· 6 years ago · Nov 11, 2019, 03:42 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.trade.gov.tr ISP Turk Telekom
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Ankara Local time 11 Nov 2019 04:34 +03
8City Ankara Postal Code 06200
9IP Address 95.0.51.12 Latitude 39.962
10 Longitude 32.792
11=======================================================================================================================================
12#######################################################################################################################################
13> www.trade.gov.tr
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.trade.gov.tr
19Address: 95.0.51.12
20>
21#######################################################################################################################################
22** Domain Name: trade.gov.tr
23
24** Registrant:
25 T.C Ekonomi Bakanlığı
26 T.C. Ekonomi Bakanlığı Bilgi İşlem Dairesi
27 Başkanlığı İnönü Bulvarı No:36 Emek
28 Ankara,
29 Türkiye
30 oktay.ustundag@ekonomi.gov.tr
31 + 90-312-2047971-
32 + 90-312-2152061
33
34
35** Administrative Contact:
36NIC Handle : teb48-metu
37Organization Name : T.C. Ekonomi Bakanlığı
38Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
39 No: 63 PK: 06530 Çankaya/ANKARA
40 Ankara,06510
41 Türkiye
42Phone : + 90-312-2048125-
43Fax : + 90-312-2122061-
44
45
46** Technical Contact:
47NIC Handle : teb48-metu
48Organization Name : T.C. Ekonomi Bakanlığı
49Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
50 No: 63 PK: 06530 Çankaya/ANKARA
51 Ankara,06510
52 Türkiye
53Phone : + 90-312-2048125-
54Fax : + 90-312-2122061-
55
56
57** Billing Contact:
58NIC Handle : teb48-metu
59Organization Name : T.C. Ekonomi Bakanlığı
60Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
61 No: 63 PK: 06530 Çankaya/ANKARA
62 Ankara,06510
63 Türkiye
64Phone : + 90-312-2048125-
65Fax : + 90-312-2122061-
66
67
68** Domain Servers:
69ns1.ekonomi.gov.tr
70ns2.ekonomi.gov.tr
71
72** Additional Info:
73Created on..............: 2010-Oct-13.
74Expires on..............: 2021-Oct-12.
75#######################################################################################################################################
76[+] Target : www.trade.gov.tr
77
78[+] IP Address : 95.0.51.12
79
80[+] Headers :
81
82[+] Cache-Control : private
83[+] Content-Type : text/html; charset=utf-8
84[+] Server : Microsoft-IIS/10.0
85[+] X-AspNetMvc-Version : 5.2
86[+] X-AspNet-Version : 4.0.30319
87[+] X-Powered-By : ASP.NET
88[+] Access-Control-Allow-Origin : *
89[+] Date : Mon, 11 Nov 2019 01:40:12 GMT
90[+] Content-Length : 50217
91
92[+] SSL Certificate Information :
93
94[+] organizationalUnitName : Domain Control Validated
95[+] commonName : *.trade.gov.tr
96[+] countryName : BE
97[+] organizationName : GlobalSign nv-sa
98[+] commonName : AlphaSSL CA - SHA256 - G2
99[+] Version : 3
100[+] Serial Number : 08DB1C3F0DE8DFCB304E9721
101[+] Not Before : Jul 19 15:39:48 2018 GMT
102[+] Not After : Jul 19 15:39:48 2020 GMT
103[+] OCSP : ('http://ocsp2.globalsign.com/gsalphasha2g2',)
104[+] subject Alt Name : (('DNS', '*.trade.gov.tr'), ('DNS', 'trade.gov.tr'))
105[+] CA Issuers : ('http://secure2.alphassl.com/cacert/gsalphasha2g2r1.crt',)
106[+] CRL Distribution Points : ('http://crl2.alphassl.com/gs/gsalphasha2g2.crl',)
107
108[+] Whois Lookup :
109
110[+] NIR : None
111[+] ASN Registry : ripencc
112[+] ASN : 9121
113[+] ASN CIDR : 95.0.0.0/17
114[+] ASN Country Code : TR
115[+] ASN Date : 2008-10-14
116[+] ASN Description : TTNET, TR
117[+] cidr : 95.0.51.0/24
118[+] name : Turkish_Customs_Administrations
119[+] handle : MKG18-RIPE
120[+] range : 95.0.51.0 - 95.0.51.255
121[+] description : Anafartalar Cad. No:6 Kat:14 Ulus Ankara TURKEY
122[+] country : TR
123[+] state : None
124[+] city : None
125[+] address : Anafartalar Cad. No:6 Kat:14 Ulus Ankara TURKEY
126[+] postal_code : None
127[+] emails : None
128[+] created : 2011-12-12T14:08:41Z
129[+] updated : 2011-12-12T14:08:41Z
130
131[+] Crawling Target...
132
133[+] Looking for robots.txt........[ Not Found ]
134[+] Looking for sitemap.xml.......[ Not Found ]
135[+] Extracting CSS Links..........[ 1 ]
136[+] Extracting Javascript Links...[ 1 ]
137[+] Extracting Internal Links.....[ 2 ]
138[+] Extracting External Links.....[ 6 ]
139[+] Extracting Images.............[ 19 ]
140
141[+] Total Links Extracted : 29
142
143[+] Dumping Links in /opt/FinalRecon/dumps/www.trade.gov.tr.dump
144[+] Completed!
145#######################################################################################################################################
146[+] Starting At 2019-11-10 20:40:38.700711
147[+] Collecting Information On: https://www.trade.gov.tr/
148[#] Status: 200
149--------------------------------------------------
150[#] Web Server Detected: Microsoft-IIS/10.0
151[#] X-Powered-By: ASP.NET
152[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
153[+] CORS Wildcard Detected !
154- Cache-Control: private
155- Content-Type: text/html; charset=utf-8
156- Server: Microsoft-IIS/10.0
157- Set-Cookie: ASP.NET_SessionId=orthwilnjerug4n2kw5rzalw; path=/; HttpOnly
158- X-AspNetMvc-Version: 5.2
159- X-AspNet-Version: 4.0.30319
160- X-Powered-By: ASP.NET
161- Access-Control-Allow-Origin: *
162- Date: Mon, 11 Nov 2019 01:40:40 GMT
163- Content-Length: 50217
164--------------------------------------------------
165[#] Finding Location..!
166[#] status: success
167[#] country: Turkey
168[#] countryCode: TR
169[#] region: 42
170[#] regionName: Konya
171[#] city: Konya
172[#] zip:
173[#] lat: 37.8912
174[#] lon: 32.4806
175[#] timezone: Europe/Istanbul
176[#] isp: Turk Telekomunikasyon Anonim Sirketi
177[#] org: Turkish Customs Administrations
178[#] as: AS9121 Turk Telekomunikasyon Anonim Sirketi
179[#] query: 95.0.51.12
180--------------------------------------------------
181[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
182--------------------------------------------------
183[#] Starting Reverse DNS
184[-] Failed ! Fail
185--------------------------------------------------
186[!] Scanning Open Port
187[#] 80/tcp open http
188[#] 443/tcp open https
189--------------------------------------------------
190[+] Collecting Information Disclosure!
191[#] Detecting sitemap.xml file
192[-] sitemap.xml file not Found!?
193[#] Detecting robots.txt file
194[-] robots.txt file not Found!?
195[#] Detecting GNU Mailman
196[-] GNU Mailman App Not Detected!?
197--------------------------------------------------
198[+] Crawling Url Parameter On: https://www.trade.gov.tr/
199--------------------------------------------------
200[#] Searching Html Form !
201[-] No Html Form Found!?
202--------------------------------------------------
203[!] Found 9 dom parameter
204[#] https://www.trade.gov.tr//#
205[#] https://www.trade.gov.tr//#
206[#] https://www.trade.gov.tr//#
207[#] https://www.trade.gov.tr//#
208[#] https://www.trade.gov.tr//#
209[#] https://www.trade.gov.tr//#
210[#] https://www.trade.gov.tr//#
211[#] https://www.trade.gov.tr//#
212[#] https://www.trade.gov.tr//#
213--------------------------------------------------
214[!] 1 Internal Dynamic Parameter Discovered
215[+] https://www.trade.gov.tr///v2/app.css?v=3
216--------------------------------------------------
217[!] 2 External Dynamic Parameter Discovered
218[#] http://www.yoikk.gov.tr/index.cfm?dilSecim=2
219[#] https://www.youtube.com/channel/UC9MQ2MVIMlRRzjPcsZFQ5PQ?&ab_channel=TicaretBakanl%C4%B1%C4%9F%C4%B1
220--------------------------------------------------
221[!] 53 Internal links Discovered
222[+] https://www.trade.gov.tr///kurumsal
223[+] https://www.trade.gov.tr///yurtdisi-teskilati
224[+] https://www.trade.gov.tr///ithalat
225[+] https://www.trade.gov.tr///ihracat
226[+] https://www.trade.gov.tr///hizmet-ticareti
227[+] https://www.trade.gov.tr///dis-iliskiler
228[+] https://www.trade.gov.tr///urun-guvenligi
229[+] https://www.trade.gov.tr///haberler
230[+] https://www.trade.gov.tr///ekonomi-haberleri
231[+] https://www.trade.gov.tr///ticari-haberler
232[+] https://www.trade.gov.tr///kurumsal-haberler
233[+] https://www.trade.gov.tr///destekler
234[+] https://www.trade.gov.tr///iletisim/iletisim
235[+] https://www.trade.gov.tr///
236[+] https://www.trade.gov.tr///uygulamalar
237[+] https://www.trade.gov.tr///
238[+] https://www.trade.gov.tr///about-ministry
239[+] https://www.trade.gov.tr///about-ministry/minister-of-trade
240[+] https://www.trade.gov.tr///about-ministry/gonca-yilmaz-batur
241[+] https://www.trade.gov.tr///about-ministry/sezai-ucarmak
242[+] https://www.trade.gov.tr///about-ministry/riza-tuna-turagay
243[+] https://www.trade.gov.tr///about-ministry/organizational-structure
244[+] https://www.trade.gov.tr///legislation/export
245[+] https://www.trade.gov.tr///investment/homepage
246[+] https://www.trade.gov.tr///free-zones/general-outlook
247[+] https://www.trade.gov.tr///fdi/law
248[+] https://www.trade.gov.tr///statistics/statistics
249[+] https://www.trade.gov.tr///contact/contact
250[+] https://www.trade.gov.tr///announcements/foreign-trade-expectation-survey-of-3rd-quarter-of-2019
251[+] https://www.trade.gov.tr///about-ministry/minister-of-trade
252[+] https://www.trade.gov.tr///commercial-representatives
253[+] https://www.trade.gov.tr///free-trade-agreements
254[+] https://www.trade.gov.tr///economic-outlook
255[+] https://www.trade.gov.tr///sectoral-reports
256[+] https://www.trade.gov.tr///multinational-relations
257[+] https://www.trade.gov.tr///free-zones
258[+] https://www.trade.gov.tr///sub-page2.html
259[+] https://www.trade.gov.tr///establishing-company-in-turkey
260[+] https://www.trade.gov.tr///news
261[+] https://www.trade.gov.tr///news/u-s-international-trade-in-goods-and-services-may-2019
262[+] https://www.trade.gov.tr///focus-business-turkey
263[+] https://www.trade.gov.tr/data/5da9c4b013b87619b82d2d18/FBT October 2019.pdf
264[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-september-2019
265[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-august-2019
266[+] https://www.trade.gov.tr/data/5d3812e413b876143465b090/FBT July 2019.pdf
267[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-june-2019
268[+] https://www.trade.gov.tr///turquality
269[+] https://www.trade.gov.tr///turkish-contracting-services
270[+] https://www.trade.gov.tr///buy-turkish-products
271[+] https://www.trade.gov.tr///trade-fairs-and-buyers-mission
272[+] https://www.trade.gov.tr///turkey-and-eu
273[+] https://www.trade.gov.tr///national-contact-point-for-oecd-guidelines-for-multinational-enterprises
274[+] https://www.trade.gov.tr///2023-export-strategy
275--------------------------------------------------
276[!] 10 External links Discovered
277[#] https://cdn.ticaret.gov.tr/images/favicons/apple-touch-icon.png
278[#] https://cdn.ticaret.gov.tr/images/favicons/favicon-32x32.png
279[#] https://cdn.ticaret.gov.tr/images/favicons/favicon-16x16.png
280[#] https://cdn.ticaret.gov.tr/images/favicons/site.webmanifest
281[#] https://cdn.ticaret.gov.tr/images/favicons/safari-pinned-tab.svg
282[#] https://cdn.ticaret.gov.tr/images/favicons/favicon.ico
283[#] https://kms.kaysis.gov.tr/Home/Kurum/24308261
284[#] https://risk.gtb.gov.tr/web
285[#] https://www.ticaret.gov.tr
286[#] https://twitter.com/ticaret
287--------------------------------------------------
288[#] Mapping Subdomain..
289[!] Found 3 Subdomain
290- mail2.trade.gov.tr
291- test.trade.gov.tr
292- www.trade.gov.tr
293--------------------------------------------------
294[!] Done At 2019-11-10 20:41:25.363560
295#######################################################################################################################################
296[i] Scanning Site: https://www.trade.gov.tr
297
298
299
300B A S I C I N F O
301====================
302
303
304[+] Site Title: Republic of Turkey - Ministry of Trade
305[+] IP address: 95.0.51.12
306[+] Web Server: Microsoft-IIS/10.0
307[+] CMS: Could Not Detect
308[+] Cloudflare: Not Detected
309[+] Robots File: Could NOT Find robots.txt!
310
311
312
313
314W H O I S L O O K U P
315========================
316
317 ** Domain Name: trade.gov.tr
318
319** Registrant:
320 T.C Ekonomi Bakanlığı
321 T.C. Ekonomi Bakanlığı Bilgi İşlem Dairesi
322 Başkanlığı İnönü Bulvarı No:36 Emek
323 Ankara,
324 Türkiye
325 oktay.ustundag@ekonomi.gov.tr
326 + 90-312-2047971-
327 + 90-312-2152061
328
329
330** Administrative Contact:
331NIC Handle : teb48-metu
332Organization Name : T.C. Ekonomi Bakanlığı
333Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
334 No: 63 PK: 06530 Çankaya/ANKARA
335 Ankara,06510
336 Türkiye
337Phone : + 90-312-2048125-
338Fax : + 90-312-2122061-
339
340
341** Technical Contact:
342NIC Handle : teb48-metu
343Organization Name : T.C. Ekonomi Bakanlığı
344Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
345 No: 63 PK: 06530 Çankaya/ANKARA
346 Ankara,06510
347 Türkiye
348Phone : + 90-312-2048125-
349Fax : + 90-312-2122061-
350
351
352** Billing Contact:
353NIC Handle : teb48-metu
354Organization Name : T.C. Ekonomi Bakanlığı
355Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
356 No: 63 PK: 06530 Çankaya/ANKARA
357 Ankara,06510
358 Türkiye
359Phone : + 90-312-2048125-
360Fax : + 90-312-2122061-
361
362
363** Domain Servers:
364ns1.ekonomi.gov.tr
365ns2.ekonomi.gov.tr
366
367** Additional Info:
368Created on..............: 2010-Oct-13.
369Expires on..............: 2021-Oct-12.
370
371
372
373
374G E O I P L O O K U P
375=========================
376
377[i] IP Address: 95.0.51.12
378[i] Country: Turkey
379[i] State: Ankara
380[i] City: Ankara
381[i] Latitude: 39.9619
382[i] Longitude: 32.7916
383
384
385
386
387H T T P H E A D E R S
388=======================
389
390
391[i] HTTP/1.1 200 OK
392[i] Cache-Control: private
393[i] Content-Type: text/html; charset=utf-8
394[i] Server: Microsoft-IIS/10.0
395[i] Set-Cookie: ASP.NET_SessionId=lk1gwwaq4f1i5oaa5akojk0d; path=/; HttpOnly
396[i] X-AspNetMvc-Version: 5.2
397[i] X-AspNet-Version: 4.0.30319
398[i] X-Powered-By: ASP.NET
399[i] Access-Control-Allow-Origin: *
400[i] Date: Mon, 11 Nov 2019 01:40:58 GMT
401[i] Connection: close
402[i] Content-Length: 50217
403
404
405
406
407D N S L O O K U P
408===================
409
410trade.gov.tr. 3599 IN A 95.0.51.12
411trade.gov.tr. 3599 IN NS ns2.
412trade.gov.tr. 3599 IN NS ns1.ekonomi.gov.tr.
413trade.gov.tr. 3599 IN NS ns3.ekonomi.gov.tr.
414trade.gov.tr. 3599 IN NS ns2.ekonomi.gov.tr.
415trade.gov.tr. 3599 IN SOA ns1.ekonomi.gov.tr. hostmaster. 25 900 600 86400 3600
416trade.gov.tr. 3599 IN MX 10 mail2.ekonomi.gov.tr.
417trade.gov.tr. 3599 IN TXT "v=spf1 redirect=ekonomi.gov.tr"
418
419
420
421
422S U B N E T C A L C U L A T I O N
423====================================
424
425Address = 95.0.51.12
426Network = 95.0.51.12 / 32
427Netmask = 255.255.255.255
428Broadcast = not needed on Point-to-Point links
429Wildcard Mask = 0.0.0.0
430Hosts Bits = 0
431Max. Hosts = 1 (2^0 - 0)
432Host Range = { 95.0.51.12 - 95.0.51.12 }
433
434
435
436N M A P P O R T S C A N
437============================
438
439Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-11 01:41 UTC
440Nmap scan report for trade.gov.tr (95.0.51.12)
441Host is up (0.13s latency).
442rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
443
444PORT STATE SERVICE
44521/tcp filtered ftp
44622/tcp filtered ssh
44723/tcp filtered telnet
44880/tcp open http
449110/tcp filtered pop3
450143/tcp filtered imap
451443/tcp open https
4523389/tcp filtered ms-wbt-server
453
454Nmap done: 1 IP address (1 host up) scanned in 3.25 seconds
455
456
457
458S U B - D O M A I N F I N D E R
459==================================
460
461
462[i] Total Subdomains Found : 2
463
464[+] Subdomain: test.trade.gov.tr
465[-] IP: 95.0.51.12
466
467[+] Subdomain: www.trade.gov.tr
468[-] IP: 95.0.51.12
469#######################################################################################################################################
470[INFO] ------TARGET info------
471[*] TARGET: https://www.trade.gov.tr/
472[*] TARGET IP: 95.0.51.12
473[INFO] NO load balancer detected for www.trade.gov.tr...
474[*] DNS servers: ns1.ekonomi.gov.tr.
475[*] TARGET server: Microsoft-IIS/10.0
476[*] CC: TR
477[*] Country: Turkey
478[*] RegionCode: 42
479[*] RegionName: Konya
480[*] City: Konya
481[*] ASN: AS9121
482[*] BGP_PREFIX: 95.0.0.0/12
483[*] ISP: TTNet Turk Telekomunikasyon Anonim Sirketi, TR
484[INFO] SSL/HTTPS certificate detected
485[*] Issuer: issuer=C = BE, O = GlobalSign nv-sa, CN = AlphaSSL CA - SHA256 - G2
486[*] Subject: subject=OU = Domain Control Validated, CN = *.trade.gov.tr
487[INFO] DNS enumeration:
488[*] mail2.trade.gov.tr 212.174.119.132
489[*] test.trade.gov.tr 95.0.51.12
490[INFO] Possible abuse mails are:
491[*] abuse@trade.gov.tr
492[*] abuse@ttnet.com.tr
493[*] abuse@www.trade.gov.tr
494[INFO] NO PAC (Proxy Auto Configuration) file FOUND
495[INFO] Starting FUZZing in http://www.trade.gov.tr/FUzZzZzZzZz...
496[INFO] Status code Folders
497[*] 200 http://www.trade.gov.tr/news
498[ALERT] Look in the source code. It may contain passwords
499
500Recherche 95.0.51.12
501Connexion HTTP à 95.0.51.12
502Envoi de la requête HTTP.
503Requête HTTP envoyée. Attente de réponse.
504HTTP/1.1 302 Found
505Transfert de données terminé
506HTTP/1.1 302 Found
507Utilisation de https://95.0.51.12/
508Recherche 95.0.51.12
509Connexion HTTPS à 95.0.51.12
510Alerte ! : Unable to make secure connection to remote host.
511
512lynx : accès impossible au fichier de départ http://95.0.51.12/
513[INFO] Links found from https://www.trade.gov.tr/ http://95.0.51.12/:
514[*] https://kms.kaysis.gov.tr/Home/Kurum/24308261
515[*] https://risk.gtb.gov.tr/web
516[*] https://twitter.com/ticaret
517[*] https://www.ticaret.gov.tr/
518[*] https://www.trade.gov.tr/
519[*] https://www.trade.gov.tr/2023-export-strategy
520[*] https://www.trade.gov.tr/about-ministry
521[*] https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur
522[*] https://www.trade.gov.tr/about-ministry/minister-of-trade
523[*] https://www.trade.gov.tr/about-ministry/organizational-structure
524[*] https://www.trade.gov.tr/about-ministry/riza-tuna-turagay
525[*] https://www.trade.gov.tr/about-ministry/sezai-ucarmak
526[*] https://www.trade.gov.tr/announcements/foreign-trade-expectation-survey-of-3rd-quarter-of-2019
527[*] https://www.trade.gov.tr/buy-turkish-products
528[*] https://www.trade.gov.tr/commercial-representatives
529[*] https://www.trade.gov.tr/contact/contact
530[*] https://www.trade.gov.tr/data/5d3812e413b876143465b090/FBT July 2019.pdf
531[*] https://www.trade.gov.tr/data/5da9c4b013b87619b82d2d18/FBT October 2019.pdf
532[*] https://www.trade.gov.tr/destekler
533[*] https://www.trade.gov.tr/dis-iliskiler
534[*] https://www.trade.gov.tr/economic-outlook
535[*] https://www.trade.gov.tr/ekonomi-haberleri
536[*] https://www.trade.gov.tr/establishing-company-in-turkey
537[*] https://www.trade.gov.tr/fdi/law
538[*] https://www.trade.gov.tr/focus-business-turkey
539[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-august-2019
540[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-june-2019
541[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-september-2019
542[*] https://www.trade.gov.tr/free-trade-agreements
543[*] https://www.trade.gov.tr/free-zones
544[*] https://www.trade.gov.tr/free-zones/general-outlook
545[*] https://www.trade.gov.tr/haberler
546[*] https://www.trade.gov.tr/hizmet-ticareti
547[*] https://www.trade.gov.tr/ihracat
548[*] https://www.trade.gov.tr/iletisim/iletisim
549[*] https://www.trade.gov.tr/investment/homepage
550[*] https://www.trade.gov.tr/ithalat
551[*] https://www.trade.gov.tr/kurumsal
552[*] https://www.trade.gov.tr/kurumsal-haberler
553[*] https://www.trade.gov.tr/legislation/export
554[*] https://www.trade.gov.tr/multinational-relations
555[*] https://www.trade.gov.tr/national-contact-point-for-oecd-guidelines-for-multinational-enterprises
556[*] https://www.trade.gov.tr/news
557[*] https://www.trade.gov.tr/news/u-s-international-trade-in-goods-and-services-may-2019
558[*] https://www.trade.gov.tr/sectoral-reports
559[*] https://www.trade.gov.tr/statistics/statistics
560[*] https://www.trade.gov.tr/sub-page2.html
561[*] https://www.trade.gov.tr/ticari-haberler
562[*] https://www.trade.gov.tr/trade-fairs-and-buyers-mission
563[*] https://www.trade.gov.tr/turkey-and-eu
564[*] https://www.trade.gov.tr/turkish-contracting-services
565[*] https://www.trade.gov.tr/turquality
566[*] https://www.trade.gov.tr/urun-guvenligi
567[*] https://www.trade.gov.tr/uygulamalar
568[*] https://www.trade.gov.tr/yurtdisi-teskilati
569[*] https://www.youtube.com/channel/UC9MQ2MVIMlRRzjPcsZFQ5PQ?&ab_channel=TicaretBakanl%C4%B1%C4%9F%C4%B1
570[*] http://www.yoikk.gov.tr/index.cfm?dilSecim=2
571[INFO] GOOGLE has 206,000,000 results (0.21 seconds) about http://www.trade.gov.tr/
572[INFO] Shodan detected the following opened ports on 95.0.51.12:
573[*] 3
574[*] 443
575[*] 7
576[*] 8
577[INFO] ------VirusTotal SECTION------
578[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
579[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
580[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
581[INFO] ------Alexa Rank SECTION------
582[INFO] Percent of Visitors Rank in Country:
583[INFO] Percent of Search Traffic:
584[INFO] Percent of Unique Visits:
585[INFO] Total Sites Linking In:
586[*] Total Sites
587[INFO] Useful links related to www.trade.gov.tr - 95.0.51.12:
588[*] https://www.virustotal.com/pt/ip-address/95.0.51.12/information/
589[*] https://www.hybrid-analysis.com/search?host=95.0.51.12
590[*] https://www.shodan.io/host/95.0.51.12
591[*] https://www.senderbase.org/lookup/?search_string=95.0.51.12
592[*] https://www.alienvault.com/open-threat-exchange/ip/95.0.51.12
593[*] http://pastebin.com/search?q=95.0.51.12
594[*] http://urlquery.net/search.php?q=95.0.51.12
595[*] http://www.alexa.com/siteinfo/www.trade.gov.tr
596[*] http://www.google.com/safebrowsing/diagnostic?site=www.trade.gov.tr
597[*] https://censys.io/ipv4/95.0.51.12
598[*] https://www.abuseipdb.com/check/95.0.51.12
599[*] https://urlscan.io/search/#95.0.51.12
600[*] https://github.com/search?q=95.0.51.12&type=Code
601[INFO] Useful links related to AS9121 - 95.0.0.0/12:
602[*] http://www.google.com/safebrowsing/diagnostic?site=AS:9121
603[*] https://www.senderbase.org/lookup/?search_string=95.0.0.0/12
604[*] http://bgp.he.net/AS9121
605[*] https://stat.ripe.net/AS9121
606[INFO] Date: 10/11/19 | Time: 20:43:06
607[INFO] Total time: 2 minute(s) and 22 second(s)
608#######################################################################################################################################
609Trying "trade.gov.tr"
610;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57894
611;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 4, ADDITIONAL: 2
612
613;; QUESTION SECTION:
614;trade.gov.tr. IN ANY
615
616;; ANSWER SECTION:
617trade.gov.tr. 3131 IN TXT "v=spf1 redirect=ekonomi.gov.tr"
618trade.gov.tr. 3108 IN MX 10 mail2.ekonomi.gov.tr.
619trade.gov.tr. 3108 IN SOA ns1.ekonomi.gov.tr. hostmaster. 25 900 600 86400 3600
620trade.gov.tr. 3112 IN A 95.0.51.12
621trade.gov.tr. 3108 IN NS ns1.ekonomi.gov.tr.
622trade.gov.tr. 3108 IN NS ns2.ekonomi.gov.tr.
623trade.gov.tr. 3108 IN NS ns2.
624trade.gov.tr. 3108 IN NS ns3.ekonomi.gov.tr.
625
626;; AUTHORITY SECTION:
627trade.gov.tr. 3108 IN NS ns3.ekonomi.gov.tr.
628trade.gov.tr. 3108 IN NS ns2.
629trade.gov.tr. 3108 IN NS ns1.ekonomi.gov.tr.
630trade.gov.tr. 3108 IN NS ns2.ekonomi.gov.tr.
631
632;; ADDITIONAL SECTION:
633ns1.ekonomi.gov.tr. 43200 IN A 212.174.119.211
634ns2.ekonomi.gov.tr. 43200 IN A 212.174.119.212
635
636Received 324 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 432 ms
637#######################################################################################################################################
638; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace trade.gov.tr any
639;; global options: +cmd
640. 80944 IN NS j.root-servers.net.
641. 80944 IN NS a.root-servers.net.
642. 80944 IN NS h.root-servers.net.
643. 80944 IN NS i.root-servers.net.
644. 80944 IN NS b.root-servers.net.
645. 80944 IN NS f.root-servers.net.
646. 80944 IN NS d.root-servers.net.
647. 80944 IN NS l.root-servers.net.
648. 80944 IN NS c.root-servers.net.
649. 80944 IN NS k.root-servers.net.
650. 80944 IN NS e.root-servers.net.
651. 80944 IN NS m.root-servers.net.
652. 80944 IN NS g.root-servers.net.
653. 80944 IN RRSIG NS 8 0 518400 20191123170000 20191110160000 22545 . ZeVbhDFph+vUqvs60OAMqViL/aSxI7vAC8GFp6jYSXiXm+pSoer4Y+8O xPOFjG7rA6+ZegOrI8vGMrvJ7f9vGUo9ebewCrbfFxHGSmU2B6KBLT35 wpE/XYcFGezT9F5Uss1sDHzx8eOxoWlhqyvaWOUx8XheVU0ELi6vKNLj zwO0tbujjREOoAURsQ6bMd95xvK3OCwp30a2E3x3hTd2fsE4/by4CJRg jWQ3gzvkjwHAcZnkFxOi+v4w9fcTJHce6klv4sltucwGR5FNHeenMxSt Lelk2HKGWBOlBcp+aJYfcMSoOheIeH/rz0N5xJDtAuY42efakHB8OeI9 MLfeyQ==
654;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 451 ms
655
656tr. 172800 IN NS ns21.nic.tr.
657tr. 172800 IN NS ns22.nic.tr.
658tr. 172800 IN NS ns31.nic.tr.
659tr. 172800 IN NS ns41.nic.tr.
660tr. 172800 IN NS ns42.nic.tr.
661tr. 172800 IN NS ns91.nic.tr.
662tr. 172800 IN NS ns92.nic.tr.
663tr. 86400 IN NSEC trade. NS RRSIG NSEC
664tr. 86400 IN RRSIG NSEC 8 1 86400 20191123170000 20191110160000 22545 . ZX9budCWY+WDrG8oqYujk/WJsTbFnaMLZLVOMdG9Y9AV3vPuDht3vUq3 xKlufTRLLc19evGs9p3/aJHdBlClv+kPc76/KU54uVhtTaNXVroUnTfp JVQvH+0Bf41ECaTjefTjfaJutqx8ETDeflCQV+zMVVZ8mlgxzAci8ufE FMutFR5oErOqQiwQa1M8SFNDvnyjejJmHCMvma7fXD4CURQsJfcrEbDd wvYszKVCXY1lwB5CdV5586y5q/tLFQSVvxrytZ2W7Gyhx/dNDa+cXUsT jxg5h3WLqZF7nE0Jc6ukPAVFLN1i+qe+/lSO5udDQbSX0cRR3PA+blKR aZ/J+A==
665;; Received 716 bytes from 192.203.230.10#53(e.root-servers.net) in 323 ms
666
667trade.gov.tr. 43200 IN NS ns2.ekonomi.gov.tr.
668trade.gov.tr. 43200 IN NS ns1.ekonomi.gov.tr.
669;; Received 117 bytes from 2600:2000:3002::1#53(ns91.nic.tr) in 288 ms
670
671;; Connection to 212.174.119.211#53(212.174.119.211) for trade.gov.tr failed: connection refused.
672;; Connection to 212.174.119.212#53(212.174.119.212) for trade.gov.tr failed: connection refused.
673#######################################################################################################################################
674[*] Processing domain trade.gov.tr
675[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
676[+] Getting nameservers
677212.174.119.211 - ns1.ekonomi.gov.tr
678212.174.119.212 - ns2.ekonomi.gov.tr
679[-] Zone transfer failed
680
681[+] TXT records found
682"v=spf1 redirect=ekonomi.gov.tr"
683
684[+] MX records found, added to target list
68510 mail2.ekonomi.gov.tr.
686
687[*] Scanning trade.gov.tr for A records
68895.0.51.12 - trade.gov.tr
689212.174.119.132 - mail2.trade.gov.tr
69095.0.51.12 - test.trade.gov.tr
69195.0.51.12 - www.trade.gov.tr
692#######################################################################################################################################
693Privileges have been dropped to "nobody:nogroup" for security reasons.
694
695Processed queries: 0
696Received packets: 0
697Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
698Current incoming rate: 0 pps, average: 0 pps
699Current success rate: 0 pps, average: 0 pps
700Finished total: 0, success: 0 (0.00%)
701Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
702Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
703Response: | Success: | Total:
704OK: | 0 ( 0.00%) | 0 ( 0.00%)
705NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
706SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
707REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
708FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
709
710
711
712Processed queries: 1919
713Received packets: 1147
714Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
715Current incoming rate: 1144 pps, average: 1144 pps
716Current success rate: 666 pps, average: 666 pps
717Finished total: 668, success: 668 (100.00%)
718Mismatched domains: 88 (7.77%), IDs: 0 (0.00%)
719Failures: 0: 12.43%, 1: 223.20%, 2: 48.95%, 3: 2.69%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
720Response: | Success: | Total:
721OK: | 107 ( 16.02%) | 116 ( 10.24%)
722NXDOMAIN: | 510 ( 76.35%) | 539 ( 47.57%)
723SERVFAIL: | 51 ( 7.63%) | 59 ( 5.21%)
724REFUSED: | 0 ( 0.00%) | 419 ( 36.98%)
725FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
726
727
728
729Processed queries: 1919
730Received packets: 3371
731Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
732Current incoming rate: 2219 pps, average: 1682 pps
733Current success rate: 1046 pps, average: 856 pps
734Finished total: 1717, success: 1717 (100.00%)
735Mismatched domains: 942 (28.20%), IDs: 0 (0.00%)
736Failures: 0: 4.83%, 1: 32.73%, 2: 33.90%, 3: 28.19%, 4: 10.25%, 5: 1.57%, 6: 0.29%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
737Response: | Success: | Total:
738OK: | 181 ( 10.54%) | 224 ( 6.70%)
739NXDOMAIN: | 1452 ( 84.57%) | 2117 ( 63.36%)
740SERVFAIL: | 84 ( 4.89%) | 118 ( 3.53%)
741REFUSED: | 0 ( 0.00%) | 882 ( 26.40%)
742FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
743
744
745
746Processed queries: 1919
747Received packets: 3714
748Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
749Current incoming rate: 342 pps, average: 1235 pps
750Current success rate: 141 pps, average: 618 pps
751Finished total: 1859, success: 1859 (100.00%)
752Mismatched domains: 1098 (29.81%), IDs: 0 (0.00%)
753Failures: 0: 4.46%, 1: 30.23%, 2: 31.31%, 3: 22.49%, 4: 6.94%, 5: 4.20%, 6: 2.85%, 7: 0.59%, 8: 0.16%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
754Response: | Success: | Total:
755OK: | 191 ( 10.27%) | 236 ( 6.41%)
756NXDOMAIN: | 1580 ( 84.99%) | 2381 ( 64.65%)
757SERVFAIL: | 88 ( 4.73%) | 123 ( 3.34%)
758REFUSED: | 0 ( 0.00%) | 943 ( 25.60%)
759FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
760
761
762
763Processed queries: 1919
764Received packets: 3825
765Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
766Current incoming rate: 110 pps, average: 954 pps
767Current success rate: 43 pps, average: 474 pps
768Finished total: 1903, success: 1903 (100.00%)
769Mismatched domains: 1157 (30.50%), IDs: 0 (0.00%)
770Failures: 0: 4.36%, 1: 29.53%, 2: 30.58%, 3: 21.97%, 4: 6.78%, 5: 3.31%, 6: 2.21%, 7: 1.16%, 8: 0.47%, 9: 0.37%, 10: 0.11%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
771Response: | Success: | Total:
772OK: | 193 ( 10.14%) | 239 ( 6.30%)
773NXDOMAIN: | 1620 ( 85.13%) | 2472 ( 65.16%)
774SERVFAIL: | 90 ( 4.73%) | 125 ( 3.29%)
775REFUSED: | 0 ( 0.00%) | 958 ( 25.25%)
776FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
777
778
779
780Processed queries: 1919
781Received packets: 3858
782Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
783Current incoming rate: 32 pps, average: 770 pps
784Current success rate: 11 pps, average: 382 pps
785Finished total: 1915, success: 1915 (100.00%)
786Mismatched domains: 1176 (30.73%), IDs: 0 (0.00%)
787Failures: 0: 4.33%, 1: 29.35%, 2: 30.39%, 3: 21.83%, 4: 6.74%, 5: 3.29%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.42%, 10: 0.37%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
788Response: | Success: | Total:
789OK: | 193 ( 10.08%) | 240 ( 6.27%)
790NXDOMAIN: | 1631 ( 85.17%) | 2496 ( 65.22%)
791SERVFAIL: | 91 ( 4.75%) | 128 ( 3.34%)
792REFUSED: | 0 ( 0.00%) | 963 ( 25.16%)
793FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
794
795
796
797Processed queries: 1919
798Received packets: 3874
799Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
800Current incoming rate: 15 pps, average: 644 pps
801Current success rate: 2 pps, average: 319 pps
802Finished total: 1918, success: 1918 (100.00%)
803Mismatched domains: 1189 (30.94%), IDs: 0 (0.00%)
804Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
805Response: | Success: | Total:
806OK: | 193 ( 10.06%) | 240 ( 6.25%)
807NXDOMAIN: | 1634 ( 85.19%) | 2511 ( 65.34%)
808SERVFAIL: | 91 ( 4.74%) | 128 ( 3.33%)
809REFUSED: | 0 ( 0.00%) | 964 ( 25.08%)
810FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
811
812
813
814Processed queries: 1919
815Received packets: 3879
816Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
817Current incoming rate: 4 pps, average: 553 pps
818Current success rate: 0 pps, average: 273 pps
819Finished total: 1918, success: 1918 (100.00%)
820Mismatched domains: 1194 (31.03%), IDs: 0 (0.00%)
821Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
822Response: | Success: | Total:
823OK: | 193 ( 10.06%) | 240 ( 6.24%)
824NXDOMAIN: | 1634 ( 85.19%) | 2515 ( 65.36%)
825SERVFAIL: | 91 ( 4.74%) | 128 ( 3.33%)
826REFUSED: | 0 ( 0.00%) | 965 ( 25.08%)
827FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
828
829
830
831Processed queries: 1919
832Received packets: 3885
833Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
834Current incoming rate: 5 pps, average: 484 pps
835Current success rate: 0 pps, average: 239 pps
836Finished total: 1918, success: 1918 (100.00%)
837Mismatched domains: 1200 (31.14%), IDs: 0 (0.00%)
838Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.05%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
839Response: | Success: | Total:
840OK: | 193 ( 10.06%) | 240 ( 6.23%)
841NXDOMAIN: | 1634 ( 85.19%) | 2520 ( 65.39%)
842SERVFAIL: | 91 ( 4.74%) | 129 ( 3.35%)
843REFUSED: | 0 ( 0.00%) | 965 ( 25.04%)
844FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
845
846
847
848Processed queries: 1919
849Received packets: 3889
850Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
851Current incoming rate: 3 pps, average: 431 pps
852Current success rate: 0 pps, average: 212 pps
853Finished total: 1918, success: 1918 (100.00%)
854Mismatched domains: 1204 (31.21%), IDs: 0 (0.00%)
855Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
856Response: | Success: | Total:
857OK: | 193 ( 10.06%) | 240 ( 6.22%)
858NXDOMAIN: | 1634 ( 85.19%) | 2522 ( 65.37%)
859SERVFAIL: | 91 ( 4.74%) | 129 ( 3.34%)
860REFUSED: | 0 ( 0.00%) | 966 ( 25.04%)
861FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
862
863
864
865Processed queries: 1919
866Received packets: 3893
867Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
868Current incoming rate: 3 pps, average: 388 pps
869Current success rate: 0 pps, average: 191 pps
870Finished total: 1918, success: 1918 (100.00%)
871Mismatched domains: 1208 (31.28%), IDs: 0 (0.00%)
872Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
873Response: | Success: | Total:
874OK: | 193 ( 10.06%) | 240 ( 6.21%)
875NXDOMAIN: | 1634 ( 85.19%) | 2523 ( 65.33%)
876SERVFAIL: | 91 ( 4.74%) | 130 ( 3.37%)
877REFUSED: | 0 ( 0.00%) | 968 ( 25.06%)
878FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
879
880
881
882Processed queries: 1919
883Received packets: 3904
884Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
885Current incoming rate: 10 pps, average: 354 pps
886Current success rate: 0 pps, average: 174 pps
887Finished total: 1918, success: 1918 (100.00%)
888Mismatched domains: 1219 (31.47%), IDs: 0 (0.00%)
889Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
890Response: | Success: | Total:
891OK: | 193 ( 10.06%) | 240 ( 6.20%)
892NXDOMAIN: | 1634 ( 85.19%) | 2524 ( 65.17%)
893SERVFAIL: | 91 ( 4.74%) | 138 ( 3.56%)
894REFUSED: | 0 ( 0.00%) | 970 ( 25.05%)
895FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
896
897
898
899Processed queries: 1919
900Received packets: 3918
901Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
902Current incoming rate: 13 pps, average: 325 pps
903Current success rate: 0 pps, average: 159 pps
904Finished total: 1918, success: 1918 (100.00%)
905Mismatched domains: 1233 (31.72%), IDs: 0 (0.00%)
906Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
907Response: | Success: | Total:
908OK: | 193 ( 10.06%) | 240 ( 6.17%)
909NXDOMAIN: | 1634 ( 85.19%) | 2524 ( 64.93%)
910SERVFAIL: | 91 ( 4.74%) | 150 ( 3.86%)
911REFUSED: | 0 ( 0.00%) | 972 ( 25.01%)
912FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
913
914
915
916Processed queries: 1919
917Received packets: 3921
918Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
919Current incoming rate: 2 pps, average: 301 pps
920Current success rate: 0 pps, average: 147 pps
921Finished total: 1918, success: 1918 (100.00%)
922Mismatched domains: 1236 (31.77%), IDs: 0 (0.00%)
923Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
924Response: | Success: | Total:
925OK: | 193 ( 10.06%) | 241 ( 6.20%)
926NXDOMAIN: | 1634 ( 85.19%) | 2526 ( 64.94%)
927SERVFAIL: | 91 ( 4.74%) | 150 ( 3.86%)
928REFUSED: | 0 ( 0.00%) | 972 ( 24.99%)
929FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
930
931
932
933Processed queries: 1919
934Received packets: 3922
935Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
936Current incoming rate: 0 pps, average: 279 pps
937Current success rate: 0 pps, average: 136 pps
938Finished total: 1918, success: 1918 (100.00%)
939Mismatched domains: 1237 (31.79%), IDs: 0 (0.00%)
940Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
941Response: | Success: | Total:
942OK: | 193 ( 10.06%) | 241 ( 6.19%)
943NXDOMAIN: | 1634 ( 85.19%) | 2526 ( 64.92%)
944SERVFAIL: | 91 ( 4.74%) | 150 ( 3.86%)
945REFUSED: | 0 ( 0.00%) | 973 ( 25.01%)
946FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
947
948
949
950Processed queries: 1919
951Received packets: 3924
952Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
953Current incoming rate: 1 pps, average: 261 pps
954Current success rate: 0 pps, average: 127 pps
955Finished total: 1918, success: 1918 (100.00%)
956Mismatched domains: 1239 (31.83%), IDs: 0 (0.00%)
957Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
958Response: | Success: | Total:
959OK: | 193 ( 10.06%) | 241 ( 6.19%)
960NXDOMAIN: | 1634 ( 85.19%) | 2527 ( 64.91%)
961SERVFAIL: | 91 ( 4.74%) | 150 ( 3.85%)
962REFUSED: | 0 ( 0.00%) | 974 ( 25.02%)
963FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
964
965
966
967Processed queries: 1919
968Received packets: 3926
969Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
970Current incoming rate: 1 pps, average: 244 pps
971Current success rate: 0 pps, average: 119 pps
972Finished total: 1918, success: 1918 (100.00%)
973Mismatched domains: 1241 (31.86%), IDs: 0 (0.00%)
974Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
975Response: | Success: | Total:
976OK: | 193 ( 10.06%) | 241 ( 6.19%)
977NXDOMAIN: | 1634 ( 85.19%) | 2527 ( 64.88%)
978SERVFAIL: | 91 ( 4.74%) | 151 ( 3.88%)
979REFUSED: | 0 ( 0.00%) | 974 ( 25.01%)
980FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
981
982
983
984Processed queries: 1919
985Received packets: 3929
986Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
987Current incoming rate: 2 pps, average: 230 pps
988Current success rate: 0 pps, average: 112 pps
989Finished total: 1918, success: 1918 (100.00%)
990Mismatched domains: 1244 (31.91%), IDs: 0 (0.00%)
991Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
992Response: | Success: | Total:
993OK: | 193 ( 10.06%) | 241 ( 6.18%)
994NXDOMAIN: | 1634 ( 85.19%) | 2527 ( 64.83%)
995SERVFAIL: | 91 ( 4.74%) | 152 ( 3.90%)
996REFUSED: | 0 ( 0.00%) | 976 ( 25.04%)
997FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
998
999
1000
1001Processed queries: 1919
1002Received packets: 3933
1003Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
1004Current incoming rate: 3 pps, average: 218 pps
1005Current success rate: 0 pps, average: 106 pps
1006Finished total: 1918, success: 1918 (100.00%)
1007Mismatched domains: 1248 (31.98%), IDs: 0 (0.00%)
1008Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1009Response: | Success: | Total:
1010OK: | 193 ( 10.06%) | 241 ( 6.18%)
1011NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.84%)
1012SERVFAIL: | 91 ( 4.74%) | 153 ( 3.92%)
1013REFUSED: | 0 ( 0.00%) | 976 ( 25.01%)
1014FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1015
1016
1017
1018Processed queries: 1919
1019Received packets: 3935
1020Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
1021Current incoming rate: 1 pps, average: 206 pps
1022Current success rate: 0 pps, average: 100 pps
1023Finished total: 1918, success: 1918 (100.00%)
1024Mismatched domains: 1250 (32.02%), IDs: 0 (0.00%)
1025Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1026Response: | Success: | Total:
1027OK: | 193 ( 10.06%) | 241 ( 6.17%)
1028NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.81%)
1029SERVFAIL: | 91 ( 4.74%) | 153 ( 3.92%)
1030REFUSED: | 0 ( 0.00%) | 978 ( 25.05%)
1031FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1032
1033
1034
1035Processed queries: 1919
1036Received packets: 3940
1037Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
1038Current incoming rate: 4 pps, average: 196 pps
1039Current success rate: 0 pps, average: 95 pps
1040Finished total: 1918, success: 1918 (100.00%)
1041Mismatched domains: 1255 (32.11%), IDs: 0 (0.00%)
1042Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1043Response: | Success: | Total:
1044OK: | 193 ( 10.06%) | 242 ( 6.19%)
1045NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.72%)
1046SERVFAIL: | 91 ( 4.74%) | 156 ( 3.99%)
1047REFUSED: | 0 ( 0.00%) | 979 ( 25.04%)
1048FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1049
1050
1051
1052Processed queries: 1919
1053Received packets: 3946
1054Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
1055Current incoming rate: 5 pps, average: 187 pps
1056Current success rate: 0 pps, average: 91 pps
1057Finished total: 1918, success: 1918 (100.00%)
1058Mismatched domains: 1261 (32.21%), IDs: 0 (0.00%)
1059Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1060Response: | Success: | Total:
1061OK: | 193 ( 10.06%) | 243 ( 6.21%)
1062NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.62%)
1063SERVFAIL: | 91 ( 4.74%) | 161 ( 4.11%)
1064REFUSED: | 0 ( 0.00%) | 979 ( 25.01%)
1065FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1066
1067
1068
1069Processed queries: 1919
1070Received packets: 3947
1071Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
1072Current incoming rate: 0 pps, average: 179 pps
1073Current success rate: 0 pps, average: 87 pps
1074Finished total: 1918, success: 1918 (100.00%)
1075Mismatched domains: 1262 (32.23%), IDs: 0 (0.00%)
1076Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1077Response: | Success: | Total:
1078OK: | 193 ( 10.06%) | 243 ( 6.21%)
1079NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.61%)
1080SERVFAIL: | 91 ( 4.74%) | 161 ( 4.11%)
1081REFUSED: | 0 ( 0.00%) | 980 ( 25.03%)
1082FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1083
1084
1085
1086Processed queries: 1919
1087Received packets: 3949
1088Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
1089Current incoming rate: 1 pps, average: 171 pps
1090Current success rate: 0 pps, average: 83 pps
1091Finished total: 1918, success: 1918 (100.00%)
1092Mismatched domains: 1264 (32.26%), IDs: 0 (0.00%)
1093Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1094Response: | Success: | Total:
1095OK: | 193 ( 10.06%) | 244 ( 6.23%)
1096NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.57%)
1097SERVFAIL: | 91 ( 4.74%) | 161 ( 4.11%)
1098REFUSED: | 0 ( 0.00%) | 981 ( 25.04%)
1099FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1100
1101
1102
1103Processed queries: 1919
1104Received packets: 3952
1105Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
1106Current incoming rate: 2 pps, average: 164 pps
1107Current success rate: 0 pps, average: 79 pps
1108Finished total: 1918, success: 1918 (100.00%)
1109Mismatched domains: 1267 (32.31%), IDs: 0 (0.00%)
1110Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1111Response: | Success: | Total:
1112OK: | 193 ( 10.06%) | 244 ( 6.22%)
1113NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.52%)
1114SERVFAIL: | 91 ( 4.74%) | 162 ( 4.13%)
1115REFUSED: | 0 ( 0.00%) | 983 ( 25.07%)
1116FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1117
1118
1119
1120Processed queries: 1919
1121Received packets: 3953
1122Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1123Current incoming rate: 0 pps, average: 157 pps
1124Current success rate: 0 pps, average: 76 pps
1125Finished total: 1918, success: 1918 (100.00%)
1126Mismatched domains: 1268 (32.33%), IDs: 0 (0.00%)
1127Failures: 0: 4.33%, 1: 29.30%, 2: 30.34%, 3: 21.79%, 4: 6.73%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
1128Response: | Success: | Total:
1129OK: | 193 ( 10.06%) | 244 ( 6.22%)
1130NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.51%)
1131SERVFAIL: | 91 ( 4.74%) | 163 ( 4.16%)
1132REFUSED: | 0 ( 0.00%) | 983 ( 25.06%)
1133FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1134
1135
1136
1137Processed queries: 1919
1138Received packets: 3953
1139Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1140Current incoming rate: 0 pps, average: 157 pps
1141Current success rate: 0 pps, average: 76 pps
1142Finished total: 1919, success: 1918 (99.95%)
1143Mismatched domains: 1268 (32.33%), IDs: 0 (0.00%)
1144Failures: 0: 4.33%, 1: 29.29%, 2: 30.33%, 3: 21.78%, 4: 6.72%, 5: 3.28%, 6: 2.19%, 7: 0.94%, 8: 0.31%, 9: 0.31%, 10: 0.42%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
1145Response: | Success: | Total:
1146OK: | 193 ( 10.06%) | 244 ( 6.22%)
1147NXDOMAIN: | 1634 ( 85.19%) | 2530 ( 64.51%)
1148SERVFAIL: | 91 ( 4.74%) | 163 ( 4.16%)
1149REFUSED: | 0 ( 0.00%) | 983 ( 25.06%)
1150FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1151www.trade.gov.tr
115295.0.51.12
1153#######################################################################################################################################
1154[+] www.trade.gov.tr has no SPF record!
1155[*] No DMARC record found. Looking for organizational record
1156[*] Found organizational DMARC record:
1157[*] v=DMARC1;p=reject;sp=reject;pct=100;adkim=r;aspf=r;fo=1;ri=86400;rua=mailto:postmaster@trade.gov.tr
1158[-] Organizational subdomain policy explicitly set to reject
1159[-] Spoofing not possible for www.trade.gov.tr
1160#######################################################################################################################################
1161INFO[0000] Starting to process queue....
1162INFO[0000] Starting to process permutations....
1163INFO[0001] FORBIDDEN http://trade-backup.s3.amazonaws.com (http://trade.gov.tr)
1164INFO[0001] FORBIDDEN http://trade-s3.s3.amazonaws.com (http://trade.gov.tr)
1165INFO[0001] FORBIDDEN http://trade-dev.s3.amazonaws.com (http://trade.gov.tr)
1166INFO[0001] FORBIDDEN http://trade-staging.s3.amazonaws.com (http://trade.gov.tr)
1167INFO[0002] FORBIDDEN http://data-trade.s3.amazonaws.com (http://trade.gov.tr)
1168INFO[0002] FORBIDDEN http://trade-tmp.s3.amazonaws.com (http://trade.gov.tr)
1169INFO[0002] FORBIDDEN http://trade-data.s3.amazonaws.com (http://trade.gov.tr)
1170INFO[0002] FORBIDDEN http://trade-bucket.s3.amazonaws.com (http://trade.gov.tr)
1171#######################################################################################################################################
1172Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:48 EST
1173Stats: 0:00:00 elapsed; 0 hosts completed (0 up), 0 undergoing Host Discovery
1174Parallel DNS resolution of 1 host. Timing: About 0.00% done
1175Nmap scan report for www.trade.gov.tr (95.0.51.12)
1176Host is up (0.34s latency).
1177rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
1178Not shown: 994 filtered ports, 4 closed ports
1179Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1180PORT STATE SERVICE
118180/tcp open http
1182443/tcp open https
1183
1184Nmap done: 1 IP address (1 host up) scanned in 21.60 seconds
1185#######################################################################################################################################
1186Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:48 EST
1187Nmap scan report for www.trade.gov.tr (95.0.51.12)
1188Host is up (0.19s latency).
1189rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
1190Not shown: 2 filtered ports
1191PORT STATE SERVICE
119253/udp open|filtered domain
119367/udp open|filtered dhcps
119468/udp open|filtered dhcpc
119569/udp open|filtered tftp
119688/udp open|filtered kerberos-sec
1197123/udp open|filtered ntp
1198139/udp open|filtered netbios-ssn
1199161/udp open|filtered snmp
1200162/udp open|filtered snmptrap
1201389/udp open|filtered ldap
1202500/udp open|filtered isakmp
1203520/udp open|filtered route
12042049/udp open|filtered nfs
1205
1206Nmap done: 1 IP address (1 host up) scanned in 4.72 seconds
1207#######################################################################################################################################
1208wig - WebApp Information Gatherer
1209
1210
1211Scanning https://www.trade.gov.tr...
1212___________________________ SITE INFO ____________________________
1213IP Title
121495.0.51.12 Republic of Turkey - Ministry of Trade
1215
1216____________________________ VERSION _____________________________
1217Name Versions Type
1218ASP.NET 4.0.30319 Platform
1219IIS 10.0 Platform
1220jQuery 3.4.1 JavaScript
1221
1222__________________________ INTERESTING ___________________________
1223URL Note Type
1224/test/ Test directory Interesting
1225/_layouts/create.aspx ASP.NET detailed error Interesting
1226
1227_____________________ PLATFORM OBSERVATIONS ______________________
1228Platform URL Type
1229ASP.NET 4.0.30319 / Observation
1230ASP.NET 4.7.3429.0 /_layouts/create.aspx Observation
1231
1232__________________________________________________________________
1233Time: 159.6 sec Urls: 613 Fingerprints: 40401
1234######################################################################################################################################
1235------------------------------------------------------------------------------------------------------------------------
1236
1237[ ! ] Starting SCANNER INURLBR 2.1 at [10-11-2019 21:59:45]
1238[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
1239It is the end user's responsibility to obey all applicable local, state and federal laws.
1240Developers assume no liability and are not responsible for any misuse or damage caused by this program
1241
1242[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
1243[ INFO ][ DORK ]::[ site:www.trade.gov.tr ]
1244[ INFO ][ SEARCHING ]:: {
1245[ INFO ][ ENGINE ]::[ GOOGLE - www.google.bi ]
1246
1247[ INFO ][ SEARCHING ]::
1248-[:::]
1249[ INFO ][ ENGINE ]::[ GOOGLE API ]
1250
1251[ INFO ][ SEARCHING ]::
1252-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1253[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sv ID: 007843865286850066037:b0heuatvay8 ]
1254
1255[ INFO ][ SEARCHING ]::
1256-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1257
1258[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
1259
1260
1261 _[ - ]::--------------------------------------------------------------------------------------------------------------
1262|_[ + ] [ 0 / 100 ]-[22:00:12] [ - ]
1263|_[ + ] Target:: [ https://www.trade.gov.tr/ ]
1264|_[ + ] Exploit::
1265|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1266|_[ + ] More details:: / - / , ISP:
1267|_[ + ] Found:: UNIDENTIFIED
1268
1269 _[ - ]::--------------------------------------------------------------------------------------------------------------
1270|_[ + ] [ 1 / 100 ]-[22:00:16] [ - ]
1271|_[ + ] Target:: [ https://www.trade.gov.tr/news ]
1272|_[ + ] Exploit::
1273|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1274|_[ + ] More details:: / - / , ISP:
1275|_[ + ] Found:: UNIDENTIFIED
1276
1277 _[ - ]::--------------------------------------------------------------------------------------------------------------
1278|_[ + ] [ 2 / 100 ]-[22:00:21] [ - ]
1279|_[ + ] Target:: [ https://www.trade.gov.tr/investment ]
1280|_[ + ] Exploit::
1281|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1282|_[ + ] More details:: / - / , ISP:
1283|_[ + ] Found:: UNIDENTIFIED
1284
1285 _[ - ]::--------------------------------------------------------------------------------------------------------------
1286|_[ + ] [ 3 / 100 ]-[22:00:25] [ - ]
1287|_[ + ] Target:: [ https://www.trade.gov.tr/statistics ]
1288|_[ + ] Exploit::
1289|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1290|_[ + ] More details:: / - / , ISP:
1291|_[ + ] Found:: UNIDENTIFIED
1292
1293 _[ - ]::--------------------------------------------------------------------------------------------------------------
1294|_[ + ] [ 4 / 100 ]-[22:00:28] [ - ]
1295|_[ + ] Target:: [ https://www.trade.gov.tr/announcements ]
1296|_[ + ] Exploit::
1297|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1298|_[ + ] More details:: / - / , ISP:
1299|_[ + ] Found:: UNIDENTIFIED
1300
1301 _[ - ]::--------------------------------------------------------------------------------------------------------------
1302|_[ + ] [ 5 / 100 ]-[22:00:32] [ - ]
1303|_[ + ] Target:: [ https://www.trade.gov.tr/fdi ]
1304|_[ + ] Exploit::
1305|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1306|_[ + ] More details:: / - / , ISP:
1307|_[ + ] Found:: UNIDENTIFIED
1308
1309 _[ - ]::--------------------------------------------------------------------------------------------------------------
1310|_[ + ] [ 6 / 100 ]-[22:00:35] [ - ]
1311|_[ + ] Target:: [ https://www.trade.gov.tr/BakanaUlasin ]
1312|_[ + ] Exploit::
1313|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1314|_[ + ] More details:: / - / , ISP:
1315|_[ + ] Found:: UNIDENTIFIED
1316
1317 _[ - ]::--------------------------------------------------------------------------------------------------------------
1318|_[ + ] [ 7 / 100 ]-[22:00:39] [ - ]
1319|_[ + ] Target:: [ https://www.trade.gov.tr/yoikk ]
1320|_[ + ] Exploit::
1321|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1322|_[ + ] More details:: / - / , ISP:
1323|_[ + ] Found:: UNIDENTIFIED
1324
1325 _[ - ]::--------------------------------------------------------------------------------------------------------------
1326|_[ + ] [ 8 / 100 ]-[22:00:43] [ - ]
1327|_[ + ] Target:: [ https://www.trade.gov.tr/legislation ]
1328|_[ + ] Exploit::
1329|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1330|_[ + ] More details:: / - / , ISP:
1331|_[ + ] Found:: UNIDENTIFIED
1332
1333 _[ - ]::--------------------------------------------------------------------------------------------------------------
1334|_[ + ] [ 9 / 100 ]-[22:00:47] [ - ]
1335|_[ + ] Target:: [ https://www.trade.gov.tr/contact ]
1336|_[ + ] Exploit::
1337|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1338|_[ + ] More details:: / - / , ISP:
1339|_[ + ] Found:: UNIDENTIFIED
1340
1341 _[ - ]::--------------------------------------------------------------------------------------------------------------
1342|_[ + ] [ 10 / 100 ]-[22:00:51] [ - ]
1343|_[ + ] Target:: [ https://www.trade.gov.tr/turquality ]
1344|_[ + ] Exploit::
1345|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1346|_[ + ] More details:: / - / , ISP:
1347|_[ + ] Found:: UNIDENTIFIED
1348
1349 _[ - ]::--------------------------------------------------------------------------------------------------------------
1350|_[ + ] [ 11 / 100 ]-[22:00:54] [ - ]
1351|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes ]
1352|_[ + ] Exploit::
1353|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1354|_[ + ] More details:: / - / , ISP:
1355|_[ + ] Found:: UNIDENTIFIED
1356
1357 _[ - ]::--------------------------------------------------------------------------------------------------------------
1358|_[ + ] [ 12 / 100 ]-[22:00:58] [ - ]
1359|_[ + ] Target:: [ https://www.trade.gov.tr/investment/faq ]
1360|_[ + ] Exploit::
1361|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1362|_[ + ] More details:: / - / , ISP:
1363|_[ + ] Found:: UNIDENTIFIED
1364
1365 _[ - ]::--------------------------------------------------------------------------------------------------------------
1366|_[ + ] [ 13 / 100 ]-[22:01:02] [ - ]
1367|_[ + ] Target:: [ https://www.trade.gov.tr/investment/eligibility ]
1368|_[ + ] Exploit::
1369|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1370|_[ + ] More details:: / - / , ISP:
1371|_[ + ] Found:: UNIDENTIFIED
1372
1373 _[ - ]::--------------------------------------------------------------------------------------------------------------
1374|_[ + ] [ 14 / 100 ]-[22:01:05] [ - ]
1375|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/export ]
1376|_[ + ] Exploit::
1377|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1378|_[ + ] More details:: / - / , ISP:
1379|_[ + ] Found:: UNIDENTIFIED
1380
1381 _[ - ]::--------------------------------------------------------------------------------------------------------------
1382|_[ + ] [ 15 / 100 ]-[22:01:09] [ - ]
1383|_[ + ] Target:: [ https://www.trade.gov.tr/economic-outlook ]
1384|_[ + ] Exploit::
1385|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1386|_[ + ] More details:: / - / , ISP:
1387|_[ + ] Found:: UNIDENTIFIED
1388
1389 _[ - ]::--------------------------------------------------------------------------------------------------------------
1390|_[ + ] [ 16 / 100 ]-[22:01:13] [ - ]
1391|_[ + ] Target:: [ https://www.trade.gov.tr/sectoral-reports ]
1392|_[ + ] Exploit::
1393|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1394|_[ + ] More details:: / - / , ISP:
1395|_[ + ] Found:: UNIDENTIFIED
1396
1397 _[ - ]::--------------------------------------------------------------------------------------------------------------
1398|_[ + ] [ 17 / 100 ]-[22:01:16] [ - ]
1399|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/law ]
1400|_[ + ] Exploit::
1401|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1402|_[ + ] More details:: / - / , ISP:
1403|_[ + ] Found:: UNIDENTIFIED
1404
1405 _[ - ]::--------------------------------------------------------------------------------------------------------------
1406|_[ + ] [ 18 / 100 ]-[22:01:20] [ - ]
1407|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones ]
1408|_[ + ] Exploit::
1409|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1410|_[ + ] More details:: / - / , ISP:
1411|_[ + ] Found:: UNIDENTIFIED
1412
1413 _[ - ]::--------------------------------------------------------------------------------------------------------------
1414|_[ + ] [ 19 / 100 ]-[22:01:24] [ - ]
1415|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistics ]
1416|_[ + ] Exploit::
1417|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1418|_[ + ] More details:: / - / , ISP:
1419|_[ + ] Found:: UNIDENTIFIED
1420
1421 _[ - ]::--------------------------------------------------------------------------------------------------------------
1422|_[ + ] [ 20 / 100 ]-[22:01:27] [ - ]
1423|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import ]
1424|_[ + ] Exploit::
1425|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1426|_[ + ] More details:: / - / , ISP:
1427|_[ + ] Found:: UNIDENTIFIED
1428
1429 _[ - ]::--------------------------------------------------------------------------------------------------------------
1430|_[ + ] [ 21 / 100 ]-[22:01:31] [ - ]
1431|_[ + ] Target:: [ https://www.trade.gov.tr/commercial-representatives ]
1432|_[ + ] Exploit::
1433|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1434|_[ + ] More details:: / - / , ISP:
1435|_[ + ] Found:: UNIDENTIFIED
1436
1437 _[ - ]::--------------------------------------------------------------------------------------------------------------
1438|_[ + ] [ 22 / 100 ]-[22:01:35] [ - ]
1439|_[ + ] Target:: [ https://www.trade.gov.tr/contact/contact ]
1440|_[ + ] Exploit::
1441|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1442|_[ + ] More details:: / - / , ISP:
1443|_[ + ] Found:: UNIDENTIFIED
1444
1445 _[ - ]::--------------------------------------------------------------------------------------------------------------
1446|_[ + ] [ 23 / 100 ]-[22:01:39] [ - ]
1447|_[ + ] Target:: [ https://www.trade.gov.tr/investment/contact ]
1448|_[ + ] Exploit::
1449|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1450|_[ + ] More details:: / - / , ISP:
1451|_[ + ] Found:: UNIDENTIFIED
1452
1453 _[ - ]::--------------------------------------------------------------------------------------------------------------
1454|_[ + ] [ 24 / 100 ]-[22:01:43] [ - ]
1455|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry ]
1456|_[ + ] Exploit::
1457|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1458|_[ + ] More details:: / - / , ISP:
1459|_[ + ] Found:: UNIDENTIFIED
1460
1461 _[ - ]::--------------------------------------------------------------------------------------------------------------
1462|_[ + ] [ 25 / 100 ]-[22:01:47] [ - ]
1463|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations ]
1464|_[ + ] Exploit::
1465|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1466|_[ + ] More details:: / - / , ISP:
1467|_[ + ] Found:: UNIDENTIFIED
1468
1469 _[ - ]::--------------------------------------------------------------------------------------------------------------
1470|_[ + ] [ 26 / 100 ]-[22:01:51] [ - ]
1471|_[ + ] Target:: [ https://www.trade.gov.tr/investment/links ]
1472|_[ + ] Exploit::
1473|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1474|_[ + ] More details:: / - / , ISP:
1475|_[ + ] Found:: UNIDENTIFIED
1476
1477 _[ - ]::--------------------------------------------------------------------------------------------------------------
1478|_[ + ] [ 27 / 100 ]-[22:01:56] [ - ]
1479|_[ + ] Target:: [ https://www.trade.gov.tr/investment/procedures ]
1480|_[ + ] Exploit::
1481|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1482|_[ + ] More details:: / - / , ISP:
1483|_[ + ] Found:: UNIDENTIFIED
1484
1485 _[ - ]::--------------------------------------------------------------------------------------------------------------
1486|_[ + ] [ 28 / 100 ]-[22:01:59] [ - ]
1487|_[ + ] Target:: [ https://www.trade.gov.tr/legislationfree-zones ]
1488|_[ + ] Exploit::
1489|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1490|_[ + ] More details:: / - / , ISP:
1491|_[ + ] Found:: UNIDENTIFIED
1492
1493 _[ - ]::--------------------------------------------------------------------------------------------------------------
1494|_[ + ] [ 29 / 100 ]-[22:02:03] [ - ]
1495|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/statistics ]
1496|_[ + ] Exploit::
1497|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1498|_[ + ] More details:: / - / , ISP:
1499|_[ + ] Found:: UNIDENTIFIED
1500
1501 _[ - ]::--------------------------------------------------------------------------------------------------------------
1502|_[ + ] [ 30 / 100 ]-[22:02:07] [ - ]
1503|_[ + ] Target:: [ https://www.trade.gov.tr/investment/application-process ]
1504|_[ + ] Exploit::
1505|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1506|_[ + ] More details:: / - / , ISP:
1507|_[ + ] Found:: UNIDENTIFIED
1508
1509 _[ - ]::--------------------------------------------------------------------------------------------------------------
1510|_[ + ] [ 31 / 100 ]-[22:02:11] [ - ]
1511|_[ + ] Target:: [ https://www.trade.gov.tr/investment/incentive-instruments ]
1512|_[ + ] Exploit::
1513|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1514|_[ + ] More details:: / - / , ISP:
1515|_[ + ] Found:: UNIDENTIFIED
1516
1517 _[ - ]::--------------------------------------------------------------------------------------------------------------
1518|_[ + ] [ 32 / 100 ]-[22:02:15] [ - ]
1519|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements ]
1520|_[ + ] Exploit::
1521|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1522|_[ + ] More details:: / - / , ISP:
1523|_[ + ] Found:: UNIDENTIFIED
1524
1525 _[ - ]::--------------------------------------------------------------------------------------------------------------
1526|_[ + ] [ 33 / 100 ]-[22:02:18] [ - ]
1527|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-incentives ]
1528|_[ + ] Exploit::
1529|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1530|_[ + ] More details:: / - / , ISP:
1531|_[ + ] Found:: UNIDENTIFIED
1532
1533 _[ - ]::--------------------------------------------------------------------------------------------------------------
1534|_[ + ] [ 34 / 100 ]-[22:02:22] [ - ]
1535|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey ]
1536|_[ + ] Exploit::
1537|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1538|_[ + ] More details:: / - / , ISP:
1539|_[ + ] Found:: UNIDENTIFIED
1540
1541 _[ - ]::--------------------------------------------------------------------------------------------------------------
1542|_[ + ] [ 35 / 100 ]-[22:02:26] [ - ]
1543|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content ]
1544|_[ + ] Exploit::
1545|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1546|_[ + ] More details:: / - / , ISP:
1547|_[ + ] Found:: UNIDENTIFIED
1548
1549 _[ - ]::--------------------------------------------------------------------------------------------------------------
1550|_[ + ] [ 36 / 100 ]-[22:02:29] [ - ]
1551|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu ]
1552|_[ + ] Exploit::
1553|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1554|_[ + ] More details:: / - / , ISP:
1555|_[ + ] Found:: UNIDENTIFIED
1556
1557 _[ - ]::--------------------------------------------------------------------------------------------------------------
1558|_[ + ] [ 37 / 100 ]-[22:02:33] [ - ]
1559|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services ]
1560|_[ + ] Exploit::
1561|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1562|_[ + ] More details:: / - / , ISP:
1563|_[ + ] Found:: UNIDENTIFIED
1564
1565 _[ - ]::--------------------------------------------------------------------------------------------------------------
1566|_[ + ] [ 38 / 100 ]-[22:02:37] [ - ]
1567|_[ + ] Target:: [ https://www.trade.gov.tr/buy-turkish-products ]
1568|_[ + ] Exploit::
1569|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1570|_[ + ] More details:: / - / , ISP:
1571|_[ + ] Found:: UNIDENTIFIED
1572
1573 _[ - ]::--------------------------------------------------------------------------------------------------------------
1574|_[ + ] [ 39 / 100 ]-[22:02:40] [ - ]
1575|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistic-content ]
1576|_[ + ] Exploit::
1577|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1578|_[ + ] More details:: / - / , ISP:
1579|_[ + ] Found:: UNIDENTIFIED
1580
1581 _[ - ]::--------------------------------------------------------------------------------------------------------------
1582|_[ + ] [ 40 / 100 ]-[22:02:44] [ - ]
1583|_[ + ] Target:: [ https://www.trade.gov.tr/2023-export-strategy ]
1584|_[ + ] Exploit::
1585|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1586|_[ + ] More details:: / - / , ISP:
1587|_[ + ] Found:: UNIDENTIFIED
1588
1589 _[ - ]::--------------------------------------------------------------------------------------------------------------
1590|_[ + ] [ 41 / 100 ]-[22:02:47] [ - ]
1591|_[ + ] Target:: [ https://www.trade.gov.tr/legislationforeign-direct-investment ]
1592|_[ + ] Exploit::
1593|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1594|_[ + ] More details:: / - / , ISP:
1595|_[ + ] Found:: UNIDENTIFIED
1596
1597 _[ - ]::--------------------------------------------------------------------------------------------------------------
1598|_[ + ] [ 42 / 100 ]-[22:02:51] [ - ]
1599|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/strategic-investments ]
1600|_[ + ] Exploit::
1601|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1602|_[ + ] More details:: / - / , ISP:
1603|_[ + ] Found:: UNIDENTIFIED
1604
1605 _[ - ]::--------------------------------------------------------------------------------------------------------------
1606|_[ + ] [ 43 / 100 ]-[22:02:55] [ - ]
1607|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/general-investments ]
1608|_[ + ] Exploit::
1609|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1610|_[ + ] More details:: / - / , ISP:
1611|_[ + ] Found:: UNIDENTIFIED
1612
1613 _[ - ]::--------------------------------------------------------------------------------------------------------------
1614|_[ + ] [ 44 / 100 ]-[22:02:59] [ - ]
1615|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/morocco ]
1616|_[ + ] Exploit::
1617|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1618|_[ + ] More details:: / - / , ISP:
1619|_[ + ] Found:: UNIDENTIFIED
1620
1621 _[ - ]::--------------------------------------------------------------------------------------------------------------
1622|_[ + ] [ 45 / 100 ]-[22:03:03] [ - ]
1623|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/priority-investments ]
1624|_[ + ] Exploit::
1625|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1626|_[ + ] More details:: / - / , ISP:
1627|_[ + ] Found:: UNIDENTIFIED
1628
1629 _[ - ]::--------------------------------------------------------------------------------------------------------------
1630|_[ + ] [ 46 / 100 ]-[22:03:07] [ - ]
1631|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/regional-investments ]
1632|_[ + ] Exploit::
1633|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1634|_[ + ] More details:: / - / , ISP:
1635|_[ + ] Found:: UNIDENTIFIED
1636
1637 _[ - ]::--------------------------------------------------------------------------------------------------------------
1638|_[ + ] [ 47 / 100 ]-[22:03:12] [ - ]
1639|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/tunisia ]
1640|_[ + ] Exploit::
1641|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1642|_[ + ] More details:: / - / , ISP:
1643|_[ + ] Found:: UNIDENTIFIED
1644
1645 _[ - ]::--------------------------------------------------------------------------------------------------------------
1646|_[ + ] [ 48 / 100 ]-[22:03:16] [ - ]
1647|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/syria ]
1648|_[ + ] Exploit::
1649|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1650|_[ + ] More details:: / - / , ISP:
1651|_[ + ] Found:: UNIDENTIFIED
1652
1653 _[ - ]::--------------------------------------------------------------------------------------------------------------
1654|_[ + ] [ 49 / 100 ]-[22:03:19] [ - ]
1655|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones/general-outlook ]
1656|_[ + ] Exploit::
1657|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1658|_[ + ] More details:: / - / , ISP:
1659|_[ + ] Found:: UNIDENTIFIED
1660
1661 _[ - ]::--------------------------------------------------------------------------------------------------------------
1662|_[ + ] [ 50 / 100 ]-[22:03:23] [ - ]
1663|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/malaysia ]
1664|_[ + ] Exploit::
1665|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1666|_[ + ] More details:: / - / , ISP:
1667|_[ + ] Found:: UNIDENTIFIED
1668
1669 _[ - ]::--------------------------------------------------------------------------------------------------------------
1670|_[ + ] [ 51 / 100 ]-[22:03:27] [ - ]
1671|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/moldova ]
1672|_[ + ] Exploit::
1673|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1674|_[ + ] More details:: / - / , ISP:
1675|_[ + ] Found:: UNIDENTIFIED
1676
1677 _[ - ]::--------------------------------------------------------------------------------------------------------------
1678|_[ + ] [ 52 / 100 ]-[22:03:30] [ - ]
1679|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/chile ]
1680|_[ + ] Exploit::
1681|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1682|_[ + ] More details:: / - / , ISP:
1683|_[ + ] Found:: UNIDENTIFIED
1684
1685 _[ - ]::--------------------------------------------------------------------------------------------------------------
1686|_[ + ] [ 53 / 100 ]-[22:03:34] [ - ]
1687|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/georgia ]
1688|_[ + ] Exploit::
1689|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1690|_[ + ] More details:: / - / , ISP:
1691|_[ + ] Found:: UNIDENTIFIED
1692
1693 _[ - ]::--------------------------------------------------------------------------------------------------------------
1694|_[ + ] [ 54 / 100 ]-[22:03:38] [ - ]
1695|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/serbia ]
1696|_[ + ] Exploit::
1697|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1698|_[ + ] More details:: / - / , ISP:
1699|_[ + ] Found:: UNIDENTIFIED
1700
1701 _[ - ]::--------------------------------------------------------------------------------------------------------------
1702|_[ + ] [ 55 / 100 ]-[22:03:41] [ - ]
1703|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/mauritius ]
1704|_[ + ] Exploit::
1705|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1706|_[ + ] More details:: / - / , ISP:
1707|_[ + ] Found:: UNIDENTIFIED
1708
1709 _[ - ]::--------------------------------------------------------------------------------------------------------------
1710|_[ + ] [ 56 / 100 ]-[22:03:46] [ - ]
1711|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/palestine ]
1712|_[ + ] Exploit::
1713|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1714|_[ + ] More details:: / - / , ISP:
1715|_[ + ] Found:: UNIDENTIFIED
1716
1717 _[ - ]::--------------------------------------------------------------------------------------------------------------
1718|_[ + ] [ 57 / 100 ]-[22:03:49] [ - ]
1719|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/albania ]
1720|_[ + ] Exploit::
1721|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1722|_[ + ] More details:: / - / , ISP:
1723|_[ + ] Found:: UNIDENTIFIED
1724
1725 _[ - ]::--------------------------------------------------------------------------------------------------------------
1726|_[ + ] [ 58 / 100 ]-[22:03:53] [ - ]
1727|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/efta ]
1728|_[ + ] Exploit::
1729|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1730|_[ + ] More details:: / - / , ISP:
1731|_[ + ] Found:: UNIDENTIFIED
1732
1733 _[ - ]::--------------------------------------------------------------------------------------------------------------
1734|_[ + ] [ 59 / 100 ]-[22:03:57] [ - ]
1735|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/singapore ]
1736|_[ + ] Exploit::
1737|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1738|_[ + ] More details:: / - / , ISP:
1739|_[ + ] Found:: UNIDENTIFIED
1740
1741 _[ - ]::--------------------------------------------------------------------------------------------------------------
1742|_[ + ] [ 60 / 100 ]-[22:04:00] [ - ]
1743|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/israel ]
1744|_[ + ] Exploit::
1745|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1746|_[ + ] More details:: / - / , ISP:
1747|_[ + ] Found:: UNIDENTIFIED
1748
1749 _[ - ]::--------------------------------------------------------------------------------------------------------------
1750|_[ + ] [ 61 / 100 ]-[22:04:03] [ - ]
1751|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/macedonia ]
1752|_[ + ] Exploit::
1753|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1754|_[ + ] More details:: / - / , ISP:
1755|_[ + ] Found:: UNIDENTIFIED
1756
1757 _[ - ]::--------------------------------------------------------------------------------------------------------------
1758|_[ + ] [ 62 / 100 ]-[22:04:07] [ - ]
1759|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/sezai-ucarmak ]
1760|_[ + ] Exploit::
1761|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1762|_[ + ] More details:: / - / , ISP:
1763|_[ + ] Found:: UNIDENTIFIED
1764
1765 _[ - ]::--------------------------------------------------------------------------------------------------------------
1766|_[ + ] [ 63 / 100 ]-[22:04:10] [ - ]
1767|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/egypt ]
1768|_[ + ] Exploit::
1769|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1770|_[ + ] More details:: / - / , ISP:
1771|_[ + ] Found:: UNIDENTIFIED
1772
1773 _[ - ]::--------------------------------------------------------------------------------------------------------------
1774|_[ + ] [ 64 / 100 ]-[22:04:14] [ - ]
1775|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/bilateral-investment-treaties ]
1776|_[ + ] Exploit::
1777|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1778|_[ + ] More details:: / - / , ISP:
1779|_[ + ] Found:: UNIDENTIFIED
1780
1781 _[ - ]::--------------------------------------------------------------------------------------------------------------
1782|_[ + ] [ 65 / 100 ]-[22:04:18] [ - ]
1783|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/focus-business-turkey ]
1784|_[ + ] Exploit::
1785|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1786|_[ + ] More details:: / - / , ISP:
1787|_[ + ] Found:: UNIDENTIFIED
1788
1789 _[ - ]::--------------------------------------------------------------------------------------------------------------
1790|_[ + ] [ 66 / 100 ]-[22:04:22] [ - ]
1791|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/montenegro ]
1792|_[ + ] Exploit::
1793|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1794|_[ + ] More details:: / - / , ISP:
1795|_[ + ] Found:: UNIDENTIFIED
1796
1797 _[ - ]::--------------------------------------------------------------------------------------------------------------
1798|_[ + ] [ 67 / 100 ]-[22:04:26] [ - ]
1799|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2017 ]
1800|_[ + ] Exploit::
1801|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1802|_[ + ] More details:: / - / , ISP:
1803|_[ + ] Found:: UNIDENTIFIED
1804
1805 _[ - ]::--------------------------------------------------------------------------------------------------------------
1806|_[ + ] [ 68 / 100 ]-[22:04:30] [ - ]
1807|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/documents ]
1808|_[ + ] Exploit::
1809|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1810|_[ + ] More details:: / - / , ISP:
1811|_[ + ] Found:: UNIDENTIFIED
1812
1813 _[ - ]::--------------------------------------------------------------------------------------------------------------
1814|_[ + ] [ 69 / 100 ]-[22:04:34] [ - ]
1815|_[ + ] Target:: [ https://www.trade.gov.tr/establishing-company-in-turkey ]
1816|_[ + ] Exploit::
1817|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1818|_[ + ] More details:: / - / , ISP:
1819|_[ + ] Found:: UNIDENTIFIED
1820
1821 _[ - ]::--------------------------------------------------------------------------------------------------------------
1822|_[ + ] [ 70 / 100 ]-[22:04:38] [ - ]
1823|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/organizational-structure ]
1824|_[ + ] Exploit::
1825|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1826|_[ + ] More details:: / - / , ISP:
1827|_[ + ] Found:: UNIDENTIFIED
1828
1829 _[ - ]::--------------------------------------------------------------------------------------------------------------
1830|_[ + ] [ 71 / 100 ]-[22:04:42] [ - ]
1831|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/large-scale-investments ]
1832|_[ + ] Exploit::
1833|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1834|_[ + ] More details:: / - / , ISP:
1835|_[ + ] Found:: UNIDENTIFIED
1836
1837 _[ - ]::--------------------------------------------------------------------------------------------------------------
1838|_[ + ] [ 72 / 100 ]-[22:04:46] [ - ]
1839|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/faroe-islands ]
1840|_[ + ] Exploit::
1841|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1842|_[ + ] More details:: / - / , ISP:
1843|_[ + ] Found:: UNIDENTIFIED
1844
1845 _[ - ]::--------------------------------------------------------------------------------------------------------------
1846|_[ + ] [ 73 / 100 ]-[22:04:50] [ - ]
1847|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tax-deduction ]
1848|_[ + ] Exploit::
1849|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1850|_[ + ] More details:: / - / , ISP:
1851|_[ + ] Found:: UNIDENTIFIED
1852
1853 _[ - ]::--------------------------------------------------------------------------------------------------------------
1854|_[ + ] [ 74 / 100 ]-[22:04:53] [ - ]
1855|_[ + ] Target:: [ https://www.trade.gov.tr/news/ecbs-monetary-policy-decision ]
1856|_[ + ] Exploit::
1857|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1858|_[ + ] More details:: / - / , ISP:
1859|_[ + ] Found:: UNIDENTIFIED
1860
1861 _[ - ]::--------------------------------------------------------------------------------------------------------------
1862|_[ + ] [ 75 / 100 ]-[22:04:57] [ - ]
1863|_[ + ] Target:: [ https://www.trade.gov.tr/news/unemployment-at-8-1 ]
1864|_[ + ] Exploit::
1865|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1866|_[ + ] More details:: / - / , ISP:
1867|_[ + ] Found:: UNIDENTIFIED
1868
1869 _[ - ]::--------------------------------------------------------------------------------------------------------------
1870|_[ + ] [ 76 / 100 ]-[22:05:00] [ - ]
1871|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/vat-refund ]
1872|_[ + ] Exploit::
1873|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1874|_[ + ] More details:: / - / , ISP:
1875|_[ + ] Found:: UNIDENTIFIED
1876
1877 _[ - ]::--------------------------------------------------------------------------------------------------------------
1878|_[ + ] [ 77 / 100 ]-[22:05:04] [ - ]
1879|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/minister-of-trade ]
1880|_[ + ] Exploit::
1881|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1882|_[ + ] More details:: / - / , ISP:
1883|_[ + ] Found:: UNIDENTIFIED
1884
1885 _[ - ]::--------------------------------------------------------------------------------------------------------------
1886|_[ + ] [ 78 / 100 ]-[22:05:07] [ - ]
1887|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/riza-tuna-turagay ]
1888|_[ + ] Exploit::
1889|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1890|_[ + ] More details:: / - / , ISP:
1891|_[ + ] Found:: UNIDENTIFIED
1892
1893 _[ - ]::--------------------------------------------------------------------------------------------------------------
1894|_[ + ] [ 79 / 100 ]-[22:05:11] [ - ]
1895|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/land-allocation ]
1896|_[ + ] Exploit::
1897|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1898|_[ + ] More details:: / - / , ISP:
1899|_[ + ] Found:: UNIDENTIFIED
1900
1901 _[ - ]::--------------------------------------------------------------------------------------------------------------
1902|_[ + ] [ 80 / 100 ]-[22:05:15] [ - ]
1903|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import/trade-defence-policy ]
1904|_[ + ] Exploit::
1905|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1906|_[ + ] More details:: / - / , ISP:
1907|_[ + ] Found:: UNIDENTIFIED
1908
1909 _[ - ]::--------------------------------------------------------------------------------------------------------------
1910|_[ + ] [ 81 / 100 ]-[22:05:18] [ - ]
1911|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur ]
1912|_[ + ] Exploit::
1913|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1914|_[ + ] More details:: / - / , ISP:
1915|_[ + ] Found:: UNIDENTIFIED
1916
1917 _[ - ]::--------------------------------------------------------------------------------------------------------------
1918|_[ + ] [ 82 / 100 ]-[22:05:22] [ - ]
1919|_[ + ] Target:: [ https://www.trade.gov.tr/trade-fairs-and-buyers-mission ]
1920|_[ + ] Exploit::
1921|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1922|_[ + ] More details:: / - / , ISP:
1923|_[ + ] Found:: UNIDENTIFIED
1924
1925 _[ - ]::--------------------------------------------------------------------------------------------------------------
1926|_[ + ] [ 83 / 100 ]-[22:05:26] [ - ]
1927|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations/wto-and-multilaretal ]
1928|_[ + ] Exploit::
1929|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1930|_[ + ] More details:: / - / , ISP:
1931|_[ + ] Found:: UNIDENTIFIED
1932
1933 _[ - ]::--------------------------------------------------------------------------------------------------------------
1934|_[ + ] [ 84 / 100 ]-[22:05:29] [ - ]
1935|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tesvik-haritasi ]
1936|_[ + ] Exploit::
1937|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1938|_[ + ] More details:: / - / , ISP:
1939|_[ + ] Found:: UNIDENTIFIED
1940
1941 _[ - ]::--------------------------------------------------------------------------------------------------------------
1942|_[ + ] [ 85 / 100 ]-[22:05:33] [ - ]
1943|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services/turkish-contracting-services ]
1944|_[ + ] Exploit::
1945|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1946|_[ + ] More details:: / - / , ISP:
1947|_[ + ] Found:: UNIDENTIFIED
1948
1949 _[ - ]::--------------------------------------------------------------------------------------------------------------
1950|_[ + ] [ 86 / 100 ]-[22:05:36] [ - ]
1951|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/interest-rate-support ]
1952|_[ + ] Exploit::
1953|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1954|_[ + ] More details:: / - / , ISP:
1955|_[ + ] Found:: UNIDENTIFIED
1956
1957 _[ - ]::--------------------------------------------------------------------------------------------------------------
1958|_[ + ] [ 87 / 100 ]-[22:05:40] [ - ]
1959|_[ + ] Target:: [ https://www.trade.gov.tr/news/chinas-economy-worsens-in-july ]
1960|_[ + ] Exploit::
1961|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1962|_[ + ] More details:: / - / , ISP:
1963|_[ + ] Found:: UNIDENTIFIED
1964
1965 _[ - ]::--------------------------------------------------------------------------------------------------------------
1966|_[ + ] [ 88 / 100 ]-[22:05:44] [ - ]
1967|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/republic-of-korea ]
1968|_[ + ] Exploit::
1969|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1970|_[ + ] More details:: / - / , ISP:
1971|_[ + ] Found:: UNIDENTIFIED
1972
1973 _[ - ]::--------------------------------------------------------------------------------------------------------------
1974|_[ + ] [ 89 / 100 ]-[22:05:47] [ - ]
1975|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-falls ]
1976|_[ + ] Exploit::
1977|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1978|_[ + ] More details:: / - / , ISP:
1979|_[ + ] Found:: UNIDENTIFIED
1980
1981 _[ - ]::--------------------------------------------------------------------------------------------------------------
1982|_[ + ] [ 90 / 100 ]-[22:05:51] [ - ]
1983|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/customs-duty-exemption ]
1984|_[ + ] Exploit::
1985|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1986|_[ + ] More details:: / - / , ISP:
1987|_[ + ] Found:: UNIDENTIFIED
1988
1989 _[ - ]::--------------------------------------------------------------------------------------------------------------
1990|_[ + ] [ 91 / 100 ]-[22:05:54] [ - ]
1991|_[ + ] Target:: [ https://www.trade.gov.tr/news/weekly-jobless-claims-unexpectedly-fall ]
1992|_[ + ] Exploit::
1993|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
1994|_[ + ] More details:: / - / , ISP:
1995|_[ + ] Found:: UNIDENTIFIED
1996
1997 _[ - ]::--------------------------------------------------------------------------------------------------------------
1998|_[ + ] [ 92 / 100 ]-[22:05:57] [ - ]
1999|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/product-safety-and-technical-regulation ]
2000|_[ + ] Exploit::
2001|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2002|_[ + ] More details:: / - / , ISP:
2003|_[ + ] Found:: UNIDENTIFIED
2004
2005 _[ - ]::--------------------------------------------------------------------------------------------------------------
2006|_[ + ] [ 93 / 100 ]-[22:06:02] [ - ]
2007|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu/turkey-and-the-eu ]
2008|_[ + ] Exploit::
2009|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2010|_[ + ] More details:: / - / , ISP:
2011|_[ + ] Found:: UNIDENTIFIED
2012
2013 _[ - ]::--------------------------------------------------------------------------------------------------------------
2014|_[ + ] [ 94 / 100 ]-[22:06:06] [ - ]
2015|_[ + ] Target:: [ https://www.trade.gov.tr/news/opec-oil-production-narrowed-in-december ]
2016|_[ + ] Exploit::
2017|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2018|_[ + ] More details:: / - / , ISP:
2019|_[ + ] Found:: UNIDENTIFIED
2020
2021 _[ - ]::--------------------------------------------------------------------------------------------------------------
2022|_[ + ] [ 95 / 100 ]-[22:06:09] [ - ]
2023|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-edges-downwards ]
2024|_[ + ] Exploit::
2025|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2026|_[ + ] More details:: / - / , ISP:
2027|_[ + ] Found:: UNIDENTIFIED
2028
2029 _[ - ]::--------------------------------------------------------------------------------------------------------------
2030|_[ + ] [ 96 / 100 ]-[22:06:12] [ - ]
2031|_[ + ] Target:: [ https://www.trade.gov.tr/news/german-industrial-orders-dropped-in-january ]
2032|_[ + ] Exploit::
2033|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2034|_[ + ] More details:: / - / , ISP:
2035|_[ + ] Found:: UNIDENTIFIED
2036
2037 _[ - ]::--------------------------------------------------------------------------------------------------------------
2038|_[ + ] [ 97 / 100 ]-[22:06:16] [ - ]
2039|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/income-tax-withholding-support ]
2040|_[ + ] Exploit::
2041|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2042|_[ + ] More details:: / - / , ISP:
2043|_[ + ] Found:: UNIDENTIFIED
2044
2045 _[ - ]::--------------------------------------------------------------------------------------------------------------
2046|_[ + ] [ 98 / 100 ]-[22:06:19] [ - ]
2047|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/ssp-support-employees-share ]
2048|_[ + ] Exploit::
2049|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2050|_[ + ] More details:: / - / , ISP:
2051|_[ + ] Found:: UNIDENTIFIED
2052
2053 _[ - ]::--------------------------------------------------------------------------------------------------------------
2054|_[ + ] [ 99 / 100 ]-[22:06:23] [ - ]
2055|_[ + ] Target:: [ https://www.trade.gov.tr/news/uk-trade-deficit-widens-in-january ]
2056|_[ + ] Exploit::
2057|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2058|_[ + ] More details:: / - / , ISP:
2059|_[ + ] Found:: UNIDENTIFIED
2060
2061[ INFO ] [ Shutting down ]
2062[ INFO ] [ End of process INURLBR at [10-11-2019 22:06:23]
2063[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2064[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
2065|_________________________________________________________________________________________
2066
2067\_________________________________________________________________________________________/
2068######################################################################################################################################
2069https://www.trade.gov.tr [200 OK] ASP_NET[4.0.30319][MVC5.2], Cookies[ASP.NET_SessionId], Country[TURKEY][TR], HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[95.0.51.12], Microsoft-IIS[10.0], Open-Graph-Protocol, Script, Title[Republic of Turkey - Ministry of Trade], UncommonHeaders[x-aspnetmvc-version,access-control-allow-origin], X-Powered-By[ASP.NET], X-UA-Compatible[IE=edge]
2070######################################################################################################################################
2071
2072wig - WebApp Information Gatherer
2073
2074
2075Scanning https://www.trade.gov.tr...
2076___________________________ SITE INFO ____________________________
2077IP Title
207895.0.51.12 Republic of Turkey - Ministry of Trade
2079
2080____________________________ VERSION _____________________________
2081Name Versions Type
2082ASP.NET 4.0.30319 Platform
2083IIS 10.0 Platform
2084jQuery 3.4.1 JavaScript
2085
2086__________________________ INTERESTING ___________________________
2087URL Note Type
2088/test/ Test directory Interesting
2089/_layouts/create.aspx ASP.NET detailed error Interesting
2090
2091_____________________ PLATFORM OBSERVATIONS ______________________
2092Platform URL Type
2093ASP.NET 4.0.30319 / Observation
2094ASP.NET 4.7.3429.0 /_layouts/create.aspx Observation
2095
2096__________________________________________________________________
2097Time: 1.9 sec Urls: 613 Fingerprints: 40401
2098######################################################################################################################################
2099Version: 1.11.13-static
2100OpenSSL 1.0.2-chacha (1.0.2g-dev)
2101
2102Connected to 95.0.51.12
2103
2104Testing SSL server www.trade.gov.tr on port 443 using SNI name www.trade.gov.tr
2105
2106 TLS Fallback SCSV:
2107Server does not support TLS Fallback SCSV
2108
2109 TLS renegotiation:
2110Secure session renegotiation supported
2111
2112 TLS Compression:
2113Compression disabled
2114
2115 Heartbleed:
2116TLS 1.2 not vulnerable to heartbleed
2117TLS 1.1 not vulnerable to heartbleed
2118TLS 1.0 not vulnerable to heartbleed
2119
2120 Supported Server Cipher(s):
2121Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
2122Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
2123Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
2124Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
2125Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
2126Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
2127Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2128Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2129Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2130Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2131Accepted TLSv1.2 256 bits AES256-GCM-SHA384
2132Accepted TLSv1.2 128 bits AES128-GCM-SHA256
2133Accepted TLSv1.2 256 bits AES256-SHA256
2134Accepted TLSv1.2 128 bits AES128-SHA256
2135Accepted TLSv1.2 256 bits AES256-SHA
2136Accepted TLSv1.2 128 bits AES128-SHA
2137Accepted TLSv1.2 112 bits DES-CBC3-SHA
2138Accepted TLSv1.2 128 bits RC4-SHA
2139Accepted TLSv1.2 128 bits RC4-MD5
2140Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2141Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2142Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2143Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2144Accepted TLSv1.1 256 bits AES256-SHA
2145Accepted TLSv1.1 128 bits AES128-SHA
2146Accepted TLSv1.1 112 bits DES-CBC3-SHA
2147Accepted TLSv1.1 128 bits RC4-SHA
2148Accepted TLSv1.1 128 bits RC4-MD5
2149Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2150Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2151Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2152Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2153Accepted TLSv1.0 256 bits AES256-SHA
2154Accepted TLSv1.0 128 bits AES128-SHA
2155Accepted TLSv1.0 112 bits DES-CBC3-SHA
2156Accepted TLSv1.0 128 bits RC4-SHA
2157Accepted TLSv1.0 128 bits RC4-MD5
2158
2159 SSL Certificate:
2160Signature Algorithm: sha256WithRSAEncryption
2161RSA Key Strength: 2048
2162
2163Subject: *.trade.gov.tr
2164Altnames: DNS:*.trade.gov.tr, DNS:trade.gov.tr
2165Issuer: AlphaSSL CA - SHA256 - G2
2166
2167Not valid before: Jul 19 15:39:48 2018 GMT
2168Not valid after: Jul 19 15:39:48 2020 GMT
2169#######################################################################################################################################
2170------------------------------------------------------------------------------------------------------------------------
2171
2172[ ! ] Starting SCANNER INURLBR 2.1 at [10-11-2019 22:09:36]
2173[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2174It is the end user's responsibility to obey all applicable local, state and federal laws.
2175Developers assume no liability and are not responsible for any misuse or damage caused by this program
2176
2177[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
2178[ INFO ][ DORK ]::[ site:www.trade.gov.tr ]
2179[ INFO ][ SEARCHING ]:: {
2180[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.tw ]
2181
2182[ INFO ][ SEARCHING ]::
2183-[:::]
2184[ INFO ][ ENGINE ]::[ GOOGLE API ]
2185
2186[ INFO ][ SEARCHING ]::
2187-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2188[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.hr ID: 006688160405527839966:yhpefuwybre ]
2189
2190[ INFO ][ SEARCHING ]::
2191-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2192
2193[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2194
2195
2196 _[ - ]::--------------------------------------------------------------------------------------------------------------
2197|_[ + ] [ 0 / 100 ]-[22:10:03] [ - ]
2198|_[ + ] Target:: [ https://www.trade.gov.tr/ ]
2199|_[ + ] Exploit::
2200|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2201|_[ + ] More details:: / - / , ISP:
2202|_[ + ] Found:: UNIDENTIFIED
2203
2204 _[ - ]::--------------------------------------------------------------------------------------------------------------
2205|_[ + ] [ 1 / 100 ]-[22:10:08] [ - ]
2206|_[ + ] Target:: [ https://www.trade.gov.tr/news ]
2207|_[ + ] Exploit::
2208|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2209|_[ + ] More details:: / - / , ISP:
2210|_[ + ] Found:: UNIDENTIFIED
2211
2212 _[ - ]::--------------------------------------------------------------------------------------------------------------
2213|_[ + ] [ 2 / 100 ]-[22:10:12] [ - ]
2214|_[ + ] Target:: [ https://www.trade.gov.tr/investment ]
2215|_[ + ] Exploit::
2216|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2217|_[ + ] More details:: / - / , ISP:
2218|_[ + ] Found:: UNIDENTIFIED
2219
2220 _[ - ]::--------------------------------------------------------------------------------------------------------------
2221|_[ + ] [ 3 / 100 ]-[22:10:15] [ - ]
2222|_[ + ] Target:: [ https://www.trade.gov.tr/statistics ]
2223|_[ + ] Exploit::
2224|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2225|_[ + ] More details:: / - / , ISP:
2226|_[ + ] Found:: UNIDENTIFIED
2227
2228 _[ - ]::--------------------------------------------------------------------------------------------------------------
2229|_[ + ] [ 4 / 100 ]-[22:10:19] [ - ]
2230|_[ + ] Target:: [ https://www.trade.gov.tr/announcements ]
2231|_[ + ] Exploit::
2232|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2233|_[ + ] More details:: / - / , ISP:
2234|_[ + ] Found:: UNIDENTIFIED
2235
2236 _[ - ]::--------------------------------------------------------------------------------------------------------------
2237|_[ + ] [ 5 / 100 ]-[22:10:22] [ - ]
2238|_[ + ] Target:: [ https://www.trade.gov.tr/fdi ]
2239|_[ + ] Exploit::
2240|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2241|_[ + ] More details:: / - / , ISP:
2242|_[ + ] Found:: UNIDENTIFIED
2243
2244 _[ - ]::--------------------------------------------------------------------------------------------------------------
2245|_[ + ] [ 6 / 100 ]-[22:10:26] [ - ]
2246|_[ + ] Target:: [ https://www.trade.gov.tr/BakanaUlasin ]
2247|_[ + ] Exploit::
2248|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2249|_[ + ] More details:: / - / , ISP:
2250|_[ + ] Found:: UNIDENTIFIED
2251
2252 _[ - ]::--------------------------------------------------------------------------------------------------------------
2253|_[ + ] [ 7 / 100 ]-[22:10:30] [ - ]
2254|_[ + ] Target:: [ https://www.trade.gov.tr/yoikk ]
2255|_[ + ] Exploit::
2256|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2257|_[ + ] More details:: / - / , ISP:
2258|_[ + ] Found:: UNIDENTIFIED
2259
2260 _[ - ]::--------------------------------------------------------------------------------------------------------------
2261|_[ + ] [ 8 / 100 ]-[22:10:34] [ - ]
2262|_[ + ] Target:: [ https://www.trade.gov.tr/legislation ]
2263|_[ + ] Exploit::
2264|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2265|_[ + ] More details:: / - / , ISP:
2266|_[ + ] Found:: UNIDENTIFIED
2267
2268 _[ - ]::--------------------------------------------------------------------------------------------------------------
2269|_[ + ] [ 9 / 100 ]-[22:10:38] [ - ]
2270|_[ + ] Target:: [ https://www.trade.gov.tr/contact ]
2271|_[ + ] Exploit::
2272|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2273|_[ + ] More details:: / - / , ISP:
2274|_[ + ] Found:: UNIDENTIFIED
2275
2276 _[ - ]::--------------------------------------------------------------------------------------------------------------
2277|_[ + ] [ 10 / 100 ]-[22:10:41] [ - ]
2278|_[ + ] Target:: [ https://www.trade.gov.tr/turquality ]
2279|_[ + ] Exploit::
2280|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2281|_[ + ] More details:: / - / , ISP:
2282|_[ + ] Found:: UNIDENTIFIED
2283
2284 _[ - ]::--------------------------------------------------------------------------------------------------------------
2285|_[ + ] [ 11 / 100 ]-[22:10:46] [ - ]
2286|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes ]
2287|_[ + ] Exploit::
2288|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2289|_[ + ] More details:: / - / , ISP:
2290|_[ + ] Found:: UNIDENTIFIED
2291
2292 _[ - ]::--------------------------------------------------------------------------------------------------------------
2293|_[ + ] [ 12 / 100 ]-[22:10:50] [ - ]
2294|_[ + ] Target:: [ https://www.trade.gov.tr/investment/faq ]
2295|_[ + ] Exploit::
2296|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2297|_[ + ] More details:: / - / , ISP:
2298|_[ + ] Found:: UNIDENTIFIED
2299
2300 _[ - ]::--------------------------------------------------------------------------------------------------------------
2301|_[ + ] [ 13 / 100 ]-[22:10:53] [ - ]
2302|_[ + ] Target:: [ https://www.trade.gov.tr/investment/eligibility ]
2303|_[ + ] Exploit::
2304|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2305|_[ + ] More details:: / - / , ISP:
2306|_[ + ] Found:: UNIDENTIFIED
2307
2308 _[ - ]::--------------------------------------------------------------------------------------------------------------
2309|_[ + ] [ 14 / 100 ]-[22:10:57] [ - ]
2310|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/export ]
2311|_[ + ] Exploit::
2312|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2313|_[ + ] More details:: / - / , ISP:
2314|_[ + ] Found:: UNIDENTIFIED
2315
2316 _[ - ]::--------------------------------------------------------------------------------------------------------------
2317|_[ + ] [ 15 / 100 ]-[22:11:01] [ - ]
2318|_[ + ] Target:: [ https://www.trade.gov.tr/economic-outlook ]
2319|_[ + ] Exploit::
2320|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2321|_[ + ] More details:: / - / , ISP:
2322|_[ + ] Found:: UNIDENTIFIED
2323
2324 _[ - ]::--------------------------------------------------------------------------------------------------------------
2325|_[ + ] [ 16 / 100 ]-[22:11:04] [ - ]
2326|_[ + ] Target:: [ https://www.trade.gov.tr/sectoral-reports ]
2327|_[ + ] Exploit::
2328|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2329|_[ + ] More details:: / - / , ISP:
2330|_[ + ] Found:: UNIDENTIFIED
2331
2332 _[ - ]::--------------------------------------------------------------------------------------------------------------
2333|_[ + ] [ 17 / 100 ]-[22:11:07] [ - ]
2334|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/law ]
2335|_[ + ] Exploit::
2336|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2337|_[ + ] More details:: / - / , ISP:
2338|_[ + ] Found:: UNIDENTIFIED
2339
2340 _[ - ]::--------------------------------------------------------------------------------------------------------------
2341|_[ + ] [ 18 / 100 ]-[22:11:11] [ - ]
2342|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones ]
2343|_[ + ] Exploit::
2344|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2345|_[ + ] More details:: / - / , ISP:
2346|_[ + ] Found:: UNIDENTIFIED
2347
2348 _[ - ]::--------------------------------------------------------------------------------------------------------------
2349|_[ + ] [ 19 / 100 ]-[22:11:15] [ - ]
2350|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistics ]
2351|_[ + ] Exploit::
2352|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2353|_[ + ] More details:: / - / , ISP:
2354|_[ + ] Found:: UNIDENTIFIED
2355
2356 _[ - ]::--------------------------------------------------------------------------------------------------------------
2357|_[ + ] [ 20 / 100 ]-[22:11:19] [ - ]
2358|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import ]
2359|_[ + ] Exploit::
2360|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2361|_[ + ] More details:: / - / , ISP:
2362|_[ + ] Found:: UNIDENTIFIED
2363
2364 _[ - ]::--------------------------------------------------------------------------------------------------------------
2365|_[ + ] [ 21 / 100 ]-[22:11:22] [ - ]
2366|_[ + ] Target:: [ https://www.trade.gov.tr/commercial-representatives ]
2367|_[ + ] Exploit::
2368|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2369|_[ + ] More details:: / - / , ISP:
2370|_[ + ] Found:: UNIDENTIFIED
2371
2372 _[ - ]::--------------------------------------------------------------------------------------------------------------
2373|_[ + ] [ 22 / 100 ]-[22:11:26] [ - ]
2374|_[ + ] Target:: [ https://www.trade.gov.tr/contact/contact ]
2375|_[ + ] Exploit::
2376|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2377|_[ + ] More details:: / - / , ISP:
2378|_[ + ] Found:: UNIDENTIFIED
2379
2380 _[ - ]::--------------------------------------------------------------------------------------------------------------
2381|_[ + ] [ 23 / 100 ]-[22:11:30] [ - ]
2382|_[ + ] Target:: [ https://www.trade.gov.tr/investment/contact ]
2383|_[ + ] Exploit::
2384|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2385|_[ + ] More details:: / - / , ISP:
2386|_[ + ] Found:: UNIDENTIFIED
2387
2388 _[ - ]::--------------------------------------------------------------------------------------------------------------
2389|_[ + ] [ 24 / 100 ]-[22:11:34] [ - ]
2390|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry ]
2391|_[ + ] Exploit::
2392|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2393|_[ + ] More details:: / - / , ISP:
2394|_[ + ] Found:: UNIDENTIFIED
2395
2396 _[ - ]::--------------------------------------------------------------------------------------------------------------
2397|_[ + ] [ 25 / 100 ]-[22:11:37] [ - ]
2398|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations ]
2399|_[ + ] Exploit::
2400|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2401|_[ + ] More details:: / - / , ISP:
2402|_[ + ] Found:: UNIDENTIFIED
2403
2404 _[ - ]::--------------------------------------------------------------------------------------------------------------
2405|_[ + ] [ 26 / 100 ]-[22:11:41] [ - ]
2406|_[ + ] Target:: [ https://www.trade.gov.tr/investment/links ]
2407|_[ + ] Exploit::
2408|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2409|_[ + ] More details:: / - / , ISP:
2410|_[ + ] Found:: UNIDENTIFIED
2411
2412 _[ - ]::--------------------------------------------------------------------------------------------------------------
2413|_[ + ] [ 27 / 100 ]-[22:11:46] [ - ]
2414|_[ + ] Target:: [ https://www.trade.gov.tr/investment/procedures ]
2415|_[ + ] Exploit::
2416|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2417|_[ + ] More details:: / - / , ISP:
2418|_[ + ] Found:: UNIDENTIFIED
2419
2420 _[ - ]::--------------------------------------------------------------------------------------------------------------
2421|_[ + ] [ 28 / 100 ]-[22:11:49] [ - ]
2422|_[ + ] Target:: [ https://www.trade.gov.tr/legislationfree-zones ]
2423|_[ + ] Exploit::
2424|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2425|_[ + ] More details:: / - / , ISP:
2426|_[ + ] Found:: UNIDENTIFIED
2427
2428 _[ - ]::--------------------------------------------------------------------------------------------------------------
2429|_[ + ] [ 29 / 100 ]-[22:11:53] [ - ]
2430|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/statistics ]
2431|_[ + ] Exploit::
2432|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2433|_[ + ] More details:: / - / , ISP:
2434|_[ + ] Found:: UNIDENTIFIED
2435
2436 _[ - ]::--------------------------------------------------------------------------------------------------------------
2437|_[ + ] [ 30 / 100 ]-[22:11:58] [ - ]
2438|_[ + ] Target:: [ https://www.trade.gov.tr/investment/application-process ]
2439|_[ + ] Exploit::
2440|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2441|_[ + ] More details:: / - / , ISP:
2442|_[ + ] Found:: UNIDENTIFIED
2443
2444 _[ - ]::--------------------------------------------------------------------------------------------------------------
2445|_[ + ] [ 31 / 100 ]-[22:12:02] [ - ]
2446|_[ + ] Target:: [ https://www.trade.gov.tr/investment/incentive-instruments ]
2447|_[ + ] Exploit::
2448|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2449|_[ + ] More details:: / - / , ISP:
2450|_[ + ] Found:: UNIDENTIFIED
2451
2452 _[ - ]::--------------------------------------------------------------------------------------------------------------
2453|_[ + ] [ 32 / 100 ]-[22:12:06] [ - ]
2454|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements ]
2455|_[ + ] Exploit::
2456|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2457|_[ + ] More details:: / - / , ISP:
2458|_[ + ] Found:: UNIDENTIFIED
2459
2460 _[ - ]::--------------------------------------------------------------------------------------------------------------
2461|_[ + ] [ 33 / 100 ]-[22:12:09] [ - ]
2462|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-incentives ]
2463|_[ + ] Exploit::
2464|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2465|_[ + ] More details:: / - / , ISP:
2466|_[ + ] Found:: UNIDENTIFIED
2467
2468 _[ - ]::--------------------------------------------------------------------------------------------------------------
2469|_[ + ] [ 34 / 100 ]-[22:12:13] [ - ]
2470|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey ]
2471|_[ + ] Exploit::
2472|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2473|_[ + ] More details:: / - / , ISP:
2474|_[ + ] Found:: UNIDENTIFIED
2475
2476 _[ - ]::--------------------------------------------------------------------------------------------------------------
2477|_[ + ] [ 35 / 100 ]-[22:12:17] [ - ]
2478|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content ]
2479|_[ + ] Exploit::
2480|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2481|_[ + ] More details:: / - / , ISP:
2482|_[ + ] Found:: UNIDENTIFIED
2483
2484 _[ - ]::--------------------------------------------------------------------------------------------------------------
2485|_[ + ] [ 36 / 100 ]-[22:12:21] [ - ]
2486|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu ]
2487|_[ + ] Exploit::
2488|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2489|_[ + ] More details:: / - / , ISP:
2490|_[ + ] Found:: UNIDENTIFIED
2491
2492 _[ - ]::--------------------------------------------------------------------------------------------------------------
2493|_[ + ] [ 37 / 100 ]-[22:12:24] [ - ]
2494|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services ]
2495|_[ + ] Exploit::
2496|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2497|_[ + ] More details:: / - / , ISP:
2498|_[ + ] Found:: UNIDENTIFIED
2499
2500 _[ - ]::--------------------------------------------------------------------------------------------------------------
2501|_[ + ] [ 38 / 100 ]-[22:12:27] [ - ]
2502|_[ + ] Target:: [ https://www.trade.gov.tr/buy-turkish-products ]
2503|_[ + ] Exploit::
2504|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2505|_[ + ] More details:: / - / , ISP:
2506|_[ + ] Found:: UNIDENTIFIED
2507
2508 _[ - ]::--------------------------------------------------------------------------------------------------------------
2509|_[ + ] [ 39 / 100 ]-[22:12:31] [ - ]
2510|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistic-content ]
2511|_[ + ] Exploit::
2512|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2513|_[ + ] More details:: / - / , ISP:
2514|_[ + ] Found:: UNIDENTIFIED
2515
2516 _[ - ]::--------------------------------------------------------------------------------------------------------------
2517|_[ + ] [ 40 / 100 ]-[22:12:35] [ - ]
2518|_[ + ] Target:: [ https://www.trade.gov.tr/2023-export-strategy ]
2519|_[ + ] Exploit::
2520|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2521|_[ + ] More details:: / - / , ISP:
2522|_[ + ] Found:: UNIDENTIFIED
2523
2524 _[ - ]::--------------------------------------------------------------------------------------------------------------
2525|_[ + ] [ 41 / 100 ]-[22:12:38] [ - ]
2526|_[ + ] Target:: [ https://www.trade.gov.tr/legislationforeign-direct-investment ]
2527|_[ + ] Exploit::
2528|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2529|_[ + ] More details:: / - / , ISP:
2530|_[ + ] Found:: UNIDENTIFIED
2531
2532 _[ - ]::--------------------------------------------------------------------------------------------------------------
2533|_[ + ] [ 42 / 100 ]-[22:12:42] [ - ]
2534|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/strategic-investments ]
2535|_[ + ] Exploit::
2536|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2537|_[ + ] More details:: / - / , ISP:
2538|_[ + ] Found:: UNIDENTIFIED
2539
2540 _[ - ]::--------------------------------------------------------------------------------------------------------------
2541|_[ + ] [ 43 / 100 ]-[22:12:46] [ - ]
2542|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/general-investments ]
2543|_[ + ] Exploit::
2544|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2545|_[ + ] More details:: / - / , ISP:
2546|_[ + ] Found:: UNIDENTIFIED
2547
2548 _[ - ]::--------------------------------------------------------------------------------------------------------------
2549|_[ + ] [ 44 / 100 ]-[22:12:50] [ - ]
2550|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/morocco ]
2551|_[ + ] Exploit::
2552|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2553|_[ + ] More details:: / - / , ISP:
2554|_[ + ] Found:: UNIDENTIFIED
2555
2556 _[ - ]::--------------------------------------------------------------------------------------------------------------
2557|_[ + ] [ 45 / 100 ]-[22:12:54] [ - ]
2558|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/priority-investments ]
2559|_[ + ] Exploit::
2560|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2561|_[ + ] More details:: / - / , ISP:
2562|_[ + ] Found:: UNIDENTIFIED
2563
2564 _[ - ]::--------------------------------------------------------------------------------------------------------------
2565|_[ + ] [ 46 / 100 ]-[22:12:58] [ - ]
2566|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/regional-investments ]
2567|_[ + ] Exploit::
2568|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2569|_[ + ] More details:: / - / , ISP:
2570|_[ + ] Found:: UNIDENTIFIED
2571
2572 _[ - ]::--------------------------------------------------------------------------------------------------------------
2573|_[ + ] [ 47 / 100 ]-[22:13:02] [ - ]
2574|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/tunisia ]
2575|_[ + ] Exploit::
2576|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2577|_[ + ] More details:: / - / , ISP:
2578|_[ + ] Found:: UNIDENTIFIED
2579
2580 _[ - ]::--------------------------------------------------------------------------------------------------------------
2581|_[ + ] [ 48 / 100 ]-[22:13:06] [ - ]
2582|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/syria ]
2583|_[ + ] Exploit::
2584|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2585|_[ + ] More details:: / - / , ISP:
2586|_[ + ] Found:: UNIDENTIFIED
2587
2588 _[ - ]::--------------------------------------------------------------------------------------------------------------
2589|_[ + ] [ 49 / 100 ]-[22:13:09] [ - ]
2590|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones/general-outlook ]
2591|_[ + ] Exploit::
2592|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2593|_[ + ] More details:: / - / , ISP:
2594|_[ + ] Found:: UNIDENTIFIED
2595
2596 _[ - ]::--------------------------------------------------------------------------------------------------------------
2597|_[ + ] [ 50 / 100 ]-[22:13:13] [ - ]
2598|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/malaysia ]
2599|_[ + ] Exploit::
2600|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2601|_[ + ] More details:: / - / , ISP:
2602|_[ + ] Found:: UNIDENTIFIED
2603
2604 _[ - ]::--------------------------------------------------------------------------------------------------------------
2605|_[ + ] [ 51 / 100 ]-[22:13:17] [ - ]
2606|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/moldova ]
2607|_[ + ] Exploit::
2608|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2609|_[ + ] More details:: / - / , ISP:
2610|_[ + ] Found:: UNIDENTIFIED
2611
2612 _[ - ]::--------------------------------------------------------------------------------------------------------------
2613|_[ + ] [ 52 / 100 ]-[22:13:21] [ - ]
2614|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/chile ]
2615|_[ + ] Exploit::
2616|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2617|_[ + ] More details:: / - / , ISP:
2618|_[ + ] Found:: UNIDENTIFIED
2619
2620 _[ - ]::--------------------------------------------------------------------------------------------------------------
2621|_[ + ] [ 53 / 100 ]-[22:13:25] [ - ]
2622|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/georgia ]
2623|_[ + ] Exploit::
2624|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2625|_[ + ] More details:: / - / , ISP:
2626|_[ + ] Found:: UNIDENTIFIED
2627
2628 _[ - ]::--------------------------------------------------------------------------------------------------------------
2629|_[ + ] [ 54 / 100 ]-[22:13:29] [ - ]
2630|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/serbia ]
2631|_[ + ] Exploit::
2632|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2633|_[ + ] More details:: / - / , ISP:
2634|_[ + ] Found:: UNIDENTIFIED
2635
2636 _[ - ]::--------------------------------------------------------------------------------------------------------------
2637|_[ + ] [ 55 / 100 ]-[22:13:32] [ - ]
2638|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/mauritius ]
2639|_[ + ] Exploit::
2640|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2641|_[ + ] More details:: / - / , ISP:
2642|_[ + ] Found:: UNIDENTIFIED
2643
2644 _[ - ]::--------------------------------------------------------------------------------------------------------------
2645|_[ + ] [ 56 / 100 ]-[22:13:36] [ - ]
2646|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/palestine ]
2647|_[ + ] Exploit::
2648|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2649|_[ + ] More details:: / - / , ISP:
2650|_[ + ] Found:: UNIDENTIFIED
2651
2652 _[ - ]::--------------------------------------------------------------------------------------------------------------
2653|_[ + ] [ 57 / 100 ]-[22:13:39] [ - ]
2654|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/albania ]
2655|_[ + ] Exploit::
2656|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2657|_[ + ] More details:: / - / , ISP:
2658|_[ + ] Found:: UNIDENTIFIED
2659
2660 _[ - ]::--------------------------------------------------------------------------------------------------------------
2661|_[ + ] [ 58 / 100 ]-[22:13:43] [ - ]
2662|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/efta ]
2663|_[ + ] Exploit::
2664|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2665|_[ + ] More details:: / - / , ISP:
2666|_[ + ] Found:: UNIDENTIFIED
2667
2668 _[ - ]::--------------------------------------------------------------------------------------------------------------
2669|_[ + ] [ 59 / 100 ]-[22:13:47] [ - ]
2670|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/singapore ]
2671|_[ + ] Exploit::
2672|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2673|_[ + ] More details:: / - / , ISP:
2674|_[ + ] Found:: UNIDENTIFIED
2675
2676 _[ - ]::--------------------------------------------------------------------------------------------------------------
2677|_[ + ] [ 60 / 100 ]-[22:13:51] [ - ]
2678|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/israel ]
2679|_[ + ] Exploit::
2680|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2681|_[ + ] More details:: / - / , ISP:
2682|_[ + ] Found:: UNIDENTIFIED
2683
2684 _[ - ]::--------------------------------------------------------------------------------------------------------------
2685|_[ + ] [ 61 / 100 ]-[22:13:55] [ - ]
2686|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/macedonia ]
2687|_[ + ] Exploit::
2688|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2689|_[ + ] More details:: / - / , ISP:
2690|_[ + ] Found:: UNIDENTIFIED
2691
2692 _[ - ]::--------------------------------------------------------------------------------------------------------------
2693|_[ + ] [ 62 / 100 ]-[22:13:59] [ - ]
2694|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/sezai-ucarmak ]
2695|_[ + ] Exploit::
2696|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2697|_[ + ] More details:: / - / , ISP:
2698|_[ + ] Found:: UNIDENTIFIED
2699
2700 _[ - ]::--------------------------------------------------------------------------------------------------------------
2701|_[ + ] [ 63 / 100 ]-[22:14:02] [ - ]
2702|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/egypt ]
2703|_[ + ] Exploit::
2704|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2705|_[ + ] More details:: / - / , ISP:
2706|_[ + ] Found:: UNIDENTIFIED
2707
2708 _[ - ]::--------------------------------------------------------------------------------------------------------------
2709|_[ + ] [ 64 / 100 ]-[22:14:06] [ - ]
2710|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/bilateral-investment-treaties ]
2711|_[ + ] Exploit::
2712|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2713|_[ + ] More details:: / - / , ISP:
2714|_[ + ] Found:: UNIDENTIFIED
2715
2716 _[ - ]::--------------------------------------------------------------------------------------------------------------
2717|_[ + ] [ 65 / 100 ]-[22:14:10] [ - ]
2718|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/focus-business-turkey ]
2719|_[ + ] Exploit::
2720|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2721|_[ + ] More details:: / - / , ISP:
2722|_[ + ] Found:: UNIDENTIFIED
2723
2724 _[ - ]::--------------------------------------------------------------------------------------------------------------
2725|_[ + ] [ 66 / 100 ]-[22:14:14] [ - ]
2726|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/montenegro ]
2727|_[ + ] Exploit::
2728|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2729|_[ + ] More details:: / - / , ISP:
2730|_[ + ] Found:: UNIDENTIFIED
2731
2732 _[ - ]::--------------------------------------------------------------------------------------------------------------
2733|_[ + ] [ 67 / 100 ]-[22:14:18] [ - ]
2734|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2017 ]
2735|_[ + ] Exploit::
2736|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2737|_[ + ] More details:: / - / , ISP:
2738|_[ + ] Found:: UNIDENTIFIED
2739
2740 _[ - ]::--------------------------------------------------------------------------------------------------------------
2741|_[ + ] [ 68 / 100 ]-[22:14:22] [ - ]
2742|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/documents ]
2743|_[ + ] Exploit::
2744|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2745|_[ + ] More details:: / - / , ISP:
2746|_[ + ] Found:: UNIDENTIFIED
2747
2748 _[ - ]::--------------------------------------------------------------------------------------------------------------
2749|_[ + ] [ 69 / 100 ]-[22:14:26] [ - ]
2750|_[ + ] Target:: [ https://www.trade.gov.tr/establishing-company-in-turkey ]
2751|_[ + ] Exploit::
2752|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2753|_[ + ] More details:: / - / , ISP:
2754|_[ + ] Found:: UNIDENTIFIED
2755
2756 _[ - ]::--------------------------------------------------------------------------------------------------------------
2757|_[ + ] [ 70 / 100 ]-[22:14:30] [ - ]
2758|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/organizational-structure ]
2759|_[ + ] Exploit::
2760|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2761|_[ + ] More details:: / - / , ISP:
2762|_[ + ] Found:: UNIDENTIFIED
2763
2764 _[ - ]::--------------------------------------------------------------------------------------------------------------
2765|_[ + ] [ 71 / 100 ]-[22:14:34] [ - ]
2766|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/large-scale-investments ]
2767|_[ + ] Exploit::
2768|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2769|_[ + ] More details:: / - / , ISP:
2770|_[ + ] Found:: UNIDENTIFIED
2771
2772 _[ - ]::--------------------------------------------------------------------------------------------------------------
2773|_[ + ] [ 72 / 100 ]-[22:14:37] [ - ]
2774|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/faroe-islands ]
2775|_[ + ] Exploit::
2776|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2777|_[ + ] More details:: / - / , ISP:
2778|_[ + ] Found:: UNIDENTIFIED
2779
2780 _[ - ]::--------------------------------------------------------------------------------------------------------------
2781|_[ + ] [ 73 / 100 ]-[22:14:41] [ - ]
2782|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tax-deduction ]
2783|_[ + ] Exploit::
2784|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2785|_[ + ] More details:: / - / , ISP:
2786|_[ + ] Found:: UNIDENTIFIED
2787
2788 _[ - ]::--------------------------------------------------------------------------------------------------------------
2789|_[ + ] [ 74 / 100 ]-[22:14:45] [ - ]
2790|_[ + ] Target:: [ https://www.trade.gov.tr/news/ecbs-monetary-policy-decision ]
2791|_[ + ] Exploit::
2792|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2793|_[ + ] More details:: / - / , ISP:
2794|_[ + ] Found:: UNIDENTIFIED
2795
2796 _[ - ]::--------------------------------------------------------------------------------------------------------------
2797|_[ + ] [ 75 / 100 ]-[22:14:48] [ - ]
2798|_[ + ] Target:: [ https://www.trade.gov.tr/news/unemployment-at-8-1 ]
2799|_[ + ] Exploit::
2800|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2801|_[ + ] More details:: / - / , ISP:
2802|_[ + ] Found:: UNIDENTIFIED
2803
2804 _[ - ]::--------------------------------------------------------------------------------------------------------------
2805|_[ + ] [ 76 / 100 ]-[22:14:52] [ - ]
2806|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/vat-refund ]
2807|_[ + ] Exploit::
2808|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2809|_[ + ] More details:: / - / , ISP:
2810|_[ + ] Found:: UNIDENTIFIED
2811
2812 _[ - ]::--------------------------------------------------------------------------------------------------------------
2813|_[ + ] [ 77 / 100 ]-[22:14:56] [ - ]
2814|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/minister-of-trade ]
2815|_[ + ] Exploit::
2816|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2817|_[ + ] More details:: / - / , ISP:
2818|_[ + ] Found:: UNIDENTIFIED
2819
2820 _[ - ]::--------------------------------------------------------------------------------------------------------------
2821|_[ + ] [ 78 / 100 ]-[22:14:59] [ - ]
2822|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/riza-tuna-turagay ]
2823|_[ + ] Exploit::
2824|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2825|_[ + ] More details:: / - / , ISP:
2826|_[ + ] Found:: UNIDENTIFIED
2827
2828 _[ - ]::--------------------------------------------------------------------------------------------------------------
2829|_[ + ] [ 79 / 100 ]-[22:15:03] [ - ]
2830|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/land-allocation ]
2831|_[ + ] Exploit::
2832|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2833|_[ + ] More details:: / - / , ISP:
2834|_[ + ] Found:: UNIDENTIFIED
2835
2836 _[ - ]::--------------------------------------------------------------------------------------------------------------
2837|_[ + ] [ 80 / 100 ]-[22:15:06] [ - ]
2838|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import/trade-defence-policy ]
2839|_[ + ] Exploit::
2840|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2841|_[ + ] More details:: / - / , ISP:
2842|_[ + ] Found:: UNIDENTIFIED
2843
2844 _[ - ]::--------------------------------------------------------------------------------------------------------------
2845|_[ + ] [ 81 / 100 ]-[22:15:10] [ - ]
2846|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur ]
2847|_[ + ] Exploit::
2848|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2849|_[ + ] More details:: / - / , ISP:
2850|_[ + ] Found:: UNIDENTIFIED
2851
2852 _[ - ]::--------------------------------------------------------------------------------------------------------------
2853|_[ + ] [ 82 / 100 ]-[22:15:13] [ - ]
2854|_[ + ] Target:: [ https://www.trade.gov.tr/trade-fairs-and-buyers-mission ]
2855|_[ + ] Exploit::
2856|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2857|_[ + ] More details:: / - / , ISP:
2858|_[ + ] Found:: UNIDENTIFIED
2859
2860 _[ - ]::--------------------------------------------------------------------------------------------------------------
2861|_[ + ] [ 83 / 100 ]-[22:15:17] [ - ]
2862|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations/wto-and-multilaretal ]
2863|_[ + ] Exploit::
2864|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2865|_[ + ] More details:: / - / , ISP:
2866|_[ + ] Found:: UNIDENTIFIED
2867
2868 _[ - ]::--------------------------------------------------------------------------------------------------------------
2869|_[ + ] [ 84 / 100 ]-[22:15:21] [ - ]
2870|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tesvik-haritasi ]
2871|_[ + ] Exploit::
2872|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2873|_[ + ] More details:: / - / , ISP:
2874|_[ + ] Found:: UNIDENTIFIED
2875
2876 _[ - ]::--------------------------------------------------------------------------------------------------------------
2877|_[ + ] [ 85 / 100 ]-[22:15:25] [ - ]
2878|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services/turkish-contracting-services ]
2879|_[ + ] Exploit::
2880|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2881|_[ + ] More details:: / - / , ISP:
2882|_[ + ] Found:: UNIDENTIFIED
2883
2884 _[ - ]::--------------------------------------------------------------------------------------------------------------
2885|_[ + ] [ 86 / 100 ]-[22:15:29] [ - ]
2886|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/interest-rate-support ]
2887|_[ + ] Exploit::
2888|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2889|_[ + ] More details:: / - / , ISP:
2890|_[ + ] Found:: UNIDENTIFIED
2891
2892 _[ - ]::--------------------------------------------------------------------------------------------------------------
2893|_[ + ] [ 87 / 100 ]-[22:15:33] [ - ]
2894|_[ + ] Target:: [ https://www.trade.gov.tr/news/chinas-economy-worsens-in-july ]
2895|_[ + ] Exploit::
2896|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2897|_[ + ] More details:: / - / , ISP:
2898|_[ + ] Found:: UNIDENTIFIED
2899
2900 _[ - ]::--------------------------------------------------------------------------------------------------------------
2901|_[ + ] [ 88 / 100 ]-[22:15:37] [ - ]
2902|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/republic-of-korea ]
2903|_[ + ] Exploit::
2904|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2905|_[ + ] More details:: / - / , ISP:
2906|_[ + ] Found:: UNIDENTIFIED
2907
2908 _[ - ]::--------------------------------------------------------------------------------------------------------------
2909|_[ + ] [ 89 / 100 ]-[22:15:40] [ - ]
2910|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-falls ]
2911|_[ + ] Exploit::
2912|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2913|_[ + ] More details:: / - / , ISP:
2914|_[ + ] Found:: UNIDENTIFIED
2915
2916 _[ - ]::--------------------------------------------------------------------------------------------------------------
2917|_[ + ] [ 90 / 100 ]-[22:15:44] [ - ]
2918|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/customs-duty-exemption ]
2919|_[ + ] Exploit::
2920|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2921|_[ + ] More details:: / - / , ISP:
2922|_[ + ] Found:: UNIDENTIFIED
2923
2924 _[ - ]::--------------------------------------------------------------------------------------------------------------
2925|_[ + ] [ 91 / 100 ]-[22:15:48] [ - ]
2926|_[ + ] Target:: [ https://www.trade.gov.tr/news/weekly-jobless-claims-unexpectedly-fall ]
2927|_[ + ] Exploit::
2928|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2929|_[ + ] More details:: / - / , ISP:
2930|_[ + ] Found:: UNIDENTIFIED
2931
2932 _[ - ]::--------------------------------------------------------------------------------------------------------------
2933|_[ + ] [ 92 / 100 ]-[22:15:51] [ - ]
2934|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/product-safety-and-technical-regulation ]
2935|_[ + ] Exploit::
2936|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2937|_[ + ] More details:: / - / , ISP:
2938|_[ + ] Found:: UNIDENTIFIED
2939
2940 _[ - ]::--------------------------------------------------------------------------------------------------------------
2941|_[ + ] [ 93 / 100 ]-[22:15:55] [ - ]
2942|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu/turkey-and-the-eu ]
2943|_[ + ] Exploit::
2944|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2945|_[ + ] More details:: / - / , ISP:
2946|_[ + ] Found:: UNIDENTIFIED
2947
2948 _[ - ]::--------------------------------------------------------------------------------------------------------------
2949|_[ + ] [ 94 / 100 ]-[22:15:59] [ - ]
2950|_[ + ] Target:: [ https://www.trade.gov.tr/news/opec-oil-production-narrowed-in-december ]
2951|_[ + ] Exploit::
2952|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2953|_[ + ] More details:: / - / , ISP:
2954|_[ + ] Found:: UNIDENTIFIED
2955
2956 _[ - ]::--------------------------------------------------------------------------------------------------------------
2957|_[ + ] [ 95 / 100 ]-[22:16:02] [ - ]
2958|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-edges-downwards ]
2959|_[ + ] Exploit::
2960|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2961|_[ + ] More details:: / - / , ISP:
2962|_[ + ] Found:: UNIDENTIFIED
2963
2964 _[ - ]::--------------------------------------------------------------------------------------------------------------
2965|_[ + ] [ 96 / 100 ]-[22:16:06] [ - ]
2966|_[ + ] Target:: [ https://www.trade.gov.tr/news/german-industrial-orders-dropped-in-january ]
2967|_[ + ] Exploit::
2968|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2969|_[ + ] More details:: / - / , ISP:
2970|_[ + ] Found:: UNIDENTIFIED
2971
2972 _[ - ]::--------------------------------------------------------------------------------------------------------------
2973|_[ + ] [ 97 / 100 ]-[22:16:10] [ - ]
2974|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/income-tax-withholding-support ]
2975|_[ + ] Exploit::
2976|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2977|_[ + ] More details:: / - / , ISP:
2978|_[ + ] Found:: UNIDENTIFIED
2979
2980 _[ - ]::--------------------------------------------------------------------------------------------------------------
2981|_[ + ] [ 98 / 100 ]-[22:16:13] [ - ]
2982|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/ssp-support-employees-share ]
2983|_[ + ] Exploit::
2984|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2985|_[ + ] More details:: / - / , ISP:
2986|_[ + ] Found:: UNIDENTIFIED
2987
2988 _[ - ]::--------------------------------------------------------------------------------------------------------------
2989|_[ + ] [ 99 / 100 ]-[22:16:17] [ - ]
2990|_[ + ] Target:: [ https://www.trade.gov.tr/news/uk-trade-deficit-widens-in-january ]
2991|_[ + ] Exploit::
2992|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
2993|_[ + ] More details:: / - / , ISP:
2994|_[ + ] Found:: UNIDENTIFIED
2995
2996[ INFO ] [ Shutting down ]
2997[ INFO ] [ End of process INURLBR at [10-11-2019 22:16:17]
2998[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2999[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
3000|_________________________________________________________________________________________
3001
3002\_________________________________________________________________________________________/
3003######################################################################################################################################
3004Hosts
3005=====
3006
3007address mac name os_name os_flavor os_sp purpose info comments
3008------- --- ---- ------- --------- ----- ------- ---- --------
300995.0.51.12 95.0.51.12.static.ttnet.com.tr Unknown device
3010
3011Services
3012========
3013
3014host port proto name state info
3015---- ---- ----- ---- ----- ----
301695.0.51.12 53 udp domain unknown
301795.0.51.12 67 udp dhcps unknown
301895.0.51.12 68 udp dhcpc unknown
301995.0.51.12 69 udp tftp unknown
302095.0.51.12 80 tcp http open
302195.0.51.12 88 udp kerberos-sec unknown
302295.0.51.12 123 udp ntp unknown
302395.0.51.12 139 udp netbios-ssn unknown
302495.0.51.12 161 udp snmp unknown
302595.0.51.12 162 udp snmptrap unknown
302695.0.51.12 389 udp ldap unknown
302795.0.51.12 443 tcp https open
302895.0.51.12 500 udp isakmp unknown
302995.0.51.12 520 udp route unknown
303095.0.51.12 2049 udp nfs unknown
3031######################################################################################################################################
3032Domains still to check: 1
3033 Checking if the hostname trade.gov.tr. given is in fact a domain...
3034
3035Analyzing domain: trade.gov.tr.
3036 Checking NameServers using system default resolver...
3037 IP: 212.174.119.211 (Turkey)
3038 HostName: ns1.ekonomi.gov.tr Type: NS
3039 HostName: 212.174.119.211.static.ttnet.com.tr Type: PTR
3040 IP: 212.174.119.212 (Turkey)
3041 HostName: ns2.ekonomi.gov.tr Type: NS
3042 HostName: 212.174.119.212.static.ttnet.com.tr Type: PTR
3043
3044 Checking MailServers using system default resolver...
3045 IP: 212.174.119.132 (Turkey)
3046 HostName: mail2.ekonomi.gov.tr Type: MX
3047 HostName: mail2.dtm.gov.tr Type: PTR
3048
3049 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
3050 No zone transfer found on nameserver 212.174.119.211
3051 No zone transfer found on nameserver 212.174.119.212
3052
3053 Checking SPF record...
3054
3055 Checking 192 most common hostnames using system default resolver...
3056 IP: 95.0.51.12 (Turkey)
3057 HostName: www.trade.gov.tr. Type: A
3058 IP: 95.0.51.12 (Turkey)
3059 HostName: www.trade.gov.tr. Type: A
3060 HostName: test.trade.gov.tr. Type: A
3061 HostName: 95.0.51.12.static.ttnet.com.tr Type: PTR
3062
3063 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
3064 Checking netblock 95.0.51.0
3065 Checking netblock 212.174.119.0
3066
3067 Searching for trade.gov.tr. emails in Google
3068 akbulutn@trade.gov.tr.
3069 helsinki@trade.gov.tr.
3070 pazaragirisihr@trade.gov.tr.
3071 atina@trade.gov.tr.
3072
3073 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
3074 Host 95.0.51.12 is up (reset ttl 64)
3075 Host 212.174.119.132 is up (reset ttl 64)
3076 Host 212.174.119.211 is up (reset ttl 64)
3077 Host 212.174.119.212 is up (reset ttl 64)
3078
3079 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
3080 Scanning ip 95.0.51.12 (95.0.51.12.static.ttnet.com.tr (PTR)):
3081 80/tcp open http syn-ack ttl 110 Microsoft IIS httpd 10.0
3082 |_http-server-header: Microsoft-IIS/10.0
3083 443/tcp open ssl/http syn-ack ttl 110 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
3084 |_http-server-header: Microsoft-HTTPAPI/2.0
3085 |_http-title: Not Found
3086 | ssl-cert: Subject: commonName=*.ticaret.gov.tr
3087 | Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
3088 | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
3089 | Public Key type: rsa
3090 | Public Key bits: 2048
3091 | Signature Algorithm: sha256WithRSAEncryption
3092 | Not valid before: 2018-07-13T14:07:33
3093 | Not valid after: 2020-07-13T14:07:33
3094 | MD5: d4da aac5 0f1d fc22 958d fd58 5979 c669
3095 |_SHA-1: 42f9 3e6d 754c 5492 9cc9 0640 24c9 5232 0112 2195
3096 |_ssl-date: 2019-11-11T01:57:28+00:00; 0s from scanner time.
3097 | tls-alpn:
3098 | h2
3099 |_ http/1.1
3100 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3101 Scanning ip 212.174.119.132 (mail2.dtm.gov.tr (PTR)):
3102 2000/tcp open cisco-sccp? syn-ack ttl 50
3103 5060/tcp open sip? syn-ack ttl 50
3104 Scanning ip 212.174.119.211 (212.174.119.211.static.ttnet.com.tr (PTR)):
3105 2000/tcp open cisco-sccp? syn-ack ttl 53
3106 5060/tcp open sip? syn-ack ttl 50
3107 Scanning ip 212.174.119.212 (212.174.119.212.static.ttnet.com.tr (PTR)):
3108 2000/tcp open cisco-sccp? syn-ack ttl 50
3109 5060/tcp open sip? syn-ack ttl 50
3110 WebCrawling domain's web servers... up to 50 max links.
3111
3112 + URL to crawl: http://www.trade.gov.tr.
3113 + Date: 2019-11-10
3114
3115 + Crawling URL: http://www.trade.gov.tr.:
3116 + Links:
3117 + Crawling http://www.trade.gov.tr. (400 Bad Request)
3118 + Searching for directories...
3119 + Searching open folders...
3120
3121
3122 + URL to crawl: http://test.trade.gov.tr.
3123 + Date: 2019-11-10
3124
3125 + Crawling URL: http://test.trade.gov.tr.:
3126 + Links:
3127 + Crawling http://test.trade.gov.tr. (400 Bad Request)
3128 + Searching for directories...
3129 + Searching open folders...
3130
3131
3132 + URL to crawl: https://www.trade.gov.tr.
3133 + Date: 2019-11-10
3134
3135 + Crawling URL: https://www.trade.gov.tr.:
3136 + Links:
3137 + Crawling https://www.trade.gov.tr. ([Errno 104] Connection reset by peer)
3138 + Searching for directories...
3139 + Searching open folders...
3140
3141
3142 + URL to crawl: https://test.trade.gov.tr.
3143 + Date: 2019-11-10
3144
3145 + Crawling URL: https://test.trade.gov.tr.:
3146 + Links:
3147 + Crawling https://test.trade.gov.tr. ([Errno 104] Connection reset by peer)
3148 + Searching for directories...
3149 + Searching open folders...
3150
3151--Finished--
3152Summary information for domain trade.gov.tr.
3153-----------------------------------------
3154 Domain Specific Information:
3155 Email: akbulutn@trade.gov.tr.
3156 Email: helsinki@trade.gov.tr.
3157 Email: pazaragirisihr@trade.gov.tr.
3158 Email: atina@trade.gov.tr.
3159
3160 Domain Ips Information:
3161 IP: 95.0.51.12
3162 HostName: www.trade.gov.tr. Type: A
3163 HostName: test.trade.gov.tr. Type: A
3164 HostName: 95.0.51.12.static.ttnet.com.tr Type: PTR
3165 Country: Turkey
3166 Is Active: True (reset ttl 64)
3167 Port: 80/tcp open http syn-ack ttl 110 Microsoft IIS httpd 10.0
3168 Script Info: |_http-server-header: Microsoft-IIS/10.0
3169 Port: 443/tcp open ssl/http syn-ack ttl 110 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
3170 Script Info: |_http-server-header: Microsoft-HTTPAPI/2.0
3171 Script Info: |_http-title: Not Found
3172 Script Info: | ssl-cert: Subject: commonName=*.ticaret.gov.tr
3173 Script Info: | Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
3174 Script Info: | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
3175 Script Info: | Public Key type: rsa
3176 Script Info: | Public Key bits: 2048
3177 Script Info: | Signature Algorithm: sha256WithRSAEncryption
3178 Script Info: | Not valid before: 2018-07-13T14:07:33
3179 Script Info: | Not valid after: 2020-07-13T14:07:33
3180 Script Info: | MD5: d4da aac5 0f1d fc22 958d fd58 5979 c669
3181 Script Info: |_SHA-1: 42f9 3e6d 754c 5492 9cc9 0640 24c9 5232 0112 2195
3182 Script Info: |_ssl-date: 2019-11-11T01:57:28+00:00; 0s from scanner time.
3183 Script Info: | tls-alpn:
3184 Script Info: | h2
3185 Script Info: |_ http/1.1
3186 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3187 IP: 212.174.119.132
3188 HostName: mail2.ekonomi.gov.tr Type: MX
3189 HostName: mail2.dtm.gov.tr Type: PTR
3190 Country: Turkey
3191 Is Active: True (reset ttl 64)
3192 Port: 2000/tcp open cisco-sccp? syn-ack ttl 50
3193 Port: 5060/tcp open sip? syn-ack ttl 50
3194 IP: 212.174.119.211
3195 HostName: ns1.ekonomi.gov.tr Type: NS
3196 HostName: 212.174.119.211.static.ttnet.com.tr Type: PTR
3197 Country: Turkey
3198 Is Active: True (reset ttl 64)
3199 Port: 2000/tcp open cisco-sccp? syn-ack ttl 53
3200 Port: 5060/tcp open sip? syn-ack ttl 50
3201 IP: 212.174.119.212
3202 HostName: ns2.ekonomi.gov.tr Type: NS
3203 HostName: 212.174.119.212.static.ttnet.com.tr Type: PTR
3204 Country: Turkey
3205 Is Active: True (reset ttl 64)
3206 Port: 2000/tcp open cisco-sccp? syn-ack ttl 50
3207 Port: 5060/tcp open sip? syn-ack ttl 50
3208#######################################################################################################################################
3209 1 10.231.200.1 (10.231.200.1) 132.838 ms 132.808 ms 132.790 ms
3210 2 * * *
3211 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 137.638 ms 137.640 ms 137.684 ms
3212 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 137.313 ms 137.445 ms 137.442 ms
3213 5 be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 143.172 ms 142.967 ms 142.958 ms
3214 6 be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 161.682 ms 161.859 ms 162.567 ms
3215 7 be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 171.165 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 174.899 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 170.972 ms
3216 8 be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241) 174.288 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6) 171.829 ms 170.834 ms
3217 9 ntt.ams03.atlas.cogentco.com (130.117.15.130) 171.821 ms 171.809 ms 174.781 ms
321810 ae-10.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.44) 174.716 ms 174.690 ms 168.561 ms
321911 ae-13.r02.mlanit01.it.bb.gin.ntt.net (129.250.3.179) 190.902 ms 189.023 ms 196.759 ms
322012 * * ae-1.r01.mlanit01.it.bb.gin.ntt.net (129.250.5.82) 195.780 ms
322113 fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 188.051 ms 185.963 ms 185.418 ms
322214 00-gayrettepe-xrs-t2-2---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.209) 220.812 ms 220.732 ms 00-gayrettepe-xrs-t2-1---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.71) 211.994 ms
322315 212.156.252.68.static.turktelekom.com.tr (212.156.252.68) 219.722 ms 215.693 ms 212.156.120.184.static.turktelekom.com.tr (212.156.120.184) 218.379 ms
322416 temelli-t4-1-aso2osb-ess1-t4-1.turktelekom.com.tr (81.212.203.229) 219.733 ms 00-gayrettepe-xrs-t2-2---00-ebgp-gayrettepe-k.statik.turktelekom.com.tr (81.212.202.18) 218.964 ms 219.513 ms
322517 06-ulus-xrs-t2-2---00-gayrettepe-xrs-t2-2.statik.turktelekom.com.tr (81.212.207.113) 223.424 ms 06-ulus-xrs-t2-2---00-gayrettepe-xrs-t2-2.statik.turktelekom.com.tr (81.212.214.79) 227.716 ms 06-ulus-xrs-t2-2---34-acibadem-xrs-t2-2.statik.turktelekom.com.tr (81.212.208.91) 233.129 ms
322618 212.156.108.249.55-bafrasanayi-ess1-t4-1.55-bafra-t4-1.statik.turktelekom.com.tr (212.156.108.249) 225.415 ms 224.402 ms 228.321 ms
322719 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187) 239.083 ms 240.155 ms 242.962 ms
3228#######################################################################################################################################
3229traceroute to www.trade.gov.tr (95.0.51.12), 30 hops max, 60 byte packets
3230 1 10.231.200.1 (10.231.200.1) 138.002 ms 138.009 ms 138.017 ms
3231 2 * * *
3232 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 138.790 ms 138.812 ms 138.822 ms
3233 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 142.398 ms 142.790 ms 142.752 ms
3234 5 be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 148.962 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 148.986 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 148.994 ms
3235 6 be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 169.101 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 159.361 ms 166.606 ms
3236 7 be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 171.607 ms 174.825 ms 171.127 ms
3237 8 be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241) 174.473 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6) 174.403 ms 171.054 ms
3238 9 ntt.ams03.atlas.cogentco.com (130.117.15.130) 171.059 ms 171.333 ms 170.967 ms
323910 ae-10.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.44) 171.123 ms 171.134 ms 168.256 ms
324011 ae-13.r02.mlanit01.it.bb.gin.ntt.net (129.250.3.179) 193.055 ms 189.405 ms 193.091 ms
324112 ae-1.r01.mlanit01.it.bb.gin.ntt.net (129.250.5.82) 193.037 ms 193.052 ms 189.279 ms
324213 fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 189.189 ms 186.322 ms 189.122 ms
324319 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187) 237.129 ms 233.240 ms 239.845 ms
324420 95.0.51.254.static.ttnet.com.tr (95.0.51.254) 228.504 ms 227.001 ms 234.981 ms
324521 95.0.51.12.static.ttnet.com.tr (95.0.51.12) <syn,ack> 232.401 ms 243.211 ms 243.111 ms
3246#######################################################################################################################################
3247Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:23 EST
3248Nmap scan report for trade.gov.tr (95.0.51.12)
3249Host is up (0.17s latency).
3250rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
3251Not shown: 997 filtered ports
3252PORT STATE SERVICE
325380/tcp open http
3254443/tcp open https
32558080/tcp closed http-proxy
3256#######################################################################################################################################
3257Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:02 EST
3258Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3259Host is up (0.21s latency).
3260Not shown: 994 filtered ports, 4 closed ports
3261Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3262PORT STATE SERVICE
326380/tcp open http
3264443/tcp open https
3265
3266Nmap done: 1 IP address (1 host up) scanned in 14.18 seconds
3267#######################################################################################################################################
3268Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:02 EST
3269Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3270Host is up (0.14s latency).
3271Not shown: 2 filtered ports
3272PORT STATE SERVICE
327353/udp open|filtered domain
327467/udp open|filtered dhcps
327568/udp open|filtered dhcpc
327669/udp open|filtered tftp
327788/udp open|filtered kerberos-sec
3278123/udp open|filtered ntp
3279139/udp open|filtered netbios-ssn
3280161/udp open|filtered snmp
3281162/udp open|filtered snmptrap
3282389/udp open|filtered ldap
3283500/udp open|filtered isakmp
3284520/udp open|filtered route
32852049/udp open|filtered nfs
3286
3287Nmap done: 1 IP address (1 host up) scanned in 3.14 seconds
3288#######################################################################################################################################
3289HTTP/1.1 302 Found
3290Cache-Control: private
3291Content-Length: 142
3292Content-Type: text/html; charset=utf-8
3293Location: /500.html?aspxerrorpath=/
3294Server: Microsoft-IIS/10.0
3295X-AspNetMvc-Version: 5.2
3296X-AspNet-Version: 4.0.30319
3297X-Powered-By: ASP.NET
3298Access-Control-Allow-Origin: *
3299Date: Mon, 11 Nov 2019 02:02:43 GMT
3300
3301Allow: OPTIONS, TRACE, GET, HEAD, POST
3302#######################################################################################################################################
3303Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:02 EST
3304NSE: Loaded 163 scripts for scanning.
3305NSE: Script Pre-scanning.
3306Initiating NSE at 21:02
3307Completed NSE at 21:02, 0.00s elapsed
3308Initiating NSE at 21:02
3309Completed NSE at 21:02, 0.00s elapsed
3310Initiating Parallel DNS resolution of 1 host. at 21:02
3311Completed Parallel DNS resolution of 1 host. at 21:02, 0.02s elapsed
3312Initiating SYN Stealth Scan at 21:02
3313Scanning 95.0.51.12.static.ttnet.com.tr (95.0.51.12) [1 port]
3314Discovered open port 80/tcp on 95.0.51.12
3315Completed SYN Stealth Scan at 21:02, 0.27s elapsed (1 total ports)
3316Initiating Service scan at 21:02
3317Scanning 1 service on 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3318Completed Service scan at 21:02, 6.48s elapsed (1 service on 1 host)
3319Initiating OS detection (try #1) against 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3320Retrying OS detection (try #2) against 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3321Initiating Traceroute at 21:03
3322Completed Traceroute at 21:03, 3.19s elapsed
3323Initiating Parallel DNS resolution of 15 hosts. at 21:03
3324Completed Parallel DNS resolution of 15 hosts. at 21:03, 0.38s elapsed
3325NSE: Script scanning 95.0.51.12.
3326Initiating NSE at 21:03
3327NSE: [http-wordpress-enum 95.0.51.12:80] got no answers from pipelined queries
3328Completed NSE at 21:05, 161.15s elapsed
3329Initiating NSE at 21:05
3330Completed NSE at 21:05, 1.49s elapsed
3331Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
3332Host is up (0.23s latency).
3333
3334PORT STATE SERVICE VERSION
333580/tcp open http Microsoft IIS httpd 10.0
3336|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
3337| http-brute:
3338|_ Path "/" does not require authentication
3339|_http-chrono: Request times for /; avg: 677.52ms; min: 672.24ms; max: 688.43ms
3340|_http-csrf: Couldn't find any CSRF vulnerabilities.
3341|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3342|_http-dombased-xss: Couldn't find any DOM based XSS.
3343|_http-errors: ERROR: Script execution failed (use -d to debug)
3344|_http-feed: Couldn't find any feeds.
3345|_http-fetch: Please enter the complete path of the directory to save data in.
3346| http-internal-ip-disclosure:
3347|_ Internal IP Leaked: 172.30.1.208
3348|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3349|_http-mobileversion-checker: No mobile version detected.
3350|_http-security-headers:
3351|_http-server-header: Microsoft-IIS/10.0
3352| http-sitemap-generator:
3353| Directory structure:
3354| Longest directory structure:
3355| Depth: 0
3356| Dir: /
3357| Total files found (by extension):
3358|_
3359|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3360|_http-traceroute: ERROR: Script execution failed (use -d to debug)
3361| http-vhosts:
3362|_127 names had status ERROR
3363|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
3364|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3365|_http-xssed: No previously reported XSS vuln.
3366| vulscan: VulDB - https://vuldb.com:
3367| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
3368| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
3369| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
3370| [139953] Microsoft Internet Explorer 10/11 memory corruption
3371| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
3372| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
3373| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
3374| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
3375| [136279] Microsoft Internet Explorer 10/11 memory corruption
3376| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
3377| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3378| [134682] Microsoft Internet Explorer 10/11 memory corruption
3379| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3380| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3381| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
3382| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
3383| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3384| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3385| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3386| [131678] Microsoft Internet Explorer 10/11 memory corruption
3387| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
3388| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
3389| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
3390| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
3391| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
3392| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
3393| [131618] Microsoft Internet Explorer 10/11 memory corruption
3394| [130827] Microsoft Internet Explorer 10/11 information disclosure
3395| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
3396| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
3397| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
3398| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
3399| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
3400| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
3401| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
3402| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
3403| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
3404| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
3405| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3406| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
3407| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
3408| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
3409| [122846] Microsoft Internet Explorer 10/11 memory corruption
3410| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
3411| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3412| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
3413| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
3414| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
3415| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
3416| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
3417| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
3418| [115997] Microsoft Internet Explorer 10/11 memory corruption
3419| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
3420| [114567] Microsoft Internet Explorer 10/11 information disclosure
3421| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
3422| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
3423| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
3424| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
3425| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
3426| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
3427| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
3428| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
3429| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
3430| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
3431| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
3432| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
3433| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
3434| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
3435| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
3436| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3437| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3438| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
3439| [109365] Microsoft Internet Explorer 10/11 memory corruption
3440| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
3441| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
3442| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
3443| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
3444| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
3445| [102461] Microsoft Internet Explorer 10/11 memory corruption
3446| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
3447| [101007] Microsoft Internet Explorer 10/11 memory corruption
3448| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
3449| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
3450| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
3451| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
3452| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
3453| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
3454| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
3455| [97967] Microsoft Internet Explorer 10/11 memory corruption
3456| [97965] Microsoft Internet Explorer 10/11 memory corruption
3457| [94436] Microsoft Windows 10 Graphics memory corruption
3458| [94421] Microsoft Internet Explorer 10/11 information disclosure
3459| [94418] Microsoft Internet Explorer 10/11 privilege escalation
3460| [93427] Microsoft Internet Explorer 10/11 memory corruption
3461| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
3462| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
3463| [92561] Microsoft Internet Explorer 10/11 privilege escalation
3464| [92560] Microsoft Internet Explorer 10/11 privilege escalation
3465| [92557] Microsoft Internet Explorer 10/11 memory corruption
3466| [91560] Microsoft Windows 10 Object denial of service
3467| [91517] Microsoft Internet Explorer 10/11 memory corruption
3468| [91516] Microsoft Internet Explorer 10/11 privilege escalation
3469| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
3470| [90683] Microsoft Internet Explorer 10/11 information disclosure
3471| [89020] Microsoft Internet Explorer 10/11 information disclosure
3472| [89010] Microsoft Internet Explorer 10/11 memory corruption
3473| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
3474| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
3475| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
3476| [87139] Microsoft Internet Explorer 10/11 information disclosure
3477| [82246] Microsoft Internet Explorer 10/11 memory corruption
3478| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
3479| [81271] Microsoft Windows 10 PDF Library memory corruption
3480| [81249] Microsoft Internet Explorer 10/11 memory corruption
3481| [81243] Microsoft Internet Explorer 10 memory corruption
3482| [80845] Microsoft Internet Explorer 10 memory corruption
3483| [80843] Microsoft Internet Explorer 10 memory corruption
3484| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
3485| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
3486| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
3487| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
3488| [79515] Microsoft Windows 10 Kernel memory corruption
3489| [79473] Microsoft Internet Explorer 10 memory corruption
3490| [79466] Microsoft Internet Explorer 10/11 memory corruption
3491| [79463] Microsoft Internet Explorer 10 memory corruption
3492| [79158] Microsoft Internet Explorer 10/11 memory corruption
3493| [79157] Microsoft Internet Explorer 10/11 memory corruption
3494| [79139] Microsoft Internet Explorer 10/11 memory corruption
3495| [78383] Microsoft Internet Explorer 10/11 privilege escalation
3496| [78382] Microsoft Internet Explorer 10 memory corruption
3497| [77643] Microsoft Internet Explorer 10/11 memory corruption
3498| [77597] Microsoft Internet Explorer 10/11 File denial of service
3499| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
3500| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
3501| [77005] Microsoft Internet Explorer 10/11 memory corruption
3502| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
3503| [76488] Microsoft Internet Explorer 10/11 File information disclosure
3504| [76487] Microsoft Internet Explorer 10/11 memory corruption
3505| [76475] Microsoft Internet Explorer 10/11 memory corruption
3506| [76436] Microsoft Internet Explorer 10/11 memory corruption
3507| [75781] Microsoft Internet Explorer 10/11 memory corruption
3508| [75777] Microsoft Internet Explorer 10 memory corruption
3509| [75767] Microsoft Internet Explorer 10/11 privilege escalation
3510| [75766] Microsoft Internet Explorer 10/11 memory corruption
3511| [75765] Microsoft Internet Explorer 10/11 memory corruption
3512| [75762] Microsoft Internet Explorer 10/11 memory corruption
3513| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
3514| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
3515| [75324] Microsoft Internet Explorer 10/11 memory corruption
3516| [74857] Microsoft Internet Explorer 10/11 memory corruption
3517| [73944] Microsoft Internet Explorer 10/11 memory corruption
3518| [73942] Microsoft Internet Explorer 10 memory corruption
3519| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
3520| [69144] Microsoft Internet Explorer 10/11 memory corruption
3521| [69141] Microsoft Internet Explorer 10/11 privilege escalation
3522| [69138] Microsoft Internet Explorer 10/11 memory corruption
3523| [69126] Microsoft Internet Explorer 10/11 memory corruption
3524| [69122] Microsoft Internet Explorer 10/11 memory corruption
3525| [69117] Microsoft Internet Explorer 10/11 memory corruption
3526| [69115] Microsoft Internet Explorer 10 memory corruption
3527| [69114] Microsoft Internet Explorer 10 memory corruption
3528| [68398] Microsoft Internet Explorer 10 memory corruption
3529| [68180] Microsoft Internet Explorer 10/11 privilege escalation
3530| [68179] Microsoft Internet Explorer 10/11 privilege escalation
3531| [68168] Microsoft Internet Explorer 10/11 memory corruption
3532| [67810] Microsoft Internet Explorer 10/11 memory corruption
3533| [67504] Microsoft Internet Explorer 10/11 memory corruption
3534| [67495] Microsoft Internet Explorer 10 memory corruption
3535| [67493] Microsoft Internet Explorer 10/11 memory corruption
3536| [67491] Microsoft Internet Explorer 10/11 memory corruption
3537| [67486] Microsoft Internet Explorer 10 memory corruption
3538| [67482] Microsoft Internet Explorer 10/11 memory corruption
3539| [67352] Microsoft Internet Explorer 10/11 memory corruption
3540| [67347] Microsoft Internet Explorer 10/11 memory corruption
3541| [67344] Microsoft Internet Explorer 10/11 memory corruption
3542| [67341] Microsoft Internet Explorer 10/11 memory corruption
3543| [67334] Microsoft Internet Explorer 10 memory corruption
3544| [67330] Microsoft Internet Explorer 10/11 memory corruption
3545| [67329] Microsoft Internet Explorer 10/11 memory corruption
3546| [67004] Microsoft Internet Explorer 10/11 memory corruption
3547| [13537] Microsoft Internet Explorer 10/11 memory corruption
3548| [13535] Microsoft Internet Explorer 10/11 memory corruption
3549| [13530] Microsoft Internet Explorer 10/11 memory corruption
3550| [13529] Microsoft Internet Explorer 10/11 memory corruption
3551| [13523] Microsoft Internet Explorer 10/11 memory corruption
3552| [13516] Microsoft Internet Explorer 10/11 memory corruption
3553| [13513] Microsoft Internet Explorer 10/11 memory corruption
3554| [13510] Microsoft Internet Explorer 10/11 memory corruption
3555| [13507] Microsoft Internet Explorer 10 memory corruption
3556| [13506] Microsoft Internet Explorer 10 memory corruption
3557| [13498] Microsoft Internet Explorer 10/11 memory corruption
3558| [13495] Microsoft Internet Explorer 10/11 information disclosure
3559| [13491] Microsoft Internet Explorer 10/11 memory corruption
3560| [12546] Microsoft Internet Explorer 10/11 memory corruption
3561| [12544] Microsoft Internet Explorer 10/11 memory corruption
3562| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
3563| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
3564| [11433] Microsoft Internet Explorer 10 memory corruption
3565| [10625] Microsoft Internet Explorer 10 memory corruption
3566| [10624] Microsoft Internet Explorer 10 memory corruption
3567| [10621] Microsoft Internet Explorer 10 memory corruption
3568| [10620] Microsoft Internet Explorer 10 memory corruption
3569| [10219] Microsoft Internet Explorer 10 memory corruption
3570| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
3571| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
3572| [9411] Microsoft Internet Explorer 10 memory corruption
3573| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
3574| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
3575| [9090] Microsoft Internet Explorer 10 memory corruption
3576| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
3577| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
3578| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
3579| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
3580| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
3581| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
3582| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
3583|
3584| MITRE CVE - https://cve.mitre.org:
3585| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
3586| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
3587| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
3588| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
3589| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
3590| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
3591| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
3592| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
3593| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
3594| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
3595| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
3596| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
3597| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
3598| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
3599| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
3600| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
3601| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
3602| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
3603| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
3604| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
3605| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
3606| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
3607| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
3608| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
3609| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
3610| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
3611| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
3612| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
3613| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
3614| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
3615| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
3616| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
3617| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
3618| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
3619| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
3620| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
3621| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
3622| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
3623| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
3624| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
3625| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
3626| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
3627| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
3628| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
3629| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
3630| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
3631| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
3632| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
3633| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
3634| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
3635| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
3636| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
3637| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
3638| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
3639| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
3640| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
3641| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
3642| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
3643| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
3644| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
3645| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
3646| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
3647| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
3648| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
3649| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
3650| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
3651| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
3652| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
3653| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
3654| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
3655| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
3656| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
3657| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
3658| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
3659| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
3660| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
3661| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
3662| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
3663| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
3664| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
3665| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
3666| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
3667| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
3668| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
3669| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
3670| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
3671| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
3672| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
3673| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
3674| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
3675| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
3676| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
3677| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
3678| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
3679| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
3680| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
3681| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
3682| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
3683| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
3684| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
3685| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
3686| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
3687| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
3688| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
3689|
3690| SecurityFocus - https://www.securityfocus.com/bid/:
3691| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
3692|
3693| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3694| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
3695| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
3696|
3697| Exploit-DB - https://www.exploit-db.com:
3698| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
3699| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
3700|
3701| OpenVAS (Nessus) - http://www.openvas.org:
3702| [855384] Solaris Update for snmp/mibiisa 108870-36
3703| [855273] Solaris Update for snmp/mibiisa 108869-36
3704| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
3705|
3706| SecurityTracker - https://www.securitytracker.com:
3707| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
3708|
3709| OSVDB - http://www.osvdb.org:
3710| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
3711| [87262] Microsoft IIS FTP Command Injection Information Disclosure
3712| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
3713| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
3714| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
3715| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
3716| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
3717| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
3718| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
3719| [71856] Microsoft IIS Status Header Handling Remote Overflow
3720| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
3721| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
3722| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
3723| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
3724| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
3725| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
3726| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
3727| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
3728| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
3729| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
3730| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
3731| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
3732| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
3733| [59892] Microsoft IIS Malformed Host Header Remote DoS
3734| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
3735| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
3736| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
3737| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
3738| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
3739| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
3740| [55269] Microsoft IIS Traversal GET Request Remote DoS
3741| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
3742| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
3743| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
3744| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
3745| [52238] Microsoft IIS IDC Extension XSS
3746| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
3747| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
3748| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
3749| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
3750| [43451] Microsoft IIS HTTP Request Smuggling
3751| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
3752| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
3753| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
3754| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
3755| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
3756| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
3757| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
3758| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
3759| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
3760| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
3761| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
3762| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
3763| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
3764| [27152] Microsoft Windows IIS ASP Page Processing Overflow
3765| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
3766| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
3767| [21805] Microsoft IIS Crafted URL Remote DoS
3768| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
3769| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
3770| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
3771| [17124] Microsoft IIS Malformed WebDAV Request DoS
3772| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
3773| [17122] Microsoft IIS Permission Weakness .COM File Upload
3774| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
3775| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
3776| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
3777| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
3778| [13760] Microsoft IIS Malformed URL Request DoS
3779| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
3780| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
3781| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
3782| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
3783| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
3784| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
3785| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
3786| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
3787| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
3788| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
3789| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
3790| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
3791| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
3792| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
3793| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
3794| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
3795| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
3796| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
3797| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
3798| [11257] Microsoft IIS Malformed GET Request DoS
3799| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
3800| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
3801| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
3802| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
3803| [9200] Microsoft IIS Unspecified XSS Variant
3804| [9199] Microsoft IIS shtml.dll XSS
3805| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
3806| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
3807| [7737] Microsoft IIS ASP Redirection Function XSS
3808| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
3809| [5851] Microsoft IIS Single Dot Source Code Disclosure
3810| [5736] Microsoft IIS Relative Path System Privilege Escalation
3811| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
3812| [5633] Microsoft IIS Invalid WebDAV Request DoS
3813| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
3814| [5584] Microsoft IIS URL Redirection Malformed Length DoS
3815| [5566] Microsoft IIS Form_VBScript.asp XSS
3816| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
3817| [4864] Microsoft IIS TRACK Logging Failure
3818| [4863] Microsoft IIS Active Server Page Header DoS
3819| [4791] Microsoft IIS Response Object DoS
3820| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
3821| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
3822| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
3823| [3500] Microsoft IIS fpcount.exe Remote Overflow
3824| [3341] Microsoft IIS Redirect Response XSS
3825| [3339] Microsoft IIS HTTP Error Page XSS
3826| [3338] Microsoft IIS Help File XSS
3827| [3328] Microsoft IIS FTP Status Request DoS
3828| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
3829| [3325] Microsoft IIS HTR ISAPI Overflow
3830| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
3831| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
3832| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
3833| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
3834| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
3835| [3231] Microsoft IIS Log Bypass
3836| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
3837| [1931] Microsoft IIS MIME Content-Type Header DoS
3838| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
3839| [1826] Microsoft IIS Domain Guest Account Disclosure
3840| [1824] Microsoft IIS FTP DoS
3841| [1804] Microsoft IIS Long Request Parsing Remote DoS
3842| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
3843| [1750] Microsoft IIS File Fragment Disclosure
3844| [1543] Microsoft NT/IIS Invalid URL Request DoS
3845| [1504] Microsoft IIS File Permission Canonicalization Bypass
3846| [1465] Microsoft IIS .htr Missing Variable DoS
3847| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
3848| [1322] Microsoft IIS Malformed .htr Request DoS
3849| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
3850| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
3851| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
3852| [1170] Microsoft IIS Escape Character URL Access Bypass
3853| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
3854| [1082] Microsoft IIS Domain Resolution Access Bypass
3855| [1041] Microsoft IIS Malformed HTTP Request Header DoS
3856| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
3857| [930] Microsoft IIS Shared ASP Cache Information Disclosure
3858| [929] Microsoft IIS FTP Server NLST Command Overflow
3859| [928] Microsoft IIS Long Request Log Evasion
3860| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
3861| [814] Microsoft IIS global.asa Remote Information Disclosure
3862| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
3863| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
3864| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
3865| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
3866| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
3867| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
3868| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
3869| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
3870| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
3871| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
3872| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
3873| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
3874| [473] Microsoft IIS Multiple .cnf File Information Disclosure
3875| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
3876| [470] Microsoft IIS Form_JScript.asp XSS
3877| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
3878| [436] Microsoft IIS Unicode Remote Command Execution
3879| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
3880| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
3881| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
3882| [308] Microsoft IIS Malformed File Extension URL DoS
3883| [285] Microsoft IIS repost.asp File Upload
3884| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
3885| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
3886| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
3887| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
3888| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
3889| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
3890| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
3891| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
3892| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
3893| [98] Microsoft IIS perl.exe HTTP Path Disclosure
3894| [97] Microsoft IIS ISM.DLL HTR Request Overflow
3895| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
3896| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
3897| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
3898| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
3899| [2] Microsoft IIS ExAir search.asp Direct Request DoS
3900| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
3901| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
3902| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
3903| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
3904| [96192] Microsoft IE EUC-JP Character Encoding XSS
3905| [96191] Microsoft IE Process Integrity Level Assignment Bypass
3906| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
3907| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
3908| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
3909| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
3910| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
3911| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
3912| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
3913| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
3914| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
3915| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
3916| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
3917| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
3918| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
3919| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
3920| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
3921| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
3922| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
3923| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
3924| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
3925| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
3926| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
3927| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
3928| [94984] Microsoft IE Shift JIS Character Encoding XSS
3929| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
3930| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
3931| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
3932| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
3933| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
3934| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
3935| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
3936| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
3937| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
3938| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
3939| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
3940| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
3941| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
3942| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
3943| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
3944| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
3945| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
3946| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
3947| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
3948| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
3949| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
3950| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
3951| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
3952| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
3953| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
3954| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
3955| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
3956| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
3957| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
3958| [94507] Microsoft IE Infinite Loop DoS
3959| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
3960| [94127] Microsoft Office PNG File Handling Buffer Overflow
3961| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
3962| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
3963| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
3964| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
3965| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
3966| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
3967| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
3968| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
3969| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
3970| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
3971| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
3972| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
3973| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
3974| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
3975| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
3976| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
3977| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
3978| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
3979| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
3980| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
3981| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
3982| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
3983| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
3984| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
3985| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
3986| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
3987| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
3988| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
3989| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
3990| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
3991| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
3992| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
3993| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
3994| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
3995| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
3996| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
3997| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
3998| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
3999| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
4000| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
4001| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
4002| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
4003| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
4004| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
4005| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
4006| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
4007| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
4008| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
4009| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
4010| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
4011| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
4012| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
4013| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
4014| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
4015| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
4016| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
4017| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
4018| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
4019| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
4020| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
4021| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
4022| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
4023| [92257] Microsoft IE CSS Import Handling Remote DoS
4024| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
4025| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
4026| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
4027| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
4028| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
4029| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
4030| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
4031| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
4032| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
4033| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
4034| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
4035| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
4036| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
4037| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
4038| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
4039| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
4040| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
4041| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
4042| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
4043| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
4044| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
4045| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
4046| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
4047| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
4048| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
4049| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
4050| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
4051| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
4052| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
4053| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
4054| [91150] Microsoft SharePoint Unspecified XSS
4055| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
4056| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
4057| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
4058| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
4059| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
4060| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
4061| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
4062| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
4063| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
4064| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
4065| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
4066| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
4067| [90933] Microsoft IE Arbitrary HTM File Execution
4068| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
4069| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
4070| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
4071| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
4072| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
4073| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
4074| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
4075| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
4076| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
4077| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
4078| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
4079| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
4080| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
4081| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
4082| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
4083| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
4084| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
4085| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
4086| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
4087| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
4088| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
4089| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
4090| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
4091| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
4092| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
4093| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
4094| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
4095| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
4096| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
4097| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
4098| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
4099| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
4100| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
4101| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
4102| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
4103| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
4104| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
4105| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
4106| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
4107| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
4108| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
4109| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
4110| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
4111| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
4112| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
4113| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
4114| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
4115| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
4116| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
4117| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
4118| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
4119| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
4120| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
4121| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
4122| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
4123| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
4124| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
4125| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
4126| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
4127| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
4128| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
4129| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
4130| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
4131| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
4132| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
4133| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
4134| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
4135| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
4136| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
4137| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
4138| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
4139| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
4140| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
4141| [88837] Microsoft Office Excel Memory Corruption DoS
4142| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
4143| [88811] Microsoft Visio VSD File Parsing Memory Corruption
4144| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
4145| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
4146| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
4147| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
4148| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
4149| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
4150| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
4151| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
4152| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
4153| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
4154| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
4155| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
4156| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
4157| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
4158| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
4159| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
4160| [87819] Microsoft Office OneNote File Handling Memory Corruption
4161| [87273] Microsoft Office Excel XLS File Handling Overflow
4162| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
4163| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
4164| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
4165| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
4166| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
4167| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
4168| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
4169| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
4170| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
4171| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
4172| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
4173| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
4174| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
4175| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
4176| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
4177| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
4178| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
4179| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
4180| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
4181| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
4182| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
4183| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
4184| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
4185| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
4186| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
4187| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
4188| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
4189| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
4190| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
4191| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
4192| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
4193| [86732] Microsoft Office DOC File Handling Stack Overflow
4194| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
4195| [86622] Microsoft SQL Server Local Authentication Bypass
4196| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
4197| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
4198| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
4199| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
4200| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
4201| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
4202| [86057] Microsoft SQL Server Report Manager Unspecified XSS
4203| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
4204| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
4205| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
4206| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
4207| [85833] Microsoft Outlook Concealed Attachment Weakness
4208| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
4209| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
4210| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
4211| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
4212| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
4213| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
4214| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
4215| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
4216| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
4217| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
4218| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
4219| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
4220| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
4221| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
4222| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
4223| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
4224| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
4225| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
4226| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
4227| [84606] Microsoft Visio DXF File Handling Overflow
4228| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
4229| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
4230| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
4231| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
4232| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
4233| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
4234| [84599] Microsoft Windows Print Spooler Service Remote Format String
4235| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
4236| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
4237| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
4238| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
4239| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
4240| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
4241| [84553] Microsoft Help &
4242| [83860] Microsoft IE XML Data Handling Arbitrary File Access
4243| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
4244| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
4245| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
4246| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
4247| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
4248| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
4249| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
4250| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
4251| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
4252| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
4253| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
4254| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
4255| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
4256| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
4257| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
4258| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
4259| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
4260| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
4261| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
4262| [83647] Microsoft SharePoint Username Unspecified XSS
4263| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
4264| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
4265| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
4266| [83439] Microsoft IE Long Unicode String Handling DoS
4267| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
4268| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
4269| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
4270| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
4271| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
4272| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
4273| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
4274| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
4275| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
4276| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
4277| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
4278| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
4279| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
4280| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
4281| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
4282| [82862] Microsoft IE EUC-JP Character Encoding XSS
4283| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
4284| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
4285| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
4286| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
4287| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
4288| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
4289| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
4290| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
4291| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
4292| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
4293| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
4294| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
4295| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
4296| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
4297| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
4298| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
4299| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
4300| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
4301| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
4302| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
4303| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
4304| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
4305| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
4306| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
4307| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
4308| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
4309| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
4310| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
4311| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
4312| [81732] Microsoft Office RTF Data Handling Memory Corruption
4313| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
4314| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
4315| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
4316| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
4317| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
4318| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
4319| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
4320| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
4321| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
4322| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
4323| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
4324| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
4325| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
4326| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
4327| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
4328| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
4329| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
4330| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
4331| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
4332| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
4333| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
4334| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
4335| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
4336| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
4337| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
4338| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
4339| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
4340| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
4341| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
4342| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
4343| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
4344| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
4345| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
4346| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
4347| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
4348| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
4349| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
4350| [80173] Microsoft IE Unspecified Overflow
4351| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
4352| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
4353| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
4354| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
4355| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
4356| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
4357| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
4358| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
4359| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
4360| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
4361| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
4362| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
4363| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
4364| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
4365| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
4366| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
4367| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
4368| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
4369| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
4370| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
4371| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
4372| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
4373| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
4374| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
4375| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
4376| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
4377| [79192] Microsoft IE Javascript Dialog Origin Spoofing
4378| [79186] Microsoft IE onunload Location Field Overwrite
4379| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
4380| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
4381| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
4382| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
4383| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
4384| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
4385| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
4386| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
4387| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
4388| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
4389| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
4390| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
4391| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
4392| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
4393| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
4394| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
4395| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
4396| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
4397| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
4398| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
4399| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
4400| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
4401| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
4402| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
4403| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
4404| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
4405| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
4406| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
4407| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
4408| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
4409| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
4410| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
4411| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
4412| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
4413| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
4414| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
4415| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
4416| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
4417| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
4418| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
4419| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
4420| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
4421| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
4422| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
4423| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
4424| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
4425| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
4426| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
4427| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
4428| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
4429| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
4430| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
4431| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
4432| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
4433| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
4434| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
4435| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
4436| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
4437| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
4438| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
4439| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
4440| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
4441| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
4442| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
4443| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
4444| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
4445| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
4446| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
4447| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
4448| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
4449| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
4450| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
4451| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
4452| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
4453| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
4454| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
4455| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
4456| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
4457| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
4458| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
4459| [75393] Microsoft SharePoint Unspecified URI XSS
4460| [75391] Microsoft SharePoint Contact Details XSS
4461| [75390] Microsoft SharePoint EditForm.aspx XSS
4462| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
4463| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
4464| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
4465| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
4466| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
4467| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
4468| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
4469| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
4470| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
4471| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
4472| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
4473| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
4474| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
4475| [75250] Microsoft IE Unspecified Remote Code Execution
4476| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
4477| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
4478| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
4479| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
4480| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
4481| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
4482| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
4483| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
4484| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
4485| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
4486| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
4487| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
4488| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
4489| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
4490| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
4491| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
4492| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
4493| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
4494| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
4495| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
4496| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
4497| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
4498| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
4499| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
4500| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
4501| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
4502| [74396] Microsoft Report Viewer Control Unspecified XSS
4503| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
4504| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
4505| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
4506| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
4507| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
4508| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
4509| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
4510| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
4511| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
4512| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
4513| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
4514| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
4515| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
4516| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
4517| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
4518| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
4519| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
4520| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
4521| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
4522| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
4523| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
4524| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
4525| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
4526| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
4527| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
4528| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
4529| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
4530| [73602] Microsoft Windows nsiproxy.sys Local DoS
4531| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
4532| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
4533| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
4534| [72960] Microsoft SMB Client Response Handling Remote Code Execution
4535| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
4536| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
4537| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
4538| [72953] Microsoft IE MIME Sniffing Information Disclosure
4539| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
4540| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
4541| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
4542| [72949] Microsoft IE Drag and Drop Information Disclosure
4543| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
4544| [72947] Microsoft IE Time Element Memory Corruption
4545| [72946] Microsoft IE Drag and Drop Memory Corruption
4546| [72944] Microsoft IE SafeHTML Function XSS
4547| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
4548| [72942] Microsoft IE Link Properties Handling Memory Corruption
4549| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
4550| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
4551| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
4552| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
4553| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
4554| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
4555| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
4556| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
4557| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
4558| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
4559| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
4560| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
4561| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
4562| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
4563| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
4564| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
4565| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
4566| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
4567| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
4568| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
4569| [72696] Microsoft Reader AOLL Chunk Array Overflow
4570| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
4571| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
4572| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
4573| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
4574| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
4575| [72680] Microsoft IE UTF-7 Local Redirection XSS
4576| [72679] Microsoft IE Tags javascript:[jscodz] XSS
4577| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
4578| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
4579| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
4580| [72672] Microsoft Windows AppFix systest.sdb Local DoS
4581| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
4582| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
4583| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
4584| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
4585| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
4586| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
4587| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
4588| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
4589| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
4590| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
4591| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
4592| [71777] Microsoft IE Frame Tag Handling Information Disclosure
4593| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
4594| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
4595| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
4596| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
4597| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
4598| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
4599| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
4600| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
4601| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
4602| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
4603| [71765] Microsoft Office Excel File Validation Record Handling Overflow
4604| [71761] Microsoft Office Excel File Handling Memory Corruption
4605| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
4606| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
4607| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
4608| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
4609| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
4610| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
4611| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
4612| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
4613| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
4614| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
4615| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
4616| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
4617| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
4618| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
4619| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
4620| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
4621| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
4622| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
4623| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
4624| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
4625| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
4626| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
4627| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
4628| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
4629| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
4630| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
4631| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
4632| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
4633| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
4634| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
4635| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
4636| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
4637| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
4638| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
4639| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
4640| [71724] Microsoft IE Layouts Handling Memory Corruption
4641| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
4642| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
4643| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
4644| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
4645| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
4646| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
4647| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
4648| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
4649| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
4650| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
4651| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
4652| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
4653| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
4654| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
4655| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
4656| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
4657| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
4658| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
4659| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
4660| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
4661| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
4662| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
4663| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
4664| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
4665| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
4666| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
4667| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
4668| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
4669| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
4670| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
4671| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
4672| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
4673| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
4674| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
4675| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
4676| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
4677| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
4678| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
4679| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
4680| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
4681| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
4682| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
4683| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
4684| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
4685| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
4686| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
4687| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
4688| [69828] Microsoft IE Recursive Select Element Remote Code Execution
4689| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
4690| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
4691| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
4692| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
4693| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
4694| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
4695| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
4696| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
4697| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
4698| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
4699| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
4700| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
4701| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
4702| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
4703| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
4704| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
4705| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
4706| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
4707| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
4708| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
4709| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
4710| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
4711| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
4712| [69804] Microsoft Office PICT Image Converter Overflow
4713| [69803] Microsoft Office CGM Image Converter Overflow
4714| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
4715| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
4716| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
4717| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
4718| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
4719| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
4720| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
4721| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
4722| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
4723| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
4724| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
4725| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
4726| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
4727| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
4728| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
4729| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
4730| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
4731| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
4732| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
4733| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
4734| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
4735| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
4736| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
4737| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
4738| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
4739| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
4740| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
4741| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
4742| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
4743| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
4744| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
4745| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
4746| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
4747| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
4748| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
4749| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
4750| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
4751| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
4752| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
4753| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
4754| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
4755| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
4756| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
4757| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
4758| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
4759| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
4760| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
4761| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
4762| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
4763| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
4764| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
4765| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
4766| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
4767| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
4768| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
4769| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
4770| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
4771| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
4772| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
4773| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
4774| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
4775| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
4776| [68548] Microsoft IE / SharePoint Unspecified XSS
4777| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
4778| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
4779| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
4780| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
4781| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
4782| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
4783| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
4784| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
4785| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
4786| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
4787| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
4788| [68438] Microsoft XSS Filter Library Bypass
4789| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
4790| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
4791| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
4792| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
4793| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
4794| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
4795| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
4796| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
4797| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
4798| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
4799| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
4800| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
4801| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
4802| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
4803| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
4804| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
4805| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
4806| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
4807| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
4808| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
4809| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
4810| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
4811| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
4812| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
4813| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
4814| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
4815| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
4816| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
4817| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
4818| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
4819| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
4820| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
4821| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
4822| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
4823| [67463] Microsoft IE location.replace Address Bar Spoofing
4824| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
4825| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
4826| [67258] Microsoft ClickOnce MITM Weakness
4827| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
4828| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
4829| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
4830| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
4831| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
4832| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
4833| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
4834| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
4835| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
4836| [67000] Microsoft IE boundElements Property Handling Memory Corruption
4837| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
4838| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
4839| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
4840| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
4841| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
4842| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
4843| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
4844| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
4845| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
4846| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
4847| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
4848| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
4849| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
4850| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
4851| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
4852| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
4853| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
4854| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
4855| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
4856| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
4857| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
4858| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
4859| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
4860| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
4861| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
4862| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
4863| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
4864| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
4865| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
4866| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
4867| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
4868| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
4869| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
4870| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
4871| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
4872| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
4873| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
4874| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
4875| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
4876| [65502] Microsoft IE Unspecified DoS
4877| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
4878| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
4879| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
4880| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
4881| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
4882| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
4883| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
4884| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
4885| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
4886| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
4887| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
4888| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
4889| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
4890| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
4891| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
4892| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
4893| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
4894| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
4895| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
4896| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
4897| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
4898| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
4899| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
4900| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
4901| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
4902| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
4903| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
4904| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
4905| [65213] Microsoft IE HTML Element Handling Memory Corruption
4906| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
4907| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
4908| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
4909| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
4910| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
4911| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
4912| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
4913| [64952] Microsoft IE img Tag Hijacking Weakness
4914| [64944] Microsoft Dynamics GP Default System Password
4915| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
4916| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
4917| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
4918| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
4919| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
4920| [64828] Microsoft IE history go ActiveX Overflow DoS
4921| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
4922| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
4923| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
4924| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
4925| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
4926| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
4927| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
4928| [64533] Microsoft IE document.createElement NULL Dereference DoS
4929| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
4930| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
4931| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
4932| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
4933| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
4934| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
4935| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
4936| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
4937| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
4938| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
4939| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
4940| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
4941| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
4942| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
4943| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
4944| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
4945| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
4946| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
4947| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
4948| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
4949| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
4950| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
4951| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
4952| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
4953| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
4954| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
4955| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
4956| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
4957| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
4958| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
4959| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
4960| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
4961| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
4962| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
4963| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
4964| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
4965| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
4966| [63334] Microsoft IE Post Encoding Information Disclosure
4967| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
4968| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
4969| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
4970| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
4971| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
4972| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
4973| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
4974| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
4975| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
4976| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
4977| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
4978| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
4979| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
4980| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
4981| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
4982| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
4983| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
4984| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
4985| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
4986| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
4987| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
4988| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
4989| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
4990| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
4991| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
4992| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
4993| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
4994| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
4995| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
4996| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
4997| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
4998| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
4999| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
5000| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
5001| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
5002| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
5003| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
5004| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
5005| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
5006| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
5007| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
5008| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
5009| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
5010| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
5011| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
5012| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
5013| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
5014| [62239] Microsoft Office Powerpoint File Path Handling Overflow
5015| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
5016| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
5017| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
5018| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
5019| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
5020| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
5021| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
5022| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
5023| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
5024| [61911] Microsoft IE Table Layout Reuse Memory Corruption
5025| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
5026| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
5027| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
5028| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
5029| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
5030| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
5031| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
5032| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
5033| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
5034| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
5035| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
5036| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
5037| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
5038| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
5039| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
5040| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
5041| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
5042| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
5043| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
5044| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
5045| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
5046| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
5047| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
5048| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
5049| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
5050| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
5051| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
5052| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
5053| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
5054| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
5055| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
5056| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
5057| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
5058| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
5059| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
5060| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
5061| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
5062| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
5063| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
5064| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
5065| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
5066| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
5067| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
5068| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
5069| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
5070| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
5071| [59957] Microsoft Windows SMB Response Handling Remote DoS
5072| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
5073| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
5074| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
5075| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
5076| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
5077| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
5078| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
5079| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
5080| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
5081| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
5082| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
5083| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
5084| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
5085| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
5086| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
5087| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
5088| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
5089| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
5090| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
5091| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
5092| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
5093| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
5094| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
5095| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
5096| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
5097| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
5098| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
5099| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
5100| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
5101| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
5102| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
5103| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
5104| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
5105| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
5106| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
5107| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
5108| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
5109| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
5110| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
5111| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
5112| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
5113| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
5114| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
5115| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
5116| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
5117| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
5118| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
5119| [59263] Microsoft IE IMG Tag width Handling DoS
5120| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
5121| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
5122| [59258] Microsoft Exchange ACL Modification Update Weakness
5123| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
5124| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
5125| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
5126| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
5127| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
5128| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
5129| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
5130| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
5131| [58870] Microsoft Office BMP Image Color Processing Overflow
5132| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
5133| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
5134| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
5135| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
5136| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
5137| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
5138| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
5139| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
5140| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
5141| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
5142| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
5143| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
5144| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
5145| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
5146| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
5147| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
5148| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
5149| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
5150| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
5151| [58843] Microsoft Windows Media Player ASF Handling Overflow
5152| [58817] Microsoft IE Nested marquee Tag Handling DoS
5153| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
5154| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
5155| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
5156| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
5157| [58399] Microsoft IE window.print Function Loop Remote DoS
5158| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
5159| [58350] Microsoft Patterns &
5160| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
5161| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
5162| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
5163| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
5164| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
5165| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
5166| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
5167| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
5168| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
5169| [57742] Microsoft SQL Cleartext User Passwords Disclosure
5170| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
5171| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
5172| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
5173| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
5174| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
5175| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
5176| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
5177| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
5178| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
5179| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
5180| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
5181| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
5182| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
5183| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
5184| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
5185| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
5186| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
5187| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
5188| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
5189| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
5190| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
5191| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
5192| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
5193| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
5194| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
5195| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
5196| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
5197| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
5198| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
5199| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
5200| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
5201| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
5202| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
5203| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
5204| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
5205| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
5206| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
5207| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
5208| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
5209| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
5210| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
5211| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
5212| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
5213| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
5214| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
5215| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
5216| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
5217| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
5218| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
5219| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
5220| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
5221| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
5222| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
5223| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
5224| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
5225| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
5226| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
5227| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
5228| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
5229| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
5230| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
5231| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
5232| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
5233| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
5234| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
5235| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
5236| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
5237| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
5238| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
5239| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
5240| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
5241| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
5242| [54955] Microsoft Office Excel Malformed Records Handling Overflow
5243| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
5244| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
5245| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
5246| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
5247| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
5248| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
5249| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
5250| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
5251| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
5252| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
5253| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
5254| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
5255| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
5256| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
5257| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
5258| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
5259| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
5260| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
5261| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
5262| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
5263| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
5264| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
5265| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
5266| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
5267| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
5268| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
5269| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
5270| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
5271| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
5272| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
5273| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
5274| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
5275| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
5276| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
5277| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
5278| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
5279| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
5280| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
5281| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
5282| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
5283| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
5284| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
5285| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
5286| [54183] Microsoft IE Unprintable Character Document Handling DoS
5287| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
5288| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
5289| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
5290| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
5291| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
5292| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
5293| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
5294| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
5295| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
5296| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
5297| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
5298| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
5299| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
5300| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
5301| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
5302| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
5303| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
5304| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
5305| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
5306| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
5307| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
5308| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
5309| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
5310| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
5311| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
5312| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
5313| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
5314| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
5315| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
5316| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
5317| [52694] Microsoft Windows Media Player Malformed GET Request DoS
5318| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
5319| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
5320| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
5321| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
5322| [52689] Microsoft Word Document Handling HTML Object Tag DoS
5323| [52688] Microsoft Word Document Handling HTML Object Tag XSS
5324| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
5325| [52685] Microsoft Windows FTP Client Multiple Command Overflows
5326| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
5327| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
5328| [52682] Microsoft Windows Explorer ZIP Handler DoS
5329| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
5330| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
5331| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
5332| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
5333| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
5334| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
5335| [52666] Microsoft IE Malformed file:// URI Handling DoS
5336| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
5337| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
5338| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
5339| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
5340| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
5341| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
5342| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
5343| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
5344| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
5345| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
5346| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
5347| [52517] Microsoft Windows DNS Server Query Validation Spoofing
5348| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
5349| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
5350| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
5351| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
5352| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
5353| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
5354| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
5355| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
5356| [51433] Microsoft Windows Crafted CHM File Handling Overflow
5357| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
5358| [51277] Microsoft Excel HTML Tag Interpretation XSS
5359| [51259] Microsoft IE onload=screen["
5360| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
5361| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
5362| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
5363| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
5364| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
5365| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
5366| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
5367| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
5368| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
5369| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
5370| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
5371| [50598] Microsoft Office Word Table Property Handling Overflow
5372| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
5373| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
5374| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
5375| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
5376| [50592] Microsoft Office Word Malformed Value Memory Corruption
5377| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
5378| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
5379| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
5380| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
5381| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
5382| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
5383| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
5384| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
5385| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
5386| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
5387| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
5388| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
5389| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
5390| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
5391| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
5392| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
5393| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
5394| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
5395| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
5396| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
5397| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
5398| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
5399| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
5400| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
5401| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
5402| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
5403| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
5404| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
5405| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
5406| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
5407| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
5408| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
5409| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
5410| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
5411| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
5412| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
5413| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
5414| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
5415| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
5416| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
5417| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
5418| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
5419| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
5420| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
5421| [49385] Microsoft ASP.NET Request Validation <
5422| [49384] Microsoft ASP.NET Request Validation <
5423| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
5424| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
5425| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
5426| [49118] Microsoft IE HTML Object Handling Memory Corruption
5427| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
5428| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
5429| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
5430| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
5431| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
5432| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
5433| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
5434| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
5435| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
5436| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
5437| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
5438| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
5439| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
5440| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
5441| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
5442| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
5443| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
5444| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
5445| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
5446| [48837] Microsoft Windows Vista Page Fault Handling DoS
5447| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
5448| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
5449| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
5450| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
5451| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
5452| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
5453| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
5454| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
5455| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
5456| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
5457| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
5458| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
5459| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
5460| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
5461| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
5462| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
5463| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
5464| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
5465| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
5466| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
5467| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
5468| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
5469| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
5470| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
5471| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
5472| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
5473| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
5474| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
5475| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
5476| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
5477| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
5478| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
5479| [47410] Microsoft Office Excel connections.xml Password String Persistence
5480| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
5481| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
5482| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
5483| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
5484| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
5485| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
5486| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
5487| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
5488| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
5489| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
5490| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
5491| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
5492| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
5493| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
5494| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
5495| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
5496| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
5497| [46935] Microsoft IE Pop Up Blocker Multiple Issues
5498| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
5499| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
5500| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
5501| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
5502| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
5503| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
5504| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
5505| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
5506| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
5507| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
5508| [46772] Microsoft SQL Server Convert Function Overflow
5509| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
5510| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
5511| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
5512| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
5513| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
5514| [46630] Microsoft IE location Window Object Handling XSS
5515| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
5516| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
5517| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
5518| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
5519| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
5520| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
5521| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
5522| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
5523| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
5524| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
5525| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
5526| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
5527| [45826] Microsoft IE Local Zone Saved File URI XSS
5528| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
5529| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
5530| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
5531| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
5532| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
5533| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
5534| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
5535| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
5536| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
5537| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
5538| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
5539| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
5540| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
5541| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
5542| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
5543| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
5544| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
5545| [45262] Microsoft ISA Server Host Header Log File Content Injection
5546| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
5547| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
5548| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
5549| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
5550| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
5551| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
5552| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
5553| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
5554| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
5555| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
5556| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
5557| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
5558| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
5559| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
5560| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
5561| [44979] Microsoft SQL Server Blank sa Password Set Weakness
5562| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
5563| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
5564| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
5565| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
5566| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
5567| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
5568| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
5569| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
5570| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
5571| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
5572| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
5573| [44303] Microsoft IE body Tag Infinite Loop DoS
5574| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
5575| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
5576| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
5577| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
5578| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
5579| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
5580| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
5581| [44205] Microsoft IE Data Stream Handling Memory Corruption
5582| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
5583| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
5584| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
5585| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
5586| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
5587| [44150] Microsoft Access Crafted MDB File Handling Overflow
5588| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
5589| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
5590| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
5591| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
5592| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
5593| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
5594| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
5595| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
5596| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
5597| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
5598| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
5599| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
5600| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
5601| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
5602| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
5603| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
5604| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
5605| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
5606| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
5607| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
5608| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
5609| [42724] Microsoft Excel Style Record Handling Memory Corruption
5610| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
5611| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
5612| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
5613| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
5614| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
5615| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
5616| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
5617| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
5618| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
5619| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
5620| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
5621| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
5622| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
5623| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
5624| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
5625| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
5626| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
5627| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
5628| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
5629| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
5630| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
5631| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
5632| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
5633| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
5634| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
5635| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
5636| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
5637| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
5638| [41155] Microsoft Windows Hardware-enforced DEP Bypass
5639| [41154] Microsoft Windows XP EFS Cleartext Password Storage
5640| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
5641| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
5642| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
5643| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
5644| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
5645| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
5646| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
5647| [41060] Microsoft .NET Unspecified XSS Filter Bypass
5648| [41059] Microsoft Windows ARP Saturation Remote DoS
5649| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
5650| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
5651| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
5652| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
5653| [41041] Microsoft IE Mouse Click self.resizeTo DoS
5654| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
5655| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
5656| [41035] Microsoft IE onload Localhost DoS
5657| [41026] Microsoft IE GET Request Overflow
5658| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
5659| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
5660| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
5661| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
5662| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
5663| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
5664| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
5665| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
5666| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
5667| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
5668| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
5669| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
5670| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
5671| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
5672| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
5673| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
5674| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
5675| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
5676| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
5677| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
5678| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
5679| [39121] Microsoft IE DHTML Object Memory Corruption
5680| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
5681| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
5682| [39118] Microsoft IE Object setExpression Function Memory Corruption
5683| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
5684| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
5685| [38955] Microsoft IE history.length Variable History Disclosure
5686| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
5687| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
5688| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
5689| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
5690| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
5691| [38495] Microsoft IE Outlook Express Address Book Activex DoS
5692| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
5693| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
5694| [38488] Microsoft ISA Server File Extension Filter Bypass
5695| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
5696| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
5697| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
5698| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
5699| [38212] Microsoft IE document.open() Function Address Bar Spoofing
5700| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
5701| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
5702| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
5703| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
5704| [37637] Microsoft Windows Crafted HLP File Overflow
5705| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
5706| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
5707| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
5708| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
5709| [37632] Microsoft Word Unspecified Memory Corruption
5710| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
5711| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
5712| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
5713| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
5714| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
5715| [37626] Microsoft IE Unspecified Address Bar Spoofing
5716| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
5717| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
5718| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
5719| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
5720| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
5721| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
5722| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
5723| [36936] Microsoft Visual Basic VBP File Handling Overflow
5724| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
5725| [36934] Microsoft Agent URL Handling Remote Code Execution
5726| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
5727| [36400] Microsoft IE HTML FTP Credential Disclosure
5728| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
5729| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
5730| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
5731| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
5732| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
5733| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
5734| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
5735| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
5736| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
5737| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
5738| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
5739| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
5740| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
5741| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
5742| [36385] Microsoft Windows Media Player Skin File Handling Overflow
5743| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
5744| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
5745| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
5746| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
5747| [36147] Microsoft IE Zone Domain Specification DoS
5748| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
5749| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
5750| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
5751| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
5752| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
5753| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
5754| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
5755| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
5756| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
5757| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
5758| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
5759| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
5760| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
5761| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
5762| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
5763| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
5764| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
5765| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
5766| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
5767| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
5768| [35637] Microsoft Windows Unspecified Remote Code Execution
5769| [35568] Microsoft IE Script Variable Length DoS
5770| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
5771| [35352] Microsoft IE navcancl.htm res: URI Phishing
5772| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
5773| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
5774| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
5775| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
5776| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
5777| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
5778| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
5779| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
5780| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
5781| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
5782| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
5783| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
5784| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
5785| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
5786| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
5787| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
5788| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
5789| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
5790| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
5791| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
5792| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
5793| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
5794| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
5795| [34401] Microsoft IE Property Method Handling Memory Corruption
5796| [34400] Microsoft IE Uninitialized Object Memory Corruption
5797| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
5798| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
5799| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
5800| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
5801| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
5802| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
5803| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
5804| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
5805| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
5806| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
5807| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
5808| [34387] Microsoft Word Data Array Handling Remote Code Execution
5809| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
5810| [34385] Microsoft Word Macro Content Arbitrary Code Execution
5811| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
5812| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
5813| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
5814| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
5815| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
5816| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
5817| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
5818| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
5819| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
5820| [34077] Microsoft IE navcancl.htm res: URI XSS
5821| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
5822| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
5823| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
5824| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
5825| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
5826| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
5827| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
5828| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
5829| [33667] Microsoft Windows Vista Persistent Established Teredo Address
5830| [33666] Microsoft Windows Vista Teredo nonce Spoofing
5831| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
5832| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
5833| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
5834| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
5835| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
5836| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
5837| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
5838| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
5839| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
5840| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
5841| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
5842| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
5843| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
5844| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
5845| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
5846| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
5847| [33271] Microsoft Word Crafted Frame CSRF
5848| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
5849| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
5850| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
5851| [32630] Microsoft IE Key Press Event Focus Redirection
5852| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
5853| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
5854| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
5855| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
5856| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
5857| [32624] Microsoft IE mhtml Overflow DoS
5858| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
5859| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
5860| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
5861| [32087] Microsoft IE onunload Event Address Bar Spoofing
5862| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
5863| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
5864| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
5865| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
5866| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
5867| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
5868| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
5869| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
5870| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
5871| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
5872| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
5873| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
5874| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
5875| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
5876| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
5877| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
5878| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
5879| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
5880| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
5881| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
5882| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
5883| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
5884| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
5885| [31645] Microsoft Windows DNS Recursive Query DoS
5886| [31333] Microsoft IE Image File Embedded Content XSS
5887| [31332] Microsoft IE Scrollbar CSS Property DoS
5888| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
5889| [31330] Microsoft IE File:// URI src Tag IFrame DoS
5890| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
5891| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
5892| [31326] Microsoft IE HTML Table Tag style Attribute DoS
5893| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
5894| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
5895| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
5896| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
5897| [31321] Microsoft IE Javascript self.location Refresh DoS
5898| [31258] Microsoft Excel Palette Record Handling Overflow
5899| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
5900| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
5901| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
5902| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
5903| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
5904| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
5905| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
5906| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
5907| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
5908| [30997] Microsoft Windows .manifest File Handling Local DoS
5909| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
5910| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
5911| [30826] Microsoft Visual Basic Click Event Procedure Overflow
5912| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
5913| [30824] Microsoft Word Malformed String Memory Corruption
5914| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
5915| [30822] Microsoft IE A Tag Long Title Attribute DoS
5916| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
5917| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
5918| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
5919| [30818] Microsoft Windows Media Player ASF Parsing Overflow
5920| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
5921| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
5922| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
5923| [30814] Microsoft IE DHTML Script Function Memory Corruption
5924| [30813] Microsoft IE Script Error Handling Memory Corruption
5925| [30811] Microsoft Windows SNMP Service Remote Overflow
5926| [30405] Microsoft Windows Active Directory Unspecified DoS
5927| [30402] Microsoft w3wp Crafted COM Component Request DoS
5928| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
5929| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
5930| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
5931| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
5932| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
5933| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
5934| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
5935| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
5936| [30087] Microsoft IE Empty APPLET Tag DoS
5937| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
5938| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
5939| [29720] Microsoft PowerPoint Unspecified Code Execution
5940| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
5941| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
5942| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
5943| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
5944| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
5945| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
5946| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
5947| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
5948| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
5949| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
5950| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
5951| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
5952| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
5953| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
5954| [29440] Microsoft Word memmove Integer Overflow
5955| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
5956| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
5957| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
5958| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
5959| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
5960| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
5961| [29426] Microsoft XML Core Services XSLT Processing Overflow
5962| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
5963| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
5964| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
5965| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
5966| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
5967| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
5968| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
5969| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
5970| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
5971| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
5972| [29129] Microsoft IE wininet.dll Content-Type DoS
5973| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
5974| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
5975| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
5976| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
5977| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
5978| [28730] Microsoft Publisher PUB File Font Parsing Overflow
5979| [28729] Microsoft Windows Indexing Service Unspecified XSS
5980| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
5981| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
5982| [28723] Microsoft Works Malformed Works Spreadsheet DoS
5983| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
5984| [28614] Microsoft IE input/div Tag width Conflict DoS
5985| [28539] Microsoft Word 2000 Unspecified Code Execution
5986| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
5987| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
5988| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
5989| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
5990| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
5991| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
5992| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
5993| [28381] Microsoft IE ActiveX SaveFile Handling DoS
5994| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
5995| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
5996| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
5997| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
5998| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
5999| [27854] Microsoft IE Chained CSS Imports Memory Corruption
6000| [27853] Microsoft IE HTML Rendering Memory Corruption
6001| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
6002| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
6003| [27850] Microsoft IE Cross Site Window Location Information Disclosure
6004| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
6005| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
6006| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
6007| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
6008| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
6009| [27844] Microsoft Windows DNS Client Service Record Response Overflow
6010| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
6011| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
6012| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
6013| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
6014| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
6015| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
6016| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
6017| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
6018| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
6019| [27373] Microsoft IE Native Function Iteration NULL Dereference
6020| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
6021| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
6022| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
6023| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
6024| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
6025| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
6026| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
6027| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
6028| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
6029| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
6030| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
6031| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
6032| [27150] Microsoft Office MSO.DLL String Processing Overflow
6033| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
6034| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
6035| [27147] Microsoft Office PNG Processing Unspecified Code Execution
6036| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
6037| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
6038| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
6039| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
6040| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
6041| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
6042| [27059] Microsoft IE FolderItem Object NULL Dereference
6043| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
6044| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
6045| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
6046| [27053] Microsoft Excel Asian Language Style Option Overflow
6047| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
6048| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
6049| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
6050| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
6051| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
6052| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
6053| [26837] Microsoft IE Frameset inside Table NULL Dereference
6054| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
6055| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
6056| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
6057| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
6058| [26527] Microsoft Excel Malformed URL String Handling Overflow
6059| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
6060| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
6061| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
6062| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
6063| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
6064| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
6065| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
6066| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
6067| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
6068| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
6069| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
6070| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
6071| [26434] Microsoft JScript Object Release Memory Corruption
6072| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
6073| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
6074| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
6075| [26430] Microsoft Windows Media Player PNG Processing Overflow
6076| [26193] Microsoft NetMeeting Unspecified Remote DoS
6077| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
6078| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
6079| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
6080| [25635] Microsoft Word Unspecified Code Execution
6081| [25501] Microsoft Windows itss.dll CHM Processing Overflow
6082| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
6083| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
6084| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
6085| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
6086| [25003] Microsoft Office mailto: Arbitrary File Access
6087| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
6088| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
6089| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
6090| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
6091| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
6092| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
6093| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
6094| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
6095| [24542] Microsoft IE Unspecified Address Bar Spoofing
6096| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
6097| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
6098| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
6099| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
6100| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
6101| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
6102| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
6103| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
6104| [24208] Microsoft .NET Framework ILDASM Overflow
6105| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
6106| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
6107| [24095] Microsoft IE Arbitrary HTA File Execution
6108| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
6109| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
6110| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
6111| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
6112| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
6113| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
6114| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
6115| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
6116| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
6117| [23657] Microsoft IE ActiveX Killbit Setting Bypass
6118| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
6119| [23608] Microsoft IE Iframe Folder Delete Weakness
6120| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
6121| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
6122| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
6123| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
6124| [23307] Microsoft IE window.status Memory Leak DoS
6125| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
6126| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
6127| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
6128| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
6129| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
6130| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
6131| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
6132| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
6133| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
6134| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
6135| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
6136| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
6137| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
6138| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
6139| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
6140| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
6141| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
6142| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
6143| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
6144| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
6145| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
6146| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
6147| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
6148| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
6149| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
6150| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
6151| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
6152| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
6153| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
6154| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
6155| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
6156| [22354] Microsoft IE Malformed table datasrc Tag DoS
6157| [22351] Microsoft IE Modal Security Dialog Race Condition
6158| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
6159| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
6160| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
6161| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
6162| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
6163| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
6164| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
6165| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
6166| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
6167| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
6168| [21562] Microsoft IE CSS Crafted p Element DoS
6169| [21536] Microsoft Windows backup File Name Extension Overflow
6170| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
6171| [21510] Microsoft Windows SynAttackProtect Bypass
6172| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
6173| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
6174| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
6175| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
6176| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
6177| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
6178| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
6179| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
6180| [20497] Microsoft Windows 98SE User32.dll Icon DoS
6181| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
6182| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
6183| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
6184| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
6185| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
6186| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
6187| [20271] Microsoft IE settimeout Function Recursion DoS
6188| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
6189| [20248] Microsoft IE Embedded Content Processing XSS
6190| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
6191| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
6192| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
6193| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
6194| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
6195| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
6196| [20199] Microsoft IE Image Saturation Handling DoS
6197| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
6198| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
6199| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
6200| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
6201| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
6202| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
6203| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
6204| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
6205| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
6206| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
6207| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
6208| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
6209| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
6210| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
6211| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
6212| [19905] Microsoft Collaboration Data Objects Remote Overflow
6213| [19904] Microsoft Windows DTC Packet Relay DoS
6214| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
6215| [19902] Microsoft Windows COM+ Remote Code Execution
6216| [19901] Microsoft Windows FTP Client Arbitrary File Write
6217| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
6218| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
6219| [19898] Microsoft Windows Web View Arbitrary Script Injection
6220| [19876] Microsoft AntiSpyware Registry Extension Bypass
6221| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
6222| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
6223| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
6224| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
6225| [19796] Microsoft IE Malformed IFRAME File Source DoS
6226| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
6227| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
6228| [19662] Microsoft IE XMLHTTP HTTP Request Injection
6229| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
6230| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
6231| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
6232| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
6233| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
6234| [19089] Microsoft IE Unspecified Remote Code Execution
6235| [19029] Microsoft IE Meta Refresh Parsing Weakness
6236| [19024] Microsoft IE Automatic MIME Detection Weakness
6237| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
6238| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
6239| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
6240| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
6241| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
6242| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
6243| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
6244| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
6245| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
6246| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
6247| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
6248| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
6249| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
6250| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
6251| [18681] Microsoft Windows XP User Account Manager Hidden User
6252| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
6253| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
6254| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
6255| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
6256| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
6257| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
6258| [18607] Microsoft Windows Print Spooler Service Remote Overflow
6259| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
6260| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
6261| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
6262| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
6263| [18493] Microsoft Windows USB Device Driver Overflow
6264| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
6265| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
6266| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
6267| [18459] Microsoft ActiveSync Sync Request Saturation DoS
6268| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
6269| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
6270| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
6271| [18152] Microsoft IE Image File Handling Remote DoS
6272| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
6273| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
6274| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
6275| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
6276| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
6277| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
6278| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
6279| [17829] Microsoft Office .doc Font Parsing Overflow
6280| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
6281| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
6282| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
6283| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
6284| [17707] Microsoft Front Page Malformed HTML Edit DoS
6285| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
6286| [17671] Microsoft Site Server viewcode.asp Information Disclosure
6287| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
6288| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
6289| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
6290| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
6291| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
6292| [17665] Microsoft Site Server Default.asp XSS
6293| [17664] Microsoft Site Server remind.asp Information Disclosure
6294| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
6295| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
6296| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
6297| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
6298| [17659] Microsoft Site Server vs.asp Information Disclosure
6299| [17658] Microsoft Site Server default.asp Information Disclosure
6300| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
6301| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
6302| [17655] Microsoft Site Server DSN.asp Information Disclosure
6303| [17654] Microsoft Site Server driver.asp Information Disclosure
6304| [17653] Microsoft Site Server domain.asp Information Disclosure
6305| [17652] Microsoft Site Server findserver.asp Information Disclosure
6306| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
6307| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
6308| [17342] Microsoft ISA Server Basic Credentials Exposure
6309| [17334] Microsoft IE Script Code Obfuscation (Ghost)
6310| [17314] Microsoft IE XML Redirect Information Disclosure
6311| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
6312| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
6313| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
6314| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
6315| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
6316| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
6317| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
6318| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
6319| [17305] Microsoft Windows HTML Help (CHM) File Overflow
6320| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
6321| [17218] Microsoft IE Stack Overflow Saturation DoS
6322| [17217] Microsoft IE Embedded File Recursion DoS
6323| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
6324| [17159] Microsoft IE Malformed FTP URL DoS
6325| [17158] Microsoft IE Crafted BMP Size Setting DoS
6326| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
6327| [17094] Microsoft IE window() Function Arbitrary Code Execution
6328| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
6329| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
6330| [16827] Microsoft WGA Multiple Method Validation Bypass
6331| [16814] Microsoft Word mcw File Processing Overflow
6332| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
6333| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
6334| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
6335| [16342] Microsoft IE Cross Site Mouse Click Disclosure
6336| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
6337| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
6338| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
6339| [15757] Microsoft SQL Server sa Account Default Null Password
6340| [15739] Microsoft Windows Malformed Image Rendering DoS
6341| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
6342| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
6343| [15480] Microsoft Outlook From Header Comma Parsing Failure
6344| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
6345| [15470] Microsoft Word Unspecified Overflow
6346| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
6347| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
6348| [15466] Microsoft IE Content Advisor Overflow
6349| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
6350| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
6351| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
6352| [15462] Microsoft Windows CSRSS Local Overflow
6353| [15461] Microsoft Windows Object Management Malformed Request DoS
6354| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
6355| [15459] Microsoft Windows Font Processing Local Privilege Escalation
6356| [15458] Microsoft Windows Message Queuing Remote Overflow
6357| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
6358| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
6359| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
6360| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
6361| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
6362| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
6363| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
6364| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
6365| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
6366| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
6367| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
6368| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
6369| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
6370| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
6371| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
6372| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
6373| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
6374| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
6375| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
6376| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
6377| [15219] Microsoft IE XML Object Arbitrary File Access
6378| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
6379| [15217] Microsoft IE input Tag Rendering DoS
6380| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
6381| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
6382| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
6383| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
6384| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
6385| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
6386| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
6387| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
6388| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
6389| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
6390| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
6391| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
6392| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
6393| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
6394| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
6395| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
6396| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
6397| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
6398| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
6399| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
6400| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
6401| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
6402| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
6403| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
6404| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
6405| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
6406| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
6407| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
6408| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
6409| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
6410| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
6411| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
6412| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
6413| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
6414| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
6415| [13609] Microsoft Windows Hyperlink Object Library Overflow
6416| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
6417| [13607] Microsoft IE CDF Cross-Domain Code Execution
6418| [13606] Microsoft IE createControlRange() Function Heap Corruption
6419| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
6420| [13604] Microsoft IE Drag-and-Drop File Injection
6421| [13602] Microsoft Windows OLE Input Validation Overflow
6422| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
6423| [13600] Microsoft Windows SMB Transaction Data Overflow
6424| [13599] Microsoft Windows License Logging Service Overflow
6425| [13597] Microsoft Windows Media Player PNG File Overflow
6426| [13596] Microsoft Windows XP Named Pipe Username Disclosure
6427| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
6428| [13594] Microsoft Office XP URL Overflow
6429| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
6430| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
6431| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
6432| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
6433| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
6434| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
6435| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
6436| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
6437| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
6438| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
6439| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
6440| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
6441| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
6442| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
6443| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
6444| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
6445| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
6446| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
6447| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
6448| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
6449| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
6450| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
6451| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
6452| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
6453| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
6454| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
6455| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
6456| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
6457| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
6458| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
6459| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
6460| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
6461| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
6462| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
6463| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
6464| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
6465| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
6466| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
6467| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
6468| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
6469| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
6470| [13330] Microsoft Windows HKLM Registry Key Locking DoS
6471| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
6472| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
6473| [13258] Microsoft IE Excel File Address Bar Spoofing
6474| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
6475| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
6476| [13132] Microsoft IE %20 URL Spoofing
6477| [13040] Microsoft IE Javascript Load Local File Path Disclosure
6478| [13020] Microsoft Windows XP RPC Cache Memory Leak
6479| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
6480| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
6481| [12862] Microsoft IE USER32.CharLowerA Exception DoS
6482| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
6483| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
6484| [12832] Microsoft Windows Indexing Service Query Overflow
6485| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
6486| [12709] Microsoft HTML Parser Malformed Javascript DoS
6487| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
6488| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
6489| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
6490| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
6491| [12625] Microsoft Windows winhlp32.exe Overflow
6492| [12624] Microsoft Windows Kernel ANI File Parsing DoS
6493| [12623] Microsoft Windows LoadImage API Overflow
6494| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
6495| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
6496| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
6497| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
6498| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
6499| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
6500| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
6501| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
6502| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
6503| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
6504| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
6505| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
6506| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
6507| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
6508| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
6509| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
6510| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
6511| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
6512| [12299] Microsoft IE FTP URL Arbitrary Command Injection
6513| [12277] Microsoft IE sysimage: Local File Existence Disclosure
6514| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
6515| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
6516| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
6517| [12163] Microsoft IE Save Picture As File Extension Spoofing
6518| [12123] Microsoft Windows ipconfig.exe Overflow
6519| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
6520| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
6521| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
6522| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
6523| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
6524| [11956] Microsoft Outlook/Express Message body NUL Character DoS
6525| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
6526| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
6527| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
6528| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
6529| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
6530| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
6531| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
6532| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
6533| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
6534| [11946] Microsoft IE/Outlook Malformed XBM File DoS
6535| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
6536| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
6537| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
6538| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
6539| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
6540| [11940] Microsoft Outlook Blocked Attachment Access
6541| [11939] Microsoft Outlook Attachment Spoofed Content Type
6542| [11938] Microsoft Outlook Express Attachment Filename Overflow
6543| [11937] Microsoft Outlook 98 Hidden Drive Access
6544| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
6545| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
6546| [11918] Microsoft IE execCommand() File Extension Spoofing
6547| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
6548| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
6549| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
6550| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
6551| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
6552| [11799] Microsoft Windows SMB Signing Group Policy Modification
6553| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
6554| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
6555| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
6556| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
6557| [11580] Microsoft IE res: URI Handler File Existence Disclosure
6558| [11479] Microsoft Windows NT Double Dot Samba Client DoS
6559| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
6560| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
6561| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
6562| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
6563| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
6564| [11473] Microsoft Windows NT Messenger Service Long Username DoS
6565| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
6566| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
6567| [11470] Microsoft Windows NT Help File Utility Overflow
6568| [11469] Microsoft Windows NT Malformed File Image Header DoS
6569| [11468] Microsoft Windows NT IOCTL Function DoS
6570| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
6571| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
6572| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
6573| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
6574| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
6575| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
6576| [11423] Microsoft Outlook Malformed Header DoS
6577| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
6578| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
6579| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
6580| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
6581| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
6582| [11416] Microsoft Outlook/Express Blank Header DoS
6583| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
6584| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
6585| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
6586| [11274] Microsoft IE "
6587| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
6588| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
6589| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
6590| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
6591| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
6592| [11170] Microsoft IE iframe Malformed base href DoS
6593| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
6594| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
6595| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
6596| [11158] Microsoft Windows NT Malformed Token Ring DoS
6597| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
6598| [11152] Microsoft IE Malformed HTML Style DoS
6599| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
6600| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
6601| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
6602| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
6603| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
6604| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
6605| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
6606| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
6607| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
6608| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
6609| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
6610| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
6611| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
6612| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
6613| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
6614| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
6615| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
6616| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
6617| [10975] Microsoft Windows NT Winpopup Long Username DoS
6618| [10967] Microsoft IE Javascript User Homepage Address Spoofing
6619| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
6620| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
6621| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
6622| [10935] Microsoft Word Macro Security Model Bypass
6623| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
6624| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
6625| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
6626| [10756] Microsoft MSN heartbeat.ocx Component Overflow
6627| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
6628| [10735] Microsoft Excel Virus Warning Mechanism Bypass
6629| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
6630| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
6631| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
6632| [10709] Microsoft IE SSL Cached Content Spoofing
6633| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
6634| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
6635| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
6636| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
6637| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
6638| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
6639| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
6640| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
6641| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
6642| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
6643| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
6644| [10693] Microsoft Windows Unspecified Kernel Local DoS
6645| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
6646| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
6647| [10690] Microsoft Windows Management APIs Local Privilege Escalation
6648| [10689] Microsoft Windows NetDDE Remote Overflow
6649| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
6650| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
6651| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
6652| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
6653| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
6654| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
6655| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
6656| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
6657| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
6658| [10615] Microsoft Windows NT linux smbmount Request DoS
6659| [10614] Microsoft Windows NT %systemroot% Path Inclusion
6660| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
6661| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
6662| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
6663| [10606] Microsoft Windows LSA NULL Policy Handle DoS
6664| [10604] Microsoft Windows NT PATH Working Directory Inclusion
6665| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
6666| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
6667| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
6668| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
6669| [10379] Microsoft SQL Server Large Query DoS
6670| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
6671| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
6672| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
6673| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
6674| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
6675| [10183] Microsoft SQL Server xp_sprintf Function DoS
6676| [10181] Microsoft SQL Server formatmessage Function DoS
6677| [10166] Microsoft SQL Server raiserror Function DoS
6678| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
6679| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
6680| [10157] Microsoft SQL Server BULK INSERT Query Overflow
6681| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
6682| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
6683| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
6684| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
6685| [10152] Microsoft SQL Server xp_printstatements Function Overflow
6686| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
6687| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
6688| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
6689| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
6690| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
6691| [10146] Microsoft SQL Server xp_sprintf Function Overflow
6692| [10145] Microsoft SQL Server formatmessage Function Overflow
6693| [10144] Microsoft SQL Server raiserror Function Overflow
6694| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
6695| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
6696| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
6697| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
6698| [10139] Microsoft SQL Server Agent Arbitrary File Creation
6699| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
6700| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
6701| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
6702| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
6703| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
6704| [10132] Microsoft SQL Server Authentication Function Remote Overflow
6705| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
6706| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
6707| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
6708| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
6709| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
6710| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
6711| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
6712| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
6713| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
6714| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
6715| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
6716| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
6717| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
6718| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
6719| [9671] Microsoft IE onUnload Address Bar Spoofing
6720| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
6721| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
6722| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
6723| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
6724| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
6725| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
6726| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
6727| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
6728| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
6729| [9348] Microsoft Windows NT Non-NTFS File System Insecure
6730| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
6731| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
6732| [9172] Microsoft IE File/Directory Existence Disclosure
6733| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
6734| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
6735| [9141] Microsoft Windows File Icon Spoofing
6736| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
6737| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
6738| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
6739| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
6740| [8941] Microsoft IE Merlin.speak Function CPU DoS
6741| [8706] Solaris mibiisa MIB Parsing Remote Overflow
6742| [8428] Microsoft NetMeeting Malformed Packets DoS
6743| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
6744| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
6745| [8335] Microsoft IE mshtml.dll Null Pointer DoS
6746| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
6747| [8277] Microsoft IE Malformed GIF Double-free DoS
6748| [8276] Microsoft IE Malformed BMP Overflow
6749| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
6750| [8243] Microsoft SMS Port 2702 DoS
6751| [8224] Microsoft IE CSS Memory Corruption DoS
6752| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
6753| [8210] Microsoft HTML Control Large Form Field DoS
6754| [8161] Microsoft Windows NT Invalid User Privileges
6755| [8160] Microsoft Windows NT File/Directory Invalid Permissions
6756| [8148] Microsoft IE Arbitrary File Write (What a Drag)
6757| [8129] Microsoft IE CSS Malformed div element DoS
6758| [8112] Microsoft Windows NT Weak Account Password Policy
6759| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
6760| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
6761| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
6762| [7963] Microsoft IE parent.window.open location.cache Script Execution
6763| [7951] Microsoft SMS Remote Control Client DoS
6764| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
6765| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
6766| [7914] Microsoft IE .FOLDER File Type Execution
6767| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
6768| [7912] Microsoft IE showHelp() Arbitrary File Execution
6769| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
6770| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
6771| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
6772| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
6773| [7905] Microsoft IE ie5setup.exe Multple Service Disable
6774| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
6775| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
6776| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
6777| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
6778| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
6779| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
6780| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
6781| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
6782| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
6783| [7895] Microsoft IE MS-DOS Device Name URL DoS
6784| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
6785| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
6786| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
6787| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
6788| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
6789| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
6790| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
6791| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
6792| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
6793| [7885] Microsoft Java Implementation Applet Tag DoS
6794| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
6795| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
6796| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
6797| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
6798| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
6799| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
6800| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
6801| [7877] Microsoft Java Virtual Machine Class.forName Overflow
6802| [7876] Microsoft IE .isp File Arbitrary Command Execution
6803| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
6804| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
6805| [7866] Microsoft IE Frame Spoofing Content Injection
6806| [7864] Microsoft IE URL History FTP Credential Disclosure
6807| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
6808| [7862] Microsoft IE User DAT File History Disclosure
6809| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
6810| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
6811| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
6812| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
6813| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
6814| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
6815| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
6816| [7854] Microsoft IE Chinese Character Scrolling DoS
6817| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
6818| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
6819| [7851] Microsoft IE Multiple Form Field DoS
6820| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
6821| [7849] Microsoft IE Javascript location.replace Recursive DoS
6822| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
6823| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
6824| [7846] Microsoft IE PNG Invalid Length Code DoS
6825| [7845] Microsoft IE Encoded URL Information Disclosure
6826| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
6827| [7843] Microsoft IE URLMON.DLL Multiple Overflows
6828| [7842] Microsoft IE File Upload Control Arbitrary File Access
6829| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
6830| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
6831| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
6832| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
6833| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
6834| [7836] Microsoft IE EMBED Tag Overflow
6835| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
6836| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
6837| [7833] Microsoft IE/OE res: Protocol Library Overflow
6838| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
6839| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
6840| [7830] Microsoft IE mk: URL Handling Remote Overflow
6841| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
6842| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
6843| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
6844| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
6845| [7825] Microsoft IE Domain Frame Arbitrary File Access
6846| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
6847| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
6848| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
6849| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
6850| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
6851| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
6852| [7818] Microsoft IE Page Redirect Authentication Credential Leak
6853| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
6854| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
6855| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
6856| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
6857| [7803] Microsoft Windows showHelp Arbitrary Code Execution
6858| [7802] Microsoft IE File Download Extension Spoofing
6859| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
6860| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
6861| [7798] Microsoft Windows Task Scheduler Remote Overflow
6862| [7793] Microsoft Outlook Express Header Validation DoS
6863| [7779] Microsoft IE AnchorClick Cross Zone Scripting
6864| [7778] Microsoft Outlook Window Opener Script Execution
6865| [7777] Microsoft Windows Media Control Preview Script Execution
6866| [7776] Microsoft IE Download Window Filename Filetype Spoofing
6867| [7775] Microsoft IE Channel Link Script Injection
6868| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
6869| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
6870| [7762] Microsoft Java Virtual Machine Cross-Site Communication
6871| [7739] Microsoft IE plugin.ocx Load() Method Overflow
6872| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
6873| [7608] Microsoft Index Server Internet Data Query Path Disclosure
6874| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
6875| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
6876| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
6877| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
6878| [7293] Microsoft Plus! Compressed Folder Password Disclosure
6879| [7202] Microsoft PowerPoint 2000 File Loader Overflow
6880| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
6881| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
6882| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
6883| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
6884| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
6885| [7117] Microsoft Windows RPC Locator Remote Overflow
6886| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
6887| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
6888| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
6889| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
6890| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
6891| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
6892| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
6893| [6965] Microsoft ISA Server 2000 SSL Packet DoS
6894| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
6895| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
6896| [6931] Microsoft IE/Outlook Double Null Character DoS
6897| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
6898| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
6899| [6742] Microsoft DirectPlay Packet Validation DoS
6900| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
6901| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
6902| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
6903| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
6904| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
6905| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
6906| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
6907| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
6908| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
6909| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
6910| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
6911| [6079] Microsoft Outlook Remote XML Loading
6912| [6074] Microsoft Windows Me HSC hcp:// URL XSS
6913| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
6914| [6031] Microsoft Exchange Multiple SMTP Command DoS
6915| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
6916| [5998] Microsoft Outlook Predictable File Caching
6917| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
6918| [5968] Microsoft Windows ARP Packet DoS
6919| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
6920| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
6921| [5936] Microsoft SMTP Service 4xx Error Code DoS
6922| [5887] Microsoft Access 97 Cleartext Password Storage
6923| [5884] Microsoft Site Server ASP Upload Remote Command Execution
6924| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
6925| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
6926| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
6927| [5694] Microsoft IE Address Bar URL Spoofing
6928| [5687] Microsoft Windows IE and Explorer Share Name Overflow
6929| [5686] Microsoft Windows Telnet Service Account Information Disclosure
6930| [5608] Microsoft NetMeeting Malformed String DoS
6931| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
6932| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
6933| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
6934| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
6935| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
6936| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
6937| [5390] Microsoft Exchange NTLM Null Session Mail Relay
6938| [5357] Microsoft Multiple Products for Mac File URL Overflow
6939| [5356] Microsoft IE for Mac Local AppleScript Invocation
6940| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
6941| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
6942| [5343] Microsoft SQL Server SQLXML root Parameter XSS
6943| [5342] Microsoft IE Malformed Web Page Zone Spoofing
6944| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
6945| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
6946| [5261] Microsoft Windows ASN.1 Double Free Code Execution
6947| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
6948| [5259] Microsoft Windows Negotiate SSP Code Execution
6949| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
6950| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
6951| [5256] Microsoft Windows Unspecified H.323 Code Execution
6952| [5255] Microsoft Windows Management Privilege Escalation
6953| [5254] Microsoft Windows Utility Manager Privilege Escalation
6954| [5253] Microsoft Windows Help and Support Center Command Execution
6955| [5252] Microsoft Windows Metafile Code Execution
6956| [5251] Microsoft Windows Winlogon Command Execution
6957| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
6958| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
6959| [5248] Microsoft Windows LSASS Remote Overflow
6960| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
6961| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
6962| [5245] Microsoft Windows RPCSS Large Length Field DoS
6963| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
6964| [5241] Microsoft Jet Database Engine Remote Code Execution
6965| [5179] Microsoft Windows 2000 microsoft-ds DoS
6966| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
6967| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
6968| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
6969| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
6970| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
6971| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
6972| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
6973| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
6974| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
6975| [5134] Microsoft IE Reference Local HTML Resource Script Execution
6976| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
6977| [5129] Microsoft IE Download File Origin Spoofing
6978| [5126] Microsoft BackOffice Authentication Bypass
6979| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
6980| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
6981| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
6982| [4951] Microsoft IE CLASSID Remote DoS
6983| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
6984| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
6985| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
6986| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
6987| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
6988| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
6989| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
6990| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
6991| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
6992| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
6993| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
6994| [4654] iisCart2000 File Upload
6995| [4627] Microsoft IE Text Control Overflow
6996| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
6997| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
6998| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
6999| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
7000| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
7001| [4186] Microsoft IE Cookie Path Traversal
7002| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
7003| [4168] Microsoft Outlook 2002 mailto URI Script Injection
7004| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
7005| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
7006| [3903] Microsoft Windows WINS Server Remote Overflow
7007| [3902] Microsoft Windows ASN.1 Library Integer Overflow
7008| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
7009| [3879] Microsoft IE File Identification Variant
7010| [3791] Microsoft IE Travel Log Arbitrary Script Execution
7011| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
7012| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
7013| [3501] Microsoft FrontPage form_results Information Disclosure
7014| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
7015| [3457] Microsoft MDAC Broadcast Reply Overflow
7016| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
7017| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
7018| [3384] Microsoft FrontPage htimage.exe Overflow
7019| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
7020| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
7021| [3381] Microsoft FrontPage imagemap.exe Overflow
7022| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
7023| [3313] Microsoft Word Form Protection Bypass
7024| [3307] Microsoft IE showHelp() Zone Restriction Bypass
7025| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
7026| [3225] Microsoft IE for Mac Information Disclosure
7027| [3213] SecureIIS Error Page Information Disclosure
7028| [3212] SecureIIS Encoded URI Arbitrary File Access
7029| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
7030| [3209] SecureIIS HTTP Request Overflow Protection Bypass
7031| [3195] Microsoft Exchange OWA REFERER Header XSS
7032| [3184] IISShield HTTP Request Bypass Ruleset
7033| [3183] iisPROTECT Encoded URL Authentication Bypass
7034| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
7035| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
7036| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
7037| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
7038| [3108] Microsoft Office 98 Macintosh Information Disclosure
7039| [3106] Microsoft Windows Password Authentication Security Point of Failure
7040| [3104] Microsoft IE PPC Overwrite Arbitrary Files
7041| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
7042| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
7043| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
7044| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
7045| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
7046| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
7047| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
7048| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
7049| [3066] Microsoft IE Custom HTTP Errors Script Injection
7050| [3065] Microsoft IE Unparsable XML File XSS
7051| [3056] Microsoft IE MSN/Alexa Information Leak
7052| [3055] Microsoft IE Spoofed URL
7053| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
7054| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
7055| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
7056| [3051] Microsoft IE MHT Web Archive Overflow
7057| [3050] Microsoft IE dragDrop Method Local File Reading
7058| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
7059| [3036] Microsoft IE dynsrc File Information Leak
7060| [3035] Microsoft WebBrowser Control t:video File Execution
7061| [3034] Microsoft IE JavaScript script src Local File Enumeration
7062| [3033] Microsoft IE Content Type/Disposition File Execution
7063| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
7064| [3031] Microsoft IE document.Open Same Origin Policy Violation
7065| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
7066| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
7067| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
7068| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
7069| [3010] Microsoft IE OWC XMLURL File Existence Verification
7070| [3009] Microsoft IE OWC Load File Existence Verification
7071| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
7072| [3007] Microsoft IE OWC LoadText Read Arbitrary File
7073| [3006] Microsoft IE OWC Script Execution
7074| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
7075| [3004] Microsoft IE Gopher Client Overflow
7076| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
7077| [3002] Microsoft IE File Extension Dot Parsing
7078| [3001] Microsoft IE XP HCP URI Handler File Deletion
7079| [2999] Microsoft IE Powerpoint Mouse-Over Execute
7080| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
7081| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
7082| [2996] Microsoft IE Object Zone Redirection
7083| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
7084| [2994] Microsoft IE (NewWindow).location.assign Save Reference
7085| [2993] Microsoft IE % URL Encoding XSS
7086| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
7087| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
7088| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
7089| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
7090| [2985] Microsoft IE execCommand Object Caching
7091| [2984] Microsoft IE getElementsByTagName Object Caching
7092| [2983] Microsoft IE getElementsByName Object Caching
7093| [2982] Microsoft IE getElementById Object Caching
7094| [2981] Microsoft IE elementFromPoint Object Caching
7095| [2980] Microsoft IE createRange Object Caching
7096| [2979] Microsoft IE external Object Caching
7097| [2978] Microsoft IE showModalDialog Object Caching
7098| [2977] Microsoft IE XML Datasource Read Local Files
7099| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
7100| [2975] Microsoft IE Back Button XSS
7101| [2974] Microsoft IE/Outlook Temporary Internet File Execution
7102| [2973] Microsoft IE Third Party Plugin Rendering XSS
7103| [2972] Microsoft IE showModalDialog Script Execution
7104| [2971] Microsoft WMP File Attachment Script Execution
7105| [2970] Microsoft IE cssText Arbitrary File Access
7106| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
7107| [2968] Microsoft IE File Download Dialog Overflow
7108| [2967] Microsoft IE Object Type Property Overflow
7109| [2966] Microsoft IE BR549.DLL Overflow
7110| [2965] Microsoft IE Cache Script Execution in My Zone
7111| [2963] Microsoft IE align HTML Converter Overflow
7112| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
7113| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
7114| [2917] Microsoft Access Known Database Attack
7115| [2801] Microsoft Word and Excel Execution of Arbitrary Code
7116| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
7117| [2784] Microsoft IE Component Function Information Disclosure
7118| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
7119| [2751] Microsoft Word Macro Name Handling Overflow
7120| [2745] Microsoft HTML Help Control Privilege Escalation
7121| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
7122| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
7123| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
7124| [2679] Microsoft Outlook Web Access XSS
7125| [2678] Microsoft Windows Overflow in ListBox and
7126| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
7127| [2675] Microsoft Windows HCP protocol Overflow
7128| [2674] Microsoft Exchange SMTP Extended Request Overflow
7129| [2670] Microsoft Windows RPC Race Condition DoS
7130| [2657] Microsoft Windows Message Queuing Service Heap Overflow
7131| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
7132| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
7133| [2642] Microsoft Windows Unauthorised Thread Termination
7134| [2592] Microsoft PowerPoint Modify Protection Bypass
7135| [2572] Microsoft BizTalk Server Insecure Permissions
7136| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
7137| [2544] Microsoft ASP.NET Request Validation Bypass
7138| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
7139| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
7140| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
7141| [2508] Microsoft Visual Basic for Applications Buffer Overflow
7142| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
7143| [2506] Microsoft Word/Works Automated Macro Execution
7144| [2453] Microsoft IE My Computer Zone Caching Issue
7145| [2451] Microsoft IE Object Data Header Type Safe File Execution
7146| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
7147| [2368] IISShield Crafted HTTP Request Filtering Bypass
7148| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
7149| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
7150| [2320] Microsoft ISA Server HTTP Error Handler XSS
7151| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
7152| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
7153| [2298] Microsoft ISA Server Error Page XSS
7154| [2291] Microsoft IE DOM Script Source Recursive DoS
7155| [2288] Microsoft Utility Manager Local Privilege Escalation
7156| [2283] Microsoft Exchange OWA Execute Arbitrary Code
7157| [2262] Microsoft Windows Media Player DHTML Local Zone Access
7158| [2247] Microsoft Windows Media Services Remote Command Execution #2
7159| [2244] Microsoft Windows 2000 ShellExecute() API Let
7160| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
7161| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
7162| [2100] Microsoft Windows RPC DCOM Interface Overflow
7163| [2096] Microsoft ISA Server SurfControl Web Filter
7164| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
7165| [2073] Microsoft Windows XP Network Share Provider Overflow
7166| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
7167| [2061] Microsoft Outlook HTML Mail Script Execution
7168| [2060] Microsoft IE Known Local File Script Execution
7169| [2051] Microsoft Windows User Shell Buffer Overflow
7170| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
7171| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
7172| [2046] Microsoft IE Forced Script Execution
7173| [2045] Microsoft IE HTML Document Directive Overflow
7174| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
7175| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
7176| [2041] Microsoft Office for Macintosh Network PID Checker DoS
7177| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
7178| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
7179| [2008] Microsoft IE Same Origin Policy Violation
7180| [2004] Microsoft IE Cross-frame Remote File Access
7181| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
7182| [1992] Microsoft IE Cookie Disclosure
7183| [1990] Microsoft Windows Terminal Services False IP Address
7184| [1982] Microsoft IE about: URI XSS
7185| [1978] Microsoft IE for Mac OS Download Execution
7186| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
7187| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
7188| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
7189| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
7190| [1957] Microsoft Exchange OWA Malformed Request DoS
7191| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
7192| [1934] Microsoft ISA Server Invalid URL Error Message XSS
7193| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
7194| [1932] Microsoft ISA Server H.323 Memory Leak DoS
7195| [1928] Microsoft Windows NNTP Malformed Post DoS
7196| [1915] Microsoft Windows Media Player .NSC File Overflow
7197| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
7198| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
7199| [1867] Microsoft Word Document Macro Execution
7200| [1864] Microsoft SQL Server Administrator Cached Connection
7201| [1861] Microsoft Windows Telnet Local System Call DoS
7202| [1860] Microsoft Windows Telnet Service Handle Leak DoS
7203| [1859] Microsoft Windows Telnet Multiple Sessions DoS
7204| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
7205| [1856] Microsoft Exchange OWA Embedded Script Execution
7206| [1852] Microsoft Outlook Address Book Spoofing Weakness
7207| [1840] Microsoft Windows Media Player Internet Shortcut Execution
7208| [1838] Microsoft Word .asd Macro File Execution
7209| [1837] Microsoft Word RTF Template Macro Execution
7210| [1832] Microsoft IE Spoofed SSL Certificates
7211| [1831] Microsoft IE Server Certificate Validation Failure
7212| [1820] Microsoft Index Server Search Parameter Overflow
7213| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
7214| [1764] Microsoft Windows 2000 Domain Controller DoS
7215| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
7216| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
7217| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
7218| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
7219| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
7220| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
7221| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
7222| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
7223| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
7224| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
7225| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
7226| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
7227| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
7228| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
7229| [1607] Microsoft Windows 9x Invalid Driver Type DoS
7230| [1606] Microsoft IE Cached Web Credentials Disclosure
7231| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
7232| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
7233| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
7234| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
7235| [1563] Microsoft Windows / Office DLL Search Path Weakness
7236| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
7237| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
7238| [1537] Microsoft Outlook Rich Text Format Information Disclosure
7239| [1530] Microsoft Money Cleartext Password Storage
7240| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
7241| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
7242| [1502] Microsoft IE Scriptlet Rendering
7243| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
7244| [1491] Microsoft Windows 9x IPX Ping Packet DoS
7245| [1475] Microsoft Outlook/Express Cache Bypass
7246| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
7247| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
7248| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
7249| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
7250| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
7251| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
7252| [1428] Microsoft IE/Office ActiveX Object Execution
7253| [1427] Microsoft IE VBA Code Execution
7254| [1399] Microsoft Windows 2000 Windows Station Access
7255| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
7256| [1369] Microsoft SQL Server DTS Password Disclosure
7257| [1368] Microsoft Media Encoder Request Parsing Local DoS
7258| [1358] Microsoft Windows NT HostAnnouncement DoS
7259| [1342] Microsoft IE DocumentComplete() Cross Frame Access
7260| [1341] Microsoft IE ActiveX Combined Component Attributes
7261| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
7262| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
7263| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
7264| [1297] Microsoft Windows 2000 Active Directory Object Attribute
7265| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
7266| [1272] Microsoft Excel XLM Arbitrary Macro Execution
7267| [1268] Microsoft Windows TCP/IP Printing Service DoS
7268| [1257] Microsoft Windows Media License Manager DoS
7269| [1251] Microsoft Windows MS DOS Device Name DoS
7270| [1250] Microsoft SQL Server Non-Validated Query
7271| [1244] Microsoft Clip Art Buffer Overflow
7272| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
7273| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
7274| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
7275| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
7276| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
7277| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
7278| [1188] Microsoft CIS IMAP Server Remote Overflow
7279| [1166] Microsoft Windows NT LsaLookupSids() DoS
7280| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
7281| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
7282| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
7283| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
7284| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
7285| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
7286| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
7287| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
7288| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
7289| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
7290| [1076] Microsoft Windows IP Source Routing
7291| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
7292| [1069] Microsoft IE Import/Export Favorites
7293| [1056] Microsoft Java Virtual Machine Sandbox Bypass
7294| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
7295| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
7296| [1046] Microsoft Windows telnet.exe Argument Overflow
7297| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
7298| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
7299| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
7300| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
7301| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
7302| [1010] Microsoft Windows NT Malformed LSA Request DoS
7303| [967] Microsoft Windows NT WINS Service Malformed Data DoS
7304| [945] Microsoft Windows 95/98 SMB Authentication Replay
7305| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
7306| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
7307| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
7308| [922] Microsoft NetMeeting Clipboard Remote Overflow
7309| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
7310| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
7311| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
7312| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
7313| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
7314| [863] Microsoft Exchange Malformed Mail Attribute DoS
7315| [858] Microsoft Windows NCM Handler Local Privilege Elevation
7316| [852] Microsoft Exchange EHLO Long Hostname Overflow
7317| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
7318| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
7319| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
7320| [773] Microsoft Windows 2000 Group Policy File Lock DoS
7321| [772] Microsoft Windows Multiple UNC Provider Request Overflow
7322| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
7323| [736] Microsoft Windows SMB Enumeration Information Disclosure
7324| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
7325| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
7326| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
7327| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
7328| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
7329| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
7330| [665] Microsoft Windows 95 Online Registration Information Disclosure
7331| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
7332| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
7333| [601] Microsoft Exchange Server LDAP Bind Function Overflow
7334| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
7335| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
7336| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
7337| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
7338| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
7339| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
7340| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
7341| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
7342| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
7343| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
7344| [457] Microsoft Exchange Malformed MIME Header DoS
7345| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
7346| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
7347| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
7348| [423] Microsoft Windows File Share Password Protection Bypass
7349| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
7350| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
7351| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
7352| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
7353| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
7354| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
7355| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
7356| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
7357| [334] Microsoft Windows Registry: Permission to Modify Common Paths
7358| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
7359| [331] Microsoft Windows Remote Registry Access
7360| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
7361| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
7362| [304] Microsoft Windows NT service pack level via remote registry access
7363| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
7364| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
7365| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
7366| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
7367| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
7368| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
7369| [129] Microsoft Windows NT FTP 'guest' Account
7370| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
7371| [68] Microsoft FrontPage Extensions .pwd File Permissions
7372| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
7373|_
7374Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
7375Device type: general purpose
7376Running (JUST GUESSING): Microsoft Windows 2016 (89%)
7377OS CPE: cpe:/o:microsoft:windows_server_2016
7378Aggressive OS guesses: Microsoft Windows Server 2016 (89%)
7379No exact OS matches for host (test conditions non-ideal).
7380Uptime guess: 21.016 days (since Sun Oct 20 21:43:01 2019)
7381Network Distance: 21 hops
7382TCP Sequence Prediction: Difficulty=255 (Good luck!)
7383IP ID Sequence Generation: Incremental
7384Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
7385
7386TRACEROUTE (using port 80/tcp)
7387HOP RTT ADDRESS
73881 140.04 ms 10.231.200.1
73892 ...
73903 141.85 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
73914 141.89 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
73925 146.67 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
73936 167.97 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
73947 172.60 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
73958 172.81 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
73969 172.42 ms ntt.ams03.atlas.cogentco.com (130.117.15.130)
739710 172.48 ms ae-10.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.44)
739811 187.48 ms ae-13.r02.mlanit01.it.bb.gin.ntt.net (129.250.3.179)
739912 191.02 ms ae-1.r01.mlanit01.it.bb.gin.ntt.net (129.250.5.82)
740013 186.78 ms fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134)
740114 ... 18
740219 234.66 ms 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187)
740320 226.33 ms 95.0.51.254.static.ttnet.com.tr (95.0.51.254)
740421 227.91 ms 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
7405
7406NSE: Script Post-scanning.
7407Initiating NSE at 21:05
7408Completed NSE at 21:05, 0.00s elapsed
7409Initiating NSE at 21:05
7410Completed NSE at 21:05, 0.00s elapsed
7411#######################################################################################################################################
7412Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:20 EST
7413Nmap scan report for trade.gov.tr (95.0.51.12)
7414Host is up (0.22s latency).
7415rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
7416Not shown: 994 filtered ports
7417PORT STATE SERVICE VERSION
741825/tcp closed smtp
741980/tcp open http Microsoft IIS httpd 10.0
7420|_http-server-header: Microsoft-IIS/10.0
7421139/tcp closed netbios-ssn
7422443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
7423| http-server-header:
7424| Microsoft-HTTPAPI/2.0
7425|_ Microsoft-IIS/10.0
7426445/tcp closed microsoft-ds
74278080/tcp closed http-proxy
7428Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
7429#######################################################################################################################################
7430Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:16 EST
7431Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
7432Host is up (0.20s latency).
7433Not shown: 994 filtered ports
7434PORT STATE SERVICE VERSION
743525/tcp closed smtp
743680/tcp open http Microsoft IIS httpd 10.0
7437|_http-server-header: Microsoft-IIS/10.0
7438139/tcp closed netbios-ssn
7439443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
7440|_http-server-header: Microsoft-HTTPAPI/2.0
7441|_http-title: Not Found
7442| ssl-cert: Subject: commonName=*.ticaret.gov.tr
7443| Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
7444| Not valid before: 2018-07-13T14:07:33
7445|_Not valid after: 2020-07-13T14:07:33
7446|_ssl-date: 2019-11-11T02:17:11+00:00; -1s from scanner time.
7447| tls-alpn:
7448| h2
7449|_ http/1.1
7450445/tcp closed microsoft-ds
74518080/tcp closed http-proxy
7452Device type: general purpose
7453Running (JUST GUESSING): Linux 2.6.X (90%), Microsoft Windows 2016 (85%)
7454OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:microsoft:windows_server_2016
7455Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%), Microsoft Windows Server 2016 (85%)
7456No exact OS matches for host (test conditions non-ideal).
7457Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
7458
7459Host script results:
7460|_clock-skew: -1s
7461#######################################################################################################################################
7462Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:18 EST
7463Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
7464Host is up (0.21s latency).
7465Not shown: 994 filtered ports
7466PORT STATE SERVICE VERSION
746725/tcp closed smtp
746880/tcp open http Microsoft IIS httpd 10.0
7469|_http-server-header: Microsoft-IIS/10.0
7470139/tcp closed netbios-ssn
7471443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
7472|_http-server-header: Microsoft-HTTPAPI/2.0
7473|_http-title: Not Found
7474| ssl-cert: Subject: commonName=*.ticaret.gov.tr
7475| Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
7476| Not valid before: 2018-07-13T14:07:33
7477|_Not valid after: 2020-07-13T14:07:33
7478|_ssl-date: 2019-11-11T02:19:35+00:00; 0s from scanner time.
7479| tls-alpn:
7480| h2
7481|_ http/1.1
7482445/tcp closed microsoft-ds
74838080/tcp closed http-proxy
7484Device type: general purpose
7485Running (JUST GUESSING): Linux 2.6.X (90%), Microsoft Windows 2016 (85%)
7486OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:microsoft:windows_server_2016
7487Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%), Microsoft Windows Server 2016 (85%)
7488No exact OS matches for host (test conditions non-ideal).
7489Network Distance: 21 hops
7490Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
7491
7492TRACEROUTE (using port 8080/tcp)
7493HOP RTT ADDRESS
74941 138.90 ms 10.231.200.1
74952 ...
74963 139.80 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
74974 139.83 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
74985 141.11 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
74996 163.04 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
75007 172.01 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
75018 171.88 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
75029 172.04 ms ntt.ams03.atlas.cogentco.com (130.117.15.130)
750310 172.04 ms ae-10.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.44)
750411 191.79 ms ae-13.r02.mlanit01.it.bb.gin.ntt.net (129.250.3.179)
750512 192.13 ms ae-1.r01.mlanit01.it.bb.gin.ntt.net (129.250.5.82)
750613 184.78 ms fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134)
750714 ... 18
750819 243.95 ms 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187)
750920 233.08 ms 95.0.51.254.static.ttnet.com.tr (95.0.51.254)
751021 236.44 ms 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
7511#######################################################################################################################################
7512Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 21:24 EST
7513SENT (0.2084s) ICMP [10.231.201.198 > 95.0.51.12 Echo request (type=8/code=0) id=31360 seq=0] IP [ttl=58 id=1988 iplen=28 ]
7514SENT (0.2085s) igmp (2) 10.231.201.198 > 95.0.51.12: ttl=41 id=58035 iplen=28
7515SENT (0.2085s) ipv4 (4) 10.231.201.198 > 95.0.51.12: ttl=47 id=59359 iplen=20
7516RCVD (0.4112s) TCP 95.0.51.12:443 > 10.231.201.198:60542 A ttl=113 id=4093 iplen=52 seq=13273201 win=1025 <nop,nop,timestamp 1816907052 3383322762>
7517RCVD (0.4131s) TCP 95.0.51.12:443 > 10.231.201.198:60552 SA ttl=110 id=4092 iplen=60 seq=3326996323 win=8192 <mss 1103,nop,wscale 8,sackOK,timestamp 1816907050 3383322763>
7518RCVD (0.6505s) TCP 95.0.51.12:443 > 10.231.201.198:60552 A ttl=110 id=4094 iplen=1143 seq=3326996324 win=1027 <nop,nop,timestamp 1816907287 3383322997>
7519RCVD (0.6506s) TCP 95.0.51.12:443 > 10.231.201.198:60552 A ttl=110 id=4095 iplen=1143 seq=3326997415 win=1027 <nop,nop,timestamp 1816907287 3383322997>
7520RCVD (0.6510s) TCP 95.0.51.12:443 > 10.231.201.198:60552 PA ttl=110 id=4096 iplen=1023 seq=3326998506 win=1027 <nop,nop,timestamp 1816907287 3383322997>
7521RCVD (0.8853s) TCP 95.0.51.12:443 > 10.231.201.198:60552 PA ttl=110 id=4097 iplen=103 seq=3326999477 win=1026 <nop,nop,timestamp 1816907523 3383323236>
7522RCVD (1.1189s) TCP 95.0.51.12:443 > 10.231.201.198:60552 FPA ttl=110 id=4098 iplen=573 seq=3326999528 win=1025 <nop,nop,timestamp 1816907756 3383323469>
7523RCVD (1.3480s) TCP 95.0.51.12:443 > 10.231.201.198:60552 A ttl=110 id=4099 iplen=52 seq=3327000050 win=1025 <nop,nop,timestamp 1816907986 3383323703>
7524RCVD (1.3610s) TCP 95.0.51.12:443 > 10.231.201.198:60562 SA ttl=110 id=4100 iplen=60 seq=985443006 win=8192 <mss 1103,nop,wscale 8,sackOK,timestamp 1816907999 3383323703>
7525RCVD (1.6037s) TCP 95.0.51.12:443 > 10.231.201.198:60562 A ttl=110 id=4101 iplen=1143 seq=985443007 win=1027 <nop,nop,timestamp 1816908240 3383323945>
7526RCVD (1.6038s) TCP 95.0.51.12:443 > 10.231.201.198:60562 A ttl=110 id=4102 iplen=1143 seq=985444098 win=1027 <nop,nop,timestamp 1816908240 3383323945>
7527RCVD (1.6041s) TCP 95.0.51.12:443 > 10.231.201.198:60562 PA ttl=110 id=4103 iplen=1023 seq=985445189 win=1027 <nop,nop,timestamp 1816908240 3383323945>
7528RCVD (1.8466s) TCP 95.0.51.12:443 > 10.231.201.198:60562 PA ttl=110 id=4104 iplen=103 seq=985446160 win=1026 <nop,nop,timestamp 1816908483 3383324188>
7529RCVD (2.0897s) TCP 95.0.51.12:443 > 10.231.201.198:60562 FPA ttl=110 id=4105 iplen=573 seq=985446211 win=1025 <nop,nop,timestamp 1816908726 3383324431>
7530SENT (2.2088s) ipv4 (4) 10.231.201.198 > 95.0.51.12: ttl=59 id=29793 iplen=20
7531SENT (2.2088s) igmp (2) 10.231.201.198 > 95.0.51.12: ttl=42 id=60295 iplen=28
7532SENT (2.2089s) ICMP [10.231.201.198 > 95.0.51.12 Echo request (type=8/code=0) id=62025 seq=0] IP [ttl=58 id=54834 iplen=28 ]
7533RCVD (2.3279s) TCP 95.0.51.12:443 > 10.231.201.198:60562 A ttl=110 id=4106 iplen=52 seq=985446733 win=1025 <nop,nop,timestamp 1816908964 3383324674>
7534RCVD (2.3338s) TCP 95.0.51.12:443 > 10.231.201.198:60572 SA ttl=110 id=4107 iplen=60 seq=3851886908 win=8192 <mss 1103,nop,wscale 8,sackOK,timestamp 1816908970 3383324674>
7535RCVD (2.5813s) TCP 95.0.51.12:443 > 10.231.201.198:60572 A ttl=110 id=4108 iplen=1143 seq=3851886909 win=1027 <nop,nop,timestamp 1816909218 3383324918>
7536RCVD (2.5814s) TCP 95.0.51.12:443 > 10.231.201.198:60572 A ttl=110 id=4109 iplen=1143 seq=3851888000 win=1027 <nop,nop,timestamp 1816909218 3383324918>
7537RCVD (2.5814s) TCP 95.0.51.12:443 > 10.231.201.198:60572 PA ttl=110 id=4110 iplen=1023 seq=3851889091 win=1027 <nop,nop,timestamp 1816909218 3383324918>
7538RCVD (2.8250s) TCP 95.0.51.12:443 > 10.231.201.198:60572 PA ttl=110 id=4111 iplen=103 seq=3851890062 win=1026 <nop,nop,timestamp 1816909462 3383325167>
7539RCVD (3.0690s) TCP 95.0.51.12:443 > 10.231.201.198:60572 FPA ttl=110 id=4112 iplen=573 seq=3851890113 win=1025 <nop,nop,timestamp 1816909705 3383325409>
7540Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
7541Nmap done: 1 IP address (0 hosts up) scanned in 3.25 seconds
7542#######################################################################################################################################
7543 Anonymous JTSEC #OpTurkey Full Recon #1