· 6 years ago · Dec 01, 2019, 06:11 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.jcci.org.sa ISP Sultan Bin Abdulaziz Foundation
4Continent Asia Flag
5SA
6Country Saudi Arabia Country Code SA
7Region Ar Riyāḑ Local time 01 Dec 2019 07:40 +03
8City Riyadh Postal Code Unknown
9IP Address 213.230.30.200 Latitude 24.654
10 Longitude 46.715
11
12=======================================================================================================================================
13#######################################################################################################################################
14> www.jcci.org.sa
15Server: 38.132.106.139
16Address: 38.132.106.139#53
17
18Non-authoritative answer:
19www.jcci.org.sa canonical name = jcci.org.sa.
20Name: jcci.org.sa
21Address: 213.230.30.200
22>
23#######################################################################################################################################
24
25Domain Name: jcci.org.sa
26
27 Registrant:
28 Jeddah Chamber of Commerce & Industry الغرفة التجارية الصناعية بمحافظة جدة
29 Address: Amanah Street
30 Jeddah جدة
31 Saudi Arabia المملكة العربية السعودية
32
33 Administrative Contact:
34 Monther Abdulaziz *********
35 Address: *************
36 **********
37 *************************************
38
39 Technical Contact:
40 Abdullah Jamal ******
41 Address: ***********************
42 ******
43 ************
44
45 Name Servers:
46 ns1.medu.net.sa
47 ns2.medu.net.sa
48
49 DNSSEC: no
50
51Created on: 1999-03-31
52Last Updated on: 2019-11-21
53#######################################################################################################################################
54[+] Target : www.jcci.org.sa
55
56[+] IP Address : 213.230.30.200
57
58[+] Headers :
59
60[+] Cache-Control : private, max-age=0
61[+] Content-Type : text/html; charset=utf-8
62[+] Content-Encoding : gzip
63[+] Expires : Sat, 16 Nov 2019 04:45:10 GMT
64[+] Last-Modified : Sun, 01 Dec 2019 04:45:10 GMT
65[+] Vary : Accept-Encoding
66[+] Server : Microsoft-IIS/7.5
67[+] SPRequestGuid : ddf2f0d2-4757-43b0-822f-c392d2a4bfe8
68[+] X-SharePointHealthScore : 0
69[+] X-AspNet-Version : 2.0.50727
70[+] X-Powered-By : ASP.NET
71[+] MicrosoftSharePointTeamServices : 14.0.0.6117
72[+] X-MS-InvokeApp : 1; RequireReadOnly
73[+] Date : Sun, 01 Dec 2019 04:45:11 GMT
74[+] Content-Length : 36465
75
76[+] SSL Certificate Information :
77
78[-] SSL is not Present on Target URL...Skipping...
79
80[+] Whois Lookup :
81
82[+] NIR : None
83[+] ASN Registry : ripencc
84[+] ASN : 28938
85[+] ASN CIDR : 213.230.16.0/20
86[+] ASN Country Code : SA
87[+] ASN Date : 1999-11-01
88[+] ASN Description : MEDUNET-AS Program for Medical and Educational Telecommunications Riyadh, Saudi Arabia, SA
89[+] cidr : 213.230.0.0/19
90[+] name : SA-MEDUNET-19991101
91[+] handle : DA5517-RIPE
92[+] range : 213.230.0.0 - 213.230.31.255
93[+] description : MEDUNET
94[+] country : SA
95[+] state : None
96[+] city : None
97[+] address : P.O. Box 14466
9811424
99Riyadh
100SAUDI ARABIA
101[+] postal_code : None
102[+] emails : ['noc@medunet.com.sa']
103[+] created : 1970-01-01T00:00:00Z
104[+] updated : 2017-03-08T12:39:20Z
105
106[+] Crawling Target...
107
108[+] Looking for robots.txt........[ Not Found ]
109[+] Looking for sitemap.xml.......[ Not Found ]
110[+] Extracting CSS Links..........[ 6 ]
111[+] Extracting Javascript Links...[ 13 ]
112[+] Extracting Internal Links.....[ 22 ]
113[+] Extracting External Links.....[ 39 ]
114[+] Extracting Images.............[ 51 ]
115
116[+] Total Links Extracted : 131
117
118[+] Dumping Links in /opt/FinalRecon/dumps/www.jcci.org.sa.dump
119[+] Completed!
120#######################################################################################################################################
121[+] Starting At 2019-11-30 23:45:30.722888
122[+] Collecting Information On: http://www.jcci.org.sa/Arabic/Pages/default.aspx
123[#] Status: 200
124--------------------------------------------------
125[#] Web Server Detected: Microsoft-IIS/7.5
126[#] X-Powered-By: ASP.NET
127[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
128- Cache-Control: private, max-age=0
129- Content-Type: text/html; charset=utf-8
130- Content-Encoding: gzip
131- Expires: Sat, 16 Nov 2019 04:45:31 GMT
132- Last-Modified: Sun, 01 Dec 2019 04:45:31 GMT
133- Vary: Accept-Encoding
134- Server: Microsoft-IIS/7.5
135- SPRequestGuid: 8edbbab3-c1d0-4b42-9ac4-2992f24a4701
136- X-SharePointHealthScore: 0
137- X-AspNet-Version: 2.0.50727
138- X-Powered-By: ASP.NET
139- MicrosoftSharePointTeamServices: 14.0.0.6117
140- X-MS-InvokeApp: 1; RequireReadOnly
141- Date: Sun, 01 Dec 2019 04:45:32 GMT
142- Content-Length: 39812
143--------------------------------------------------
144[#] Finding Location..!
145[#] status: success
146[#] country: Saudi Arabia
147[#] countryCode: SA
148[#] region: 01
149[#] regionName: Ar Riyāḑ
150[#] city: Riyadh
151[#] zip: 09848
152[#] lat: 24.6992
153[#] lon: 46.6795
154[#] timezone: Asia/Riyadh
155[#] isp: Riyadh 0
156[#] org: Sultan Bin Abdulaziz Foundation
157[#] as: AS28938 Sultan Bin Abdulaziz Foundation
158[#] query: 213.230.30.200
159--------------------------------------------------
160[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
161--------------------------------------------------
162[#] Starting Reverse DNS
163[-] Failed ! Fail
164--------------------------------------------------
165[!] Scanning Open Port
166[#] 21/tcp open ftp
167[#] 80/tcp open http
168[#] 443/tcp open https
169[#] 555/tcp open dsf
170[#] 1556/tcp open veritas_pbx
171[#] 1801/tcp open msmq
172[#] 2000/tcp open cisco-sccp
173[#] 2030/tcp open device2
174[#] 2103/tcp open zephyr-clt
175[#] 2105/tcp open eklogin
176[#] 2107/tcp open msmq-mgmt
177[#] 2179/tcp open vmrdp
178[#] 2701/tcp open sms-rcinfo
179[#] 3389/tcp open ms-wbt-server
180[#] 5050/tcp open mmcc
181[#] 5051/tcp open ida-agent
182[#] 8080/tcp open http-proxy
183[#] 8081/tcp open blackice-icecap
184[#] 8888/tcp open sun-answerbook
185[#] 13782/tcp open netbackup
186[#] 49152/tcp open unknown
187[#] 49153/tcp open unknown
188[#] 49154/tcp open unknown
189--------------------------------------------------
190[+] Collecting Information Disclosure!
191[#] Detecting sitemap.xml file
192[!] sitemap.xml File Found: http://www.jcci.org.sa/Arabic/Pages/default.aspx/sitemap.xml
193[#] Detecting robots.txt file
194[!] robots.txt File Found: http://www.jcci.org.sa/Arabic/Pages/default.aspx/robots.txt
195[#] Detecting GNU Mailman
196[-] GNU Mailman App Not Detected!?
197--------------------------------------------------
198[+] Crawling Url Parameter On: http://www.jcci.org.sa/Arabic/Pages/default.aspx
199--------------------------------------------------
200[#] Searching Html Form !
201[+] Html Form Discovered
202[#] action: default.aspx
203[#] class: None
204[#] id: aspnetForm
205[#] method: post
206--------------------------------------------------
207[!] Found 18 dom parameter
208[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#
209[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#
210[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/#Membership
211[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/#Info
212[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx#payments
213[#] http://213.230.30.14/tcs/?a=5065#page:conferenceList&status:live&pageNumber:NaN
214[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#ctl00_ctl65_SkipLink
215[#] http://213.230.30.14/tcs/?a=5065#page:conferenceList&status:live&pageNumber:NaN
216[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#
217[#] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Membership
218[#] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Info
219[#] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#payments
220[#] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Other
221[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#
222[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx/#
223[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/#Membership
224[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/#Info
225[#] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx#payments
226--------------------------------------------------
227[!] 34 Internal Dynamic Parameter Discovered
228[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_catalogs/theme/Themed/84494203/controls-73AFB8EA.css?ctag=4
229[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_catalogs/theme/Themed/84494203/search-E5881E2B.css?ctag=4
230[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_catalogs/theme/Themed/84494203/corev4-606A9298.css?ctag=4
231[+] http://www.jcci.org.sa/Arabic/_layouts/Authenticate.aspx?Source=%2FArabic%2FPages%2Fdefault%2Easpx
232[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=7&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
233[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=6&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
234[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=5&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
235[+] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=109502&sid=49e292462bb84b118057d3299a727d70&spid=192.168.15.165
236[+] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=90647&sid=4c59ac2e3034417484b0d2013bc426fa&spid=192.168.15.165
237[+] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=103066&sid=9e0f9d03b17f466799f65ec885c3ee87&spid=192.168.15.165
238[+] http://www.jcci.org.sa/Arabic/_layouts/Authenticate.aspx?Source=%2FArabic%2FPages%2Fdefault%2Easpx
239[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2455&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
240[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2476&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
241[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2475&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
242[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2478&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
243[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=225&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
244[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=224&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
245[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=223&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
246[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=221&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
247[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4035&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
248[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4036&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
249[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4033&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
250[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4032&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
251[+] http://www.jcci.org.sa/Arabic/about/Lists/Survey26/NewForm.aspx?Source=/Arabic/Pages/ThanksForSurveying.aspx
252[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2476&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
253[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2476&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
254[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2475&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
255[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2475&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
256[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2478&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
257[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2478&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
258[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2455&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
259[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2455&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
260[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2459&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
261[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2459&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http%3A%2F%2Fwww%2Ejcci%2Eorg%2Esa%2FArabic%2FPages%2Fdefault%2Easpx
262--------------------------------------------------
263[!] 6 External Dynamic Parameter Discovered
264[#] http://www.linkedin.com/company/2574258?trk=tyah
265[#] https://itunes.apple.com/sa/app/jeddah-chamber-of-commerce/id501290568?mt=8
266[#] http://213.230.30.14/tcs/?a=5065#page:conferenceList&status:live&pageNumber:NaN
267[#] http://www.linkedin.com/company/2574258?trk=tyah
268[#] http://213.230.30.14/tcs/?a=5065#page:conferenceList&status:live&pageNumber:NaN
269[#] https://itunes.apple.com/sa/app/jeddah-chamber-of-commerce/id501290568?mt=8
270--------------------------------------------------
271[!] 186 Internal links Discovered
272[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Style%20Library/ar-SA/Core%20Styles/page-layouts-21.css
273[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Style%20Library/JCCI/ar-SA/styles.css
274[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/_vti_bin/spsdisco.aspx
275[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Style Library/Images/favicon.ico
276[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
277[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
278[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
279[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic
280[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:SE3C6736A_Submit()
281[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:S4C315BB0_Submit()
282[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic
283[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/default.aspx
284[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/default.aspx
285[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/default.aspx
286[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/Branches.aspx
287[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/strategy.aspx
288[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/Quality-Policy.aspx
289[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/logo-upload.aspx
290[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/annaulreport.aspx
291[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/board_of_directors/Pages/presidentmessage.aspx
292[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/board_of_directors/Pages/presidentmessage.aspx
293[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/board_of_directors/Pages/directors.aspx
294[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/default.aspx
295[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/chamberNews.aspx
296[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/Events.aspx
297[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/Delegations.aspx
298[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/mediacenter/Pages/PressKit.aspx
299[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/mediacenter/Pages/PressKit.aspx
300[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/mediacenter/Pages/NewsLetter.aspx
301[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/publications.aspx
302[+] http://www.jcci.org.sa/TradeMagazine/708
303[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/faq.aspx
304[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/Tell-us-your-Comments.aspx
305[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/joinus/Pages/default.aspx
306[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/contact-us.aspx
307[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/%d8%b3%d9%8a%d8%a7%d8%b3%d8%a9-%d8%ae%d8%b5%d9%88%d8%b5%d9%8a%d8%a9-%d9%85%d9%88%d8%a7%d9%82%d8%b9-%d8%a7%d9%84%d8%aa%d9%88%d8%a7%d8%b5%d9%84-%d8%a7%d9%84%d8%a7%d8%ac%d8%aa%d9%85%d8%a7%d8%b9%d9%8a.aspx
308[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/default.aspx
309[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/cvs.aspx
310[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/ministers.aspx
311[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/Achievements.aspx
312[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/past-present.aspx
313[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/history.aspx
314[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/default.aspx
315[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/attestation_services.aspx
316[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/commercial_Services.aspx
317[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Legal_Services.aspx
318[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Publications.aspx
319[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Trade_Delegations.aspx
320[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Support_Programs.aspx
321[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Warehouse-City.aspx
322[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
323[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/Application-for-registration-in-training-courses.aspx
324[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/default.aspx
325[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/about.aspx
326[+] http://www.jcci.org.sa/Arabic/committies/Pages/listOfCommittee.aspx
327[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/committees_members.aspx
328[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/listOfFormationCommittees.aspx
329[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/CircularsSearch.aspx
330[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
331[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/default.aspx
332[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/services-center.aspx
333[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/expo-events-sector.aspx
334[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/Economical-and-Social-Development.aspx
335[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/International-Relations-Sector.aspx
336[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/communication-sector.aspx
337[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/%d9%82%d8%b7%d8%a7%d8%b9-%d8%a7%d9%84%d8%aa%d8%b7%d9%88%d9%8a%d8%b1-%d9%88%d8%a7%d9%84%d8%aa%d9%85%d9%8a%d8%b2-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a.aspx
338[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/Law-and-conciliation-center-.aspx
339[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/HR-sector.aspx
340[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/%d9%82%d8%b7%d8%a7%d8%b9-%d8%a7%d9%84%d8%aa%d9%82%d9%86%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa.aspx
341[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/research-and-studies-center.aspx
342[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/festivals-forums/Pages/default.aspx
343[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//arabic/about/Pages/contact-us.aspx
344[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/pages/sitemap.aspx
345[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//English/Pages/default.aspx
346[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
347[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
348[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
349[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
350[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/pages/login.aspx
351[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/Registered-users-in-the-portal-Terms-and-Conditions.aspx
352[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/Control-Panel.aspx
353[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:RedirectToPage('http://www.facebook.com/JeddahChamber');
354[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
355[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
356[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
357[+] http://www.jcci.org.sa/Arabic/services/Pages/default.aspx
358[+] http://www.jcci.org.sa/Arabic/about/Pages/contact-us.aspx
359[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/
360[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/" target=
361[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//English/about/about_the_chamber/pages/branches.aspx
362[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/default.aspx
363[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/default.aspx
364[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/"><img class=
365[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/"><img class=
366[+] http://www.jcci.org.sa/Arabic/Documents/Exhibitions%20Calendar%202019.pdf
367[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/"><img class=
368[+] http://www.jcci.org.sa/Arabic/PublishingImages/Ads/2019/e-services.jpg
369[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/pages/login.aspx
370[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/Registered-users-in-the-portal-Terms-and-Conditions.aspx
371[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/Control-Panel.aspx
372[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:RedirectToPage('http://www.facebook.com/JeddahChamber');
373[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
374[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
375[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx/javascript:;
376[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/Business-Directory.aspx
377[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/e-services/Pages/Business-Directory.aspx
378[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
379[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
380[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/circulars.aspx
381[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/chamberNews.aspx
382[+] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/غرفة-جدة-تستضيف-اللقاء-التعريفي-بجائزة-جدة-للإبداع.aspx
383[+] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/غرفة-جده-تحصر-القطاعات-مرتفعة-النمو-مع-أكسفورد-للأعمال.aspx
384[+] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/منتدى-تمكين-يحصد-أكثر-من800-متقدم-ومتقدمة-للعمل-في-تخصصات-هندسية-وفنية-وإدارية.aspx
385[+] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/تطبيق-ضريبة-السلع-الانتقائية-في-ورشة-عمل-تعريفية-بغرفة-جدة.aspx
386[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/Events.aspx
387[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/Delegations.aspx
388[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/opportunities.aspx
389[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/publications.aspx
390[+] http://www.jcci.org.sa/Arabic/about/infographics/التبادل التجاري بين السعودية وكوريا.jpg
391[+] http://www.jcci.org.sa/Arabic/about/infographics/السعودية الأولى عالمياً.jpg
392[+] http://www.jcci.org.sa/Arabic/about/infographics/أعداد منتسبي غرفة جدة حتى شهر سبتمبر 2019.jpg
393[+] http://www.jcci.org.sa/Arabic/about/infographics/ارتفاع نسبة مساكن التملك في السعودية.jpg
394[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/joinus/Pages/default.aspx
395[+] http://www.jcci.org.sa/Arabic/about/joinus/Pages/default.aspx
396[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/joinus/Pages/default.aspx
397[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/Discounts.aspx
398[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/circularssearch.aspx
399[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Style Library/XSL Style Sheets/Slider/css/global.css
400[+] http://www.jcci.org.sa/Arabic/about/mediacenter/newsletter/%D8%A7%D9%84%D9%86%D8%B4%D8%B1%D8%A9%20%D8%A7%D9%84%D8%A7%D9%94%D8%B3%D8%A8%D9%88%D8%B9%D9%8A%D8%A9%20%D8%B9%D8%AF%D8%AF%2090.jpg
401[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/committees_members.aspx
402[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/Branches.aspx
403[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/Branches.aspx
404[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/board_of_directors/Pages/default.aspx
405[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/secretary_general/Pages/default.aspx
406[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/default.aspx
407[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/mediacenter/Pages/default.aspx
408[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/memberservices/Pages/default.aspx
409[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/default.aspx
410[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/portalservices/Saudization/Pages/default.aspx
411[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/portalservices/informationservices/Pages/default.aspx
412[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/hrdevcenter.aspx
413[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/portalservices/Saudization/Recruitment/Pages/E-recuitment.aspx
414[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/portalservices/Saudization/jobsopportunities/Pages/default.aspx
415[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/Pages/default.aspx
416[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/default.aspx
417[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/about_the_chamber/Pages/default.aspx
418[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/board_of_directors/Pages/presidentmessage.aspx
419[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/news_events-delegations/Pages/default.aspx
420[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/mediacenter/Pages/PressKit.aspx
421[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/publications.aspx
422[+] http://www.jcci.org.sa/TradeMagazine/708
423[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/faq.aspx
424[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/Tell-us-your-Comments.aspx
425[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/joinus/Pages/default.aspx
426[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/contact-us.aspx
427[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/Pages/%d8%b3%d9%8a%d8%a7%d8%b3%d8%a9-%d8%ae%d8%b5%d9%88%d8%b5%d9%8a%d8%a9-%d9%85%d9%88%d8%a7%d9%82%d8%b9-%d8%a7%d9%84%d8%aa%d9%88%d8%a7%d8%b5%d9%84-%d8%a7%d9%84%d8%a7%d8%ac%d8%aa%d9%85%d8%a7%d8%b9%d9%8a.aspx
428[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/about/75Years/Pages/default.aspx
429[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/default.aspx
430[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/attestation_services.aspx
431[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/commercial_Services.aspx
432[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Legal_Services.aspx
433[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Publications.aspx
434[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Trade_Delegations.aspx
435[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Support_Programs.aspx
436[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/services/Pages/Warehouse-City.aspx
437[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
438[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/Application-for-registration-in-training-courses.aspx
439[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/default.aspx
440[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/about.aspx
441[+] http://www.jcci.org.sa/Arabic/committies/Pages/listOfCommittee.aspx
442[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/committees_members.aspx
443[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/listOfFormationCommittees.aspx
444[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/committies/Pages/CircularsSearch.aspx
445[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/E-services/Pages/default.aspx
446[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/default.aspx
447[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/services-center.aspx
448[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/expo-events-sector.aspx
449[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/Economical-and-Social-Development.aspx
450[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/International-Relations-Sector.aspx
451[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/communication-sector.aspx
452[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/%d9%82%d8%b7%d8%a7%d8%b9-%d8%a7%d9%84%d8%aa%d8%b7%d9%88%d9%8a%d8%b1-%d9%88%d8%a7%d9%84%d8%aa%d9%85%d9%8a%d8%b2-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a.aspx
453[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/Law-and-conciliation-center-.aspx
454[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/HR-sector.aspx
455[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/%d9%82%d8%b7%d8%a7%d8%b9-%d8%a7%d9%84%d8%aa%d9%82%d9%86%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa.aspx
456[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/departments/Pages/research-and-studies-center.aspx
457[+] http://www.jcci.org.sa/Arabic/Pages/default.aspx//Arabic/festivals-forums/Pages/default.aspx
458--------------------------------------------------
459[!] 33 External links Discovered
460[#] http://www.jeddahcity.org.sa/
461[#] https://mef.org.sa/ar
462[#] http://www.jhrf.net/
463[#] http://www.instagram.com/jeddahchamber
464[#] http://www.twitter.com/jeddahchamber
465[#] http://www.youtube.com/user/JeddahChamber
466[#] http://jeg.org.sa/data/modules/rss/xmlfeeds/rssnews.xml
467[#] https://www.jcea.org.sa/
468[#] https://www.snapchat.com/add/jeddahchamber
469[#] http://www.instagram.com/jeddahchamber
470[#] http://www.twitter.com/jeddahchamber
471[#] http://www.youtube.com/user/JeddahChamber
472[#] http://jeg.org.sa/data/modules/rss/xmlfeeds/rssnews.xml
473[#] http://www.jcea.org.sa/
474[#] http://businessguide.com.sa/
475[#] http://bluepages.com.sa/
476[#] http://jeg.org.sa/
477[#] https://www.jcea.org.sa/
478[#] http://google.com
479[#] http://google.com
480[#] http://google.com
481[#] http://google.com
482[#] http://www.jeddahcity.com.sa/ar
483[#] http://google.com
484[#] http://google.com
485[#] http://google.com
486[#] http://google.com
487[#] http://google.com
488[#] http://google.com
489[#] http://www.jeddahcity.org.sa/
490[#] https://mef.org.sa/ar
491[#] http://www.jhrf.net/
492[#] https://twitter.com/share
493--------------------------------------------------
494[#] Mapping Subdomain..
495[!] Found 9 Subdomain
496- jcci.org.sa
497- mx2.jcci.org.sa
498- mx3.jcci.org.sa
499- volunteerportal.jcci.org.sa
500- mail.jcci.org.sa
501- vpn.jcci.org.sa
502- jcap.jcci.org.sa
503- emp.jcci.org.sa
504- jcciphoneapps.jcci.org.sa
505--------------------------------------------------
506[!] Done At 2019-11-30 23:46:04.966335
507#######################################################################################################################################
508[i] Scanning Site: http://www.jcci.org.sa
509
510
511
512B A S I C I N F O
513====================
514
515
516[+] Site Title:
517
518 غرفة جدة
519
520
521[+] IP address: 213.230.30.200
522[+] Web Server: Microsoft-IIS/7.5
523[+] CMS: Could Not Detect
524[+] Cloudflare: Not Detected
525[+] Robots File: Could NOT Find robots.txt!
526
527
528
529
530W H O I S L O O K U P
531========================
532
533 % SaudiNIC Whois server.
534% Rights restricted by copyright.
535% http://nic.sa/en/view/whois-cmd-copyright
536
537Domain Name: jcci.org.sa
538
539 Registrant:
540 Jeddah Chamber of Commerce & Industry الغرفة التجارية الصناعية بمحافظة جدة
541 Address: Amanah Street
542 Jeddah جدة
543 Saudi Arabia المملكة العربية السعودية
544
545 Administrative Contact:
546 Monther Abdulaziz *********
547 Address: *************
548 **********
549 *************************************
550
551 Technical Contact:
552 Abdullah Jamal ******
553 Address: ***********************
554 ******
555 ************
556
557 Name Servers:
558 ns1.medu.net.sa
559 ns2.medu.net.sa
560
561 DNSSEC: no
562
563Created on: 1999-03-31
564Last Updated on: 2019-11-21
565
566
567
568
569
570G E O I P L O O K U P
571=========================
572
573[i] IP Address: 213.230.30.200
574[i] Country: Saudi Arabia
575[i] State: Ar Riyad
576[i] City: Riyadh
577[i] Latitude: 24.6537
578[i] Longitude: 46.7152
579
580
581
582
583H T T P H E A D E R S
584=======================
585
586
587[i] HTTP/1.1 302 Redirect
588[i] Content-Type: text/html; charset=UTF-8
589[i] Location: http://www.jcci.org.sa/Arabic/Pages/default.aspx
590[i] Server: Microsoft-IIS/7.5
591[i] SPRequestGuid: 5ea90435-651e-4660-b29d-0f1060aa83c6
592[i] X-SharePointHealthScore: 0
593[i] X-Powered-By: ASP.NET
594[i] MicrosoftSharePointTeamServices: 14.0.0.6117
595[i] X-MS-InvokeApp: 1; RequireReadOnly
596[i] Date: Sun, 01 Dec 2019 04:47:44 GMT
597[i] Connection: close
598[i] Content-Length: 171
599[i] HTTP/1.1 200 OK
600[i] Cache-Control: private, max-age=0
601[i] Content-Type: text/html; charset=utf-8
602[i] Expires: Sat, 16 Nov 2019 04:47:45 GMT
603[i] Last-Modified: Sun, 01 Dec 2019 04:47:45 GMT
604[i] Server: Microsoft-IIS/7.5
605[i] SPRequestGuid: c69cf34d-9b8a-4977-b27e-1c3eebf16b52
606[i] X-SharePointHealthScore: 0
607[i] X-AspNet-Version: 2.0.50727
608[i] X-Powered-By: ASP.NET
609[i] MicrosoftSharePointTeamServices: 14.0.0.6117
610[i] X-MS-InvokeApp: 1; RequireReadOnly
611[i] Date: Sun, 01 Dec 2019 04:47:46 GMT
612[i] Connection: close
613[i] Content-Length: 147425
614
615
616
617
618D N S L O O K U P
619===================
620
621jcci.org.sa. 3599 IN SOA ns1.medu.net.sa. hshiha.medu.net.sa. 2019112001 43200 7200 1209600 3600
622jcci.org.sa. 3599 IN NS ns2.medu.net.sa.
623jcci.org.sa. 3599 IN NS ns1.medu.net.sa.
624jcci.org.sa. 3599 IN A 213.230.30.200
625jcci.org.sa. 3599 IN TXT "+Nei0mpifFKe1PLfNPjV9erwSqmSpg7OZvYpM5S48vE3cSPstApT3XjnWshpQ7icZg+BDUM+qHOIQD9uupDNNQ=="
626jcci.org.sa. 3599 IN TXT "nNWBqmyG"
627jcci.org.sa. 3599 IN TXT "58lggt7l0k9vhi4nboq565rrkg"
628jcci.org.sa. 3599 IN TXT "v=spf1 mx a ptr include:mta1.bayt.com include:spf.protection.outlook.com ~all"
629jcci.org.sa. 3599 IN TXT "avrsdk588i2hfdp4g6oip6ic39"
630jcci.org.sa. 3599 IN TXT "jcci.org.sa zone"
631jcci.org.sa. 3599 IN TXT "MS=ms43732361"
632jcci.org.sa. 3599 IN TXT "cskRshQj"
633jcci.org.sa. 3599 IN TXT "39v46cg9e7uqruco6jf144r2hm "
634jcci.org.sa. 3599 IN MX 10 mx2.jcci.org.sa.
635jcci.org.sa. 3599 IN MX 0 Jcci-org-sa.mail.protection.outlook.com.
636jcci.org.sa. 3599 IN MX 10 MX3.jcci.org.sa.
637
638
639
640
641S U B N E T C A L C U L A T I O N
642====================================
643
644Address = 213.230.30.200
645Network = 213.230.30.200 / 32
646Netmask = 255.255.255.255
647Broadcast = not needed on Point-to-Point links
648Wildcard Mask = 0.0.0.0
649Hosts Bits = 0
650Max. Hosts = 1 (2^0 - 0)
651Host Range = { 213.230.30.200 - 213.230.30.200 }
652
653
654
655N M A P P O R T S C A N
656============================
657
658Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-01 04:47 UTC
659Nmap scan report for jcci.org.sa (213.230.30.200)
660Host is up (0.15s latency).
661
662PORT STATE SERVICE
66321/tcp open ftp
66422/tcp closed ssh
66523/tcp closed telnet
66680/tcp open http
667110/tcp closed pop3
668143/tcp closed imap
669443/tcp open https
6703389/tcp open ms-wbt-server
671
672Nmap done: 1 IP address (1 host up) scanned in 0.23 seconds
673
674
675
676S U B - D O M A I N F I N D E R
677==================================
678
679
680[i] Total Subdomains Found : 8
681
682[+] Subdomain: mx2.jcci.org.sa
683[-] IP: 213.230.30.211
684
685[+] Subdomain: mx3.jcci.org.sa
686[-] IP: 213.230.30.219
687
688[+] Subdomain: volunteerportal.jcci.org.sa
689[-] IP: 212.107.104.111
690
691[+] Subdomain: mail.jcci.org.sa
692[-] IP: 213.230.30.213
693
694[+] Subdomain: vpn.jcci.org.sa
695[-] IP: 213.230.30.208
696
697[+] Subdomain: jcap.jcci.org.sa
698[-] IP: 213.230.30.206
699
700[+] Subdomain: emp.jcci.org.sa
701[-] IP: 213.230.30.202
702
703[+] Subdomain: jcciphoneapps.jcci.org.sa
704[-] IP: 213.230.30.201
705#######################################################################################################################################
706[INFO] ------TARGET info------
707[*] TARGET: http://www.jcci.org.sa/Arabic/Pages/default.aspx
708[*] TARGET IP: 213.230.30.200
709[INFO] NO load balancer detected for www.jcci.org.sa...
710[*] DNS servers: jcci.org.sa.
711[*] TARGET server: Microsoft-IIS/7.5
712[*] CC: SA
713[*] Country: Saudi Arabia
714[*] RegionCode: 01
715[*] RegionName: Ar Riyāḑ
716[*] City: Riyadh
717[*] ASN: AS28938
718[*] BGP_PREFIX: 213.230.0.0/19
719[*] ISP: MEDUNET-AS Sultan Bin Abdulaziz Foundation, SA
720[INFO] DNS enumeration:
721[*] beta.jcci.org.sa 213.230.30.203
722[*] mail.jcci.org.sa 213.230.30.213
723[*] mx2.jcci.org.sa 213.230.30.211
724[*] mx3.jcci.org.sa 213.230.30.219
725[*] vpn.jcci.org.sa 213.230.30.208
726[INFO] Possible abuse mails are:
727[*] abuse@jcci.org.sa
728[*] abuse@www.jcci.org.sa
729[INFO] NO PAC (Proxy Auto Configuration) file FOUND
730[INFO] Checking for HTTP status codes recursively from /Arabic/Pages/default.aspx
731[INFO] Status code Folders
732[*] 200 http://www.jcci.org.sa/Arabic/
733[*] 200 http://www.jcci.org.sa/Arabic/Pages/
734[INFO] Starting FUZZing in http://www.jcci.org.sa/FUzZzZzZzZz...
735[INFO] Status code Folders
736[ALERT] Look in the source code. It may contain passwords
737
738Recherche 213.230.30.200
739Connexion HTTP à 213.230.30.200
740Envoi de la requête HTTP.
741Requête HTTP envoyée. Attente de réponse.
742Alerte ! : Impossible de rejouer l’autorisation ! Contactez le webmaster du serveur.
743Accès impossible `http://213.230.30.200/'
744Alerte ! : Impossible d’accéder au document.
745
746lynx : accès impossible au fichier de départ
747[INFO] Links found from http://www.jcci.org.sa/Arabic/Pages/default.aspx http://213.230.30.200/:
748[*] http://213.230.30.14/tcs/?a=5065#page:conferenceList&status:live&pageNumber:NaN
749[*] http://bluepages.com.sa/
750[*] http://businessguide.com.sa/
751[*] http://google.com/
752[*] http://jeg.org.sa/
753[*] http://jeg.org.sa/data/modules/rss/xmlfeeds/rssnews.xml
754[*] https://itunes.apple.com/sa/app/jeddah-chamber-of-commerce/id501290568?mt=8
755[*] https://mef.org.sa/ar
756[*] https://twitter.com/share
757[*] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=103066&sid=9e0f9d03b17f466799f65ec885c3ee87&spid=192.168.15.165
758[*] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=109502&sid=49e292462bb84b118057d3299a727d70&spid=192.168.15.165
759[*] http://survey.jcci.org.sa/dsp/wbjedjc/ft/sg?schid=90647&sid=4c59ac2e3034417484b0d2013bc426fa&spid=192.168.15.165
760[*] https://www.jcea.org.sa/
761[*] https://www.snapchat.com/add/jeddahchamber
762[*] http://www.facebook.com/plugins/like.php?href=http://www.jcci.org.sa/jcci/&send=false&layout=button_count&width=80&show_faces=false&action=like&colorscheme=light&font&height=21
763[*] http://www.instagram.com/jeddahchamber
764[*] http://www.jcci.org.sa/Arabic
765[*] http://www.jcci.org.sa/Arabic/
766[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/Achievements.aspx
767[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/cvs.aspx
768[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/default.aspx
769[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/history.aspx
770[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/ministers.aspx
771[*] http://www.jcci.org.sa/Arabic/about/75Years/Pages/past-present.aspx
772[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/annaulreport.aspx
773[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/Branches.aspx
774[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/default.aspx
775[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/logo-upload.aspx
776[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/Quality-Policy.aspx
777[*] http://www.jcci.org.sa/Arabic/about/about_the_chamber/Pages/strategy.aspx
778[*] http://www.jcci.org.sa/Arabic/about/board_of_directors/Pages/default.aspx
779[*] http://www.jcci.org.sa/Arabic/about/board_of_directors/Pages/directors.aspx
780[*] http://www.jcci.org.sa/Arabic/about/board_of_directors/Pages/presidentmessage.aspx
781[*] http://www.jcci.org.sa/Arabic/about/infographics/أعداد منتسبي غرفة جدة حتى شهر سبتمبر 2019.jpg
782[*] http://www.jcci.org.sa/Arabic/about/infographics/ارتفاع نسبة مساكن التملك في السعودية.jpg
783[*] http://www.jcci.org.sa/Arabic/about/infographics/التبادل التجاري بين السعودية وكوريا.jpg
784[*] http://www.jcci.org.sa/Arabic/about/infographics/السعودية الأولى عالمياً.jpg
785[*] http://www.jcci.org.sa/Arabic/about/joinus/Pages/default.aspx
786[*] http://www.jcci.org.sa/Arabic/about/Lists/Survey26/NewForm.aspx?Source=/Arabic/Pages/ThanksForSurveying.aspx
787[*] http://www.jcci.org.sa/Arabic/about/mediacenter/newsletter/%D8%A7%D9%84%D9%86%D8%B4%D8%B1%D8%A9%20%D8%A7%D9%84%D8%A7%D9%94%D8%B3%D8%A8%D9%88%D8%B9%D9%8A%D8%A9%20%D8%B9%D8%AF%D8%AF%2090.jpg
788[*] http://www.jcci.org.sa/Arabic/about/mediacenter/Pages/default.aspx
789[*] http://www.jcci.org.sa/Arabic/about/mediacenter/Pages/NewsLetter.aspx
790[*] http://www.jcci.org.sa/Arabic/about/mediacenter/Pages/PressKit.aspx
791[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/chamberNews.aspx
792[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/default.aspx
793[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/Delegations.aspx
794[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/Events.aspx
795[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/تطبيق-ضريبة-السلع-الانتقائية-في-ورشة-عمل-تعريفية-بغرفة-جدة.aspx
796[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/غرفة-جدة-تستضيف-اللقاء-التعريفي-بجائزة-جدة-للإبداع.aspx
797[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/غرفة-جده-تحصر-القطاعات-مرتفعة-النمو-مع-أكسفورد-للأعمال.aspx
798[*] http://www.jcci.org.sa/Arabic/about/news_events-delegations/Pages/منتدى-تمكين-يحصد-أكثر-من800-متقدم-ومتقدمة-للعمل-في-تخصصات-هندسية-وفنية-وإدارية.aspx
799[*] http://www.jcci.org.sa/Arabic/about/Pages/contact-us.aspx
800[*] http://www.jcci.org.sa/arabic/about/Pages/contact-us.aspx
801[*] http://www.jcci.org.sa/Arabic/about/Pages/default.aspx
802[*] http://www.jcci.org.sa/Arabic/about/Pages/faq.aspx
803[*] http://www.jcci.org.sa/Arabic/about/Pages/publications.aspx
804[*] http://www.jcci.org.sa/Arabic/about/Pages/Tell-us-your-Comments.aspx
805[*] http://www.jcci.org.sa/Arabic/about/Pages/سياسة-خصوصية-مواقع-التواصل-الاجتماعي.aspx
806[*] http://www.jcci.org.sa/Arabic/about/secretary_general/Pages/default.aspx
807[*] http://www.jcci.org.sa/Arabic/committies/Pages/about.aspx
808[*] http://www.jcci.org.sa/Arabic/committies/Pages/CircularsSearch.aspx
809[*] http://www.jcci.org.sa/Arabic/committies/Pages/committees_members.aspx
810[*] http://www.jcci.org.sa/Arabic/committies/Pages/default.aspx
811[*] http://www.jcci.org.sa/Arabic/committies/Pages/listOfCommittee.aspx
812[*] http://www.jcci.org.sa/Arabic/committies/Pages/listOfFormationCommittees.aspx
813[*] http://www.jcci.org.sa/Arabic/departments/Pages/communication-sector.aspx
814[*] http://www.jcci.org.sa/Arabic/departments/Pages/default.aspx
815[*] http://www.jcci.org.sa/Arabic/departments/Pages/Economical-and-Social-Development.aspx
816[*] http://www.jcci.org.sa/Arabic/departments/Pages/expo-events-sector.aspx
817[*] http://www.jcci.org.sa/Arabic/departments/Pages/hrdevcenter.aspx
818[*] http://www.jcci.org.sa/Arabic/departments/Pages/HR-sector.aspx
819[*] http://www.jcci.org.sa/Arabic/departments/Pages/International-Relations-Sector.aspx
820[*] http://www.jcci.org.sa/Arabic/departments/Pages/Law-and-conciliation-center-.aspx
821[*] http://www.jcci.org.sa/Arabic/departments/Pages/research-and-studies-center.aspx
822[*] http://www.jcci.org.sa/Arabic/departments/Pages/services-center.aspx
823[*] http://www.jcci.org.sa/Arabic/departments/Pages/قطاع-التطوير-والتميز-المؤسسي.aspx
824[*] http://www.jcci.org.sa/Arabic/departments/Pages/قطاع-التقنية-والمعلومات.aspx
825[*] http://www.jcci.org.sa/Arabic/Documents/Exhibitions Calendar 2019.pdf
826[*] http://www.jcci.org.sa/Arabic/E-services/#Info
827[*] http://www.jcci.org.sa/Arabic/E-services/#Membership
828[*] http://www.jcci.org.sa/Arabic/E-services/Pages/Application-for-registration-in-training-courses.aspx
829[*] http://www.jcci.org.sa/Arabic/e-services/Pages/Business-Directory.aspx
830[*] http://www.jcci.org.sa/Arabic/E-services/Pages/Control-Panel.aspx
831[*] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx
832[*] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Info
833[*] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Membership
834[*] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#Other
835[*] http://www.jcci.org.sa/Arabic/E-services/Pages/default.aspx#payments
836[*] http://www.jcci.org.sa/Arabic/festivals-forums/Pages/default.aspx
837[*] http://www.jcci.org.sa/Arabic/_layouts/Authenticate.aspx?Source=/Arabic/Pages/default.aspx
838[*] http://www.jcci.org.sa/Arabic/Pages/Business-Directory.aspx
839[*] http://www.jcci.org.sa/Arabic/Pages/circularssearch.aspx
840[*] http://www.jcci.org.sa/Arabic/Pages/default.aspx
841[*] http://www.jcci.org.sa/Arabic/Pages/default.aspx#ctl00_ctl65_SkipLink
842[*] http://www.jcci.org.sa/Arabic/pages/login.aspx
843[*] http://www.jcci.org.sa/Arabic/Pages/Registered-users-in-the-portal-Terms-and-Conditions.aspx
844[*] http://www.jcci.org.sa/Arabic/pages/sitemap.aspx
845[*] http://www.jcci.org.sa/Arabic/PublishingImages/Ads/2019/e-services.jpg
846[*] http://www.jcci.org.sa/Arabic/services/memberservices/Pages/default.aspx
847[*] http://www.jcci.org.sa/Arabic/services/Pages/attestation_services.aspx
848[*] http://www.jcci.org.sa/Arabic/services/Pages/commercial_Services.aspx
849[*] http://www.jcci.org.sa/Arabic/services/Pages/default.aspx
850[*] http://www.jcci.org.sa/Arabic/services/Pages/Legal_Services.aspx
851[*] http://www.jcci.org.sa/Arabic/services/Pages/Publications.aspx
852[*] http://www.jcci.org.sa/Arabic/services/Pages/Support_Programs.aspx
853[*] http://www.jcci.org.sa/Arabic/services/Pages/Trade_Delegations.aspx
854[*] http://www.jcci.org.sa/Arabic/services/Pages/Warehouse-City.aspx
855[*] http://www.jcci.org.sa/Arabic/services/portalservices/informationservices/Pages/default.aspx
856[*] http://www.jcci.org.sa/Arabic/services/portalservices/Saudization/jobsopportunities/Pages/default.aspx
857[*] http://www.jcci.org.sa/Arabic/services/portalservices/Saudization/Pages/default.aspx
858[*] http://www.jcci.org.sa/Arabic/services/portalservices/Saudization/Recruitment/Pages/E-recuitment.aspx
859[*] http://www.jcci.org.sa/Arabic/_vti_bin/spsdisco.aspx
860[*] http://www.jcci.org.sa/English/about/about_the_chamber/pages/branches.aspx
861[*] http://www.jcci.org.sa/English/Pages/default.aspx
862[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=221&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
863[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=223&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
864[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=224&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
865[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=225&ListId=19fe72dc-7025-4299-ab3f-9e05b156aca4&WebId=02055705-c010-4d22-93dd-76646be0329f&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
866[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2455&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
867[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2459&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
868[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2475&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
869[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2476&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
870[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=2478&ListId=F7B9370C-CFDE-4963-8FDA-0D9968AC4C76&WebId=02055705-C010-4D22-93DD-76646BE0329F&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
871[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4032&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
872[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4033&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
873[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4035&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
874[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=4036&ListId=bf310367-4369-4680-83a6-fd9dcd354887&WebId=e3832331-41c7-4e75-bca6-d44e412b90f3&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
875[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=5&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
876[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=6&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
877[*] http://www.jcci.org.sa/_layouts/CopyUtil.aspx?Use=id&Action=dispform&ItemId=7&ListId=3efa6dbe-2178-4268-96d6-a473f6b08323&WebId=fb7291c5-b84d-4c1f-b525-d0447f791908&SiteId=81c1294d-8cc0-4780-bd04-091270a6e1eb&Source=http://www.jcci.org.sa/Arabic/Pages/default.aspx
878[*] http://www.jcci.org.sa/ns.html?id=GTM-MNNM5S
879[*] http://www.jcci.org.sa/TradeMagazine/708
880[*] http://www.jcea.org.sa/
881[*] http://www.jeddahcity.com.sa/ar
882[*] http://www.jeddahcity.org.sa/
883[*] http://www.jhrf.net/
884[*] http://www.linkedin.com/company/2574258?trk=tyah
885[*] http://www.twitter.com/jeddahchamber
886[*] http://www.youtube.com/user/JeddahChamber
887cut: intervalle de champ incorrecte
888Saisissez « cut --help » pour plus d'informations.
889[INFO] BING shows 213.230.30.200 is shared with 21 hosts/vhosts
890[INFO] Shodan detected the following opened ports on 213.230.30.200:
891[*] 0
892[*] 4
893[*] 443
894[*] 50
895[*] 8
896[*] 80
897[INFO] ------VirusTotal SECTION------
898[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
899[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
900[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
901[INFO] ------Alexa Rank SECTION------
902[INFO] Percent of Visitors Rank in Country:
903[INFO] Percent of Search Traffic:
904[INFO] Percent of Unique Visits:
905[INFO] Total Sites Linking In:
906[*] Total Sites
907[INFO] Useful links related to www.jcci.org.sa - 213.230.30.200:
908[*] https://www.virustotal.com/pt/ip-address/213.230.30.200/information/
909[*] https://www.hybrid-analysis.com/search?host=213.230.30.200
910[*] https://www.shodan.io/host/213.230.30.200
911[*] https://www.senderbase.org/lookup/?search_string=213.230.30.200
912[*] https://www.alienvault.com/open-threat-exchange/ip/213.230.30.200
913[*] http://pastebin.com/search?q=213.230.30.200
914[*] http://urlquery.net/search.php?q=213.230.30.200
915[*] http://www.alexa.com/siteinfo/www.jcci.org.sa
916[*] http://www.google.com/safebrowsing/diagnostic?site=www.jcci.org.sa
917[*] https://censys.io/ipv4/213.230.30.200
918[*] https://www.abuseipdb.com/check/213.230.30.200
919[*] https://urlscan.io/search/#213.230.30.200
920[*] https://github.com/search?q=213.230.30.200&type=Code
921[INFO] Useful links related to AS28938 - 213.230.0.0/19:
922[*] http://www.google.com/safebrowsing/diagnostic?site=AS:28938
923[*] https://www.senderbase.org/lookup/?search_string=213.230.0.0/19
924[*] http://bgp.he.net/AS28938
925[*] https://stat.ripe.net/AS28938
926[INFO] Date: 30/11/19 | Time: 23:46:54
927[INFO] Total time: 1 minute(s) and 22 second(s)
928#######################################################################################################################################
929Trying "jcci.org.sa"
930Trying "jcci.org.sa"
931;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21030
932;; flags: qr rd ra; QUERY: 1, ANSWER: 16, AUTHORITY: 2, ADDITIONAL: 2
933
934;; QUESTION SECTION:
935;jcci.org.sa. IN ANY
936
937;; ANSWER SECTION:
938jcci.org.sa. 0 IN MX 10 MX3.jcci.org.sa.
939jcci.org.sa. 0 IN MX 10 mx2.jcci.org.sa.
940jcci.org.sa. 0 IN MX 0 Jcci-org-sa.mail.protection.outlook.com.
941jcci.org.sa. 0 IN TXT "+Nei0mpifFKe1PLfNPjV9erwSqmSpg7OZvYpM5S48vE3cSPstApT3XjnWshpQ7icZg+BDUM+qHOIQD9uupDNNQ=="
942jcci.org.sa. 0 IN TXT "nNWBqmyG"
943jcci.org.sa. 0 IN TXT "39v46cg9e7uqruco6jf144r2hm "
944jcci.org.sa. 0 IN TXT "cskRshQj"
945jcci.org.sa. 0 IN TXT "58lggt7l0k9vhi4nboq565rrkg"
946jcci.org.sa. 0 IN TXT "jcci.org.sa zone"
947jcci.org.sa. 0 IN TXT "avrsdk588i2hfdp4g6oip6ic39"
948jcci.org.sa. 0 IN TXT "v=spf1 mx a ptr include:mta1.bayt.com include:spf.protection.outlook.com ~all"
949jcci.org.sa. 0 IN TXT "MS=ms43732361"
950jcci.org.sa. 0 IN A 213.230.30.200
951jcci.org.sa. 0 IN SOA ns1.medu.net.sa. hshiha.medu.net.sa. 2019112001 43200 7200 1209600 3600
952jcci.org.sa. 0 IN NS ns2.medu.net.sa.
953jcci.org.sa. 0 IN NS ns1.medu.net.sa.
954
955;; AUTHORITY SECTION:
956jcci.org.sa. 3599 IN NS ns2.medu.net.sa.
957jcci.org.sa. 3599 IN NS ns1.medu.net.sa.
958
959;; ADDITIONAL SECTION:
960ns2.medu.net.sa. 2843 IN A 213.230.0.20
961ns1.medu.net.sa. 2843 IN A 213.230.0.10
962
963Received 694 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 48 ms
964######################################################################################################################################
965
966; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace jcci.org.sa any
967;; global options: +cmd
968. 79697 IN NS j.root-servers.net.
969. 79697 IN NS a.root-servers.net.
970. 79697 IN NS i.root-servers.net.
971. 79697 IN NS g.root-servers.net.
972. 79697 IN NS b.root-servers.net.
973. 79697 IN NS d.root-servers.net.
974. 79697 IN NS f.root-servers.net.
975. 79697 IN NS k.root-servers.net.
976. 79697 IN NS m.root-servers.net.
977. 79697 IN NS l.root-servers.net.
978. 79697 IN NS h.root-servers.net.
979. 79697 IN NS c.root-servers.net.
980. 79697 IN NS e.root-servers.net.
981. 79697 IN RRSIG NS 8 0 518400 20191213170000 20191130160000 22545 . gGZBrktIkbjNA4wid3KNGdKGTzJmQZVsUjOy9/Itndl7kOXJbr+0iFy1 2IP85x69mlNuvmVBvSEMRxZK6L54hqiW90W6NJ8S7KoughDBayvxcmVq L9v2kRc6JE/cNruyKH1oC+Nm8S1V+ocfOifpm6epGP7B3W3StNSinVvQ +i8h0AziAUpzUcgWqBf9pxx7II199HAkb440poK3BbiBwWJ+F0GGKoFz f+POa3W/jJg1ZYcbQNtDtNxuvv2GBXAPPOkNpFM5+fJdlkYrqcky4hen 9XNjzFXe9/SPMt6FAMt2QPv1oszpFRa3vmlxahrJWRtA75kd5SNP2Ejr UavrOg==
982;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 137 ms
983
984sa. 172800 IN NS i.nic.net.sa.
985sa. 172800 IN NS n.nic.net.sa.
986sa. 172800 IN NS p.nic.net.sa.
987sa. 172800 IN NS s.nic.net.sa.
988sa. 172800 IN NS s2.nic.net.sa.
989sa. 172800 IN NS ns1.nic.net.sa.
990sa. 172800 IN NS ns2.nic.net.sa.
991sa. 86400 IN DS 30574 8 2 02FC3370C8453439627440B913A8C0A6A4698F9E503F6BBB553D75D7 7E34367E
992sa. 86400 IN RRSIG DS 8 1 86400 20191213170000 20191130160000 22545 . RMIj0O/u0K18U4MBQQFbsRYcCq1EwSwSY5PIUFlHMetqRj18/EVQPAzz L4aV0xVQu/eCWE/UFwFhOyJBHgrgSUo4Z6H5H1e+luZcZ9COUpWFy5Ss x2vXN0ic41/7v4l6yiyYvNFf2sYfhpV2acEbAitbTpJZkxpgaMggHhyE 6dAzOb5Jcg9HG8mDsMQQmUcldrKWbrQLeqV1E6cLWTAKbAAIX5PFHDri hpwd16HRub9pgrzvTwPBNRODIMdKcx4YUMJGn3qJYZmftqwYxSXU8kD6 R3PqpDnRBQ9RbNrzd83a66T9/epBk9cILaW49uwxyJsFRxdhjZkPdpX7 rCZpZw==
993;; Received 808 bytes from 192.203.230.10#53(e.root-servers.net) in 179 ms
994
995jcci.org.sa. 3600 IN NS ns1.medu.net.sa.
996jcci.org.sa. 3600 IN NS ns2.medu.net.sa.
997ngc3pu9q0gss7hvep7uv4asn8rivtr4q.org.sa. 3600 IN NSEC3 1 1 5 55D71318097371EC 1A6AD35FJDU30K66CJS4HULRUFG87CIS NS SOA RRSIG DNSKEY NSEC3PARAM
998ngc3pu9q0gss7hvep7uv4asn8rivtr4q.org.sa. 3600 IN RRSIG NSEC3 8 3 3600 20191213160744 20191129150722 65268 org.sa. BJlisnZPLbNw+cpHKJskKS3KMnvLd0GGx4Vr41ZMacFUd0pTieWpdBFY o7oPzlP0JbOSYCUtee2MwMdGtM2CfFgKIYkIoJA7YZqs5xdsLH3CS1EP oa7mOXb8Jop+1d8flUh+CAqXrS2OsQTnd4BP+CWnh1255aVCxxlAUSeW pwN2rPXw57zyv7f2N/SNdd9UGE7QO1TiIKx5TVs1KAhmiS5gLxh6uT4W 27kCGqjDR5T3dHuOc5xX0K2s1PiBjuznXMdCYS4DJ+FaIC+W254kJWRv ybrf90y/Lnkk7aCEh0cF5fYirGuuw+xtWLqMXjAZzYiS5o8/ZnjkN/RP 2IiU1A==
999;; Received 495 bytes from 2001:16a0:1:3002::2#53(s.nic.net.sa) in 186 ms
1000
1001jcci.org.sa. 3600 IN SOA ns1.medu.net.sa. hshiha.medu.net.sa. 2019112001 43200 7200 1209600 3600
1002jcci.org.sa. 3600 IN NS ns2.medu.net.sa.
1003jcci.org.sa. 3600 IN NS ns1.medu.net.sa.
1004jcci.org.sa. 3600 IN A 213.230.30.200
1005jcci.org.sa. 3600 IN TXT "avrsdk588i2hfdp4g6oip6ic39"
1006jcci.org.sa. 3600 IN TXT "MS=ms43732361"
1007jcci.org.sa. 3600 IN TXT "39v46cg9e7uqruco6jf144r2hm "
1008jcci.org.sa. 3600 IN TXT "v=spf1 mx a ptr include:mta1.bayt.com include:spf.protection.outlook.com ~all"
1009jcci.org.sa. 3600 IN TXT "+Nei0mpifFKe1PLfNPjV9erwSqmSpg7OZvYpM5S48vE3cSPstApT3XjnWshpQ7icZg+BDUM+qHOIQD9uupDNNQ=="
1010jcci.org.sa. 3600 IN TXT "cskRshQj"
1011jcci.org.sa. 3600 IN TXT "nNWBqmyG"
1012jcci.org.sa. 3600 IN TXT "jcci.org.sa zone"
1013jcci.org.sa. 3600 IN TXT "58lggt7l0k9vhi4nboq565rrkg"
1014jcci.org.sa. 3600 IN MX 10 mx2.jcci.org.sa.
1015jcci.org.sa. 3600 IN MX 10 MX3.jcci.org.sa.
1016jcci.org.sa. 3600 IN MX 0 Jcci-org-sa.mail.protection.outlook.com.
1017;; Received 709 bytes from 213.230.0.10#53(ns1.medu.net.sa) in 338 ms
1018#######################################################################################################################################
1019[*] Performing General Enumeration of Domain: jcci.org.sa
1020[-] DNSSEC is not configured for jcci.org.sa
1021[*] SOA ns1.medu.net.sa 213.230.0.10
1022[*] NS ns2.medu.net.sa 213.230.0.20
1023[*] NS ns1.medu.net.sa 213.230.0.10
1024[*] MX Jcci-org-sa.mail.protection.outlook.com 104.47.5.36
1025[*] MX Jcci-org-sa.mail.protection.outlook.com 104.47.6.36
1026[*] MX mx2.jcci.org.sa 213.230.30.211
1027[*] MX MX3.jcci.org.sa 213.230.30.219
1028[*] A jcci.org.sa 213.230.30.200
1029[*] TXT jcci.org.sa +Nei0mpifFKe1PLfNPjV9erwSqmSpg7OZvYpM5S48vE3cSPstApT3XjnWshpQ7icZg+BDUM+qHOIQD9uupDNNQ==
1030[*] TXT jcci.org.sa 58lggt7l0k9vhi4nboq565rrkg
1031[*] TXT jcci.org.sa avrsdk588i2hfdp4g6oip6ic39
1032[*] TXT jcci.org.sa jcci.org.sa zone
1033[*] TXT jcci.org.sa cskRshQj
1034[*] TXT jcci.org.sa nNWBqmyG
1035[*] TXT jcci.org.sa 39v46cg9e7uqruco6jf144r2hm
1036[*] TXT jcci.org.sa v=spf1 mx a ptr include:mta1.bayt.com include:spf.protection.outlook.com ~all
1037[*] TXT jcci.org.sa MS=ms43732361
1038[*] Enumerating SRV Records
1039[*] SRV _sipfederationtls._tcp.jcci.org.sa sipfed.online.lync.com 52.112.65.203 5061 1
1040[*] SRV _sipfederationtls._tcp.jcci.org.sa sipfed.online.lync.com 2603:1037:0:2::b 5061 1
1041[*] SRV _sip._tls.jcci.org.sa sipdir.online.lync.com 52.112.65.27 443 1
1042[*] SRV _sip._tls.jcci.org.sa sipdir.online.lync.com 2603:1037:0:2::b 443 1
1043[+] 4 Records Found
1044######################################################################################################################################
1045[*] Processing domain jcci.org.sa
1046[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1047[+] Getting nameservers
1048213.230.0.20 - ns2.medu.net.sa
1049213.230.0.10 - ns1.medu.net.sa
1050[-] Zone transfer failed
1051
1052[+] TXT records found
1053"+Nei0mpifFKe1PLfNPjV9erwSqmSpg7OZvYpM5S48vE3cSPstApT3XjnWshpQ7icZg+BDUM+qHOIQD9uupDNNQ=="
1054"58lggt7l0k9vhi4nboq565rrkg"
1055"avrsdk588i2hfdp4g6oip6ic39"
1056"jcci.org.sa zone"
1057"cskRshQj"
1058"nNWBqmyG"
1059"39v46cg9e7uqruco6jf144r2hm "
1060"v=spf1 mx a ptr include:mta1.bayt.com include:spf.protection.outlook.com ~all"
1061"MS=ms43732361"
1062
1063[+] MX records found, added to target list
10640 Jcci-org-sa.mail.protection.outlook.com.
106510 mx2.jcci.org.sa.
106610 MX3.jcci.org.sa.
1067
1068[*] Scanning jcci.org.sa for A records
1069213.230.30.200 - jcci.org.sa
1070213.230.30.219 - MX3.jcci.org.sa
107152.96.10.248 - autodiscover.jcci.org.sa
107240.97.199.120 - autodiscover.jcci.org.sa
107340.97.212.8 - autodiscover.jcci.org.sa
107440.97.92.40 - autodiscover.jcci.org.sa
107552.96.16.168 - autodiscover.jcci.org.sa
107640.97.120.168 - autodiscover.jcci.org.sa
107740.97.120.152 - autodiscover.jcci.org.sa
107840.97.96.8 - autodiscover.jcci.org.sa
1079213.230.30.203 - beta.jcci.org.sa
1080209.251.59.167 - careers.jcci.org.sa
1081212.230.30.203 - fax.jcci.org.sa
108252.112.66.107 - lyncdiscover.jcci.org.sa
1083213.230.30.213 - mail.jcci.org.sa
1084213.230.30.211 - mx2.jcci.org.sa
1085213.230.30.219 - mx3.jcci.org.sa
108652.112.65.27 - sip.jcci.org.sa
1087213.230.30.203 - survey.jcci.org.sa
1088213.230.30.208 - vpn.jcci.org.sa
1089213.230.30.200 - www.jcci.org.sa
1090######################################################################################################################################
1091
1092 AVAILABLE PLUGINS
1093 -----------------
1094
1095 FallbackScsvPlugin
1096 OpenSslCipherSuitesPlugin
1097 EarlyDataPlugin
1098 CertificateInfoPlugin
1099 HeartbleedPlugin
1100 RobotPlugin
1101 HttpHeadersPlugin
1102 OpenSslCcsInjectionPlugin
1103 CompressionPlugin
1104 SessionRenegotiationPlugin
1105 SessionResumptionPlugin
1106
1107
1108
1109 CHECKING HOST(S) AVAILABILITY
1110 -----------------------------
1111
1112 213.230.30.200:443 => 213.230.30.200
1113
1114
1115
1116
1117 SCAN RESULTS FOR 213.230.30.200:443 - 213.230.30.200
1118 ----------------------------------------------------
1119
1120 * TLSV1_3 Cipher Suites:
1121 Server rejected all cipher suites.
1122
1123 * Downgrade Attacks:
1124 TLS_FALLBACK_SCSV: VULNERABLE - Signaling cipher suite not supported
1125
1126 * Session Renegotiation:
1127 Client-initiated Renegotiation: OK - Rejected
1128 Secure Renegotiation: OK - Supported
1129
1130 * Certificate Information:
1131 Content
1132 SHA1 Fingerprint: 3d7d06b216810a6f240791a4ae78245499f1b6a4
1133 Common Name: jcci.org.sa
1134 Issuer: Go Daddy Secure Certificate Authority - G2
1135 Serial Number: 11604389065375119078
1136 Not Before: 2019-01-23 12:20:29
1137 Not After: 2019-12-29 09:06:00
1138 Signature Algorithm: sha256
1139 Public Key Algorithm: RSA
1140 Key Size: 2048
1141 Exponent: 65537 (0x10001)
1142 DNS Subject Alternative Names: ['jcci.org.sa', 'www.jcci.org.sa', 'jcap.jcci.org.sa', 'volunteerportal.jcci.org.sa', 'vpn.jcci.org.sa']
1143
1144 Trust
1145 Hostname Validation: FAILED - Certificate does NOT match 213.230.30.200
1146 Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: ok
1147 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: ok
1148 Java CA Store (jdk-12.0.1): FAILED - Certificate is NOT Trusted: ok
1149 Mozilla CA Store (2019-03-14): FAILED - Certificate is NOT Trusted: ok
1150 Windows CA Store (2019-05-27): FAILED - Certificate is NOT Trusted: ok
1151 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
1152 Received Chain: jcci.org.sa --> Go Daddy Secure Certificate Authority - G2
1153 Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
1154 Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
1155 Received Chain Order: OK - Order is valid
1156 Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
1157
1158 Extensions
1159 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1160 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
1161
1162 OCSP Stapling
1163 OCSP Response Status: successful
1164 Validation w/ Mozilla Store: FAILED - Response is NOT trusted
1165 Responder Id: C = US, ST = Arizona, L = Scottsdale, O = GoDaddy Inc., CN = Go Daddy Validation Authority - G2
1166 Cert Status: good
1167 Cert Serial Number: A10B125F4D1C76E6
1168 This Update: Nov 30 08:36:34 2019 GMT
1169 Next Update: Dec 1 20:36:34 2019 GMT
1170
1171 * TLSV1_1 Cipher Suites:
1172 Server rejected all cipher suites.
1173
1174 * OpenSSL Heartbleed:
1175 OK - Not vulnerable to Heartbleed
1176
1177 * TLSV1_2 Cipher Suites:
1178 Server rejected all cipher suites.
1179
1180 * TLSV1 Cipher Suites:
1181 Forward Secrecy OK - Supported
1182 RC4 INSECURE - Supported
1183
1184 Preferred:
1185 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1186 Accepted:
1187 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1188 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1189 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1190 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1191 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1192 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1193 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1194 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1195 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1196
1197 * ROBOT Attack:
1198 OK - Not vulnerable
1199
1200 * SSLV3 Cipher Suites:
1201 Forward Secrecy INSECURE - Not Supported
1202 RC4 INSECURE - Supported
1203
1204 Preferred:
1205 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1206 Accepted:
1207 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1208 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1209 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1210
1211 * OpenSSL CCS Injection:
1212 OK - Not vulnerable to OpenSSL CCS injection
1213
1214 * TLS 1.2 Session Resumption Support:
1215 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
1216 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
1217
1218 * Deflate Compression:
1219 OK - Compression disabled
1220
1221 * SSLV2 Cipher Suites:
1222 Forward Secrecy INSECURE - Not Supported
1223 RC4 INSECURE - Supported
1224
1225 Preferred:
1226 None - Server followed client cipher suite preference.
1227 Accepted:
1228 SSL_CK_RC4_128_WITH_MD5 128 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1229 SSL_CK_DES_192_EDE3_CBC_WITH_MD5 112 bits HTTP 302 Redirect - https://www.jcci.org.sa/Arabic/Pages/default.aspx
1230
1231
1232 SCAN COMPLETED IN 38.70 S
1233 -------------------------
1234#######################################################################################################################################
1235Domains still to check: 1
1236 Checking if the hostname jcci.org.sa. given is in fact a domain...
1237
1238Analyzing domain: jcci.org.sa.
1239 Checking NameServers using system default resolver...
1240 IP: 213.230.0.20 (Saudi Arabia)
1241 HostName: ns2.medu.net.sa Type: NS
1242 HostName: ns2.medu.net.sa Type: PTR
1243 IP: 213.230.0.10 (Saudi Arabia)
1244 HostName: ns1.medu.net.sa Type: NS
1245 HostName: ns1.medu.net.sa Type: PTR
1246
1247 Checking MailServers using system default resolver...
1248 IP: 104.47.4.36 (Netherlands)
1249 HostName: Jcci-org-sa.mail.protection.outlook.com Type: MX
1250 HostName: mail-am5eur020036.inbound.protection.outlook.com Type: PTR
1251 IP: 104.47.6.36 (Austria)
1252 HostName: Jcci-org-sa.mail.protection.outlook.com Type: MX
1253 HostName: mail-ve1eur020036.inbound.protection.outlook.com Type: PTR
1254 IP: 213.230.30.211 (Saudi Arabia)
1255 HostName: mx2.jcci.org.sa Type: MX
1256 HostName: mx2.jcci.org.sa Type: PTR
1257 IP: 213.230.30.219 (Saudi Arabia)
1258 HostName: MX3.jcci.org.sa Type: MX
1259 HostName: mx3.jcci.org.sa Type: PTR
1260
1261 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1262 No zone transfer found on nameserver 213.230.0.10
1263 No zone transfer found on nameserver 213.230.0.20
1264
1265 Checking SPF record...
1266
1267 Checking SPF record...
1268 New IP found: 209.251.59.109
1269
1270 Checking SPF record...
1271 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
1272 New IP found: 40.92.0.0
1273 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
1274 New IP found: 40.107.0.0
1275 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
1276 New IP found: 52.100.0.0
1277 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
1278 New IP found: 104.47.0.0
1279 There are no IPv4 addresses in the SPF. Maybe IPv6.
1280 There are no IPv4 addresses in the SPF. Maybe IPv6.
1281
1282 Checking 192 most common hostnames using system default resolver...
1283 IP: 213.230.30.200 (Saudi Arabia)
1284 HostName: www.jcci.org.sa. Type: A
1285 IP: 213.230.30.213 (Saudi Arabia)
1286 HostName: mail.jcci.org.sa. Type: A
1287 IP: 212.230.30.203 (Spain)
1288 HostName: fax.jcci.org.sa. Type: A
1289
1290 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1291 Checking netblock 52.100.0.0
1292 Checking netblock 213.230.30.0
1293 Checking netblock 104.47.4.0
1294 Checking netblock 209.251.59.0
1295 Checking netblock 104.47.6.0
1296 Checking netblock 212.230.30.0
1297 Checking netblock 104.47.0.0
1298 Checking netblock 213.230.0.0
1299 Checking netblock 40.107.0.0
1300 Checking netblock 40.92.0.0
1301
1302 Searching for jcci.org.sa. emails in Google
1303 info@jcci.org.sa.
1304 basmah@jcci.org.sa
1305 denoman@jcci.org.sa
1306 mohbabgi@jcci.org.sa.
1307 saif@jcci.org.sa�
1308 info@jcci.org.sa�
1309 yahyam@jcci.org.sa.
1310 info@jcci.org.sa
1311 last@jcci.org.sa
1312 younes@jcci.org.sa
1313
1314 Checking 14 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1315 Host 52.100.0.0 is up (reset ttl 64)
1316 Host 213.230.30.213 is up (reset ttl 64)
1317 Host 104.47.4.36 is up (reset ttl 64)
1318 Host 213.230.30.200 is up (reset ttl 64)
1319 Host 209.251.59.109 is up (reset ttl 64)
1320 Host 104.47.6.36 is up (reset ttl 64)
1321 Host 213.230.30.219 is up (reset ttl 64)
1322 Host 212.230.30.203 is up (reset ttl 64)
1323 Host 213.230.30.211 is up (reset ttl 64)
1324 Host 104.47.0.0 is up (reset ttl 64)
1325 Host 213.230.0.10 is up (reset ttl 64)
1326 Host 40.107.0.0 is up (reset ttl 64)
1327 Host 40.92.0.0 is up (reset ttl 64)
1328 Host 213.230.0.20 is up (reset ttl 64)
1329
1330 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1331 Scanning ip 52.100.0.0 ():
1332 Scanning ip 213.230.30.213 (mail.jcci.org.sa.):
1333 Scanning ip 104.47.4.36 (mail-am5eur020036.inbound.protection.outlook.com (PTR)):
1334 Scanning ip 213.230.30.200 (www.jcci.org.sa.):
1335 Scanning ip 209.251.59.109 ():
1336 Scanning ip 104.47.6.36 (mail-ve1eur020036.inbound.protection.outlook.com (PTR)):
1337 Scanning ip 213.230.30.219 (mx3.jcci.org.sa (PTR)):
1338 Scanning ip 212.230.30.203 (fax.jcci.org.sa.):
1339 Scanning ip 213.230.30.211 (mx2.jcci.org.sa (PTR)):
1340 Scanning ip 104.47.0.0 ():
1341 Scanning ip 213.230.0.10 (ns1.medu.net.sa (PTR)):
1342 53/tcp open domain syn-ack ttl 46 (generic dns response: NOTIMP)
1343 | fingerprint-strings:
1344 | DNSVersionBindReqTCP:
1345 | version
1346 |_ bind
1347 8008/tcp open http syn-ack ttl 48
1348 | fingerprint-strings:
1349 | FourOhFourRequest:
1350 | HTTP/1.1 302 Found
1351 | Location: https://:8010/nice%20ports%2C/Tri%6Eity.txt%2ebak
1352 | Connection: close
1353 | X-Frame-Options: SAMEORIGIN
1354 | X-XSS-Protection: 1; mode=block
1355 | X-Content-Type-Options: nosniff
1356 | Content-Security-Policy: frame-ancestors
1357 | GenericLines, HTTPOptions, RTSPRequest, SIPOptions:
1358 | HTTP/1.1 302 Found
1359 | Location: https://:8010
1360 | Connection: close
1361 | X-Frame-Options: SAMEORIGIN
1362 | X-XSS-Protection: 1; mode=block
1363 | X-Content-Type-Options: nosniff
1364 | Content-Security-Policy: frame-ancestors
1365 | GetRequest:
1366 | HTTP/1.1 302 Found
1367 | Location: https://:8010/
1368 | Connection: close
1369 | X-Frame-Options: SAMEORIGIN
1370 | X-XSS-Protection: 1; mode=block
1371 | X-Content-Type-Options: nosniff
1372 |_ Content-Security-Policy: frame-ancestors
1373 | http-methods:
1374 |_ Supported Methods: GET HEAD POST OPTIONS
1375 |_http-title: Did not follow redirect to https://213.230.0.10:8010/
1376 |_https-redirect: ERROR: Script execution failed (use -d to debug)
1377 Scanning ip 40.107.0.0 ():
1378 Scanning ip 40.92.0.0 ():
1379 Scanning ip 213.230.0.20 (ns2.medu.net.sa (PTR)):
1380 53/tcp open domain syn-ack ttl 47 (generic dns response: NOTIMP)
1381 | fingerprint-strings:
1382 | DNSVersionBindReqTCP:
1383 | version
1384 |_ bind
1385 8008/tcp open http syn-ack ttl 47
1386 | fingerprint-strings:
1387 | FourOhFourRequest:
1388 | HTTP/1.1 302 Found
1389 | Location: https://:8010/nice%20ports%2C/Tri%6Eity.txt%2ebak
1390 | Connection: close
1391 | X-Frame-Options: SAMEORIGIN
1392 | X-XSS-Protection: 1; mode=block
1393 | X-Content-Type-Options: nosniff
1394 | Content-Security-Policy: frame-ancestors
1395 | GenericLines, HTTPOptions, RTSPRequest, SIPOptions:
1396 | HTTP/1.1 302 Found
1397 | Location: https://:8010
1398 | Connection: close
1399 | X-Frame-Options: SAMEORIGIN
1400 | X-XSS-Protection: 1; mode=block
1401 | X-Content-Type-Options: nosniff
1402 | Content-Security-Policy: frame-ancestors
1403 | GetRequest:
1404 | HTTP/1.1 302 Found
1405 | Location: https://:8010/
1406 | Connection: close
1407 | X-Frame-Options: SAMEORIGIN
1408 | X-XSS-Protection: 1; mode=block
1409 | X-Content-Type-Options: nosniff
1410 |_ Content-Security-Policy: frame-ancestors
1411 | http-methods:
1412 |_ Supported Methods: GET HEAD POST OPTIONS
1413 |_http-title: Did not follow redirect to https://213.230.0.20:8010/
1414 |_https-redirect: ERROR: Script execution failed (use -d to debug)
1415 WebCrawling domain's web servers... up to 50 max links.
1416
1417 + URL to crawl: http://ns1.medu.net.sa:8008
1418 + Date: 2019-12-01
1419
1420 + Crawling URL: http://ns1.medu.net.sa:8008:
1421 + Links:
1422 + Crawling http://ns1.medu.net.sa:8008 (timed out)
1423 + Searching for directories...
1424 + Searching open folders...
1425
1426
1427 + URL to crawl: http://ns2.medu.net.sa:8008
1428 + Date: 2019-12-01
1429
1430 + Crawling URL: http://ns2.medu.net.sa:8008:
1431 + Links:
1432 + Crawling http://ns2.medu.net.sa:8008 (timed out)
1433 + Searching for directories...
1434 + Searching open folders...
1435
1436--Finished--
1437Summary information for domain jcci.org.sa.
1438-----------------------------------------
1439 Domain Specific Information:
1440 Email: info@jcci.org.sa.
1441 Email: basmah@jcci.org.sa
1442 Email: denoman@jcci.org.sa
1443 Email: mohbabgi@jcci.org.sa.
1444 Email: saif@jcci.org.sa�
1445 Email: info@jcci.org.sa�
1446 Email: yahyam@jcci.org.sa.
1447 Email: info@jcci.org.sa
1448 Email: last@jcci.org.sa
1449 Email: younes@jcci.org.sa
1450
1451 Domain Ips Information:
1452 IP: 52.100.0.0
1453 Type: SPF
1454 Is Active: True (reset ttl 64)
1455 IP: 213.230.30.213
1456 HostName: mail.jcci.org.sa. Type: A
1457 Country: Saudi Arabia
1458 Is Active: True (reset ttl 64)
1459 IP: 104.47.4.36
1460 HostName: Jcci-org-sa.mail.protection.outlook.com Type: MX
1461 HostName: mail-am5eur020036.inbound.protection.outlook.com Type: PTR
1462 Country: Netherlands
1463 Is Active: True (reset ttl 64)
1464 IP: 213.230.30.200
1465 HostName: www.jcci.org.sa. Type: A
1466 Country: Saudi Arabia
1467 Is Active: True (reset ttl 64)
1468 IP: 209.251.59.109
1469 Type: SPF
1470 Is Active: True (reset ttl 64)
1471 IP: 104.47.6.36
1472 HostName: Jcci-org-sa.mail.protection.outlook.com Type: MX
1473 HostName: mail-ve1eur020036.inbound.protection.outlook.com Type: PTR
1474 Country: Austria
1475 Is Active: True (reset ttl 64)
1476 IP: 213.230.30.219
1477 HostName: MX3.jcci.org.sa Type: MX
1478 HostName: mx3.jcci.org.sa Type: PTR
1479 Country: Saudi Arabia
1480 Is Active: True (reset ttl 64)
1481 IP: 212.230.30.203
1482 HostName: fax.jcci.org.sa. Type: A
1483 Country: Spain
1484 Is Active: True (reset ttl 64)
1485 IP: 213.230.30.211
1486 HostName: mx2.jcci.org.sa Type: MX
1487 HostName: mx2.jcci.org.sa Type: PTR
1488 Country: Saudi Arabia
1489 Is Active: True (reset ttl 64)
1490 IP: 104.47.0.0
1491 Type: SPF
1492 Is Active: True (reset ttl 64)
1493 IP: 213.230.0.10
1494 HostName: ns1.medu.net.sa Type: NS
1495 HostName: ns1.medu.net.sa Type: PTR
1496 Country: Saudi Arabia
1497 Is Active: True (reset ttl 64)
1498 Port: 53/tcp open domain syn-ack ttl 46 (generic dns response: NOTIMP)
1499 Script Info: | fingerprint-strings:
1500 Script Info: | DNSVersionBindReqTCP:
1501 Script Info: | version
1502 Script Info: |_ bind
1503 Port: 8008/tcp open http syn-ack ttl 48
1504 Script Info: | fingerprint-strings:
1505 Script Info: | FourOhFourRequest:
1506 Script Info: | HTTP/1.1 302 Found
1507 Script Info: | Location: https://:8010/nice%20ports%2C/Tri%6Eity.txt%2ebak
1508 Script Info: | Connection: close
1509 Script Info: | X-Frame-Options: SAMEORIGIN
1510 Script Info: | X-XSS-Protection: 1; mode=block
1511 Script Info: | X-Content-Type-Options: nosniff
1512 Script Info: | Content-Security-Policy: frame-ancestors
1513 Script Info: | GenericLines, HTTPOptions, RTSPRequest, SIPOptions:
1514 Script Info: | HTTP/1.1 302 Found
1515 Script Info: | Location: https://:8010
1516 Script Info: | Connection: close
1517 Script Info: | X-Frame-Options: SAMEORIGIN
1518 Script Info: | X-XSS-Protection: 1; mode=block
1519 Script Info: | X-Content-Type-Options: nosniff
1520 Script Info: | Content-Security-Policy: frame-ancestors
1521 Script Info: | GetRequest:
1522 Script Info: | HTTP/1.1 302 Found
1523 Script Info: | Location: https://:8010/
1524 Script Info: | Connection: close
1525 Script Info: | X-Frame-Options: SAMEORIGIN
1526 Script Info: | X-XSS-Protection: 1; mode=block
1527 Script Info: | X-Content-Type-Options: nosniff
1528 Script Info: |_ Content-Security-Policy: frame-ancestors
1529 Script Info: | http-methods:
1530 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1531 Script Info: |_http-title: Did not follow redirect to https://213.230.0.10:8010/
1532 Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
1533 IP: 40.107.0.0
1534 Type: SPF
1535 Is Active: True (reset ttl 64)
1536 IP: 40.92.0.0
1537 Type: SPF
1538 Is Active: True (reset ttl 64)
1539 IP: 213.230.0.20
1540 HostName: ns2.medu.net.sa Type: NS
1541 HostName: ns2.medu.net.sa Type: PTR
1542 Country: Saudi Arabia
1543 Is Active: True (reset ttl 64)
1544 Port: 53/tcp open domain syn-ack ttl 47 (generic dns response: NOTIMP)
1545 Script Info: | fingerprint-strings:
1546 Script Info: | DNSVersionBindReqTCP:
1547 Script Info: | version
1548 Script Info: |_ bind
1549 Port: 8008/tcp open http syn-ack ttl 47
1550 Script Info: | fingerprint-strings:
1551 Script Info: | FourOhFourRequest:
1552 Script Info: | HTTP/1.1 302 Found
1553 Script Info: | Location: https://:8010/nice%20ports%2C/Tri%6Eity.txt%2ebak
1554 Script Info: | Connection: close
1555 Script Info: | X-Frame-Options: SAMEORIGIN
1556 Script Info: | X-XSS-Protection: 1; mode=block
1557 Script Info: | X-Content-Type-Options: nosniff
1558 Script Info: | Content-Security-Policy: frame-ancestors
1559 Script Info: | GenericLines, HTTPOptions, RTSPRequest, SIPOptions:
1560 Script Info: | HTTP/1.1 302 Found
1561 Script Info: | Location: https://:8010
1562 Script Info: | Connection: close
1563 Script Info: | X-Frame-Options: SAMEORIGIN
1564 Script Info: | X-XSS-Protection: 1; mode=block
1565 Script Info: | X-Content-Type-Options: nosniff
1566 Script Info: | Content-Security-Policy: frame-ancestors
1567 Script Info: | GetRequest:
1568 Script Info: | HTTP/1.1 302 Found
1569 Script Info: | Location: https://:8010/
1570 Script Info: | Connection: close
1571 Script Info: | X-Frame-Options: SAMEORIGIN
1572 Script Info: | X-XSS-Protection: 1; mode=block
1573 Script Info: | X-Content-Type-Options: nosniff
1574 Script Info: |_ Content-Security-Policy: frame-ancestors
1575 Script Info: | http-methods:
1576 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1577 Script Info: |_http-title: Did not follow redirect to https://213.230.0.20:8010/
1578 Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
1579#######################################################################################################################################
1580traceroute to www.jcci.org.sa (213.230.30.200), 30 hops max, 60 byte packets
1581 1 10.253.204.1 (10.253.204.1) 87.375 ms 130.007 ms 130.008 ms
1582 2 vlan102.as02.qc1.ca.m247.com (176.113.74.17) 130.054 ms 130.041 ms 129.982 ms
1583 3 xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166) 130.019 ms 129.957 ms 129.943 ms
1584 4 vlan304.as032.buc.ro.m247.com (77.243.185.226) 129.811 ms 129.794 ms 129.779 ms
1585 5 ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98) 175.720 ms 175.714 ms 175.698 ms
1586 6 if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26) 311.249 ms 267.994 ms 331.909 ms
1587 7 if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90) 282.373 ms 331.671 ms 331.681 ms
1588 8 if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58) 282.118 ms 249.760 ms 282.085 ms
1589 9 if-ae-4-2.tcore2.l78-london.as6453.net (80.231.131.157) 282.095 ms 282.092 ms 282.037 ms
159010 if-ae-9-2.tcore2.wyn-marseille.as6453.net (80.231.200.13) 331.453 ms 331.428 ms 331.405 ms
159111 if-xe-7-3-0-15.tcore1.jsd-jeddah.as6453.net (195.219.167.77) 331.319 ms if-ae-35-3.tcore1.jsd-jeddah.as6453.net (80.231.200.35) 291.786 ms if-xe-7-1-1-21.tcore1.jsd-jeddah.as6453.net (195.219.167.14) 291.676 ms
159212 195.219.153.6 (195.219.153.6) 258.277 ms 225.918 ms 275.992 ms
159313 10.188.199.113 (10.188.199.113) 225.780 ms * *
159414 84-235-111-185.igw.com.sa (84.235.111.185) 275.874 ms 319.707 ms 319.606 ms
1595######################################################################################################################################
1596----- jcci.org.sa -----
1597
1598
1599Host's addresses:
1600__________________
1601
1602jcci.org.sa. 1476 IN A 213.230.30.200
1603
1604
1605Name Servers:
1606______________
1607
1608ns2.medu.net.sa. 98 IN A 213.230.0.20
1609ns1.medu.net.sa. 98 IN A 213.230.0.10
1610
1611
1612Mail (MX) Servers:
1613___________________
1614
1615mx2.jcci.org.sa. 1476 IN A 213.230.30.211
1616MX3.jcci.org.sa. 1732 IN A 213.230.30.219
1617Jcci-org-sa.mail.protection.outlook.com. 10 IN A 104.47.5.36
1618Jcci-org-sa.mail.protection.outlook.com. 10 IN A 104.47.6.36
1619
1620
1621
1622Brute forcing with /usr/share/dnsenum/dns.txt:
1623_______________________________________________
1624
1625beta.jcci.org.sa. 1451 IN A 213.230.30.203
1626mail.jcci.org.sa. 1420 IN A 213.230.30.213
1627mx3.jcci.org.sa. 1654 IN A 213.230.30.219
1628mx2.jcci.org.sa. 1398 IN A 213.230.30.211
1629survey.jcci.org.sa. 667 IN A 213.230.30.203
1630vpn.jcci.org.sa. 1392 IN A 213.230.30.208
1631www.jcci.org.sa. 613 IN CNAME jcci.org.sa.
1632jcci.org.sa. 613 IN A 213.230.30.200
1633
1634
1635Launching Whois Queries:
1636_________________________
1637
1638 whois ip result: 213.230.30.0 -> 213.230.0.0/19
1639
1640
1641jcci.org.sa___________
1642
1643 213.230.0.0/19
1644#######################################################################################################################################
1645Arachni - Web Application Security Scanner Framework v1.5.1
1646 Author: Tasos "Zapotek" Laskos <tasos.laskos@arachni-scanner.com>
1647
1648 (With the support of the community and the Arachni Team.)
1649
1650 Website: http://arachni-scanner.com
1651 Documentation: http://arachni-scanner.com/wiki
1652
1653
1654[+] In server with action http://213.230.30.200/
1655[+] In server with action http://213.230.30.200/
1656[+] In server with action http://213.230.30.200/crossdomain.xml
1657[+] Interesting responses: Found an interesting response -- Code: 401.
1658[+] In server with action http://213.230.30.200/%3Cmy_tag_2f2f5e61b1f163dbf0c1c62113460eb0/%3E
1659[+] Interesting responses: Found an interesting response -- Code: 400.
1660================================================================================
1661
1662
1663[+] Web Application Security Report - Arachni Framework
1664
1665[~] Report generated on: 2019-12-01 00:42:54 -0500
1666[~] Report false positives at: http://github.com/Arachni/arachni/issues
1667
1668[+] System settings:
1669[~] ---------------
1670[~] Version: 1.5.1
1671[~] Seed: 2f2f5e61b1f163dbf0c1c62113460eb0
1672[~] Audit started on: 2019-12-01 00:42:43 -0500
1673[~] Audit finished on: 2019-12-01 00:42:54 -0500
1674[~] Runtime: 00:00:10
1675
1676[~] URL: http://213.230.30.200/
1677[~] User agent: Arachni/v1.5.1
1678
1679[*] Audited elements:
1680[~] * Links
1681[~] * Forms
1682[~] * Cookies
1683[~] * XMLs
1684[~] * JSONs
1685[~] * UI inputs
1686[~] * UI forms
1687
1688[*] Checks: backup_directories, backup_files, insecure_cross_domain_policy_access, localstart_asp, directory_listing, http_put, origin_spoof_access_restriction_bypass, backdoors, common_directories, common_files, allowed_methods, htaccess_limit, interesting_responses, xst, webdav, insecure_cross_domain_policy_headers, hsts, http_only_cookies, captcha, form_upload, cookie_set_for_parent_domain, insecure_cors_policy, insecure_cookies, x_frame_options, password_autocomplete, unencrypted_password_forms, private_ip, mixed_resource, html_objects, cvs_svn_users, emails, ssn, credit_card, common_admin_interfaces, insecure_client_access_policy, file_inclusion, xss_dom_script_context, code_injection_php_input_wrapper, response_splitting, xss_tag, sql_injection_timing, path_traversal, unvalidated_redirect, no_sql_injection_differential, xss, xss_dom, os_cmd_injection, csrf, unvalidated_redirect_dom, rfi, xss_script_context, ldap_injection, xxe, xss_event, xpath_injection, os_cmd_injection_timing, code_injection_timing, xss_path, no_sql_injection, sql_injection_differential, code_injection, source_code_disclosure, trainer, sql_injection, session_fixation
1689
1690[~] ===========================
1691
1692[+] 4 issues were detected.
1693
1694[+] [1] Missing 'X-Frame-Options' header (Trusted)
1695[~] ~~~~~~~~~~~~~~~~~~~~
1696[~] Digest: 2450875577
1697[~] Severity: Low
1698[~] Description:
1699[~]
1700Clickjacking (User Interface redress attack, UI redress attack, UI redressing)
1701is a malicious technique of tricking a Web user into clicking on something different
1702from what the user perceives they are clicking on, thus potentially revealing
1703confidential information or taking control of their computer while clicking on
1704seemingly innocuous web pages.
1705
1706The server didn't return an `X-Frame-Options` header which means that this website
1707could be at risk of a clickjacking attack.
1708
1709The `X-Frame-Options` HTTP response header can be used to indicate whether or not
1710a browser should be allowed to render a page inside a frame or iframe. Sites can
1711use this to avoid clickjacking attacks, by ensuring that their content is not
1712embedded into other sites.
1713
1714[~] Tags:
1715
1716[~] CWE: http://cwe.mitre.org/data/definitions/693.html
1717[~] References:
1718[~] MDN - https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options
1719[~] RFC - http://tools.ietf.org/html/rfc7034
1720[~] OWASP - https://www.owasp.org/index.php/Clickjacking
1721
1722[~] URL: http://213.230.30.200/
1723[~] Element: server
1724
1725[~] Proof: "HTTP/1.1 401 Unauthorized"
1726
1727[~] Referring page: http://213.230.30.200/
1728
1729[~] Affected page: http://213.230.30.200/
1730[~] HTTP request
1731GET / HTTP/1.1
1732Host: 213.230.30.200
1733Accept-Encoding: gzip, deflate
1734User-Agent: Arachni/v1.5.1
1735Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
1736Accept-Language: en-US,en;q=0.8,he;q=0.6
1737X-Arachni-Scan-Seed: 2f2f5e61b1f163dbf0c1c62113460eb0
1738
1739
1740[+] [2] Insecure 'Access-Control-Allow-Origin' header (Trusted)
1741[~] ~~~~~~~~~~~~~~~~~~~~
1742[~] Digest: 1446276526
1743[~] Severity: Low
1744[~] Description:
1745[~]
1746_Cross Origin Resource Sharing (CORS)_ is an HTML5 technology which gives modern
1747web browsers the ability to bypass restrictions implemented by the _Same Origin Policy_.
1748The _Same Origin Policy_ requires that both the JavaScript and the page are loaded
1749from the same domain in order to allow JavaScript to interact with the page. This
1750in turn prevents malicious JavaScript being executed when loaded from external domains.
1751
1752The CORS policy allows the application to specify exceptions to the protections
1753implemented by the browser, and allows the developer to whitelist domains for
1754which external JavaScript is permitted to execute and interact with the page.
1755
1756A weak CORS policy is one which whitelists all domains using a wildcard (`*`),
1757which will allow any externally loaded JavaScript resource to interact with the
1758affected page. This can severely increase the risk of attacks such as Cross Site Scripting etc.
1759
1760Arachni detected that the CORS policy being set by the server was weak, and used
1761a wildcard value. This is evident by the `Access-Control-Allow-Origin` header being set to `*`.
1762
1763[~] Tags:
1764[~] References:
1765[~] OWASP - https://www.owasp.org/index.php/CORS_OriginHeaderScrutiny
1766[~] Mozilla Developer Network - https://developer.mozilla.org/en-US/docs/Web/HTTP/Access_control_CORS
1767
1768[~] URL: http://213.230.30.200/
1769[~] Element: server
1770
1771[~] Proof: "Access-Control-Allow-Origin: *\r"
1772
1773[~] Referring page: http://213.230.30.200/
1774
1775[~] Affected page: http://213.230.30.200/
1776[~] HTTP request
1777GET / HTTP/1.1
1778Host: 213.230.30.200
1779Accept-Encoding: gzip, deflate
1780User-Agent: Arachni/v1.5.1
1781Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
1782Accept-Language: en-US,en;q=0.8,he;q=0.6
1783X-Arachni-Scan-Seed: 2f2f5e61b1f163dbf0c1c62113460eb0
1784
1785[+] [3] Interesting response (Trusted)
1786[~] ~~~~~~~~~~~~~~~~~~~~
1787[~] Digest: 2892607401
1788[~] Severity: Informational
1789[~] Description:
1790[~]
1791The server responded with a non 200 (OK) nor 404 (Not Found) status code.
1792This is a non-issue, however exotic HTTP response status codes can provide useful
1793insights into the behavior of the web application and assist with the penetration test.
1794
1795[~] Tags: interesting, response, server
1796[~] References:
1797[~] w3.org - http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
1798
1799[~] URL: http://213.230.30.200/%3Cmy_tag_2f2f5e61b1f163dbf0c1c62113460eb0/%3E
1800[~] Element: server
1801
1802[~] Proof: "HTTP/1.1 400 Bad Request"
1803
1804[~] Referring page: http://213.230.30.200/
1805
1806[~] Affected page: http://213.230.30.200/%3Cmy_tag_2f2f5e61b1f163dbf0c1c62113460eb0/%3E
1807[~] HTTP request
1808GET /%3Cmy_tag_2f2f5e61b1f163dbf0c1c62113460eb0/%3E HTTP/1.1
1809Host: 213.230.30.200
1810Accept-Encoding: gzip, deflate
1811User-Agent: Arachni/v1.5.1
1812Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
1813Accept-Language: en-US,en;q=0.8,he;q=0.6
1814X-Arachni-Scan-Seed: 2f2f5e61b1f163dbf0c1c62113460eb0
1815
1816
1817
1818[+] [4] Interesting response (Trusted)
1819[~] ~~~~~~~~~~~~~~~~~~~~
1820[~] Digest: 1467908818
1821[~] Severity: Informational
1822[~] Description:
1823[~]
1824The server responded with a non 200 (OK) nor 404 (Not Found) status code.
1825This is a non-issue, however exotic HTTP response status codes can provide useful
1826insights into the behavior of the web application and assist with the penetration test.
1827
1828[~] Tags: interesting, response, server
1829[~] References:
1830[~] w3.org - http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
1831
1832[~] URL: http://213.230.30.200/crossdomain.xml
1833[~] Element: server
1834
1835[~] Proof: "HTTP/1.1 401 Unauthorized"
1836
1837[~] Referring page: http://213.230.30.200/
1838
1839[~] Affected page: http://213.230.30.200/crossdomain.xml
1840[~] HTTP request
1841GET /crossdomain.xml HTTP/1.1
1842Host: 213.230.30.200
1843Accept-Encoding: gzip, deflate
1844User-Agent: Arachni/v1.5.1
1845Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
1846Accept-Language: en-US,en;q=0.8,he;q=0.6
1847X-Arachni-Scan-Seed: 2f2f5e61b1f163dbf0c1c62113460eb0
1848
1849
1850
1851
1852[+] Plugin data:
1853[~] ---------------
1854
1855
1856[*] Health map
1857[~] ~~~~~~~~~~~~~~
1858[~] Description: Generates a simple list of safe/unsafe URLs.
1859
1860[~] Legend:
1861[+] No issues
1862[-] Has issues
1863
1864[-] http://213.230.30.200/
1865[-] http://213.230.30.200/%3Cmy_tag_2f2f5e61b1f163dbf0c1c62113460eb0/%3E
1866[-] http://213.230.30.200/crossdomain.xml
1867
1868[~] Total: 3
1869[+] Without issues: 0
1870[-] With issues: 3 ( 100% )
1871
1872[~] Report saved at: /usr/share/sniper/loot/web/http-213.230.30.200/213.230.30.200 2019-12-01 00_42_54 -0500.afr [0.01MB]
1873
1874[~] Audited 1 page snapshots.
1875
1876[~] Duration: 00:00:10
1877[~] Processed 20/20 HTTP requests.
1878[~] -- 1.911 requests/second.
1879[~] Processed 0/0 browser jobs.
1880[~] -- 0 second/job.
1881
1882[~] Currently auditing http://213.230.30.200/
1883[~] Burst response time sum 16.979 seconds
1884[~] Burst response count 18
1885[~] Burst average response time 0.943 seconds
1886[~] Burst average 1.797 requests/second
1887[~] Timed-out requests 1
1888[~] Original max concurrency 20
1889[~] Throttled max concurrency 20
1890
1891Arachni - Web Application Security Scanner Framework v1.5.1
1892 Author: Tasos "Zapotek" Laskos <tasos.laskos@arachni-scanner.com>
1893
1894 (With the support of the community and the Arachni Team.)
1895
1896 Website: http://arachni-scanner.com
1897 Documentation: http://arachni-scanner.com/wiki
1898
1899
1900[-] Retrying for: https://213.230.30.200/ [SSL connect error]
1901[-] Retrying for: https://213.230.30.200/ [SSL connect error]
1902[-] Retrying for: https://213.230.30.200/ [SSL connect error]
1903[-] Retrying for: https://213.230.30.200/ [SSL connect error]
1904[-] Retrying for: https://213.230.30.200/ [SSL connect error]
1905 [-] [framework/parts/data#pop_page_from_url_queue:147] Giving up trying to audit: https://213.230.30.200/
1906 [-] [framework/parts/data#pop_page_from_url_queue:148] Couldn't get a response after 5 tries: SSL connect error.
1907================================================================================
1908
1909
1910[+] Web Application Security Report - Arachni Framework
1911
1912[~] Report generated on: 2019-12-01 00:42:59 -0500
1913[~] Report false positives at: http://github.com/Arachni/arachni/issues
1914
1915[+] System settings:
1916[~] ---------------
1917[~] Version: 1.5.1
1918[~] Seed: 5b6eac8fc52035ea91f14d8a6d60be03
1919[~] Audit started on: 2019-12-01 00:42:55 -0500
1920[~] Audit finished on: 2019-12-01 00:42:59 -0500
1921[~] Runtime: 00:00:04
1922
1923[~] URL: https://213.230.30.200/
1924[~] User agent: Arachni/v1.5.1
1925
1926[*] Audited elements:
1927[~] * Links
1928[~] * Forms
1929[~] * Cookies
1930[~] * XMLs
1931[~] * JSONs
1932[~] * UI inputs
1933[~] * UI forms
1934
1935[*] Checks: backup_directories, backup_files, insecure_cross_domain_policy_access, localstart_asp, directory_listing, http_put, origin_spoof_access_restriction_bypass, backdoors, common_directories, common_files, allowed_methods, htaccess_limit, interesting_responses, xst, webdav, insecure_cross_domain_policy_headers, hsts, http_only_cookies, captcha, form_upload, cookie_set_for_parent_domain, insecure_cors_policy, insecure_cookies, x_frame_options, password_autocomplete, unencrypted_password_forms, private_ip, mixed_resource, html_objects, cvs_svn_users, emails, ssn, credit_card, common_admin_interfaces, insecure_client_access_policy, file_inclusion, xss_dom_script_context, code_injection_php_input_wrapper, response_splitting, xss_tag, sql_injection_timing, path_traversal, unvalidated_redirect, no_sql_injection_differential, xss, xss_dom, os_cmd_injection, csrf, unvalidated_redirect_dom, rfi, xss_script_context, ldap_injection, xxe, xss_event, xpath_injection, os_cmd_injection_timing, code_injection_timing, xss_path, no_sql_injection, sql_injection_differential, code_injection, source_code_disclosure, trainer, sql_injection, session_fixation
1936
1937[~] ===========================
1938
1939[+] 0 issues were detected.
1940
1941
1942[~] Report saved at: /usr/share/sniper/loot/web/https-213.230.30.200/213.230.30.200 2019-12-01 00_42_59 -0500.afr [0.0MB]
1943[~] The scan has logged errors: /usr/share/arachni/logs/error-2407124.log
1944
1945[~] Audited 0 page snapshots.
1946
1947[~] Duration: 00:00:04
1948[~] Processed 12/12 HTTP requests.
1949[~] -- 3.007 requests/second.
1950[~] Processed 0/0 browser jobs.
1951[~] -- 0 second/job.
1952
1953[~] Burst response time sum 1.315 seconds
1954[~] Burst response count 2
1955[~] Burst average response time 0.657 seconds
1956[~] Burst average 2.118 requests/second
1957[~] Timed-out requests 0
1958[~] Original max concurrency 20
1959[~] Throttled max concurrency 20
1960
1961Arachni - Web Application Security Scanner Framework v1.5.1
1962 Author: Tasos "Zapotek" Laskos <tasos.laskos@arachni-scanner.com>
1963
1964 (With the support of the community and the Arachni Team.)
1965
1966 Website: http://arachni-scanner.com
1967 Documentation: http://arachni-scanner.com/wiki
1968
1969
1970
1971 [*] HTML: Creating HTML report...
1972/usr/share/arachni/vendor/bundle/ruby/2.5.0/gems/nokogiri-1.6.8.1/lib/nokogiri/html/document.rb:164: warning: constant ::Fixnum is deprecated
1973 [*] HTML: Saved in '/usr/share/sniper/loot//web/http-213.230.30.200/arachni.zip'.
1974Arachni - Web Application Security Scanner Framework v1.5.1
1975 Author: Tasos "Zapotek" Laskos <tasos.laskos@arachni-scanner.com>
1976
1977 (With the support of the community and the Arachni Team.)
1978
1979 Website: http://arachni-scanner.com
1980 Documentation: http://arachni-scanner.com/wiki
1981
1982
1983
1984 [*] HTML: Creating HTML report...
1985 [*] HTML: Saved in '/usr/share/sniper/loot//web/https-213.230.30.200/arachni.zip'.
1986Archive: arachni.zip
1987 creating: js/
1988 creating: js/lib/
1989 inflating: js/lib/d3.min.js
1990 inflating: js/lib/bootstrap.min.js
1991 inflating: js/lib/jquery.min.js
1992 inflating: js/lib/c3.min.js
1993 inflating: js/init.js
1994 inflating: js/configuration.js
1995 inflating: js/charts.js
1996 inflating: js/helpers.js
1997 inflating: index.html
1998 creating: fonts/
1999 inflating: fonts/glyphicons-halflings-regular.eot
2000 inflating: fonts/FontAwesome.otf
2001 inflating: fonts/fontawesome-webfont.svg
2002 inflating: fonts/fontawesome-webfont.ttf
2003 inflating: fonts/fontawesome-webfont.eot
2004 inflating: fonts/fontawesome-webfont.woff
2005 inflating: fonts/glyphicons-halflings-regular.ttf
2006 inflating: fonts/glyphicons-halflings-regular.svg
2007 inflating: fonts/glyphicons-halflings-regular.woff
2008 creating: css/
2009 inflating: css/main.css
2010 creating: css/lib/
2011 inflating: css/lib/bootstrap-theme.min.css
2012 inflating: css/lib/c3.css
2013 inflating: css/lib/bootstrap.min.css
2014 inflating: css/lib/font-awesome.min.css
2015Archive: arachni.zip
2016 creating: js/
2017 creating: js/lib/
2018 inflating: js/lib/d3.min.js
2019 inflating: js/lib/bootstrap.min.js
2020 inflating: js/lib/jquery.min.js
2021 inflating: js/lib/c3.min.js
2022 inflating: js/init.js
2023 inflating: js/configuration.js
2024 inflating: js/charts.js
2025 inflating: js/helpers.js
2026 inflating: index.html
2027 creating: fonts/
2028 inflating: fonts/glyphicons-halflings-regular.eot
2029 inflating: fonts/FontAwesome.otf
2030 inflating: fonts/fontawesome-webfont.svg
2031 inflating: fonts/fontawesome-webfont.ttf
2032 inflating: fonts/fontawesome-webfont.eot
2033 inflating: fonts/fontawesome-webfont.woff
2034 inflating: fonts/glyphicons-halflings-regular.ttf
2035 inflating: fonts/glyphicons-halflings-regular.svg
2036 inflating: fonts/glyphicons-halflings-regular.woff
2037 creating: css/
2038 inflating: css/main.css
2039 creating: css/lib/
2040 inflating: css/lib/bootstrap-theme.min.css
2041 inflating: css/lib/c3.css
2042 inflating: css/lib/bootstrap.min.css
2043 inflating: css/lib/font-awesome.min.css
2044#######################################################################################################################################
2045WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
2046Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 23:56 EST
2047Nmap scan report for 213.230.30.200
2048Host is up (0.37s latency).
2049Not shown: 472 closed ports, 10 filtered ports
2050Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2051PORT STATE SERVICE
205221/tcp open ftp
205380/tcp open http
2054443/tcp open https
20552000/tcp open cisco-sccp
20562103/tcp open zephyr-clt
20573389/tcp open ms-wbt-server
20584679/tcp open mgesupervision
20595051/tcp open ida-agent
20608050/tcp open unknown
20618080/tcp open http-proxy
20628081/tcp open blackice-icecap
20638888/tcp open sun-answerbook
206447001/tcp open winrm
206549152/tcp open unknown
2066
2067Nmap done: 1 IP address (1 host up) scanned in 4.50 seconds
2068#######################################################################################################################################
2069Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 23:56 EST
2070Nmap scan report for 213.230.30.200
2071Host is up (0.090s latency).
2072Not shown: 2 filtered ports
2073PORT STATE SERVICE
207453/udp open|filtered domain
207567/udp open|filtered dhcps
207668/udp open|filtered dhcpc
207769/udp open|filtered tftp
207888/udp open|filtered kerberos-sec
2079123/udp open|filtered ntp
2080139/udp open|filtered netbios-ssn
2081161/udp open|filtered snmp
2082162/udp open|filtered snmptrap
2083389/udp open|filtered ldap
2084500/udp open|filtered isakmp
2085520/udp open|filtered route
20862049/udp open|filtered nfs
2087
2088Nmap done: 1 IP address (1 host up) scanned in 2.65 seconds
2089######################################################################################################################################
2090http://www.jcci.org.sa/Arabic/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[SAUDI ARABIA][SA], Facebook-Plugin[like], Frame, Google-Analytics[UA-1451125-1], HTTPServer[Microsoft-IIS/7.5], IP[213.230.30.200], JQuery, MetaGenerator[Microsoft SharePoint], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.6117], Script[JavaScript,text/javascript], Title[غرفة جدة][Title element contains newline(s)!], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=8]
2091#######################################################################################################################################
2092Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-01 00:28 EST
2093Nmap scan report for 213.230.30.200
2094Host is up (0.20s latency).
2095Not shown: 968 closed ports
2096PORT STATE SERVICE VERSION
209721/tcp open tcpwrapped
209853/tcp filtered domain
209980/tcp open http Microsoft IIS httpd 7.5
2100| http-auth:
2101| HTTP/1.1 401 Unauthorized\x0D
2102|_ Server returned status 401 but no WWW-Authenticate header.
2103|_http-cors: GET POST DELETE
2104|_http-server-header: Microsoft-IIS/7.5
2105|_http-title: 401 - Unauthorized: Access is denied due to invalid credentials.
2106113/tcp filtered ident
2107135/tcp filtered msrpc
2108443/tcp open ssl/https?
2109|_ssl-date: 2019-12-01T05:31:57+00:00; 0s from scanner time.
2110| sslv2:
2111| SSLv2 supported
2112| ciphers:
2113| SSL2_RC4_128_WITH_MD5
2114|_ SSL2_DES_192_EDE3_CBC_WITH_MD5
2115515/tcp filtered printer
2116555/tcp open dsf?
2117593/tcp filtered http-rpc-epmap
21181556/tcp open veritas_pbx?
21191801/tcp open msmq?
21202000/tcp open cisco-sccp?
21212030/tcp open device2?
21222103/tcp open zephyr-clt?
21232105/tcp open eklogin?
21242107/tcp open msmq-mgmt?
21252179/tcp open vmrdp?
21262701/tcp open cmrcservice Microsoft Configuration Manager Remote Control service (CmRcService.exe)
21273389/tcp open ms-wbt-server?
21284444/tcp filtered krb524
21295050/tcp open mmcc?
21305051/tcp open ida-agent?
21316667/tcp filtered irc
21326881/tcp filtered bittorrent-tracker
21338080/tcp open http-proxy?
21348081/tcp open blackice-icecap?
2135| fingerprint-strings:
2136| WWWOFFLEctrlstat:
2137| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd">
2138| <HTML><HEAD><TITLE>Bad Request</TITLE>
2139| <META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD>
2140| <BODY><h2>Bad Request - Invalid URL</h2>
2141| <hr><p>HTTP Error 400. The request URL is invalid.</p>
2142|_ </BODY></HTML>
21438888/tcp open sun-answerbook?
214412345/tcp filtered netbus
214513782/tcp open netbackup?
214649152/tcp open unknown
214749153/tcp open unknown
214849154/tcp open unknown
2149#######################################################################################################################################
2150Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-01 00:39 EST
2151Nmap scan report for jcci.org.sa (213.230.30.200)
2152Host is up (0.21s latency).
2153Not shown: 968 closed ports
2154PORT STATE SERVICE
215521/tcp open ftp
215653/tcp filtered domain
215780/tcp open http
2158113/tcp filtered ident
2159135/tcp filtered msrpc
2160443/tcp open https
2161515/tcp filtered printer
2162555/tcp open dsf
2163593/tcp filtered http-rpc-epmap
21641556/tcp open veritas_pbx
21651801/tcp open msmq
21662000/tcp open cisco-sccp
21672030/tcp open device2
21682103/tcp open zephyr-clt
21692105/tcp open eklogin
21702107/tcp open msmq-mgmt
21712179/tcp open vmrdp
21722701/tcp open sms-rcinfo
21733389/tcp open ms-wbt-server
21744444/tcp filtered krb524
21755050/tcp open mmcc
21765051/tcp open ida-agent
21776667/tcp filtered irc
21786881/tcp filtered bittorrent-tracker
21798080/tcp open http-proxy
21808081/tcp open blackice-icecap
21818888/tcp open sun-answerbook
218212345/tcp filtered netbus
218313782/tcp open netbackup
218449152/tcp open unknown
218549153/tcp open unknown
218649154/tcp open unknown
2187
2188Host script results:
2189| dns-brute:
2190| DNS Brute-force hostnames:
2191| ads.org.sa - 69.16.231.199
2192| erp.org.sa - 185.207.28.219
2193| internet.org.sa - 86.111.195.19
2194| internet.org.sa - 86.111.196.15
2195| internet.org.sa - 86.111.196.16
2196| internet.org.sa - 2001:67c:130:10::15
2197| internet.org.sa - 2001:67c:130:10::16
2198| internet.org.sa - 2001:67c:18c8:11::19
2199| intranet.org.sa - 86.111.195.19
2200| intranet.org.sa - 86.111.196.15
2201| intranet.org.sa - 86.111.196.16
2202| intranet.org.sa - 2001:67c:130:10::15
2203| intranet.org.sa - 2001:67c:130:10::16
2204| intranet.org.sa - 2001:67c:18c8:11::19
2205| ipv6.org.sa - 86.111.195.101
2206|_ ipv6.org.sa - 2001:67c:18c8:15::105
2207#######################################################################################################################################
2208Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-01 00:46 EST
2209Nmap scan report for 213.230.30.200
2210Host is up (0.20s latency).
2211Not shown: 968 closed ports
2212PORT STATE SERVICE VERSION
221321/tcp open tcpwrapped
221453/tcp filtered domain
221580/tcp open http Microsoft IIS httpd 7.5
2216|_http-server-header: Microsoft-IIS/7.5
2217| vulscan: VulDB - https://vuldb.com:
2218| [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
2219| [6924] Microsoft IIS 7.5 Log File Permission information disclosure
2220| [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
2221| [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
2222| [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
2223| [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
2224| [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
2225| [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
2226|
2227| MITRE CVE - https://cve.mitre.org:
2228| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
2229| [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
2230| [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
2231| [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
2232| [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
2233| [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
2234| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
2235| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
2236| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
2237| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
2238| [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
2239| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
2240| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
2241| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
2242| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
2243| [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
2244| [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
2245| [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
2246| [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
2247|
2248| SecurityFocus - https://www.securityfocus.com/bid/:
2249| [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
2250| [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
2251| [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
2252| [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
2253| [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
2254| [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
2255| [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
2256| [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
2257| [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
2258| [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
2259| [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
2260| [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
2261| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
2262| [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
2263| [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
2264| [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
2265| [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
2266| [54251] Microsoft IIS File Enumeration Weakness
2267| [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
2268| [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
2269| [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
2270| [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
2271| [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
2272| [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
2273| [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
2274| [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
2275| [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
2276| [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
2277| [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
2278| [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
2279| [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
2280| [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
2281| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
2282| [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
2283| [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
2284| [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
2285| [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
2286| [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
2287| [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
2288| [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
2289| [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
2290| [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
2291| [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
2292| [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
2293| [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
2294| [7492] Microsoft IIS User Existence Disclosure Vulnerability
2295| [6795] Microsoft IIS False Logging Weakness
2296| [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
2297| [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
2298| [6071] Microsoft IIS Script Source Access File Upload Vulnerability
2299| [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
2300| [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
2301| [6068] Multiple Microsoft IIS Vulnerabilities
2302| [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
2303| [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
2304| [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
2305| [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
2306| [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
2307| [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
2308| [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
2309| [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
2310| [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
2311| [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
2312| [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
2313| [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
2314| [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
2315| [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
2316| [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
2317| [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
2318| [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
2319| [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
2320| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
2321| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
2322| [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
2323| [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
2324| [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
2325| [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
2326| [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
2327| [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
2328| [2977] Microsoft IIS Device File Remote DoS Vulnerability
2329| [2973] Microsoft IIS Device File Local DoS Vulnerability
2330| [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
2331| [2719] Microsoft IIS Various Domain User Account Access Vulnerability
2332| [2717] Microsoft IIS FTP Denial of Service Vulnerability
2333| [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
2334| [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
2335| [2654] Microsoft IIS Long URL Denial of Service Vulnerability
2336| [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
2337| [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
2338| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
2339| [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
2340| [2313] Microsoft IIS File Fragment Disclosure Vulnerability
2341| [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
2342| [2218] Microsoft IIS '../..' Denial of Service Vulnerability
2343| [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
2344| [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
2345| [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
2346| [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
2347| [1912] Microsoft IIS Executable File Parsing Vulnerability
2348| [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
2349| [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
2350| [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
2351| [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
2352| [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
2353| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
2354| [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
2355| [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
2356| [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
2357| [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
2358| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
2359| [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
2360| [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
2361| [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
2362| [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
2363| [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
2364| [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
2365| [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
2366| [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
2367| [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
2368| [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
2369| [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
2370| [1065] Microsoft IIS UNC Path Disclosure Vulnerability
2371| [886] Microsoft IIS Escape Character Parsing Vulnerability
2372| [882] Microsoft IIS Virtual Directory Naming Vulnerability
2373| [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
2374| [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
2375| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
2376| [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
2377|
2378| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2379| [78620] Microsoft Windows Phone 7 domain name spoofing
2380| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
2381| [29670] Microsoft Internet Explorer 7 is installed
2382| [76716] Microsoft IIS FTP denial of service
2383| [76664] Microsoft IIS tilde information disclosure
2384| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
2385| [58864] Microsoft Internet Information Services (IIS) authentication code execution
2386| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
2387| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
2388| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
2389| [52243] Microsoft IIS With .NET Path Disclosure
2390| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
2391| [52240] Microsoft IIS Sample Application Physical Path Disclosure
2392| [52233] Microsoft IIS With .NET Path Disclosure
2393| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
2394| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
2395| [42899] Microsoft IIS HTTP request smuggling
2396| [39235] Microsoft IIS root folders file change notification privilege escalation
2397| [39230] Microsoft IIS HTML encoded ASP code execution
2398| [34434] Microsoft IIS Hit-highlighting security bypass
2399| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
2400| [32074] Microsoft IIS iissamples directory present
2401| [31644] Microsoft IIS Web server access.cnf file detected
2402| [31642] Microsoft IIS Web server service.cnf file detected
2403| [31638] Microsoft IIS Web server svcacl.cnf file detected
2404| [31630] Microsoft Internet Information Services IISAdmin directory detected
2405| [27854] Microsoft IIS ASP cache virtual server information disclosure
2406| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
2407| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
2408| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
2409| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
2410| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
2411| [13116] Microsoft IIS MS03-018 patch is not installed on the system
2412| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
2413| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
2414| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
2415| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
2416| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
2417| [12099] Microsoft IIS Response.AddHeader denial of service
2418| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
2419| [12097] Microsoft IIS redirect error cross-site scripting
2420| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
2421| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
2422| [11537] Microsoft IIS WebDAV service is running on the system
2423| [11533] Microsoft IIS WebDAV long request buffer overflow
2424| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
2425| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
2426| [10503] Microsoft IIS WebDAV memory allocation denial of service
2427| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
2428| [10501] Microsoft IIS administrative Web pages cross-site scripting
2429| [10370] Microsoft IIS HTTP HOST header denial of service
2430| [10294] Microsoft IIS .idc extension error message cross-site scripting
2431| [10184] Microsoft IIS 5.0 resource utilization denial of service
2432| [9791] Microsoft Exchange IIS license exhaustion denial of service
2433| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
2434| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
2435| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
2436| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
2437| [8811] Microsoft IIS MS02-018 patch is not installed on the system
2438| [8804] Microsoft IIS redirected URL error cross-site scripting
2439| [8803] Microsoft IIS HTTP error page cross-site scripting
2440| [8802] Microsoft IIS Help File search cross-site scripting
2441| [8801] Microsoft IIS FTP session status request denial of service
2442| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
2443| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
2444| [8798] Microsoft IIS SSI safety check buffer overflow
2445| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
2446| [8796] Microsoft IIS ASP data transfer heap buffer overflow
2447| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
2448| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
2449| [8385] Microsoft IIS specially-crafted request reveals IP address
2450| [8382] Microsoft IIS authentication error messages reveal configuration information
2451| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
2452| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
2453| [8056] Microsoft IIS is running on the system
2454| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
2455| [7691] Microsoft IIS HTTP GET request with false "
2456| [7640] Microsoft IIS is present on the system
2457| [7613] Microsoft IIS allows attackers to create fake log entries
2458| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
2459| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
2460| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
2461| [7202] Microsoft IIS 4.0/5.0 escaped percent found
2462| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
2463| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
2464| [6995] Microsoft IIS %u Unicode wide character encoding detected
2465| [6994] Microsoft IIS %u Unicode encoding detected
2466| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
2467| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
2468| [6983] Microsoft IIS invalid MIME header denial of service
2469| [6982] Microsoft IIS WebDAV long invalid request denial of service
2470| [6981] Microsoft IIS URL redirection denial of service
2471| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
2472| [6858] Microsoft IIS cross-site scripting patch denial of service
2473| [6800] Microsoft IIS device file request can crash the ASP processor
2474| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
2475| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
2476| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
2477| [6545] Microsoft IIS FTP weak domain authentication
2478| [6535] Microsoft IIS FTP wildcard processing function denial of service
2479| [6534] Microsoft IIS URL decoding error could allow remote code execution
2480| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
2481| [6205] Microsoft IIS WebDAV denial of service
2482| [6171] Microsoft IIS and Exchange malformed URL request denial of service
2483| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
2484| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
2485| [5823] Microsoft IIS Web form submission denial of service
2486| [5729] Microsoft IIS Far East editions file disclosure
2487| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
2488| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
2489| [5441] Microsoft IIS .htw cross-site scripting
2490| [5377] Microsoft IIS Unicode translation error allows remote command execution
2491| [5335] Microsoft IIS Index Server directory traversal
2492| [5202] Microsoft IIS invalid URL allows attackers to crash service
2493| [5156] Microsoft IIS Cross-Site Scripting
2494| [5106] Microsoft IIS 4.0 discloses internal IP addresses
2495| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
2496| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
2497| [4960] Microsoft IIS on Win2kPro security button restriction
2498| [4951] Microsoft IIS absent directory browser argument
2499| [4790] Microsoft IIS \mailroot\pickup directory denial of service
2500| [4757] Microsoft IIS server-side includes (SSI) #exec directive
2501| [4558] Microsoft IIS is installed on a domain controller
2502| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
2503| [4430] Microsoft IIS malformed URL extension data denial of service
2504| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
2505| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
2506| [4279] Microsoft IIS escape characters denial of service
2507| [4204] Microsoft IIS virtual UNC share source read
2508| [4183] Microsoft IIS could disclose path of network shares
2509| [4117] Microsoft IIS chunked encoding post or put denial of service
2510| [3986] Microsoft IIS ASP could be used to gain sensitive information
2511| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
2512| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
2513| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
2514| [2675] Microsoft IIS 4.0 samples installation on Web server
2515| [2673] Microsoft IIS samples installation on Web server
2516| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
2517| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
2518| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
2519| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
2520| [2662] Microsoft IIS CGI overflow
2521| [2412] Microsoft IIS account is member of Domain Users
2522| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
2523| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
2524| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
2525| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
2526| [2229] Microsoft IIS ExAir sample site denial of service
2527| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
2528| [1823] Microsoft IIS long GET request denial of service
2529| [1735] Microsoft IIS with Visual InterDev no authentication
2530| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
2531| [1654] Microsoft IIS remote FTP buffer overflow
2532| [1638] Microsoft IIS crashes processing some GET commands
2533| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
2534| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
2535| [1273] Microsoft IIS special characters allowed in shell
2536| [1272] Microsoft IIS CGI scripts run as system
2537| [1271] Microsoft IIS version 2 installed
2538| [1270] Microsoft IIS incorrect permissions on restricted item
2539| [1269] Microsoft IIS incorrect Web permissions
2540| [1268] Microsoft IIS SSI #exec enabled
2541| [1216] Microsoft IIS SSL patch not applied
2542| [1215] Microsoft IIS Passive FTP patch not applied
2543| [1212] Microsoft IIS unauthorized ODBC data access with RDS
2544| [1125] Microsoft IIS ASP DATA issue could reveal source code
2545| [949] Microsoft IIS server script debugging enabled
2546| [948] Microsoft IIS samples installed on Web server
2547| [936] Microsoft IIS NTFS insecure permissions
2548| [935] Microsoft IIS executable paths
2549| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
2550| [336] Microsoft IIS ASP dot bug
2551| [256] Microsoft IIS can be remotely crashed by excessively long client requests
2552| [7] Microsoft IIS ASP source visible
2553|
2554| Exploit-DB - https://www.exploit-db.com:
2555| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
2556| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
2557|
2558| OpenVAS (Nessus) - http://www.openvas.org:
2559| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
2560| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
2561| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
2562| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
2563| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
2564| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
2565| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
2566| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
2567| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
2568| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
2569| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
2570| [100952] Microsoft IIS FTPd NLST stack overflow
2571| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
2572| [10680] Test Microsoft IIS Source Fragment Disclosure
2573| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
2574| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
2575| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
2576| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
2577| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
2578| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
2579| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
2580| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
2581| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
2582| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
2583| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
2584| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
2585| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
2586| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
2587| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
2588| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
2589| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
2590| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
2591| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
2592| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
2593| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
2594| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
2595| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
2596| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
2597| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
2598| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
2599| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
2600| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
2601| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
2602| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
2603| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
2604| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
2605| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
2606| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
2607| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
2608| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
2609| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
2610| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
2611| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
2612| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
2613| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
2614| [902798] Microsoft SMB Signing Enabled and Not Required At Server
2615| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
2616| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
2617| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
2618| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
2619| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
2620| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
2621| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
2622| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
2623| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
2624| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
2625| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
2626| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
2627| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
2628| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
2629| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
2630| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
2631| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
2632| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
2633| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
2634| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
2635| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
2636| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
2637| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
2638| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
2639| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
2640| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
2641| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
2642| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
2643| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
2644| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
2645| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
2646| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
2647| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
2648| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
2649| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
2650| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
2651| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
2652| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
2653| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
2654| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
2655| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
2656| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
2657| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
2658| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
2659| [902518] Microsoft .NET Framework Security Bypass Vulnerability
2660| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
2661| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
2662| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
2663| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
2664| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
2665| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
2666| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
2667| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
2668| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
2669| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
2670| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
2671| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
2672| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
2673| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
2674| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
2675| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
2676| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
2677| [902425] Microsoft Windows SMB Accessible Shares
2678| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
2679| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
2680| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
2681| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
2682| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
2683| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
2684| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
2685| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
2686| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
2687| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
2688| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
2689| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
2690| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
2691| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
2692| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
2693| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
2694| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
2695| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
2696| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
2697| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
2698| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
2699| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
2700| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
2701| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
2702| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
2703| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
2704| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
2705| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
2706| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
2707| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
2708| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
2709| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
2710| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
2711| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
2712| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
2713| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
2714| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
2715| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
2716| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
2717| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
2718| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
2719| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
2720| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
2721| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
2722| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
2723| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
2724| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
2725| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
2726| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
2727| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
2728| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
2729| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
2730| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
2731| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
2732| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
2733| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
2734| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
2735| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
2736| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
2737| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
2738| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
2739| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
2740| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
2741| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
2742| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
2743| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
2744| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
2745| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
2746| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
2747| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
2748| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
2749| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
2750| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
2751| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
2752| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
2753| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
2754| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
2755| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
2756| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
2757| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
2758| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
2759| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
2760| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
2761| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
2762| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
2763| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
2764| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
2765| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
2766| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
2767| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
2768| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
2769| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
2770| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
2771| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
2772| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
2773| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
2774| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
2775| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
2776| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
2777| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
2778| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
2779| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
2780| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
2781| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
2782| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
2783| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
2784| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
2785| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
2786| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
2787| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
2788| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
2789| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
2790| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
2791| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
2792| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
2793| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
2794| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
2795| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
2796| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
2797| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
2798| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
2799| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
2800| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
2801| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
2802| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
2803| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
2804| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
2805| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
2806| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
2807| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
2808| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
2809| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
2810| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
2811| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
2812| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
2813| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
2814| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
2815| [900808] Microsoft Visual Products Version Detection
2816| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
2817| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
2818| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
2819| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
2820| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
2821| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
2822| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
2823| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
2824| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
2825| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
2826| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
2827| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
2828| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
2829| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
2830| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
2831| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
2832| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
2833| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
2834| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
2835| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
2836| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
2837| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
2838| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
2839| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
2840| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
2841| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
2842| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
2843| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
2844| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
2845| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
2846| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
2847| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
2848| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
2849| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
2850| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
2851| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
2852| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
2853| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
2854| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
2855| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
2856| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
2857| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
2858| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
2859| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
2860| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
2861| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
2862| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
2863| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
2864| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
2865| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
2866| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
2867| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
2868| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
2869| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
2870| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
2871| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
2872| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
2873| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
2874| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
2875| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
2876| [900173] Microsoft Windows Media Player Version Detection
2877| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
2878| [900170] Microsoft iExplorer '&NBSP
2879| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
2880| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
2881| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
2882| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
2883| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
2884| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
2885| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
2886| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
2887| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
2888| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
2889| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
2890| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
2891| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
2892| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
2893| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
2894| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
2895| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
2896| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
2897| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
2898| [900025] Microsoft Office Version Detection
2899| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
2900| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
2901| [855384] Solaris Update for snmp/mibiisa 108870-36
2902| [855273] Solaris Update for snmp/mibiisa 108869-36
2903| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
2904| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
2905| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
2906| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
2907| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
2908| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
2909| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
2910| [802726] Microsoft SMB Signing Disabled
2911| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
2912| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
2913| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
2914| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
2915| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
2916| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
2917| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
2918| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
2919| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
2920| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
2921| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
2922| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
2923| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
2924| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
2925| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
2926| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
2927| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
2928| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
2929| [801934] Microsoft Silverlight Version Detection
2930| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
2931| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
2932| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
2933| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
2934| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
2935| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
2936| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
2937| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
2938| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
2939| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
2940| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
2941| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
2942| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
2943| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
2944| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
2945| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
2946| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
2947| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
2948| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
2949| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
2950| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
2951| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
2952| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
2953| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
2954| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
2955| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
2956| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
2957| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
2958| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
2959| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
2960| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
2961| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
2962| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
2963| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
2964| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
2965| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
2966| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
2967| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
2968| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
2969| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
2970| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
2971| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
2972| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
2973| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
2974| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
2975| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
2976| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
2977| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
2978| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
2979| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
2980| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
2981| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
2982| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
2983| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
2984| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
2985| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
2986| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
2987| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
2988| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
2989| [800742] Microsoft Internet Explorer Unspecified vulnerability
2990| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
2991| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
2992| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
2993| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
2994| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
2995| [800504] Microsoft Windows XP SP3 denial of service vulnerability
2996| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
2997| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
2998| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
2999| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
3000| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
3001| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
3002| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
3003| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
3004| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
3005| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
3006| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
3007| [800331] Microsoft Windows Live Messenger Client Version Detection
3008| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
3009| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
3010| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
3011| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
3012| [800217] Microsoft Money Version Detection
3013| [800209] Microsoft Internet Explorer Version Detection (Win)
3014| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
3015| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
3016| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
3017| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
3018| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
3019| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
3020| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
3021| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
3022| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
3023| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
3024| [101017] Microsoft MS03-018 security check
3025| [101016] Microsoft MS03-022 security check
3026| [101015] Microsoft MS03-034 security check
3027| [101014] Microsoft MS00-078 security check
3028| [101012] Microsoft MS03-051 security check
3029| [101010] Microsoft Security Bulletin MS05-004
3030| [101009] Microsoft Security Bulletin MS06-033
3031| [101007] Microsoft dotNET version grabber
3032| [101006] Microsoft Security Bulletin MS06-056
3033| [101005] Microsoft Security Bulletin MS07-040
3034| [101004] Microsoft MS04-017 security check
3035| [101003] Microsoft MS00-058 security check
3036| [101000] Microsoft MS00-060 security check
3037| [100950] Microsoft DNS server internal hostname disclosure detection
3038| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
3039| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
3040| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
3041| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
3042| [100062] Microsoft Remote Desktop Protocol Detection
3043| [90024] Windows Vulnerability in Microsoft Jet Database Engine
3044| [80007] Microsoft MS00-06 security check
3045| [13752] Denial of Service (DoS) in Microsoft SMS Client
3046| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
3047| [11874] IIS Service Pack - 404
3048| [11808] Microsoft RPC Interface Buffer Overrun (823980)
3049| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
3050| [11217] Microsoft's SQL Version Query
3051| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
3052| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
3053| [11142] IIS XSS via IDC error
3054| [11067] Microsoft's SQL Hello Overflow
3055| [11003] IIS Possible Compromise
3056| [10993] IIS ASP.NET Application Trace Enabled
3057| [10991] IIS Global.asa Retrieval
3058| [10936] IIS XSS via 404 error
3059| [10862] Microsoft's SQL Server Brute Force
3060| [10755] Microsoft Exchange Public Folders Information Leak
3061| [10732] IIS 5.0 WebDav Memory Leakage
3062| [10699] IIS FrontPage DoS II
3063| [10695] IIS .IDA ISAPI filter applied
3064| [10674] Microsoft's SQL UDP Info Query
3065| [10673] Microsoft's SQL Blank Password
3066| [10671] IIS Remote Command Execution
3067| [10667] IIS 5.0 PROPFIND Vulnerability
3068| [10661] IIS 5 .printer ISAPI filter applied
3069| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
3070| [10585] IIS FrontPage DoS
3071| [10576] Check for dangerous IIS default files
3072| [10575] Check for IIS .cnf file leakage
3073| [10573] IIS 5.0 Sample App reveals physical path of web root
3074| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
3075| [10537] IIS directory traversal
3076| [10492] IIS IDA/IDQ Path Disclosure
3077| [10491] ASP/ASA source using Microsoft Translate f: bug
3078| [10144] Microsoft SQL TCP/IP listener is running
3079|
3080| SecurityTracker - https://www.securitytracker.com:
3081| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
3082| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
3083| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
3084| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
3085| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
3086| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
3087| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
3088| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
3089| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
3090| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
3091| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
3092| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
3093| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
3094| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
3095| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
3096| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
3097| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
3098| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
3099| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
3100| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
3101| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
3102| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
3103| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
3104| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
3105| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
3106| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
3107| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
3108| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
3109| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
3110| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
3111| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
3112| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
3113| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
3114| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
3115| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
3116| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
3117| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
3118| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
3119| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
3120| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
3121| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
3122| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
3123| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
3124| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
3125| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
3126| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
3127| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
3128| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
3129| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
3130| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
3131| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
3132| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
3133| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3134| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
3135| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
3136| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
3137| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
3138| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
3139| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
3140| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
3141| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
3142| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
3143| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
3144| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
3145| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
3146| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
3147| [1028560] Microsoft Visio Discloses Information to Remote Users
3148| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
3149| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
3150| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
3151| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
3152| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
3153| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
3154| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
3155| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
3156| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
3157| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
3158| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
3159| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
3160| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
3161| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
3162| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
3163| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3164| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
3165| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
3166| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
3167| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
3168| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
3169| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
3170| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
3171| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
3172| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
3173| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3174| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
3175| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
3176| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
3177| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
3178| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
3179| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
3180| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
3181| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
3182| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
3183| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
3184| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
3185| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
3186| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
3187| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
3188| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
3189| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
3190| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
3191| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
3192| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
3193| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
3194| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
3195| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
3196| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
3197| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
3198| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
3199| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
3200| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
3201| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
3202| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
3203| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3204| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3205| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3206| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3207| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3208| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3209| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3210| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3211| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3212| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
3213| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
3214| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
3215| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
3216| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
3217| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
3218| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
3219| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
3220| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
3221| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
3222| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
3223| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
3224| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
3225| [1027114] Microsoft Windows Includes Some Invalid Certificates
3226| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
3227| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
3228| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3229| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
3230| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
3231| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
3232| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
3233| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
3234| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
3235| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
3236| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
3237| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
3238| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3239| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3240| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3241| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3242| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3243| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3244| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
3245| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
3246| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
3247| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
3248| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
3249| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
3250| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
3251| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
3252| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
3253| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
3254| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
3255| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
3256| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
3257| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
3258| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
3259| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
3260| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
3261| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
3262| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
3263| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
3264| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
3265| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
3266| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
3267| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
3268| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
3269| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3270| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
3271| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
3272| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
3273| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
3274| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
3275| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
3276| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
3277| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
3278| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
3279| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
3280| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
3281| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
3282| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
3283| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
3284| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
3285| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
3286| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
3287| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
3288| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
3289| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
3290| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
3291| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
3292| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
3293| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
3294| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
3295| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
3296| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
3297| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
3298| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
3299| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
3300| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
3301| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
3302| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
3303| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
3304| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
3305| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
3306| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
3307| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
3308| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
3309| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
3310| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
3311| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
3312| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
3313| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
3314| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
3315| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3316| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
3317| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
3318| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
3319| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
3320| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
3321| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
3322| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
3323| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3324| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
3325| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
3326| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
3327| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
3328| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
3329| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
3330| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
3331| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
3332| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
3333| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
3334| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
3335| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
3336| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
3337| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
3338| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3339| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
3340| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
3341| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
3342| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3343| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3344| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
3345| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
3346| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
3347| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
3348| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
3349| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
3350| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
3351| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
3352| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
3353| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
3354| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
3355| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
3356| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
3357| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
3358| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
3359| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
3360| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
3361| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
3362| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
3363| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
3364| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
3365| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
3366| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
3367| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
3368| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
3369| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
3370| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
3371| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
3372| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
3373| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
3374| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
3375| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
3376| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
3377| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
3378| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
3379| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
3380| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
3381| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
3382| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
3383| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
3384| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
3385| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
3386| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
3387| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
3388| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
3389| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
3390| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
3391| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
3392| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
3393| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
3394| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3395| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
3396| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
3397| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
3398| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
3399| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
3400| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
3401| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
3402| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
3403| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
3404| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
3405| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
3406| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
3407| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
3408| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
3409| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
3410| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
3411| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
3412| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
3413| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
3414| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
3415| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
3416| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
3417| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
3418| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
3419| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
3420| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
3421| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
3422| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
3423| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3424| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
3425| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
3426| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
3427| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
3428| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
3429| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
3430| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
3431| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
3432| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
3433| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3434| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
3435| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
3436| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
3437| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
3438| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
3439| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
3440| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
3441| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
3442| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
3443| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
3444| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
3445| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
3446| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
3447| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3448| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
3449| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
3450| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
3451| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
3452| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
3453| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
3454| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
3455| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
3456| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
3457| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
3458| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
3459| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
3460| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
3461| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
3462| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
3463| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
3464| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
3465| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
3466| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
3467| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3468| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
3469| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
3470| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
3471| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
3472| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
3473| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
3474| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
3475| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
3476| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
3477| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
3478| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3479| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
3480| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
3481| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
3482| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
3483| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
3484| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
3485| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
3486| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
3487| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
3488| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
3489| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
3490| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
3491| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
3492| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
3493| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
3494| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3495| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
3496| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
3497| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
3498| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
3499| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
3500| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
3501| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
3502| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
3503| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
3504| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
3505| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
3506| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
3507| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
3508| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
3509| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
3510| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
3511| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
3512| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
3513| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
3514| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
3515| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
3516| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
3517| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
3518| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
3519| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
3520| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
3521| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
3522| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
3523| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
3524| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
3525| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
3526| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
3527| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
3528| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
3529| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
3530| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
3531| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3532| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
3533| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
3534| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
3535| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
3536| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
3537| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
3538| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
3539| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
3540| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
3541| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
3542| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
3543| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
3544| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
3545| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
3546| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
3547| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
3548| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
3549| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
3550| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
3551| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
3552| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
3553| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
3554| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
3555| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
3556| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
3557| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
3558| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
3559| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
3560| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
3561| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
3562| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
3563| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
3564| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
3565| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
3566| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
3567| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
3568| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
3569| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
3570| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
3571| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
3572| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
3573| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
3574| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
3575| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
3576| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
3577| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
3578| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
3579| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
3580| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
3581| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
3582| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
3583| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
3584| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
3585| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
3586| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
3587| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
3588| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
3589| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
3590| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
3591| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
3592| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
3593| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
3594| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
3595| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
3596| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3597| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
3598| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
3599| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
3600| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
3601| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
3602| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
3603| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
3604| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3605| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
3606| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
3607| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
3608| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
3609| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3610| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
3611| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
3612| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
3613| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
3614| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
3615| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
3616| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
3617| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
3618| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
3619| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
3620| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
3621| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
3622| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
3623| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
3624| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
3625| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
3626| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
3627| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
3628| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
3629| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
3630| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
3631| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
3632| [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
3633| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
3634| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
3635| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
3636| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
3637| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3638| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3639| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3640| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
3641| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3642| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3643| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
3644| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
3645| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
3646| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
3647| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
3648| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
3649| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
3650| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
3651| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
3652| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
3653| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
3654| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
3655| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
3656| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
3657| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
3658| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
3659| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
3660| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
3661| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
3662| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
3663| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
3664| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
3665| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3666| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
3667| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
3668| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
3669| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
3670| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
3671| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
3672| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
3673| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
3674| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
3675| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
3676| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
3677| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
3678| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
3679| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
3680| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
3681| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
3682| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
3683| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
3684| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
3685| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
3686| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
3687| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
3688| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
3689| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
3690| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
3691| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
3692| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
3693| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
3694| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
3695| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
3696| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
3697| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
3698| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
3699| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
3700| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
3701| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
3702| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
3703| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
3704| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
3705| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
3706| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
3707| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
3708| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
3709| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
3710| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
3711| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
3712| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
3713| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
3714| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
3715| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
3716| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
3717| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
3718| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
3719| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
3720| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
3721| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
3722| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
3723| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
3724| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
3725| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
3726| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
3727| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
3728| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
3729| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
3730| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
3731| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
3732| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
3733| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
3734| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
3735| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
3736| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
3737| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
3738| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
3739| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
3740| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
3741| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
3742| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
3743| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
3744| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
3745| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
3746| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
3747| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
3748| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
3749| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
3750| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
3751| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
3752| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
3753| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
3754| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
3755| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
3756| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
3757| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
3758| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
3759| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
3760| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
3761| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
3762| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
3763| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
3764| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
3765| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
3766| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
3767| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
3768| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
3769| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
3770| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
3771| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
3772| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
3773| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
3774| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
3775| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
3776| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
3777| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
3778| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
3779| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
3780| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
3781| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
3782| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
3783| [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
3784| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
3785| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
3786| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
3787| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
3788| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
3789| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
3790| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
3791| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
3792| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
3793| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
3794| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
3795| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
3796| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
3797| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
3798| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
3799| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
3800| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
3801| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
3802| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
3803| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
3804| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
3805| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
3806| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
3807| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
3808| [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
3809| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
3810| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
3811| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
3812| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
3813| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
3814| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
3815| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
3816| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
3817| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
3818| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
3819| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
3820| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
3821| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
3822| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
3823| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
3824| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
3825| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
3826| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
3827| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
3828| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
3829| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
3830| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
3831| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
3832| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
3833| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
3834| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
3835| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
3836| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
3837| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
3838| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
3839| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
3840| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
3841| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
3842| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
3843| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
3844| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
3845| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
3846| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
3847| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
3848| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
3849| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
3850| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
3851| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
3852| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
3853| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
3854| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
3855| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
3856| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
3857| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
3858| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
3859| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
3860| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
3861| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
3862| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
3863| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
3864| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
3865| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
3866| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
3867| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
3868| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
3869| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
3870| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
3871| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
3872| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
3873| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
3874| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
3875| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
3876| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
3877| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
3878| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
3879| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
3880| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
3881| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
3882| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
3883| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
3884| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
3885| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
3886| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
3887| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
3888| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
3889| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
3890| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
3891| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
3892| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
3893| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
3894| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
3895| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
3896| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
3897| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
3898| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
3899| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
3900| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
3901| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
3902| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
3903| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
3904| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
3905| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
3906| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
3907| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
3908| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
3909| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
3910| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
3911| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
3912| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
3913| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
3914| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
3915| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
3916| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
3917| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
3918| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
3919| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
3920| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
3921| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
3922| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
3923| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
3924| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
3925| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
3926| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
3927| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
3928| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
3929| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
3930| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
3931| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
3932| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
3933| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
3934| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
3935| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
3936| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
3937| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
3938| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
3939| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
3940| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
3941| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
3942| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
3943| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
3944| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
3945| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
3946| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
3947| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
3948| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
3949| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
3950| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
3951| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
3952| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
3953| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
3954| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
3955| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
3956| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
3957| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
3958| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
3959| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
3960| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
3961| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
3962| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
3963| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
3964| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
3965| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
3966| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
3967| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
3968| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
3969| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
3970| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
3971| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
3972| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
3973| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
3974| [1008586] Microsoft Office Security Features Can Be Bypassed
3975| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
3976| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
3977| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
3978| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
3979| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
3980| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
3981| [1008425] Microsoft IE Does Not Properly Display Some URLs
3982| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
3983| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
3984| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
3985| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
3986| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
3987| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
3988| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
3989| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
3990| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
3991| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
3992| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
3993| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
3994| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
3995| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
3996| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
3997| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
3998| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
3999| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
4000| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
4001| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
4002| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
4003| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
4004| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
4005| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
4006| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
4007| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
4008| [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
4009| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
4010| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
4011| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
4012| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
4013| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
4014| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
4015| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
4016| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
4017| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
4018| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
4019| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
4020| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
4021| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
4022| [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
4023| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
4024| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
4025| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
4026| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
4027| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
4028| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
4029| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
4030| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
4031| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
4032| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
4033| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
4034| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
4035| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
4036| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
4037| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
4038| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
4039| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
4040| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
4041| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
4042| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
4043| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
4044| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
4045| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
4046| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
4047| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
4048| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
4049| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
4050| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
4051| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
4052| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
4053| [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
4054| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
4055| [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
4056| [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
4057| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
4058| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
4059| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
4060| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
4061| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
4062| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
4063| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
4064| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
4065| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
4066| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
4067| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
4068| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
4069| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
4070| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
4071| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
4072| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
4073| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
4074| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
4075| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
4076| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
4077| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
4078| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
4079| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
4080| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
4081| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
4082| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
4083| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
4084| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
4085| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
4086| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
4087| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
4088| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
4089| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
4090| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
4091| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
4092| [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
4093| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
4094| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
4095| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
4096| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
4097| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
4098| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
4099| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
4100| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
4101| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
4102| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
4103| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
4104| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
4105| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
4106| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
4107| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
4108| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
4109| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
4110| [1005627] IISPop EMail Server Can Be Crashed By Remote Users
4111| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
4112| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
4113| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
4114| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
4115| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
4116| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
4117| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
4118| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
4119| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
4120| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
4121| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
4122| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
4123| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
4124| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
4125| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
4126| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
4127| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
4128| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
4129| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
4130| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
4131| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
4132| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
4133| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
4134| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
4135| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
4136| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
4137| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
4138| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
4139| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
4140| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
4141| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
4142| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
4143| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
4144| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
4145| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
4146| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
4147| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
4148| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
4149| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
4150| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
4151| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
4152| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
4153| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
4154| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
4155| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
4156| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
4157| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
4158| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
4159| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
4160| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
4161| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
4162| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
4163| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
4164| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
4165| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
4166| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
4167| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
4168| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
4169| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
4170| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
4171| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
4172| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
4173| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
4174| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
4175| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
4176| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
4177| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
4178| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
4179| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
4180| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
4181| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
4182| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
4183| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
4184| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
4185| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
4186| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
4187| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
4188| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
4189| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
4190| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
4191| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
4192| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
4193| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
4194| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
4195| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
4196| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
4197| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
4198| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
4199| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
4200| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
4201| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
4202| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
4203| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
4204| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
4205| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
4206| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
4207| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
4208| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
4209| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
4210| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
4211| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
4212| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
4213| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
4214| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
4215| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
4216| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
4217| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
4218| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
4219| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
4220| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
4221| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
4222| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
4223| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
4224| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
4225| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
4226| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
4227| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
4228| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
4229| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
4230| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
4231| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
4232| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
4233| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
4234| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
4235| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
4236| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
4237| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
4238| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
4239| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
4240| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
4241| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
4242| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
4243| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
4244| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
4245| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
4246| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
4247| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
4248| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
4249| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
4250| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
4251| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
4252| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
4253| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
4254| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
4255| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
4256| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
4257| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
4258| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
4259| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
4260| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
4261| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
4262| [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
4263| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
4264| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
4265| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
4266| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
4267| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
4268| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
4269| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
4270| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
4271| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
4272| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
4273| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
4274| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
4275| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
4276| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
4277| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
4278| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
4279| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
4280| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
4281| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
4282| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
4283| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
4284| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
4285| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
4286| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
4287| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
4288| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
4289| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
4290| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
4291| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
4292| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
4293| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
4294| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
4295| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
4296| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
4297| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
4298| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
4299| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
4300| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
4301| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
4302| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
4303| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
4304| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
4305| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
4306| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
4307| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
4308| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
4309| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
4310| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
4311| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
4312| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
4313| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
4314| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
4315| [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
4316| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
4317| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
4318| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
4319| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
4320| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
4321| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
4322| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
4323| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
4324| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
4325| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
4326| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
4327| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
4328| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
4329| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
4330| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
4331| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
4332| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
4333| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
4334| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
4335| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
4336| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
4337| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
4338| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
4339| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
4340| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
4341| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
4342| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
4343| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
4344| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
4345| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
4346| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
4347| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
4348| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
4349| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
4350| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
4351| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
4352| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
4353| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
4354| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
4355| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
4356| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
4357| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
4358| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
4359| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
4360| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
4361| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
4362| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
4363| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
4364| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
4365| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
4366| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
4367| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
4368| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
4369| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
4370| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
4371| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
4372| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
4373| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
4374| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
4375| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
4376| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
4377| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
4378| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
4379| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
4380| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
4381| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
4382| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
4383| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
4384| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
4385| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
4386| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
4387| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
4388| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
4389| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
4390| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
4391| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
4392| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
4393| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
4394| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
4395| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
4396| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
4397| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
4398| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
4399| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
4400| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
4401| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
4402| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
4403| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
4404| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
4405| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
4406| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
4407| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
4408| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
4409| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
4410| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
4411| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
4412| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
4413| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
4414| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
4415|
4416| OSVDB - http://www.osvdb.org:
4417| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
4418| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
4419| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
4420| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
4421| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
4422| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
4423| [87262] Microsoft IIS FTP Command Injection Information Disclosure
4424| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
4425| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
4426| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
4427| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
4428| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
4429| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
4430| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
4431| [71856] Microsoft IIS Status Header Handling Remote Overflow
4432| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
4433| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
4434| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
4435| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
4436| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
4437| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
4438| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
4439| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
4440| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
4441| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
4442| [59892] Microsoft IIS Malformed Host Header Remote DoS
4443| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
4444| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
4445| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
4446| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
4447| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
4448| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
4449| [55269] Microsoft IIS Traversal GET Request Remote DoS
4450| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
4451| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
4452| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
4453| [52238] Microsoft IIS IDC Extension XSS
4454| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
4455| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
4456| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
4457| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
4458| [43451] Microsoft IIS HTTP Request Smuggling
4459| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
4460| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
4461| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
4462| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
4463| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
4464| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
4465| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
4466| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
4467| [27152] Microsoft Windows IIS ASP Page Processing Overflow
4468| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
4469| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
4470| [21805] Microsoft IIS Crafted URL Remote DoS
4471| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
4472| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
4473| [17124] Microsoft IIS Malformed WebDAV Request DoS
4474| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
4475| [17122] Microsoft IIS Permission Weakness .COM File Upload
4476| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
4477| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
4478| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
4479| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
4480| [13760] Microsoft IIS Malformed URL Request DoS
4481| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
4482| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
4483| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
4484| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
4485| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
4486| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
4487| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
4488| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
4489| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
4490| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
4491| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
4492| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
4493| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
4494| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
4495| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
4496| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
4497| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
4498| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
4499| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
4500| [11257] Microsoft IIS Malformed GET Request DoS
4501| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
4502| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
4503| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
4504| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
4505| [9200] Microsoft IIS Unspecified XSS Variant
4506| [9199] Microsoft IIS shtml.dll XSS
4507| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
4508| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
4509| [7737] Microsoft IIS ASP Redirection Function XSS
4510| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
4511| [5851] Microsoft IIS Single Dot Source Code Disclosure
4512| [5736] Microsoft IIS Relative Path System Privilege Escalation
4513| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
4514| [5633] Microsoft IIS Invalid WebDAV Request DoS
4515| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
4516| [5584] Microsoft IIS URL Redirection Malformed Length DoS
4517| [5566] Microsoft IIS Form_VBScript.asp XSS
4518| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
4519| [4864] Microsoft IIS TRACK Logging Failure
4520| [4863] Microsoft IIS Active Server Page Header DoS
4521| [4791] Microsoft IIS Response Object DoS
4522| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
4523| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
4524| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
4525| [3500] Microsoft IIS fpcount.exe Remote Overflow
4526| [3341] Microsoft IIS Redirect Response XSS
4527| [3339] Microsoft IIS HTTP Error Page XSS
4528| [3338] Microsoft IIS Help File XSS
4529| [3328] Microsoft IIS FTP Status Request DoS
4530| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
4531| [3325] Microsoft IIS HTR ISAPI Overflow
4532| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
4533| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
4534| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
4535| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
4536| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
4537| [3231] Microsoft IIS Log Bypass
4538| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
4539| [1931] Microsoft IIS MIME Content-Type Header DoS
4540| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
4541| [1826] Microsoft IIS Domain Guest Account Disclosure
4542| [1824] Microsoft IIS FTP DoS
4543| [1804] Microsoft IIS Long Request Parsing Remote DoS
4544| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
4545| [1750] Microsoft IIS File Fragment Disclosure
4546| [1543] Microsoft NT/IIS Invalid URL Request DoS
4547| [1504] Microsoft IIS File Permission Canonicalization Bypass
4548| [1465] Microsoft IIS .htr Missing Variable DoS
4549| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
4550| [1322] Microsoft IIS Malformed .htr Request DoS
4551| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
4552| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
4553| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
4554| [1170] Microsoft IIS Escape Character URL Access Bypass
4555| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
4556| [1082] Microsoft IIS Domain Resolution Access Bypass
4557| [1041] Microsoft IIS Malformed HTTP Request Header DoS
4558| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
4559| [930] Microsoft IIS Shared ASP Cache Information Disclosure
4560| [929] Microsoft IIS FTP Server NLST Command Overflow
4561| [928] Microsoft IIS Long Request Log Evasion
4562| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
4563| [814] Microsoft IIS global.asa Remote Information Disclosure
4564| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
4565| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
4566| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
4567| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
4568| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
4569| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
4570| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
4571| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
4572| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
4573| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
4574| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
4575| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
4576| [473] Microsoft IIS Multiple .cnf File Information Disclosure
4577| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
4578| [470] Microsoft IIS Form_JScript.asp XSS
4579| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
4580| [436] Microsoft IIS Unicode Remote Command Execution
4581| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
4582| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
4583| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
4584| [308] Microsoft IIS Malformed File Extension URL DoS
4585| [285] Microsoft IIS repost.asp File Upload
4586| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
4587| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
4588| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
4589| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
4590| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
4591| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
4592| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
4593| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
4594| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
4595| [98] Microsoft IIS perl.exe HTTP Path Disclosure
4596| [97] Microsoft IIS ISM.DLL HTR Request Overflow
4597| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
4598| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
4599| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
4600| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
4601| [2] Microsoft IIS ExAir search.asp Direct Request DoS
4602|_
4603113/tcp filtered ident
4604135/tcp filtered msrpc
4605443/tcp open ssl/https?
4606515/tcp filtered printer
4607555/tcp open dsf?
4608593/tcp filtered http-rpc-epmap
46091556/tcp open veritas_pbx?
46101801/tcp open msmq?
46112000/tcp open cisco-sccp?
46122030/tcp open device2?
46132103/tcp open zephyr-clt?
46142105/tcp open eklogin?
46152107/tcp open msmq-mgmt?
46162179/tcp open vmrdp?
46172701/tcp open cmrcservice Microsoft Configuration Manager Remote Control service (CmRcService.exe)
4618| vulscan: VulDB - https://vuldb.com:
4619| [75335] Microsoft Windows up to Vista SP2 Service Control Manager privilege escalation
4620| [139962] Microsoft Windows up to Server 2019 Remote Desktop Protocol denial of service
4621| [139907] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4622| [139906] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4623| [139893] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4624| [139892] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4625| [139876] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4626| [139875] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4627| [137535] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
4628| [134681] Microsoft Windows Remote Desktop Service memory corruption
4629| [133777] Cisco Wireless LAN Controller up to 8.3/8.5/8.8 GUI Configuration denial of service
4630| [133222] Microsoft Windows up to Server 2019 Remote Registry Service memory corruption
4631| [122949] Trend Micro Control Manager 6.0/7.0 DLL denial of service
4632| [117167] IBM Endpoint Manager for Remote Control Password Hashing weak encryption
4633| [116039] Microsoft Windows up to Server 2016 Remote Desktop Protocol denial of service
4634| [115214] IBM Endpoint Manager for Remote Control 9.0.1/9.1.0 On-Demand Plugin privilege escalation
4635| [113435] HPE Version Control Repository Manager up to 7.5 denial of service
4636| [107595] IDenticard Two-Reader Controller Configuration Manager 1.18.8 /~user_handler cross site scripting
4637| [107228] Cisco IOS XE up to 16.1 on Catalyst Wireless Controller Manager Request denial of service
4638| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
4639| [104788] Trend Micro Control Manager 6.0 RestfulServiceUtility.NET.dll sql injection
4640| [101555] Cisco Remote Expert Manager 11.0.0 TCP Connection Flooding denial of service
4641| [100643] Remote Service Manager up to 3.1.4 Client Certificate Validator privilege escalation
4642| [93879] IBM BigFix Remote Control up to 9.1.2 Broker Application HTTP Request denial of service
4643| [79762] Cisco Unified Communications Manager Mobile and Remote Access Services spoofing privilege escalation
4644| [78849] ntpd 4.2.8 Remote Configuration denial of service
4645| [77613] Microsoft Windows up to Vista SP2 Adobe Type Manager Library atmfd.dll OpenType Font denial of service
4646| [75521] IBM Tivoli Endpoint Manager 9.0.1/9.1.0 Endpoint Manager for Remote Control weak authentication
4647| [73961] Microsoft Windows 7 SP1/8/8.1/Server 2012/Server 2012 R2 Remote Desktop Protocol Object Management denial of service
4648| [73811] Cybozu Remote Service Manager up to 2.3.0 denial of service
4649| [68531] Samsung Mobile Devices Remote Control Feature denial of service
4650| [69405] Cybozu Remote Service Manager up to 2.3.0 unknown vulnerability
4651| [69404] Cybozu Remote Service Manager up to 2.3.0 denial of service
4652| [11209] Cisco Wireless LAN Controller up to 7.4.110 Configuration Parameter denial of service
4653| [12619] Microsoft Internet Explorer XMLDOM ActiveX Control denial of service
4654| [62239] Microsoft Systems Management Server 2003 Configuration Manager Reflected cross site scripting
4655| [5938] Microsoft Windows 7/Server 2003/Server 2008 R2/Vista/XP Remote Administration Protocol netapi32.dll RAP Request denial of service
4656| [5907] Novell Remote Manager 2.0.2 Release 99.10 Small Http Interface Daemon ProcessAuthorizationFailure HTTP Header denial of service
4657| [60584] Cloudera Manager up to 3.7.4 Configuration Manager taskcontroller.cfg unknown vulnerability
4658| [4802] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Remote Desktop Protocol denial of service
4659| [4798] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Remote Desktop Service memory corruption
4660| [4392] Microsoft Windows Remote Access Service memory corruption
4661| [4389] Microsoft Windows Remote Desktop Protocol denial of service
4662| [57299] Microsoft Silverlight up to 4.0.60129.0 Grid Control Memory Leak denial of service
4663| [51497] Microsoft Windows Live Messenger 2009 ActiveX Control msnmsgr.exe denial of service
4664| [46826] Cisco Application Networking Manager up to 1.1 Configuration File denial of service
4665| [45911] Microsoft Windows Domain Controller denial of service
4666| [45758] Microsoft Money 2006 ActiveX Control prtstb06.dll denial of service
4667| [44780] Microsoft Debug Diagnostic Tool 1.0 ActiveX Control CrashHangExt.dll denial of service
4668| [44237] Microsoft iis ActiveX Control adsiis.dll denial of service
4669| [40353] Microsoft Internet Explorer 7 ActiveX Control npupload.dll SetPassword denial of service
4670| [36994] Microsoft Visual Database Tools Database Designer 7.0 ActiveX Control vdt70.dll notsafe denial of service
4671| [38337] Motive Incorporated Service Activation Manager up to 5.1 ActiveX Control activeutils.dll memory corruption
4672| [86175] ManageEngine OpManager ServiceConfiguration.do cross site scripting
4673| [34737] Microsoft Internet Explorer 7 ActiveX Control mshtml.dll denial of service
4674| [33949] Microsoft Internet Explorer 7.0 ActiveX Control ole32.dll denial of service
4675| [2739] Microsoft Windows 2000 Remote Installation Service Fehlende Authentifizierung
4676| [2676] HP OpenView Client Configuration Manager up to 2.0 Radia Notify Daemon denial of service
4677|
4678| MITRE CVE - https://cve.mitre.org:
4679| [CVE-2012-6355] IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allow remote authenticated users to gain privileges via vectors related to a work order.
4680| [CVE-2012-3327] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to a login action.
4681| [CVE-2012-3326] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
4682| [CVE-2012-3322] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to a display name.
4683| [CVE-2012-3316] Cross-site scripting (XSS) vulnerability in the Tivoli Process Automation Engine (TPAE) in IBM Maximo Asset Management 6.2 through 7.5, Maximo Asset Management Essentials 6.2 through 7.5, Tivoli Asset Management for IT 6.2 through 7.2, Tivoli Service Request Manager 7.1 and 7.2, Maximo Service Desk 6.2, Change and Configuration Management Database (CCMDB) 7.1 and 7.2, and SmartCloud Control Desk 7.5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
4684| [CVE-2012-3313] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
4685| [CVE-2012-2230] Cloudera Manager 3.7.x before 3.7.5 and Service and Configuration Manager 3.5, when Kerberos is not enabled, does not properly install taskcontroller.cfg, which allows remote authenticated users to impersonate arbitrary user accounts via unspecified vectors, a different vulnerability than CVE-2012-1574.
4686| [CVE-2012-2185] IBM Maximo Asset Management 6.2 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote authenticated users to obtain sensitive information via unspecified vectors.
4687| [CVE-2012-2184] Session fixation vulnerability in IBM Maximo Asset Management 7.1 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote attackers to hijack web sessions via unspecified vectors.
4688| [CVE-2012-2183] Session fixation vulnerability in IBM Maximo Asset Management 6.2 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote attackers to hijack web sessions via unspecified vectors.
4689| [CVE-2012-0747] SQL injection vulnerability in IBM Maximo Asset Management 6.2 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
4690| [CVE-2012-0746] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
4691| [CVE-2012-0728] SQL injection vulnerability in IBM Maximo Asset Management 7.1 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
4692| [CVE-2012-0727] SQL injection vulnerability in IBM Maximo Asset Management 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
4693| [CVE-2012-0714] Cross-site request forgery (CSRF) vulnerability in IBM Maximo Asset Management 6.2 through 7.5, as used in SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB), allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
4694| [CVE-2007-1083] Buffer overflow in the Configuration Checker (ConfigChk) ActiveX control in VSCnfChk.dll 2.0.0.2 for Verisign Managed PKI Service, Secure Messaging for Microsoft Exchange, and Go Secure! allows remote attackers to execute arbitrary code via long arguments to the VerCompare method.
4695| [CVE-2013-3443] The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626.
4696| [CVE-2013-2961] The internal web server in the Basic Services component in IBM Tivoli Monitoring (ITM) 6.2.0 through FP3, 6.2.1 through FP4, 6.2.2 through FP9, and 6.2.3 before FP3, as used in IBM Application Manager for Smart Business (formerly Tivoli Foundations Application Manager) 1.2.1 before 1.2.1.0-TIV-IAMSB-FP0004 and other products, allows remote attackers to perform unspecified redirection of HTTP requests, and bypass the proxy-server configuration, via crafted HTTP traffic.
4697| [CVE-2013-1290] Microsoft SharePoint Server 2013, in certain configurations involving legacy My Sites, does not properly establish default access controls for a SharePoint list, which allows remote authenticated users to bypass intended restrictions on reading list items via a direct request for a list's location, aka "Incorrect Access Rights Information Disclosure Vulnerability."
4698| [CVE-2013-1170] The Cisco Prime Network Control System (NCS) appliance with software before 1.1.1.24 has a default password for the database user account, which makes it easier for remote attackers to change the configuration or cause a denial of service (service disruption) via unspecified vectors, aka Bug ID CSCtz30468.
4699| [CVE-2012-4841] Unspecified vulnerability in Tivoli Endpoint Manager for Remote Control Broker 8.2 before 8.2.1-TIV-TEMRC821-IF0002 allows remote attackers to cause a denial of service (resource consumption) via unknown vectors.
4700| [CVE-2012-4065] Eucalyptus before 3.1.1 does not properly restrict the binding of external SOAP web-services messages, which allows remote authenticated users to bypass unspecified authorization checks and obtain direct access to a (1) Cloud Controller or (2) Walrus service via a crafted message, as demonstrated by changes to a volume, snapshot, or cloud configuration setting.
4701| [CVE-2012-3328] Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.1, Maximo Asset Management Essentials 7.1, Tivoli Asset Management for IT 7.1 and 7.2, Tivoli Service Request Manager 7.1 and 7.2, and Change and Configuration Management Database (CCMDB) 7.1 and 7.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to a hidden frame footer.
4702| [CVE-2012-2552] Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability."
4703| [CVE-2012-2536] Cross-site scripting (XSS) vulnerability in Microsoft Systems Management Server 2003 SP3 and System Center Configuration Manager 2007 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Reflected XSS Vulnerability."
4704| [CVE-2011-3281] Unspecified vulnerability in Cisco IOS 15.0 through 15.1, in certain HTTP Layer 7 Application Control and Inspection configurations, allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTP packet, aka Bug ID CSCto68554.
4705| [CVE-2011-2497] Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
4706| [CVE-2011-1845] Multiple memory leaks in the DataGrid control implementation in Microsoft Silverlight 4 before 4.0.60310.0 allow remote attackers to cause a denial of service (memory consumption) via an application involving (1) subscriptions to an INotifyDataErrorInfo.ErrorsChanged event or (2) a TextBlock or TextBox element.
4707| [CVE-2011-1844] Memory leak in Microsoft Silverlight 4 before 4.0.60310.0 allows remote attackers to cause a denial of service (memory consumption) via an application involving a popup control and a custom DependencyProperty property, related to lack of garbage collection.
4708| [CVE-2011-1652] ** DISPUTED ** The default configuration of Microsoft Windows 7 immediately prefers a new IPv6 and DHCPv6 service over a currently used IPv4 and DHCPv4 service upon receipt of an IPv6 Router Advertisement (RA), and does not provide an option to ignore an unexpected RA, which allows remote attackers to conduct man-in-the-middle attacks on communication with external IPv4 servers via vectors involving RAs, a DHCPv6 server, and NAT-PT on the local network, aka a "SLAAC Attack." NOTE: it can be argued that preferring IPv6 complies with RFC 3484, and that attempting to determine the legitimacy of an RA is currently outside the scope of recommended behavior of host operating systems.
4709| [CVE-2011-0787] Unspecified vulnerability in the Application Service Level Management component in Oracle Database Server 11.1.0.7 and Enterprise Manager Grid Control allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Service Level Agreements.
4710| [CVE-2011-0647] The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
4711| [CVE-2010-4687] STCAPP (aka the SCCP telephony control application) on Cisco IOS before 15.0(1)XA1 does not properly handle multiple calls to a shared line, which allows remote attackers to cause a denial of service (port hang) by simultaneously ending two calls that were controlled by CallManager Express (CME), aka Bug ID CSCtd42552.
4712| [CVE-2010-3453] The WW8ListManager::WW8ListManager function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle an unspecified number of list levels in user-defined list styles in WW8 data in a Microsoft Word document, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .DOC file that triggers an out-of-bounds write.
4713| [CVE-2010-2742] The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability."
4714| [CVE-2010-1881] The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability."
4715| [CVE-2010-1224] main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.
4716| [CVE-2010-0586] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability."
4717| [CVE-2010-0585] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz48614, the "SCCP Packet Processing Denial of Service Vulnerability."
4718| [CVE-2010-0278] A certain ActiveX control in msgsc.14.0.8089.726.dll in Microsoft Windows Live Messenger 2009 build 14.0.8089.726 on Windows Vista and Windows 7 allows remote attackers to cause a denial of service (msnmsgr.exe crash) by calling the ViewProfile method with a crafted argument during an MSN Messenger session.
4719| [CVE-2010-0035] The Key Distribution Center (KDC) in Kerberos in Microsoft Windows 2000 SP4, Server 2003 SP2, and Server 2008 Gold and SP2, when a trust relationship with a non-Windows Kerberos realm exists, allows remote authenticated users to cause a denial of service (NULL pointer dereference and domain controller outage) via a crafted Ticket Granting Ticket (TGT) renewal request, aka "Kerberos Null Pointer Dereference Vulnerability."
4720| [CVE-2009-5120] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
4721| [CVE-2009-3977] Multiple buffer overflows in a certain ActiveX control in ActiveDom.ocx in HP OpenView Network Node Manager (OV NNM) 7.53 might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via a long string argument to the (1) DisplayName, (2) AddGroup, (3) InstallComponent, or (4) Subscribe method. NOTE: this issue is not a vulnerability in many environments, because the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
4722| [CVE-2009-3734] Unspecified vulnerability in the management console in the S2 Security Linear eMerge Access Control System 2.5.x allows remote attackers to cause a denial of service (configuration reset) via a request to a crafted URI.
4723| [CVE-2009-3038] A certain ActiveX control in lnresobject.dll 7.1.1.119 in the Research In Motion (RIM) Lotus Notes connector for BlackBerry Desktop Manager 5.0.0.11 allows remote attackers to cause a denial of service (Internet Explorer crash) by referencing the control's CLSID in the classid attribute of an OBJECT element.
4724| [CVE-2009-2507] A certain ActiveX control in the Indexing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly process URLs, which allows remote attackers to execute arbitrary programs via unspecified vectors that cause a "vulnerable binary" to load and run, aka "Memory Corruption in Indexing Service Vulnerability."
4725| [CVE-2009-1953] IBM FileNet Content Manager 4.0, 4.0.1, and 4.5, as used in IBM WebSphere Application Server (WAS) and Oracle BEA WebLogic Application Server, when the CE Web Services listener has a certain WSEAF configuration, does not properly restrict use of a cached Subject, which allows remote attackers to obtain access with the credentials of a recently authenticated user via unspecified vectors.
4726| [CVE-2009-1167] Unspecified vulnerability on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0 and 5.x before 5.2.191.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to modify the configuration via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCsy44672.
4727| [CVE-2009-0632] The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
4728| [CVE-2009-0621] Cisco ACE 4710 Application Control Engine Appliance before A1(8a) uses default (1) usernames and (2) passwords for (a) the administrator, (b) web management, and (c) device management, which makes it easier for remote attackers to perform configuration changes to the Device Manager and other components, or obtain operating-system access.
4729| [CVE-2009-0618] Unspecified vulnerability in the Java agent in Cisco Application Networking Manager (ANM) before 2.0 Update A allows remote attackers to gain privileges, and cause a denial of service (service outage) by stopping processes, or obtain sensitive information by reading configuration files.
4730| [CVE-2009-0616] Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation."
4731| [CVE-2008-6709] Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allows remote authenticated users to execute arbitrary commands via unknown vectors related to configuration of "local data viewing or restoring parameters."
4732| [CVE-2008-6708] Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x and 4.x, allows remote authenticated administrators to gain root privileges via unknown vectors related to configuration of "data viewing or restoring parameters."
4733| [CVE-2008-6707] The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an "unnecessary default application," (4) unspecified scripts in the states folder, (5) an unspecified "default application" that lists server configuration, and (6) "full system help."
4734| [CVE-2008-6706] Multiple unspecified vulnerabilities in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allow remote attackers to obtain (1) application server configuration, (2) database server configuration including encrypted passwords, (3) a system utility that decrypts "subscriber table passwords," (4) a system utility that decrypts database passwords, and (5) a system utility that encrypts "subscriber table passwords."
4735| [CVE-2008-6219] nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.
4736| [CVE-2008-5823] An ActiveX control in prtstb06.dll in Microsoft Money 2006, when used with WScript in Windows Script Host (WSH) on Windows Vista, allows remote attackers to cause a denial of service (access violation and application crash) via a zero value for the Startup property.
4737| [CVE-2008-5420] The SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center before 6.1 does not properly authenticate SST_SENDFILE requests, which allows remote attackers to read arbitrary files.
4738| [CVE-2008-5419] Stack-based buffer overflow in SAN Manager Master Agent service (aka msragent.exe) in EMC Control Center 5.2 SP5 and 6.0 allows remote attackers to execute arbitrary code via multiple SST_CTGTRANS requests.
4739| [CVE-2008-5232] Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote attackers to execute arbitrary code via a long argument. NOTE: the provenance of this information is unknown
4740| [CVE-2008-5229] Stack-based buffer overflow in Microsoft Device IO Control in iphlpapi.dll in Microsoft Windows Vista Gold and SP1 allows local users in the Network Configuration Operator group to gain privileges or cause a denial of service (system crash) via a large invalid PrefixLength to the CreateIpForwardEntry2 method, as demonstrated by a "route add" command. NOTE: this issue might not cross privilege boundaries.
4741| [CVE-2008-5179] Unspecified vulnerability in Microsoft Office Communications Server (OCS), Office Communicator, and Windows Live Messenger allows remote attackers to cause a denial of service (crash) via a crafted Real-time Transport Control Protocol (RTCP) receiver report packet.
4742| [CVE-2008-4800] The DebugDiag ActiveX control in CrashHangExt.dll, possibly 1.0, in Microsoft Debug Diagnostic Tool allows remote attackers to cause a denial of service (NULL pointer dereference and Internet Explorer 6.0 crash) via a large negative integer argument to the GetEntryPointForThread method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings.
4743| [CVE-2008-4301] ** DISPUTED ** A certain ActiveX control in iisext.dll in Microsoft Internet Information Services (IIS) allows remote attackers to set a password via a string argument to the SetPassword method. NOTE: this issue could not be reproduced by a reliable third party. In addition, the original researcher is unreliable. Therefore the original disclosure is probably erroneous.
4744| [CVE-2008-4300] A certain ActiveX control in adsiis.dll in Microsoft Internet Information Services (IIS) allows remote attackers to cause a denial of service (browser crash) via a long string in the second argument to the GetObject method. NOTE: this issue was disclosed by an unreliable researcher, so it might be incorrect.
4745| [CVE-2008-4299] A certain ActiveX control in the Microsoft Internet Authentication Service (IAS) Helper COM Component in iashlpr.dll allows remote attackers to cause a denial of service (browser crash) via a large integer value in the first argument to the PutProperty method. NOTE: this issue was disclosed by an unreliable researcher, so it might be incorrect.
4746| [CVE-2008-4110] Buffer overflow in the SQLVDIRLib.SQLVDirControl ActiveX control in Tools\Binn\sqlvdir.dll in Microsoft SQL Server 2000 (aka SQL Server 8.0) allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long URL in the second argument to the Connect method. NOTE: this issue is not a vulnerability in many environments, since the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
4747| [CVE-2008-4071] A certain ActiveX control in Adobe Acrobat 9, when used with Microsoft Windows Vista and Internet Explorer 7, allows remote attackers to cause a denial of service (browser crash) via an src property value with an invalid acroie:// URL.
4748| [CVE-2008-4032] Microsoft Office SharePoint Server 2007 Gold and SP1 and Microsoft Search Server 2008 do not properly perform authentication and authorization for administrative functions, which allows remote attackers to cause a denial of service (server load), obtain sensitive information, and "create scripts that would run in the context of the site" via requests to administrative URIs, aka "Access Control Vulnerability."
4749| [CVE-2008-3013] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
4750| [CVE-2008-3008] Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability."
4751| [CVE-2008-2730] The Real-Time Information Server (RIS) Data Collector service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) and 6.x before 6.1(1) allows remote attackers to bypass authentication, and obtain cluster configuration information and statistics, via a direct TCP connection to the service port, aka Bug ID CSCsj90843.
4752| [CVE-2008-2062] The Real-Time Information Server (RIS) Data Collector service in Cisco Unified Communications Manager (CUCM) before 4.2(3)SR4, and 4.3 before 4.3(2)SR1, allows remote attackers to bypass authentication, and obtain cluster configuration information and statistics, via a direct TCP connection to the service port, aka Bug ID CSCsq35151.
4753| [CVE-2008-1898] A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.
4754| [CVE-2007-5252] Buffer overflow in NetSupport Manager (NSM) Client 10.00 and 10.20, and NetSupport School Student (NSS) 9.00, allows remote NSM servers to cause a denial of service or possibly execute arbitrary code via crafted data in the configuration exchange phase of an initial connection setup. NOTE: a vendor statement, which is too vague to be sure that it is for this particular issue, says that only a denial of service is possible.
4755| [CVE-2007-4814] Buffer overflow in the SQLServer ActiveX control in the Distributed Management Objects OLE DLL (sqldmo.dll) 2000.085.2004.00 in Microsoft SQL Server Enterprise Manager 8.05.2004 allows remote attackers to execute arbitrary code via a long second argument to the Start method.
4756| [CVE-2007-3615] Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache.
4757| [CVE-2007-3282] Buffer overflow in the Microsoft Office MSODataSourceControl ActiveX object allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the DeleteRecordSourceIfUnused method.
4758| [CVE-2007-3040] Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent (Agent.Control) ActiveX control, which triggers an overflow within the Agent Service (agentsrv.exe) process, a different issue than CVE-2007-1205.
4759| [CVE-2007-2918] Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors.
4760| [CVE-2007-2903] Buffer overflow in the HelpPopup method in the Microsoft Office 2000 Controllo UA di Microsoft Office ActiveX control (OUACTRL.OCX) 1.0.1.9 allows remote attackers to cause a denial of service (probably winhlp32.exe crash) via a long first argument. NOTE: it is not clear whether this issue crosses privilege boundaries.
4761| [CVE-2007-2885] The NotSafe function in the MSVDTDatabaseDesigner7 ActiveX control in VDT70.DLL in Microsoft Visual Database Tools (MSVDT) Database Designer 7.0 allows remote attackers to cause a denial of service (Internet Explorer 6 crash) via a long argument.
4762| [CVE-2007-2815] The "hit-highlighting" functionality in webhits.dll in Microsoft Internet Information Services (IIS) Web Server 5.0 only uses Windows NT ACL configuration, which allows remote attackers to bypass NTLM and basic authentication mechanisms and access private web directories via the CiWebhitsfile parameter to null.htw.
4763| [CVE-2007-2629] Bradford CampusManager Network Control Application Server 3.1(6) allows remote attackers to obtain sensitive information (backup, log, and configuration files) via direct request for certain files in (1) /runTime/ or (2) /remediationReports/.
4764| [CVE-2007-1833] The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of voice services) by sending crafted packets to the (1) SCCP (2000/tcp) or (2) SCCPS (2443/tcp) port.
4765| [CVE-2007-1692] The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote attackers to intercept web traffic by registering a proxy server using WINS or DNS, then responding to WPAD requests, as demonstrated using Internet Explorer. NOTE: it could be argued that if an attacker already has control over WINS/DNS, then web traffic could already be intercepted by modifying WINS or DNS records, so this would not cross privilege boundaries and would not be a vulnerability. It has also been reported that DHCP is an alternate attack vector.
4766| [CVE-2007-1644] The dynamic DNS update mechanism in the DNS Server service on Microsoft Windows does not properly authenticate clients in certain deployments or configurations, which allows remote attackers to change DNS records for a web proxy server and conduct man-in-the-middle (MITM) attacks on web traffic, conduct pharming attacks by poisoning DNS records, and cause a denial of service (erroneous name resolution).
4767| [CVE-2007-0819] HP Network Node Manager (NNM) Remote Console 7.50, 7.51, and 7.53 assigns Everyone Full Control permission for the %PROGRAMFILES%\HP OpenView directory tree, which allows local users to gain privileges via a Trojan horse executable file or ActiveX component, or a modified bin\ovtrcsvc.exe for the HP Open View Shared Trace Service.
4768| [CVE-2007-0612] Multiple ActiveX controls in Microsoft Windows 2000, XP, 2003, and Vista allows remote attackers to cause a denial of service (Internet Explorer crash) by accessing the bgColor, fgColor, linkColor, alinkColor, vlinkColor, or defaultCharset properties in the (1) giffile, (2) htmlfile, (3) jpegfile, (4) mhtmlfile, (5) ODCfile, (6) pjpegfile, (7) pngfile, (8) xbmfile, (9) xmlfile, (10) xslfile, or (11) wdfile objects in (a) mshtml.dll
4769| [CVE-2007-0319] Multiple stack-based buffer overflows in the Motive ActiveEmailTest.EmailData (ActiveUtils EmailData) ActiveX control in ActiveUtils.dll in Motive Service Activation Manager 5.1 and Self Service Manager 5.1 and earlier allow remote attackers to execute arbitrary code via unspecified vectors.
4770| [CVE-2006-6659] The Microsoft Office Outlook Recipient ActiveX control (ole32.dll) in Windows XP SP2 allows remote attackers to cause a denial of service (Internet Explorer 7 hang) via crafted HTML.
4771| [CVE-2006-5745] Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.
4772| [CVE-2006-5559] The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
4773| [CVE-2006-4685] The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains.
4774| [CVE-2006-4627] System Information ActiveX control (msinfo.dll), when accessed via Microsoft Internet Explorer, allows remote attackers to cause a denial of service (crash) via a SaveFile function with a long (1) computer and possibly (2) filename and (3) category argument.
4775| [CVE-2006-4446] Heap-based buffer overflow in DirectAnimation.PathControl COM object (daxctle.ocx) in Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Spline function call whose first argument specifies a large number of points.
4776| [CVE-2006-4193] Microsoft Internet Explorer 6.0 SP1 and possibly other versions allows remote attackers to cause a denial of service and possibly execute arbitrary code by instantiating COM objects as ActiveX controls, including (1) imskdic.dll (Microsoft IME), (2) chtskdic.dll (Microsoft IME), and (3) msoe.dll (Outlook), which leads to memory corruption. NOTE: it is not certain whether the issue is in Internet Explorer or the individual DLL files.
4777| [CVE-2006-3638] Microsoft Internet Explorer 5.01 and 6 does not properly handle uninitialized COM objects, which allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code, as demonstrated by the Nth function in the DirectAnimation.DATuple ActiveX control, aka "COM Object Instantiation Memory Corruption Vulnerability."
4778| [CVE-2006-3510] The Remote Data Service Object (RDS.DataControl) in Microsoft Internet Explorer 6 on Windows 2000 allows remote attackers to cause a denial of service (crash) via a series of operations that result in an invalid length calculation when using SysAllocStringLen, then triggers a buffer over-read.
4779| [CVE-2006-3427] Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by declaring the sourceURL attribute on an uninitialized DirectAnimation.StructuredGraphicsControl ActiveX Object, which triggers a null dereference.
4780| [CVE-2006-3357] Heap-based buffer overflow in HTML Help ActiveX control (hhctrl.ocx) in Microsoft Internet Explorer 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code by repeatedly setting the Image field of an Internet.HHCtrl.1 object to certain values, possibly related to improper escaping and long strings.
4781| [CVE-2006-2371] Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," that lead to registry corruption and stack corruption, aka the "RASMAN Registry Corruption Vulnerability."
4782| [CVE-2006-2094] Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking an object or pressing keys that are actually applied to a "Yes" approval for executing the control.
4783| [CVE-2006-1176] Buffer overflow in eBay Enhanced Picture Services (aka EPUImageControl Class) in EUPWALcontrol.dll before 1.0.3.48, as used in Sell Your Item (SYI), Setup & Test eBay Enhanced Picture Services, Picture Manager Enhanced Uploader, and CARad.com Add Vehicle, allows remote attackers to execute arbitrary code via a crafted HTML document.
4784| [CVE-2006-0988] The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
4785| [CVE-2005-3114] Buffer overflow in the ActiveX control for NateOn Messenger (NateonDownloadManager.ocx) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long third argument to the GotNate.Excute method.
4786| [CVE-2005-2791] BFCommand & Control Server Manager BFCC 1.22_A and earlier, and BFVCC 2.14_B and earlier, allows remote attackers to cause a denial of service (refused new connections) via a series of connections and disconnections without sending the login command.
4787| [CVE-2005-2127] Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."
4788| [CVE-2005-1981] Unknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.
4789| [CVE-2005-1980] Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
4790| [CVE-2005-1979] Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
4791| [CVE-2005-1929] Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product.
4792| [CVE-2005-1928] Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote attackers to cause a denial of service (CPU consumption) via a flood of crafted packets with a certain "magic value" to port 5005, which also leads to a memory leak.
4793| [CVE-2004-2558] Unspecified vulnerability in IBM Tivoli SecureWay Policy Director 3.8, Access Manager for e-business 3.9 to 5.1, Access Manager Identity Manager Solution 5.1, Configuration Manager 4.2, Configuration Manager for Automated Teller Machines 2.1.0, and IBM WebSphere Everyplace Server, Service Provider Offering for Multi-platforms 2.1.3 to 2.15 allow remote attackers to hijack sessions of authenticated users via unknown attack vectors involving certain cookies, aka "Potential Credential Impersonation Attack."
4794| [CVE-2004-2527] The local and remote desktop login screens in Microsoft Windows XP before SP2 and 2003 allow remote attackers to cause a denial of service (CPU and memory consumption) by repeatedly using the WinKey+"U" key combination, which causes multiple copies of Windows Utility Manager to be loaded more quickly than they can be closed when the copies detect that another instance is running.
4795| [CVE-2004-2434] Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service (browser crash) via a link with "::{" (colon colon left brace), which triggers a null dereference when the user attempts to save the link using "Save As" and Internet Explorer prepares an error message with an attacker-controlled format string.
4796| [CVE-2004-1977] 3com NBX IP VOIP NetSet Configuration Manager allows remote attackers to cause a denial of service (crash) via a Nessus scan in safeChecks mode.
4797| [CVE-2004-1347] X Display Manager (XDM) on Solaris 8 allows remote attackers to cause a denial of service (XDM crash) via an invalid X Display Manager Control Protocol (XDMCP) request.
4798| [CVE-2004-0728] The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address.
4799| [CVE-2003-0995] Buffer overflow in the Microsoft Message Queue Manager (MSQM) allows remote attackers to cause a denial of service (RPC service crash) via a queue registration request.
4800| [CVE-2002-1867] The default configuration of BizDesign ImageFolio 2.23 through 2.26 does not control access to (1) admin/setup.cgi, which allows remote attackers to create an administrative account, or (2) admin/nph-build.cgi, which allows remote attackers to cause a denial of service (CPU consumption).
4801| [CVE-2002-1795] Cross-site scripting (XSS) vulnerability in connect.asp in Microsoft Terminal Services Advanced Client (TSAC) ActiveX control allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
4802| [CVE-2002-1292] The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.
4803| [CVE-2002-1214] Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.
4804| [CVE-2002-0978] Microsoft File Transfer Manager (FTM) ActiveX control before 4.0 allows remote attackers to upload or download arbitrary files to arbitrary locations via a man-in-the-middle attack with modified TGT and TGN parameters in a call to the "Persist" function.
4805| [CVE-2002-0977] Buffer overflow in Microsoft File Transfer Manager (FTM) ActiveX control before 4.0 allows remote attackers to execute arbitrary code via a long TS value.
4806| [CVE-2002-0726] Buffer overflow in Microsoft Terminal Services Advanced Client (TSAC) ActiveX control allows remote attackers to execute arbitrary code via a long server name field.
4807| [CVE-2002-0057] XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.
4808| [CVE-2001-1451] Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests.
4809| [CVE-2001-0237] Memory leak in Microsoft 2000 domain controller allows remote attackers to cause a denial of service by repeatedly connecting to the Kerberos service and then disconnecting without sending any data.
4810| [CVE-2000-0228] Microsoft Windows Media License Manager allows remote attackers to cause a denial of service by sending a malformed request that causes the manager to halt, aka the "Malformed Media License Request" Vulnerability.
4811| [CVE-1999-1016] Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
4812| [CVE-1999-0980] Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.
4813|
4814| SecurityFocus - https://www.securityfocus.com/bid/:
4815| [74492] Microsoft Windows Service Control Manager CVE-2015-1702 Remote Privilege Escalation Vulnerability
4816| [76567] Microsoft .NET Framework Model View Controller CVE-2015-2526 Remote Denial of Service Vulnerability
4817| [65854] Microsoft XMLDOM ActiveX Control CVE-2013-7332 Remote Denial of Service Vulnerability
4818| [62182] Microsoft Windows Service Control Manager CVE-2013-3862 Local Privilege Escalation Vulnerability
4819| [56649] IBM Tivoli Endpoint Manager for Remote Control CVE-2012-4841 Denial of Service Vulnerability
4820| [46235] EMC Replication Manager Client Control Service Remote Code Execution Vulnerability
4821| [36629] Microsoft Indexing Service ActiveX Control Remote Code Execution Vulnerability
4822| [35998] EMC Replication Manager Client Control Service Remote Code Execution Vulnerability
4823| [31996] Microsoft DebugDiag 'CrashHangExt.dll' ActiveX Control Remote Denial of Service Vulnerability
4824| [30814] Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer Overflow Vulnerability
4825| [21649] Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability
4826| [20915] Microsoft XML Core Service XMLHTTP ActiveX Control Remote Code Execution Vulnerability
4827|
4828| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4829| [79125] IBM Tivoli Endpoint Manager for Remote Control Broker denial of service
4830| [16696] Microsoft Systems Management Server (SMS) Remote Control Client service denial of service
4831| [11824] Microsoft Windows XP Service Control Manager (SCM) race condition
4832| [5031] Microsoft Windows 2000 Service Control Manager named pipe could allow a unauthorized user to gain privileges
4833| [83092] Microsoft Remote Desktop ActiveX control code execution
4834| [78076] Microsoft System Center Configuration Manager cross-site scripting
4835| [77993] Microsoft Indexing Service ActiveX control denial of service
4836| [77393] Novell Remote Manager ProcessAuthorizationFailure() denial of service
4837| [77353] Microsoft Windows Remote Administration Protocol denial of service
4838| [73542] Microsoft Windows Remote Desktop Protocol denial of service
4839| [68830] Microsoft Windows Remote Desktop Protocol denial of service
4840| [66910] Oracle Database Server and Enterprise Manager Grid Control Application Service Level Management component unspecified
4841| [65363] IBM Lotus Domino service controller remote console security bypass
4842| [61493] Hitachi JP1/ServerConductor/Control Manager unspecified denial of service
4843| [60522] Microsoft Clip Organizer ActiveX control denial of service
4844| [53540] Microsoft Windows Indexing Service ActiveX control code execution
4845| [52761] Lotus Notes Connector for Blackberry Manager ActiveX control (lnresobject.dll) unspecified denial of service
4846| [52116] Microsoft Windows RDP Services Client ActiveX control buffer overflow
4847| [48408] Free Download Manager Remote Control Server buffer overflow
4848| [47756] Microsoft Money prtstb06.dll ActiveX control denial of service
4849| [46309] Microsoft Debug Diagnostic Tool DebugDiag ActiveX control denial of service
4850| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
4851| [45556] Microsoft IAS Helper COM ActiveX control denial of service
4852| [40432] RPM Remote Print Manager Service Receive data file buffer overflow
4853| [40087] Microsoft Internet Explorer multiple ActiveX control denial of service
4854| [38440] Microsoft Forms ActiveX control denial of service
4855| [38430] Microsoft Office Web Component OWC11.DataSourceControl ActiveX denial of service
4856| [32831] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
4857| [31675] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
4858| [31549] Microsoft Internet Explorer CCRP Folder Treeview ActiveX control denial of service
4859| [30756] Microsoft Windows Remote Installation Service code execution
4860| [27803] Microsoft Internet Explorer DataSourceControl ActiveX object denial of service
4861| [27760] Microsoft Internet Explorer FolderItem control denial of service
4862| [27621] Microsoft Internet Explorer RDS.DataControl ActiveX object denial of service
4863| [27565] Microsoft Internet Explorer StructuredGraphicsControl SourceURL denial of service
4864| [24166] Computer Associates (CA) Unicenter Remote Control DM Primer denial of service
4865| [22524] Microsoft Windows XP Wireless Zero Configuration service information disclosure
4866| [22229] COOL! Remote Control request denial of service
4867| [21546] Remote File Manager text string denial of service
4868| [21473] DG Remote Control Server data denial of service
4869| [21355] Microsoft Windows Network Connection Manager denial of service
4870| [21025] Microsoft ISA Server SecureNAT client configuration denial of service
4871| [15700] Microsoft Windows 2000 Domain Controller LSASS LDAP message denial of service
4872| [13970] Unicenter Remote Control (URC) denial of service
4873| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
4874| [10120] Microsoft Windows XP Remote Desktop malformed PDU Confirm Active packet denial of service
4875| [6295] WebSite Professional remote manager service denial of service
4876| [6136] Microsoft Windows 2000 domain controller denial of service
4877| [5800] Microsoft Windows 2000 Index Service ActiveX controls allow unauthorized access to file information
4878| [4672] Logon attempt failure reported by Windows Service Control Manager
4879| [4651] Network Associates WebShield SMTP allows remote users to retrieve the service`s configuration
4880| [4648] Microsoft Windows NT malformed remote registry request denial of service
4881| [4552] Microsoft Windows Browser service can be shutdown by an unauthorized remote user
4882| [3128] Linux identd configuration remote denial of service
4883| [16] Microsoft Windows Remote Access Service
4884|
4885| Exploit-DB - https://www.exploit-db.com:
4886| [29295] Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability
4887| [30832] Yahoo! Toolbar 1.4.1 Helper Class ActiveX Control Remote Buffer Overflow Denial of Service Vulnerability
4888| [30756] Microsoft Forms 2.0 ActiveX Control 2.0 Memory Access Violation Denial of Service Vulnerabilities
4889| [30490] Microsoft Internet Explorer 5.0.1 TBLinf32.DLL ActiveX Control Remote Code Execution Vulnerability
4890| [30274] OpManager 6/7 admin/ServiceConfiguration.do operation Parameter XSS
4891| [30160] Microsoft Windows XP - GDI+ ICO File Remote Denial of Service Vulnerability
4892| [30104] F-Secure Policy Manager 7.00 FSMSH.DLL Remote Denial of Service Vulnerability
4893| [29738] Microsoft Windows XP/2000 WinMM.DLL - WAV Files Remote Denial of Service (DoS) Vulnerability
4894| [29664] Microsoft Office Publisher 2007 - Remote Denial of Service (DoS) Vulnerability
4895| [29536] Microsoft Internet Explorer 5.0.1 - Multiple ActiveX Controls Denial of Service Vulnerabilities
4896| [28263] Microsoft Windows XP/2000/2003 Remote Denial of Service Vulnerability
4897| [28244] Microsoft Internet Explorer 6.0 DataSourceControl Denial of Service Vulnerability
4898| [28202] Microsoft Internet Explorer 6.0 HtmlDlgSafeHelper Remote Denial of Service Vulnerability
4899| [28194] Microsoft Internet Explorer 6 RDS.DataControl Denial of Service Vulnerability
4900| [28169] Microsoft Internet Explorer 5.0.1/6.0 Structured Graphics Control Denial of Service Vulnerability
4901| [27984] Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability
4902| [27101] Computer Associates Unicenter 6.0 - Remote Control DM Primer Remote Denial of Service Vulnerability
4903| [27073] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (2)
4904| [27072] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (1)
4905| [26690] Microsoft Windows 2000/2003/XP CreateRemoteThread Local Denial of Service Vulnerability
4906| [26323] Microsoft Windows XP Wireless Zero Configuration Service Information Disclosure Vulnerability
4907| [26250] COOL! Remote Control 1.12 Remote Denial of Service Vulnerability
4908| [25967] Cisco CallManager 1.0/2.0/3.x/4.0 CTI Manager Remote Denial of Service Vulnerability
4909| [25962] Microsoft ASP.NET 1.0/1.1 RPC/Encoded Remote Denial of Service Vulnerability
4910| [25268] Microsoft Windows XP TSShutdn.exe Remote Denial of Service Vulnerability
4911| [24640] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (2)
4912| [24639] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (1)
4913| [24281] Microsoft Systems Management Server 1.2/2.0 - Remote Denial of Service Vulnerability
4914| [24002] Microsoft Outlook Express 6.0 - Remote Denial of Service Vulnerability
4915| [23912] Microsoft Internet Explorer 6.0 Macromedia Flash Player Plug-in Remote Denial of Service Vulnerability
4916| [23850] Microsoft Windows XP Explorer.EXE Remote Denial of Service Vulnerability
4917| [22837] Microsoft Windows 2000/NT 4 Media Services NSIISlog.DLL Remote Buffer Overflow
4918| [20508] Microsoft NT 4.0 RAS/PPTP Malformed Control Packet Denial of Service Attack
4919| [19516] Microsoft MSN Messenger Service 1.0 Setup BBS ActiveX Control Buffer Overflow
4920| [16777] Free Download Manager Remote Control Server Buffer Overflow
4921| [15940] HP Data Protector Manager 6.11 - Remote DoS in RDS Service
4922| [12032] Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution
4923| [10092] Yahoo! Messenger 9.0.0.2162 'YahooBridgeLib.dll' ActiveX Control Remote Denial of Service
4924| [8916] Free Download Manager 2.5/3.0 (Control Server) Remote BOF Exploit
4925| [7262] Microsoft Office Communicator (SIP) Remote Denial of Service Exploit
4926| [4066] Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
4927| [4065] Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
4928| [3982] Dart Communications PowerTCP Service Control Remote BoF Exploit
4929| [3965] Microsoft IIS 6.0 (/AUX/.aspx) Remote Denial of Service Exploit
4930| [3891] Remote Display Dev kit 1.2.1.0 RControl.dll Denial of Service Exploit
4931| [3433] Rediff Toolbar ActiveX Control Remote Denial of Service Exploit
4932| [1212] COOL! Remote Control <= 1.12 Remote Denial of Service Exploit
4933| [1107] Remote Control Server 1.6.2 - Denial of Service Exploit
4934| [988] Remote File Manager 1.0 - Denial of Service Exploit
4935|
4936| OpenVAS (Nessus) - http://www.openvas.org:
4937| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
4938| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
4939| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
4940| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
4941| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
4942| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
4943| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
4944| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
4945| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
4946| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
4947| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
4948| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
4949| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
4950| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
4951| [801579] HP Data Protector Manager Remote Denial of Service Vulnerability
4952| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
4953| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
4954| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
4955| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
4956| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
4957| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
4958| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
4959| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
4960| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
4961| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
4962| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
4963| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
4964| [902929] hMailServer IMAP Remote Denial of Service Vulnerability
4965| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
4966| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
4967| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
4968| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
4969| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
4970| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
4971| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
4972| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
4973| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
4974| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
4975| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
4976| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
4977| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
4978| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
4979| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
4980| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
4981| [902826] KnFTP Server 'FEAT' Command Remote Denial of Service Vulnerability
4982| [902824] Epson EventManager 'x-protocol-version' Denial of Service Vulnerability
4983| [902820] Tiny Server HTTP HEAD Request Remote Denial of Service Vulnerability
4984| [902819] Telnet-FTP Server 'RETR' Command Remote Denial of Service Vulnerability
4985| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
4986| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
4987| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
4988| [902803] FreeSSHd Remote Denial of Service Vulnerability
4989| [902791] MS Windows Color Control Panel Remote Code Execution Vulnerability (2643719)
4990| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
4991| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
4992| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
4993| [902726] ClamAV Hash Manager Off-By-One Denial of Service Vulnerability (Win)
4994| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
4995| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
4996| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
4997| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
4998| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
4999| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
5000| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
5001| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
5002| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
5003| [902655] IBM Rational Rhapsody BB FlashBack SDK ActiveX Control Remote Code Execution VUlnerabilities
5004| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
5005| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
5006| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
5007| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
5008| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
5009| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
5010| [902570] Colasoft Capsa Malformed SNMP V1 Packet Remote Denial of Service Vulnerability
5011| [902569] MetaServer RT Multiple Remote Denial of Service Vulnerabilities
5012| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
5013| [902563] UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities
5014| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
5015| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
5016| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
5017| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
5018| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
5019| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
5020| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
5021| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
5022| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
5023| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
5024| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
5025| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
5026| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
5027| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
5028| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
5029| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
5030| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
5031| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
5032| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
5033| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
5034| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
5035| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
5036| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
5037| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
5038| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
5039| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
5040| [902291] Novell eDirectory NCP Request Remote Denial of Service Vulnerability
5041| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
5042| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
5043| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
5044| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
5045| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
5046| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
5047| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
5048| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
5049| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
5050| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
5051| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
5052| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
5053| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
5054| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5055| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
5056| [902218] MS Office Access ActiveX Controls Remote Code Execution Vulnerabilities(982335)
5057| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
5058| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
5059| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
5060| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
5061| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
5062| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
5063| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
5064| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
5065| [902135] TT Web Site Manager 'tt_name' Remote SQL Injection Vulnerability
5066| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
5067| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
5068| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
5069| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
5070| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
5071| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
5072| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
5073| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
5074| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
5075| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
5076| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
5077| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
5078| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
5079| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
5080| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
5081| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
5082| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
5083| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
5084| [901173] Windows Backup Manager Remote Code Execution Vulnerability (2478935)
5085| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
5086| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
5087| [901165] Windows Common Control Library Remote Code Execution Vulnerability (2296011)
5088| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
5089| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
5090| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
5091| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
5092| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
5093| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
5094| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
5095| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5096| [901057] UseBB BBcode Parsing Remote Denial Of Service Vulnerability
5097| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
5098| [901040] MS ATL ActiveX Controls for MS Office Could Allow Remote Code Execution (973965)
5099| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
5100| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
5101| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
5102| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
5103| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
5104| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
5105| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5106| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
5107| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
5108| [900825] Google Chrome 'tooltip_manager.cc' Denial Of Service Vulnerability
5109| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
5110| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
5111| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
5112| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
5113| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
5114| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
5115| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
5116| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
5117| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
5118| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
5119| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
5120| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
5121| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
5122| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
5123| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
5124| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
5125| [900298] MS Windows Remote Access Service NDISTAPI Driver Privilege Elevation Vulnerability (2566454)
5126| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
5127| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
5128| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
5129| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
5130| [900291] HP Data Protector Manager RDS Service Denial of Service Vulnerability
5131| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
5132| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
5133| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
5134| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
5135| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
5136| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
5137| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
5138| [900274] SpoonFTP 'RETR' Command Remote Denial of Service Vulnerability
5139| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
5140| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
5141| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
5142| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
5143| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
5144| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
5145| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
5146| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
5147| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
5148| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
5149| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
5150| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
5151| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
5152| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
5153| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
5154| [900211] HP OpenView Network Node Manager Denial of Service Vulnerabilities
5155| [900132] NuMedia Soft DVD Burning SDK Activex Control Remote Code Execution Vulnerability
5156| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
5157| [900127] Personal FTP Server RETR Command Remote Denial of Service Vulnerability
5158| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
5159| [900115] Anzio Web Print Object ActiveX Control Remote BOF Vulnerability
5160| [900113] RhinoSoft Serv-U SFTP Remote Denial of Service Vulnerability
5161| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
5162| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
5163| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
5164| [900092] Windows HTTP Services Could Allow Remote Code Execution Vulnerabilities (960803)
5165| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
5166| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
5167| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
5168| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
5169| [900056] Vulnerability in Server Service Could Allow Remote Code Execution (958644)
5170| [900055] Server Service Could Allow Remote Code Execution Vulnerability (958644)
5171| [900052] Windows Internet Printing Service Allow Remote Code Execution Vulnerability (953155)
5172| [900049] Host Integration Server RPC Service Remote Code Execution Vulnerability (956695)
5173| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
5174| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
5175| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
5176| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
5177| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
5178| [900026] McAfee Encrypted USB Manager Remote Security Bypass Vulnerability
5179| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
5180| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
5181| [841208] Ubuntu Update for remote-login-service USN-1624-1
5182| [803091] OpenBSD Portmap Remote Denial of Service Vulnerability
5183| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
5184| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
5185| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
5186| [802876] Trend Micro Control Manager 'CmdProcessor.exe' Buffer Overflow Vulnerability
5187| [802627] LAN Messenger Malformed Initiation Request Remote Denial of Service Vulnerability
5188| [802617] NetDecision HTTP Server Long HTTP Request Remote Denial of Service Vulnerability
5189| [802614] Tiny HTTP Server Remote Denial of Service Vulnerability
5190| [802613] Core FTP Server 'Type' Command Remote Denial of Service Vulnerability
5191| [802605] TYPSoft FTP Server Multiple Commands Remote Denial of Service Vulnerabilities
5192| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
5193| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
5194| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
5195| [802295] Linux Kernel IGMP Remote Denial of Service Vulnerability
5196| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
5197| [802236] Finger Service Remote Information Disclosure Vulnerability
5198| [802231] Finger Redirection Remote Denial of Service Vulnerability
5199| [802221] Citrix Provisioning Services 'streamprocess.exe' Component Remote Code Execution Vulnerability
5200| [802163] Calendar Manager Service rpc.cmsd Service Detection
5201| [802043] Novell NetIQ Privileged User Manager Remote Code Execution Vulnerability
5202| [802011] Avaya IP Office Manager TFTP Denial of Service Vulnerability
5203| [802002] SolarFTP PASV Command Remote Denial of Service Vulnerability
5204| [802001] SolarFTP USER Command Remote Denial of Service Vulnerability
5205| [801968] Adobe Flash Media Server Remote Denial of Service Vulnerability (August-2011)
5206| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
5207| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
5208| [801892] Adobe Flash Media Server XML Data Remote Denial of Service Vulnerability
5209| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
5210| [801810] NetSupport Manager Remote Buffer Overflow Vulnerability
5211| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
5212| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
5213| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
5214| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
5215| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
5216| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
5217| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
5218| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
5219| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
5220| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
5221| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
5222| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
5223| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
5224| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
5225| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
5226| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
5227| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
5228| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
5229| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
5230| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
5231| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
5232| [801225] Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities
5233| [801026] AOL SuperBuddy ActiveX Control Remote Code Execution Vulnerability
5234| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
5235| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
5236| [800836] DM FileManager 'album.php' Remote File Inclusion Vulnerability
5237| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
5238| [800744] Apple Safari Nested 'object' Tag Remote Denial Of Service vulnerability
5239| [800694] ICQ Toolbar 'toolbaru.dll' ActiveX Control Remote DOS Vulnerability
5240| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
5241| [800626] ModSecurity Multiple Remote Denial of Service Vulnerabilities
5242| [800504] Microsoft Windows XP SP3 denial of service vulnerability
5243| [800486] Apple Safari 'SRC' Remote Denial Of Service Vulnerability
5244| [800485] Apple Safari 'background' Remote Denial Of Service Vulnerability
5245| [800463] Asterisk T.38 Negotiation Remote Denial Of Service Vulnerability
5246| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
5247| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
5248| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
5249| [800306] MyServer Remote Denial of Service Vulnerability
5250| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
5251| [800079] ClamAV Remote Denial of Service Vulnerability
5252| [103436] Collaborative Passwords Manager (cPassMan) Remote Command Execution
5253| [103383] PowerDNS Authoritative Server Remote Denial of Service Vulnerability
5254| [103364] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
5255| [103209] Ingate SIParator SIP Module Remote Denial of Service Vulnerability
5256| [103208] Ingate Firewall SIP Module Remote Denial of Service Vulnerability
5257| [103192] Adobe Flash Media Server Memory Corruption Remote Denial of Service Vulnerability
5258| [103170] Unbound DNS Resolver Remote Denial of Service Vulnerability
5259| [103159] LDAP Account Manager 'selfserviceSaveOk' Parameter Cross Site Scripting Vulnerability
5260| [103101] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
5261| [103091] VicFTPS 'LIST' Command Remote Denial of Service Vulnerability
5262| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
5263| [103072] XM Easy Personal FTP Server 'TYPE' Command Remote Denial of Service Vulnerability
5264| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
5265| [103026] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
5266| [103004] Mongoose 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
5267| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
5268| [100949] HttpBlitz Server HTTP Request Remote Denial of Service Vulnerability
5269| [100925] Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
5270| [100918] NCH Software Office Intercom SIP Invite Remote Denial of Service Vulnerability
5271| [100798] MailEnable 'MESMTRPC.exe' SMTP Service Multiple Remote Denial of Service Vulnerabilities
5272| [100759] SquirrelMail Remote Denial of Service Vulnerability
5273| [100725] Apache HTTP Server Multiple Remote Denial of Service Vulnerabilities
5274| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
5275| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
5276| [100661] osCommerce Online Merchant 'file_manager.php' Remote Arbitrary File Upload Vulnerability
5277| [100644] Samba Multiple Remote Denial of Service Vulnerabilities
5278| [100642] SmallFTPD 'DELE' Command Remote Denial Of Service Vulnerability
5279| [100641] TYPSoft FTP Server 'RETR' Command Remote Denial Of Service Vulnerability
5280| [100633] Xitami '/AUX' Request Remote Denial Of Service Vulnerability
5281| [100626] ddrLPD Remote Denial of Service Vulnerability
5282| [100622] RealVNC 4.1.3 'ClientCutText' Message Remote Denial of Service Vulnerability
5283| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
5284| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
5285| [100588] OpenSSL 'dtls1_retrieve_buffered_fragment()' Remote Denial of Service Vulnerability
5286| [100587] OpenSSL 'ssl3_get_record()' Remote Denial of Service Vulnerability
5287| [100554] JINAIS IRC Message Remote Denial Of Service Vulnerability
5288| [100548] Remote Help HTTP GET Request Format String Denial Of Service Vulnerability
5289| [100534] httpdx Multiple Remote Denial Of Service Vulnerabilities
5290| [100531] Unbound 'sock_list' Structure Allocation Remote Denial Of Service Vulnerability
5291| [100529] PHP xmlrpc Extension Multiple Remote Denial of Service Vulnerabilities
5292| [100525] httpdx PNG File Handling Remote Denial of Service Vulnerability
5293| [100499] Samba 'client/mount.cifs.c' Remote Denial of Service Vulnerability
5294| [100494] Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability
5295| [100487] ejabberd 'client2server' Message Remote Denial of Service Vulnerability
5296| [100480] lighttpd Slow Request Handling Remote Denial Of Service Vulnerability
5297| [100457] HP Power Manager Multiple Remote Code Execution Vulnerabilities
5298| [100412] Squid Header-Only Packets Remote Denial of Service Vulnerability
5299| [100399] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
5300| [100369] CUPS File Descriptors Handling Remote Denial Of Service Vulnerability
5301| [100366] Asterisk RTP Comfort Noise Processing Remote Denial of Service Vulnerability
5302| [100351] Home FTP Server 'SITE INDEX' Command Remote Denial of Service Vulnerability
5303| [100346] HP Power Manager Management Web Server Login Remote Code Execution Vulnerability
5304| [100342] XM Easy Personal FTP Server 'NLST' Command Remote Denial of Service Vulnerability
5305| [100338] Serv-U 'SITE SET TRANSFERPROGRESS ON' Command Remote Denial of Service Vulnerability
5306| [100320] Bftpd Unspecified Remote Denial of Service Vulnerability
5307| [100318] Cherokee Web Server Malformed Packet Remote Denial of Service Vulnerability
5308| [100305] Dopewars Server 'REQUESTJET' Message Remote Denial of Service Vulnerability
5309| [100298] Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of Service Vulnerability
5310| [100296] Xlpd Remote Denial of Service Vulnerability
5311| [100293] DataWizard FtpXQ Remote Denial of Service Vulnerability
5312| [100284] Cerberus FTP Server Long Command Remote Denial of Service Vulnerability
5313| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
5314| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
5315| [100249] Squid Multiple Remote Denial of Service Vulnerabilities
5316| [100207] Eggdrop 'ctcpbuf' Remote Denial Of Service Vulnerability
5317| [100198] TYPSoft FTP Server 'ABORT' Command Remote Denial of Service Vulnerability
5318| [100185] Quick 'n Easy Mail Server SMTP Request Remote Denial Of Service Vulnerability
5319| [100167] Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability
5320| [100163] Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
5321| [100162] Mod_Perl Path_Info Remote Denial Of Service Vulnerability
5322| [100089] Acute Control Panel SQL Injection Vulnerability and Remote File Include Vulnerability
5323| [100062] Microsoft Remote Desktop Protocol Detection
5324| [20388] Juniper NetScreen-Security Manager Remote DoS flaw
5325| [15852] MailEnable IMAP Service Remote Buffer Overflows
5326| [15463] Squid remote denial of service
5327| [13752] Denial of Service (DoS) in Microsoft SMS Client
5328| [11968] DameWare Mini Remote Control Information Disclosure
5329| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
5330| [10891] X Display Manager Control Protocol (XDMCP)
5331| [10733] InterScan VirusWall Remote Configuration Vulnerability
5332| [10102] HotSync Manager Denial of Service attack
5333|
5334| SecurityTracker - https://www.securitytracker.com:
5335| [1028342] EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control
5336| [1028317] System Security Services Daemon (SSSD) Access Control Flaw Lets Remote Users Bypass Access Controls in Certain Configurations
5337| [1028027] Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code
5338| [1027998] Oracle Enterprise Manager Grid Control Multiple Bugs Let Remote Users Partially Access and Modify Data and Cause Partial Denial of Service Conditions
5339| [1026747] Cisco Wireless LAN Controller Bugs Let Remote Users View/Modify the Configuration and Cause Denial of Service Conditions
5340| [1025800] Oracle Enterprise Manager Grid Control Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
5341| [1024561] Oracle Enterprise Manager Grid Control EM Console Flaw Lets Remote Users Partially Obtain and Modify Data and Cause Partial Denial of Service Conditions
5342| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
5343| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
5344| [1018571] Motive Service Activation Manager Buffer Overflow in 'ActiveUtils.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
5345| [1017908] Cisco Wireless LAN Controller Lets Remote Users Modify the Configuration and Deny Service
5346| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
5347| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
5348| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
5349| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
5350| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
5351| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
5352| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
5353| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
5354| [1003832] X Display Manager Control Protocol (XDMCP) Default Configuration Lets Remote Users Determine Valid User Names on the System and Gain Access to a Remote Console Login Screen
5355| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
5356| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
5357| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
5358| [1028859] Cisco Firewall Services Module OSPF Processing Flaw Lets Remote Users Take Full Control of the Routing Table
5359| [1028606] Cisco NX-OS Nexus 1000v Bugs Let Remote Users Gain Control, Deny Service, and Bypass Security
5360| [1028567] Cisco Unified Communications Manager Authentication Request Processing Lets Remote Users Deny Service
5361| [1028517] Cisco Wireless LAN Controller Telnet Session Management Flaw Lets Remote Users Deny Service
5362| [1028419] Cisco Prime Network Control System Default Credentials Let Remote Users Modify the Configuration
5363| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
5364| [1028392] Cisco Tivoli Business Service Manager Bug Lets Remote Users Deny Service
5365| [1028232] Cisco Wireless LAN Controller mDNS Buffer Handling Flaw Lets Remote Users Deny Service
5366| [1028218] Cisco Unified Communications Manager Resource Exhaustion Flaws Let Remote Users Deny Service
5367| [1028089] Intel 82574L Ethernet Controller Packet Processing Flaw Lets Remote Users Deny Service
5368| [1028076] Red Hat Enterprise Virtualization Manager Lets Local Users Obtain Passwords and Remote Authenticated Users Deny Service
5369| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
5370| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
5371| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
5372| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
5373| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
5374| [1027719] HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System
5375| [1027712] Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands
5376| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
5377| [1027584] Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands
5378| [1027574] Cisco Unified Communications Manager SIP Processing Flaw Lets Remote Users Deny Service
5379| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
5380| [1027397] HP Service Manager Unspecified Flaw Lets Remote Users Deny Service
5381| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5382| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5383| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5384| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5385| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5386| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5387| [1027343] Novell Remote Manager Off-by-one Error in 'httpstkd' Lets Remote Users Deny Service
5388| [1027241] Cisco TelePresence Manager and Multipoint Switch Bugs Lets Remote Users Deny Service and Remote Users on the Adjacent Network Execute Arbitrary Code
5389| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
5390| [1027075] HP Business Service Management Default JBOSS Configuration Lets Remote Users Execute Arbitrary Code
5391| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
5392| [1027005] Cisco IOS Multiple Bugs Let Remote Users Bypass Security Controls, Obtain Potentially Sensitive Information, and Deny Service
5393| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
5394| [1026929] Oracle Database Bugs Let Remote Authenticated Users Gain Full Control and Let Remote Users Partial Access and Modify Data and Deny Service
5395| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5396| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5397| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5398| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5399| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5400| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
5401| [1026894] Novell iManager JClient Buffer Overflow Lets Remote Authenticated Users Deny Service
5402| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
5403| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
5404| [1026778] VMware vCenter Chargeback Manager Lets Remote Users Deny Service and Download Files
5405| [1026749] Cisco Unified Communications Manager Lets Remote Users Deny Service and Inject SQL Commands
5406| [1026709] SAP NetWeaver Stack Overflow in SAPHostControl Service Lets Remote Users Execute Arbitrary Code
5407| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
5408| [1026452] SafeNet Sentinel HASP Admin Control Center Input Validation Flaw Lets Remote Users Modify the Configuration File
5409| [1026390] Trend Micro Control Manager Buffer Overflow in 'CmdProcessor.exe' Lets Remote Users Execute Arbitrary Code
5410| [1026367] HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code
5411| [1026354] Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code
5412| [1026286] IBM Rational Asset Manager Access Control Error Lets Remote Authenticated Users
5413| [1026211] Solaris Lets Remote Users Gain Full Control and Local Users Access and Modify Data and Deny Service
5414| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
5415| [1026142] Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information
5416| [1026110] Cisco Unified Communications Manager SIP Processing Memory Leak Lets Remote Users Interrupt Voice Services
5417| [1026092] Sunway ForceControl Multiple Flaws Let Remote Users View Files, Deny Service, and Execute Arbitrary Code
5418| [1025970] Cisco Unified Communications Manager Flaws Let Remote Users Deny Service
5419| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
5420| [1025915] HP ProLiant SL Advanced Power Manager Lets Remote Users Deny Service
5421| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
5422| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
5423| [1025795] Oracle Database Bugs Let Remote Users Cause Partial Denial of Service Conditions and Remote Authenticated Users Gain Full Control of the System
5424| [1025774] Trend Micro Control Manager 'proxy_request.php' Input Validation Flaw Lets Remote Users Traverse the Directory
5425| [1025759] Trend Micro Control Manager 'CasLogDirectInsertHandler.cs' Lets Remote Users Create Accounts and Execute Arbitrary Code
5426| [1025671] Siemens SIMATIC S7-1200 Controller Bugs Let Remote Users Conduct Replay and Denial of Service Attacks
5427| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
5428| [1025611] HP Service Manager Multiple Bugs Let Remote Authenticated Users Gain Access and Inject Scripting Code, Remote Users Conduct Cross-Site Scripting Attacks, Hijack Sessions, and Obtain Information
5429| [1025553] Intel 10 Gigabit Ethernet Controllers Let Remote Users Deny Service
5430| [1025540] IBM Informix Storage Manager 'librpc.dll' Spoofing Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
5431| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
5432| [1025485] ZyWALL USG Appliances Access Control Flaw Lets Remote Users Read/Write Configuration Files
5433| [1025449] Cisco Unified Communications Manager Multiple Bugs Let Remote Users Deny Service, Inject SQL Commands, and Upload Arbitrary Files
5434| [1025448] Cisco Wireless LAN Controller ICMP Processing Flaw Lets Remote Users Deny Service
5435| [1025411] Sun Java System Access Manager Policy Agent Bug Let Remote Users Partially Deny Service
5436| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
5437| [1025262] libvirt API Access Control Flaw Lets Remote Users Deny Service and Potentially Gain Elevated Privileges
5438| [1025114] Cisco TelePresence Recording Server Bugs Let Remote Users Deny Service and Take Full Control of the Target Device
5439| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
5440| [1024975] Solaris Multiple Flaws Let Remote Users Gain Full Control and Local Users Partially Access and Modify Data and Deny Service
5441| [1024963] Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls
5442| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
5443| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
5444| [1024817] BIND Bugs Let Remote Users Bypass Access Controls and Deny Service
5445| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
5446| [1024621] HP Systems Insight Manager Flaws Let Remote Users Modify Data, Deny Service, or Execute Arbitrary Code on the Target System
5447| [1024569] Oracle WebLogic Node Manager Remote Configuration Capability Lets Remote Users Execute Arbitrary Commands
5448| [1024564] Solaris Multiple Flaws Let Remote and Local Users Gain Full Control or Deny Service
5449| [1024538] HP Data Protector Manager Null Pointer Dereference Lets Remote Users Deny Service
5450| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
5451| [1024493] IBM Tivoli Storage Manager Fastback Lets Remote Users Deny Service and Execute Arbitrary Code
5452| [1024480] HP OpenView Network Node Manager Unspecified Bug Lets Remote Users Deny Service
5453| [1024470] Cisco Unified Communications Manager SIP Processing Flaws Let Remote Users Interrupt Voice Services
5454| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
5455| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
5456| [1024408] Cisco Wireless LAN Controller Flaws Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Bypass ACLs and Deny Service
5457| [1024363] Cisco Unified Communications Manager SIP Processing Flaws Let Remote Users Interrupt Voice Services
5458| [1024347] Red Hat Virtual Desktop Server Manager (VDSM) SSL Connection Handling Flaw Lets Remote Users Deny Service
5459| [1024322] Cisco Application Control Engine RTSP/SIP/SSL Inspection Flaws Let Remote Users Deny Service
5460| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
5461| [1024239] RSA Federated Identity Manager URL Redirection Flaw Lets Remote Users Bypass Security Controls
5462| [1024199] Solaris Multiple Flaws Let Remote Users Gain Full Control and Let Local Users Deny Service and Gain Elevated Privileges
5463| [1024198] Oracle Enterprise Manager Grid Control Console Flaw Lets Remote Users Modify Data
5464| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
5465| [1024152] Novell iManager Bugs Let Remote Users Deny Service and Remote Authenticated Users Execute Arbitrary Code
5466| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
5467| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
5468| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
5469| [1024050] Novell ZENworks Buffer Overflow in Configuration Management Preboot Service Lets Remote Users Execute Arbitrary Code
5470| [1023908] Adobe Download Manager Buffer Overflow in 'gp.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
5471| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
5472| [1023671] Cisco Digital Media Manager Lets Remote Users Access the System and Remote Authenticated Users Modify the Configuration and View Passwords
5473| [1023670] Cisco Unified Communications Manager SIP/SCCP/CTI Processing Bugs Let Remote Users Deny Service
5474| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
5475| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
5476| [1023508] NetSupport Manager Flaw in Gateway Component Lets Remote Users Deny Service
5477| [1023420] Linux Kernel Input Validation Flaw in Intel PRO/1000 Linux Drivers Lets Remote Users Deny Service and Potentially Bypass Security Controls
5478| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
5479| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
5480| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
5481| [1023191] HP OpenView Network Node Manager Bugs in Database Service Let Remote Users Execute Arbitrary Code
5482| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
5483| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
5484| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
5485| [1022931] Cisco Unified Communications Manager SIP Processing Bug Lets Remote Users Deny Service
5486| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
5487| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
5488| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
5489| [1022779] Symantec Altiris Deployment Solution Multiple Flaws Let Remote Users Modify the Configuration, Execute Arbitrary Commands, and Deny Service
5490| [1022775] Cisco Unified Communications Manager SIP and SCCP Processing Bugs Let Remote Users Deny Service
5491| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
5492| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
5493| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
5494| [1022605] Cisco Wireless LAN Controller SSH and Web Interface Bugs Let Remote Users Deny Service
5495| [1022600] Cisco Wireless LAN Controller Basic Authentication Processing Bug Lets Remote Users Deny Service
5496| [1022598] Sun Java System Access Manager Policy Agent Bug Lets Remote Users Deny Service to the Web Proxy Server
5497| [1022597] IBM Tivoli Identity Manager Console and Self Service Interface Session Fixation Bug Lets Remote Users Hijack Sessions
5498| [1022584] Novell Privileged User Manager 'unifid.exe' Service Bug Lets Remote Users Execute Arbitrary Code
5499| [1022560] Oracle Database Bugs Let Remote Authenticated Users Take Fully Control of the Database or System and Remote Users Cause Denial of Service Conditions
5500| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
5501| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
5502| [1022413] McAfee ePolicy Orchestrator 'naPolicyManager.dll' ActiveX Control Lets Remote Overwrite Files
5503| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
5504| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
5505| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
5506| [1021895] Cisco IOS Easy VPN Server Cisco Tunneling Control Protocol Bug Lets Remote Users Deny Service
5507| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
5508| [1021787] Cisco 7600 Series Router Session Border Controller Bug Lets Remote Users Deny Service
5509| [1021769] Cisco Application Control Engine SNMP Processing Flaw Lets Remote Authenticated Users Deny Service
5510| [1021768] Cisco Application Control Engine SSH Processing Flaw Lets Remote Users Deny Service
5511| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
5512| [1021679] Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service
5513| [1021620] Cisco Unified Communications Manager Input Validation Flaw in Certificate Authority Proxy Function Lets Remote Users Deny Service
5514| [1021592] Cisco ONS TCP Processing Flaw in Control Cards Lets Remote Users Deny Service
5515| [1021530] Cisco Application Control Engine Global Site Selector DNS Bug Lets Remote Users Deny Service
5516| [1021394] IBM Tivoli Provisioning Manager LDAP Access Control Bug Lets Remote Users Execute SOAP Commands
5517| [1021378] Asterisk Realtime Configuration API Bug Lets Remote Users Deny Service
5518| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
5519| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
5520| [1021362] Aruba Mobility Controller EAP Frame Processing Flaw Lets Remote Users Deny Service
5521| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
5522| [1021263] EMC ControlCenter SAN Manager SST_SENDFILE Request Validation Flaw Lets Remote Users View Arbitrary Files
5523| [1021262] EMC ControlCenter SAN Manager Buffer Overflow in Processing SST_CTGTRANS Requests Lets Remote Users Execute Arbitrary Code
5524| [1021171] HP Service Manager Bug Lets Remote Authenticated Users Gain Elevated Privileges
5525| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
5526| [1021092] HP OpenView Reporter, Network Node Manager, and Performance Agent Trace Service Memory Error Lets Remote Users Deny Service
5527| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
5528| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
5529| [1021014] HP OpenView Network Node Manager Unspecified Bugs Let Remote Users Deny Service
5530| [1020942] Cisco Unified Communications Manager SIP Processing Bugs Let Remote Users Deny Service
5531| [1020929] Cisco IOS Firewall Bug in HTTP Application Inspection Control Lets Remote Users Deny Service
5532| [1020814] Cisco Secure Access Control Server Bug in Processing RADIUS EAP Packets Lets Remote Users Deny Service
5533| [1020795] HP OpenView Network Node Manager Unspecified Bugs Let Remote Users Deny Service
5534| [1020733] Windows Media Services ActiveX Control Buffer Overflow in CallHTMLHelp() Function Lets Remote Users Execute Arbitrary Code
5535| [1020641] Webex Meeting Manager Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
5536| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
5537| [1020360] Cisco Unified Communications Manager CTI Manager Service Lets Remote Users Deny Service
5538| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
5539| [1020194] Akamai Download Manager ActiveX Control Lets Remote Users Execute Arbitrary Code
5540| [1020165] HP Instant Support ActiveX Controls in 'HPISDataManager.dll' Let Remote Users Execute Arbitrary Code
5541| [1020074] Cisco Service Control Engine SSH Server Bugs Let Remote Users Deny Service
5542| [1020022] Cisco Unified Communications Manager Bugs in CTL CAPF, SIP, and SNMP Services Let Remote Users Deny Service
5543| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
5544| [1019839] HP OpenView Network Node Manager ovalarmsrv and ovtopmd Bugs Let Remote Users Deny Service
5545| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
5546| [1019630] Asterisk Format String Bug in Logger and Manager Lets Remote Users Deny Service
5547| [1019458] VERITAS Storage Foundation Volume Manager Scheduler Service Lets Remote Users Deny Service
5548| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
5549| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
5550| [1019306] HP OpenView Network Node Manager 'ovtopmd' Bug Lets Remote Users Deny Service
5551| [1019249] IBM Tivoli Provisioning Manager for OS Deployment Buffer Overflow Lets Remote Users Deny Service and Potentially Execute Arbitrary Code
5552| [1019239] Crystal Reports Buffer Overflow in 'EnterpriseControls.dll' ActiveX Control Lets Remote Users Deny Service
5553| [1019223] Cisco Unified Communications Manager Buffer Overflow in Certificate Trust List Provider Service Lets Remote Users Execute Arbitrary Code
5554| [1019118] Sun Ray Device Manager Daemon Lets Remote Users Create/Delete Directories and Deny Service
5555| [1019048] Sun SPARC Enterprise Server XSCF Control Package Bugs Let Remote Users Deny Service
5556| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
5557| [1018881] Macrovision InstallShield Unsafe Method in Update Service ActiveX Control Lets Remote Users Execute Arbitrary Code
5558| [1018858] HP OpenView Configuration Management (CM) Infrastructure (Radia) and Client Configuration Manager Lets Remote Users Access Data
5559| [1018828] Cisco Unified Communications Manager SIP INVITE Processing Lets Remote Users Deny Service and TFTP Buffer Overflow Lets Remote Users Execute Arbitrary Code
5560| [1018774] NetSupport Manager Client Buffer Overflow Lets Remote Users Deny Service
5561| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
5562| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
5563| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
5564| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
5565| [1018538] Cisco Unified Communications Manager SIP Processing Flaw Lets Remote Users Deny Service or Execute Arbitrary Code
5566| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
5567| [1018510] Tor ControlPort Authentication Bug Lets Remote Users Modify the 'torrc' Configuration File
5568| [1018444] Cisco Wireless LAN Controller ARP Processing Lets Remote Users Deny Service
5569| [1018402] CA Threat Manager Stack Overflows in Alert Notification Service Let Remote Users Execute Arbitrary Code
5570| [1018401] IBM Tivoli Provisioning Manager Divide By Zero Error in TFTP Service Lets Remote Users Deny Service
5571| [1018368] Cisco Unified Communications Manager Lets Remote Users Deny Service and Obtain Sensitive Information
5572| [1018336] SAP Internet Communication Manager Lets Remote Users Deny Service
5573| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
5574| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
5575| [1018149] F-Secure Policy Manager fsmsh.dll Lets Remote Users Deny Service With NTFS Reserved Words
5576| [1018120] Symantec Enterprise Security Manager Race Condition Lets Remote Users Cause the Service to Hang
5577| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
5578| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
5579| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
5580| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
5581| [1017955] Asterisk Manager Interface NULL Pointer Dereference Lets Remote Users Deny Service
5582| [1017925] Akamai Download Manager ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
5583| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
5584| [1017826] Cisco Unified CallManager SCCP, SCCPS, ICMP, and IPSec Processing Bugs Let Remote Users Deny Service
5585| [1017817] HP OpenView Network Node Manager Lets Remote Users Gain Access to Certain Services
5586| [1017722] Novell Access Manager SSL VPN 'policy.txt' File Can By Modified By Remote Authenticated Users to Bypass VPN Network Access Controls
5587| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
5588| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
5589| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
5590| [1017450] ELOG Configuration File Parsing NULL Pointer Dereference Lets Remote Users Deny Service
5591| [1017447] Hosting Controller 'FolderManager.aspx' Lets Remote Authenticated Users View and Modify Files
5592| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
5593| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
5594| [1017213] Novell BorderManager Predictable ISAKMP Cookies May Let Remote Users Conduct Denial of Service and Replay Attacks
5595| [1017197] HP OpenView Client Configuration Manager Lets Remote Users Reboot the System or Execute Arbitrary Code
5596| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
5597| [1017139] Novell iManager TREE Parameter NULL Pointer Dereference Lets Remote Users Deny Service
5598| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
5599| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
5600| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
5601| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
5602| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
5603| [1016728] Symantec Enterprise Security Manager Race Condition Lets Remote Users Deny Service
5604| [1016445] eBay Picture Manager Buffer Overflow in EPUImageControl Object Lets Remote Users Execute Arbitrary Code
5605| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
5606| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
5607| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
5608| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
5609| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
5610| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
5611| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
5612| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
5613| [1015648] Xerox WorkCentre Multiple Bugs in ESS/Network Controller and MicroServer Web Server Permit Remote Access, Denial of Service, and Cross-Site Scripting Attacks
5614| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
5615| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
5616| [1015503] Cisco CallManager TCP Connection Management Handling Lets Remote Users Deny Service
5617| [1015417] Juniper NetScreen-Security Manager 'guiSrv' and 'devSrv' Bugs Let Remote Users Deny Service
5618| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
5619| [1015375] Cisco Clean Access Lack of Authentication in Secure Smart Manager Lets Remote Users Deny Service
5620| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
5621| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
5622| [1014997] Hitachi JP1/Cm2/Network Node Manager Unspecified Bugs Let Remote Users Deny Service or Execute Arbitrary Commands
5623| [1014987] NateOn Messenger Buffer Overflow in 'NateonDownloadManager.ocx' Lets Remote Users Upload Files and Also Deny Service
5624| [1014894] Linksys WRT54G Router Administration Interface Bugs Let Remote Users Modify the Configuration, Execute Arbitrary Code, or Deny Service
5625| [1014888] COOL! Remote Control Lets Remote Users Crash the Service or Disconnect Connections
5626| [1014773] BrightStor SAN Manager Buffer Overflow and Other Bugs in Message Queueing Software Let Remote Users Execute Arbitrary Code or Deny Service
5627| [1014769] Unicenter Enterprise Job Manager Buffer Overflow and Other Bugs in Message Queueing Software Lets Remote Users Execute Arbitrary Code or Deny Service
5628| [1014765] Unicenter Remote Control Buffer Overflow and Other Bugs in Message Queueing Software Lets Remote Users Execute Arbitrary Code or Deny Service
5629| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
5630| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
5631| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
5632| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
5633| [1014455] Cisco CallManager Memory Management Bugs Let Remote Users Deny Service and Execute Arbitrary Code
5634| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
5635| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
5636| [1013857] HP OpenView Network Node Manager Unspecified Flaws Let Remote Users Execute Arbitrary Code or Deny Service
5637| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
5638| [1013651] HP OpenView Network Node Manager Has Unspecified Flaw That Lets Remote Users Deny Service
5639| [1013457] Citrix MetaFrame Conferencing Manager May Let Remote Users Gain Keyboard and Mouse Control
5640| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
5641| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
5642| [1012867] IlohaMail Unsafe Configuration File Access Controls May Let Remote Users Access the Files
5643| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
5644| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
5645| [1011949] Samba pppd Callback Control Protocol Pointer Dereference May Let Remote Users Deny Service
5646| [1011896] pGina Default Configuration May Let Remote Desktop Users Deny Service
5647| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
5648| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
5649| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
5650| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
5651| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
5652| [1011389] Symantec Enterprise Firewall Lets Remote Users Deny Service or Modify the Configuration
5653| [1011374] Windows XP Service Pack 2 Firewall Configuration Error Exposes File and Print Sharing to Remote Users
5654| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
5655| [1011065] Cisco Secure Access Control Server Lets Remote Users Access the Administrative Interface or Deny Service
5656| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
5657| [1010378] IBM Tivoli Configuration Manager Cookie Authentication Weakness May Let Remote Users Hijack Sessions
5658| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
5659| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
5660| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
5661| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
5662| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
5663| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
5664| [1009167] Oracle Application Server Default Configuration Lets Remote Users Access Sensitive Services
5665| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
5666| [1008817] Cisco Internet Service Node Default Configuration on IBM Servers Grants Administrative Access to Remote Users
5667| [1008811] Cisco CallManager Default Configuration on IBM Servers Grants Administrative Access to Remote Users
5668| [1008688] Cisco CallManager H.323 Processing Flaws Let Remote Users Deny Service
5669| [1008687] Nortel Business Communications Manager H.323 Flaws Let Remote Users Deny Service
5670| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
5671| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
5672| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
5673| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
5674| [1007992] Nokia IPSO Appliances in a Cluster Configuration May Let Remote Users Deny Service
5675| [1007972] HP Servicecontrol Manager May Yield Access to Local Users
5676| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
5677| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
5678| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
5679| [1007887] JBoss Java Server 'hsqldb' Service Default Configuration Lets Remote Users Execute Arbitrary Code
5680| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
5681| [1007712] Nokia Electronic Documentation Default Configuration Permits Remote HTTP Proxy Services
5682| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
5683| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
5684| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
5685| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
5686| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
5687| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
5688| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
5689| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
5690| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
5691| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
5692| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
5693| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
5694| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
5695| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
5696| [1006607] Windows XP Service Control Manager Timing Flaw in Service Shutdown May Disclose Sensitive Information to Local Users
5697| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
5698| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
5699| [1006453] Compaq Insight Manager Discloses File Existence to Remote Users and May Allow Denial of Service Attacks
5700| [1006261] NetScreen Denial of Service Bug May Let Remote Users Cause the Device Configuration to Erase
5701| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
5702| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
5703| [1005792] Multi-Tech ProxyServer Default Configuration Gives Remote Users Control of the System
5704| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
5705| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
5706| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
5707| [1005402] SurfControl SuperScout E-mail Filter Bugs Allow Remote Denial of Service and Cross-Site Scripting Attacks and Discloses Passwords to Remote Authenticated Users
5708| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
5709| [1005269] Compaq Web-based Enterprise Services (WEBES) Access Control Bug May Let Remote Users Access Privileged Files
5710| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
5711| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
5712| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
5713| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
5714| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
5715| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
5716| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
5717| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
5718| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
5719| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
5720| [1004796] MERCUR Mailserver Buffer Overflow in Authenticating Access to the Control-Service Lets Remote Users Execute Arbitrary Code with the Privileges of the Mail Server
5721| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
5722| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
5723| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
5724| [1004591] Cisco ONS Optical Transport Platform Timing Control Card Can Be Continually Reset By Remote Users, Causing Denial of Service
5725| [1004585] BlackICE Agent Default Configuration Lets Remote Users Consume a Large Amount of Memory on the Target Host, Causing Temporary Denial of Service Conditions
5726| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
5727| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
5728| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
5729| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
5730| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
5731| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
5732| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
5733| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
5734| [1004326] Xerox DocuTech Publishing System Has Insecure Default Configuration for the System Controllers, Letting Remote Users Take Full Control of the System
5735| [1004319] Hosting Controller Software for Web Hosting Companies Has Input Validation Errors in 'dsnmanager.asp' and 'imp_rootdir.asp' Scripts That Allow Remote Users to View Files on the System and Upload and Copy Files With Administrator Privileges
5736| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
5737| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
5738| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
5739| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
5740| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
5741| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
5742| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
5743| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
5744| [1003881] Gravity Software's Service Pack Manager 2000 Default Directory Permissions Let Local Users Modify Operating System Files and Gain Full Control of the System.
5745| [1003864] Internet Security Systems RealSecure Intrusion Detection System for Nokia Appliances Inadvertently Includes a Built-in KeyManager Account That Could Allow a Remote User to Control the System
5746| [1003862] Caldera/SCO Calendar Manager Service (rpc.cmsd) Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With Root Privileges
5747| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
5748| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
5749| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
5750| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
5751| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
5752| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
5753| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
5754| [1003467] Cisco Secure Access Control Server (ACS) Lets Remote Users With Novell Directory Service (NDS) 'Expired' or 'Disabled' Account Status Gain Access to Cisco Resources Managed By ACS
5755| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
5756| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
5757| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
5758| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
5759| [1002995] Novell GroupWise Common Default Password May Let Remote Users Access the Servlet Manager and Modify the Configuration
5760| [1002949] Default Configuration of Axis Network Camera Lets Remote Users Obtain Administrative Control of the Camera
5761| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
5762| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
5763| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
5764| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
5765| [1002670] Lotus Domino Access Control List Configuration Error May Allow Remote Users to View Documents that an Administrator Believes are Protected
5766| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
5767| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
5768| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
5769| [1002157] Avaya's Alchemy ArgentOffice Phone System Lets Remote Users Deny Service to the System or Gain Administrative Control of the System
5770| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
5771| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
5772| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
5773| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
5774| [1002077] Cisco LocalDirector Load Balancer May Allow Remote Users to Deny Service in Certain Configurations
5775| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
5776| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
5777| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
5778| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
5779| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
5780| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
5781| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
5782| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
5783| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
5784| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
5785| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
5786| [1001393] Novell BorderManager VPN Services Can Be Crashed Remotely
5787| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
5788| [1001188] O'Reilly WebSite Pro's Remote Manager Service Can Be Crashed Via the Network
5789| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
5790|
5791| OSVDB - http://www.osvdb.org:
5792| [95616] SAP NetWeaver SAP Host Control Service GetComputerSystem Method Crafted SOAP Request Handling Remote Information Disclosure
5793| [95279] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component User Interface Framework Subcomponent Unspecified Remote Issue
5794| [95278] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Schema Management Subcomponent Unspecified Remote Issue
5795| [92991] Cisco Wireless Lan Controller Telnet Service Incorrectly Terminated Sessions Remote DoS
5796| [92894] HP Service Manager Web Tier Component Unspecified Remote Information Disclosure
5797| [92825] HP OpenCall MultiService Controller (OCMC) H.323 Stack Unspecified Remote DoS
5798| [92765] Cisco Unified Computing System Manager XML API Management Service Crafted Request Handling Remote DoS
5799| [92420] Oracle Web Services Manager Web Services Security Subcomponent Unspecified Remote Issue
5800| [92271] Cisco Jabber Extensible Communications Platform (Jabber XCP) XMPP XML Message Handling Login Connection Manager Service Remote DoS
5801| [92049] Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance Cisco Tivoli Business Service Manager (TBSM) Component TCP Packet Saturation Remote DoS
5802| [91742] EMC Smarts Network Configuration Manager Java Remote Method Invocation Method Call Handling Remote Code Execution
5803| [91257] Node Parameter Control Module for Drupal Unauthenticated Configuration Options Remote Disclosure
5804| [89835] IBM Tivoli Storage Manager (TSM) Client Traditional Scheduler Service Remote DoS
5805| [89691] Schneider Electric Accutech Manager RFManagerService GET Request Handling Remote Heap Overflow
5806| [89636] IBM InfoSphere Information Services Framework (ISF) Insecure Authorization Controls Remote Privilege Escalation
5807| [89207] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component User Interface Framework Subcomponent Unspecified Remote Issue
5808| [89203] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Enterprise Configuration Management Subcomponent savedConfig Multiple Parameter SQL Injection
5809| [89197] Oracle Enterprise Manager Grid Control APM - Application Performance Management Component Business Transaction Management Subcomponent Unspecified Remote Issue (2013-0396)
5810| [89196] Oracle Enterprise Manager Grid Control APM - Application Performance Management Component Business Transaction Management Subcomponent Unspecified Remote Issue (2013-0360)
5811| [89195] Oracle Enterprise Manager Grid Control APM - Application Performance Management Component Business Transaction Management Subcomponent Unspecified Remote Issue (2013-0359)
5812| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
5813| [87829] IBM Tivoli Endpoint Manager Remote Control Breaker Unspecified Remote DoS
5814| [87045] IBM Tivoli Federated Identity Manager Configuration Servlet Remote Information Disclosure
5815| [86845] Cisco Prime Data Center Network Manager (DCNM) JBoss Application Server Remote Method Invocation (RMI) Service jboss.system:service=MainDeployer Functionality Remote Command Execution
5816| [86474] Multiple Unspecified Automobile Telematics Electronic Control Unit (ECU) Bluetooth Configuration Command Parsing Remote Overflow
5817| [85473] Eucalyptus Cloud Controller / Walrus SOAP Web Service Components Internal Format Message Submission Credential Validation Remote Privilege Escalation
5818| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
5819| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
5820| [84821] SAP NetWeaver SAPHostControl Service Remote Command Execution
5821| [84717] HP Service Manager / Service Center Unspecified Remote DoS
5822| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
5823| [84599] Microsoft Windows Print Spooler Service Remote Format String
5824| [83945] Oracle Enterprise Manager Grid Control for Oracle Database DB Performance Advisories/UIs Subcomponent Unspecified Remote Issue
5825| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
5826| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
5827| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
5828| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
5829| [81390] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Unspecified Remote Issue
5830| [80160] General Electric (GE) Proficy Real-Time Information Portal Remote Interface Service (rifsrvd.exe) Traversal Configuration File Overwrite
5831| [80131] Presto! PageManager Network Group Service Packet Network Request Parsing Unhandled Exception Remote DoS
5832| [80129] Presto! PageManager Network Group Service Packet Network Request Parsing Remote Overflow
5833| [79419] SAP NetWeaver SAPHostControl Service Boundary Error SOAP Message Command Parsing Remote Overflow
5834| [78430] Oracle Fusion Middleware Web Services Manager Security Component Unspecified Remote Information Disclosure
5835| [78429] Oracle Fusion Middleware Web Services Manager Security Component Unspecified Remote Issue
5836| [78428] Oracle Fusion Middleware Web Services Manager Security Component Unspecified Remote DoS
5837| [78336] Cisco Digital Media Manager Administrative Resource Access Control Unreferenced URL Handling Remote Access Restriction Bypass
5838| [77585] Trend Micro Control Manager cmdHandlerRedAlertController.dll CGenericScheduler::AddTask() Function IPC Packet Parsing Remote Overflow
5839| [76838] Cisco Small Business SRP520 / SRP540 Series Services Ready Platform Configuration Utility Web Interface Remote Shell Command Execution
5840| [76762] General Electric (GE) Proficy Plant Applications Server Manager Service (PRProficyMgr.exe) Packet Parsing Remote Overflow
5841| [75918] Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remote DoS
5842| [75780] Citrix Provisioning Services Manager.dll Ardence.CMessageUtils.fromMgrString() Stream Service Component Zero Size Request Parsing Remote Overflow
5843| [74778] Cisco Unified Communications Manager Packet Capture Service Idle TCP Connection Handling Remote DoS
5844| [74777] Cisco Unified Communications Manager Service Advertisement Framework (SAF) Packet Parsing Remote DoS (2011-2564)
5845| [74776] Cisco Unified Communications Manager Service Advertisement Framework (SAF) Packet Parsing Remote DoS (2011-2563)
5846| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
5847| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
5848| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
5849| [74328] Trend Micro Control Manager Cas_LogDirectInsert.aspx XML Parsing Remote Code Execution
5850| [73941] Oracle Enterprise Manager Grid Control Instance Management Unspecified Remote Issue (2011-0879)
5851| [73940] Oracle Enterprise Manager Grid Control Instance Management Unspecified Remote Issue (2011-0877)
5852| [73939] Oracle Enterprise Manager Grid Control Event Management Unspecified Remote Issue
5853| [73937] Oracle Enterprise Manager Grid Control EMCTL Unspecified Remote Issue (2011-0881)
5854| [73935] Oracle Enterprise Manager Grid Control Enterprise Config Management Unspecified Remote Issue
5855| [73934] Oracle Enterprise Manager Grid Control EMCTL Unspecified Remote Issue (2011-0875)
5856| [73932] Oracle Enterprise Manager Grid Control Security Framework Authentication Unspecified Remote Issue
5857| [73930] Oracle Enterprise Manager Grid Control Security Management Unspecified Remote Issue
5858| [73929] Oracle Enterprise Manager Grid Control Security Framework User Model Unspecified Remote Issue
5859| [73928] Oracle Enterprise Manager Grid Control Schema Management Unspecified Remote Issue
5860| [73927] Oracle Enterprise Manager Grid Control SQL Performance Advisories/UIs Unspecified Remote Issue
5861| [73926] Oracle Enterprise Manager Grid Control Database Target Type Menus Unspecified Remote Issue
5862| [73925] Oracle Enterprise Manager Grid Control Database Control Unspecified Remote Issue
5863| [73924] Oracle Enterprise Manager Grid Control Content Management Unspecified Remote Issue
5864| [73762] AR Web Content Manager (AWCM) control/common.php lang_file Parameter Remote File Inclusion
5865| [73666] Hitachi HiRDB Control Manager Agent Unspecified Remote Code Execution
5866| [73352] IBM WebSphere Application Server (WAS) Service Integration Bus (SIB) Messaging Engine Queue Manager Close Operation Remote DoS
5867| [73127] Rockwell Automation ControlLogix 1756 ENBT Module SNMP Service Remote Unauthenticated Information Disclosure
5868| [73106] HP Service Manager / Service Center Unspecified Remote Issue
5869| [73104] HP Service Manager / Service Center Unspecified Remote Information Disclosure
5870| [73102] HP Service Manager / Service Center Unspecified Remote Access Restriction Bypass
5871| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
5872| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
5873| [72114] Trend Micro Control Manager (mrf.exe) Server-agent Communication Remote Overflow
5874| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
5875| [70569] CDE Calendar Manager Service Daemon / RPC Remote Code Execution
5876| [70547] Oracle Enterprise Manager Grid Control Client System Analyzer Remote Code Execution
5877| [70408] NetSupport Manager Client Control Hostname Remote Overflow
5878| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
5879| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
5880| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
5881| [66357] Oracle Enterprise Manager Grid Control Console Component Unspecified Remote Issue (2010-2373)
5882| [66092] Cisco Content Services Switch (CSS) / Application Control Engine (ACE) CRLF Sequence Remote Header Insertion Bypass
5883| [65361] Novell ZENworks Configuration Management Preboot Service Remote Code Execution
5884| [64822] Hitachi TP1/Message Control Mapping Service Remote DoS
5885| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
5886| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
5887| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
5888| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
5889| [60416] Cisco VPN Client Service Control Manager (cvpnd.exe) Service StartServiceCtrlDispatcher Function Local DoS
5890| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
5891| [60200] HP OpenView Network Node Manager (OV NNM) Database Service (ovdbrun.exe) TCP Packet Handling Remote DoS
5892| [59632] IBM Tivoli Storage Manager Client CAD Service Unspecified Remote Overflow
5893| [58726] IBM AIX libcsa.a Calendar Manager Service Daemon (rpc.cmsd) Remote Procedure 21 Overflow
5894| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
5895| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
5896| [56837] SAP Business One License Manager (NT_Naming_Service.exe) GIOP Request Remote Overflow
5897| [56703] Cisco Wireless LAN Controllers (WLC) Unspecified Configuration Manipulation Remote Privilege Escalation
5898| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
5899| [53029] Quick Classifieds controlcenter/manager.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
5900| [52317] Cisco Unified Communications Manager Certificate Authority Proxy Function (CAPF) Service Malformed TCP Input Remote DoS
5901| [51745] Free Download Manager (FDM) Remote Control Server HTTP Authorization Header Handling Overflow
5902| [50031] EMC Control Center SAN Manager SST_CTGTRANS Request Remote Overflow
5903| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
5904| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
5905| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
5906| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
5907| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
5908| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
5909| [46814] Cisco Unified Communications Manager (CUCM) Computer Telephony Integration (CTI) Manager Service Malformed Traffic Remote DoS
5910| [46536] mask PHP File Manager (mPFM) Shell Feature Remote Configuration Disclosure
5911| [45688] Cisco Cisco Service Control Engine (SCE) SSH Server Management Interface Traffic Remote DoS
5912| [45687] Cisco Cisco Service Control Engine (SCE) SSH Engine Authentication Method Manipulation Remote DoS
5913| [45686] Cisco Cisco Service Control Engine (SCE) SSH Engine Login Activity Unspecified Remote DoS
5914| [45209] Cisco Unified Communications Manager Certificate Trust List (CTL) Provider Service TCP Packet Handling Memory Consumption Remote DoS (CSCsj80609)
5915| [45208] Cisco Unified Communications Manager Certificate Trust List (CTL) Provider Service TCP Packet Handling Memory Consumption Remote DoS (CSCsi98433)
5916| [45207] Cisco Unified Communications Manager Certificate Authority Proxy Function (CAPF) Service Malformed Input Remote DoS
5917| [45205] Cisco Unified Communications Manager SNMP Trap Agent Service Malformed UDP Packet Remote DoS
5918| [44590] Oracle Application Server Java Process Manager /oprocmgr-service Remote Anonymous Access
5919| [41656] Remote Print Manager Service (RPM) RpmSrvc.exe LPD Command Remote Overflow
5920| [41364] BrightStor Hierarchical Storage Manager (HSM) Unspecified CsAgent Service Command Remote Overflow
5921| [41363] BrightStor Hierarchical Storage Manager (HSM) Unspecified CsAgent Service Command Crafted Opcode Multiple Remote Overflows
5922| [40357] Cisco Unified Communications Manager CTL Provider Service Long Request Remote Overflow
5923| [40353] IBM Tivoli Storage Manager (TSM) Express Backup Server service (dsmsvc.exe) Packet Handling Remote Overflow
5924| [40104] Novell Identity Manager Fan-Out Driver Platform Services Invalid Format String Remote DoS
5925| [38948] ManageEngine OpManager admin/ServiceConfiguration.do operation Parameter XSS
5926| [37940] Cisco Unified Communications Manager (CUCM) Centralized TFTP File Locator Service Remote Overflow
5927| [36126] Cisco Secure Access Control Server (ACS) CSRadius Service Crafted RADIUS Accounting-Request Packet Remote Code Execution
5928| [36125] Cisco Secure Access Control Server (ACS) CSRadius Service Crafted RADIUS Access-Request Packet Remote DoS
5929| [36122] Cisco Unified Communications Manager (CUCM) Certificate Trust List (CTL) Provider Service (CTLProvider.exe) Remote Overflow
5930| [36121] Cisco Unified Communications Manager (CUCM) Real-Time Information Server (RIS) Data Collector Service (RisDC.exe) Remote Overflow
5931| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
5932| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
5933| [34595] Cisco Unified CallManager (CUCM) Skinny Call Control Protocol (SCCP) Crafted Packet Remote DoS
5934| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
5935| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
5936| [30811] Microsoft Windows SNMP Service Remote Overflow
5937| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
5938| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
5939| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
5940| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
5941| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
5942| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
5943| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
5944| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
5945| [18607] Microsoft Windows Print Spooler Service Remote Overflow
5946| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
5947| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
5948| [17849] Cisco CallManager aupair Service Remote Overflow
5949| [15321] HP OpenView Network Node Manager (OV NNM) libovw.so.2 Multiple Service Remote Overflow
5950| [14605] SafeNet Sentinel License Manager Lservnt Service Remote Overflow
5951| [14488] MERCUR Mailserver Control Service Password Field Remote Overflow
5952| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
5953| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
5954| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
5955| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
5956| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
5957| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
5958| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
5959| [7951] Microsoft SMS Remote Control Client DoS
5960| [5719] 3com NBX IP VOIP NetSet Configuration Manager Remote DoS
5961| [4503] CDE Subprocess Control Service (dtspcd) libDtSvc.so.1 Remote Overflow
5962| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
5963| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
5964| [2247] Microsoft Windows Media Services Remote Command Execution #2
5965| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
5966| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
5967| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
5968| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
5969| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
5970| [384] Windows 2000 Service Control Manager Named Pipe Impersonation
5971| [304] Microsoft Windows NT service pack level via remote registry access
5972| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
5973| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
5974| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
5975| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
5976| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
5977| [96090] Schweitzer Engineering Laboratories (SEL) Multiple Real-Time Automation Controllers (RTAC) Products Unspecified Infinite Loop Remote DoS
5978| [96005] Hikvision Multiple IP Camera /PSIA/System/ConfigurationData Remote Admin Password Disclosure
5979| [95992] Squash /app/controllers/api/v1_controller.rb Multiple Function YAML Payload Handling Remote Code Execution
5980| [95954] Cisco Unified Communications Manager (CUCM) Remote Exception Stack Trace Detail Information Disclosure
5981| [95921] ISPmanager Unspecified Race Condition Remote Code Execution
5982| [95881] Cisco Unified Computing System (UCS) C-Series Rack Server Connection Limitation Failure Cisco Integrated Management Controller (CIMC) Remote DoS
5983| [95877] Cisco Wide Area Application Services (WAAS) Web Service Framework Crafted Request Handling Remote Code Execution
5984| [95765] IBM WebSphere Application Server (WAS) startServer Process Configuration Manager Incorrect File Permission Weakness
5985| [95744] CA Multiple Products License Manager GETSERVER Command Parsing Remote Buffer Overflow
5986| [95743] CA Multiple Products License Manager LOG1 Command Parsing Remote Buffer Overflow
5987| [95742] CA Multiple Products License Manager GETCONFIG Command Parsing Remote Buffer Overflow
5988| [95741] CA Multiple Products License Manager PUTOLF Command Parsing Remote Buffer Overflow
5989| [95740] CA Multiple Products License Manager GBR Command Parsing Remote Buffer Overflow
5990| [95739] CA Multiple Products License Manager OLFCONFIRM Command Parsing Remote Buffer Overflow
5991| [95738] CA Multiple Products License Manager GETBACKUP Command Parsing Remote Buffer Overflow
5992| [95737] CA Multiple Products License Manager GETLOG Command Parsing Remote Buffer Overflow
5993| [95736] CA Multiple Products License Manager NEWOLF Command Parsing Remote Buffer Overflow
5994| [95693] IBM Tivoli Remote Control Unspecified SQL Injection
5995| [95691] CA Service Desk Manager Unspecified XSS
5996| [95673] Serial to Network Proxy (ser2net) controller.c write() Function Use-after-free Remote DoS
5997| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
5998| [95659] Cisco Identity Services Engine Malformed IP Packet Saturation Remote DoS
5999| [95658] DameWare Remote Service DWExporter.exe Data Importing Stack Buffer Overflow
6000| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
6001| [95548] Cisco Aironet 3600 Wireless LAN Controller Communication Disruption Remote DoS
6002| [95499] EMBASSY Remote Administration Server (ERAS) Help Desk Application ct100$4MainController$TextBoxSearchValue Parameter SQL Injection
6003| [95400] Cisco Unified Communications Manager (CUCM) Unspecified Remote Command Execution
6004| [95316] Oracle Solaris Service Management Facility (SMF) Subcomponent Unspecified Remote Issue
6005| [95311] Oracle SPARC Enterprise M Series Servers XSCF Control Package (XCP) Subcomponent Unspecified Remote DoS
6006| [95308] Oracle Solaris SMF/File Locking Services Subcomponent Unspecified Remote Issue
6007| [95272] Oracle Access Manager SSO Engine Subcomponent Unspecified Remote Issue
6008| [95139] HP Network Node Manager i Unspecified Remote Access
6009| [95105] Cisco Unified Communications Domain Manager (CUCDM) Crafted Request Handling Memory Exhaustion Remote DoS
6010| [95018] Cisco Unified Operations Manager / Unified Service Monitor Unspecified XSS
6011| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
6012| [94865] cPremote Plugin for cPanel Unauthorized User Backup Service Access
6013| [94846] Rockwell Automation RSLinx Enterprise LogReceiver Service Missing Record Data Size Validation Remote DoS
6014| [94734] IBM Business Process Manager (BPM) /teamworks/executeServiceByName Unspecified CSRF
6015| [94671] Foreman Bookmarkers Controller Bookmark Creation Controller Attribute Handling eval() Remote Code Execution
6016| [94429] TP-Link TL PS110U Print Server Telnet Service Configuration Information Disclosure
6017| [94393] IBM Application Manager For Smart Business Crafted URL Handling Tivoli Monitoring Process Remote DoS
6018| [94333] Varnish Plugin for cPanel Advanced Configuration Page Remote Privilege Escalation
6019| [94319] SoftBank Wi-Fi Spot Configuration Software Access Point Connection Remote User Information Disclosure
6020| [94224] Brickcom Multiple IP Camera configfile.dump Cleartext Router Configuration Remote Disclosure
6021| [94211] Ubiquiti airCam RTSP Service (ubnt-streamer) Request Message Parsing Remote Overflow
6022| [94193] Juniper Junos Pulse Secure Access Service (SSL VPN) / Pulse Access Control Service (UAC) Test CA MiTM Spoofing Weakness
6023| [94140] VLC Media Player Web Interface XML Services Remote Command Execution
6024| [94136] HP Service Manager / ServiceCenter Unspecified Information Disclosure
6025| [94135] HP Service Manager / ServiceCenter Unspecified XSS
6026| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
6027| [94028] aCMS MCFileManager / MCImageManager Unauthenticated Remote Access
6028| [93827] Imperva SecureSphere Operations Manager plain/actionsets.html Action Set Handling Remote Command Execution
6029| [93451] libvirt Storage Pool Manager Socket File Descriptor Handling Remote DoS
6030| [93413] Serva TFTPD Service Read Request Handling Remote Buffer Overflow
6031| [93412] Cisco Application Control Engine (ACE) SSL Logging Daemon Connection Saturation Remote DoS
6032| [93394] Cisco Unified Communications Manager (CUCM) Authentication Request Saturation Remote DoS
6033| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
6034| [93240] MIT Kerberos 5 kpasswd Service Spoofed Packet Remote DoS
6035| [93139] EMC AlphaStor Library Control Program (LCP) Unspecified Command Processing Remote Overflow
6036| [93098] NetApp OnCommand System Manager /zapiServlet CIFS Configuration Management Interface Multiple Parameter XSS
6037| [93049] IBM Sterling Secure Proxy Configuration Manager Pages Third Party HTML Frame Rendering Information Disclosure
6038| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
6039| [92895] HP Service Manager Web Tier Component Unspecified XSS
6040| [92888] Cisco Unified Communications Domain Manager Malformed UDP Packet Saturation Remote DoS
6041| [92887] Cisco TelePresence Management Suite (TMS) SNMP Trap Handling TMSSNMPService.exe Process Remote DoS
6042| [92874] Vivotek PT7135 IP Camera RTSP Service Crafted Packet Header Field Handling Remote Overflow
6043| [92870] IBM Lotus Domino domcfg.nsf Direct Request Server Configuration Remote Disclosure
6044| [92857] Ajax File Manager Plugin for TinyMCE ajax_create_folder.php foo Parameter Remote Command Execution
6045| [92822] HP Proactive Remote Service (PRS) Compaq Remote Service Module (CRSM) Web Interface Privileged File Access
6046| [92786] Orange Mobile Broadband OrangeMobileBroadband_Service Named Pipe Remote Command Execution
6047| [92734] SAP NetWeaver CCMS Service Recursive XML External Entity (XXE) Data Parsing Resource Consumption Remote DoS
6048| [92571] aVirt Mail Server Multiple Service Command Parsing Remote Overflow
6049| [92512] Cisco Network Admission Control (NAC) Manager Multiple Parameter SQL Injection Arbitrary Code Execution
6050| [92511] Cisco TelePresence Multipoint Control Unit (MCU) / TelePresence Server Digital Signal Processor (DSP) Card Crafted RTP Packet H.264 Bit Stream Handling Remote DoS
6051| [92506] SAP Basis Components- Communication Services Unspecified Remote Command Execution
6052| [92451] Oracle Solaris Remote Execution Service Subcomponent Unspecified Local Issue
6053| [92436] Oracle FLEXCUBE Direct Banking My Services Subcomponent Unspecified Remote Information Disclosure
6054| [92423] Oracle Retail Integration Bus Retail Integration Bus Manager Subcomponent Unspecified Traversal Remote Information Disclosure
6055| [92417] Oracle Siebel CRM Siebel Enterprise Application Integration Component Integration Business Services Subcomponent Unspecified Remote Issue
6056| [92416] Oracle Siebel CRM Siebel Enterprise Application Integration Component Web Services Subcomponent Unspecified Remote Information Disclosure
6057| [92414] Oracle Siebel CRM Siebel Enterprise Application Integration Component Web Services Subcomponent Unspecified Remote Information Disclosure
6058| [92412] Oracle Siebel CRM Siebel Enterprise Application Integration Component Web Services Subcomponent Unspecified Remote Issue
6059| [92403] Oracle E-Business Suite Applications Manager Component HTML OAM Client Subcomponent Unspecified Remote Issue
6060| [92388] Oracle WebCenter Interaction Image Service Subcomponent Unspecified Remote Issue
6061| [92382] Oracle Database Server Workload Manager Unspecified Remote Code Execution
6062| [92313] Schneider Electric Spectra Cameras Malformed Authentication String Web Interface / SOAP Service Remote DoS
6063| [92277] Cisco Adaptive Security Appliances (ASA) / Firewall Services Module (FWSM) Secure Shell (SSH) Session Termination Handling Remote DoS
6064| [92259] RESTful Web Services for Drupal Cache Poisoning Remote DoS
6065| [92257] Microsoft IE CSS Import Handling Remote DoS
6066| [92225] Juniper SRX Firewall flowd Service Malformed SIP Packet Handling Remote DoS
6067| [92213] Cisco Firewall Services Module (FWSM) IKE Version 1 Parsing Remote DoS
6068| [92212] Cisco Firewall Services Module (FWSM) auth-proxy Feature URL Parsing Remote DoS
6069| [92207] Cisco IOS XE on 1000 Series Aggregation Services Routers (ASR) L2TP Packet Saturation Remote DoS
6070| [92206] Cisco IOS XE on 1000 Series Aggregation Services Routers (ASR) Bridge Domain Interface Malformed Packet Handling Remote DoS
6071| [92205] Cisco IOS XE on 1000 Series Aggregation Services Routers (ASR) SIP Packet Saturation Remote DoS
6072| [92204] Cisco IOS XE on 1000 Series Aggregation Services Routers (ASR) Fragmented IPv6 Multicast Traffic Handling Remote DoS
6073| [92203] Cisco IOS XE on 1000 Series Aggregation Services Routers (ASR) Fragmented IPv6 MVPN Traffic Handling Remote DoS
6074| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
6075| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
6076| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
6077| [92057] Rockwell Automation FactoryTalk Services Platform RNADiagnostics Module Missing Size Field Validation Remote DoS
6078| [92048] Rockwell Automation RSLinx Enterprise LogReceiver Service Datagram Handling Thread Exit Remote DoS
6079| [91835] Yum Package Manager Repository Metadata Handlnig Arbitrary Remote Code Execution
6080| [91832] Juniper Junos Pulse Secure Access (SSL VPN) / Access Control (UAC / IC) Malformed HTTP Traffic Handling Remote DoS
6081| [91804] EMC Smarts Network Configuration Manager (NCM) System Management Console Multiple Unspecified Issues
6082| [91786] Juniper JunosE Malformed BFD Control Packet Handling Remote DoS
6083| [91755] Cisco IOS IP Service Level Agreement (IP SLA) Feature Crafted IP SLA Packet Handling Remote DoS
6084| [91750] Juniper Networks Security Threat Response Manager (STRM) Unspecified Remote Compromise
6085| [91743] EMC Smarts Network Configuration Manager NCM System Management (SysAdmin) Console Multiple Unspecified Issues
6086| [91472] Oracle Java DriverManager (java.sql.DriverManager) doPrivileged block Remote Code Execution (pwn2own / Forshaw)
6087| [91266] Red Hat Enterprise Virtualization Manager MoveDisk Command Permission Check Failure Unspecified Remote DoS
6088| [91252] 389 Directory Server get_ldapmessage_controls_ext() Function Zero Length LDAP Control Sequence Handling Remote DoS
6089| [91187] Schneider Electric DS ControlPoint Crafted Search Remote DoS
6090| [91185] Munin Default Apache Configuration Permission Weakness Remote Information Disclosure
6091| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
6092| [91136] Clorius Controls ICS SCADA /html/info.html Internal IP Address Remote Disclosure
6093| [91036] HP Intelligent Management Center User Access Manager acmServletDownload Servlet Remote Information Disclosure
6094| [91035] HP Intelligent Management Center TACACS+ Authentication Manager tamServletDownload Servlet Remote Information Disclosure
6095| [90972] HP ServiceCenter Unspecified Remote DoS
6096| [90923] DeltaV Multiple Controller Crafted Packet Handling Remote DoS
6097| [90897] Remote File Manager for iOS File Upload filename Parameter Traversal Arbitrary File Access
6098| [90896] Remote File Manager for iOS File Upload filename Parameter XSS
6099| [90836] IBM WebSphere Commerce Web Services Framework Unspecified Remote DoS
6100| [90834] Net::Server Module for Perl reverse_lookups Option Invalid DNS Check Remote Access Control Bypass
6101| [90781] Cisco Wireless Lan Controllers (WLC) Crafted mDNS Packet Parsing Remote DoS
6102| [90680] Cisco Unified Communications Manager (CUCM) Crafted UDP Packet Parsing Resource Consumption Remote DoS
6103| [90679] Cisco Unified Communications Manager (CUCM) Intracluster Communication LBM Transaction Record Cache Poisoning Bandwidth Pool Consumption Remote DoS
6104| [90580] VMware vCenter Service Appliance (vCSA) Log Entry Handling Resource Exhaustion Remote DoS
6105| [90578] Portable SDK for UPnP Devices libupnp unique_service_name() Function SSDP Request Handling Multiple Remote Overflows
6106| [90570] SAP NetWeaver Software Deployment Manager (SDM) Failed Authentication Attempt Handling Remote DoS
6107| [90192] AJAX Control Toolkit ToolkitScriptManager.cs System.Reflection.Assembly.Load() Function Arbitrary Class Instantiation
6108| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
6109| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
6110| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
6111| [89870] EMC AlphaStor Drive Control Program (DCP) New Device Name Creation Remote Overflow
6112| [89846] Nagios XI Legacy Nagios Core Configuration Manager (NagiosQL) Host Escalation Entry Config Name Field XSS
6113| [89845] Nagios XI Legacy Nagios Core Configuration Manager (NagiosQL) Configuration File Injection CSRF
6114| [89843] Nagios XI Legacy Nagios Core Configuration Manager (NagiosQL) /nagiosxi/admin/commandline.php cname Parameter SQL Injection
6115| [89834] IBM Tivoli Storage Manager (TSM) Client Web GUI Unspecified Remote Access
6116| [89832] MiniUPnP MiniUPnPd HTTP Service SOAPAction Handler ExecuteSoapAction Function NULL Pointer Dereference Remote DoS
6117| [89831] MiniUPnP MiniUPnPd HTTP Service SOAPAction Handler ExecuteSoapAction Function Integer Signedness Error Remote DoS
6118| [89823] Oracle Automated Service Manager (OASM) (SUNWswasr) Installation Symlink Local Privilege Escalation
6119| [89742] Multiple DVR Systems raysharpdvr Service udhcpc Application Remote Command Execution
6120| [89701] SQLiteManager include/add_database.php dbpath Parameter Database Creation Remote PHP Code Execution
6121| [89637] IBM InfoSphere Information Server DataStage Administrator Client Insecure Client Side Controls Remote Privilege Escalation
6122| [89634] IBM InfoSphere Information Server Import Export Manager Unspecified Remote Command Execution
6123| [89624] MiniUPnP MiniUPnPd HTTP Service SOAPAction Handler ExecuteSoapAction Function Remote Stack Overflow
6124| [89611] Portable SDK for UPnP Devices libupnp unique_service_name() Function SSDP Request Handling Three Remote Overflows
6125| [89533] Cisco Wireless Lan Controllers (WLC) HTTP Profiling Feature Crafted UserAgent String Parsing Remote Code Execution
6126| [89531] Cisco Wireless Lan Controllers (WLC) Wireless Intrusion Prevention System (wIPS) Component Crafted IP Packet Parsing Remote DoS
6127| [89530] Cisco Wireless Lan Controllers (WLC) Crafted Session Initiation Protocol (SIP) Packet Parsing Remote DoS
6128| [89529] ZoneMinder includes/actions.php packageControl Function Multiple Parameter Remote Command Execution
6129| [89494] SAP NetWeaver SDM Service Crafted Request Parsing Resource Exhaustion Remote DoS
6130| [89436] EMC AlphaStor Device Manager (rrobotd.exe) Crafted DCP Run Command Arbitrary Remote Command Execution
6131| [89435] EMC AlphaStor Device Manager (rrobotd.exe) _vsnsprintf Function Incoming Command Processing Remote Format String
6132| [89379] RuggedCom Rugged Operating System (ROS) HTTPS Service Scan Telnet/SSH Connection Closing Remote DoS
6133| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
6134| [89244] Oracle Sun Storage Common Array Manager (CAM) Fault Management System (FMS) Subcomponent Unspecified Remote Information Disclosure
6135| [89206] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Storage Management Subcomponent XDBResource cancelURL Arbitrary Site Redirect
6136| [89205] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Resource Manager Subcomponent instance/rsrcpln Multiple Parameter SQL Injection
6137| [89204] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Policy Framework Subcomponent /em/console/ecm/policy/policyViewSettings pagename Parameter HTTP Response Splitting
6138| [89202] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Distributed/Cross DB Features Subcomponent dist/streams/queue Multiple Parameter SQL Injection
6139| [89201] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Distributed/Cross DB Features Subcomponent advRepl/advReplicationAdmin Multiple Parameter SQL Injection
6140| [89200] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Distributed/Cross DB Features Subcomponent advReplicationAdmin XSS
6141| [89199] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Database Cloning Subcomponent dBClone Multiple Parameter SQL Injection
6142| [89198] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Content Management Subcomponent XDBResource cancelURL Parameter XSS
6143| [89191] Oracle Access Manager OAM Webgate Subcomponent Unspecified Remote Issue
6144| [89173] Serva DNS Server QNAME Label Length Value Remote Denial of Service
6145| [89172] Serva HTTP Request Invalid String Position Unhandled Exception Remote Denial of Service
6146| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
6147| [89152] Siemens SIMATIC RF Manager keyhelper.ocx ActiveX Control Buffer Overflow
6148| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
6149| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
6150| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
6151| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
6152| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
6153| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
6154| [88907] Password Manager Pro (PMP) Database Replication Cleartext Password Remote Disclosure
6155| [88861] Astium VoIP PBX astiumd Service Request Parsing Remote Overflow DoS
6156| [88804] UNICOS arrayd Service Remote Command Execution
6157| [88787] SunOS RPC portmapper Remote Service Manipulation
6158| [88756] Novell NetIQ Privileged User Manager unifid.exe auth.dll pa_modify_accounts Function Unauthenticated Remote Admin Password Manipulation
6159| [88754] Novell NetIQ Privileged User Manager unifid.exe ldapagnt.dll ldapagnt_eval Function Arbitrary Perl Code Remote Execution
6160| [88554] IBM Tivoli Storage Manager (TSM) for Space Management (HSM) Remote Arbitrary File Manipulation
6161| [88464] Siemens Automation License Manager (ALM) Resource Consumption Remote DoS
6162| [88406] Juniper Junos rpd Service Malformed BGP Session Disconnect Remote DoS
6163| [88386] Cisco Wireless LAN Controllers (WLC) /screens/base/web_auth_custom.html Crafted GET Request Parsing Remote DoS
6164| [88368] Citrix XenApp XML Service Interface Crafted Packet Parsing Remote Code Execution
6165| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
6166| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
6167| [88307] Cisco DPC2420 Router Remote Configuration Option Configuration File Disclosure
6168| [88301] Rockwell Automation Allen Bradley Multiple Controller Crafted Message Parsing Remote DoS
6169| [88288] Rockwell Automation FactoryTalk Diagnostics Receiver Service RNADiagReceiver.exe Datagram Parsing Overly Large Chunk Size Remote DoS
6170| [88268] Red Hat Enterprise Virtualization Manager Multiple API Request Parsing Remote Access Restriction Bypass
6171| [88135] HP Network Node Manager i Unspecified Remote Access
6172| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
6173| [88042] IBM WebSphere Message Broker Configuration Manager V5 Imported ACL Implenetation Failure
6174| [88025] IBM WebSphere MQ COM+/MTS Environment Queue Manager Connection Saturation Remote DoS
6175| [87956] IBM WebSphere DataPower Integration Appliance Multi-Protocol Gateway / Web Service Proxy Crafted Message Handling Remote Device Restart DoS
6176| [87930] IBM WebSphere Message Broker for z/OS Configuration Manager Non-primary Group ACL Implementation Failure
6177| [87923] AR Web Content Manager (AWCM) Comment Record Saturation Remote DoS
6178| [87920] Remote Login Service (RLS) src/uccs-server.c User Switching Functionality Cross-user Credential Disclosure
6179| [87910] JBoss Enterprise Data Services Platform Teiid Java Database Connectivity (JDBC) Socket Cleartext Authentication Information Remote Disclosure
6180| [87878] EMC Smarts Network Configuration Manager Credential Storage Hard-coded Encryption Key Weakness
6181| [87877] EMC Smarts Network Configuration Manager Database Unauthenticated Connection Weakness
6182| [87724] IBM Content Manager eClient GET Request Remote Cleartext Password Disclosure
6183| [87557] IBM Business Process Manager Coaches Missing Document Attachment Control Unspcecified XSS
6184| [87508] Bugzilla /WebService/User.pm User.get Method Arbitrary User Saved Search Remote Information Disclosure
6185| [87453] Tor Client v0 Controller Command Handling Remote Format String
6186| [87334] NetIQ Privileged User Manager (npum) ldapagnt.dll ldapagnt_eval() Function Request Parsing Remote Code Execution
6187| [87330] OpenVAS Manager manage_sql.c send_to_sourcefire() Function OMP Request Parsing Remote Shell Command Execution
6188| [87326] Smartphone Pentest Framework (SPF) frameworkgui/config Configuration File Direct Request Remote Information Disclosure
6189| [87293] Novell Groupwise gwia.exe LDAP Service BIND Request Parsing Remote Overflow
6190| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
6191| [87244] IBM WebSphere MQ Queue Manager Asynchronous Customer Message Parsing Remote DoS
6192| [86904] Oracle TNS Listener Service Multiple Command Parsing Remote DoS
6193| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
6194| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
6195| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
6196| [86867] EOScada eosfailoverservice.exe Resource Management Error Random Data Handling Remote DoS
6197| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
6198| [86607] OpenSIPStack OpenSBC.exe::SIPTransactions::SIPTransactionManager::RemoveTransaction Function NULL Pointer Dereference Remote DoS
6199| [86567] libproxy url::get_pac() Function proxy.pac Auto-Configuration File Handling Remote Overflow
6200| [86472] Multiple Unspecified Automobile Telematics Electronic Control Unit (ECU) Airbiquity aqLink Packet Handling Remote Overflow
6201| [86316] Oracle E-Business Suite Oracle Field Service Component Wireless/WAP upload Subcomponent Unspecified Remote Issue
6202| [86308] Oracle PeopleSoft Enterprise PeopleTools Tree Manager Subcomponent Unspecified Remote Issue
6203| [86280] Oracle PeopleSoft Enterprise Campus Solutions Self-Service (Student Records) Subcomponent Unspecified Remote Information Disclosure
6204| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
6205| [86148] Cisco Firewall Services Module (FWSM) DCERPC Inspection Engine Transit DCERPC Traffic Parsing Remote DoS (2012-4663)
6206| [86147] Cisco Firewall Services Module (FWSM) DCERPC Inspection Engine Transit DCERPC Traffic Parsing Remote DoS (2012-4662)
6207| [86146] Cisco Firewall Services Module (FWSM) DCERPC Inspection Engine Transit DCERPC Traffic Parsing Remote Overflow
6208| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
6209| [86057] Microsoft SQL Server Report Manager Unspecified XSS
6210| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
6211| [85891] HP Network Node Manager i Unspecified Remote Information Disclosure
6212| [85867] IBM Rational Business Developer Web Services Unspecified Remote Information Disclosure
6213| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
6214| [85816] Cisco IOS / Unified Communications Manager (CUCM) Malformed SIP Message SDP Message Parsing Remote DoS
6215| [85807] Trend Micro Control Manager AdHocQuery_Processor.aspx id Parameter SQL Injection
6216| [85605] Cybozu KUNAI Browser for Remote Service Application Beta for Android WebView Class file: URL Application Handling Arbitrary Code Execution
6217| [85584] Cisco Application Control Engine (ACE) Module for Cisco Catalyst Load Balancer (LB) Queue Monitoring Application Traffic Parsing Remote DoS
6218| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
6219| [85498] IceWarp Mail Server WebMail Component webmail/pda/controller/raw.php phpinfo() Function PHP Configuration Information Disclosure
6220| [85478] OpenSLP common/slp_compare.c SLPIntersectStringList() Function Out-of-bounds Read Service request Parsing Remote DoS
6221| [85475] Eucalyptus Cloud Controller / Walrus SOAP Web Service Components Authorization Mechanism Authentication Bypass
6222| [85427] IBM AIX NFS Service GID Enforcement Weakness Remote DoS
6223| [85306] Plankton Ad Library for Android Phone com.plankton.device.android.service.AndroidMDKService IMEI Remote Disclosure
6224| [85097] Websense Email Security Rules Service Crafted Attachment Remote DoS
6225| [85093] Websense Web Security / Web Filter Filtering Service Malformed URI Parsing Remote DoS (2009-5132)
6226| [85070] Asterisk Manager Interface ExternalIVR Application Originate Action Handling Remote Shell Command Execution
6227| [85043] Websense Web Security / Web Filter Filtering Service Malformed URI Parsing Remote DoS (2010-5145)
6228| [84884] McAfee Enterprise Mobility Manager (EMM) Agent / Server OTP Mode DNS SRV Record Remote Password Disclosure
6229| [84883] McAfee Enterprise Mobility Manager (EMM) Agent / Server Invalid Username Record Saturation Remote DoS
6230| [84855] HP LoadRunner magentservice.exe Malformed Packet Parsing Remote Oveflow
6231| [84854] HP Operations Agent for NonStop Server ELinkService Process HEALTH Packet Parsing Remote Overflow
6232| [84767] HP ServiceGuard Unspecified Remote DoS
6233| [84661] HP Service Manager and Service Center Web Tier Unspecified XSS
6234| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
6235| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
6236| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
6237| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
6238| [84545] Chef chef-server-api/app/controllers/cookbooks.rb Multiple Knife Cookbook Command Parsing Remote Cookbook Manipulation
6239| [84537] Chef API chef-server-api/app/controllers/users.rb /users URI Request Parsing Remote Account Manipulation
6240| [84508] Cisco Wide Area Application Services (WAAS) One-way Password Hash Remote Brute Force Information Disclosure
6241| [84444] Novell Remote Manager Small Http Interface Daemon (httpstkd) ProcessAuthorizationFailure() Function HTTP Header Parsing Remote DoS
6242| [84256] Johnson Controls CK721-A Controller Malformed Packet Parsing Remote Command Execution
6243| [84243] Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb with_http_digest Helper Method Remote DoS
6244| [84230] Cisco Linksys WMB54G TFTP Service Firmware Update Functionality Remote Shell Command Execution
6245| [84136] IBM WebSphere MQ Configuration Setup SVRCONN Channel User ID Verification Queue Manager Authentication Bypass
6246| [84120] Symantec Web Gateway spywall/pbcontrol.php filename Parameter Remote Shell Command Execution
6247| [83951] Oracle Enterprise Manager for Fusion Middleware User Administration Pages Subcomponent Unspecified Remote Issue
6248| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
6249| [83761] RSA Authentication Manager RSA Self-Service / Security Consoles Unspecified XSS
6250| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
6251| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
6252| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
6253| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
6254| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
6255| [83456] IRIX arrayd Service Remote Command Execution
6256| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
6257| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
6258| [83214] APC PowerChute _upsd Service Port Scan Remote DoS
6259| [83170] Verity Search97 tasmgr Service Unauthenticated Shutdown Remote DoS
6260| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
6261| [83043] West Wind Web Connect wc.dll Configuration Manipulation Remote Privilege Escalation
6262| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
6263| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
6264| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
6265| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
6266| [82826] OpenConnect NetworkManager Authentication Dialog Use-after-free Remote DoS
6267| [82819] Juniper Junos MPLS Pseudo Wire Control Word Parsing Remote DoS
6268| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
6269| [82681] Citrix Provisioning Services streamprocess.exe 0x40020006 Request Handling Remote Overflow
6270| [82680] Citrix Provisioning Services streamprocess.exe vDisk Name Parsing Remote Code Execution
6271| [82675] Mozilla Multiple Product Network Security Services ASN.1 Decoder Zero Length Item OCSP Response Handling Remote DoS
6272| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
6273| [82117] Apple Mac OS X Directory Service Network Message Handling Remote Information Disclosure
6274| [82108] phpMyFAQ Bundled ImageManager Unspecified Remote Code Execution
6275| [82087] HP StorageWorks P4000 Virtual SAN Appliance Software Management Service Authentication Bypass Remote Command Execution
6276| [82037] Resource Hacker Control Character Portable Executable File Handling Remote Overflow
6277| [82020] Update Manager System State Archive File Uploading Weakness Repository Credential Remote Disclosure
6278| [81983] Invensys Wonderware InTouch slssvc.exe Service Packet Parsing Remote DoS
6279| [81937] Apple QuickTime QTPlugin.ocx IQTPluginControl::SetLanguage COM Method Quictime.qts QTMovie Object Handling Remote Overflow
6280| [81899] FlexNet License Server Manager lmgrd Packet Parsing Remote Overflow
6281| [81867] Cisco Unified Communications Manager (CUCM) voice-sipstack Component Post Upgrade SIP Message Parsing Remote DoS
6282| [81846] Cisco IOS No Service Password-Recovery Feature Bypass Start-up Configuration Disclosure
6283| [81843] Cisco IOS HTTP Client Service Installation HTTP Response Parsing Remote DoS
6284| [81798] NET-i viewer msls31.dll XProcessControl.ocx ActiveX RequestScreenOptimization Function String Parsing Remote Overflow
6285| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
6286| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
6287| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
6288| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
6289| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
6290| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
6291| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
6292| [81664] Citrix Provisioning Services SoapServer Service Date / Time String Parsing Remote Overflow
6293| [81657] McAfee Virtual Technician MVTControl ActiveX mvt.dll GetObject() Method Remote Command Execution
6294| [81653] HP Systems Insight Manager Unspecified Remote Privilege Escalation
6295| [81622] IBM AppScan / Policy Tester Service-Account Impersonation Weakness Remote Arbitrary File Access
6296| [81509] Cloudera Multiple Product taskcontroller.cfg Remote User Impersonation
6297| [81454] Asterisk Manager Interface Multiple Action Handling Remote Shell Command Execution
6298| [81452] NET-i ware Services Endless Loop Negative 32-bit Field Parsing Remote DoS
6299| [81419] Oracle PeopleSoft Enterprise Human Resource Management System (HRMS) eCompensation Manager Desktop Component Unspecified Remote Issue
6300| [81411] Oracle FLEXCUBE Direct Banking Core-My Services Component Unspecified Remote Information Disclosure
6301| [81408] Oracle SPARC Enterprise M Series XSCF Control Package (XCP) Component Unspecified Remote DoS
6302| [81381] Oracle Database Server User Management (DB UM) Connector for Oracle Identity Manager Database User Component Unspecified Remote Issue
6303| [81370] Oracle E-Business Suite Application Object Library Component REST Services Subcomponent Unspecified Remote Issue
6304| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
6305| [81273] Oracle Database Server / Enterprise Manager Database Grid Control /em/console/database/schema/table prevPage Parameter HTTP Response Splitting
6306| [81271] Oracle Database Server / Enterprise Manager Database Grid Control /em/console/database/schema/grantObjPrivs pageName Parameter HTTP Response Splitting
6307| [81268] Oracle Database Server / Enterprise Manager Database Grid Control /em/console/ecm/search/searchPage SCPLBL_INSTALLED_DATE0DI Parameter SQL Injection
6308| [81267] Oracle Database Server / Enterprise Manager Database Grid Control /em/console/ecm/config/compareWizard/compareWizFirstConfig fConfigGuid Parameter SQL Injection
6309| [81246] Adobe Reader / Acrobat True Type Font Control Value Table Stream MINDIX opcode PDF File Handling Remote Overflow
6310| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
6311| [81216] Newscoop /conf/liveuser_configuration.php require_once() Function GLOBALS[g_campsiteDir] Parameter Remote File Inclusion
6312| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
6313| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
6314| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
6315| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
6316| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
6317| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
6318| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
6319| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
6320| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
6321| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
6322| [81026] Novell iManager Web Interface jclient Create Attribute Function EnteredAttrName Parameter Parsing Remote Overflow
6323| [81011] Red Hat Package Manager (RPM) lib/header.c headerLoad() Function Package Header Region Size Handling Remote Code Execution
6324| [81010] Red Hat Package Manager (RPM) Multiple Function Region Tag Parsing Remote Code Execution
6325| [81009] Red Hat Package Manager (RPM) lib/header.c headerVerifyInfo() Function Header Range Parsing Remote Code Execution
6326| [80702] Cisco IOS Wide Area Application Services (WAAS) Express Feature Message Parsing Remote DoS
6327| [80657] HP Performance Manager PMParamHandler Component File Path Handling Remote Code Execution
6328| [80590] EMC NetWorker nsrexecd Service Malformed RPC Packet Handling Remote DoS
6329| [80231] Novell ZENworks Configuration Management Preboot Service 0x6c / 0x4c Opcode Request Parsing Multiple Unspecified Overflow
6330| [80230] Novell ZENworks Configuration Management Preboot Service 0x21 Opcode Request Parsing Arbitrary File Access
6331| [80212] CA ARCserve Backup Network Service Network Request Parsing Remote DoS
6332| [80159] General Electric (GE) Proficy Plant Applications Server License Manager (PRLicenseMgr.exe) Packet Parsing Remote Memory Corruption
6333| [80158] General Electric (GE) Proficy Plant Applications Remote Data Service (PRRDS.exe) Packet Parsing Remote Memory Corruption
6334| [80157] General Electric (GE) Proficy Historian Data Archiver Service Network Message Parsing Remote Memory Corruption
6335| [80132] Epson Event Manager Net Scan Monitor Component HTTP Request Parsing Remote DoS
6336| [80130] Presto! PageManager Network Group Service Packet Network Request Parsing Arbitrary File Access
6337| [80041] Cisco Firewall Services Module Protocol Independent Multicast (PIM) Message Parsing Remote DoS
6338| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
6339| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
6340| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
6341| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
6342| [79735] IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Boundary Error Remote Overflow
6343| [79707] Cisco Unified Communications Manager SCCP Registration Message Parsing Remote DoS
6344| [79686] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Remote DoS
6345| [79685] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Remote Code Execution
6346| [79679] Cisco Wireless LAN Controllers (WLC) CPU Access Control List Configuration Manipulation
6347| [79678] Cisco Wireless LAN Controllers (WLC) WebAuth HTTP/HTTPS Packet Parsing Remote DoS
6348| [79677] Cisco Wireless LAN Controllers (WLC) IPv6 Packet Parsing Remote DoS
6349| [79676] Cisco Wireless LAN Controllers (WLC) Administrative Management Interface URL Parsing Remote DoS
6350| [79484] PDF Controller (pdfcontroller) Extension for TYPO3 Unspecified Remote Code Execution
6351| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
6352| [79438] Net4Switch ipswcom.dll ActiveX Control cxcmrt.dll CxDbgPrint() Function Alert() Method Debug Message String Creation Remote Overflow
6353| [79417] Xinha plugins/ExtendedFileManager/manager.php File Upload Remote PHP Code Execution
6354| [79416] Xinha plugins/ImageManager/manager.php File Upload Remote PHP Code Execution
6355| [79412] Symantec pcAnywhere awhost32 Service Unauthenticated Remote DoS
6356| [79372] TORCS graphic/ssgraph/grsound.cpp Configuration Sound XML File Handling Remote Overflow
6357| [79333] NetSarang Xmanager Enterprise / Xlpd LPD Request Parsing Remote DoS
6358| [79310] Citrix XenServer Web Self Service Management Web Interface Multiple Unspecified Remote Issues
6359| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
6360| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
6361| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
6362| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
6363| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
6364| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
6365| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
6366| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
6367| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
6368| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
6369| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
6370| [79001] SUSE sysconfig ifup-services Shell Meta-character SSID Parsing Remote Shell Command Execution
6371| [78954] Novell iPrint Client ActiveX Control GetPrinterURLList2() Function Remote Code Execution
6372| [78922] Avaya Interaction Center vesporb.dll ORB Service Packet Parsing Remote Overflow
6373| [78872] Multiple Automobile Electronic Control Unit (ECU) BCM Unauthenticated Reflashing Key Remote Disclosure
6374| [78868] Multiple Automobile Multiple Electronic Control Unit (ECU) CAN Communications Disabling Remote DoS
6375| [78840] Inter-PRO Client Configuration File Handling Remote Overflow
6376| [78792] Webservices Extension for TYPO3 Unspecified Remote Code Execution
6377| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
6378| [78530] JExtensions JE Story Submit Component for Joomla! components/com_jesubmit/controllers/request_get.php update() Function File Upload Remote PHP Code Execution
6379| [78399] Oracle E-Business Suite Application Object Library REST Services Remote Information Disclosure
6380| [78361] General Electric (GE) Energy D20Substation Controller D20ME TFTP Connection Remote Overflow
6381| [78360] General Electric (GE) D20ME Remote Terminal Unit TFTP Connection Configuration File Unauthenticated Remote Disclosure
6382| [78353] Rockwell Automation FactoryTalk Diagnostics Receiver Service RNADiagReceiver.exe Overly Large Datagram Parsing Remote DoS
6383| [78310] McAfee Security-as-a-Service (SaaS) myCIOScn.dll MyCioScan.Scan.ShowReport() Method Remote Command Execution
6384| [78309] HP LoadRunner magentservice.exe Packet Parsing Remote Overflow
6385| [78287] Siemens Tecnomatix FactoryLink WebClient ActiveX Control Location URL Parameter Parsing Remote Code Execution
6386| [78285] Invensys Wonderware InBatch Multiple ActiveX Control Property Value String Parsing Remote Overflow
6387| [78279] 3S CoDeSys Control Service CmbWebserver.dll Module HTTP Get Request Parsing Arbitrary Directory Creation
6388| [78253] NTR ActiveX Control StopModule() Method lModule Parameter Memory Dereference Remote Code Execution
6389| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
6390| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
6391| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
6392| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
6393| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
6394| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
6395| [78040] Tor Unset Nickname Configuration Local Hostname Remote Information Disclosure
6396| [78039] Tor Bridge Port Configuration Weakness Remote Information Disclosure
6397| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
6398| [77971] Enterasys Network Management Suite Syslog Service nssyslogd.exe PRIO Field Parsing Remote Overflow
6399| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
6400| [77901] Parallels Plesk Panel Control Panel Multiple Script HTTPOnly Flag Set-Cookie Header Remote Information Disclosure
6401| [77899] Parallels Plesk Panel Control Panel client@1/domain@1/backup/local-repository/ HTTP Response Body Remote Password Disclosure
6402| [77892] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/view/ cmd Parameter XSS
6403| [77891] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/rename/ Multiple Parameter XSS
6404| [77890] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/permissions/ fname Parameter XSS
6405| [77889] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/edit/ Multiple Parameter XSS
6406| [77888] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/create-dir/ cmd Parameter XSS
6407| [77887] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/ cmd Parameter XSS
6408| [77829] Parallels Plesk Panel Control Panel Multiple Script Remote Email Address Disclosure
6409| [77825] Parallels Plesk Panel Control Panel Multiple Script HTTPOnly Flag Set-Cookie Header Remote Information Disclosure
6410| [77824] Parallels Plesk Panel Control Panel client@2/domain@1/odbc/dsn@1/properties/ HTTP Response Body Remote Password Disclosure
6411| [77816] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/ cmd Parameter XSS
6412| [77811] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/view/ certificateslist Cookie SQL Injection
6413| [77810] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/edit/ PLESKSESSID Cookie SQL Injection
6414| [77809] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/create-file/ psaContext Cookie SQL Injection
6415| [77808] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/ no_frames_login_page Cookie SQL Injection
6416| [77776] TYPO3 typo3/sysext/workspaces/Classes/Controller/AbstractController.php BACK_PATH Parameter Remote File Inclusion
6417| [77739] Hitachi JP1/ServerConductor/DeploymentManager DeploymentManager PXE Mtftp Service Traversal Arbitrary File Access
6418| [77722] Adobe ColdFusion Remote Development Service (RDS) Unspecified XSS
6419| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
6420| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
6421| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
6422| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
6423| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
6424| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
6425| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
6426| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
6427| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
6428| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
6429| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
6430| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
6431| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
6432| [77642] Update Manager Tar File Handling MitM Remote Arbitrary File Overwrite
6433| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
6434| [77456] HP ProtectTools Device Access Manager Multiple Method SidString Variable Length Parsing Remote Memory Corruption
6435| [77397] HP Network Node Manager i nnm/protected/configurationpoll.jsp nodename Parameter XSS
6436| [77386] 3S CoDeSys GatewayService Header Parsing Remote Overflow
6437| [77369] Siemens Automation License Manager (ALM) Multiple Command Parsing NULL Pointer Dereference Remote DoS
6438| [77368] Siemens Automation License Manager (ALM) almsrvx.exe wcscpy_s Request Parsing Remote DoS
6439| [77367] Siemens Automation License Manager (ALM) serialid Field Multiple *_licensekey Command Parsing Remote Overflow
6440| [77212] Merethis Centreon www/include/configuration/nconfigObject/contact/DB-Func.php Password Hash Salt Weakness Rainbow-Table Remote Password Disclosure
6441| [77192] DVR Remote ActiveX Control DVRobot.dll Handling Remote Code Execution
6442| [77091] Zingiri Web Shop Plugin for WordPress /tiny_mce/plugins/ajaxfilemanager/ajax_file_cut.php selectedDoc[] Parameter Remote PHP Code Execution
6443| [76970] IBM WebSphere MQ Stopped Queue Manager Connection Saturation Remote DoS
6444| [76931] Advantech OPC Server ADAM ActiveX Control Unspecified Remote Overflow
6445| [76928] Ajax File and Image Manager /ajaxfilemanager/ajax_create_folder.php Unspecified Multiple Parameter Remote PHP Code Execution
6446| [76911] D-Link DIR-300 Router Manager Unspecified Remote Code Execution
6447| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
6448| [76864] HP TCP/IP Services for OpenVMS SMTP Server Unspecified Remote DoS
6449| [76862] Cisco Unified Communications Manager (CUCM) SIP Message Parsing Remote DoS
6450| [76815] Cisco CiscoWorks Common Services Sybase SQL Anywhere Database Component Request Parsing Remote Information Disclosue
6451| [76783] Magtrb MyNews includes/tiny_mce/plugins/filemanager/classes/FileSystems/RootFileImpl.php basename Parameter Remote File Inclusion
6452| [76782] Magtrb MyNews includes/tiny_mce/plugins/filemanager/classes/CorePlugin.php basename Parameter Remote File Inclusion
6453| [76781] Magtrb MyNews includes/tiny_mce/plugins/imagemanager/classes/ImageManager/ImageManagerPlugin.php basename Parameter Remote File Inclusion
6454| [76780] Magtrb MyNews includes/tiny_mce/plugins/filemanager/classes/FileManager/FileManagerPlugin.php basename Parameter Remote File Inclusion
6455| [76779] Magtrb MyNews includes/tiny_mce/plugins/filemanager/classes/FileManager/FileSystems/ZipFileImpl.php basename Parameter Remote File Inclusion
6456| [76777] CSWorks LiveData Service TCP Packet Parsing Remote DoS
6457| [76775] HP OpenView Network Node Manager ov.dll _OVBuildPath Function Remote Overflow
6458| [76774] HP OpenView Network Node Manager webappmon.exe CGI Remote Overflow
6459| [76773] HP OpenView Network Node Manager nnmRotConfig.exe nameParams Parameter Remote Heap Overflow
6460| [76766] General Electric (GE) Proficy Historian Data Archiver Service Packet Parsing Remote Overflow
6461| [76765] General Electric (GE) Proficy Plant Applications Server License Manager (PRLicenseMgr.exe) Packet Parsing Remote Overflow
6462| [76764] General Electric (GE) Proficy Plant Applications Remote Data Service (PRRDS.exe) Packet Parsing Remote Overflow
6463| [76763] General Electric (GE) Proficy Plant Applications Server Gateway Service (PRGateway.exe) Packet Parsing Remote Overflow
6464| [76735] Digital College includes/tiny_mce/plugins/imagemanager/classes/ImageManager/ImageManagerPlugin.php basepath Parameter Remote File Inclusion
6465| [76734] Digital College includes/tiny_mce/plugins/filemanager/classes/FileSystems/RootFileImpl.php basepath Parameter Remote File Inclusion
6466| [76733] Digital College includes/tiny_mce/plugins/filemanager/classes/FileManager/FileManagerPlugin.php basepath Parameter Remote File Inclusion
6467| [76732] Digital College includes/tiny_mce/plugins/filemanager/classes/FileManager/FileSystems/ZipFileImpl.php basepath Parameter Remote File Inclusion
6468| [76731] Digital College includes/tiny_mce/plugins/imagemanager/config.php basepath Parameter Remote File Inclusion
6469| [76706] HP Data Protector dpnepolicyservice Component LogBackupLocationStatus Method backupLocationStatus Field Remote Code Execution
6470| [76699] Novell ZENworks Configuration Management AdminStudio Antique ActiveX Unspecified Remote Issue
6471| [76681] Honeywell EBI Temaline Remote Installer ActiveX Control DownloadURL() Method Handling Arbitrary Program Execution
6472| [76642] phpMyFAQ admin/editor/plugins/ajaxfilemanager/ajax_create_folder.php POST Request Parsing Remote PHP Code Execution
6473| [76621] IBM Lotus Sametime Configuration Servlet Authentication Weakness Remote Configuration Data Disclosure
6474| [76538] Oracle PeopleSoft Enterprise Human Resource Management System (HRMS) Job Profile Manager (JPM) Component Unspecified Remote Issue
6475| [76536] Oracle PeopleSoft Enterprise Human Resource Management System (HRMS) Talent Acquisition Manager Component Unspecified Remote Information Disclosure
6476| [76527] Oracle E-Business Suite REST Services Component Unspecified Remote Applications Framework Data Disclosure
6477| [76492] Oracle WebLogic Server Web Services Component Unspecified Remote Information Disclosure
6478| [76463] Oracle Solaris Network Services Library (libnsl(3LIB)) Component Unspecified Remote Information Disclosure
6479| [76404] Open Automation Software OPC Systems.NET OPCSystemsService.exe .NET RPC Packet Parsing Remote DoS
6480| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
6481| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
6482| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
6483| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
6484| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
6485| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
6486| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
6487| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
6488| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
6489| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
6490| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
6491| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
6492| [76159] European Security Services GPS Login Module Admin Control Panel Authentication Bypass
6493| [76084] Cisco Firewall Services Module (FWSM) Authentication Request Saturation Remote DoS
6494| [76083] Cisco Firewall Services Module (FWSM) IPv6 Syslog Message 302015 Log Generation Remote Memory Corruption
6495| [76069] Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS
6496| [75985] Symantec IM Manager Management Console Unspecified Remote Code Execution
6497| [75978] Lumension Device Control Unspecified Remote Memory Corruption
6498| [75931] Red Hat Package Manager (RPM) lib/header.c regionSwab() Function Region Offset RPM Package Handling Remote Memory Corruption
6499| [75930] Red Hat Package Manager (RPM) lib/header.c headerLoad() Function Region Offset RPM Package Handling Remote Overflow
6500| [75799] Sunway ForceControl SNMP NetDBServer Packet Handling Remote DoS
6501| [75798] Sunway ForceControl SNMP NetDBServer Multiple Remote Overflows
6502| [75796] Sunway ForceControl AngelServer Packet Handling Multiple Remote DoS
6503| [75795] Sunway ForceControl AngelServer Packet 8 Handling Remote Overflow
6504| [75722] IceWarp Mail Server phpinfo() Function PHP Configuration Remote Information Disclosure
6505| [75613] JBoss Multiple Product Web Services Native DTD Parsing Remote DoS
6506| [75607] HP Business Service Automation Essentials Unspecified Remote Code Execution
6507| [75571] Measuresoft ScadaPro service.exe Multiple Command Remote Command Execution
6508| [75569] Rockwell Automation RSLogix 5000 / FactoryTalk Services Platform RnaUtility.dll rna Packet Parsing Remote Overflow
6509| [75559] Google Chrome Use-after-free Focus Controller Remote Code Execution
6510| [75486] Measuresoft ScadaPro service.exe Multiple Boundary Error Command Parsing Remote Overflow
6511| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
6512| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
6513| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
6514| [75294] SmarterStats Services/SiteAdmin.asmx Unspecified Parameters String Data XML Injection Remote DoS
6515| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
6516| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
6517| [75265] Spring Security Race Condition RunAsManager Remote Privilege Escalation
6518| [75250] Microsoft IE Unspecified Remote Code Execution
6519| [75240] Linux Kernel Stream Control Transmission Protocol (SCTP) Packet Handling Remote DoS
6520| [75232] Novell Cloud Manager RPC Session Initialization Weakness Remote Code Execution
6521| [75206] Juniper IDP Appliance Configuration Manager Unspecified XSS
6522| [75118] CruxCMS manager/processfile.php Arbitrary File Upload Remote Code Execution
6523| [75117] CruxCMS manager/processeditor.php Arbitrary File Upload Remote Code Execution
6524| [75087] TP-LINK TL-WR740N WebConsole / UPnP Services Packet Saturation Remote DoS
6525| [75085] Movavi Video Suite ConvertManager.dll Module Image File Handling Remote Memory Corruption
6526| [75054] Unidesk /Uni.Web/Reporting/Default.aspx ReportingService Session Credential Verification Weakness Remote Information Disclosure
6527| [75022] Control Microsystems ClearSCADA dbserver.exe Unauthenticated Diagnostic Remote Information Disclosure
6528| [74967] CA Total Defense Web Management Service management.asmx Module getDBConfigSettings() Method Remote Server Database Credentials Disclosure
6529| [74923] Intel Active System Console / Multi-Server Manager Unspecified Remote DoS
6530| [74889] OneBridge Multiple Products iMailGateway Service ECTrace.dll Authentication Logging Remote Format String
6531| [74775] Cisco Unified Communications Manager SIP INVITE Message Parsing Remote DoS
6532| [74774] Cisco Unified Communications Manager Media Termination Points Session Description Protocol (SDP) SIP Call Parsing Remote DoS
6533| [74545] RealPlayer ActiveX Control Unspecified Remote Code Execution
6534| [74533] IBM Tivoli Federated Identity Manager OpenID Relying-party Cookie Deletion Remote Trust Restriction Bypass
6535| [74531] IBM Tivoli Federated Identity Manager OpenID Relying-Party OP-Identifier Login Rejection Remote Authentication Bypass
6536| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6537| [74509] HP ProLiant SL Advanced Power Manager User Validation Unspecified Remote DoS
6538| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
6539| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
6540| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
6541| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
6542| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
6543| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
6544| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
6545| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
6546| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
6547| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
6548| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
6549| [74396] Microsoft Report Viewer Control Unspecified XSS
6550| [74348] ManageEngine ServiceDesk Plus FileDownload.jsp Unauthenticated Remote File Access
6551| [74340] HP Photo Creative audio.Record.1 ActiveX Control (ContentMan.dll) Remote Overflow
6552| [74322] Trend Micro Control Manager En_Utility.dll HandleMcpRequest() Function Blob Data Parsing Overflow
6553| [74318] Trend Micro Control Manager WebApp/widget/proxy_request.php module Parameter Traversal Arbitrary File Access
6554| [74262] Apache HTTP Server Multi-Processing Module itk.c Configuration Merger mpm-itk root UID / GID Remote Privilege Escalation
6555| [74143] MiniSSDPd Cache-control Packet Parsing Out-of-bounds Read Remote DoS
6556| [74031] CiscoKits/CertificationKits TFTP Service READ Request Parsing Remote DoS
6557| [73975] Sun Integrated Lights Out Manager Sun Fire / Blade Unspecified Remote Issue
6558| [73974] Sun Integrated Lights Out Manager Unspecified Remote Issue
6559| [73970] Oracle SPARC Enterprise M Series XSCF Control Package SSH Unspecified Remote Issue
6560| [73969] Oracle Application Server Oracle BPEL Process Manager Unspecified Remote DoS
6561| [73933] Oracle Enterprise Manager Grid Control CMDB Metadata &
6562| [73931] Oracle Enterprise Manager Grid Control Streams, AQ &
6563| [73910] Oracle PeopleSoft Enterprise Human Resource Management System (HRMS) Talent Acquisition Manager Unspecified Remote Information Disclosure
6564| [73909] Oracle PeopleSoft Enterprise Human Resource Management System (HRMS) Talent Acquisition Manager Unspecified Remote Issue
6565| [73869] Brocade BigIron RX Switches Access Control List Remote Bypass
6566| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
6567| [73761] AR Web Content Manager (AWCM) header.php theme_file Parameter Remote File Inclusion
6568| [73760] AR Web Content Manager (AWCM) includes/window_top.php theme_file Parameter Remote File Inclusion
6569| [73742] Likewise Open / Enterprise lsassd Service Remote DoS
6570| [73727] RealityServer Web Services RTMP Server NULL Pointer Remote DoS
6571| [73715] Altigen VoIP Phone System Gateway Service Port Scan Remote DoS
6572| [73645] Siemens SIMATIC S7 Controllers Unspecified Encoded Password Remote Disclosure
6573| [73637] PORTech MV-372 VoIP GSM Gateway Telnet Service Password Parsing Remote DoS
6574| [73501] IBM Lotus Quickr Services for Lotus Domino on AIX Atom Feed Subscription Remote DoS
6575| [73500] IBM Lotus Quickr Services for Lotus Domino Native Authentication Offline User Remote DoS
6576| [73499] IBM Lotus Quickr Services for Lotus Domino Calendar Entry Access Remote DoS
6577| [73498] IBM Lotus Quickr Services for Lotus Domino Connector Document Checkout Remote DoS
6578| [73497] IBM Lotus Quickr Services for Lotus Domino Connector Item Deletion Remote DoS
6579| [73496] IBM Lotus Quickr Services for Lotus Domino resources.nsf Image Request URL Remote DoS
6580| [73476] IBM Lotus Quickr Services for Lotus Domino Download Link Click Remote DoS
6581| [73434] Asterisk Multiple Products Manager Interface manager.c Originate Action Remote Command Execution
6582| [73431] Ubisoft CoGSManager ActiveX Control Initialize() Method Language Library File Construction Overflow
6583| [73422] NETGEAR ProSafe WNAP210 recreate.php Configuration Page Remote Authentication Bypass
6584| [73405] Asterisk manager.c Manager Session Invalid Data Saturation Remote DoS
6585| [73391] Intel Ethernet 10 Gigabit Ethernet Controllers Unspecified Remote DoS
6586| [73386] IBM WebSphere Application Server (WAS) Web Services SAAJ Encrypted SOAP Message Remote DoS
6587| [73252] Zope PluggableAuthService (PAS) ZODBUserManager.py updateUser() Method User Login Name Change Duplication
6588| [73246] Apache Subversion mod_dav_svn Path-based Access Control Rule Handling Remote DoS
6589| [73227] IBM Web Content Manager (WCM) Authoring Tool Draft Creation Remote Access Restriction Bypass
6590| [73226] IBM Web Content Manager (WCM) StackOverflowError Exception Race Condition Remote DoS
6591| [73209] HP Insight Control for Linux Unspecified Remote Privilege Escalation
6592| [73142] Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Arbitrary Remote Firmware Upload
6593| [73124] Sunway ForceControl Web Server (httpsvr.exe) URI Handling Remote Overflow
6594| [73108] HP Service Manager / Service Center Unspecified Authenticated XSS
6595| [73107] HP Service Manager / Service Center Unspecified XSS
6596| [73105] HP Service Manager / Service Center HTTP Credentials Unspecified Session Hijacking
6597| [73103] HP Service Manager / Service Center Unspecified Local Access Restriction Bypass
6598| [73089] Trend Micro Control Manager /commoncgi/servlet/CCGIServlet ApHost Parameter XSS
6599| [72989] Control Microsystems ClearSCADA Unspecified Remote Heap Overflow
6600| [72960] Microsoft SMB Client Response Handling Remote Code Execution
6601| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
6602| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
6603| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
6604| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
6605| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
6606| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
6607| [72874] ICONICS GENESIS32 / GENESIS64 GenBroker.exe Service Unspecified Remote DoS
6608| [72869] Advantech/Broadwin WebAccess webvrpcs.exe Service Remote Code Execution
6609| [72830] 7-Technologies Interactive Graphical SCADA System (IGSS) IGSSdataServer Service Multiple Unspecified Remote DoS
6610| [72818] ICONICS GENESIS32 / GENESIS64 GenBroker Service Multiple Remote Memory Corruption
6611| [72817] ICONICS GENESIS32 / GENESIS64 GenBroker Service Multiple Remote Overflows
6612| [72815] Siemens Tecnomatix FactoryLink vrn.exe Service Multiple Remote Overflows
6613| [72813] Siemens Tecnomatix FactoryLink Multiple Services Remote DoS
6614| [72812] Siemens Tecnomatix FactoryLink CSService Remote Overflow
6615| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
6616| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
6617| [72626] Symantec Alert Management System (AMS) ntel Alert Originator Service (iao.exe) Message Handling Remote Overflow
6618| [72624] Symantec Alert Management System (AMS) Intel Alert Handler Service (HDNLRSVC.EXE) CreateProcess UNC Path Injection Remote Code Execution
6619| [72623] Symantec Alert Management System (AMS) AMSLIB.dll Module Handler Service (HNDLRSVC) Remote Overflow
6620| [72616] Cisco Wireless LAN Controller (WLC) Crafted ICMP Packet Sequence Remote DoS
6621| [72612] Cisco Unified Communications Manager Malformed SIP Message Unspecified Remote DoS (2011-1606)
6622| [72611] Cisco Unified Communications Manager Malformed SIP Message Unspecified Remote DoS (2011-1605)
6623| [72610] Cisco Unified Communications Manager Malformed SIP Message Memory Exhaustion Remote DoS
6624| [72604] Cisco TelePresence Multipoint Switch (CTMS) Crafted Real-Time Transport Control Protocol (RTCP) UDP Packet Handling Remote DoS
6625| [72592] Cisco TelePresence Spoofed SOAP / Manager Request Remote DoS
6626| [72582] Cisco Multiple Products Malformed Skinny Client Control Protocol (SCCP) Message Handling Remote DoS
6627| [72573] HP StorageWorks Virtual SAN Appliance Hydra Service (hydra.exe) Login Request Handling Remote Overflow
6628| [72559] IBM Lotus Domino NRouter Service Calendar Request Attachment Name Parsing Remote Code Execution
6629| [72524] HP Data Protector Cell Manager Service (crs.exe) Unspecified Authentication Bypass
6630| [72519] Control Group Configuration Library (libcgroup / libcg) tools/tools-common.c parse_cgroup_spec Function Overflow
6631| [72402] Citrix Multiple Products ActiveSync Service (ctxactivesync.exe) Packet Handling Remote DoS
6632| [72389] Keyfax Customer Response Management Multiple Configuration File Cleartext Credential Remote Disclosure
6633| [72291] NetOp Remote Control DWS File Handling Overflow
6634| [72098] LDAP Account Manager templates/login.php selfserviceSaveOk Parameter XSS
6635| [72007] SAP Management Console (SAP MC) Unspecified Remote Service Restart DoS
6636| [71967] HP Network Node Manager i (NNMi) Unspecified Remote Access Restriction Bypass
6637| [71950] Oracle OpenSSO Enterprise / Sun Java System Access Manager Authentication Unspecified Remote Information Disclosure
6638| [71949] Oracle OpenSSO Enterprise / Sun Java System Access Manager Authentication Unspecified Remote Issue
6639| [71944] Oracle Sun Java System Access Manager Policy Agent Web Proxy Agent Unspecified Remote DoS
6640| [71921] Oracle JD Edwards EnterpriseOne Server / Tools Enterprise Infrastructure SEC JDENet Service Packet Parsing Access Violation Remote DoS
6641| [71918] Oracle JD Edwards EnterpriseOne Server / Tools Enterprise Infrastructure SEC JDENet Service Packet Parsing Remote Overflow
6642| [71908] Oracle PeopleSoft Enterprise HRMS Talent Acquisition Manager Unspecified Remote Issue
6643| [71872] Novell ZENworks Configuration Management ZAM File Upload Traversal Remote Code Execution
6644| [71856] Microsoft IIS Status Header Handling Remote Overflow
6645| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
6646| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
6647| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
6648| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
6649| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
6650| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
6651| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
6652| [71624] Apple iOS / TV Stateless Address Autoconfiguration (SLAAC) Functionality IPv6 Remote MAC Address Disclosure
6653| [71585] HP Network Node Manager i (NNMi) Unspecified Remote Information Disclosure
6654| [71040] Citrix XenApp / XenDesktop Unspecified XML Service Interface Remote Code Execution
6655| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
6656| [70852] Novell iPrint Server LPD ilprsrvd Service Remote Overflow
6657| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
6658| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
6659| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
6660| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
6661| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
6662| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
6663| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
6664| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
6665| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
6666| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
6667| [70758] Aruba Mobility Controller Crafted 802.11 Wireless Probe Request Frame Remote DoS
6668| [70722] Cisco Content Services Gateway Second Generation Crafted TCP Packet Unspecified Remote DoS (2011-0350)
6669| [70721] Cisco Content Services Gateway Second Generation Crafted TCP Packet Unspecified Remote DoS (2011-0349)
6670| [70621] HP OpenView Storage Data Protector Cell Manager (crs.exe) Multiple Message Type Remote Overflow
6671| [70617] HP Data Protector Manager rds.exe Packet Size Handling Remote DoS
6672| [70581] Oracle PeopleSoft and JDEdwards Suite PeopleSoft Enterprise HRMS Talent Acquisition Manager Unspecified Remote Information Disclosure
6673| [70579] Oracle Sun Products Suite Sun Java System Access Manager / Oracle OpenSSO Components Unspecified Remote Issue
6674| [70576] Oracle PeopleSoft and JDEdwards Suite PeopleSoft Enterprise HRMS Talent Acquisition Manager Unspecified Remote Issue
6675| [70574] Oracle PeopleSoft and JDEdwards Suite PeopleSoft Enterprise HRMS eProfile - Manager Desktop Unspecified Remote Information Disclosure
6676| [70566] Oracle Supply Chain Products Suite Transportation Manager UI Infrastructure Unspecified Remote Information Disclosure
6677| [70552] Oracle Fusion Middleware Services for Beehive voice-servlet/prompt-qa/Index.jspf Filename Null Byte Remote Code Execution
6678| [70540] Oracle Enterprise Manager Grid Control Real User Experience Insight Processing SQL Injection
6679| [70512] Oracle Sun Java System Identity Manager Unspecified Remote Issue
6680| [70474] HP OpenView Network Node Manager (OV NNM) nnmRptConfig.exe Invalid Template Name Remote Format String
6681| [70473] HP OpenView Network Node Manager (OV NNM) nnmRptConfig.exe Multiple Parameter Remote Overflow
6682| [70472] HP OpenView Network Node Manager (OV NNM) ovutil.dll COOKIE Variable Remote Overflow
6683| [70471] HP OpenView Network Node Manager (OV NNM) OVAS Service ovas.exe Multiple Overflows
6684| [70470] HP OpenView Network Node Manager (OV NNM) ovwebsnmpsrv.exe ovutil.dll stringToSeconds Function Remote Overflow
6685| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
6686| [70428] Sybase EAServer Unspecified Arbitrary Web Service Remote Installation
6687| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
6688| [70366] WellinTech KingView nettransdll.dll Module HistorySvr.exe Service Request Handling Remote Buffer Overflow
6689| [70348] Cisco IOS CallManager Express (CME) SIP TRUNK Traffic Rate Burst Request Size Remote DoS
6690| [70347] Cisco IOS SCCP Telephony Control Application (STCAPP) Shared Line Multiple Call Port Hang Remote DoS
6691| [70344] Cisco Adaptive Security Appliances (ASA) Mobile User Security Service HTTP HEAD Request Remote Information Disclosure
6692| [70341] Cisco IOS CallManager Express (CME) Extension Mobility Phone SNR Number Change Remote DoS
6693| [70259] IBM Tivoli Access Manager WebSEAL Shift-reload Action Remote DoS
6694| [70181] Rocket U2 Multiple Products unirpc32.dll Uni RPC Service (unirpcd.exe) Packet Header Remote Overflow
6695| [70098] IBM Lotus Mobile Connect Connection Manager HTTP-AS http.device.stanza Blacklist User-Agent Header Remote Access Restriction Bypass
6696| [70097] IBM Lotus Mobile Connect Connection Manager HTTP-AS TCP Connection Timing Hole Remote DoS
6697| [70096] IBM Lotus Mobile Connect Connection Manager Multiple Session VPN ID Reference Count Remote DoS
6698| [70095] IBM Lotus Mobile Connect Connection Manager Mobile Network Connections HTTP-AS TCP Connection Saturation Remote DoS
6699| [70077] Oracle Database Server Java Virtual Machine SecurityManager Implementation Race Condition Remote Code Execution
6700| [70071] Oracle E-Business Suite Applications Manager Unspecified Remote Issue
6701| [70020] IBM WebSphere Service Registry and Repository (WSRR) EJB Interface API Request Access Control Restriction Bypass
6702| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
6703| [69975] Symantec Endpoint Protection Manager Reporting Module fw_charts.php Remote Code Execution
6704| [69967] Solar FTP Server sfsservice.exe Multiple Command Remote DoS
6705| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
6706| [69936] Invensys Wonderware InBatch lm_tcp Service Crafted TCP Request Remote Overflow DoS
6707| [69873] Novell iManager com.novell.nps.serviceProviders.PortalModuleInstallManager Servlet Arbitrary File Upload
6708| [69828] Microsoft IE Recursive Select Element Remote Code Execution
6709| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
6710| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
6711| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
6712| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
6713| [69295] Apple Mac OS X Directory Services Password Validation Unspecified Remote Overflow
6714| [69294] Apple Mac OS X Directory Services Disabled Mobile Account Valid Account Name Remote Authentication Bypass
6715| [69214] IBM WebSphere Application Server (WAS) Web Services Security Crafted JAX-WS Request Remote DoS
6716| [69186] HP Insight Control Server Migration Unspecified Remote Data Manipulation
6717| [69185] HP Insight Control Server Migration Unspecified Remote Privilege Escalation
6718| [69182] HP Insight Control Virtual Machine Management Unspecified Access Restriction Bypass Remote DoS
6719| [69178] HP Insight Control Performance Management Unspecified Remote Privilege Escalation
6720| [69167] Google Chrome Text Control Selection Use-after-free Remote DoS
6721| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
6722| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
6723| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
6724| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
6725| [68954] Oracle WebLogic Node Manager Service Arbitrary File Access
6726| [68907] HP Version Control Repository Manager Unspecified XSS
6727| [68862] HP Systems Insight Manager Unspecified Remote Privilege Escalation (2010-3290)
6728| [68760] clearBudget controller.class.php actionPath Parameter Remote File Inclusion
6729| [68679] SAP BusinessObjects dswsbobje/services/biplatform URI GenerateCuids SOAPAction numCuids Value Remote DoS
6730| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
6731| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
6732| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
6733| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
6734| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
6735| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
6736| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
6737| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
6738| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
6739| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
6740| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
6741| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
6742| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
6743| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
6744| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
6745| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
6746| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
6747| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
6748| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
6749| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
6750| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
6751| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
6752| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
6753| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
6754| [68407] IBM DB2 UDB Relational Data Services Component UDF / Stored Procedure Memory Leak Remote DoS
6755| [68406] IBM DB2 UDB Relational Data Services Component Connection Concentrator Memory Leak Remote DoS
6756| [68402] IBM DB2 UDB DRDA Services Component CLI Prepared Statement Remote DoS
6757| [68399] IBM Tivoli Storage Manager (TSM) FastBack Mount Service FastBackMount.exe UDP Packet Field Multiple Request Arbitrary Code Execution
6758| [68396] IBM Tivoli Storage Manager (TSM) FastBack Server FastBackServer.exe _CalcHashValueWithLength Function Remote DoS
6759| [68395] IBM Tivoli Storage Manager (TSM) FastBack Server FastBackServer.exe _DAS_ReadBlockReply Function Remote DoS
6760| [68265] MODx manager/controllers/default/resource/tvs.php class_key Parameter Traversal Local File Inclusion
6761| [68218] HP OpenView Network Node Manager (OV NNM) Unspecified Remote DoS
6762| [68206] Cisco Unified Communications Manager (CUCM) SIP REFER Request Invalid Refer-To Header Remote DoS
6763| [68204] Cisco Unified Communications Manager (CUCM) Crafted UDP SIP Registration Traffic Remote DoS
6764| [68189] Embedded Media Field Module for Drupal Video Content Access Control Mechanism Remote Bypass
6765| [68187] Lightbox2 Module for Drupal Video Content Access Control Mechanism Remote Bypass
6766| [68158] Hitachi Multiple Products JP1/Remote Control Agent File Transfer Feature Remote Authentication Bypass
6767| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
6768| [68046] MailEnable SMTP Service (MESMTPC.exe) RCPT TO Command Domain Name Remote DoS
6769| [68045] MailEnable SMTP Service (MESMTPC.exe) MAIL FROM Command Email Address Remote DoS
6770| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
6771| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
6772| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
6773| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
6774| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
6775| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
6776| [67970] IBM Records Manager URI Session Token Referer Log File Remote Disclosure
6777| [67936] RSA Access Manager Agent Adaptive Authentication Integration Remote Authentication Bypass
6778| [67935] RSA Access Manager Server Cache Update Weakness Remote Information Disclosure
6779| [67801] DiY-CMS modules/guestbook/blocks/control.block.php lang Parameter Remote File Inclusion
6780| [67790] Zope ZServer PluggableAuthService (PAS) Private Page Request Saturation Remote DoS
6781| [67680] IBM DB2 Universal Database DRDA Services Component SQL Stored Procedure Unspecified Remote DoS
6782| [67565] Cisco Unified Communications Manager SIPStationInit Malformed SIP Message Remote DoS
6783| [67564] Cisco Unified Communications Manager SendCombinedStatusInfo Malformed SIP REGISTER Message Remote DoS
6784| [67560] Cisco Unified Presence Engine Service Malformed SIP SUBSCRIBE Message Remote DoS
6785| [67469] Red Hat Enterprise Virtualization Virtual Desktop Server Manager SSL Session TCP Connection Remote DoS
6786| [67456] Download-Engine spaw_control.config.php Multiple Parameter Remote File Inclusion
6787| [67335] Linux Kernel Controller Area Network net/can/bcm.c Broadcast Manager Implementation Multiple Local Overflows
6788| [67328] HP OpenView Network Node Manager (OV NNM) Unspecified Remote Code Execution
6789| [67292] IBM Tivoli Storage Manager (TSM) FastBack Mount Service Unspecified Memory Corruption
6790| [67290] IBM Tivoli Storage Manager (TSM) FastBack Server Client Message Handling Remote DoS
6791| [67289] IBM Tivoli Storage Manager (TSM) FastBack Mount Shell Message Handling Remote Code Execution
6792| [67212] KnowledgeTree Web Service Document Upload Manager ktwebservice/KTUploadManager.inc.php Arbitrary File Upload
6793| [67195] Cisco Application Control Engine (ACE) SIP Inspection Feature Crafted Packet Remote DoS
6794| [67194] Cisco Application Control Engine (ACE) SSL Packet Sequence Remote DoS
6795| [67193] Cisco Application Control Engine (ACE) Deep Packet Inspection Feature Crafted HTTP Packet Remote DoS
6796| [67192] Cisco Application Control Engine (ACE) RTSP Inspection Feature Crafted Packet Remote DoS
6797| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
6798| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
6799| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
6800| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
6801| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
6802| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
6803| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
6804| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
6805| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
6806| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
6807| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
6808| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
6809| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
6810| [66969] Cisco Firewall Services Module (FWSM) Multi-mode Unspecified Remote DoS
6811| [66968] Cisco Firewall Services Module (FWSM) SunRPC Inspection Feature Crafted SunRPC Message Remote DoS (2010-2820)
6812| [66967] Cisco Firewall Services Module (FWSM) SunRPC Inspection Feature Crafted SunRPC Message Remote DoS (2010-2819)
6813| [66966] Cisco Firewall Services Module (FWSM) SunRPC Inspection Feature Crafted SunRPC Message Remote DoS (2010-2818)
6814| [66932] HP OpenView Network Node Manager (OV NNM) webappmon.exe OvJavaLocale Cookie Value Handling Remote Overflow
6815| [66842] Wind River Systems' VxWorks WDB Debug Service Remote Arbitrary Memory Manipulation
6816| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
6817| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
6818| [66365] Oracle Fusion Middleware Application Server Control Component Unspecified Remote Issue (2010-2381)
6819| [66347] Oracle E-Business Suite Applications Manager Component Unspecified Remote Issue (2010-0913)
6820| [66339] Oracle E-Business Suite Applications Manager Component Unspecified Remote Issue (2010-0905)
6821| [66332] Oracle Secure Backup obscheduled.exe Service Command Handling Remote Code Execution
6822| [66326] Oracle Fusion Middleware Application Server Control Unspecified Remote Issue (2010-0081)
6823| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
6824| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
6825| [66091] Cisco Content Services Switch (CSS) Crafted ClientCert-* Header Remote Authentication Bypass
6826| [65893] Cisco Adaptive Security Appliances (ASA) IPv6 Packet IP Service Exposure Remote Access Restriction Bypass
6827| [65833] Hitachi JP1/ServerConductor / DeploymentManager DPM Client Service Unspecified DoS
6828| [65738] Novell iManager /nps/servlet/webacc/ Tree Parameter Off-by-One Remote DoS
6829| [65565] Apple Mac OS X Printer Setup Printing Service Name Unicode Character Remote DoS
6830| [65552] HP OpenView Network Node Manager (OV NNM) ovwebsnmpsrv.exe jovgraph.exe CGI main() Function Remote Code Execution
6831| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
6832| [65283] Cisco Application Extension Platform (AXP) Configuration Disclosure Remote Privilege Escalation
6833| [65282] Cisco Network Building Mediator Remote Configuration File Disclosure
6834| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
6835| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
6836| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
6837| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
6838| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
6839| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
6840| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
6841| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
6842| [64995] EMC Avamar gsan Service Crafted TCP Packet Handling Remote DoS
6843| [64976] HP OpenView Network Node Manager (OV NNM) getnnmdata.exe CGI Multiple Parameter Remote Code Execution
6844| [64975] HP OpenView Network Node Manager (OV NNM) snmpviewer.exe CGI Multiple Variable Remote Code Execution
6845| [64974] HP OpenView Network Node Manager (OV NNM) netmon sel CGI Variable Remote Code Execution
6846| [64973] HP OpenView Network Node Manager (OV NNM) ovet_demandpoll sel CGI Variable Format String Remote Code Execution
6847| [64906] 3Com Intelligent Management Center imcws/services/listServices Configuration File Access
6848| [64857] ManageEngine ADManager Plus jsp/admin/tools/remote_share.jsp computerName Parameter XSS
6849| [64700] WebSAM DeploymentManager Packet Handling Unspecified Remote DoS
6850| [64604] 29o3 CMS lib/layout/layoutManager.php LibDir Parameter Remote File Inclusion
6851| [64600] openMairie openCourrier obj/service.class.php path_om Parameter Remote File Inclusion
6852| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
6853| [64390] Consona CRM Suite Repair Service tgsrv.exe Predictable Timestamp Field Remote Privilege Escalation
6854| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
6855| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
6856| [64248] ZiMB Manager ZiMB Core Component for Joomla! index.php controller Parameter Traversal Arbitrary File Access
6857| [64178] openMairie openAnnuaire obj/service.class.php path_om Parameter Remote File Inclusion
6858| [64147] HP Systems Insight Manager Unspecified Remote Privilege Escalation (2010-1038)
6859| [64122] IBM WebSphere MQ Channel Process Incorrect Control Data Remote DoS
6860| [64073] Sun Ray Server Software Device Services Unspecified Remote Code Execution
6861| [64055] HP Insight Control Virtual Machine Manager Multiple Unspecified Issues
6862| [63954] openMairie openRegistreCIL /obj/service.class.php path_om Parameter Remote File Inclusion
6863| [63931] HP Operations Manager on Windows SourceView ActiveX (srcvw32.dll / srcvw4.dll) LoadFile() Method Remote Overflow
6864| [63838] Oracle Sun Product Suite Sun Java System Access Manager Component / OpenSSO Unspecified Remote Issue
6865| [63775] Oracle E-Business Suite HRMS (Self Service) Unspecified Remote Information Disclosure
6866| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
6867| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
6868| [63679] Jproject Manager Component for Joomla! index.php controller Parameter Traversal Local File Inclusion
6869| [63611] CA XOsoft entry_point.aspx Service String Handling Remote Overflow
6870| [63412] Novell ZENworks Configuration Management Remote Management UploadServlet Arbitrary Code Execution
6871| [63411] Novell ZENworks Configuration Management Preboot Service Unspecified Arbitrary Code Execution
6872| [63359] Apple Mac OS X DesktopServices Path Resolution Weakness Unspecified Remote Information Disclosure
6873| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
6874| [63258] 3ds Max Backburner Manager Long String Remote DoS
6875| [63197] AdvertisementManager cgi/index.php req Parameter Remote File Inclusion
6876| [63177] Cisco IOS Unified Communications Manager Express SCCP Message Handling Unspecified Remote DoS (CSCsz49741)
6877| [63176] Cisco IOS Unified Communications Manager Express SCCP Message Handling Unspecified Remote DoS (CSCsz48614)
6878| [63165] Lexmark Multiple Products FTP Service Exception Handler Flood Protection Remote DoS
6879| [63140] Apache Thrift Service Malformed Data Remote DoS
6880| [62955] Campsite conf/liveuser_configuration.php GLOBALS[g_campsiteDir] Parameter Remote File Inclusion
6881| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
6882| [62790] Download Protect Admin/ResellersManager.class.php GLOBALS[RootPath] Parameter Remote File Inclusion
6883| [62761] Cisco Unified Communications Manager CTI Manager Message Handling Remote DoS
6884| [62760] Cisco Unified Communications Manager Malformed SIP Message Handling Remote DoS (CSCtc62362)
6885| [62759] Cisco Unified Communications Manager Malformed SIP Message Handling Remote DoS (CSCtc37188)
6886| [62758] Cisco Unified Communications Manager Malformed SCCP Message Handling Remote DoS (CSCtc47823)
6887| [62757] Cisco Unified Communications Manager Malformed SCCP Message Handling Remote DoS (CSCtc38985)
6888| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
6889| [62606] All In One Control Panel (AIOCP) cp_html2xhtmlbasic.php page Parameter Remote File Inclusion
6890| [62595] BKAV eOffice IMAP Service Crafted Mail Remote Code Execution
6891| [62590] EesySec Personal Firewall FTP Service USER Command Remote Overflow
6892| [62587] Hitachi JP1/Cm2/Network Node Manager Remote Console on WIndows File Permission Weakness Unspecified Local Privilege Escalation
6893| [62569] Symantec Altiris Deployment Solution dbmanager.exe Use-after-free Multiple Request Remote DoS
6894| [62511] CA Service Desk Tomcat host-manager/html/add name Parameter XSS
6895| [62432] Cisco Multiple Products SCCP Inspection Malformed Skinny Control Message Handling Remote DoS
6896| [62282] Interspire Knowledge Manager admin/remote.php v Parameter Arbitrary PHP Code Execution
6897| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
6898| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
6899| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
6900| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
6901| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
6902| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
6903| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
6904| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
6905| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
6906| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
6907| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
6908| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
6909| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
6910| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
6911| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
6912| [62154] IBM WebSphere Service Registry and Repository (WSRR) Property Query Unspecified Remote Data Access
6913| [61989] NetSupport Manager Gateway Malformed HTTP Request Remote DoS
6914| [61988] Hybrid2 IRC Services MemoServ Service Private Message Remote DoS
6915| [61738] Oracle E-Business Suite HRMS (Self Service) Unspecified Remote Information Disclosure
6916| [61734] Oracle Application Server Access Manager Identity Server Unspecified Remote Issue
6917| [61723] Oracle Secure Backup Service Daemon (observiced.exe) Connection Reverse Lookup Remote Overflow
6918| [61720] Oracle BEA WebLogic Server Web Services Unspecified Remote Issue
6919| [61719] Oracle BEA WebLogic Server Web Services Unspecified Remote Information Disclosure
6920| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
6921| [61511] Liferay Portal Control Panel Plugins Configuration p_p_id Parameter XSS
6922| [61458] Abbreviations Manager Component for Joomla! index.php controller Parameter Traversal Local File Inclusion
6923| [61435] Net Transport Download Manager eDonkey OP_LOGINREQUEST Packet Handling Remote Overflow
6924| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
6925| [61336] Polipo http_parse.c httpParseHeaders Function Cache-Control Header Remote DoS
6926| [61206] HP Storage OpenView Data Protector Backup Client Service MSG_PROTOCOL Command Remote Overflow
6927| [61205] HP Storage OpenView Data Protector Cell Manager _rm32.rm_getMem() Function Remote Overflow
6928| [60934] HP OpenView Network Node Manager (OV NNM) Unspecified Remote Code Execution (2009-0898)
6929| [60933] HP OpenView Network Node Manager (OV NNM) Snmp.exe CGI Oid Parameter Remote Overflow
6930| [60932] HP OpenView Network Node Manager (OV NNM) ovwebsnmpsrv.exe CGI sel Parameter Remote Overflow
6931| [60931] HP OpenView Network Node Manager (OV NNM) snmpviewer.exe CGI Host Header Handling Remote Overflow
6932| [60930] HP OpenView Network Node Manager (OV NNM) ovalarm.exe CGI Accept-Language Header Handling Remote Overflow
6933| [60929] HP OpenView Network Node Manager (OV NNM) OvWebHelp.exe CGI Topic Parameter Remote Overflow
6934| [60928] HP OpenView Network Node Manager (OV NNM) webappmon.exe CGI Host Header Handling Remote Overflow
6935| [60927] HP OpenView Network Node Manager (OV NNM) ovsessionmgr.exe CGI Multiple Parameter Remote Overflow
6936| [60926] HP OpenView Network Node Manager (OV NNM) nnmRptConfig.exe CGI Template Parameter Multiple Remote Overflows
6937| [60925] HP OpenView Network Node Manager (OV NNM) Unspecified Remote Code Execution (2009-3847)
6938| [60924] HP OpenView Network Node Manager (OV NNM) ovlogin.exe CGI Multiple Parameter Remote Overflow
6939| [60903] Sun Ray Server Software Authentication Manager Unspecified Remote DoS
6940| [60852] HP Application Recovery Manager OmniInet Process MSG_PROTOCOL Packet Handling Remote Overflow
6941| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
6942| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
6943| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
6944| [60589] Novell eDirectory dhost.exe NDS Verb 0x1 Service Request Handling Remote Overflow
6945| [60576] Citadel/UX Configuration Import Remote Overflow
6946| [60575] ColdFusion MX Remote Development Service (RDS) Default Null Password
6947| [60471] Web Services Module for Drupal API Access Control Unspecified Weakness
6948| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
6949| [60399] VERITAS Tivoli Storage Manager (TSM) Bare Metal Restore (BMR) Unspecified Remote Privilege Escalation
6950| [60375] IBM solidDB Database Service (solid.exe) Malformed Error Code Remote DoS
6951| [60349] Etype EServ NNTP Service Large Request Remote DoS
6952| [60348] Etype EServ SMTP Service Large Request Remote DoS
6953| [60347] Etype EServ POP3 Service Large Request Remote DoS
6954| [60346] Etype EServ FTP Service Large Request Remote DoS
6955| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
6956| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
6957| [60276] Majordomo which_access Default Configuration Remote Information Disclosure
6958| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
6959| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
6960| [60095] Cisco Catalyst Switch Optical Service Module (OSM) Malformed Packet Remote DoS
6961| [60054] Sun JRE Java Virtual Machine (JVM) java.security.AccessController doPrivileged Method Remote DoS
6962| [60048] Compaq Tru64 Multiple Service Port Scan Remote DoS
6963| [60042] Switch Off swnet.dll Service Management Port Dual CRLF Sequence Remote DoS
6964| [60018] osCommerce Online Merchant Admin Console file_manager.php Remote Privilege Escalation
6965| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
6966| [59984] Apple Mac OS X DirectoryService Server Unspecified Remote Code Execution
6967| [59957] Microsoft Windows SMB Response Handling Remote DoS
6968| [59892] Microsoft IIS Malformed Host Header Remote DoS
6969| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
6970| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
6971| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
6972| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
6973| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
6974| [59821] HP-UX cmcld Service Port Scan Remote DoS
6975| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
6976| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
6977| [59778] IBM AIX PowerHA Cluster Management Unspecified Remote Configuration Manipulation
6978| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
6979| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
6980| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
6981| [59685] Sun Virtual Desktop Infrastructure (VDI) VirtualBox Web Service Unspecified Remote Authentication Bypass
6982| [59684] HP Power Manager Web Server URL Parameter Handling Remote Overflow
6983| [59664] MSN Messenger Service Invite Request Feature Invitation-Cookie Parameter Remote DoS
6984| [59651] XEROX DocuTech Default Configuration Multiple Unecessary Service Weakness
6985| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
6986| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
6987| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
6988| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
6989| [59321] Aruba Mobility Controller Wireless Association Request Frame Remote DoS
6990| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
6991| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
6992| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
6993| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
6994| [59155] SMC 8014 4WG-SI Wireless Router 'Back Up Configuration File' Function Cleartext Admin Credential Remote Disclosure
6995| [59115] Oracle Database Workspace Manager Unspecified Remote Issue
6996| [59112] Oracle Database Workspace Manager SYS.LTRIC (WMSYS.LTRIC) Unspecified Remote Issue
6997| [59072] Websense Email Security / Personal Email Manager Web Administrator STEMWADM.EXE GET Request Remote DoS
6998| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
6999| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
7000| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
7001| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
7002| [58418] Adobe Photoshop Elements Active File Monitor V8 Service Discretionary Access Control List Local Privilege Escalation
7003| [58399] Microsoft IE window.print Function Loop Remote DoS
7004| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
7005| [58344] Cisco Unified Communications Manager Malformed SIP Packet Processing Remote DoS
7006| [58335] Cisco IOS Unified Communications Manager Express (CME) Extension Mobility Feature Login Component Remote Overflow
7007| [58171] All In One Control Panel (AIOCP) cp_html2txt.php page Parameter Remote File Inclusion
7008| [58150] Cisco CatOS View-based Access Control MIB (VACM) read-write Community String Device Configuration Manipulation
7009| [58124] Aurora CMS add-ons/modules/sysmanager/plugins/install.plugin.php AURORA_MODULES_FOLDER Parameter Remote File Inclusion
7010| [58007] Novell ZENworks Configuration Management Unspecified Remote Issue
7011| [57898] HP Operations Manager Unspecified Remote Issue
7012| [57842] IBM Tivoli Identity Manager Self Service UI Console Profile Change Last Name Field XSS
7013| [57838] Ipswitch WhatsUp Gold NMWebService.exe Unspecified Remote DoS
7014| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
7015| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
7016| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
7017| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
7018| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
7019| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
7020| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
7021| [57646] Specimen Image Database taxonservice.php dir Parameter Remote File Inclusion
7022| [57645] RIM Lotus Notes Connector for BlackBerry Desktop Manager lnresobject.dll ActiveX OBJECT Element Remote DoS
7023| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
7024| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
7025| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
7026| [57546] Novell eDirectory iManager Failed Authentication Remote DoS
7027| [57509] Google Chrome Malformed Protocol Handler Configuration document.location Property Remote DoS
7028| [57508] Mozilla Firefox Malformed Protocol Handler Configuration document.location Property Remote DoS
7029| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
7030| [57475] Google Chrome Tooltip Manager (chrome/views/tooltip_manager.cc) Tag Attribute Handling Remote DoS
7031| [57473] IBM WebSphere Commerce Suite Net.Commerce / Net.Data Components Remote Configuration File Disclosure
7032| [57456] Cisco Unified Communications Manager SIP Packet Processing Unspecified Remote DoS
7033| [57455] Cisco Unified Communications Manager SCCP Packet Handling Unspecified Remote DoS
7034| [57454] Cisco Unified Communications Manager Embedded Firewall Network Connection Saturation Remote DoS
7035| [57453] Cisco Unified Communications Manager SIP Trunk Malformed Packet Handling Remote DoS
7036| [57452] Cisco Unified Communications Manager Unspecified SIP Packet Handling Remote DoS
7037| [57372] Solaris Print Service (in.lpd(1M)) Unspecified Remote DoS
7038| [57296] Feindt Computerservice News (News-Script) newsadmin.php action Parameter Remote File Inclusion
7039| [57283] ChilliSpot Radius Service-Type Reply Attribute Remote DoS
7040| [57257] Cisco Firewall Services Module (FWSM) Malformed ICMP Packet Handling Remote DoS
7041| [57103] MAXcms includes/file_manager/special.php fm_includes_special Parameter Remote File Inclusion
7042| [57099] MAXcms includes/inc.thcms_admin_mediamanager.php GLOBALS[thCMS_root] Parameter Remote File Inclusion
7043| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
7044| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
7045| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
7046| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
7047| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
7048| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
7049| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
7050| [56851] Services Module for Drupal Signed Request Timeout Weakness Replay Attack Remote Privilege Escalation
7051| [56841] Apple Mac OS X launchd Service Connection Saturation Remote DoS
7052| [56834] CA Multiple Products Data Transport Services Library (dtscore.dll) Token Searching Routine Remote Overflow
7053| [56815] Sun Java System Access Manager AMConfig.properties com.iplanet.services.debug.level Property Cleartext Credentials Local Disclosure
7054| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
7055| [56702] Cisco Wireless LAN Controllers (WLC) Admin Web Interface Malformed Request Remote DoS
7056| [56701] Cisco Wireless LAN Controllers (WLC) SSH Management Connection Memory Exhaustion Remote DoS
7057| [56700] Cisco Wireless LAN Controllers (WLC) /screens/frameset.html Malformed Authorization Header Remote DoS
7058| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
7059| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
7060| [56652] RealEstateManager Component for Joomla! toolbar_ext.php mosConfig_absolute_path Parameter Remote File Inclusion
7061| [56647] VehicleManager Component for Joomla! toolbar_ext.php mosConfig_absolute_path Parameter Remote File Inclusion
7062| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
7063| [56500] Common Controls Replacement Project (CCRP) FolderTreeview (FTV) ActiveX (ccrpftv6.ocx) CCRP.RootFolder Property Remote DoS
7064| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
7065| [56404] Google Android services/java/com/android/server/PackageManagerService.java PackageManagerService Class Application Data Access
7066| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
7067| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
7068| [56237] IBM Tivoli Identity Manager Console / Self Service Interface Session Fixation
7069| [56125] Crysis HTTP/XML-RPC Service Crafted Request Uninitialized Pointer Remote DoS
7070| [56097] HP ProCurve Threat Management Services zl Module (J9155A) httpd Unspecified Remote DoS (PR_18770)
7071| [56096] HP ProCurve Threat Management Services zl Module (J9155A) Unspecified Remote DoS (PR_39412)
7072| [56095] HP ProCurve Threat Management Services zl Module (J9155A) Unspecified Remote DoS (PR_39898)
7073| [55996] Novell Privileged User Manager unifid.exe Service spf RPC Request Library Injection Arbitrary Code Execution
7074| [55902] Oracle E-Business Suite Applications Manager HTTP Unspecified Remote Information Disclosure
7075| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
7076| [55839] Wyse Device Manager (WDM) Server (hserver.dll) / HAgent (hagent.exe) Components Remote Overflow
7077| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
7078| [55550] IBM Tivoli Identity Manager Self-Service UI Interface XSS
7079| [55470] DM FileManager dm-albums/template/album.php SECURITY_FILE Parameter Remote File Inclusion
7080| [55451] Sun Java System Access Manager Cross-Domain Controller (CDC) Unspecified XSS
7081| [55411] Samba smbd/posix_acls.c acl_group_override Function Remote Access Control List Modification
7082| [55347] Cisco Video Surveillance Stream Manager xvcrman Process Malformed UDP Packet Remote DoS
7083| [55342] Perception LiteServe HTTP Service Malformed URL Decoding Remote DoS
7084| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
7085| [55274] OpenAFS Client on Unix Cache Manager RX Response Handling Remote Overflow
7086| [55273] OpenAFS Client on Linux Cache Manager RX Response Handling Remote DoS
7087| [55269] Microsoft IIS Traversal GET Request Remote DoS
7088| [55247] HP OpenView Network Node Manager (OV NNM) SNMP / MIB rping Utility Remote Overflow
7089| [55197] Mozilla Firefox nsViewManager.cpp TinyMCE Interaction Remote DoS
7090| [55137] Apple Mac OS X DirectoryService Connection Saturation Remote DoS
7091| [55061] IBM WebSphere MQ Queue Manager Crafted Request Remote Overflow
7092| [55032] CUPS Scheduler Directory-services Functionality Browse Packet Timing Remote DoS
7093| [54968] eBay Enhanced Picture Services ActiveX (EPUWALcontrol.dll) PictureUrls Property Arbitrary Command Execution
7094| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
7095| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
7096| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
7097| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
7098| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
7099| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
7100| [54831] SafeNet SoftRemote IKE VPN Service (ireIke.exe) UDP Packet Handling Overflow
7101| [54673] Nortel Contact Center Manager Server Crafted SOAP Request Remote Connected User Password Disclosure
7102| [54628] Prelude Manager Configuration File Permission Weakness Local Database Password Disclosure
7103| [54443] Apple Mac OS X Launch Services Crafted Mach-O Executable Remote DoS
7104| [54396] LimeSurvey /admin/remotecontrol/ Unspecified Remote Command Execution
7105| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
7106| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
7107| [54222] HP OpenView Network Node Manager (OV NNM) Unspecified Arbitrary Remote Code Execution
7108| [54200] Quagga bgpd/bgp_aspath.c bgpd Service 4-byte ASN Data Handling Remote DoS
7109| [54158] Symantec Multiple Products Intel Alert Originator Service (IAO.EXE) memcpy() Function Remote Overflow
7110| [54107] HP OpenView Network Node Manager (OV NNM) ovalarmsrv.exe Crafted Command Handling Remote Overflow
7111| [53945] Symantec Brightmail Gateway Control Center Unspecified Remote Privilege Escalation
7112| [53797] Cisco Subscriber Edge Services Manager (SESM) Unspecified URI XSS
7113| [53764] Oracle BEA WebLogic Server Web Services Unspecified Remote Issue
7114| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
7115| [53741] Oracle Application Server Oracle Process Manager and Notification (opmn) Daemon POST URI Handling Remote Format String
7116| [53736] Oracle Database Cluster Ready Services Unspecified Remote DoS
7117| [53733] Oracle Database Workspace Manager LTADM Unspecified Remote Issue
7118| [53732] Oracle Database Workspace Manager Unspecified Remote Issue (CVE-2009-0975)
7119| [53727] Oracle Database Workspace Manager Unspecified Remote Issue (CVE-2009-0972)
7120| [53725] Oracle Database Resource Manager Plan Name Parameter Remote Overflow
7121| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
7122| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
7123| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
7124| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
7125| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
7126| [53596] HP ProCurve Manager Unauthorized Remote Data Access
7127| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
7128| [53434] IBM Tivoli Storage Manager (TSM) Client Event Message Remote Overflow DoS
7129| [53431] IBM Tivoli Storage Manager (TSM) Web Admin Client Unspecified Memory Access Violation Remote DoS
7130| [53429] IBM Tivoli Storage Manager (TSM) HTTP commethod Functionality Port Scan Remote DoS
7131| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
7132| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
7133| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
7134| [53243] HP OpenView Network Node Manager (OV NNM) Accept-Language HTTP Header Handling Remote Overflow
7135| [53240] HP OpenView Network Node Manager (OV NNM) ovlaunch CGI Host Header Remote Overflow
7136| [53236] HP OpenView Network Node Manager (OV NNM) ovlaunch.exe Configuration Information Disclosure
7137| [53222] HP OpenView Network Node Manager (OV NNM) Toolbar.exe Remote Overflow
7138| [53221] HP OpenView Network Node Manager (OV NNM) ovlaunch.exe Remote Overflow
7139| [53220] HP OpenView Network Node Manager (OV NNM) getcvdata.exe Remote Overflow
7140| [53219] HP OpenView Network Node Manager (OV NNM) ov.dll Remote Overflow
7141| [53218] HP OpenView Network Node Manager (OV NNM) OpenView5.exe Remote Overflow
7142| [53216] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Malformed Input Remote DoS
7143| [53215] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Remote Format String
7144| [53172] Sun Java JDK / JRE Lightweight HTTP Server Implementation JAX-WS Service Endpoint Crafted Connection Remote DoS
7145| [53164] Sun Java JDK / JRE LDAP Service LdapCtx Connection Persistence Remote DoS
7146| [53151] Sun Java System Identity Manager Resource Adapters Password Control Character Arbitrary Command Execution
7147| [53150] Sun Java System Identity Manager System Configuration Object Access Restriction Bypass
7148| [53134] Cisco IOS Cisco Tunneling Control Protocol (cTCP) Easy VPN (EZVPN) Server Memory Consumption Remote DoS
7149| [53133] Cisco IOS Voice Services Unspecified SIP Message Handling Remote DoS
7150| [53073] Ixprim mod/nc_phpmyadmin/core/libraries/Theme_Manager.class.php Unspecified Parameter Remote File Inclusion
7151| [53053] Quick Classifieds controlpannel/setUp.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7152| [53052] Quick Classifieds controlpannel/mailadmin.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7153| [53051] Quick Classifieds controlpannel/index.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7154| [53050] Quick Classifieds controlpannel/createT.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7155| [53049] Quick Classifieds controlpannel/createS.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7156| [53048] Quick Classifieds controlpannel/createP.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7157| [53047] Quick Classifieds controlpannel/createNews.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7158| [53046] Quick Classifieds controlpannel/createM.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7159| [53045] Quick Classifieds controlpannel/createL.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7160| [53044] Quick Classifieds controlpannel/createHomepage.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7161| [53043] Quick Classifieds controlpannel/createFeatured.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7162| [53042] Quick Classifieds controlpannel/createdb.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7163| [53041] Quick Classifieds controlpannel/color_help.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7164| [53040] Quick Classifieds controlpannel/alterTheme.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7165| [53039] Quick Classifieds controlpannel/alterNews.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7166| [53038] Quick Classifieds controlpannel/alterHomepage.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7167| [53037] Quick Classifieds controlpannel/alterFeatured.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7168| [53036] Quick Classifieds controlpannel/alterCats.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7169| [53035] Quick Classifieds controlcenter/verify.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7170| [53034] Quick Classifieds controlcenter/userSet.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7171| [53033] Quick Classifieds controlcenter/update.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7172| [53032] Quick Classifieds controlcenter/sign-up.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7173| [53031] Quick Classifieds controlcenter/remember.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7174| [53030] Quick Classifieds controlcenter/pass.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7175| [53028] Quick Classifieds controlcenter/index.php3 DOCUMENT_ROOT Parameter Remote File Inclusion
7176| [52955] Acute Control Panel themes/header.php theme_directory Parameter Remote File Inclusion
7177| [52954] Acute Control Panel themes/container.php theme_directory Parameter Remote File Inclusion
7178| [52921] Telecom Italy Alice Messenger Hp.Revolution.RegistryManager.dll ActiveX WriteRegistry Method Remote Registry Manipulation
7179| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
7180| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
7181| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
7182| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
7183| [52617] IBM Tivoli Storage Manager (TSM) Express adsmdll.dll Length Value Handling Remote Overflow
7184| [52591] WMI Mapper for HP Systems Insight Manager Unspecified Remote Information Disclosure
7185| [52577] Sun Fire X2100 / X2200 Embedded Lights Out Manager (ELOM) Unspecified Remote Privilege Escalation (6648082)
7186| [52576] Sun Fire X2100 / X2200 Embedded Lights Out Manager (ELOM) Unspecified Remote Privilege Escalation (6633175)
7187| [52564] Fujitsu Enhanced Support Facility HRM-S Service Client Connection Remote Information Disclosure
7188| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
7189| [52506] Belkin BullDog Plus UPS-Service HTTP Server Authentication Remote Overflow
7190| [52466] Joomla! configuration.php Variable Overwrite Remote File Inclusion
7191| [52396] Ol' Bookmarks Manager frame.php framefile Parameter Remote File Inclusion
7192| [52390] Cisco Session Border Controller (SBC) Crafted TCP Packet Remote DoS
7193| [52387] Cisco ACE Application Control Engine Crafted SNMPv3 Packet Remote DoS
7194| [52386] Cisco ACE Application Control Engine Crafted SNMPv1 Packet Remote DoS
7195| [52385] Cisco ACE Application Control Engine Crafted SSH Packet Remote DoS
7196| [52316] Cisco Security Manager IPS Event Viewer (IEV) Unspecified TCP Port Exposure Remote Privilege Escalation
7197| [52268] Broadcast Machine ViewController.php controllers/baseDir Parameter Remote File Inclusion
7198| [52267] Broadcast Machine VideoController.php controllers/baseDir Parameter Remote File Inclusion
7199| [52266] Broadcast Machine SetupController.php controllers/baseDir Parameter Remote File Inclusion
7200| [52265] Broadcast Machine SQLController.php controllers/baseDir Parameter Remote File Inclusion
7201| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
7202| [52178] Page Engine CMS includes/configuration.inc.php fPrefix Parameter Remote File Inclusion
7203| [51993] WebBiscuits Modules Controller adminhead.php path[docroot] Parameter Remote File Inclusion
7204| [51967] Apple Mac OS X servermgrd (Server Manager) Authentication Bypass Configuration Modification
7205| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
7206| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
7207| [51774] Meet#Web ManagerRightsResource.class.php root_path Parameter Remote File Inclusion
7208| [51773] Meet#Web ManagerResource.class.php root_path Parameter Remote File Inclusion
7209| [51762] Xnova includes/todofleetcontrol.php ugamela_root_path Parameter Remote File Inclusion
7210| [51729] FlatnuX CMS filemanager.php _FNROOTPATH Parameter Remote File Inclusion
7211| [51604] Sun Java System Application Server Multiple Directory Web Application Configuration File Remote Access
7212| [51515] Ganglia gmetad Service Path Request Subversion Remote DoS
7213| [51391] Cisco Application Control Engine Global Site Selector (GSS) dnsserver Crafted DNS Request Remote DoS
7214| [51339] Oracle Secure Backup observiced.exe Malformed NDMP Packet Remote DoS
7215| [51329] Oracle E-Business Suite Applications Framework System Configuration Remote Information Disclosure
7216| [51262] Cisco Application Control Engine Global Site Selector (GSS) dnsserver Crafted DNS Requests Remote DoS
7217| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
7218| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
7219| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
7220| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
7221| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
7222| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
7223| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
7224| [50367] Google Hack Honeypot (GHH) File Upload Manager index.php delall Action Remote File Deletion
7225| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
7226| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
7227| [50277] OpenPegasus WBEM Services (tog-pegasus) on Red Hat Linux Access Control Reversion Weakness
7228| [50243] Adobe Reader Download Manager Unspecified Remote Internet Security Options Manipulation
7229| [50125] IBM Tivoli Access Manager WebSEAL webseald Daemon Crafted HTTP Message Handling Remote DoS
7230| [50076] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Multiple Remote Overflows
7231| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
7232| [50032] EMC Control Center SAN Manager SST_SENDFILE Request Arbitrary File Access
7233| [49922] OpenVMS FINGERD Service Request String Handling Remote Overflow
7234| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
7235| [49850] OTManager CMS Admin/ADM_Pagina.php Tipo Parameter Remote File Inclusion
7236| [49831] HP Service Manager (HPSM) Unspecified Privilege Escalation
7237| [49767] Sun Java System Identity Manager /idm/includes/helpServer.jsp ext parameter Arbitrary Remote File Access
7238| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
7239| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
7240| [49572] Dada Mail Manager Component for Joomla! config.dadamail.php mosConfig_absolute_path Parameter Remote File Inclusion
7241| [49480] InstallShield Update Service Agent isusweb.dll ActiveX ExecuteRemote Call 404 Response DoS
7242| [49470] CA ARCserve Backup Database Engine Service (asdbapi.dll) Unspecified Crafted Request Remote DoS
7243| [49469] CA ARCserve Backup Tape Engine Service (asdbapi.dll) Unspecified Crafted Request Remote DoS
7244| [49383] Avaya SIP Enablement Services (SES) Server Remote Management Interface Core Router Update Request Remote DoS
7245| [49299] Oracle JDE EnterpriseOne Business Service Server Unspecified Remote Issue
7246| [49265] HP OpenView Multiple Products Shared Trace Service Crafted RPC Request Handling Remote DoS
7247| [49190] HP Systems Insight Manager Unspecified Remote Information Disclosure
7248| [49103] Nortel Multimedia Communication Server 5100 Client Manager UNIStim FTP Multiple Method Remote DoS
7249| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
7250| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
7251| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
7252| [48944] Adobe Flash Player Access Control Dialog Remote Security Bypass (ClickJacking)
7253| [48935] Avaya Communication Manager Backup History Arbitrary Remote Command Execution
7254| [48934] Avaya Communication Manager Set Static Routes Arbitrary Remote Command Execution
7255| [48931] Avaya Communication Manager Unspecified Remote Information Disclosure
7256| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
7257| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
7258| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
7259| [48735] Cisco IOS Fragmented Skinny Call Control Protocol (SCCP) Packet Saturation Remote DoS
7260| [48711] Cisco IOS Intrusion Prevention System (IPS) SERVICE.DNS Engine Signature Processing Remote DoS
7261| [48703] Dell PowerEdge RAID Controller 5 Series Vulnerability Scan Remote DoS
7262| [48606] DATAC RealWin Crafted INFOTAG / SET_CONTROL Packet Handling Remote Overflow
7263| [48529] Libra File Manager fileadmin.php isadmin Variable Remote File Access
7264| [48481] OpenVPN Multiple Crafted Configuration Directive Unspecified Arbitrary Remote Command Execution
7265| [48300] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Unspecified Remote DoS (2)
7266| [48299] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Unspecified Remote DoS (1)
7267| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
7268| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
7269| [48148] IBM DB2 Universal Database JDBC Applet Server Service (db2jds) Unspecified Remote DoS
7270| [48141] phpRealty manager/static/view.php INC Parameter Remote File Inclusion
7271| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
7272| [47791] Civic Website Manager Calendar Control Unspecified XSS
7273| [47711] Oracle E-Business Suite Oracle Report Manager Unspecified Remote Issue
7274| [47708] Oracle Database / Enterprise Manager Instance Management Unspecified Remote HTTP Issue
7275| [47515] European Performance Systems (EPS) Probe Builder Service (PBOVISServer.exe) Unspecified Opcode Arbitrary Remote Process Termination
7276| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
7277| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
7278| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
7279| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
7280| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
7281| [47273] HP-UX System Administration Manager Unspecified Remote Security Bypass
7282| [47264] Blue Coat K9 Web Protection Filter Service (k9filter.exe) HTTP Version Response Handling Remote Overflows
7283| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
7284| [46833] Fedora Linux NetworkManager wpa_supplicant wpa_printf Function WPA2 Network Remote Overflow
7285| [46765] JBoss Application Server JMX Console Access Control (JMXOpsAccessControlFilter) Race Condition Remote Privilege Escalation
7286| [46603] Avaya SIP Enablement Services (SES) Web Admin Interface Local Data View Configuration Arbitrary Command Execution
7287| [46602] Avaya SIP Enablement Services (SES) Web Admin Interface Server Configuration Information Disclosure
7288| [46582] Avaya Communication Manager Web Interface Data Viewing Configuration Unspecified Arbitrary Code Execution
7289| [46309] Linux Kernel Datagram Congestion Control Protocol (DCCP) Subsystem Remote Overflow
7290| [46261] Crysis HTTP/XML-RPC Service Malformed HTTP Request Remote DoS
7291| [46233] HP Instant Support ActiveX (HPISDataManager.dll) MoveFile() Method Remote Overflow
7292| [46232] HP Instant Support ActiveX (HPISDataManager.dll) GetFileTime() Method Remote Overflow
7293| [46231] HP Instant Support ActiveX (HPISDataManager.dll) ExtractCab() Method Remote Overflow
7294| [46149] Sun Java System Access Manager Unspecified Remote Authentication Bypass
7295| [46105] CitectSCADA ODBC Service Packet Handling Remote Stack Buffer Overflow
7296| [46089] VMware openwsman Management Service Content-Length Processing Remote Overflow
7297| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
7298| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
7299| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
7300| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
7301| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
7302| [46043] Motion webhttpd.c read_client() Function Motion HTTP Control Interface Remote Overflow
7303| [46028] Cisco PIX / ASA Control-plane ACLs Unspecified Remote Bypass
7304| [46013] CA Secure Content Manager HTTP Gateway Service (icihttp.exe) LIST Command Response Handling Overflow
7305| [46012] CA Secure Content Manager HTTP Gateway Service (icihttp.exe) PASV Command Overflow
7306| [45824] CCProxy Telnet Proxy Service Ping Command Remote Overflow
7307| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
7308| [45715] EMC AlphaStor Library Manager robotd Remote Arbitrary Command Execution
7309| [45689] CiscoWorks Common Services Unspecified Remote Code Execution
7310| [45610] IBM Lotus Sametime Community Services Multiplexer (StMux.exe) Remote Overflow
7311| [45538] Der Dirigent backend/inc/class.filemanager.php this_dir Parameter Remote File Inclusion
7312| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
7313| [45509] air_filemanager Extension for TYPO3 Unspecified File Filtering Remote Code Execution
7314| [45483] News Manager db/connect_str.php Direct Request Remote Information Disclosure
7315| [45482] News Manager login/info.php Direct Request Remote Information Disclosure
7316| [45469] Cisco IOS Common Network Service Remote Version Disclosure (PSIRT-1255024833)
7317| [45466] Oracle Unspecified Service Remote Memory Leak (7892711)
7318| [45463] News Manager ch_readalso.php read_xml_include Parameter Remote File Inclusion
7319| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
7320| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
7321| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
7322| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
7323| [45307] Aruba Mobility Controller TACACS Authentication Component Unspecified Authenticated Remote Privilege Escalation
7324| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
7325| [45220] Cisco Unified Presence Engine Service Malformed IP Packet Processing Remote DoS (CSCsh20972)
7326| [45219] Cisco Unified Presence Engine Service Malformed IP Packet Processing Remote DoS (CSCsh50164)
7327| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
7328| [45216] Cisco Unified Presence SIP Proxy Service TCP Port Scan Remote DoS
7329| [45206] Cisco Unified Communications Manager SIP JOIN Message Handling Remote DoS
7330| [45204] Cisco Unified Communications Manager SIP INVITE Handling Remote DoS (CSCsk46944)
7331| [45203] Cisco Unified Communications Manager SIP INVITE Handling Remote DoS (CSCsl22355)
7332| [45143] Cisco Building Broadband Service Manager (BBSM) AccessCodeStart.asp msg Parameter XSS
7333| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
7334| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
7335| [44972] Solaris Print Service Unspecified Remote DoS (6599950)
7336| [44971] Solaris Print Service Unspecified Remote Code Execution (6599100)
7337| [44970] Solaris Print Service Unspecified Remote Code Execution (6599099)
7338| [44827] Animal Shelter Manager Unspecified Remote Authentication Bypass
7339| [44801] Invensys Wonderware InTouch SuiteLink Service (slssvc.exe) Crafted Registration Packet Remote DoS
7340| [44654] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Request Handling NULL Dereference Remote DoS
7341| [44609] CA Secure Content Manager eCSqdmn Crafted TCP Packets Remote DoS
7342| [44587] Oracle Enterprise Manager master_peer Agent SNMP Monitoring Malformed Request Remote DoS
7343| [44562] CA BrightStor ARCserve Backup Discovery Service Crafted TCP Packet Handling Remote DoS
7344| [44544] ICQ Personal Status Manager boxelyRenderer Module Crafted Message Remote Overflow
7345| [44497] Oracle Application Server Dynamic Monitoring Service HTTP Unspecified Remote Issue
7346| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
7347| [44455] Borland InterBase Database Service (ibserver.exe) Crafted Opcode Request Remote Overflow
7348| [44422] Cisco Network Admission Control (NAC) CAS / CAM Error Log Shared Secret Remote Disclosure
7349| [44418] EMC DiskXtender File System Manager RPC Interface Remote Overflow
7350| [44361] HP OpenView Network Node Manager (OV NNM) ovtopmd Crafted Packet Remote DoS
7351| [44360] HP OpenView Network Node Manager (OV NNM) ovalarmsrv Malformed Multi-line Request Remote DoS
7352| [44268] Ignite Realtime Openfire ConnectionManagerImpl.java Queue Handling Remote DoS
7353| [44235] HP OpenView Network Node Manager (OV NNM) ovspmd.exe Crafted TCP Request Remote Overflow
7354| [44161] McAfee Common Management Agent (CMA) Framework Service Crafted Request Remote DoS
7355| [44061] Mitsubishi Electric GB-50 / GB-50A Web Controller servlet/MIMEReceiveServlet setRequest Command Remote DoS
7356| [44039] Borland CaliberRM StarTeam Multicast Service (STMulticastService) PGMWebHandler::parse_request Remote Overflow
7357| [43992] HP OpenView Network Node Manager (OV NNM) oavs.exe ovwparser.dll HTTP GET Request Remote Overflow
7358| [43853] SurgeMail IMAP Service LIST Command Argument Handling Remote Overflow
7359| [43852] SurgeMail IMAP Service LSUB Command Argument Handling Remote Overflow
7360| [43845] OpenVMS SSH TCP/IP Services Unspecified Remote Privilege Escalation
7361| [43783] Firebird Services API Remote Server Log (firebird.log) Disclosure
7362| [43776] Eltima Software RunService ActiveX (RunService.dll) Unspecified Remote DoS
7363| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
7364| [43638] ASUS Remote Console (ARC) DPC Proxy Service (DpcProxy.exe) Remote Overflow
7365| [43526] Perforce Server Perforce Service (p4s.exe) Multiple Command Invalid Memory Access Remote DoS
7366| [43487] CA eTrust ITM (Threat Manager) Predictable Log File Remote Information Disclosure
7367| [43486] CRS Manager Multiple Script DOCUMENT_ROOT Parameter Remote File Inclusion
7368| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
7369| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
7370| [43279] Sun Java System Identity Manager /idm/help/index.jsp helpUrl Variable Remote Frame Injection
7371| [43149] RemotelyAnywhere HTTP Service /img/ XSS
7372| [43148] RemotelyAnywhere RAMaint Service Path Subversion Local Privilege Escalation
7373| [43063] Versant Object Database VERSANTD Service Remote Command Execution
7374| [43015] Snom 320 SIP Phone snomControl.swf Call A Number Field Remote DoS
7375| [43010] Belkin F5D7230-4 Router Control Panel Remote Authentication Bypass
7376| [42961] Cisco Secure Access Control Server (ACS) CSuserCGI.exe Multiple Remote Overflows
7377| [42911] Hosting Controller accountmanager.asp sortfield Parameter SQL Injection
7378| [42909] Hosting Controller File Upload Remote Privilege Escalation
7379| [42900] ExtremeZ-IP File and Print Server ExtremeZ-IP.exe Apple Filing Protocol (AFP) Service Remote DoS
7380| [42898] ExtremeZ-IP File and Print Server ExtremeZ-IP.exe Service Location Protocol (SLP) Service Crafted Packet Remote DoS
7381| [42860] Client Software WinComLPD Total LPDService.exe Control File Name Handling Overflow
7382| [42857] Titan FTP Server Administration Service USER / PASS Command Remote Overflow
7383| [42740] MailEnable IMAP Service (MEIMAPS.EXE) Multiple Commands Remote Overflow DoS
7384| [42739] MailEnable IMAP Service (MEIMAPS.EXE) Multiple Commands Remote Overflow
7385| [42666] Shadowed Portal control.php mod_root Parameter Remote File Inclusion
7386| [42650] Gesytec Easylon OPC Server OLE for Process Control (OPC) Unspecified Remote Code Execution
7387| [42574] Barryvan Compo Manager main.php pageURL Parameter Remote File Inclusion
7388| [42188] DBHcms mod.extmanager.php extmanager_install Parameter Remote File Inclusion
7389| [42112] Print Manager Plus PQCore.exe Packet Handling Remote Overflow DoS
7390| [42044] ManageEngine Applications Manager monitorType.do Remote Security Bypass
7391| [42043] ManageEngine Applications Manager Invalid URI Remote Information Disclosure
7392| [42039] ManageEngine Applications Manager jsp/ThresholdActionConfiguration.jsp Multiple Parameter XSS
7393| [42003] ACDSee Photo Manager Crafted XBM File Handling Remote Overflow
7394| [41992] Hitachi SEWB3/PLATFORM Messaging Service Data Handling Remote DoS
7395| [41991] Hitachi EUR Print Manager Unexpected Data Service Termination DoS
7396| [41978] Symantec Veritas Storage Foundation Administrator Service (vxsvc.exe) Remote Overflow
7397| [41977] Symantec Veritas Storage Foundation Scheduler Service (VxSchedService.exe) Malformed Traffic Remote DoS
7398| [41948] OpenLDAP slapd BDB Backend modrdn.c modrdn Operation NOOP Control Remote DoS
7399| [41835] LookStrike Lan Manager modules\class\tournament\TreeSingle.php sys_conf[path][real] Parameter Remote File Inclusion
7400| [41834] LookStrike Lan Manager modules\class\tournament\Tree.php sys_conf[path][real] Parameter Remote File Inclusion
7401| [41833] LookStrike Lan Manager modules\class\tournament\TournamentTeam.php sys_conf[path][real] Parameter Remote File Inclusion
7402| [41832] LookStrike Lan Manager modules\class\tournament\Tournament.php sys_conf[path][real] Parameter Remote File Inclusion
7403| [41831] LookStrike Lan Manager modules\class\tournament\RuleTree.php sys_conf[path][real] Parameter Remote File Inclusion
7404| [41830] LookStrike Lan Manager modules\class\tournament\RuleSingle.php sys_conf[path][real] Parameter Remote File Inclusion
7405| [41829] LookStrike Lan Manager modules\class\tournament\RulePool.php sys_conf[path][real] Parameter Remote File Inclusion
7406| [41828] LookStrike Lan Manager modules\class\tournament\RuleBuilder.php sys_conf[path][real] Parameter Remote File Inclusion
7407| [41827] LookStrike Lan Manager modules\class\tournament\Rule.php sys_conf[path][real] Parameter Remote File Inclusion
7408| [41826] LookStrike Lan Manager modules\class\tournament\MatchTeam.php sys_conf[path][real] Parameter Remote File Inclusion
7409| [41825] LookStrike Lan Manager modules\class\tournament\Match.php sys_conf[path][real] Parameter Remote File Inclusion
7410| [41824] LookStrike Lan Manager modules\class\db\db_trees.php sys_conf[path][real] Parameter Remote File Inclusion
7411| [41823] LookStrike Lan Manager modules\class\db\db_tournament_teams.php sys_conf[path][real] Parameter Remote File Inclusion
7412| [41822] LookStrike Lan Manager modules\class\db\db_tournaments.php sys_conf[path][real] Parameter Remote File Inclusion
7413| [41821] LookStrike Lan Manager modules\class\db\db_team_players.php sys_conf[path][real] Parameter Remote File Inclusion
7414| [41820] LookStrike Lan Manager modules\class\db\db_teams.php sys_conf[path][real] Parameter Remote File Inclusion
7415| [41819] LookStrike Lan Manager modules\class\db\db_server_ip.php sys_conf[path][real] Parameter Remote File Inclusion
7416| [41818] LookStrike Lan Manager modules\class\db\db_server_group.php sys_conf[path][real] Parameter Remote File Inclusion
7417| [41817] LookStrike Lan Manager modules\class\db\db_players.php sys_conf[path][real] Parameter Remote File Inclusion
7418| [41816] LookStrike Lan Manager modules\class\db\db_platform.php sys_conf[path][real] Parameter Remote File Inclusion
7419| [41815] LookStrike Lan Manager modules\class\db\db_news.php sys_conf[path][real] Parameter Remote File Inclusion
7420| [41814] LookStrike Lan Manager modules\class\db\db_match_teams.php sys_conf[path][real] Parameter Remote File Inclusion
7421| [41813] LookStrike Lan Manager modules\class\db\db_matches.php sys_conf[path][real] Parameter Remote File Inclusion
7422| [41812] LookStrike Lan Manager modules\class\db\db_games.php sys_conf[path][real] Parameter Remote File Inclusion
7423| [41811] LookStrike Lan Manager modules\class\db\db_double.php sys_conf[path][real] Parameter Remote File Inclusion
7424| [41810] LookStrike Lan Manager modules\class\db\db_alert.php sys_conf[path][real] Parameter Remote File Inclusion
7425| [41809] LookStrike Lan Manager modules\class\db\db_admins.php sys_conf[path][real] Parameter Remote File Inclusion
7426| [41808] LookStrike Lan Manager modules\class\Table.php sys_conf[path][real] Parameter Remote File Inclusion
7427| [41692] IRC Services Remote Registered Guest Nickname DoS
7428| [41628] IBM Informix Storage Manager (ISM) Windows RPC Components XDR Library Multiple Unspecified Remote Overflows
7429| [41604] IBM WebSphere Application Server (WAS) Java Message Service (JMS) Unspecified Remote DoS
7430| [41544] Firebird 1 SVC_attach Function Service Attach Request Remote Overflow
7431| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
7432| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
7433| [41454] OpenSiteAdmin LoginManager.php path Parameter Remote File Inclusion
7434| [41453] OpenSiteAdmin FormManager.php path Parameter Remote File Inclusion
7435| [41450] OpenSiteAdmin FieldManager.php path Parameter Remote File Inclusion
7436| [41449] OpenSiteAdmin DatabaseManager.php path Parameter Remote File Inclusion
7437| [41374] CA BrightStor ARCServe Backup cadbd RPC Service Handle Argument Remote Memory Corruption
7438| [41373] CA BrightStor ARCServe Backup cadbd RPC Service Unspecified Remote Overflow
7439| [41371] CA BrightStor ARCServe Backup Message Queuing Service (LQserver.exe) Queue.dll Arbitrary Remote Code Execution
7440| [41365] BrightStor Hierarchical Storage Manager (HSM) CsAgent Service Commands Multiple Unspecified SQL Injection
7441| [41109] Mike Bobbitt's album.pl Alternative Configuration File Remote Command Execution
7442| [41108] HP OpenView Network Node Manager (OV NNM) ovtopmd Crafted TCP Request Remote DoS
7443| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
7444| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
7445| [41059] Microsoft Windows ARP Saturation Remote DoS
7446| [40868] Novell BorderManager Chained Proxy Authentication Access Control Bypass
7447| [40866] Novell BorderManager Client Trust Application (clntrust.exe) Validation Request Remote Overflow
7448| [40860] Citrix Presentation Server Independent Management Architecture (IMA) Service TCP Packet Handling Remote Overflow
7449| [40846] Sun Ray Server Software (SRSS) Device Manager daemon (utdevmgrd) Unspecified Remote DoS
7450| [40845] Sun Ray Server Software (SRSS) Device Manager daemon (utdevmgrd) Unspecified Remote Directory Manipulation
7451| [40844] Sun SPARC eXtended System Control Facility (XSCF) Control Package (XCP) HTTP Traffic Unspecified Remote DoS
7452| [40843] Sun SPARC eXtended System Control Facility (XSCF) Control Package (XCP) SSH Traffic Unspecified Remote DoS
7453| [40842] Sun SPARC eXtended System Control Facility (XSCF) Control Package (XCP) telnet Traffic Unspecified Remote DoS
7454| [40836] Sun Remote Services (SRS) Proxy Core Package srsexec Local Format String
7455| [40835] Sun Fire X2100/X2200 Embedded Lights Out Manager (ELOM) Unspecified Remote Command Execution
7456| [40815] Solaris Stream Control Transmission Protocol (sctp) Unspecified INIT Processing Remote DoS
7457| [40814] Solaris RPC Services Library (librpcsvc(3LIB)) Unspecified Packet Handling Remote DoS
7458| [40781] SQLiteManager spaw/dialogs/confirm.php spaw_root Parameter Remote File Inclusion
7459| [40750] Sun Java System Identity Manager /idm/user/main.jsp activeControl Parameter XSS
7460| [40710] GoSamba inc_manager.php include_path Parameter Remote File Inclusion
7461| [40588] NetSupport NSM / NSS Initial Connection Setup Configuration Exchange Remote Overflow
7462| [40575] Absolute News Manager .NET pages/default.aspx template Variable Remote File Access
7463| [40572] Hot or Not Clone control/backup/backup.php Direct Request Remote Password Disclosure
7464| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
7465| [40509] Autodesk Backburner Manager Server cmdjob Utility Arbitrary Remote Command Execution
7466| [40481] IBM Tivoli Provisioning Manager OS Deployment HTTP Server Logging Functionality Remote Overflow
7467| [40477] IBM Tivoli Business Service Manager SM_server.log Password Disclosure
7468| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
7469| [40319] Open File Manager ofmnt.exe Long Request Arbitrary Remote Code Execution
7470| [40287] Oracle E-Business Suite Applications Manager Unspecified Remote Information Disclosure
7471| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
7472| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
7473| [40171] Hexamail Server pop3 Service USER Command Remote Overflow
7474| [40168] Sun StorEdge / StorageTek 3510 FC Array FTP Service Remote DoS
7475| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
7476| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
7477| [40067] Oracle Database Workspace Manager Unspecified Remote Issue (DB18)
7478| [40066] Oracle Database Workspace Manager Unspecified Remote Issue (DB17)
7479| [40065] Oracle Database Workspace Manager Unspecified Remote Issue (DB16)
7480| [40064] Oracle Database Workspace Manager Unspecified Remote Issue (DB15)
7481| [40063] Oracle Database Workspace Manager Unspecified Remote Issue (DB14)
7482| [40062] Oracle Database Workspace Manager Unspecified Remote Issue (DB13)
7483| [40061] Oracle Database Workspace Manager Unspecified Remote Issue (DB12)
7484| [40060] Oracle Database Workspace Manager Unspecified Remote Issue (DB11)
7485| [40059] Oracle Database Workspace Manager Unspecified Remote Issue (DB10)
7486| [40058] Oracle Database Workspace Manager Unspecified Remote Issue (DB09)
7487| [40057] Oracle Database Workspace Manager Unspecified Remote Issue (DB08)
7488| [40053] Oracle Database Net Services GIOP Packet Remote Memory Disclosure
7489| [40038] Oracle Database Control HTTP Unspecified Remote Information Disclosure
7490| [40018] Oracle E-Business Suite Applications Manager HTTP Unspecified Remote DoS
7491| [39990] Oracle Database Rules Manager EXFSYS.DBMS_RLMGR_UTL Unspecified Remote Issue
7492| [39963] Oracle PeopleSoft PeopleTools Reporting Run Control Parameters Unspecified Remote Issue
7493| [39948] Oracle E-Business Suite Report Manager Unauthenticated Remote Information Disclosure
7494| [39947] Oracle E-Business Suite iProcurement Self Service Web User Remote Information Disclosure
7495| [39903] RealNetworks Helix DNA Server RTSP Service Crafted Require Header Remote Overflow
7496| [39750] Trend Micro ServerProtect for Windows Agent Service RPCFN_CopyAUSrc Function Remote Overflow
7497| [39744] EMC NetWorker Remote Exec Service (nsrexecd.exe) Remote Overflow
7498| [39743] EMC RepliStor Server Service Remote Overflow
7499| [39675] Easy Hosting Control Panel dbutil.bck.php confdir Parameter Remote File Inclusion
7500| [39674] Easy Hosting Control Panel dbutil.php confdir Parameter Remote File Inclusion
7501| [39567] XMMS Remote Control Script for XChat id3 Tag CRLF Injection Arbitrary IRC Command Execution
7502| [39547] Diskeeper Administrative Interface (DkService.exe) RPC Request Remote DoS
7503| [39546] Diskeeper Administrative Interface (DkService.exe) RPC Request Remote Information Disclosure
7504| [39532] HP OpenView Network Node Manager (OV NNM) webappmon.exe Remote Overflow
7505| [39531] HP OpenView Network Node Manager (OV NNM) snmpviewer.exe Remote Overflow
7506| [39530] HP OpenView Network Node Manager (OV NNM) OpenView5.exe Remote Overflow
7507| [39529] HP OpenView Network Node Manager (OV NNM) ovlogin.exe Remote Overflow
7508| [39527] HP OpenView Operations Shared Trace Service (OVTrace) Remote Overflows
7509| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
7510| [39357] Com21 DOXport Cable Modems Remote Alternate Configuration
7511| [39302] Indexu admin/template_manager.php admin_template_path Parameter Remote File Inclusion
7512| [39298] Cisco Firewall Services Module (FWSM) Unspecified Remote DoS
7513| [39185] IRC Services encrypt.c default_encrypt Function Remote DoS
7514| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
7515| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
7516| [39079] SpeedTech PHP Library stphpcontrolwithcaption.php STPHPLIB_DIR Parameter Remote File Inclusion
7517| [39034] phpWebFileManager index.php PN_PathPrefix Parameter Remote File Inclusion
7518| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
7519| [38791] SWmenu Component for Mambo / Joomla! administrator/components/ImageManager/Classes/ImageManager.php mosConfig_absolute_path Parameter Remote File Inclusion
7520| [38790] SWmenu Component for Mambo / Joomla! components/ImageManager/Classes/ImageManager.php mosConfig_absolute_path Parameter Remote File Inclusion
7521| [38638] CMS Creamotion _administration/gestion_configurations/save_config.php cfg[document_uri] Parameter Remote File Inclusion
7522| [38619] BakBone NetVault Reporter Manager Scheduler Server (srvscheduler.exe) Remote Overflow
7523| [38618] BakBone NetVault Reporter Manager Scheduler Client (clsscheduler.exe) Remote Overflow
7524| [38605] Borland InterBase Multiple Function service attach Request Remote Overflow
7525| [38473] WiwiMod Module for XOOPS spaw/spaw_control.class.php spaw_root Parameter Remote File Inclusion
7526| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
7527| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
7528| [38281] IBM Tivoli Storage Manager (TSM) Client CAD Service XSS
7529| [38161] IBM Tivoli Storage Manager (TSM) Client Client Acceptor Daemon (CAD, dsmcad.exe) Remote Overflow
7530| [38095] SAP NetWeaver Web Application Server Internet Communication Manager Crafted URI Remote DoS
7531| [37944] Cisco Firewall Services Module (FWSM) Crafted HTTPS Request Remote DoS
7532| [37943] Cisco PIX / ASA Media Gateway Control Protocol (MGCP) Handling Remote DoS
7533| [37941] Cisco Unified Communications Manager (CUCM) SIP INVITE Message Saturation Remote DoS
7534| [37917] SurgeMail IMAP Service SEARCH Command Remote Overflow
7535| [37859] Hitachi JP1/Cm2/Network Node Manager (NNM) Shared Trace Service Arbitrary Code Execution
7536| [37824] ManageEngine NetFlow Analyzer admin/ServiceConfiguration.do operation Parameter XSS
7537| [37800] Ripe Website Manager admin/includes/admin_header.php level Parameter Remote File Inclusion
7538| [37799] Ripe Website Manager admin/includes/author_panel_header.php level Parameter Remote File Inclusion
7539| [37757] Sun Java System Access Manager Unspecified Remote Code Execution
7540| [37710] Motive Service Activation Manager ActiveEmailTest.EmailData ActiveX (ActiveUtils.dll) Multiple Unspecified Overflows
7541| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
7542| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
7543| [37574] Cabron Connector services/samples/inclusionService.php CabronServiceFolder Parameter Remote File Inclusion
7544| [37562] HP-UX Controller for Cisco Local Director ldcconn Remote Overflow
7545| [37547] ScarAdControl scaradcontrol.php sac_config_dir Variable Remote
7546| [37462] Helm Web Hosting Control Panel interfaces/standard/FileManager.asp Multiple Parameter XSS
7547| [37399] Public Media Manager NewsCMS/news/newstopic_inc.php indir Parameter Remote File Inclusion
7548| [37311] Firebird Services API Unspecified Remote DoS
7549| [37227] DFD Cart product.control.config.php set_depth Parameter Remote File Inclusion
7550| [37109] Linux Kernel Distributed Lock Manager (DLM) Remote DoS
7551| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
7552| [36934] Microsoft Agent URL Handling Remote Code Execution
7553| [36895] Hitachi XP/W Map I/O Service (xpwmap) Unspecified Remote DoS
7554| [36787] IBM AIX capture Terminal Control Sequence Handling Remote Overflow
7555| [36723] F-Secure Policy Manager Server fsmsh.dll Host Module Remote DoS
7556| [36693] Cisco Unified Communications Manager (CUCM) Crafted SIP Packet Remote Code Execution
7557| [36667] Cisco IOS Voice Service SIP Packet Unspecified Remote Code Execution
7558| [36661] Cisco Multiple Products Wireless LAN Controller (WLC) Broadcast ARP Storm Remote DoS
7559| [36660] Cisco Multiple Products Wireless LAN Controller (WLC) Crafted Unicast ARP Request Remote DoS
7560| [36614] Solaris Role Based Access Control (RBAC) Unspecified Remote Role Privilege Escalation
7561| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
7562| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
7563| [36307] Cjay Content Module for XOOPS admin/editor2/spaw_control.class.php spaw_root Parameter Remote File Inclusion
7564| [36306] XT-Conteudo Module for XOOPS admin/spaw/spaw_control.class.php spaw_root Parameter Remote File Inclusion
7565| [36271] Tor Unspecified ControlPort torrc Remote Config File Manipulation
7566| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
7567| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
7568| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
7569| [36104] Symantec Veritas Storage Foundation Scheduler Service (VxSchedService.exe) Remote Code Execution
7570| [36101] McAfee Multiple Products ePolicy Orchestrator CMA Framework Service Remote Overflow
7571| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
7572| [36022] Remote Display Dev kit ActiveX (RControl.dll) Multiple Function Overflow
7573| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
7574| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
7575| [35941] Novell NetMail NMDMC.EXE SSL Service Remote Overflow
7576| [35790] Trend Micro ServerProtect SpntSvc.exe Service AgRpcCln.dll CAgRpcClient::CreateBinding() Function Remote Overflow
7577| [35762] miniBB configuration.php absolute_path Parameter Remote File Inclusion
7578| [35751] Plume CMS dbinstall.php _PX_config[manager_path] Variable Remote File
7579| [35732] eScan MicroWorld Agent Service (MWAGENT.EXE) Unauthenticated Application Configuration
7580| [35637] Microsoft Windows Unspecified Remote Code Execution
7581| [35606] phpBandManager suite/index.php pg Parameter Remote File Inclusion
7582| [35560] HYIP Manager Pro /inc/libs/core/core.read_cache_file.php plugin_file Parameter Remote File Inclusion
7583| [35559] HYIP Manager Pro /inc/libs/core/core.process_compiled_include.php plugin_file Parameter Remote File Inclusion
7584| [35558] HYIP Manager Pro /inc/libs/core/core.process_cached_inserts.php plugin_file Parameter Remote File Inclusion
7585| [35557] HYIP Manager Pro /inc/libs/core/core.load_resource_plugin.php plugin_file Parameter Remote File Inclusion
7586| [35556] HYIP Manager Pro /inc/libs/core/core.load_plugins.php plugin_file Parameter Remote File Inclusion
7587| [35555] HYIP Manager Pro /inc/libs/core core.display_debug_console.php plugin_file Parameter Remote File Inclusion
7588| [35554] HYIP Manager Pro /inc/libs/Smarty_Compiler.class.php plugin_file Parameter Remote File Inclusion
7589| [35553] HYIP Manager Pro /inc/libs/Smarty.class.php plugin_file Parameter Remote File Inclusion
7590| [35541] Progress Webspeed OpenEdge WService=wsbroker1/_edit.r Remote DoS
7591| [35478] Case Manager Remote Error Message Username Enumeration
7592| [35462] HP Power Manager Remote Agent (RA) Unspecified Local Code Execution
7593| [35383] Tiny Content Module for XOOPS spaw_control.class.php spaw_root Parameter Remote File Inclusion
7594| [35381] iContent Module for XOOPS spaw_control.class.php spaw_root Parameter Remote File Inclusion
7595| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
7596| [35326] CA BrightStor ARCserve Backup Media Server SUN RPC Service Remote Overflows
7597| [35261] WEBinsta FM Manager admin/login.php absolute_path Parameter Remote File Inclusion
7598| [35176] Study Planner (Studiewijzer) ws/spl.webservice.php SPL_CFG[dirroot] Parameter Remote File Inclusion
7599| [35169] Study Planner (Studiewijzer) integration/shortstat/configuration.php SPL_CFG[dirroot] Parameter Remote File Inclusion
7600| [35166] Study Planner (Studiewijzer) inc/service.alert.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
7601| [35125] PMB Services edit.php include_path Parameter Remote File Inclusion
7602| [35124] PMB Services cart.php include_path Parameter Remote File Inclusion
7603| [35123] PMB Services account.php include_path Parameter Remote File Inclusion
7604| [35122] PMB Services autorites.php include_path Parameter Remote File Inclusion
7605| [35121] PMB Services opac_css/includes/author_see.inc.php base_path Parameter Remote File Inclusion
7606| [35120] PMB Services opac_css/rec_panier.php base_path Parameter Remote File Inclusion
7607| [35119] PMB Services admin/sauvegarde/lieux.inc.php include_path Parameter Remote File Inclusion
7608| [35118] PMB Services admin/param/param_func.inc.php include_path Parameter Remote File Inclusion
7609| [35117] PMB Services admin/quotas/main.inc.php class_path Parameter Remote File Inclusion
7610| [35116] PMB Services admin/notices/perso.inc.php class_path Parameter Remote File Inclusion
7611| [35115] PMB Services admin/netbase/clean.php include_path Parameter Remote File Inclusion
7612| [35114] PMB Services admin/import/iimport_expl.php include_path Parameter Remote File Inclusion
7613| [35113] PMB Services includes/options_empr/options_text.php include_path Parameter Remote File Inclusion
7614| [35112] PMB Services includes/options_empr/options_query_list.php include_path Parameter Remote File Inclusion
7615| [35111] PMB Services includes/options_empr/options_list.php include_path Parameter Remote File Inclusion
7616| [35110] PMB Services includes/options_empr/options_date_box.php include_path Parameter Remote File Inclusion
7617| [35109] PMB Services includes/options_empr/options_comment.php include_path Parameter Remote File Inclusion
7618| [35108] PMB Services includes/options_empr/options.php include_path Parameter Remote File Inclusion
7619| [35107] PMB Services includes/options/options_text.php include_path Parameter Remote File Inclusion
7620| [35106] PMB Services includes/options/options_query_list.php include_path Parameter Remote File Inclusion
7621| [35105] PMB Services includes/options/options_list.php include_path Parameter Remote File Inclusion
7622| [35104] PMB Services includes/options/options_file_box.php include_path Parameter Remote File Inclusion
7623| [35103] PMB Services includes/options/options_date_box.php include_path Parameter Remote File Inclusion
7624| [35102] PMB Services includes/bull_info.inc.php include_path Parameter Remote File Inclusion
7625| [35101] PMB Services includes/resa_func.inc.php class_path Parameter Remote File Inclusion
7626| [35076] CentennialIPTransferServer service (XFERWAN.EXE) TCP Packet Parsing Remote Overflow
7627| [35072] Symantec Multiple Products Ghost Service Manager Local Overflow
7628| [35059] Phorum include/controlcenter/users.php Multiple Method Remote Privilege Escalation
7629| [35015] BMC PATROL PerformAgent bgs_sdservice.exe Remote Overflow
7630| [34964] LANDesk Management Suite Alert Service (aolnsrvr.exe) Remote Overflow
7631| [34902] Sun Java Web Console libwebconsole_services.so Remote Format String
7632| [34848] Apple Mac OS X DirectoryService (DS Plug-Ins) Authentication Feature Remote Privilege Escalation
7633| [34770] IBM Tivoli Business Service Manager (TBSM) Multiple File Cleartext Password Disclosure
7634| [34678] IBM Tivoli Provisioning Manager for OS Deployment multipart/form-data Handling Remote Code Execution
7635| [34662] Symantec Enterprise Security Manager (ESM) Remote Upgrade Authentication Weakness
7636| [34656] RSPA rspa/framework/Controller_v4.php Multiple Parameter Remote File Inclusion
7637| [34655] RSPA rspa/framework/Controller_v5.php Multiple Parameter Remote File Inclusion
7638| [34639] HP OpenView Network Node Manager (OV NNM) Unspecified Unauthorized Remote Access
7639| [34499] ESRI ArcSDE Service (giomgr) Crafted Request Remote Overflow
7640| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
7641| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
7642| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
7643| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
7644| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
7645| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
7646| [34387] Microsoft Word Data Array Handling Remote Code Execution
7647| [34327] Gracenote CDDBControl ActiveX Proxy Configuration Parameters Multiple Overflows
7648| [34324] Akamai Technologies Download Manager ActiveX Control (DownloadManagerV2.ocx) Unspecified Overflow
7649| [34323] Akamai Technologies Download Manager ActiveX Control (DownloadManagerV2.ocx) GetPrivateProfileSectionW Function Overflow
7650| [34222] Campsite implementation/management/configuration.php g_documentRoot Parameter Remote File Inclusion
7651| [34138] Cisco Wireless LAN Controller (WLC) WLAN ACL Configuration Loading Weakness
7652| [34130] Cisco Wireless Control System (WCS) Unspecified Remote Privilege Escalation
7653| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
7654| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
7655| [33861] MailEnable IMAP Service APPEND Command Remote Overflow
7656| [33738] Plume CMS manager/articles.php _PX_config[manager_path] Parameter Remote File Inclusion
7657| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
7658| [33528] Hitachi JP1/Cm2/Network Node Manager Unspecified Remote Input Validation Failure
7659| [33206] ZebraFeeds controller.php zf_path Parameter Remote File Inclusion
7660| [33201] HP Serviceguard for Linux Unspecified Remote Access
7661| [33185] Aruba Mobility Controller Internal Guest Account Remote Privilege Escalation
7662| [33184] Aruba Mobility Controller Management Interface Login Prompt Credentials String Remote Overflow
7663| [33130] HP Network Node Manager (NNM) Remote Console Directory Permission Weakness Privilege Escalation
7664| [33060] Cisco Firewall Services Module (FWSM) Malformed SNMP Request Remote DoS
7665| [32938] Upload-service upload/top.php maindir Parameter Remote File Inclusion
7666| [32729] HP OpenView Network Node Manager (OV NNM) Unspecified Remote File Access
7667| [32728] HP OpenView Network Node Manager (OV NNM) Unspecified Remote Code Execution
7668| [32550] Hosting Controller FolderManager/FolderManager.aspx BrowsePath Parameter Traversal Arbitrary File Access
7669| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
7670| [32125] MailEnable IMAP Service Pre-authentication Remote Overflow
7671| [32106] Mozilla Network Security Services SSLv2 Server Remote Overflow
7672| [32026] b2evolution inc/CONTROL/import/import-mt.php inc_path Parameter Remote File Inclusion
7673| [32005] PHP Advanced Transfer Manager (phpATM) viewer_bottom.php include_location Parameter Remote File Inclusion
7674| [32004] PHP Advanced Transfer Manager (phpATM) viewer_content.php include_location Parameter Remote File Inclusion
7675| [32003] PHP Advanced Transfer Manager (phpATM) viewer_top.php include_location Parameter Remote File Inclusion
7676| [32002] PHP Advanced Transfer Manager (phpATM) usrmanag.php include_location Parameter Remote File Inclusion
7677| [32001] PHP Advanced Transfer Manager (phpATM) showtophits.php include_location Parameter Remote File Inclusion
7678| [32000] PHP Advanced Transfer Manager (phpATM) showrecent.php include_location Parameter Remote File Inclusion
7679| [31999] PHP Advanced Transfer Manager (phpATM) register.php include_location Parameter Remote File Inclusion
7680| [31998] PHP Advanced Transfer Manager (phpATM) ipblocked.php include_location Parameter Remote File Inclusion
7681| [31997] PHP Advanced Transfer Manager (phpATM) getimg.php include_location Parameter Remote File Inclusion
7682| [31996] PHP Advanced Transfer Manager (phpATM) fileop.php include_location Parameter Remote File Inclusion
7683| [31995] PHP Advanced Transfer Manager (phpATM) configure.php include_location Parameter Remote File Inclusion
7684| [31994] PHP Advanced Transfer Manager (phpATM) activate.php include_location Parameter Remote File Inclusion
7685| [31976] PHP Advanced Transfer Manager (phpATM) login.php include_location Parameter Remote File Inclusion
7686| [31975] PHP Advanced Transfer Manager (phpATM) confirm.php include_location Parameter Remote File Inclusion
7687| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
7688| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
7689| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
7690| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
7691| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
7692| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
7693| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
7694| [31839] ImageManager config.inc.php com_htmlarea3_xtd-c mosConfig_absolute_path Remote File Inclusion
7695| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
7696| [31593] CA BrightStor ARCserve Backup Mobile Backup Service Multiple Remote Overflows
7697| [31356] Novell Distributed Print Services (NDPS) Print Provider (NDPPNT.DLL) Remote Overflow
7698| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
7699| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
7700| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
7701| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
7702| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
7703| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
7704| [31247] ActiveCampaign KnowledgeBuilder visEdit_control.class.php visEdit_root Parameter Remote File Inclusion
7705| [31202] SolidState DeleteHostingServicePage.class.php base_path Parameter Remote File Inclusion
7706| [31201] SolidState DeleteDomainServicePage.class.php base_path Parameter Remote File Inclusion
7707| [31183] Plume CMS tools/htaccess/index.php _PX_config[manager_path] Parameter Remote File Inclusion
7708| [31182] Plume CMS install/upgrade.php _PX_config[manager_path] Parameter Remote File Inclusion
7709| [31181] Plume CMS install/index.php _PX_config[manager_path] Parameter Remote File Inclusion
7710| [31180] Plume CMS inc/lib.text.php _PX_config[manager_path] Parameter Remote File Inclusion
7711| [31179] Plume CMS frontinc/class.template.php _PX_config[manager_path] Parameter Remote File Inclusion
7712| [31178] Plume CMS xmedia.php _PX_config[manager_path] Parameter Remote File Inclusion
7713| [31177] Plume CMS users.php _PX_config[manager_path] Parameter Remote File Inclusion
7714| [31176] Plume CMS subtypes.php _PX_config[manager_path] Parameter Remote File Inclusion
7715| [31175] Plume CMS sites.php _PX_config[manager_path] Parameter Remote File Inclusion
7716| [31174] Plume CMS prefs.php _PX_config[manager_path] Parameter Remote File Inclusion
7717| [31173] Plume CMS news.php _PX_config[manager_path] Parameter Remote File Inclusion
7718| [31172] Plume CMS categories.php _PX_config[manager_path] Parameter Remote File Inclusion
7719| [31171] Plume CMS articles.php _PX_config[manager_path] Parameter Remote File Inclusion
7720| [31139] SolidState ViewHostingServicePage.class.php base_path Parameter Remote File Inclusion
7721| [31137] SolidState ViewDomainServicePage.class.php base_path Parameter Remote File Inclusion
7722| [31133] SolidState ServicesWebHostingPage.class.php base_path Parameter Remote File Inclusion
7723| [31132] SolidState ServicesPage.class.php base_path Parameter Remote File Inclusion
7724| [31131] SolidState ServicesNewHostingPage.class.php base_path Parameter Remote File Inclusion
7725| [31130] SolidState ServicesHostingServicesPage.class.php base_path Parameter Remote File Inclusion
7726| [31120] SolidState NewDomainServicePage.class.php base_path Parameter Remote File Inclusion
7727| [31108] SolidState IPManagerPage.class.php base_path Parameter Remote File Inclusion
7728| [31106] SolidState EditDomainServicePage.class.php base_path Parameter Remote File Inclusion
7729| [31102] SolidState EditHostingServicePage.class.php base_path Parameter Remote File Inclusion
7730| [31099] SolidState DomainServicesPage.class.php base_path Parameter Remote File Inclusion
7731| [30971] DMO LFXlib/access_manager.php _incMgr Parameter Remote File Inclusion
7732| [30797] SL_Site spaw_control_class.php spaw_root Parameter Remote File Inclusion
7733| [30617] All In One Control Panel (AIOCP) /admin/code/index.php load_page Parameter Remote File Inclusion
7734| [30583] MailEnable POP3 Service APOP Command Remote Overflow
7735| [30273] HP OpenView Client Configuration Manager (CCM) radexecd.exe Arbitrary Command Execution
7736| [30270] Citrix Metaframe IMA Service (ImaSrv.exe) Crafted Packet Remote DoS
7737| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
7738| [29996] Novell eDirectory LDAP Service evtFilteredMonitorEventsRequest Function Remote Code Execution
7739| [29995] Novell eDirectory LDAP Service evtFilteredMonitorEventsRequest Function Remote Overflow
7740| [29710] Download-Engine spaw_control.class.php spaw_root Parameter Remote File Inclusion
7741| [29689] Tagmin Control Center index.php page Parameter Remote File Inclusion
7742| [29616] Novell BorderManager VPN IKE.NLM Remote DoS
7743| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
7744| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
7745| [29426] Microsoft XML Core Services XSLT Processing Overflow
7746| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
7747| [29191] WEBInsta Mailing List Manager install3.php cabsolute_path Parameter Remote File Inclusion
7748| [29002] Mambo Gallery Manager (MGM) about.mgm.php mosConfig_absolute_path Parameter Remote File Inclusion
7749| [28855] Oracle Enterprise Manager Management Service HTTP Unspecified Issue
7750| [28854] Oracle Enterprise Manager Management Service HTTP Information Disclosure
7751| [28729] Microsoft Windows Indexing Service Unspecified XSS
7752| [28716] Netscreen Security Manager (NSM) Crafted Packet Remote DoS
7753| [28576] Ipswitch IMail Server SMTP Service Crafted RCPT String Remote Overflow
7754| [28520] Dolphin service.php dir[inc] Parameter Remote File Inclusion
7755| [28298] Jupiter Content Manager index.php template Parameter Remote File Inclusion
7756| [28206] Touch Control ActiveX Execute() Function sPath Parameter Remote File Inclusion
7757| [28091] Display MOSBot Manager for Mambo contxtd.class.php mosConfig_absolute_path Parameter Remote File Inclusion
7758| [28077] Plume CMS search.php _PX_config[manager_path] Parameter Remote File Inclusion
7759| [28076] Plume CMS rss.php _PX_config[manager_path] Parameter Remote File Inclusion
7760| [28075] Plume CMS index.php _PX_config[manager_path] Parameter Remote File Inclusion
7761| [27915] SAP Internet Graphics Service Unspecified HTTP Request Remote Overflow
7762| [27914] SAP Internet Graphics Service Crafted HTTP Request Remote DoS
7763| [27857] Comet WebFileManager (CWFM) CheckUpload.php Language Parameter Remote File Inclusion
7764| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
7765| [27844] Microsoft Windows DNS Client Service Record Response Overflow
7766| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
7767| [27707] Knusperleicht FileManager index.php dwl_include_path Parameter Remote File Inclusion
7768| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
7769| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
7770| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
7771| [27069] eBay Enhanced Picture Services EUPWALcontrol.dll ActiveX Control Overflow
7772| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
7773| [26954] CommuniGate Pro POP Service Empty Inbox Remote DoS
7774| [26891] phpRaid configuration.php phpraid_dir Parameter Remote File Inclusion
7775| [26884] Cisco Wireless Control System (WCS) Internal Database Hardcoded Account Remote Access
7776| [26864] Trend Micro Control Manager Login Page username Parameter XSS
7777| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
7778| [26791] MailEnable SMTP Service HELO Command Remote DoS
7779| [26674] Ad Manager Pro common.php ipath Parameter Remote File Inclusion
7780| [26673] Ad Manager Pro ad.php ipath Parameter Remote File Inclusion
7781| [26644] Xtreme Downloads manager.php root Parameter Remote File Inclusion
7782| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
7783| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
7784| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
7785| [26368] AWF CMS spaw_control.class.php spaw_root Parameter Remote File Inclusion
7786| [26349] Content*Builder media_manager/media.inc.php lang_path Parameter Remote File Inclusion
7787| [26224] Clan Manager Pro cmpro.intern/comment.core.inc.php rootpath Parameter Remote File Inclusion
7788| [26223] Clan Manager Pro cmpro.ext/comment.core.inc.php sitepath Parameter Remote File Inclusion
7789| [26222] Clan Manager Pro cmpro.intern/login.inc.php rootpath Parameter Remote File Inclusion
7790| [26220] Clan Manager Pro cmpro_header.inc.php Multiple Parameter Remote File Inclusion
7791| [26193] Microsoft NetMeeting Unspecified Remote DoS
7792| [25999] BlueShoes Framework filemanager/viewer.php?APP[path][core] Parameter Remote File Inclusion
7793| [25998] BlueShoes Framework filemanager/file.php?APP[path][core] Parameter Remote File Inclusion
7794| [25633] Linux Kernel SCTP Fragmented Control Chunk Remote DoS
7795| [25624] Bitrix Site Manager updater.log Remote Information Disclosure
7796| [25540] ezUserManager ezusermanager_core.inc.php ezUserManager_Path Parameter Remote File Inclusion
7797| [25329] Claroline init_event_manager.inc.php Multiple Parameter Remote File Inclusion
7798| [24691] vBulletin ImpEx Module ImpExController.php systempath Parameter Remote File Inclusion
7799| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
7800| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
7801| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
7802| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
7803| [24447] Hosting Controller forum.mdb Remote User Credential Disclosure
7804| [24172] VERITAS NetBackup Volume Manager Daemon (vmd.exe) Unspecified Remote Overflow
7805| [24002] KnowledgebasePublisher PageController.php dir Parameter Remote File Inclusion
7806| [23950] MERCUR Messaging IMAP Service Multiple Command Remote Overflow
7807| [23204] Plume CMS prepend.php _PX_config[manager_path] Parameter Remote File Inclusion
7808| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
7809| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
7810| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
7811| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
7812| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
7813| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
7814| [22983] Hosting Controller IPManager.asp tblIPManager Parameter SQL Injection
7815| [22852] MailEnable Professional IMAP Service EXAMINE Command Remote DoS
7816| [22541] Oracle Database Connection Manager Trivial Remote DoS
7817| [22455] Novell Open Enterprise Server Remote Manager (novell-nrm) POST Request Content-Length Overflow
7818| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
7819| [22047] NetScreen Security Manager (NSM) guiSrv/devSrv Crafted String Remote DoS
7820| [21982] HP-UX WBEM Services Unspecified Remote DoS
7821| [21805] Microsoft IIS Crafted URL Remote DoS
7822| [21764] Macromedia Flash Media Server Administration Service Crafted Packet Remote DoS
7823| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
7824| [21574] Pocket Controller PDA Unauthenticated Crafted Command Remote DoS
7825| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
7826| [21460] Sun Java System Communications Services Delegated Administrator Remote TLA Password Disclosure
7827| [21109] MailEnable IMAP Service (meimaps.exe) Crafted RENAME Command Remote DoS
7828| [20956] Novell NetMail IMAP Service Verb Argument Remote Overflow
7829| [20929] MailEnable IMAP Service (MEIMAPS.EXE) Multiple Command Remote Overflow
7830| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
7831| [20656] Oracle E-Business Suite/Applications Service Fulfillment Manager Authenticated HTTP Issue
7832| [20598] Oracle Database Security Service Unspecified Remote Issue
7833| [20448] Sun Java System Communications Express Remote Configuration File Disclosure
7834| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
7835| [20079] Hitachi JP1/Cm2/Network Node Manager Unspecified Services DoS
7836| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
7837| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
7838| [19905] Microsoft Collaboration Data Objects Remote Overflow
7839| [19902] Microsoft Windows COM+ Remote Code Execution
7840| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
7841| [19864] HP OpenView Event Correlation Services Unspecified Remote Privilege Escalation
7842| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
7843| [19780] SurfControl SuperScout Email Filter Multiple SMTP Command Remote Overflow DoS
7844| [19752] Novell NetWare Remote Manager httpstk.nlm Multiple Field Remote Overflow
7845| [19532] PHP Advanced Transfer Manager (phpATM) test.php Remote Information Disclosure
7846| [19528] PHP Advanced Transfer Manager (phpATM) html.php Remote HTML Content Inclusion
7847| [19527] PHP Advanced Transfer Manager (phpATM) htm.php Remote HTML Content Inclusion
7848| [19305] COOL! Remote Control Malformed Request DoS
7849| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
7850| [19178] Plug and Play Web Server FTP Service Multiple Command Remote Overflow DoS
7851| [19119] DameWare Mini Remote Control username Remote Overflow
7852| [19089] Microsoft IE Unspecified Remote Code Execution
7853| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
7854| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
7855| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
7856| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
7857| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
7858| [18778] Apple Mac OS X Directory Services Authentication Remote Overflow
7859| [18750] HP-UX Ignite-UX TFTP Service Remote File Manipulation
7860| [18749] HP-UX Ignite-UX TFTP Service make_recovery Remote passwd File Disclosure
7861| [18732] DameWare NT Utilities/Remote Control Unspecified Local Privilege Escalation
7862| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
7863| [18681] Microsoft Windows XP User Account Manager Hidden User
7864| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
7865| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
7866| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
7867| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
7868| [18472] HP NonStop Server DCE Core Services Crafted Request Remote DoS
7869| [18152] Microsoft IE Image File Handling Remote DoS
7870| [18053] Oracle Enterprise Manager CORE:SDK Unspecified Remote DoS
7871| [17917] Hosting Controller planmanagerstep1.asp Arbitrary Unrestricted Plan Creation
7872| [17914] DG Remote Control Client/Server Data Overflow Remote DoS
7873| [17902] Hosting Controller planmanager.asp Crafted Request DoS
7874| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
7875| [17900] Hosting Controller AccountManager.asp Search Field SQL Injection
7876| [17899] Hosting Controller addsubsite_online.asp Remote Privilege Escalation
7877| [17883] wMailserver SMTP Service Remote Overflow DoS
7878| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
7879| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
7880| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
7881| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
7882| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
7883| [17341] Bitrix Site Manager index.php _SERVER[DOCUMENT_ROOT] Parameter Remote File Inclusion
7884| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
7885| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
7886| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
7887| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
7888| [16692] PHP Advanced Transfer Manager (phpATM) index.php include_location Function Remote File Inclusion
7889| [16158] NiteEnterprises Remote File Manager Malformed String DoS
7890| [15741] DameWare Mini Remote Control DWRCC Process Information Disclosure
7891| [15658] ScriptLogic RunAdmin Service Arbitrary Configuration Modification
7892| [15575] Oracle Enterprise Manager Agent Remote Unauthenticated DoS
7893| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
7894| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
7895| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
7896| [15458] Microsoft Windows Message Queuing Remote Overflow
7897| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
7898| [15259] remstats remoteping Service Arbitrary Command Execution
7899| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
7900| [14883] Citrix MetaFrame Conferencing Manager Conference Control
7901| [14636] WEBInsta Mailing List Manager initdb.php Remote File Inclusion
7902| [14603] Hosting Controller HCDiskQuotaService.csv Direct Request Information Disclosure
7903| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
7904| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
7905| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
7906| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
7907| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
7908| [14223] Mathematica License Manager (mathlm) Access Control Bypass
7909| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
7910| [13814] CA BrightStor ARCserve Backup Discovery Service SERVICEPC Remote Overflow
7911| [13778] NetKit Rwho Service (netkit-rwho) rwhod Packet Validation Remote DoS
7912| [13750] Alabanza Control Panel nsManager.cgi Unauthorized Domain Name Modification
7913| [13692] WinProxy POP3 Service Multiple Command Remote Overflow
7914| [13606] Microsoft IE createControlRange() Function Heap Corruption
7915| [13599] Microsoft Windows License Logging Service Overflow
7916| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
7917| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
7918| [13505] Triactive Remote Manager Basic Authentication Registry Cleartext Password Disclosure
7919| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
7920| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
7921| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
7922| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
7923| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
7924| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
7925| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
7926| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
7927| [13143] Trend Micro Control Manager Web Application Login Replay Weakness
7928| [12979] KDE File Manager (kfm) Remote Arbitrary File Modification
7929| [12870] IlohaMail Multiple Configuration Files Remote Information Disclosure
7930| [12832] Microsoft Windows Indexing Service Query Overflow
7931| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
7932| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
7933| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
7934| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
7935| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
7936| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
7937| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
7938| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
7939| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
7940| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
7941| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
7942| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
7943| [12249] CA Unicenter Remote Control Arbitrary URC Management Server Access
7944| [12089] SecureCRT telnet URI Arbitrary Configuration Folder Remote Command Execution
7945| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
7946| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
7947| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
7948| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
7949| [11838] Ipswitch IMail IMAP Service DELETE Command Remote Overflow
7950| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
7951| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
7952| [11493] ControlIT/Remotely Possible Remote User DoS
7953| [11473] Microsoft Windows NT Messenger Service Long Username DoS
7954| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
7955| [11451] finger Service Remote Information Disclosure
7956| [11450] Multiple Vendor rexd Service Authentication Bypass Remote Command Execution
7957| [11449] rwho/rwhod Service Remote Information Disclosure
7958| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
7959| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
7960| [11310] Compaq Insight Manager XE DMI Remote Overflow
7961| [11309] Compaq Insight Manager XE SNMP Remote Overflow
7962| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
7963| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
7964| [11163] HP Cluster Object Manager Unspecified Remote Privilege Escalation
7965| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
7966| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
7967| [11077] HP JetDirect LPD Service Remote Overflow DoS
7968| [11076] HP JetDirect Telnet Service Remote Overflow DoS
7969| [11042] HP Serviceguard Unspecified Remote Privilege Escalation
7970| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
7971| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
7972| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
7973| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
7974| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
7975| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
7976| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
7977| [10689] Microsoft Windows NetDDE Remote Overflow
7978| [10428] Gravity Storm Service Pack Manager 2000 Hidden Share Access Restriction Bypass
7979| [10367] YahooPOPS SMTP Service Remote Overflow
7980| [10366] YahooPOPS POP3 Service USER Command Remote Overflow
7981| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
7982| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
7983| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
7984| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
7985| [10132] Microsoft SQL Server Authentication Function Remote Overflow
7986| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
7987| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
7988| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
7989| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
7990| [9060] Hosting Controller filemanager.asp OpenPath Parameter Arbitrary Command Execution
7991| [8895] Cisco 7xx Series Routers Clickstart HTTP Server Remote Configuration Modification
7992| [8850] Cisco ATA 186 Adaptor Web Configuration Remote Parameter Modification
7993| [8849] Cisco ATA 186 Adaptor Web Configuration Remote Password Disclosure
7994| [8823] Cisco 600 Series Routers Multiple Service Connection Flood Remote DoS
7995| [8820] Cisco IOS ILMI Default Community String Remote Configuration Manipulation
7996| [8729] Solaris ^D Character Remote Telnet Service DoS
7997| [8294] Sendmail NOCHAR Control Value prescan Remote Overflow
7998| [8210] Microsoft HTML Control Large Form Field DoS
7999| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
8000| [7920] Novell BorderManager IKE.NLM VPN Service DoS
8001| [7905] Microsoft IE ie5setup.exe Multple Service Disable
8002| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
8003| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
8004| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
8005| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
8006| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
8007| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
8008| [7842] Microsoft IE File Upload Control Arbitrary File Access
8009| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
8010| [7830] Microsoft IE mk: URL Handling Remote Overflow
8011| [7798] Microsoft Windows Task Scheduler Remote Overflow
8012| [7777] Microsoft Windows Media Control Preview Script Execution
8013| [7631] SCO Internet Manager REMOTE_ADDR Variable Arbitrary Program Execution
8014| [7404] CDE Calendar Manager Service Daemon (rpc.cmsd) Overflow
8015| [7199] HP OpenView Network Node Manager (OV NNM) OverView5 snmp.exe Remote Overflow DoS
8016| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
8017| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
8018| [7117] Microsoft Windows RPC Locator Remote Overflow
8019| [6726] l2tpd control.c write_packet Function Remote Overflow
8020| [6462] Hosting Controller /admin/import/imp_rootdir.asp Multiple Parameter Remote Command Execution
8021| [6459] Hosting Controller dsnmanager.asp RootName Parameter Traversal Arbitrary File Access
8022| [6252] Symantec Multiple Products statsd Service Remote Overflow DoS
8023| [6159] Trend Micro InterScan VirusWall Web Interface Direct Request Remote Configuration Manipulation
8024| [6148] Trend Micro OfficeScan Remote Configuration Change
8025| [6079] Microsoft Outlook Remote XML Loading
8026| [6038] MailEnable Professional HTTPMail Service Authorization Header Handling Remote DoS
8027| [6019] Red Hat Linux inetd Internal Service Connections Remote DoS
8028| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
8029| [5936] Microsoft SMTP Service 4xx Error Code DoS
8030| [5884] Microsoft Site Server ASP Upload Remote Command Execution
8031| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
8032| [5686] Microsoft Windows Telnet Service Account Information Disclosure
8033| [5669] Deerfield Website Pro Remote Manager DoS
8034| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
8035| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
8036| [5292] PHProjekt filemanager_forms.php lib_path Parameter Remote File Inclusion
8037| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
8038| [5254] Microsoft Windows Utility Manager Privilege Escalation
8039| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
8040| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
8041| [5248] Microsoft Windows LSASS Remote Overflow
8042| [5241] Microsoft Jet Database Engine Remote Code Execution
8043| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
8044| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
8045| [5078] VMware GSX Authorization Service GLOBAL Command Remote Overflow
8046| [5065] Oracle Database Net Services SQL*NET Listener Malformed Command Debugging Remote DoS
8047| [4951] Microsoft IE CLASSID Remote DoS
8048| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
8049| [4627] Microsoft IE Text Control Overflow
8050| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
8051| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
8052| [4547] DameWare Mini Remote Control Weak Encryption Implementation
8053| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
8054| [4505] CDE ToolTalk RPC Service Remote Overflow
8055| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
8056| [3991] ZoneAlarm SMTP Service (vsmon.exe) RCPT TO Command Remote Overflow
8057| [3903] Microsoft Windows WINS Server Remote Overflow
8058| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
8059| [3500] Microsoft IIS fpcount.exe Remote Overflow
8060| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
8061| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
8062| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
8063| [3164] Policy Compliance Manager Remote Overflow
8064| [3131] CA Unicenter Remote Control DoS
8065| [3103] Retrospect Remote Control Panel Un-initilization
8066| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
8067| [3042] DameWare Mini Remote Control Pre-authentication Remote Overflow
8068| [3035] Microsoft WebBrowser Control t:video File Execution
8069| [3023] CA Unicenter Remote Control Privilege Escalation
8070| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
8071| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
8072| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
8073| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
8074| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
8075| [2745] Microsoft HTML Help Control Privilege Escalation
8076| [2736] Novell NetWare Port Mapper Service (PMAP.NLM) Unspecified Remote Overflow
8077| [2682] HP OpenView Network Node Manager (OV NNM) Crafted TCP Packet Remote DoS
8078| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
8079| [2657] Microsoft Windows Message Queuing Service Heap Overflow
8080| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
8081| [2476] PAM SMB Module (pam_smb) Service Authentication Remote Overflow
8082| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
8083| [2288] Microsoft Utility Manager Local Privilege Escalation
8084| [2206] OptiSwitch Control Sequence Remote Authentication Bypass
8085| [2169] IBM DB2 Discovery Service UDP Packet Handling Remote DoS
8086| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
8087| [2096] Microsoft ISA Server SurfControl Web Filter
8088| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
8089| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
8090| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
8091| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
8092| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
8093| [2004] Microsoft IE Cross-frame Remote File Access
8094| [1990] Microsoft Windows Terminal Services False IP Address
8095| [1954] IBM HACMP snmpd Service Port Scan Remote DoS
8096| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
8097| [1860] Microsoft Windows Telnet Service Handle Leak DoS
8098| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
8099| [1804] Microsoft IIS Long Request Parsing Remote DoS
8100| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
8101| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
8102| [1764] Microsoft Windows 2000 Domain Controller DoS
8103| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
8104| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
8105| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
8106| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
8107| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
8108| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
8109| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
8110| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
8111| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
8112| [1381] HP OpenView Network Node Manager (OV NNM) Alarm Service Buffer Overrun
8113| [1359] Danware NetOp Remote Control Unauthenticated File Transfer
8114| [1302] Cisco IOS HTTP Service %% GET Request Remote DoS
8115| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
8116| [1268] Microsoft Windows TCP/IP Printing Service DoS
8117| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
8118| [1257] Microsoft Windows Media License Manager DoS
8119| [1188] Microsoft CIS IMAP Server Remote Overflow
8120| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
8121| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
8122| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
8123| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
8124| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
8125| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
8126| [1021] WinGate Redirector Service Remote Overflow DoS
8127| [967] Microsoft Windows NT WINS Service Malformed Data DoS
8128| [961] NT IBM Netfinity Remote Control Software Privilege Escalation
8129| [922] Microsoft NetMeeting Clipboard Remote Overflow
8130| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
8131| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
8132| [814] Microsoft IIS global.asa Remote Information Disclosure
8133| [705] Oracle Application Server Multiple Dynamic Monitoring Services Remote Anonymous Access
8134| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
8135| [607] Trend Micro InterScan VirusWall /interscan/cgi-bin/FtpSave.dll Unauthenticated Remote Configuration Manipulation
8136| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
8137| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
8138| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
8139| [448] ISC BIND Compressed ZXFR Name Service Query Remote DoS
8140| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
8141| [439] NSM Multiple Service Remote Format String
8142| [436] Microsoft IIS Unicode Remote Command Execution
8143| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
8144| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
8145| [331] Microsoft Windows Remote Registry Access
8146| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
8147| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
8148| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
8149| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
8150| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
8151| [259] Pocsag POC32 Remote Service Default Password
8152| [251] Artisoft XtraMail Control Service Username Overflow
8153| [150] Echo / Chargen UDP Services Spoofed Packet Remote DoS
8154| [123] Multiple Unix Netstat Service Remote Information Disclosure
8155| [41] CommuniGate Pro HTTP Configuration Port Remote Overflow
8156| [25] NetKit bootparamd Service Remote Internal Domain Name Disclosure
8157| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
8158| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
8159|_
81603389/tcp open ms-wbt-server?
81614444/tcp filtered krb524
81625050/tcp open mmcc?
81635051/tcp open ida-agent?
81646667/tcp filtered irc
81656881/tcp filtered bittorrent-tracker
81668080/tcp open http-proxy?
81678081/tcp open blackice-icecap?
8168| fingerprint-strings:
8169| WWWOFFLEctrlstat:
8170| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd">
8171| <HTML><HEAD><TITLE>Bad Request</TITLE>
8172| <META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD>
8173| <BODY><h2>Bad Request - Invalid URL</h2>
8174| <hr><p>HTTP Error 400. The request URL is invalid.</p>
8175|_ </BODY></HTML>
81768888/tcp open sun-answerbook?
817712345/tcp filtered netbus
817813782/tcp open netbackup?
817949152/tcp open unknown
818049153/tcp open unknown
818149154/tcp open unknown
8182#######################################################################################################################################
8183 Anonymous JTSEC #OpSaudiArabia Full Recon #19