matches for host
6102Uptime guess: 0.001 days (since Mon Mar 30 17:29:45 2020)
6103TCP Sequence Prediction: Difficulty=264 (Good luck!)
6104IP ID Sequence Generation: Randomized
6105Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
6106
6107TRACEROUTE (using port 443/tcp)
6108HOP RTT ADDRESS
61091 406.99 ms 10.202.1.1
61102 407.10 ms 190.105.229.1
61113 407.14 ms 181.119.68.33
61124 407.18 ms ge-0-0-0.ARBUE.m20x1 (200.61.128.254)
61135 597.43 ms static.ifxnw.cl (216.241.0.2)
61146 ...
61157 597.48 ms ae14-0.scl01-96cbe-1b.ntwk.msn.net (104.44.226.75)
61168 787.61 ms be-24-0.ibr01.scl01.ntwk.msn.net (104.44.11.111)
61179 787.67 ms be-2-0.ibr01.mia.ntwk.msn.net (104.44.17.178)
611810 787.72 ms be-4-0.ibr01.atl30.ntwk.msn.net (104.44.28.63)
611911 752.86 ms be-2-0.ibr01.atl31.ntwk.msn.net (104.44.7.144)
612012 752.77 ms be-3-0.ibr03.bn6.ntwk.msn.net (104.44.7.146)
612113 752.76 ms be-3-0.ibr04.bl7.ntwk.msn.net (104.44.16.181)
612214 752.69 ms be-7-0.ibr01.ewr30.ntwk.msn.net (104.44.16.19)
612315 750.53 ms be-4-0.ibr01.sxl71.ntwk.msn.net (104.44.17.153)
612416 750.45 ms be-3-0.ibr02.dub08.ntwk.msn.net (104.44.16.119)
612517 757.50 ms be-7-0.ibr01.ams30.ntwk.msn.net (104.44.17.57)
612618 757.55 ms ae102-0.icr02.ams30.ntwk.msn.net (104.44.22.216)
612719 ... 30
6128
6129NSE: Script Post-scanning.
6130Initiating NSE at 17:30
6131Completed NSE at 17:30, 0.00s elapsed
6132Initiating NSE at 17:30
6133Completed NSE at 17:30, 0.00s elapsed
6134Initiating NSE at 17:30
6135Completed NSE at 17:30, 0.00s elapsed
6136################################################################################################################################
6137Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 17:28 EDT
6138Nmap scan report for 23.100.15.180
6139Host is up (0.62s latency).
6140Not shown: 998 filtered ports
6141PORT STATE SERVICE VERSION
614280/tcp open http Microsoft IIS httpd 8.5
6143|_http-server-header: Microsoft-IIS/8.5
6144| vulscan: VulDB - https://vuldb.com:
6145| [68193] Microsoft IIS 8.0/8.5 IP and Domain Restriction privilege escalation
6146| [48519] Microsoft Works 8.5/9.0 memory corruption
6147| [45763] Microsoft Windows Live Messenger up to 8.5.1 unknown vulnerability
6148| [141563] Microsoft Windows up to RT 8.1 Remote Desktop privilege escalation
6149| [141562] Microsoft Windows up to RT 8.1 Remote Desktop privilege escalation
6150| [134730] Microsoft Skype 8.35 on Android Bluetooth Listening information disclosure
6151| [129845] Microsoft Skype for Business 2015 CU 8 Request cross site scripting
6152| [126799] Microsoft Dynamics 365 8 Web Request Code Execution
6153| [126798] Microsoft Dynamics 365 8 Web Request cross site scripting
6154| [126797] Microsoft Dynamics 365 8 Web Request cross site scripting
6155| [126796] Microsoft Dynamics 365 8 Web Request cross site scripting
6156| [126795] Microsoft Dynamics 365 8 Web Request cross site scripting
6157| [123872] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 SMB information disclosure
6158| [121108] Microsoft Mail Client 8.1 information disclosure
6159| [115260] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache cross site scripting
6160| [115259] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache Cookie Stack-based memory corruption
6161| [113264] Microsoft Windows 8.1/RT 8.1/Server 2012 R2 SMBv2/SMBv3 denial of service
6162| [100989] Microsoft Internet Explorer 8/9/10/11 memory corruption
6163| [100918] Microsoft Windows 8/8.1/10/Server 2012/Server 2016 Malware Protection Service Type Confusion privilege escalation
6164| [96521] Microsoft Windows 8.1/10/Server 2012/Server 2016 SMB Response mrxsmb20.sys denial of service
6165| [93988] Microsoft Desktop Client for Mac up to 8.0.36 privilege escalation
6166| [93755] Microsoft Internet Explorer 8 Ls\xC2\xADFind\xC2\xADSpan\xC2\xADVisual\xC2\xADBoundaries memory corruption
6167| [93535] Microsoft Internet Explorer 8/9/10/11 Regex vbscript.dll RegExpComp::PnodeParse memory corruption
6168| [93386] Microsoft Windows Vista SP2/7 SP1/8.1/RT 8.1/10 Video Control memory corruption
6169| [92587] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 Transaction Manager privilege escalation
6170| [92585] Microsoft Windows Vista SP2/7 SP1/8.1/RT 8.1/10 Video Control privilege escalation
6171| [91571] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
6172| [91570] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
6173| [91559] Microsoft Windows 8.1/10/RT 8.1 NTLM SSO information disclosure
6174| [90711] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF privilege escalation
6175| [90710] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 Netlogon privilege escalation
6176| [87959] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
6177| [87958] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF memory corruption
6178| [87957] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
6179| [87156] Microsoft Windows 8.1/10/RT 8.1/Server 2012 R2 Shell memory corruption
6180| [87155] Microsoft Windows Vista SP2/7/8.1/RT 8.1/10 Journal memory corruption
6181| [82223] Microsoft Windows 8.1/10/Server 2012 R2 Hyper-V Memory information disclosure
6182| [82222] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Memory information disclosure
6183| [82221] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Hyper-V privilege escalation
6184| [81270] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library memory corruption
6185| [80865] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 DLL Loader memory corruption
6186| [80860] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Reader memory corruption
6187| [80859] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF Library memory corruption
6188| [80844] Microsoft Internet Explorer 8/9/10/11 MSHTML MSHTML!Method_VARIANTBOOLp_BSTR_o0oVARIANT memory corruption
6189| [80209] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript memory corruption
6190| [79462] Microsoft Internet Explorer 8/9/10/11 memory corruption
6191| [79460] Microsoft Internet Explorer 8/9 memory corruption
6192| [79458] Microsoft Internet Explorer 8/9 memory corruption
6193| [79457] Microsoft Internet Explorer 8/9 memory corruption
6194| [79455] Microsoft Internet Explorer 8/9/10/11 XSS Filter privilege escalation
6195| [79449] Microsoft Internet Explorer 8/9/10/11 XSS Filter privilege escalation
6196| [79448] Microsoft Internet Explorer 8/9/10/11 Scripting Engine memory corruption
6197| [79447] Microsoft Internet Explorer 8/9/10/11 Scripting Engine information disclosure
6198| [79445] Microsoft Internet Explorer 8/9/10/11 memory corruption
6199| [79162] Microsoft Internet Explorer 8/9/10/11 Scripting Engine memory corruption
6200| [79155] Microsoft Internet Explorer 8/9/10/11 memory corruption
6201| [79143] Microsoft Internet Explorer 8/9/10/11 memory corruption
6202| [78390] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine information disclosure
6203| [78386] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine memory corruption
6204| [78384] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine ASLR privilege escalation
6205| [78379] Microsoft Internet Explorer 8/9/10/11 EditWith Broker privilege escalation
6206| [78377] Microsoft Internet Explorer 8 privilege escalation
6207| [78362] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine RegExpBase::FBadHeader memory corruption
6208| [77605] Microsoft Internet Explorer 8 VBScript/JScript Engine memory corruption
6209| [77006] Microsoft Internet Explorer 8/9/10/11 memory corruption
6210| [77004] Microsoft Internet Explorer 8/9/10/11 memory corruption
6211| [76490] Microsoft Internet Explorer 8/9/10/11 Image Caching History information disclosure
6212| [76482] Microsoft Internet Explorer 8 memory corruption
6213| [76479] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
6214| [76474] Microsoft Internet Explorer 8/9 memory corruption
6215| [76449] Microsoft Windows 8/8.1/Server 2008/Server 2012/Server 2012 R2 Hyper-V memory corruption
6216| [76448] Microsoft Windows 8.1/Server 2012 R2 Hyper-V memory corruption
6217| [76437] Microsoft Internet Explorer 8/9 memory corruption
6218| [75780] Microsoft Internet Explorer 8 memory corruption
6219| [75707] Cisco Unified MeetingPlace for Microsoft Outlook 8.6(1.2)/ 8.6(1.9) cross site scripting
6220| [75322] Microsoft Internet Explorer 8/9 memory corruption
6221| [75319] Microsoft Internet Explorer 8/9/10/11 memory corruption
6222| [75311] Microsoft Internet Explorer 8/9 memory corruption
6223| [75308] Microsoft Internet Explorer 8/9/10/11 VBscript and JScript Engine privilege escalation
6224| [75306] Microsoft Internet Explorer 8/9/10/11 VBScript Engine privilege escalation
6225| [74856] Microsoft Internet Explorer 8/9/10/11 memory corruption
6226| [74842] Microsoft Windows 8.1/Server 2012 R2 Hyper-V denial of service
6227| [73946] Microsoft Internet Explorer 8/9/10/11 memory corruption
6228| [73943] Microsoft Internet Explorer 8 memory corruption
6229| [73939] Microsoft Internet Explorer 8/9/10/11 VBScript Engine memory corruption
6230| [69137] Microsoft Internet Explorer 8 ASLR privilege escalation
6231| [69136] Microsoft Internet Explorer 8/9 MSHTML SpanQualifier memory corruption
6232| [69135] Microsoft Internet Explorer 8/10 memory corruption
6233| [69131] Microsoft Internet Explorer 8/9 memory corruption
6234| [69130] Microsoft Internet Explorer 8/9/10/11 memory corruption
6235| [68400] Microsoft Internet Explorer 8 memory corruption
6236| [68393] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
6237| [68389] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
6238| [68181] Microsoft Internet Explorer 8/9/10/11 memory corruption
6239| [68176] Microsoft Internet Explorer 8/9/10/11 information disclosure
6240| [68174] Microsoft Internet Explorer 8/9 memory corruption
6241| [68169] Microsoft Internet Explorer 8/9 ASLR privilege escalation
6242| [68211] Microsoft Internet Explorer 8/9/10/11 denial of service
6243| [67821] Microsoft Internet Explorer 8/9/10/11 CAttrArray memory corruption
6244| [67813] Microsoft Internet Explorer 8 memory corruption
6245| [67500] Microsoft Internet Explorer 8/9/10/11 memory corruption
6246| [67494] Microsoft Internet Explorer 8/9/10/11 memory corruption
6247| [67345] Microsoft Internet Explorer 8/9/10/11 memory corruption
6248| [67340] Microsoft Internet Explorer 8 memory corruption
6249| [67337] Microsoft Internet Explorer 8/9 memory corruption
6250| [67007] Microsoft Internet Explorer 8/9/10/11 memory corruption
6251| [67006] Microsoft Internet Explorer 8/9/10 memory corruption
6252| [67002] Microsoft Internet Explorer 8/9/10/11 memory corruption
6253| [67000] Microsoft Internet Explorer 8/9/10/11 memory corruption
6254| [66995] Microsoft Internet Explorer 8/9/10/11 memory corruption
6255| [13542] Microsoft Internet Explorer 8/9/10/11 privilege escalation
6256| [13536] Microsoft Internet Explorer 8 memory corruption
6257| [13518] Microsoft Internet Explorer 8 memory corruption
6258| [13515] Microsoft Internet Explorer 8/9/10/11 memory corruption
6259| [13509] Microsoft Internet Explorer 8 memory corruption
6260| [13499] Microsoft Internet Explorer 8 memory corruption
6261| [13496] Microsoft Internet Explorer 8/9/10/11 privilege escalation
6262| [13027] Microsoft Internet Explorer 8/9 information disclosure
6263| [66605] Microsoft Internet Explorer 8/9/10/11 memory corruption
6264| [12543] Microsoft Internet Explorer 8/9/10/11 memory corruption
6265| [12541] Microsoft Internet Explorer 8/9/10 memory corruption
6266| [12540] Microsoft Internet Explorer 8/9/10/11 memory corruption
6267| [12538] Microsoft Internet Explorer 8/9 memory corruption
6268| [12531] Microsoft Internet Explorer 8/9/10/11 memory corruption
6269| [66445] Microsoft Windows 8.0/8.1 XMLDOM ActiveX Control information disclosure
6270| [12252] Microsoft Internet Explorer 8 memory corruption
6271| [12245] Microsoft Internet Explorer 8/9/10/11 memory corruption
6272| [12239] Microsoft Internet Explorer 8/9/10/11 privilege escalation
6273| [12238] Microsoft Windows 8/RT/Server 2012 IPv6 denial of service
6274| [11150] Microsoft Windows 8/Server 2012 Hyper-V Data Structure Value Crash privilege escalation
6275| [11141] Microsoft Internet Explorer 8/9/10/11 CCaret Object Use-After-Free memory corruption
6276| [11138] Microsoft Internet Explorer 8/9/10/11 CTreePos Object memory corruption
6277| [10623] Microsoft Internet Explorer 8/9 memory corruption
6278| [10215] Microsoft Internet Explorer 8/9 memory corruption
6279| [10214] Microsoft Internet Explorer 8/9/10 memory corruption
6280| [9935] Microsoft Internet Explorer 8/9 memory corruption
6281| [9934] Microsoft Internet Explorer 8/9/10 memory corruption
6282| [9933] Microsoft Internet Explorer 8/9 memory corruption
6283| [9932] Microsoft Internet Explorer 8/9 memory corruption
6284| [10246] Microsoft Internet Explorer 8 Table Tree Use-After-Free memory corruption
6285| [9419] Microsoft Internet Explorer up to 8 memory corruption
6286| [9418] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
6287| [9413] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
6288| [9406] Microsoft Internet Explorer 8/9/10 memory corruption
6289| [9099] Microsoft Internet Explorer 8/9 Use-After-Free memory corruption
6290| [9098] Microsoft Internet Explorer 8 memory corruption
6291| [9095] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
6292| [9084] Microsoft Internet Explorer 8/9/10 _UpdateButtonLocation memory corruption
6293| [9083] Microsoft Internet Explorer 8/9 memory corruption
6294| [8722] Microsoft Windows 8/RT/Server 2012 HTTP.sys denial of service
6295| [8718] Microsoft Internet Explorer 8 memory corruption
6296| [8714] Microsoft Internet Explorer 8/9 memory corruption
6297| [8712] Microsoft Internet Explorer 8/9 memory corruption
6298| [8601] Microsoft Internet Explorer 8 'vtable' memory corruption
6299| [8423] Microsoft Internet Explorer up to 8.00.6001.18702 CSS iexplorer.exe denial of service
6300| [7962] Microsoft Internet Explorer up to 8 CTreeNode memory corruption
6301| [7958] Microsoft Internet Explorer up to 8 Celement memory corruption
6302| [7996] Microsoft Windows 8 TrueType Font denial of service
6303| [63558] Microsoft Internet Explorer 8 Use-After-Free memory corruption
6304| [63557] Microsoft Internet Explorer 8/9 Use-After-Free memory corruption
6305| [7511] Microsoft Internet Explorer 8/9 TCP Session information disclosure
6306| [7510] Microsoft Internet Explorer 8/9 HTTP/HTTPS Request spoofing
6307| [7258] Microsoft Windows up to 8/Server 2012 SSL/TLS race condition
6308| [7199] Microsoft Internet Explorer 8/9 mshtml.dll Unclosed Tags Sequence denial of service
6309| [6513] Microsoft Internet Explorer 8/9 OnMove Engine Use-After-Free memory corruption
6310| [5937] Microsoft Internet Explorer 8/9 JavaScript Parser memory corruption
6311| [5538] Microsoft Internet Explorer 8 Same ID Property Deleted Object memory corruption
6312| [5532] Microsoft Internet Explorer 8/9 HTML Sanitization toStaticHTML String information disclosure
6313| [5530] Microsoft Internet Explorer 8/9 OnRowsInserted Elements memory corruption
6314| [5516] Microsoft Internet Explorer 8/9 memory corruption
6315| [4467] Microsoft Internet Explorer 8 cross site scripting
6316| [4454] Microsoft Internet Explorer 8/9 unknown vulnerability
6317| [59618] Microsoft Internet Explorer 8 unknown vulnerability
6318| [57681] Microsoft Internet Explorer 8/9 memory corruption
6319| [57675] Microsoft Internet Explorer 8 memory corruption
6320| [4372] Microsoft Internet Explorer 8/9 information disclosure
6321| [57130] Microsoft Internet Explorer 8 on Win7 msxml.dll unknown vulnerability
6322| [4340] Microsoft Internet Explorer up to 8 unknown vulnerability
6323| [56786] Microsoft Internet Explorer 8 on Win7 unknown vulnerability
6324| [56785] Microsoft Internet Explorer 8 on Win7 memory corruption
6325| [56412] Microsoft Internet Explorer 8 IEShims.dll unknown vulnerability
6326| [55755] Microsoft Internet Explorer 8 memory corruption
6327| [54961] Microsoft Internet Explorer 8 mshtml.dll InsertIntoTimeoutList information disclosure
6328| [4172] Microsoft Internet Explorer up to 8 CSS cross site scripting
6329| [54339] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
6330| [53805] Microsoft Internet Explorer 8 unknown vulnerability
6331| [53514] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
6332| [53513] Microsoft Internet Explorer 8 memory corruption
6333| [4137] Microsoft Internet Explorer up to 8.0 memory corruption
6334| [4121] Microsoft Internet Explorer 8 XSS Filter cross site scripting
6335| [52505] Microsoft Internet Explorer 8 mstime.dll memory corruption
6336| [52373] Microsoft Internet Explorer 8 on Win7 Use-After-Free memory corruption
6337| [52372] Microsoft Internet Explorer 8 on Win7 Heap-based memory corruption
6338| [51652] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
6339| [51651] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
6340| [50914] Microsoft Internet Explorer 8 cross site scripting
6341| [50910] Microsoft Internet Explorer 8 unknown vulnerability
6342| [4048] Microsoft Internet Explorer up to 8 CSS Declaration memory corruption
6343| [4047] Microsoft Internet Explorer up to 8 DOM Object memory corruption
6344| [4046] Microsoft Internet Explorer up to 8 HTML memory corruption
6345| [3987] Microsoft Internet Explorer up to 8 Row Reference memory corruption
6346| [3982] Microsoft Internet Explorer up to 8 DHTML Call memory corruption
6347| [47244] Microsoft Internet Explorer 8 on Win 7 memory corruption
6348| [45681] Microsoft Internet Explorer 8 Beta 2 privilege escalation
6349| [45451] Microsoft Internet Explorer 8 XSS Filter cross site scripting
6350| [45450] Microsoft Internet Explorer 8 XSS Filter Protection cross site scripting
6351| [45449] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
6352| [45448] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
6353| [45447] Microsoft Internet Explorer 8 XSS Filter cross site scripting
6354| [45446] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
6355| [39012] Microsoft Windows Live Messenger up to 8.1 doc memory corruption
6356| [34991] Microsoft Visual Studio 8.0 msvcr80.dll denial of service
6357| [33589] Microsoft Windows Live Messenger up to 8.0 denial of service
6358|
6359| MITRE CVE - https://cve.mitre.org:
6360| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
6361| [CVE-2011-1215] Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
6362| [CVE-2010-3496] McAfee VirusScan Enterprise 8.5i and 8.7i does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.
6363| [CVE-2009-3126] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Integer Overflow Vulnerability."
6364| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
6365| [CVE-2009-2504] Multiple integer overflows in unspecified APIs in GDI+ in Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1 and SP2, Windows XP SP2 and SP3, Windows Server 2003 SP2, Vista Gold and SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allow remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "GDI+ .NET API Vulnerability."
6366| [CVE-2009-2503] GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Windows Server 2003 SP2, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 does not properly allocate an unspecified buffer, which allows remote attackers to execute arbitrary code via a crafted TIFF image file that triggers memory corruption, aka "GDI+ TIFF Memory Corruption Vulnerability."
6367| [CVE-2009-2502] Buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted TIFF image file, aka "GDI+ TIFF Buffer Overflow Vulnerability."
6368| [CVE-2009-2501] Heap-based buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Heap Overflow Vulnerability."
6369| [CVE-2009-2500] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted WMF image file, aka "GDI+ WMF Integer Overflow Vulnerability."
6370| [CVE-2009-1533] Buffer overflow in the Works for Windows document converters in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, and Works 8.5 and 9 allows remote attackers to execute arbitrary code via a crafted Works .wps file that triggers memory corruption, aka "File Converter Buffer Overflow Vulnerability."
6371| [CVE-2008-5828] Microsoft Windows Live Messenger Client 8.5.1 and earlier, when MSN Protocol Version 15 (MSNP15) is used over a NAT session, allows remote attackers to discover intranet IP addresses and port numbers by reading the (1) IPv4InternalAddrsAndPorts, (2) IPv4Internal-Addrs, and (3) IPv4Internal-Port header fields.
6372| [CVE-2007-0045] Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
6373| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
6374| [CVE-2002-1117] Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
6375| [CVE-2001-1088] Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user.
6376| [CVE-2013-3661] The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
6377| [CVE-2013-3660] The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
6378| [CVE-2013-3174] DirectShow in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted GIF file, aka "DirectShow Arbitrary Memory Overwrite Vulnerability."
6379| [CVE-2013-3173] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overwrite Vulnerability."
6380| [CVE-2013-3164] Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
6381| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
6382| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
6383| [CVE-2013-3149] Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
6384| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
6385| [CVE-2013-3141] Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3110.
6386| [CVE-2013-3138] Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability."
6387| [CVE-2013-3136] The kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly handle unspecified page-fault system calls, which allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Kernel Information Disclosure Vulnerability."
6388| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
6389| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
6390| [CVE-2013-3110] Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3141.
6391| [CVE-2013-2558] Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report.
6392| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
6393| [CVE-2013-1451] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not ensure that the SSL lock icon is consistent with the Address bar, which makes it easier for remote attackers to spoof web sites via a crafted HTML document that triggers many HTTPS requests to an arbitrary host, followed by an HTTPS request to a trusted host and then an HTTP request to an untrusted host, a related issue to CVE-2013-1450.
6394| [CVE-2013-1450] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensitive information intended for a specific host via a crafted HTML document that triggers many HTTPS requests and then triggers an HTTP request to that host, as demonstrated by reading a Cookie header, aka MSRC 12096gd.
6395| [CVE-2013-1347] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
6396| [CVE-2013-1345] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
6397| [CVE-2013-1340] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."
6398| [CVE-2013-1339] The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability."
6399| [CVE-2013-1334] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."
6400| [CVE-2013-1332] dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
6401| [CVE-2013-1311] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
6402| [CVE-2013-1307] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
6403| [CVE-2013-1305] HTTP.sys in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP header, aka "HTTP.sys Denial of Service Vulnerability."
6404| [CVE-2013-1300] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
6405| [CVE-2013-1297] Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."
6406| [CVE-2013-1294] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
6407| [CVE-2013-1292] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
6408| [CVE-2013-1291] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 Gold and SP1, and Windows 8 allows local users to cause a denial of service (reboot) via a crafted OpenType font, aka "OpenType Font Parsing Vulnerability" or "Win32k Font Parsing Vulnerability."
6409| [CVE-2013-1288] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CTreeNode Use After Free Vulnerability."
6410| [CVE-2013-1287] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286.
6411| [CVE-2013-1286] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287.
6412| [CVE-2013-1285] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.
6413| [CVE-2013-1284] Race condition in the kernel in Microsoft Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
6414| [CVE-2013-1283] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
6415| [CVE-2013-1280] The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Reference Count Vulnerability."
6416| [CVE-2013-1279] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1278.
6417| [CVE-2013-1278] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1279.
6418| [CVE-2013-1249] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
6419| [CVE-2013-1248] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
6420| [CVE-2013-0811] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1307.
6421| [CVE-2013-0091] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."
6422| [CVE-2013-0078] The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka "Microsoft Antimalware Improper Pathname Vulnerability."
6423| [CVE-2013-0075] The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
6424| [CVE-2013-0025] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
6425| [CVE-2013-0024] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."
6426| [CVE-2013-0013] The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
6427| [CVE-2013-0008] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
6428| [CVE-2012-4792] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
6429| [CVE-2012-4786] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
6430| [CVE-2012-2897] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability."
6431| [CVE-2012-2557] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."
6432| [CVE-2012-2556] The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."
6433| [CVE-2012-2523] Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit platforms allows remote attackers to execute arbitrary code by leveraging an incorrect size calculation during object copying, aka "JavaScript Integer Overflow Remote Code Execution Vulnerability."
6434| [CVE-2012-1881] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability."
6435| [CVE-2012-1875] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability."
6436| [CVE-2012-1874] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows user-assisted remote attackers to execute arbitrary code by accessing a deleted object, aka "Developer Toolbar Remote Code Execution Vulnerability."
6437| [CVE-2012-1858] The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability."
6438| [CVE-2012-1856] The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."
6439| [CVE-2012-1848] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Scrollbar Calculation Vulnerability."
6440| [CVE-2012-1537] Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka "DirectPlay Heap Overflow Vulnerability."
6441| [CVE-2012-1529] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."
6442| [CVE-2012-1528] Integer overflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Overflow Vulnerability."
6443| [CVE-2012-1527] Integer underflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Underflow Vulnerability."
6444| [CVE-2012-1523] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability."
6445| [CVE-2012-0181] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly manage Keyboard Layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout File Vulnerability."
6446| [CVE-2012-0180] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."
6447| [CVE-2012-0172] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability."
6448| [CVE-2012-0159] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview
6449| [CVE-2012-0151] The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."
6450| [CVE-2011-2382] Microsoft Internet Explorer 8 and earlier, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue.
6451| [CVE-2011-1999] Microsoft Internet Explorer 8 does not properly allocate and access memory, which allows remote attackers to execute arbitrary code via vectors involving a "dereferenced memory address," aka "Select Element Remote Code Execution Vulnerability."
6452| [CVE-2011-1996] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Option Element Remote Code Execution Vulnerability."
6453| [CVE-2011-1992] The XSS Filter in Microsoft Internet Explorer 8 allows remote attackers to read content from a different (1) domain or (2) zone via a "trial and error" attack, aka "XSS Filter Information Disclosure Vulnerability."
6454| [CVE-2011-1713] Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.
6455| [CVE-2011-1347] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process, as demonstrated by Stephen Fewer as the third of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
6456| [CVE-2011-1346] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, as demonstrated by Stephen Fewer as the second of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
6457| [CVE-2011-1345] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability."
6458| [CVE-2011-1266] The Vector Markup Language (VML) implementation in vgx.dll in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "VML Memory Corruption Vulnerability."
6459| [CVE-2011-1260] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."
6460| [CVE-2011-1258] Microsoft Internet Explorer 6 through 8 does not properly restrict web script, which allows user-assisted remote attackers to obtain sensitive information from a different (1) domain or (2) zone via vectors involving a drag-and-drop operation, aka "Drag and Drop Information Disclosure Vulnerability."
6461| [CVE-2011-1257] Race condition in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors involving access to an object, aka "Window Open Race Condition Vulnerability."
6462| [CVE-2011-1256] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "DOM Modification Memory Corruption Vulnerability."
6463| [CVE-2011-1255] The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability."
6464| [CVE-2011-1254] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Drag and Drop Memory Corruption Vulnerability."
6465| [CVE-2011-1252] Cross-site scripting (XSS) vulnerability in the SafeHTML function in the toStaticHTML API in Microsoft Internet Explorer 7 and 8, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified strings, aka "toStaticHTML Information Disclosure Vulnerability" or "HTML Sanitization Vulnerability."
6466| [CVE-2011-1251] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "DOM Manipulation Memory Corruption Vulnerability."
6467| [CVE-2011-1246] Microsoft Internet Explorer 8 does not properly handle content settings in HTTP responses, which allows remote web servers to obtain sensitive information from a different (1) domain or (2) zone via a crafted response, aka "MIME Sniffing Information Disclosure Vulnerability."
6468| [CVE-2011-1244] Microsoft Internet Explorer 6, 7, and 8 does not enforce intended domain restrictions on content access, which allows remote attackers to obtain sensitive information or conduct clickjacking attacks via a crafted web site, aka "Frame Tag Information Disclosure Vulnerability."
6469| [CVE-2011-0346] Use-after-free vulnerability in the ReleaseInterface function in MSHTML.DLL in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the DOM implementation and the BreakAASpecial and BreakCircularMemoryReferences functions, as demonstrated by cross_fuzz, aka "MSHTML Memory Corruption Vulnerability."
6470| [CVE-2011-0038] Untrusted search path vulnerability in Microsoft Internet Explorer 8 might allow local users to gain privileges via a Trojan horse IEShims.dll in the current working directory, as demonstrated by a Desktop directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."
6471| [CVE-2011-0036] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, relagted to a "dangling pointer," aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0035.
6472| [CVE-2011-0035] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0036.
6473| [CVE-2010-5071] The JavaScript implementation in Microsoft Internet Explorer 8.0 and earlier does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method.
6474| [CVE-2010-3971] Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability."
6475| [CVE-2010-3964] Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
6476| [CVE-2010-3962] Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
6477| [CVE-2010-3886] The CTimeoutEventList::InsertIntoTimeoutList function in Microsoft mshtml.dll uses a certain pointer value as part of producing Timer ID values for the setTimeout and setInterval methods in VBScript and JScript, which allows remote attackers to obtain sensitive information about the heap memory addresses used by an application, as demonstrated by the Internet Explorer 8 application.
6478| [CVE-2010-3348] Microsoft Internet Explorer 6, 7, and 8 does not prevent rendering of cached content as HTML, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Cross-Domain Information Disclosure Vulnerability," a different vulnerability than CVE-2010-3342.
6479| [CVE-2010-3346] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
6480| [CVE-2010-3345] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
6481| [CVE-2010-3342] Microsoft Internet Explorer 6, 7, and 8 does not prevent rendering of cached content as HTML, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Cross-Domain Information Disclosure Vulnerability," a different vulnerability than CVE-2010-3348.
6482| [CVE-2010-3331] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory in certain circumstances involving use of Microsoft Word to read Word documents, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6483| [CVE-2010-3330] Microsoft Internet Explorer 6 through 8 does not properly restrict script access to content from a different (1) domain or (2) zone, which allows remote attackers to obtain sensitive information via a crafted web site, aka "Cross-Domain Information Disclosure Vulnerability."
6484| [CVE-2010-3329] mshtmled.dll in Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code via a crafted Microsoft Office document that causes the HtmlDlgHelper class destructor to access uninitialized memory, aka "Uninitialized Memory Corruption Vulnerability."
6485| [CVE-2010-3328] Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."
6486| [CVE-2010-3327] The implementation of HTML content creation in Microsoft Internet Explorer 6 through 8 does not remove the Anchor element during pasting and editing, which might allow remote attackers to obtain sensitive deleted information by visiting a web page, aka "Anchor Element Information Disclosure Vulnerability."
6487| [CVE-2010-3325] Microsoft Internet Explorer 6 through 8 does not properly handle unspecified special characters in Cascading Style Sheets (CSS) documents, which allows remote attackers to obtain sensitive information from a different (1) domain or (2) zone via a crafted web site, aka "CSS Special Character Information Disclosure Vulnerability."
6488| [CVE-2010-3324] The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257.
6489| [CVE-2010-3243] Cross-site scripting (XSS) vulnerability in the toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2 and Office SharePoint Server 2007 SP2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "HTML Sanitization Vulnerability."
6490| [CVE-2010-2560] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Layout Memory Corruption Vulnerability."
6491| [CVE-2010-2559] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, CVE-2010-0245, and CVE-2010-0246.
6492| [CVE-2010-2558] Race condition in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to an object in memory, aka "Race Condition Memory Corruption Vulnerability."
6493| [CVE-2010-2556] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6494| [CVE-2010-2442] Microsoft Internet Explorer, possibly 8, does not properly restrict focus changes, which allows remote attackers to read keystrokes via "cross-domain IFRAME gadgets."
6495| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
6496| [CVE-2010-2118] Microsoft Internet Explorer 6.0.2900.2180 and 8.0.7600.16385 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid news:// URIs.
6497| [CVE-2010-2091] Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value.
6498| [CVE-2010-1991] Microsoft Internet Explorer 6.0.2900.2180, 7, and 8.0.7600.16385 executes a mail application in situations where an IFRAME element has a mailto: URL in its SRC attribute, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many IFRAME elements.
6499| [CVE-2010-1489] The XSS Filter in Microsoft Internet Explorer 8 does not properly perform neutering for the SCRIPT tag, which allows remote attackers to conduct cross-site scripting (XSS) attacks against web sites that have no inherent XSS vulnerabilities, a different issue than CVE-2009-4074.
6500| [CVE-2010-1262] Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a free of the root container, aka "Memory Corruption Vulnerability."
6501| [CVE-2010-1261] The IE8 Developer Toolbar in Microsoft Internet Explorer 8 SP1, SP2, and SP3 allows user-assisted remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6502| [CVE-2010-1260] The IE8 Developer Toolbar in Microsoft Internet Explorer 8 SP1, SP2, and SP3 allows user-assisted remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
6503| [CVE-2010-1259] Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6504| [CVE-2010-1258] Microsoft Internet Explorer 6, 7, and 8 does not properly determine the origin of script code, which allows remote attackers to execute script in an unintended domain or security zone, and obtain sensitive information, via unspecified vectors, aka "Event Handler Cross-Domain Vulnerability."
6505| [CVE-2010-1118] Unspecified vulnerability in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a use-after-free issue, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
6506| [CVE-2010-1117] Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
6507| [CVE-2010-0811] Multiple unspecified vulnerabilities in the Microsoft Internet Explorer 8 Developer Tools ActiveX control in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via unknown vectors that "corrupt the system state," aka "Microsoft Internet Explorer 8 Developer Tools Vulnerability."
6508| [CVE-2010-0555] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving the product's use of text/html as the default content type for files that are encountered after a redirection, aka the URLMON sniffing vulnerability, a variant of CVE-2009-1140 and related to CVE-2008-1448.
6509| [CVE-2010-0494] Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability."
6510| [CVE-2010-0492] Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and destruction of markup, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
6511| [CVE-2010-0490] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6512| [CVE-2010-0255] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving JavaScript exploit code that constructs a reference to a file://127.0.0.1 URL, aka the dynamic OBJECT tag vulnerability, as demonstrated by obtaining the data from an index.dat file, a variant of CVE-2009-1140 and related to CVE-2008-1448.
6513| [CVE-2010-0249] Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4
6514| [CVE-2010-0248] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
6515| [CVE-2010-0246] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, and CVE-2010-0245.
6516| [CVE-2010-0245] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, and CVE-2010-0246.
6517| [CVE-2010-0244] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2530 and CVE-2009-2531.
6518| [CVE-2010-0112] Multiple SQL injection vulnerabilities in the Administrative Interface in the IIS extension in Symantec IM Manager before 8.4.16 allow remote attackers to execute arbitrary SQL commands via (1) the rdReport parameter to rdpageimlogic.aspx, related to the sGetDefinition function in rdServer.dll, and SQL statements contained within a certain report file
6519| [CVE-2010-0027] The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."
6520| [CVE-2009-4074] The XSS Filter in Microsoft Internet Explorer 8 allows remote attackers to leverage the "response-changing mechanism" to conduct cross-site scripting (XSS) attacks against web sites that have no inherent XSS vulnerabilities, related to the details of output encoding and improper modification of an HTML attribute, aka "XSS Filter Script Handling Vulnerability."
6521| [CVE-2009-4073] The printing functionality in Microsoft Internet Explorer 8 allows remote attackers to discover a local pathname, and possibly a local username, by reading the dc:title element of a PDF document that was generated from a local web page.
6522| [CVE-2009-3674] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671.
6523| [CVE-2009-3673] Microsoft Internet Explorer 7 and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
6524| [CVE-2009-3671] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
6525| [CVE-2009-3003] Microsoft Internet Explorer 6 through 8 allows remote attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary URL on the web site visited by the victim, as demonstrated by a visit to an attacker-controlled web page, which triggers a spoofed login form for the site containing that page.
6526| [CVE-2009-2764] Microsoft Internet Explorer 8.0.7100.0 on Windows 7 RC on the x64 platform allows remote attackers to cause a denial of service (application crash) via a certain DIV element in conjunction with SCRIPT elements that have empty contents and no reference to a valid external script location.
6527| [CVE-2009-2655] mshtml.dll in Microsoft Internet Explorer 7 and 8 on Windows XP SP3 allows remote attackers to cause a denial of service (application crash) by calling the JavaScript findText method with a crafted Unicode string in the first argument, and only one additional argument, as demonstrated by a second argument of -1.
6528| [CVE-2009-2536] Microsoft Internet Explorer 5 through 8 allows remote attackers to cause a denial of service (memory consumption and application crash) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
6529| [CVE-2009-2531] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2530.
6530| [CVE-2009-2530] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2531.
6531| [CVE-2009-2529] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not properly handle argument validation for unspecified variables, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Component Handling Vulnerability."
6532| [CVE-2009-2069] Microsoft Internet Explorer before 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request.
6533| [CVE-2009-2064] Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
6534| [CVE-2009-2057] Microsoft Internet Explorer before 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
6535| [CVE-2009-1532] Microsoft Internet Explorer 8 for Windows XP SP2 and SP3
6536| [CVE-2009-1335] Microsoft Internet Explorer 7 and 8 on Windows XP and Vista allows remote attackers to cause a denial of service (application hang) via a large document composed of unprintable characters, aka MSRC 9011jr.
6537| [CVE-2009-1043] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors triggered by clicking on a link, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
6538| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
6539| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
6540| [CVE-2009-1011] Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is for multiple integer overflows in a function that parses an optional data stream within a Microsoft Office file, leading to a heap-based buffer overflow.
6541| [CVE-2009-0084] Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."
6542| [CVE-2009-0072] Microsoft Internet Explorer 6.0 through 8.0 beta2 allows remote attackers to cause a denial of service (application crash) via an onload=screen[""] attribute value in a BODY element.
6543| [CVE-2008-5750] Argument injection vulnerability in Microsoft Internet Explorer 8 beta 2 on Windows XP SP3 allows remote attackers to execute arbitrary commands via the --renderer-path option in a chromehtml: URI.
6544| [CVE-2008-5556] ** DISPUTED ** The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not recognize attack patterns designed to operate against web pages that are encoded with utf-7, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting crafted utf-7 content. NOTE: the vendor reportedly disputes this issue, stating "Behaviour is by design."
6545| [CVE-2008-5555] Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
6546| [CVE-2008-5554] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attacks, as demonstrated by the (1) Location and (2) Set-Cookie HTTP headers. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
6547| [CVE-2008-5553] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 disables itself upon encountering a certain X-XSS-Protection HTTP header, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting this header after a CRLF sequence. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
6548| [CVE-2008-5552] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a utf-7 charset value. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
6549| [CVE-2008-5551] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
6550| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
6551| [CVE-2008-5416] Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier
6552| [CVE-2008-4295] Microsoft Windows Mobile 6.0 on HTC Wiza 200 and HTC MDA 8125 devices does not properly handle the first attempt to establish a Bluetooth connection to a peer with a long name, which allows remote attackers to cause a denial of service (device reboot) by configuring a Bluetooth device with a long hci name and (1) connecting directly to the Windows Mobile system or (2) waiting for the Windows Mobile system to scan for nearby devices.
6553| [CVE-2008-4256] The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "Charts Control Memory Corruption Vulnerability."
6554| [CVE-2008-4255] Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and SP1 allows remote attackers to execute arbitrary code via an AVI file with a crafted stream length, which triggers an "allocation error" and memory corruption, aka "Windows Common AVI Parsing Overflow Vulnerability."
6555| [CVE-2008-4254] Multiple integer overflows in the Hierarchical FlexGrid ActiveX control (mshflxgd.ocx) in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allow remote attackers to execute arbitrary code via crafted (1) Rows and (2) Cols properties to the (a) ExpandAll and (b) CollapseAll methods, related to access of incorrectly initialized objects and corruption of the "system state," aka "Hierarchical FlexGrid Control Memory Corruption Vulnerability."
6556| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
6557| [CVE-2008-4252] The DataGrid ActiveX control in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "DataGrid Control Memory Corruption Vulnerability."
6558| [CVE-2008-4127] Mshtml.dll in Microsoft Internet Explorer 7 Gold 7.0.5730 and 8 Beta 8.0.6001 on Windows XP SP2 allows remote attackers to cause a denial of service (failure of subsequent image rendering) via a crafted PNG file, related to an infinite loop in the CDwnTaskExec::ThreadExec function.
6559| [CVE-2008-4110] Buffer overflow in the SQLVDIRLib.SQLVDirControl ActiveX control in Tools\Binn\sqlvdir.dll in Microsoft SQL Server 2000 (aka SQL Server 8.0) allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long URL in the second argument to the Connect method. NOTE: this issue is not a vulnerability in many environments, since the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
6560| [CVE-2008-3815] Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)3, 7.1 before 7.1(2)78, 7.2 before 7.2(4)16, 8.0 before 8.0(4)6, and 8.1 before 8.1(1)13, when configured as a VPN using Microsoft Windows NT Domain authentication, allows remote attackers to bypass VPN authentication via unknown vectors.
6561| [CVE-2008-3704] Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not "validating property values with boundary checks," as exploited in the wild in August 2008, aka "Masked Edit Control Memory Corruption Vulnerability."
6562| [CVE-2008-3015] Integer overflow in gdiplus.dll in GDI+ in Microsoft Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a BMP image file with a malformed BitMapInfoHeader that triggers a buffer overflow, aka "GDI+ BMP Integer Overflow Vulnerability."
6563| [CVE-2008-3014] Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka "GDI+ WMF Buffer Overrun Vulnerability."
6564| [CVE-2008-3013] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
6565| [CVE-2008-3012] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corruption Vulnerability."
6566| [CVE-2008-2948] Cross-domain vulnerability in Microsoft Internet Explorer 7 and 8 allows remote attackers to change the location property of a frame via the Object data type, and use a frame from a different domain to observe domain-independent events, as demonstrated by observing onkeydown events with caballero-listener. NOTE: according to Microsoft, this is a duplicate of CVE-2008-2947, possibly a different attack vector.
6567| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
6568| [CVE-2008-1544] The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote attackers to (1) conduct HTTP request splitting and HTTP request smuggling attacks via an incorrect Content-Length header, (2) access arbitrary virtual hosts via a modified Host header, (3) bypass referrer restrictions via an incorrect Referer header, and (4) bypass the same-origin policy and obtain sensitive information via a crafted request header.
6569| [CVE-2008-1444] Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability."
6570| [CVE-2008-0108] Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File Converter Field Length Vulnerability."
6571| [CVE-2008-0105] Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table Vulnerability."
6572| [CVE-2008-0011] Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."
6573| [CVE-2007-5348] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka "GDI+ VML Buffer Overrun Vulnerability."
6574| [CVE-2007-5277] Microsoft Internet Explorer 6 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80, a different issue than CVE-2006-4560.
6575| [CVE-2007-4916] Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument.
6576| [CVE-2007-4814] Buffer overflow in the SQLServer ActiveX control in the Distributed Management Objects OLE DLL (sqldmo.dll) 2000.085.2004.00 in Microsoft SQL Server Enterprise Manager 8.05.2004 allows remote attackers to execute arbitrary code via a long second argument to the Start method.
6577| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
6578| [CVE-2007-0842] The 64-bit versions of Microsoft Visual C++ 8.0 standard library (MSVCR80.DLL) time functions, including (1) localtime, (2) localtime_s, (3) gmtime, (4) gmtime_s, (5) ctime, (6) ctime_s, (7) wctime, (8) wctime_s, and (9) fstat, trigger an assertion error instead of a NULL pointer or EINVAL when processing a time argument later than Jan 1, 3000, which might allow context-dependent attackers to cause a denial of service (application exit) via large time values. NOTE: it could be argued that this is a design limitation of the functions, and the vulnerability lies with any application that does not validate arguments to these functions. However, this behavior is inconsistent with documentation, which does not list assertions as a possible result of an error condition.
6579| [CVE-2007-0216] wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vulnerability."
6580| [CVE-2007-0047] CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
6581| [CVE-2006-6252] Microsoft Windows Live Messenger 8.0 and earlier, when gestual emoticons are enabled, allows remote attackers to cause a denial of service (CPU consumption) via a long string composed of ":D" sequences, which are interpreted as emoticons.
6582| [CVE-2006-3654] Buffer overflow in wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote attackers to cause a denial of service (CPU consumption or crash) via crafted Excel files.
6583| [CVE-2006-3653] wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote attackers to cause a denial of service (CPU consumption or crash) via crafted (1) Works, (2) Excel, and (3) Lotus 1-2-3 files.
6584| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
6585| [CVE-2005-3182] Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well.
6586| [CVE-2005-3174] Microsoft Windows 2000 before Update Rollup 1 for SP4 allows users to log on to the domain, even when their password has expired, if the fully qualified domain name (FQDN) is 8 characters long.
6587| [CVE-2004-0540] Microsoft Windows 2000, when running in a domain whose Fully Qualified Domain Name (FQDN) is exactly 8 characters long, does not prevent users with expired passwords from logging on to the domain.
6588| [CVE-2003-0604] Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote attackers to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-location contains a File:// URL.
6589| [CVE-2002-2435] The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and earlier does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264.
6590| [CVE-2002-2380] NetDSL ADSL Modem 800 with Microsoft Network firmware 5.5.11 allows remote attackers to gain access to configuration menus by sniffing undocumented usernames and passwords from network traffic.
6591| [CVE-2002-0797] Buffer overflow in the MIB parsing component of mibiisa for Solaris 5.6 through 8 allows remote attackers to gain root privileges.
6592| [CVE-2001-0238] Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests.
6593|
6594| SecurityFocus - https://www.securityfocus.com/bid/:
6595| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
6596| [58847] Microsoft Windows Defender for Windows 8 and Windows RT Local Privilege Escalation Vulnerability
6597| [42467] Microsoft Internet Explorer 8 'toStaticHTML()' HTML Sanitization Bypass Weakness
6598| [40490] Microsoft Internet Explorer 8 Developer Tools Remote Code Execution Vulnerability
6599| [37135] Microsoft Internet Explorer 8 Cross-Site Scripting Filter Cross-Site Scripting Vulnerability
6600| [35941] Microsoft Internet Explorer 8 Denial of Service Vulnerability
6601|
6602| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6603| [40937] Microsoft Windows Knowledge Base Article 815495 update not installed
6604| [37226] Microsoft Windows Knowledge Base Article 815495 update not installed
6605| [19102] Microsoft Knowledge Base Article 885834 is not installed
6606| [19090] Microsoft Knowledge Base Article 885250 is not installed
6607| [18392] Microsoft Windows Knowledge Base Article 885249 update is not installed
6608| [18391] Microsoft Windows Knowledge Base Article 885835 update is not installed
6609| [18390] Microsoft Windows Knowledge Base Article 885836 update is not installed
6610| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
6611| [66402] Microsoft Windows kernel-mode driver (win32k.sys) variant 8 privilege escalation
6612| [57338] Microsoft Internet Explorer 8 Developer Tools code execution
6613| [24509] Microsoft Windows Knowledge Base Article 889167 update is not installed
6614| [22882] Microsoft Windows Knowledge Base Article 896424 update is not installed
6615| [22156] Microsoft Windows Knowledge Base Article 899589 update is not installed
6616| [22155] Microsoft Knowledge Base Article 896688 is not installed
6617| [22072] Microsoft Knowledge Base Article 899587 is not installed
6618| [22071] Microsoft Knowledge Base Article 896428 is not installed
6619| [22069] Microsoft Knowledge Base Article 890859 is not installed
6620| [22068] Microsoft Knowledge Base Article 890046 is not installed
6621| [21704] Microsoft Windows Knowledge Base Article 896727 update is not installed
6622| [21605] Microsoft Windows Knowledge Base Article 896423 update is not installed
6623| [21603] Microsoft Windows Knowledge Base Article 899588 update is not installed
6624| [21601] Microsoft Windows Knowledge Base Article 899591 update is not installed
6625| [21600] Microsoft Windows Knowledge Base Article 893756 update is not installed
6626| [20826] Microsoft Windows Knowledge Base Article 896422 update is not installed
6627| [20825] Microsoft Windows Knowledge Base Article 896358 update is not installed
6628| [20823] Microsoft Windows Knowledge Base Article 890169 update is not installed
6629| [20822] Microsoft Windows Knowledge Base Article 883939 update is not installed
6630| [20820] Microsoft Windows Knowledge Base Article 896426 update is not installed
6631| [20382] Microsoft Windows Knowledge Base Article 894320 update is not installed
6632| [20318] Microsoft Windows Knowledge Base Article 893086 update is not installed
6633| [20317] Microsoft Windows Knowledge Base Article 890923 update is not installed
6634| [20000] Microsoft Windows Knowledge Base Article 892944 update is not installed
6635| [19875] Microsoft Knowledge Base Article 893066 is not installed
6636| [19843] Microsoft Windows Knowledge Base Article 894549 update is not installed
6637| [19252] Microsoft Knowledge Base Article 890261 is not installed
6638| [19141] Microsoft Knowledge Base Article 867282 is not installed
6639| [19118] Microsoft Knowledge Base Article 890047 is not installed
6640| [19116] Microsoft Knowledge Base Article 891781 is not installed
6641| [19112] Microsoft Knowledge Base Article 873352 is not installed
6642| [19111] Microsoft Knowledge Base Article 888113 is not installed
6643| [19106] Microsoft Knowledge Base Article 873333 is not installed
6644| [19095] Microsoft Knowledge Base Article 888302 is not installed
6645| [19092] Microsoft Knowledge Base Article 887981 is not installed
6646| [18944] Microsoft Knowledge Base Article 886185 is not installed
6647| [18770] Microsoft Knowledge Base Article 890175 is not installed
6648| [18769] Microsoft Knowledge Base Article 887219 is not installed
6649| [18768] Microsoft Windows Knowledge Base Article 891711 update is not installed
6650| [18766] Microsoft Windows Knowledge Base Article 871250 update is not installed
6651| [18394] Microsoft Windows Knowledge Base Article 870763 update is not installed
6652| [18393] Microsoft Windows Knowledge Base Article 873339 update is not installed
6653| [18314] Microsoft Windows Knowledge Base Article 889293 update is not installed
6654|
6655| Exploit-DB - https://www.exploit-db.com:
6656| [17159] Microsoft Host Integration Server <= 8.5.4224.0 DoS Vulnerabilities
6657| [31118] Microsoft Works 8.0 File Converter Field Length Remote Code Execution Vulnerability
6658| [30537] Microsoft MSN Messenger <= 8.0 - Video Conversation Buffer Overflow Vulnerability
6659| [28222] microsoft works 8.0 spreadsheet Multiple Vulnerabilities
6660| [12728] Microsoft Outlook Web Access (OWA) 8.2.254.0 - Information Disclosure vulnerability
6661|
6662| OpenVAS (Nessus) - http://www.openvas.org:
6663| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
6664| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
6665| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
6666| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
6667| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
6668| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
6669| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
6670| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
6671| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
6672| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
6673| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
6674| [100952] Microsoft IIS FTPd NLST stack overflow
6675| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
6676| [10680] Test Microsoft IIS Source Fragment Disclosure
6677| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
6678| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
6679| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
6680| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
6681| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
6682| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
6683| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
6684| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
6685| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
6686| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
6687| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
6688| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
6689| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
6690| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
6691| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
6692| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
6693| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
6694| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
6695| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
6696| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
6697| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
6698| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
6699| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
6700| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
6701| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
6702| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
6703| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
6704| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
6705| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
6706| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
6707| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
6708| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
6709| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
6710| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
6711| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
6712| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
6713| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
6714| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
6715| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
6716| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
6717| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
6718| [902798] Microsoft SMB Signing Enabled and Not Required At Server
6719| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
6720| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
6721| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
6722| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
6723| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
6724| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
6725| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
6726| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
6727| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
6728| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
6729| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
6730| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
6731| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
6732| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
6733| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
6734| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
6735| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
6736| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
6737| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
6738| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
6739| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
6740| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
6741| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
6742| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
6743| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
6744| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
6745| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
6746| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
6747| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
6748| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
6749| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
6750| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
6751| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
6752| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
6753| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
6754| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
6755| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
6756| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
6757| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
6758| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
6759| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
6760| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
6761| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
6762| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
6763| [902518] Microsoft .NET Framework Security Bypass Vulnerability
6764| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
6765| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
6766| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
6767| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
6768| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
6769| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
6770| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
6771| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
6772| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
6773| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
6774| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
6775| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
6776| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
6777| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
6778| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
6779| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
6780| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
6781| [902425] Microsoft Windows SMB Accessible Shares
6782| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
6783| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
6784| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
6785| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
6786| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
6787| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
6788| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
6789| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
6790| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
6791| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
6792| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
6793| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
6794| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
6795| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
6796| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
6797| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
6798| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
6799| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
6800| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
6801| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
6802| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
6803| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
6804| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
6805| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
6806| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
6807| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
6808| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
6809| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
6810| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
6811| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
6812| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
6813| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
6814| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
6815| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
6816| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
6817| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
6818| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
6819| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
6820| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
6821| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
6822| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
6823| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
6824| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
6825| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
6826| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
6827| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
6828| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
6829| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
6830| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
6831| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
6832| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
6833| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
6834| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
6835| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
6836| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
6837| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
6838| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
6839| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
6840| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
6841| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
6842| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
6843| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
6844| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
6845| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
6846| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
6847| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
6848| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
6849| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
6850| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
6851| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
6852| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
6853| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
6854| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
6855| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
6856| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
6857| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
6858| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
6859| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
6860| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
6861| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
6862| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
6863| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
6864| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
6865| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
6866| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
6867| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
6868| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
6869| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
6870| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
6871| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
6872| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
6873| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
6874| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
6875| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
6876| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
6877| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
6878| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
6879| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
6880| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
6881| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
6882| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
6883| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
6884| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
6885| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
6886| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
6887| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
6888| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
6889| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
6890| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
6891| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
6892| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
6893| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
6894| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
6895| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
6896| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
6897| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
6898| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
6899| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
6900| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
6901| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
6902| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
6903| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
6904| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
6905| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
6906| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
6907| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
6908| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
6909| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
6910| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
6911| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
6912| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
6913| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
6914| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
6915| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
6916| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
6917| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
6918| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
6919| [900808] Microsoft Visual Products Version Detection
6920| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
6921| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
6922| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
6923| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
6924| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
6925| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
6926| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
6927| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
6928| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
6929| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
6930| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
6931| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
6932| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
6933| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
6934| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
6935| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
6936| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
6937| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
6938| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
6939| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
6940| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
6941| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
6942| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
6943| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
6944| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
6945| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
6946| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
6947| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
6948| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
6949| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
6950| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
6951| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
6952| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
6953| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
6954| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
6955| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
6956| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
6957| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
6958| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
6959| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
6960| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
6961| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
6962| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
6963| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
6964| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
6965| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
6966| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
6967| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
6968| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
6969| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
6970| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
6971| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
6972| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
6973| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
6974| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
6975| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
6976| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
6977| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
6978| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
6979| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
6980| [900173] Microsoft Windows Media Player Version Detection
6981| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
6982| [900170] Microsoft iExplorer '&NBSP
6983| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
6984| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
6985| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
6986| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
6987| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
6988| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
6989| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
6990| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
6991| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
6992| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
6993| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
6994| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
6995| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
6996| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
6997| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
6998| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
6999| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
7000| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
7001| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
7002| [900025] Microsoft Office Version Detection
7003| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
7004| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
7005| [855384] Solaris Update for snmp/mibiisa 108870-36
7006| [855273] Solaris Update for snmp/mibiisa 108869-36
7007| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
7008| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
7009| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
7010| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
7011| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
7012| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
7013| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
7014| [802726] Microsoft SMB Signing Disabled
7015| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
7016| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
7017| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
7018| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
7019| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
7020| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
7021| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
7022| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
7023| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
7024| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
7025| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
7026| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7027| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7028| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
7029| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
7030| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
7031| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
7032| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
7033| [801934] Microsoft Silverlight Version Detection
7034| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
7035| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
7036| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
7037| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
7038| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
7039| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
7040| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
7041| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
7042| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
7043| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
7044| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
7045| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
7046| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
7047| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
7048| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
7049| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
7050| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
7051| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
7052| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
7053| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
7054| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
7055| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
7056| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
7057| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
7058| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
7059| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
7060| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
7061| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
7062| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
7063| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
7064| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
7065| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
7066| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
7067| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
7068| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
7069| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
7070| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
7071| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
7072| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
7073| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
7074| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
7075| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
7076| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
7077| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
7078| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
7079| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
7080| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
7081| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
7082| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
7083| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
7084| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
7085| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
7086| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
7087| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
7088| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
7089| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
7090| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
7091| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
7092| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
7093| [800742] Microsoft Internet Explorer Unspecified vulnerability
7094| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
7095| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
7096| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
7097| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
7098| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
7099| [800504] Microsoft Windows XP SP3 denial of service vulnerability
7100| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
7101| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
7102| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
7103| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
7104| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
7105| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
7106| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
7107| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
7108| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
7109| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
7110| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
7111| [800331] Microsoft Windows Live Messenger Client Version Detection
7112| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
7113| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
7114| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
7115| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
7116| [800217] Microsoft Money Version Detection
7117| [800209] Microsoft Internet Explorer Version Detection (Win)
7118| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
7119| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
7120| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
7121| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
7122| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
7123| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
7124| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
7125| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
7126| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
7127| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
7128| [101017] Microsoft MS03-018 security check
7129| [101016] Microsoft MS03-022 security check
7130| [101015] Microsoft MS03-034 security check
7131| [101014] Microsoft MS00-078 security check
7132| [101012] Microsoft MS03-051 security check
7133| [101010] Microsoft Security Bulletin MS05-004
7134| [101009] Microsoft Security Bulletin MS06-033
7135| [101007] Microsoft dotNET version grabber
7136| [101006] Microsoft Security Bulletin MS06-056
7137| [101005] Microsoft Security Bulletin MS07-040
7138| [101004] Microsoft MS04-017 security check
7139| [101003] Microsoft MS00-058 security check
7140| [101000] Microsoft MS00-060 security check
7141| [100950] Microsoft DNS server internal hostname disclosure detection
7142| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
7143| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
7144| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
7145| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
7146| [100062] Microsoft Remote Desktop Protocol Detection
7147| [90024] Windows Vulnerability in Microsoft Jet Database Engine
7148| [80007] Microsoft MS00-06 security check
7149| [13752] Denial of Service (DoS) in Microsoft SMS Client
7150| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
7151| [11874] IIS Service Pack - 404
7152| [11808] Microsoft RPC Interface Buffer Overrun (823980)
7153| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
7154| [11217] Microsoft's SQL Version Query
7155| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
7156| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
7157| [11142] IIS XSS via IDC error
7158| [11067] Microsoft's SQL Hello Overflow
7159| [11003] IIS Possible Compromise
7160| [10993] IIS ASP.NET Application Trace Enabled
7161| [10991] IIS Global.asa Retrieval
7162| [10936] IIS XSS via 404 error
7163| [10862] Microsoft's SQL Server Brute Force
7164| [10755] Microsoft Exchange Public Folders Information Leak
7165| [10732] IIS 5.0 WebDav Memory Leakage
7166| [10699] IIS FrontPage DoS II
7167| [10695] IIS .IDA ISAPI filter applied
7168| [10674] Microsoft's SQL UDP Info Query
7169| [10673] Microsoft's SQL Blank Password
7170| [10671] IIS Remote Command Execution
7171| [10667] IIS 5.0 PROPFIND Vulnerability
7172| [10661] IIS 5 .printer ISAPI filter applied
7173| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
7174| [10585] IIS FrontPage DoS
7175| [10576] Check for dangerous IIS default files
7176| [10575] Check for IIS .cnf file leakage
7177| [10573] IIS 5.0 Sample App reveals physical path of web root
7178| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
7179| [10537] IIS directory traversal
7180| [10492] IIS IDA/IDQ Path Disclosure
7181| [10491] ASP/ASA source using Microsoft Translate f: bug
7182| [10144] Microsoft SQL TCP/IP listener is running
7183|
7184| SecurityTracker - https://www.securitytracker.com:
7185| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7186| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
7187| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
7188| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
7189| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
7190| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
7191| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
7192| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
7193| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
7194| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
7195| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
7196| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
7197| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
7198| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
7199| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
7200| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
7201| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
7202| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
7203| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
7204| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
7205| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
7206| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
7207| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
7208| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
7209| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
7210| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
7211| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
7212| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
7213| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
7214| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
7215| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
7216| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
7217| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
7218| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
7219| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
7220| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
7221| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
7222| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
7223| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
7224| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
7225| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
7226| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
7227| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
7228| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
7229| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
7230| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
7231| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
7232| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
7233| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
7234| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
7235|
7236| OSVDB - http://www.osvdb.org:
7237| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
7238| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
7239| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
7240| [87262] Microsoft IIS FTP Command Injection Information Disclosure
7241| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
7242| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
7243| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
7244| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
7245| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
7246| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
7247| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
7248| [71856] Microsoft IIS Status Header Handling Remote Overflow
7249| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
7250| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
7251| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
7252| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
7253| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
7254| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
7255| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
7256| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
7257| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
7258| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
7259| [59892] Microsoft IIS Malformed Host Header Remote DoS
7260| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
7261| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
7262| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
7263| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
7264| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
7265| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
7266| [55269] Microsoft IIS Traversal GET Request Remote DoS
7267| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
7268| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
7269| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
7270| [52238] Microsoft IIS IDC Extension XSS
7271| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
7272| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
7273| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
7274| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
7275| [43451] Microsoft IIS HTTP Request Smuggling
7276| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
7277| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
7278| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
7279| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
7280| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
7281| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
7282| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
7283| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
7284| [27152] Microsoft Windows IIS ASP Page Processing Overflow
7285| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
7286| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
7287| [21805] Microsoft IIS Crafted URL Remote DoS
7288| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
7289| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
7290| [17124] Microsoft IIS Malformed WebDAV Request DoS
7291| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
7292| [17122] Microsoft IIS Permission Weakness .COM File Upload
7293| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
7294| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
7295| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
7296| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
7297| [13760] Microsoft IIS Malformed URL Request DoS
7298| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
7299| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
7300| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
7301| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
7302| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
7303| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
7304| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
7305| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
7306| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
7307| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
7308| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
7309| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
7310| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
7311| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
7312| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
7313| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
7314| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
7315| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
7316| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
7317| [11257] Microsoft IIS Malformed GET Request DoS
7318| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
7319| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
7320| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
7321| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
7322| [9200] Microsoft IIS Unspecified XSS Variant
7323| [9199] Microsoft IIS shtml.dll XSS
7324| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
7325| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
7326| [7737] Microsoft IIS ASP Redirection Function XSS
7327| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
7328| [5851] Microsoft IIS Single Dot Source Code Disclosure
7329| [5736] Microsoft IIS Relative Path System Privilege Escalation
7330| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
7331| [5633] Microsoft IIS Invalid WebDAV Request DoS
7332| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
7333| [5584] Microsoft IIS URL Redirection Malformed Length DoS
7334| [5566] Microsoft IIS Form_VBScript.asp XSS
7335| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
7336| [4864] Microsoft IIS TRACK Logging Failure
7337| [4863] Microsoft IIS Active Server Page Header DoS
7338| [4791] Microsoft IIS Response Object DoS
7339| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
7340| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
7341| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
7342| [3500] Microsoft IIS fpcount.exe Remote Overflow
7343| [3341] Microsoft IIS Redirect Response XSS
7344| [3339] Microsoft IIS HTTP Error Page XSS
7345| [3338] Microsoft IIS Help File XSS
7346| [3328] Microsoft IIS FTP Status Request DoS
7347| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
7348| [3325] Microsoft IIS HTR ISAPI Overflow
7349| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
7350| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
7351| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
7352| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
7353| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
7354| [3231] Microsoft IIS Log Bypass
7355| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
7356| [1931] Microsoft IIS MIME Content-Type Header DoS
7357| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
7358| [1826] Microsoft IIS Domain Guest Account Disclosure
7359| [1824] Microsoft IIS FTP DoS
7360| [1804] Microsoft IIS Long Request Parsing Remote DoS
7361| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
7362| [1750] Microsoft IIS File Fragment Disclosure
7363| [1543] Microsoft NT/IIS Invalid URL Request DoS
7364| [1504] Microsoft IIS File Permission Canonicalization Bypass
7365| [1465] Microsoft IIS .htr Missing Variable DoS
7366| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
7367| [1322] Microsoft IIS Malformed .htr Request DoS
7368| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
7369| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
7370| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
7371| [1170] Microsoft IIS Escape Character URL Access Bypass
7372| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
7373| [1082] Microsoft IIS Domain Resolution Access Bypass
7374| [1041] Microsoft IIS Malformed HTTP Request Header DoS
7375| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
7376| [930] Microsoft IIS Shared ASP Cache Information Disclosure
7377| [929] Microsoft IIS FTP Server NLST Command Overflow
7378| [928] Microsoft IIS Long Request Log Evasion
7379| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
7380| [814] Microsoft IIS global.asa Remote Information Disclosure
7381| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
7382| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
7383| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
7384| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
7385| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
7386| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
7387| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
7388| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
7389| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
7390| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
7391| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
7392| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
7393| [473] Microsoft IIS Multiple .cnf File Information Disclosure
7394| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
7395| [470] Microsoft IIS Form_JScript.asp XSS
7396| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
7397| [436] Microsoft IIS Unicode Remote Command Execution
7398| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
7399| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
7400| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
7401| [308] Microsoft IIS Malformed File Extension URL DoS
7402| [285] Microsoft IIS repost.asp File Upload
7403| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
7404| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
7405| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
7406| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
7407| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
7408| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
7409| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
7410| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
7411| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
7412| [98] Microsoft IIS perl.exe HTTP Path Disclosure
7413| [97] Microsoft IIS ISM.DLL HTR Request Overflow
7414| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
7415| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
7416| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
7417| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
7418| [2] Microsoft IIS ExAir search.asp Direct Request DoS
7419|_
7420443/tcp open ssl/http Microsoft IIS httpd 8.5
7421|_http-server-header: Microsoft-IIS/8.5
7422| vulscan: VulDB - https://vuldb.com:
7423| [68193] Microsoft IIS 8.0/8.5 IP and Domain Restriction privilege escalation
7424| [48519] Microsoft Works 8.5/9.0 memory corruption
7425| [45763] Microsoft Windows Live Messenger up to 8.5.1 unknown vulnerability
7426| [141563] Microsoft Windows up to RT 8.1 Remote Desktop privilege escalation
7427| [141562] Microsoft Windows up to RT 8.1 Remote Desktop privilege escalation
7428| [134730] Microsoft Skype 8.35 on Android Bluetooth Listening information disclosure
7429| [129845] Microsoft Skype for Business 2015 CU 8 Request cross site scripting
7430| [126799] Microsoft Dynamics 365 8 Web Request Code Execution
7431| [126798] Microsoft Dynamics 365 8 Web Request cross site scripting
7432| [126797] Microsoft Dynamics 365 8 Web Request cross site scripting
7433| [126796] Microsoft Dynamics 365 8 Web Request cross site scripting
7434| [126795] Microsoft Dynamics 365 8 Web Request cross site scripting
7435| [123872] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 SMB information disclosure
7436| [121108] Microsoft Mail Client 8.1 information disclosure
7437| [115260] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache cross site scripting
7438| [115259] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache Cookie Stack-based memory corruption
7439| [113264] Microsoft Windows 8.1/RT 8.1/Server 2012 R2 SMBv2/SMBv3 denial of service
7440| [100989] Microsoft Internet Explorer 8/9/10/11 memory corruption
7441| [100918] Microsoft Windows 8/8.1/10/Server 2012/Server 2016 Malware Protection Service Type Confusion privilege escalation
7442| [96521] Microsoft Windows 8.1/10/Server 2012/Server 2016 SMB Response mrxsmb20.sys denial of service
7443| [93988] Microsoft Desktop Client for Mac up to 8.0.36 privilege escalation
7444| [93755] Microsoft Internet Explorer 8 Ls\xC2\xADFind\xC2\xADSpan\xC2\xADVisual\xC2\xADBoundaries memory corruption
7445| [93535] Microsoft Internet Explorer 8/9/10/11 Regex vbscript.dll RegExpComp::PnodeParse memory corruption
7446| [93386] Microsoft Windows Vista SP2/7 SP1/8.1/RT 8.1/10 Video Control memory corruption
7447| [92587] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 Transaction Manager privilege escalation
7448| [92585] Microsoft Windows Vista SP2/7 SP1/8.1/RT 8.1/10 Video Control privilege escalation
7449| [91571] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
7450| [91570] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
7451| [91559] Microsoft Windows 8.1/10/RT 8.1 NTLM SSO information disclosure
7452| [90711] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF privilege escalation
7453| [90710] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 Netlogon privilege escalation
7454| [87959] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
7455| [87958] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF memory corruption
7456| [87957] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
7457| [87156] Microsoft Windows 8.1/10/RT 8.1/Server 2012 R2 Shell memory corruption
7458| [87155] Microsoft Windows Vista SP2/7/8.1/RT 8.1/10 Journal memory corruption
7459| [82223] Microsoft Windows 8.1/10/Server 2012 R2 Hyper-V Memory information disclosure
7460| [82222] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Memory information disclosure
7461| [82221] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Hyper-V privilege escalation
7462| [81270] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library memory corruption
7463| [80865] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 DLL Loader memory corruption
7464| [80860] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Reader memory corruption
7465| [80859] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF Library memory corruption
7466| [80844] Microsoft Internet Explorer 8/9/10/11 MSHTML MSHTML!Method_VARIANTBOOLp_BSTR_o0oVARIANT memory corruption
7467| [80209] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript memory corruption
7468| [79462] Microsoft Internet Explorer 8/9/10/11 memory corruption
7469| [79460] Microsoft Internet Explorer 8/9 memory corruption
7470| [79458] Microsoft Internet Explorer 8/9 memory corruption
7471| [79457] Microsoft Internet Explorer 8/9 memory corruption
7472| [79455] Microsoft Internet Explorer 8/9/10/11 XSS Filter privilege escalation
7473| [79449] Microsoft Internet Explorer 8/9/10/11 XSS Filter privilege escalation
7474| [79448] Microsoft Internet Explorer 8/9/10/11 Scripting Engine memory corruption
7475| [79447] Microsoft Internet Explorer 8/9/10/11 Scripting Engine information disclosure
7476| [79445] Microsoft Internet Explorer 8/9/10/11 memory corruption
7477| [79162] Microsoft Internet Explorer 8/9/10/11 Scripting Engine memory corruption
7478| [79155] Microsoft Internet Explorer 8/9/10/11 memory corruption
7479| [79143] Microsoft Internet Explorer 8/9/10/11 memory corruption
7480| [78390] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine information disclosure
7481| [78386] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine memory corruption
7482| [78384] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine ASLR privilege escalation
7483| [78379] Microsoft Internet Explorer 8/9/10/11 EditWith Broker privilege escalation
7484| [78377] Microsoft Internet Explorer 8 privilege escalation
7485| [78362] Microsoft Internet Explorer 8/9/10/11 VBScript/JScript Engine RegExpBase::FBadHeader memory corruption
7486| [77605] Microsoft Internet Explorer 8 VBScript/JScript Engine memory corruption
7487| [77006] Microsoft Internet Explorer 8/9/10/11 memory corruption
7488| [77004] Microsoft Internet Explorer 8/9/10/11 memory corruption
7489| [76490] Microsoft Internet Explorer 8/9/10/11 Image Caching History information disclosure
7490| [76482] Microsoft Internet Explorer 8 memory corruption
7491| [76479] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
7492| [76474] Microsoft Internet Explorer 8/9 memory corruption
7493| [76449] Microsoft Windows 8/8.1/Server 2008/Server 2012/Server 2012 R2 Hyper-V memory corruption
7494| [76448] Microsoft Windows 8.1/Server 2012 R2 Hyper-V memory corruption
7495| [76437] Microsoft Internet Explorer 8/9 memory corruption
7496| [75780] Microsoft Internet Explorer 8 memory corruption
7497| [75707] Cisco Unified MeetingPlace for Microsoft Outlook 8.6(1.2)/ 8.6(1.9) cross site scripting
7498| [75322] Microsoft Internet Explorer 8/9 memory corruption
7499| [75319] Microsoft Internet Explorer 8/9/10/11 memory corruption
7500| [75311] Microsoft Internet Explorer 8/9 memory corruption
7501| [75308] Microsoft Internet Explorer 8/9/10/11 VBscript and JScript Engine privilege escalation
7502| [75306] Microsoft Internet Explorer 8/9/10/11 VBScript Engine privilege escalation
7503| [74856] Microsoft Internet Explorer 8/9/10/11 memory corruption
7504| [74842] Microsoft Windows 8.1/Server 2012 R2 Hyper-V denial of service
7505| [73946] Microsoft Internet Explorer 8/9/10/11 memory corruption
7506| [73943] Microsoft Internet Explorer 8 memory corruption
7507| [73939] Microsoft Internet Explorer 8/9/10/11 VBScript Engine memory corruption
7508| [69137] Microsoft Internet Explorer 8 ASLR privilege escalation
7509| [69136] Microsoft Internet Explorer 8/9 MSHTML SpanQualifier memory corruption
7510| [69135] Microsoft Internet Explorer 8/10 memory corruption
7511| [69131] Microsoft Internet Explorer 8/9 memory corruption
7512| [69130] Microsoft Internet Explorer 8/9/10/11 memory corruption
7513| [68400] Microsoft Internet Explorer 8 memory corruption
7514| [68393] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
7515| [68389] Microsoft Internet Explorer 8/9/10/11 XSS Filter cross site scripting
7516| [68181] Microsoft Internet Explorer 8/9/10/11 memory corruption
7517| [68176] Microsoft Internet Explorer 8/9/10/11 information disclosure
7518| [68174] Microsoft Internet Explorer 8/9 memory corruption
7519| [68169] Microsoft Internet Explorer 8/9 ASLR privilege escalation
7520| [68211] Microsoft Internet Explorer 8/9/10/11 denial of service
7521| [67821] Microsoft Internet Explorer 8/9/10/11 CAttrArray memory corruption
7522| [67813] Microsoft Internet Explorer 8 memory corruption
7523| [67500] Microsoft Internet Explorer 8/9/10/11 memory corruption
7524| [67494] Microsoft Internet Explorer 8/9/10/11 memory corruption
7525| [67345] Microsoft Internet Explorer 8/9/10/11 memory corruption
7526| [67340] Microsoft Internet Explorer 8 memory corruption
7527| [67337] Microsoft Internet Explorer 8/9 memory corruption
7528| [67007] Microsoft Internet Explorer 8/9/10/11 memory corruption
7529| [67006] Microsoft Internet Explorer 8/9/10 memory corruption
7530| [67002] Microsoft Internet Explorer 8/9/10/11 memory corruption
7531| [67000] Microsoft Internet Explorer 8/9/10/11 memory corruption
7532| [66995] Microsoft Internet Explorer 8/9/10/11 memory corruption
7533| [13542] Microsoft Internet Explorer 8/9/10/11 privilege escalation
7534| [13536] Microsoft Internet Explorer 8 memory corruption
7535| [13518] Microsoft Internet Explorer 8 memory corruption
7536| [13515] Microsoft Internet Explorer 8/9/10/11 memory corruption
7537| [13509] Microsoft Internet Explorer 8 memory corruption
7538| [13499] Microsoft Internet Explorer 8 memory corruption
7539| [13496] Microsoft Internet Explorer 8/9/10/11 privilege escalation
7540| [13027] Microsoft Internet Explorer 8/9 information disclosure
7541| [66605] Microsoft Internet Explorer 8/9/10/11 memory corruption
7542| [12543] Microsoft Internet Explorer 8/9/10/11 memory corruption
7543| [12541] Microsoft Internet Explorer 8/9/10 memory corruption
7544| [12540] Microsoft Internet Explorer 8/9/10/11 memory corruption
7545| [12538] Microsoft Internet Explorer 8/9 memory corruption
7546| [12531] Microsoft Internet Explorer 8/9/10/11 memory corruption
7547| [66445] Microsoft Windows 8.0/8.1 XMLDOM ActiveX Control information disclosure
7548| [12252] Microsoft Internet Explorer 8 memory corruption
7549| [12245] Microsoft Internet Explorer 8/9/10/11 memory corruption
7550| [12239] Microsoft Internet Explorer 8/9/10/11 privilege escalation
7551| [12238] Microsoft Windows 8/RT/Server 2012 IPv6 denial of service
7552| [11150] Microsoft Windows 8/Server 2012 Hyper-V Data Structure Value Crash privilege escalation
7553| [11141] Microsoft Internet Explorer 8/9/10/11 CCaret Object Use-After-Free memory corruption
7554| [11138] Microsoft Internet Explorer 8/9/10/11 CTreePos Object memory corruption
7555| [10623] Microsoft Internet Explorer 8/9 memory corruption
7556| [10215] Microsoft Internet Explorer 8/9 memory corruption
7557| [10214] Microsoft Internet Explorer 8/9/10 memory corruption
7558| [9935] Microsoft Internet Explorer 8/9 memory corruption
7559| [9934] Microsoft Internet Explorer 8/9/10 memory corruption
7560| [9933] Microsoft Internet Explorer 8/9 memory corruption
7561| [9932] Microsoft Internet Explorer 8/9 memory corruption
7562| [10246] Microsoft Internet Explorer 8 Table Tree Use-After-Free memory corruption
7563| [9419] Microsoft Internet Explorer up to 8 memory corruption
7564| [9418] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
7565| [9413] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
7566| [9406] Microsoft Internet Explorer 8/9/10 memory corruption
7567| [9099] Microsoft Internet Explorer 8/9 Use-After-Free memory corruption
7568| [9098] Microsoft Internet Explorer 8 memory corruption
7569| [9095] Microsoft Internet Explorer 8/9/10 Use-After-Free memory corruption
7570| [9084] Microsoft Internet Explorer 8/9/10 _UpdateButtonLocation memory corruption
7571| [9083] Microsoft Internet Explorer 8/9 memory corruption
7572| [8722] Microsoft Windows 8/RT/Server 2012 HTTP.sys denial of service
7573| [8718] Microsoft Internet Explorer 8 memory corruption
7574| [8714] Microsoft Internet Explorer 8/9 memory corruption
7575| [8712] Microsoft Internet Explorer 8/9 memory corruption
7576| [8601] Microsoft Internet Explorer 8 'vtable' memory corruption
7577| [8423] Microsoft Internet Explorer up to 8.00.6001.18702 CSS iexplorer.exe denial of service
7578| [7962] Microsoft Internet Explorer up to 8 CTreeNode memory corruption
7579| [7958] Microsoft Internet Explorer up to 8 Celement memory corruption
7580| [7996] Microsoft Windows 8 TrueType Font denial of service
7581| [63558] Microsoft Internet Explorer 8 Use-After-Free memory corruption
7582| [63557] Microsoft Internet Explorer 8/9 Use-After-Free memory corruption
7583| [7511] Microsoft Internet Explorer 8/9 TCP Session information disclosure
7584| [7510] Microsoft Internet Explorer 8/9 HTTP/HTTPS Request spoofing
7585| [7258] Microsoft Windows up to 8/Server 2012 SSL/TLS race condition
7586| [7199] Microsoft Internet Explorer 8/9 mshtml.dll Unclosed Tags Sequence denial of service
7587| [6513] Microsoft Internet Explorer 8/9 OnMove Engine Use-After-Free memory corruption
7588| [5937] Microsoft Internet Explorer 8/9 JavaScript Parser memory corruption
7589| [5538] Microsoft Internet Explorer 8 Same ID Property Deleted Object memory corruption
7590| [5532] Microsoft Internet Explorer 8/9 HTML Sanitization toStaticHTML String information disclosure
7591| [5530] Microsoft Internet Explorer 8/9 OnRowsInserted Elements memory corruption
7592| [5516] Microsoft Internet Explorer 8/9 memory corruption
7593| [4467] Microsoft Internet Explorer 8 cross site scripting
7594| [4454] Microsoft Internet Explorer 8/9 unknown vulnerability
7595| [59618] Microsoft Internet Explorer 8 unknown vulnerability
7596| [57681] Microsoft Internet Explorer 8/9 memory corruption
7597| [57675] Microsoft Internet Explorer 8 memory corruption
7598| [4372] Microsoft Internet Explorer 8/9 information disclosure
7599| [57130] Microsoft Internet Explorer 8 on Win7 msxml.dll unknown vulnerability
7600| [4340] Microsoft Internet Explorer up to 8 unknown vulnerability
7601| [56786] Microsoft Internet Explorer 8 on Win7 unknown vulnerability
7602| [56785] Microsoft Internet Explorer 8 on Win7 memory corruption
7603| [56412] Microsoft Internet Explorer 8 IEShims.dll unknown vulnerability
7604| [55755] Microsoft Internet Explorer 8 memory corruption
7605| [54961] Microsoft Internet Explorer 8 mshtml.dll InsertIntoTimeoutList information disclosure
7606| [4172] Microsoft Internet Explorer up to 8 CSS cross site scripting
7607| [54339] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
7608| [53805] Microsoft Internet Explorer 8 unknown vulnerability
7609| [53514] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
7610| [53513] Microsoft Internet Explorer 8 memory corruption
7611| [4137] Microsoft Internet Explorer up to 8.0 memory corruption
7612| [4121] Microsoft Internet Explorer 8 XSS Filter cross site scripting
7613| [52505] Microsoft Internet Explorer 8 mstime.dll memory corruption
7614| [52373] Microsoft Internet Explorer 8 on Win7 Use-After-Free memory corruption
7615| [52372] Microsoft Internet Explorer 8 on Win7 Heap-based memory corruption
7616| [51652] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
7617| [51651] Microsoft Internet Explorer 8 Uninitialized Memory memory corruption
7618| [50914] Microsoft Internet Explorer 8 cross site scripting
7619| [50910] Microsoft Internet Explorer 8 unknown vulnerability
7620| [4048] Microsoft Internet Explorer up to 8 CSS Declaration memory corruption
7621| [4047] Microsoft Internet Explorer up to 8 DOM Object memory corruption
7622| [4046] Microsoft Internet Explorer up to 8 HTML memory corruption
7623| [3987] Microsoft Internet Explorer up to 8 Row Reference memory corruption
7624| [3982] Microsoft Internet Explorer up to 8 DHTML Call memory corruption
7625| [47244] Microsoft Internet Explorer 8 on Win 7 memory corruption
7626| [45681] Microsoft Internet Explorer 8 Beta 2 privilege escalation
7627| [45451] Microsoft Internet Explorer 8 XSS Filter cross site scripting
7628| [45450] Microsoft Internet Explorer 8 XSS Filter Protection cross site scripting
7629| [45449] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
7630| [45448] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
7631| [45447] Microsoft Internet Explorer 8 XSS Filter cross site scripting
7632| [45446] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
7633| [39012] Microsoft Windows Live Messenger up to 8.1 doc memory corruption
7634| [34991] Microsoft Visual Studio 8.0 msvcr80.dll denial of service
7635| [33589] Microsoft Windows Live Messenger up to 8.0 denial of service
7636|
7637| MITRE CVE - https://cve.mitre.org:
7638| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
7639| [CVE-2011-1215] Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
7640| [CVE-2010-3496] McAfee VirusScan Enterprise 8.5i and 8.7i does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.
7641| [CVE-2009-3126] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Integer Overflow Vulnerability."
7642| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
7643| [CVE-2009-2504] Multiple integer overflows in unspecified APIs in GDI+ in Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1 and SP2, Windows XP SP2 and SP3, Windows Server 2003 SP2, Vista Gold and SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allow remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "GDI+ .NET API Vulnerability."
7644| [CVE-2009-2503] GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Windows Server 2003 SP2, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 does not properly allocate an unspecified buffer, which allows remote attackers to execute arbitrary code via a crafted TIFF image file that triggers memory corruption, aka "GDI+ TIFF Memory Corruption Vulnerability."
7645| [CVE-2009-2502] Buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted TIFF image file, aka "GDI+ TIFF Buffer Overflow Vulnerability."
7646| [CVE-2009-2501] Heap-based buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Heap Overflow Vulnerability."
7647| [CVE-2009-2500] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted WMF image file, aka "GDI+ WMF Integer Overflow Vulnerability."
7648| [CVE-2009-1533] Buffer overflow in the Works for Windows document converters in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, and Works 8.5 and 9 allows remote attackers to execute arbitrary code via a crafted Works .wps file that triggers memory corruption, aka "File Converter Buffer Overflow Vulnerability."
7649| [CVE-2008-5828] Microsoft Windows Live Messenger Client 8.5.1 and earlier, when MSN Protocol Version 15 (MSNP15) is used over a NAT session, allows remote attackers to discover intranet IP addresses and port numbers by reading the (1) IPv4InternalAddrsAndPorts, (2) IPv4Internal-Addrs, and (3) IPv4Internal-Port header fields.
7650| [CVE-2007-0045] Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
7651| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
7652| [CVE-2002-1117] Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
7653| [CVE-2001-1088] Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user.
7654| [CVE-2013-3661] The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
7655| [CVE-2013-3660] The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
7656| [CVE-2013-3174] DirectShow in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted GIF file, aka "DirectShow Arbitrary Memory Overwrite Vulnerability."
7657| [CVE-2013-3173] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overwrite Vulnerability."
7658| [CVE-2013-3164] Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
7659| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
7660| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
7661| [CVE-2013-3149] Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
7662| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
7663| [CVE-2013-3141] Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3110.
7664| [CVE-2013-3138] Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability."
7665| [CVE-2013-3136] The kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly handle unspecified page-fault system calls, which allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Kernel Information Disclosure Vulnerability."
7666| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
7667| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
7668| [CVE-2013-3110] Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3141.
7669| [CVE-2013-2558] Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report.
7670| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
7671| [CVE-2013-1451] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not ensure that the SSL lock icon is consistent with the Address bar, which makes it easier for remote attackers to spoof web sites via a crafted HTML document that triggers many HTTPS requests to an arbitrary host, followed by an HTTPS request to a trusted host and then an HTTP request to an untrusted host, a related issue to CVE-2013-1450.
7672| [CVE-2013-1450] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensitive information intended for a specific host via a crafted HTML document that triggers many HTTPS requests and then triggers an HTTP request to that host, as demonstrated by reading a Cookie header, aka MSRC 12096gd.
7673| [CVE-2013-1347] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
7674| [CVE-2013-1345] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
7675| [CVE-2013-1340] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."
7676| [CVE-2013-1339] The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability."
7677| [CVE-2013-1334] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."
7678| [CVE-2013-1332] dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
7679| [CVE-2013-1311] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
7680| [CVE-2013-1307] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
7681| [CVE-2013-1305] HTTP.sys in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP header, aka "HTTP.sys Denial of Service Vulnerability."
7682| [CVE-2013-1300] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
7683| [CVE-2013-1297] Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."
7684| [CVE-2013-1294] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
7685| [CVE-2013-1292] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
7686| [CVE-2013-1291] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 Gold and SP1, and Windows 8 allows local users to cause a denial of service (reboot) via a crafted OpenType font, aka "OpenType Font Parsing Vulnerability" or "Win32k Font Parsing Vulnerability."
7687| [CVE-2013-1288] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CTreeNode Use After Free Vulnerability."
7688| [CVE-2013-1287] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286.
7689| [CVE-2013-1286] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287.
7690| [CVE-2013-1285] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.
7691| [CVE-2013-1284] Race condition in the kernel in Microsoft Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
7692| [CVE-2013-1283] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
7693| [CVE-2013-1280] The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Reference Count Vulnerability."
7694| [CVE-2013-1279] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1278.
7695| [CVE-2013-1278] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1279.
7696| [CVE-2013-1249] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
7697| [CVE-2013-1248] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
7698| [CVE-2013-0811] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1307.
7699| [CVE-2013-0091] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."
7700| [CVE-2013-0078] The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka "Microsoft Antimalware Improper Pathname Vulnerability."
7701| [CVE-2013-0075] The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
7702| [CVE-2013-0025] Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
7703| [CVE-2013-0024] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."
7704| [CVE-2013-0013] The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
7705| [CVE-2013-0008] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
7706| [CVE-2012-4792] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
7707| [CVE-2012-4786] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
7708| [CVE-2012-2897] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability."
7709| [CVE-2012-2557] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."
7710| [CVE-2012-2556] The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."
7711| [CVE-2012-2523] Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit platforms allows remote attackers to execute arbitrary code by leveraging an incorrect size calculation during object copying, aka "JavaScript Integer Overflow Remote Code Execution Vulnerability."
7712| [CVE-2012-1881] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability."
7713| [CVE-2012-1875] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability."
7714| [CVE-2012-1874] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows user-assisted remote attackers to execute arbitrary code by accessing a deleted object, aka "Developer Toolbar Remote Code Execution Vulnerability."
7715| [CVE-2012-1858] The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability."
7716| [CVE-2012-1856] The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."
7717| [CVE-2012-1848] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Scrollbar Calculation Vulnerability."
7718| [CVE-2012-1537] Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka "DirectPlay Heap Overflow Vulnerability."
7719| [CVE-2012-1529] Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."
7720| [CVE-2012-1528] Integer overflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Overflow Vulnerability."
7721| [CVE-2012-1527] Integer underflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Underflow Vulnerability."
7722| [CVE-2012-1523] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability."
7723| [CVE-2012-0181] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly manage Keyboard Layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout File Vulnerability."
7724| [CVE-2012-0180] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."
7725| [CVE-2012-0172] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability."
7726| [CVE-2012-0159] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview
7727| [CVE-2012-0151] The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."
7728| [CVE-2011-2382] Microsoft Internet Explorer 8 and earlier, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue.
7729| [CVE-2011-1999] Microsoft Internet Explorer 8 does not properly allocate and access memory, which allows remote attackers to execute arbitrary code via vectors involving a "dereferenced memory address," aka "Select Element Remote Code Execution Vulnerability."
7730| [CVE-2011-1996] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Option Element Remote Code Execution Vulnerability."
7731| [CVE-2011-1992] The XSS Filter in Microsoft Internet Explorer 8 allows remote attackers to read content from a different (1) domain or (2) zone via a "trial and error" attack, aka "XSS Filter Information Disclosure Vulnerability."
7732| [CVE-2011-1713] Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.
7733| [CVE-2011-1347] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process, as demonstrated by Stephen Fewer as the third of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
7734| [CVE-2011-1346] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, as demonstrated by Stephen Fewer as the second of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
7735| [CVE-2011-1345] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability."
7736| [CVE-2011-1266] The Vector Markup Language (VML) implementation in vgx.dll in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "VML Memory Corruption Vulnerability."
7737| [CVE-2011-1260] Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."
7738| [CVE-2011-1258] Microsoft Internet Explorer 6 through 8 does not properly restrict web script, which allows user-assisted remote attackers to obtain sensitive information from a different (1) domain or (2) zone via vectors involving a drag-and-drop operation, aka "Drag and Drop Information Disclosure Vulnerability."
7739| [CVE-2011-1257] Race condition in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors involving access to an object, aka "Window Open Race Condition Vulnerability."
7740| [CVE-2011-1256] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "DOM Modification Memory Corruption Vulnerability."
7741| [CVE-2011-1255] The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability."
7742| [CVE-2011-1254] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Drag and Drop Memory Corruption Vulnerability."
7743| [CVE-2011-1252] Cross-site scripting (XSS) vulnerability in the SafeHTML function in the toStaticHTML API in Microsoft Internet Explorer 7 and 8, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified strings, aka "toStaticHTML Information Disclosure Vulnerability" or "HTML Sanitization Vulnerability."
7744| [CVE-2011-1251] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "DOM Manipulation Memory Corruption Vulnerability."
7745| [CVE-2011-1246] Microsoft Internet Explorer 8 does not properly handle content settings in HTTP responses, which allows remote web servers to obtain sensitive information from a different (1) domain or (2) zone via a crafted response, aka "MIME Sniffing Information Disclosure Vulnerability."
7746| [CVE-2011-1244] Microsoft Internet Explorer 6, 7, and 8 does not enforce intended domain restrictions on content access, which allows remote attackers to obtain sensitive information or conduct clickjacking attacks via a crafted web site, aka "Frame Tag Information Disclosure Vulnerability."
7747| [CVE-2011-0346] Use-after-free vulnerability in the ReleaseInterface function in MSHTML.DLL in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the DOM implementation and the BreakAASpecial and BreakCircularMemoryReferences functions, as demonstrated by cross_fuzz, aka "MSHTML Memory Corruption Vulnerability."
7748| [CVE-2011-0038] Untrusted search path vulnerability in Microsoft Internet Explorer 8 might allow local users to gain privileges via a Trojan horse IEShims.dll in the current working directory, as demonstrated by a Desktop directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."
7749| [CVE-2011-0036] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, relagted to a "dangling pointer," aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0035.
7750| [CVE-2011-0035] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0036.
7751| [CVE-2010-5071] The JavaScript implementation in Microsoft Internet Explorer 8.0 and earlier does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method.
7752| [CVE-2010-3971] Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability."
7753| [CVE-2010-3964] Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
7754| [CVE-2010-3962] Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
7755| [CVE-2010-3886] The CTimeoutEventList::InsertIntoTimeoutList function in Microsoft mshtml.dll uses a certain pointer value as part of producing Timer ID values for the setTimeout and setInterval methods in VBScript and JScript, which allows remote attackers to obtain sensitive information about the heap memory addresses used by an application, as demonstrated by the Internet Explorer 8 application.
7756| [CVE-2010-3348] Microsoft Internet Explorer 6, 7, and 8 does not prevent rendering of cached content as HTML, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Cross-Domain Information Disclosure Vulnerability," a different vulnerability than CVE-2010-3342.
7757| [CVE-2010-3346] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
7758| [CVE-2010-3345] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
7759| [CVE-2010-3342] Microsoft Internet Explorer 6, 7, and 8 does not prevent rendering of cached content as HTML, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Cross-Domain Information Disclosure Vulnerability," a different vulnerability than CVE-2010-3348.
7760| [CVE-2010-3331] Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory in certain circumstances involving use of Microsoft Word to read Word documents, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7761| [CVE-2010-3330] Microsoft Internet Explorer 6 through 8 does not properly restrict script access to content from a different (1) domain or (2) zone, which allows remote attackers to obtain sensitive information via a crafted web site, aka "Cross-Domain Information Disclosure Vulnerability."
7762| [CVE-2010-3329] mshtmled.dll in Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code via a crafted Microsoft Office document that causes the HtmlDlgHelper class destructor to access uninitialized memory, aka "Uninitialized Memory Corruption Vulnerability."
7763| [CVE-2010-3328] Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."
7764| [CVE-2010-3327] The implementation of HTML content creation in Microsoft Internet Explorer 6 through 8 does not remove the Anchor element during pasting and editing, which might allow remote attackers to obtain sensitive deleted information by visiting a web page, aka "Anchor Element Information Disclosure Vulnerability."
7765| [CVE-2010-3325] Microsoft Internet Explorer 6 through 8 does not properly handle unspecified special characters in Cascading Style Sheets (CSS) documents, which allows remote attackers to obtain sensitive information from a different (1) domain or (2) zone via a crafted web site, aka "CSS Special Character Information Disclosure Vulnerability."
7766| [CVE-2010-3324] The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257.
7767| [CVE-2010-3243] Cross-site scripting (XSS) vulnerability in the toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2 and Office SharePoint Server 2007 SP2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "HTML Sanitization Vulnerability."
7768| [CVE-2010-2560] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Layout Memory Corruption Vulnerability."
7769| [CVE-2010-2559] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, CVE-2010-0245, and CVE-2010-0246.
7770| [CVE-2010-2558] Race condition in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to an object in memory, aka "Race Condition Memory Corruption Vulnerability."
7771| [CVE-2010-2556] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7772| [CVE-2010-2442] Microsoft Internet Explorer, possibly 8, does not properly restrict focus changes, which allows remote attackers to read keystrokes via "cross-domain IFRAME gadgets."
7773| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
7774| [CVE-2010-2118] Microsoft Internet Explorer 6.0.2900.2180 and 8.0.7600.16385 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid news:// URIs.
7775| [CVE-2010-2091] Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value.
7776| [CVE-2010-1991] Microsoft Internet Explorer 6.0.2900.2180, 7, and 8.0.7600.16385 executes a mail application in situations where an IFRAME element has a mailto: URL in its SRC attribute, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many IFRAME elements.
7777| [CVE-2010-1489] The XSS Filter in Microsoft Internet Explorer 8 does not properly perform neutering for the SCRIPT tag, which allows remote attackers to conduct cross-site scripting (XSS) attacks against web sites that have no inherent XSS vulnerabilities, a different issue than CVE-2009-4074.
7778| [CVE-2010-1262] Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a free of the root container, aka "Memory Corruption Vulnerability."
7779| [CVE-2010-1261] The IE8 Developer Toolbar in Microsoft Internet Explorer 8 SP1, SP2, and SP3 allows user-assisted remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7780| [CVE-2010-1260] The IE8 Developer Toolbar in Microsoft Internet Explorer 8 SP1, SP2, and SP3 allows user-assisted remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
7781| [CVE-2010-1259] Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7782| [CVE-2010-1258] Microsoft Internet Explorer 6, 7, and 8 does not properly determine the origin of script code, which allows remote attackers to execute script in an unintended domain or security zone, and obtain sensitive information, via unspecified vectors, aka "Event Handler Cross-Domain Vulnerability."
7783| [CVE-2010-1118] Unspecified vulnerability in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a use-after-free issue, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
7784| [CVE-2010-1117] Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
7785| [CVE-2010-0811] Multiple unspecified vulnerabilities in the Microsoft Internet Explorer 8 Developer Tools ActiveX control in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via unknown vectors that "corrupt the system state," aka "Microsoft Internet Explorer 8 Developer Tools Vulnerability."
7786| [CVE-2010-0555] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving the product's use of text/html as the default content type for files that are encountered after a redirection, aka the URLMON sniffing vulnerability, a variant of CVE-2009-1140 and related to CVE-2008-1448.
7787| [CVE-2010-0494] Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability."
7788| [CVE-2010-0492] Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and destruction of markup, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
7789| [CVE-2010-0490] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7790| [CVE-2010-0255] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving JavaScript exploit code that constructs a reference to a file://127.0.0.1 URL, aka the dynamic OBJECT tag vulnerability, as demonstrated by obtaining the data from an index.dat file, a variant of CVE-2009-1140 and related to CVE-2008-1448.
7791| [CVE-2010-0249] Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4
7792| [CVE-2010-0248] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
7793| [CVE-2010-0246] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, and CVE-2010-0245.
7794| [CVE-2010-0245] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, and CVE-2010-0246.
7795| [CVE-2010-0244] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2530 and CVE-2009-2531.
7796| [CVE-2010-0112] Multiple SQL injection vulnerabilities in the Administrative Interface in the IIS extension in Symantec IM Manager before 8.4.16 allow remote attackers to execute arbitrary SQL commands via (1) the rdReport parameter to rdpageimlogic.aspx, related to the sGetDefinition function in rdServer.dll, and SQL statements contained within a certain report file
7797| [CVE-2010-0027] The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."
7798| [CVE-2009-4074] The XSS Filter in Microsoft Internet Explorer 8 allows remote attackers to leverage the "response-changing mechanism" to conduct cross-site scripting (XSS) attacks against web sites that have no inherent XSS vulnerabilities, related to the details of output encoding and improper modification of an HTML attribute, aka "XSS Filter Script Handling Vulnerability."
7799| [CVE-2009-4073] The printing functionality in Microsoft Internet Explorer 8 allows remote attackers to discover a local pathname, and possibly a local username, by reading the dc:title element of a PDF document that was generated from a local web page.
7800| [CVE-2009-3674] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671.
7801| [CVE-2009-3673] Microsoft Internet Explorer 7 and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
7802| [CVE-2009-3671] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
7803| [CVE-2009-3003] Microsoft Internet Explorer 6 through 8 allows remote attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary URL on the web site visited by the victim, as demonstrated by a visit to an attacker-controlled web page, which triggers a spoofed login form for the site containing that page.
7804| [CVE-2009-2764] Microsoft Internet Explorer 8.0.7100.0 on Windows 7 RC on the x64 platform allows remote attackers to cause a denial of service (application crash) via a certain DIV element in conjunction with SCRIPT elements that have empty contents and no reference to a valid external script location.
7805| [CVE-2009-2655] mshtml.dll in Microsoft Internet Explorer 7 and 8 on Windows XP SP3 allows remote attackers to cause a denial of service (application crash) by calling the JavaScript findText method with a crafted Unicode string in the first argument, and only one additional argument, as demonstrated by a second argument of -1.
7806| [CVE-2009-2536] Microsoft Internet Explorer 5 through 8 allows remote attackers to cause a denial of service (memory consumption and application crash) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
7807| [CVE-2009-2531] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2530.
7808| [CVE-2009-2530] Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2531.
7809| [CVE-2009-2529] Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not properly handle argument validation for unspecified variables, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Component Handling Vulnerability."
7810| [CVE-2009-2069] Microsoft Internet Explorer before 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request.
7811| [CVE-2009-2064] Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
7812| [CVE-2009-2057] Microsoft Internet Explorer before 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
7813| [CVE-2009-1532] Microsoft Internet Explorer 8 for Windows XP SP2 and SP3
7814| [CVE-2009-1335] Microsoft Internet Explorer 7 and 8 on Windows XP and Vista allows remote attackers to cause a denial of service (application hang) via a large document composed of unprintable characters, aka MSRC 9011jr.
7815| [CVE-2009-1043] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors triggered by clicking on a link, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
7816| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
7817| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
7818| [CVE-2009-1011] Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is for multiple integer overflows in a function that parses an optional data stream within a Microsoft Office file, leading to a heap-based buffer overflow.
7819| [CVE-2009-0084] Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."
7820| [CVE-2009-0072] Microsoft Internet Explorer 6.0 through 8.0 beta2 allows remote attackers to cause a denial of service (application crash) via an onload=screen[""] attribute value in a BODY element.
7821| [CVE-2008-5750] Argument injection vulnerability in Microsoft Internet Explorer 8 beta 2 on Windows XP SP3 allows remote attackers to execute arbitrary commands via the --renderer-path option in a chromehtml: URI.
7822| [CVE-2008-5556] ** DISPUTED ** The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not recognize attack patterns designed to operate against web pages that are encoded with utf-7, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting crafted utf-7 content. NOTE: the vendor reportedly disputes this issue, stating "Behaviour is by design."
7823| [CVE-2008-5555] Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
7824| [CVE-2008-5554] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attacks, as demonstrated by the (1) Location and (2) Set-Cookie HTTP headers. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
7825| [CVE-2008-5553] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 disables itself upon encountering a certain X-XSS-Protection HTTP header, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting this header after a CRLF sequence. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
7826| [CVE-2008-5552] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a utf-7 charset value. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
7827| [CVE-2008-5551] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
7828| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
7829| [CVE-2008-5416] Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier
7830| [CVE-2008-4295] Microsoft Windows Mobile 6.0 on HTC Wiza 200 and HTC MDA 8125 devices does not properly handle the first attempt to establish a Bluetooth connection to a peer with a long name, which allows remote attackers to cause a denial of service (device reboot) by configuring a Bluetooth device with a long hci name and (1) connecting directly to the Windows Mobile system or (2) waiting for the Windows Mobile system to scan for nearby devices.
7831| [CVE-2008-4256] The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "Charts Control Memory Corruption Vulnerability."
7832| [CVE-2008-4255] Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and SP1 allows remote attackers to execute arbitrary code via an AVI file with a crafted stream length, which triggers an "allocation error" and memory corruption, aka "Windows Common AVI Parsing Overflow Vulnerability."
7833| [CVE-2008-4254] Multiple integer overflows in the Hierarchical FlexGrid ActiveX control (mshflxgd.ocx) in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allow remote attackers to execute arbitrary code via crafted (1) Rows and (2) Cols properties to the (a) ExpandAll and (b) CollapseAll methods, related to access of incorrectly initialized objects and corruption of the "system state," aka "Hierarchical FlexGrid Control Memory Corruption Vulnerability."
7834| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
7835| [CVE-2008-4252] The DataGrid ActiveX control in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "DataGrid Control Memory Corruption Vulnerability."
7836| [CVE-2008-4127] Mshtml.dll in Microsoft Internet Explorer 7 Gold 7.0.5730 and 8 Beta 8.0.6001 on Windows XP SP2 allows remote attackers to cause a denial of service (failure of subsequent image rendering) via a crafted PNG file, related to an infinite loop in the CDwnTaskExec::ThreadExec function.
7837| [CVE-2008-4110] Buffer overflow in the SQLVDIRLib.SQLVDirControl ActiveX control in Tools\Binn\sqlvdir.dll in Microsoft SQL Server 2000 (aka SQL Server 8.0) allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long URL in the second argument to the Connect method. NOTE: this issue is not a vulnerability in many environments, since the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
7838| [CVE-2008-3815] Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)3, 7.1 before 7.1(2)78, 7.2 before 7.2(4)16, 8.0 before 8.0(4)6, and 8.1 before 8.1(1)13, when configured as a VPN using Microsoft Windows NT Domain authentication, allows remote attackers to bypass VPN authentication via unknown vectors.
7839| [CVE-2008-3704] Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not "validating property values with boundary checks," as exploited in the wild in August 2008, aka "Masked Edit Control Memory Corruption Vulnerability."
7840| [CVE-2008-3015] Integer overflow in gdiplus.dll in GDI+ in Microsoft Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a BMP image file with a malformed BitMapInfoHeader that triggers a buffer overflow, aka "GDI+ BMP Integer Overflow Vulnerability."
7841| [CVE-2008-3014] Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka "GDI+ WMF Buffer Overrun Vulnerability."
7842| [CVE-2008-3013] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
7843| [CVE-2008-3012] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corruption Vulnerability."
7844| [CVE-2008-2948] Cross-domain vulnerability in Microsoft Internet Explorer 7 and 8 allows remote attackers to change the location property of a frame via the Object data type, and use a frame from a different domain to observe domain-independent events, as demonstrated by observing onkeydown events with caballero-listener. NOTE: according to Microsoft, this is a duplicate of CVE-2008-2947, possibly a different attack vector.
7845| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
7846| [CVE-2008-1544] The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote attackers to (1) conduct HTTP request splitting and HTTP request smuggling attacks via an incorrect Content-Length header, (2) access arbitrary virtual hosts via a modified Host header, (3) bypass referrer restrictions via an incorrect Referer header, and (4) bypass the same-origin policy and obtain sensitive information via a crafted request header.
7847| [CVE-2008-1444] Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability."
7848| [CVE-2008-0108] Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File Converter Field Length Vulnerability."
7849| [CVE-2008-0105] Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table Vulnerability."
7850| [CVE-2008-0011] Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."
7851| [CVE-2007-5348] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka "GDI+ VML Buffer Overrun Vulnerability."
7852| [CVE-2007-5277] Microsoft Internet Explorer 6 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80, a different issue than CVE-2006-4560.
7853| [CVE-2007-4916] Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument.
7854| [CVE-2007-4814] Buffer overflow in the SQLServer ActiveX control in the Distributed Management Objects OLE DLL (sqldmo.dll) 2000.085.2004.00 in Microsoft SQL Server Enterprise Manager 8.05.2004 allows remote attackers to execute arbitrary code via a long second argument to the Start method.
7855| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
7856| [CVE-2007-0842] The 64-bit versions of Microsoft Visual C++ 8.0 standard library (MSVCR80.DLL) time functions, including (1) localtime, (2) localtime_s, (3) gmtime, (4) gmtime_s, (5) ctime, (6) ctime_s, (7) wctime, (8) wctime_s, and (9) fstat, trigger an assertion error instead of a NULL pointer or EINVAL when processing a time argument later than Jan 1, 3000, which might allow context-dependent attackers to cause a denial of service (application exit) via large time values. NOTE: it could be argued that this is a design limitation of the functions, and the vulnerability lies with any application that does not validate arguments to these functions. However, this behavior is inconsistent with documentation, which does not list assertions as a possible result of an error condition.
7857| [CVE-2007-0216] wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vulnerability."
7858| [CVE-2007-0047] CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
7859| [CVE-2006-6252] Microsoft Windows Live Messenger 8.0 and earlier, when gestual emoticons are enabled, allows remote attackers to cause a denial of service (CPU consumption) via a long string composed of ":D" sequences, which are interpreted as emoticons.
7860| [CVE-2006-3654] Buffer overflow in wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote attackers to cause a denial of service (CPU consumption or crash) via crafted Excel files.
7861| [CVE-2006-3653] wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote attackers to cause a denial of service (CPU consumption or crash) via crafted (1) Works, (2) Excel, and (3) Lotus 1-2-3 files.
7862| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
7863| [CVE-2005-3182] Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well.
7864| [CVE-2005-3174] Microsoft Windows 2000 before Update Rollup 1 for SP4 allows users to log on to the domain, even when their password has expired, if the fully qualified domain name (FQDN) is 8 characters long.
7865| [CVE-2004-0540] Microsoft Windows 2000, when running in a domain whose Fully Qualified Domain Name (FQDN) is exactly 8 characters long, does not prevent users with expired passwords from logging on to the domain.
7866| [CVE-2003-0604] Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote attackers to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-location contains a File:// URL.
7867| [CVE-2002-2435] The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and earlier does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264.
7868| [CVE-2002-2380] NetDSL ADSL Modem 800 with Microsoft Network firmware 5.5.11 allows remote attackers to gain access to configuration menus by sniffing undocumented usernames and passwords from network traffic.
7869| [CVE-2002-0797] Buffer overflow in the MIB parsing component of mibiisa for Solaris 5.6 through 8 allows remote attackers to gain root privileges.
7870| [CVE-2001-0238] Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests.
7871|
7872| SecurityFocus - https://www.securityfocus.com/bid/:
7873| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
7874| [58847] Microsoft Windows Defender for Windows 8 and Windows RT Local Privilege Escalation Vulnerability
7875| [42467] Microsoft Internet Explorer 8 'toStaticHTML()' HTML Sanitization Bypass Weakness
7876| [40490] Microsoft Internet Explorer 8 Developer Tools Remote Code Execution Vulnerability
7877| [37135] Microsoft Internet Explorer 8 Cross-Site Scripting Filter Cross-Site Scripting Vulnerability
7878| [35941] Microsoft Internet Explorer 8 Denial of Service Vulnerability
7879|
7880| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7881| [40937] Microsoft Windows Knowledge Base Article 815495 update not installed
7882| [37226] Microsoft Windows Knowledge Base Article 815495 update not installed
7883| [19102] Microsoft Knowledge Base Article 885834 is not installed
7884| [19090] Microsoft Knowledge Base Article 885250 is not installed
7885| [18392] Microsoft Windows Knowledge Base Article 885249 update is not installed
7886| [18391] Microsoft Windows Knowledge Base Article 885835 update is not installed
7887| [18390] Microsoft Windows Knowledge Base Article 885836 update is not installed
7888| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
7889| [66402] Microsoft Windows kernel-mode driver (win32k.sys) variant 8 privilege escalation
7890| [57338] Microsoft Internet Explorer 8 Developer Tools code execution
7891| [24509] Microsoft Windows Knowledge Base Article 889167 update is not installed
7892| [22882] Microsoft Windows Knowledge Base Article 896424 update is not installed
7893| [22156] Microsoft Windows Knowledge Base Article 899589 update is not installed
7894| [22155] Microsoft Knowledge Base Article 896688 is not installed
7895| [22072] Microsoft Knowledge Base Article 899587 is not installed
7896| [22071] Microsoft Knowledge Base Article 896428 is not installed
7897| [22069] Microsoft Knowledge Base Article 890859 is not installed
7898| [22068] Microsoft Knowledge Base Article 890046 is not installed
7899| [21704] Microsoft Windows Knowledge Base Article 896727 update is not installed
7900| [21605] Microsoft Windows Knowledge Base Article 896423 update is not installed
7901| [21603] Microsoft Windows Knowledge Base Article 899588 update is not installed
7902| [21601] Microsoft Windows Knowledge Base Article 899591 update is not installed
7903| [21600] Microsoft Windows Knowledge Base Article 893756 update is not installed
7904| [20826] Microsoft Windows Knowledge Base Article 896422 update is not installed
7905| [20825] Microsoft Windows Knowledge Base Article 896358 update is not installed
7906| [20823] Microsoft Windows Knowledge Base Article 890169 update is not installed
7907| [20822] Microsoft Windows Knowledge Base Article 883939 update is not installed
7908| [20820] Microsoft Windows Knowledge Base Article 896426 update is not installed
7909| [20382] Microsoft Windows Knowledge Base Article 894320 update is not installed
7910| [20318] Microsoft Windows Knowledge Base Article 893086 update is not installed
7911| [20317] Microsoft Windows Knowledge Base Article 890923 update is not installed
7912| [20000] Microsoft Windows Knowledge Base Article 892944 update is not installed
7913| [19875] Microsoft Knowledge Base Article 893066 is not installed
7914| [19843] Microsoft Windows Knowledge Base Article 894549 update is not installed
7915| [19252] Microsoft Knowledge Base Article 890261 is not installed
7916| [19141] Microsoft Knowledge Base Article 867282 is not installed
7917| [19118] Microsoft Knowledge Base Article 890047 is not installed
7918| [19116] Microsoft Knowledge Base Article 891781 is not installed
7919| [19112] Microsoft Knowledge Base Article 873352 is not installed
7920| [19111] Microsoft Knowledge Base Article 888113 is not installed
7921| [19106] Microsoft Knowledge Base Article 873333 is not installed
7922| [19095] Microsoft Knowledge Base Article 888302 is not installed
7923| [19092] Microsoft Knowledge Base Article 887981 is not installed
7924| [18944] Microsoft Knowledge Base Article 886185 is not installed
7925| [18770] Microsoft Knowledge Base Article 890175 is not installed
7926| [18769] Microsoft Knowledge Base Article 887219 is not installed
7927| [18768] Microsoft Windows Knowledge Base Article 891711 update is not installed
7928| [18766] Microsoft Windows Knowledge Base Article 871250 update is not installed
7929| [18394] Microsoft Windows Knowledge Base Article 870763 update is not installed
7930| [18393] Microsoft Windows Knowledge Base Article 873339 update is not installed
7931| [18314] Microsoft Windows Knowledge Base Article 889293 update is not installed
7932|
7933| Exploit-DB - https://www.exploit-db.com:
7934| [17159] Microsoft Host Integration Server <= 8.5.4224.0 DoS Vulnerabilities
7935| [31118] Microsoft Works 8.0 File Converter Field Length Remote Code Execution Vulnerability
7936| [30537] Microsoft MSN Messenger <= 8.0 - Video Conversation Buffer Overflow Vulnerability
7937| [28222] microsoft works 8.0 spreadsheet Multiple Vulnerabilities
7938| [12728] Microsoft Outlook Web Access (OWA) 8.2.254.0 - Information Disclosure vulnerability
7939|
7940| OpenVAS (Nessus) - http://www.openvas.org:
7941| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
7942| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
7943| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
7944| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
7945| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
7946| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
7947| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
7948| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
7949| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
7950| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
7951| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
7952| [100952] Microsoft IIS FTPd NLST stack overflow
7953| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7954| [10680] Test Microsoft IIS Source Fragment Disclosure
7955| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
7956| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
7957| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
7958| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
7959| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
7960| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
7961| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
7962| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
7963| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
7964| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
7965| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
7966| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
7967| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
7968| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
7969| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
7970| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
7971| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
7972| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
7973| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
7974| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
7975| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
7976| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
7977| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
7978| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
7979| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
7980| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
7981| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
7982| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
7983| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
7984| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
7985| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
7986| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
7987| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
7988| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
7989| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
7990| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
7991| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
7992| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
7993| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
7994| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
7995| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
7996| [902798] Microsoft SMB Signing Enabled and Not Required At Server
7997| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
7998| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
7999| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
8000| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
8001| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
8002| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
8003| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
8004| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
8005| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
8006| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
8007| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
8008| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
8009| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
8010| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
8011| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
8012| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
8013| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
8014| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
8015| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
8016| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
8017| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
8018| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
8019| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
8020| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
8021| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
8022| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
8023| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
8024| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
8025| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
8026| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
8027| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
8028| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
8029| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
8030| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
8031| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
8032| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
8033| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
8034| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
8035| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
8036| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
8037| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
8038| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
8039| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
8040| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
8041| [902518] Microsoft .NET Framework Security Bypass Vulnerability
8042| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
8043| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
8044| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
8045| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
8046| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
8047| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
8048| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
8049| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
8050| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
8051| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
8052| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
8053| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
8054| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
8055| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
8056| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
8057| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
8058| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
8059| [902425] Microsoft Windows SMB Accessible Shares
8060| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
8061| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
8062| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
8063| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
8064| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
8065| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
8066| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
8067| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
8068| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
8069| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
8070| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
8071| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
8072| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
8073| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
8074| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
8075| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
8076| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
8077| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
8078| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
8079| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
8080| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
8081| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
8082| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
8083| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
8084| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
8085| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
8086| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
8087| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
8088| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
8089| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
8090| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
8091| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
8092| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
8093| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
8094| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
8095| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
8096| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
8097| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
8098| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
8099| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
8100| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
8101| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
8102| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
8103| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
8104| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
8105| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
8106| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
8107| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
8108| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
8109| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
8110| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
8111| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
8112| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
8113| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
8114| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
8115| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
8116| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
8117| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
8118| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
8119| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
8120| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
8121| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
8122| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
8123| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
8124| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
8125| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
8126| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
8127| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
8128| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
8129| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
8130| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
8131| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
8132| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
8133| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
8134| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
8135| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
8136| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
8137| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
8138| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
8139| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
8140| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
8141| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
8142| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
8143| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
8144| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
8145| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
8146| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
8147| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
8148| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
8149| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
8150| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
8151| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
8152| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
8153| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
8154| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
8155| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
8156| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
8157| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
8158| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
8159| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
8160| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
8161| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
8162| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
8163| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
8164| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
8165| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
8166| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
8167| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
8168| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
8169| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
8170| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
8171| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
8172| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
8173| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
8174| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
8175| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
8176| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
8177| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
8178| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
8179| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
8180| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
8181| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
8182| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
8183| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
8184| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
8185| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
8186| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
8187| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
8188| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
8189| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
8190| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
8191| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
8192| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
8193| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
8194| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
8195| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
8196| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
8197| [900808] Microsoft Visual Products Version Detection
8198| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
8199| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
8200| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
8201| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
8202| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
8203| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
8204| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
8205| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
8206| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
8207| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
8208| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
8209| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
8210| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
8211| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
8212| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
8213| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
8214| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
8215| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
8216| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
8217| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
8218| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
8219| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
8220| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
8221| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
8222| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
8223| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
8224| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
8225| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
8226| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
8227| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
8228| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
8229| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
8230| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
8231| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
8232| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
8233| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
8234| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
8235| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
8236| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
8237| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
8238| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
8239| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
8240| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
8241| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
8242| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
8243| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
8244| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
8245| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
8246| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
8247| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
8248| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
8249| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
8250| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
8251| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
8252| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
8253| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
8254| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
8255| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
8256| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
8257| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
8258| [900173] Microsoft Windows Media Player Version Detection
8259| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
8260| [900170] Microsoft iExplorer '&NBSP
8261| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
8262| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
8263| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
8264| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
8265| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
8266| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
8267| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
8268| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
8269| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
8270| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
8271| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
8272| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
8273| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
8274| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
8275| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
8276| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
8277| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
8278| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
8279| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
8280| [900025] Microsoft Office Version Detection
8281| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
8282| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
8283| [855384] Solaris Update for snmp/mibiisa 108870-36
8284| [855273] Solaris Update for snmp/mibiisa 108869-36
8285| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
8286| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
8287| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
8288| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
8289| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
8290| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
8291| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
8292| [802726] Microsoft SMB Signing Disabled
8293| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
8294| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
8295| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
8296| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
8297| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
8298| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
8299| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
8300| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
8301| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
8302| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
8303| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
8304| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
8305| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
8306| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
8307| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
8308| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
8309| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
8310| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
8311| [801934] Microsoft Silverlight Version Detection
8312| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
8313| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
8314| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
8315| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
8316| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
8317| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
8318| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
8319| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
8320| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
8321| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
8322| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
8323| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
8324| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
8325| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
8326| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
8327| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
8328| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
8329| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
8330| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
8331| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
8332| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
8333| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
8334| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
8335| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
8336| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
8337| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
8338| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
8339| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
8340| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
8341| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
8342| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
8343| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
8344| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
8345| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
8346| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
8347| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
8348| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
8349| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
8350| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
8351| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
8352| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
8353| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
8354| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
8355| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
8356| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
8357| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
8358| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
8359| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
8360| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
8361| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
8362| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
8363| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
8364| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
8365| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
8366| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
8367| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
8368| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
8369| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
8370| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
8371| [800742] Microsoft Internet Explorer Unspecified vulnerability
8372| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
8373| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
8374| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
8375| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
8376| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
8377| [800504] Microsoft Windows XP SP3 denial of service vulnerability
8378| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
8379| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
8380| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
8381| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
8382| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
8383| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
8384| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
8385| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
8386| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
8387| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
8388| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
8389| [800331] Microsoft Windows Live Messenger Client Version Detection
8390| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
8391| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
8392| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
8393| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
8394| [800217] Microsoft Money Version Detection
8395| [800209] Microsoft Internet Explorer Version Detection (Win)
8396| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
8397| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
8398| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
8399| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
8400| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
8401| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
8402| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
8403| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
8404| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
8405| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
8406| [101017] Microsoft MS03-018 security check
8407| [101016] Microsoft MS03-022 security check
8408| [101015] Microsoft MS03-034 security check
8409| [101014] Microsoft MS00-078 security check
8410| [101012] Microsoft MS03-051 security check
8411| [101010] Microsoft Security Bulletin MS05-004
8412| [101009] Microsoft Security Bulletin MS06-033
8413| [101007] Microsoft dotNET version grabber
8414| [101006] Microsoft Security Bulletin MS06-056
8415| [101005] Microsoft Security Bulletin MS07-040
8416| [101004] Microsoft MS04-017 security check
8417| [101003] Microsoft MS00-058 security check
8418| [101000] Microsoft MS00-060 security check
8419| [100950] Microsoft DNS server internal hostname disclosure detection
8420| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
8421| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
8422| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
8423| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
8424| [100062] Microsoft Remote Desktop Protocol Detection
8425| [90024] Windows Vulnerability in Microsoft Jet Database Engine
8426| [80007] Microsoft MS00-06 security check
8427| [13752] Denial of Service (DoS) in Microsoft SMS Client
8428| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
8429| [11874] IIS Service Pack - 404
8430| [11808] Microsoft RPC Interface Buffer Overrun (823980)
8431| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
8432| [11217] Microsoft's SQL Version Query
8433| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
8434| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
8435| [11142] IIS XSS via IDC error
8436| [11067] Microsoft's SQL Hello Overflow
8437| [11003] IIS Possible Compromise
8438| [10993] IIS ASP.NET Application Trace Enabled
8439| [10991] IIS Global.asa Retrieval
8440| [10936] IIS XSS via 404 error
8441| [10862] Microsoft's SQL Server Brute Force
8442| [10755] Microsoft Exchange Public Folders Information Leak
8443| [10732] IIS 5.0 WebDav Memory Leakage
8444| [10699] IIS FrontPage DoS II
8445| [10695] IIS .IDA ISAPI filter applied
8446| [10674] Microsoft's SQL UDP Info Query
8447| [10673] Microsoft's SQL Blank Password
8448| [10671] IIS Remote Command Execution
8449| [10667] IIS 5.0 PROPFIND Vulnerability
8450| [10661] IIS 5 .printer ISAPI filter applied
8451| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
8452| [10585] IIS FrontPage DoS
8453| [10576] Check for dangerous IIS default files
8454| [10575] Check for IIS .cnf file leakage
8455| [10573] IIS 5.0 Sample App reveals physical path of web root
8456| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
8457| [10537] IIS directory traversal
8458| [10492] IIS IDA/IDQ Path Disclosure
8459| [10491] ASP/ASA source using Microsoft Translate f: bug
8460| [10144] Microsoft SQL TCP/IP listener is running
8461|
8462| SecurityTracker - https://www.securitytracker.com:
8463| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8464| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
8465| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
8466| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
8467| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
8468| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
8469| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
8470| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
8471| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
8472| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
8473| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
8474| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
8475| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
8476| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
8477| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
8478| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
8479| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
8480| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
8481| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
8482| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
8483| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
8484| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
8485| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
8486| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
8487| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
8488| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
8489| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
8490| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
8491| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
8492| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
8493| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
8494| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
8495| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
8496| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
8497| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
8498| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
8499| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
8500| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
8501| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
8502| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
8503| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
8504| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
8505| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
8506| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
8507| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
8508| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
8509| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
8510| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
8511| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
8512| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
8513|
8514| OSVDB - http://www.osvdb.org:
8515| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
8516| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
8517| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
8518| [87262] Microsoft IIS FTP Command Injection Information Disclosure
8519| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
8520| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
8521| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
8522| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
8523| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
8524| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
8525| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
8526| [71856] Microsoft IIS Status Header Handling Remote Overflow
8527| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
8528| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
8529| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
8530| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
8531| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
8532| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
8533| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
8534| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
8535| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
8536| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
8537| [59892] Microsoft IIS Malformed Host Header Remote DoS
8538| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
8539| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
8540| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
8541| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
8542| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
8543| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
8544| [55269] Microsoft IIS Traversal GET Request Remote DoS
8545| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
8546| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
8547| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
8548| [52238] Microsoft IIS IDC Extension XSS
8549| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
8550| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
8551| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
8552| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
8553| [43451] Microsoft IIS HTTP Request Smuggling
8554| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
8555| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
8556| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
8557| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
8558| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
8559| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
8560| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
8561| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
8562| [27152] Microsoft Windows IIS ASP Page Processing Overflow
8563| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
8564| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
8565| [21805] Microsoft IIS Crafted URL Remote DoS
8566| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
8567| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
8568| [17124] Microsoft IIS Malformed WebDAV Request DoS
8569| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
8570| [17122] Microsoft IIS Permission Weakness .COM File Upload
8571| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
8572| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
8573| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
8574| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
8575| [13760] Microsoft IIS Malformed URL Request DoS
8576| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
8577| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
8578| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
8579| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
8580| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
8581| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
8582| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
8583| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
8584| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
8585| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
8586| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
8587| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
8588| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
8589| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
8590| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
8591| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
8592| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
8593| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
8594| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
8595| [11257] Microsoft IIS Malformed GET Request DoS
8596| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
8597| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
8598| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
8599| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
8600| [9200] Microsoft IIS Unspecified XSS Variant
8601| [9199] Microsoft IIS shtml.dll XSS
8602| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
8603| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
8604| [7737] Microsoft IIS ASP Redirection Function XSS
8605| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
8606| [5851] Microsoft IIS Single Dot Source Code Disclosure
8607| [5736] Microsoft IIS Relative Path System Privilege Escalation
8608| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
8609| [5633] Microsoft IIS Invalid WebDAV Request DoS
8610| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
8611| [5584] Microsoft IIS URL Redirection Malformed Length DoS
8612| [5566] Microsoft IIS Form_VBScript.asp XSS
8613| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
8614| [4864] Microsoft IIS TRACK Logging Failure
8615| [4863] Microsoft IIS Active Server Page Header DoS
8616| [4791] Microsoft IIS Response Object DoS
8617| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
8618| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
8619| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
8620| [3500] Microsoft IIS fpcount.exe Remote Overflow
8621| [3341] Microsoft IIS Redirect Response XSS
8622| [3339] Microsoft IIS HTTP Error Page XSS
8623| [3338] Microsoft IIS Help File XSS
8624| [3328] Microsoft IIS FTP Status Request DoS
8625| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
8626| [3325] Microsoft IIS HTR ISAPI Overflow
8627| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
8628| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
8629| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
8630| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
8631| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
8632| [3231] Microsoft IIS Log Bypass
8633| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
8634| [1931] Microsoft IIS MIME Content-Type Header DoS
8635| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
8636| [1826] Microsoft IIS Domain Guest Account Disclosure
8637| [1824] Microsoft IIS FTP DoS
8638| [1804] Microsoft IIS Long Request Parsing Remote DoS
8639| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
8640| [1750] Microsoft IIS File Fragment Disclosure
8641| [1543] Microsoft NT/IIS Invalid URL Request DoS
8642| [1504] Microsoft IIS File Permission Canonicalization Bypass
8643| [1465] Microsoft IIS .htr Missing Variable DoS
8644| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
8645| [1322] Microsoft IIS Malformed .htr Request DoS
8646| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
8647| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
8648| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
8649| [1170] Microsoft IIS Escape Character URL Access Bypass
8650| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
8651| [1082] Microsoft IIS Domain Resolution Access Bypass
8652| [1041] Microsoft IIS Malformed HTTP Request Header DoS
8653| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
8654| [930] Microsoft IIS Shared ASP Cache Information Disclosure
8655| [929] Microsoft IIS FTP Server NLST Command Overflow
8656| [928] Microsoft IIS Long Request Log Evasion
8657| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
8658| [814] Microsoft IIS global.asa Remote Information Disclosure
8659| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
8660| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
8661| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
8662| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
8663| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
8664| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
8665| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
8666| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
8667| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
8668| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
8669| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
8670| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
8671| [473] Microsoft IIS Multiple .cnf File Information Disclosure
8672| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
8673| [470] Microsoft IIS Form_JScript.asp XSS
8674| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
8675| [436] Microsoft IIS Unicode Remote Command Execution
8676| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
8677| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
8678| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
8679| [308] Microsoft IIS Malformed File Extension URL DoS
8680| [285] Microsoft IIS repost.asp File Upload
8681| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
8682| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
8683| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
8684| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
8685| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
8686| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
8687| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
8688| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
8689| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
8690| [98] Microsoft IIS perl.exe HTTP Path Disclosure
8691| [97] Microsoft IIS ISM.DLL HTR Request Overflow
8692| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
8693| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
8694| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
8695| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
8696| [2] Microsoft IIS ExAir search.asp Direct Request DoS
8697|_
8698Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
8699#################################################################################################################################
8700 Anonymous JTSEC #OpIcarus Full Recon #11