Skip to content

Instantly share code, notes, and snippets.

@wchen-r7
Created July 14, 2015 05:30
Show Gist options
  • Save wchen-r7/d79e10fbd26cb1c8d50b to your computer and use it in GitHub Desktop.
Save wchen-r7/d79e10fbd26cb1c8d50b to your computer and use it in GitHub Desktop.
CVE,Module
"CVE-2013-4011","aix/local/ibstat_path"
"CVE-2009-3699","aix/rpc_cmsd_opcode21"
"CVE-2009-2727","aix/rpc_ttdbserverd_realpath"
"CVE-2012-6636","android/browser/webview_addjavascriptinterface"
"CVE-2013-4710","android/browser/webview_addjavascriptinterface"
"CVE-2014-0514","android/fileformat/adobe_reader_pdf_js_interface"
"CVE-2014-3153","android/local/futex_requeue"
"CVE-2006-3459","apple_ios/browser/safari_libtiff"
"CVE-2006-3459","apple_ios/email/mobilemail_libtiff"
"CVE-2004-2221","bsdi/softcart/mercantec_softcart"
"CVE-2001-0797","dialup/multi/login/manyargs"
"CVE-2010-4221","freebsd/ftp/proftp_telnet_iac"
"CVE-2013-2171","freebsd/local/mmap"
"CVE-2003-0201","freebsd/samba/trans2open"
"CVE-2008-7232","freebsd/tacacs/xtacacsd_report"
"CVE-2011-4862","freebsd/telnet/telnet_encrypt_keyid"
"CVE-2002-1473","hpux/lpd/cleanup_exec"
"CVE-2001-0800","irix/lpd/tagprinter_exec"
"CVE-2008-5499","linux/browser/adobe_flashplayer_aslaunch"
"CVE-2006-5815","linux/ftp/proftp_sreplace"
"CVE-2010-4221","linux/ftp/proftp_telnet_iac"
"CVE-2004-0608","linux/games/ut2004_secure"
"CVE-2015-2857","linux/http/accellion_fta_getstatus_oauth"
"CVE-2007-3010","linux/http/alcatel_omnipcx_mastercgi_exec"
"CVE-2014-1635","linux/http/belkin_login_bof"
"CVE-2014-3828","linux/http/centreon_sqli_exec"
"CVE-2014-3829","linux/http/centreon_sqli_exec"
"CVE-2013-2068","linux/http/cfme_manageiq_evm_upload_exec"
"CVE-2009-2765","linux/http/ddwrt_cgibin_exec"
"CVE-2014-3936","linux/http/dlink_hnap_bof"
"CVE-2014-2928","linux/http/f5_icontrol_exec"
"CVE-2013-2121","linux/http/foreman_openstack_satellite_code_exec"
"CVE-2014-4511","linux/http/gitlist_exec"
"CVE-2004-1388","linux/http/gpsd_format_string"
"CVE-2013-3502","linux/http/groundwork_monarch_cmd_exec"
"CVE-2005-2799","linux/http/linksys_apply_cgi"
"CVE-2013-3568","linux/http/linksys_wrt110_cmd_exec"
"CVE-2015-1187","linux/http/multi_ncc_ping_exec"
"CVE-2013-0136","linux/http/mutiny_frontend_upload"
"CVE-2013-2751","linux/http/netgear_readynas_exec"
"CVE-2013-2028","linux/http/nginx_chunked_size"
"CVE-2006-1148","linux/http/peercast_url"
"CVE-2000-0248","linux/http/piranha_passwd_exec"
"CVE-2000-0322","linux/http/piranha_passwd_exec"
"CVE-2014-5468","linux/http/railo_cfml_rfi"
"CVE-2014-8361","linux/http/realtek_miniigd_upnp_exec_noauth"
"CVE-2014-8684","linux/http/seagate_nas_php_exec_noauth"
"CVE-2014-8686","linux/http/seagate_nas_php_exec_noauth"
"CVE-2014-8687","linux/http/seagate_nas_php_exec_noauth"
"CVE-2013-3623","linux/http/smt_ipmi_close_window_bof"
"CVE-2013-4983","linux/http/sophos_wpa_sblistpack_exec"
"CVE-2012-0297","linux/http/symantec_web_gateway_exec"
"CVE-2012-0299","linux/http/symantec_web_gateway_file_upload"
"CVE-2012-0297","linux/http/symantec_web_gateway_lfi"
"CVE-2012-2953","linux/http/symantec_web_gateway_pbcontrol"
"CVE-2014-7285","linux/http/symantec_web_gateway_restore"
"CVE-2013-6955","linux/http/synology_dsm_sliceupload_exec_noauth"
"CVE-2014-8423","linux/http/vap2500_tools_command_exec"
"CVE-2014-8424","linux/http/vap2500_tools_command_exec"
"CVE-2011-4828","linux/http/vcms_upload"
"CVE-2012-1495","linux/http/webcalendar_settings_exec"
"CVE-2013-5743","linux/http/zabbix_sqli"
"CVE-2014-3804","linux/ids/alienvault_centerd_soap_exec"
"CVE-2005-3252","linux/ids/snortbopre"
"CVE-2000-0284","linux/imap/imap_uw_lsub"
"CVE-2011-1485","linux/local/pkexec"
"CVE-2009-2692","linux/local/sock_sendpage"
"CVE-2013-4984","linux/local/sophos_wpa_clear_keys"
"CVE-2009-1185","linux/local/udev_netlink"
"CVE-2013-1662","linux/local/vmware_mount"
"CVE-2005-1099","linux/misc/gld_postfix"
"CVE-2014-4880","linux/misc/hikvision_rtsp_bof"
"CVE-2011-0923","linux/misc/hp_data_protector_cmd_exec"
"CVE-2014-2624","linux/misc/hp_nnmi_pmd_bof"
"CVE-2013-2343","linux/misc/hp_vsa_login_bof"
"CVE-2007-5208","linux/misc/hplip_hpssd_exec"
"CVE-2007-5243","linux/misc/ib_inet_connect"
"CVE-2007-5243","linux/misc/ib_jrd8_create_database"
"CVE-2007-5244","linux/misc/ib_open_marker_file"
"CVE-2007-5243","linux/misc/ib_pwd_db_aliased"
"CVE-2000-0917","linux/misc/lprng_format_string"
"CVE-2013-1892","linux/misc/mongod_native_helper"
"CVE-2013-1362","linux/misc/nagios_nrpe_arguments"
"CVE-2011-0404","linux/misc/netsupport_manager_agent"
"CVE-2012-0432","linux/misc/novell_edirectory_ncp_bof"
"CVE-2009-4498","linux/misc/zabbix_server_exec"
"CVE-2009-4484","linux/mysql/mysql_yassl_getname"
"CVE-2008-0226","linux/mysql/mysql_yassl_hello"
"CVE-2006-2502","linux/pop3/cyrus_pop3d_popsubfolders"
"CVE-2003-0213","linux/pptp/poptop_negative_read"
"CVE-2004-0541","linux/proxy/squid_ntlm_authenticate"
"CVE-2010-2063","linux/samba/chain_reply"
"CVE-2007-2446","linux/samba/lsa_transnames_heap"
"CVE-2012-1182","linux/samba/setinfopolicy_heap"
"CVE-2003-0201","linux/samba/trans2open"
"CVE-2015-0235","linux/smtp/exim_gethostbyname_bof"
"CVE-2015-0936","linux/ssh/ceragon_fibeair_known_privkey"
"CVE-2012-1493","linux/ssh/f5_bigip_known_privkey"
"CVE-2012-3579","linux/ssh/symantec_smg_ssh"
"CVE-2011-4862","linux/telnet/telnet_encrypt_keyid"
"CVE-2013-0230","linux/upnp/miniupnpd_soap_bof"
"CVE-2015-5119","multi/browser/adobe_flash_hacking_team_uaf"
"CVE-2015-3043","multi/browser/adobe_flash_nellymoser_bof"
"CVE-2015-3113","multi/browser/adobe_flash_nellymoser_bof"
"CVE-2015-0336","multi/browser/adobe_flash_net_connection_confusion"
"CVE-2015-5122","multi/browser/adobe_flash_opaque_background_uaf"
"CVE-2014-0515","multi/browser/adobe_flash_pixel_bender_bof"
"CVE-2015-3105","multi/browser/adobe_flash_shader_drawing_fill"
"CVE-2015-3090","multi/browser/adobe_flash_shader_job_overflow"
"CVE-2015-0311","multi/browser/adobe_flash_uncompress_zlib_uaf"
"CVE-2009-2477","multi/browser/firefox_escape_retval"
"CVE-2012-3993","multi/browser/firefox_proto_crmfrequest"
"CVE-2013-1710","multi/browser/firefox_proto_crmfrequest"
"CVE-2014-8636","multi/browser/firefox_proxy_prototype"
"CVE-2006-0295","multi/browser/firefox_queryinterface"
"CVE-2013-0758","multi/browser/firefox_svg_plugin"
"CVE-2013-0757","multi/browser/firefox_svg_plugin"
"CVE-2013-1710","multi/browser/firefox_tostring_console_injection"
"CVE-2014-1510","multi/browser/firefox_webidl_injection"
"CVE-2014-1511","multi/browser/firefox_webidl_injection"
"CVE-2009-0950","multi/browser/itms_overflow"
"CVE-2012-0507","multi/browser/java_atomicreferencearray"
"CVE-2008-5353","multi/browser/java_calendar_deserialize"
"CVE-2009-3867","multi/browser/java_getsoundbank_bof"
"CVE-2013-1488","multi/browser/java_jre17_driver_manager"
"CVE-2012-4681","multi/browser/java_jre17_exec"
"CVE-2012-5076","multi/browser/java_jre17_glassfish_averagerangestatisticimpl"
"CVE-2012-5076","multi/browser/java_jre17_jaxws"
"CVE-2013-0422","multi/browser/java_jre17_jmxbean"
"CVE-2013-0431","multi/browser/java_jre17_jmxbean_2"
"CVE-2012-5088","multi/browser/java_jre17_method_handle"
"CVE-2013-2460","multi/browser/java_jre17_provider_skeleton"
"CVE-2013-2423","multi/browser/java_jre17_reflection_types"
"CVE-2011-3544","multi/browser/java_rhino"
"CVE-2010-0094","multi/browser/java_rmi_connection_impl"
"CVE-2009-3869","multi/browser/java_setdifficm_bof"
"CVE-2013-2465","multi/browser/java_storeimagearray"
"CVE-2010-0840","multi/browser/java_trusted_chain"
"CVE-2012-1723","multi/browser/java_verifier_field_access"
"CVE-2005-2265","multi/browser/mozilla_compareto"
"CVE-2006-3677","multi/browser/mozilla_navigatorjava"
"CVE-2008-4696","multi/browser/opera_historysearch"
"CVE-2007-2175","multi/browser/qtjava_pointer"
"CVE-2014-3120","multi/elasticsearch/script_mvel_rce"
"CVE-2015-1427","multi/elasticsearch/search_groovy_script"
"CVE-2009-2990","multi/fileformat/adobe_u3d_meshcont"
"CVE-2013-4660","multi/fileformat/nodejs_js_yaml_load_code_exec"
"CVE-2009-2261","multi/fileformat/peazip_command_injection"
"CVE-2014-6271","multi/ftp/pureftpd_bash_env_exec"
"CVE-2000-0573","multi/ftp/wuftpd_site_exec_format"
"CVE-2012-6554","multi/http/activecollab_chat"
"CVE-2014-6271","multi/http/apache_mod_cgi_bash_env_exec"
"CVE-2014-6278","multi/http/apache_mod_cgi_bash_env_exec"
"CVE-2013-4212","multi/http/apache_roller_ognl_injection"
"CVE-2012-1153","multi/http/apprain_upload_exec"
"CVE-2010-0219","multi/http/axis2_deployer"
"CVE-2013-5486","multi/http/cisco_dcnm_upload"
"CVE-2013-0632","multi/http/coldfusion_rds"
"CVE-2014-6271","multi/http/cups_bash_env_exec"
"CVE-2014-6278","multi/http/cups_bash_env_exec"
"CVE-2014-3704","multi/http/drupal_drupageddon"
"CVE-2014-6037","multi/http/eventlog_file_upload"
"CVE-2011-5130","multi/http/familycms_less_exec"
"CVE-2014-9390","multi/http/git_client_command_exec"
"CVE-2013-4490","multi/http/gitlab_shell_exec"
"CVE-2011-0807","multi/http/glassfish_deployer"
"CVE-2013-5696","multi/http/glpi_install_rce"
"CVE-2012-0209","multi/http/horde_href_backdoor"
"CVE-2013-4835","multi/http/hp_sitescope_issuesiebelcmd"
"CVE-2013-3576","multi/http/hp_sys_mgmt_exec"
"CVE-2013-3629","multi/http/ispconfig_php_exec"
"CVE-2010-0738","multi/http/jboss_bshdeployer"
"CVE-2010-0738","multi/http/jboss_deploymentfilerepository"
"CVE-2007-1036","multi/http/jboss_invoke_deploy"
"CVE-2007-1036","multi/http/jboss_maindeployer"
"CVE-2010-0738","multi/http/jboss_maindeployer"
"CVE-2010-1871","multi/http/jboss_seam_upload_exec"
"CVE-2011-4825","multi/http/log1cms_ajax_create_folder"
"CVE-2014-3996","multi/http/manage_engine_dc_pmp_sqli"
"CVE-2014-5301","multi/http/manageengine_auth_upload"
"CVE-2014-7146","multi/http/mantisbt_php_exec"
"CVE-2014-8598","multi/http/mantisbt_php_exec"
"CVE-2014-1610","multi/http/mediawiki_thumb"
"CVE-2013-3630","multi/http/moodle_cmd_exec"
"CVE-2012-6315","multi/http/movabletype_upgrade_exec"
"CVE-2013-0209","multi/http/movabletype_upgrade_exec"
"CVE-2012-3001","multi/http/mutiny_subnetmask_exec"
"CVE-2013-3631","multi/http/nas4free_php_exec"
"CVE-2012-0261","multi/http/op5_license"
"CVE-2012-0262","multi/http/op5_welcome"
"CVE-2008-6508","multi/http/openfire_auth_bypass"
"CVE-2013-3632","multi/http/openmediavault_cmd_exec"
"CVE-2013-4211","multi/http/openx_backdoor_php"
"CVE-2014-6034","multi/http/opmanager_socialit_file_upload"
"CVE-2012-3152","multi/http/oracle_reports_rce"
"CVE-2012-3153","multi/http/oracle_reports_rce"
"CVE-2010-4279","multi/http/pandora_upload_exec"
"CVE-2012-1823","multi/http/php_cgi_arg_injection"
"CVE-2011-4075","multi/http/phpldapadmin_query_engine"
"CVE-2015-2208","multi/http/phpmoadmin_exec"
"CVE-2012-5159","multi/http/phpmyadmin_3522_backdoor"
"CVE-2013-3238","multi/http/phpmyadmin_preg_replace"
"CVE-2008-6132","multi/http/phpscheduleit_start_date"
"CVE-2014-5519","multi/http/phpwiki_ploticus_exec"
"CVE-2011-3587","multi/http/plone_popen2"
"CVE-2011-4453","multi/http/pmwiki_pagelist"
"CVE-2013-0803","multi/http/polarcms_upload_exec"
"CVE-2013-0333","multi/http/rails_json_yaml_code_exec"
"CVE-2013-0156","multi/http/rails_xml_yaml_code_exec"
"CVE-2014-3914","multi/http/rocket_servergraph_file_requestor_rce"
"CVE-2011-3829","multi/http/sit_file_upload"
"CVE-2011-3833","multi/http/sit_file_upload"
"CVE-2013-1359","multi/http/sonicwall_gms_upload"
"CVE-2011-4642","multi/http/splunk_mappy_exec"
"CVE-2010-1870","multi/http/struts_code_exec"
"CVE-2014-0094","multi/http/struts_code_exec_classloader"
"CVE-2014-0112","multi/http/struts_code_exec_classloader"
"CVE-2014-0114","multi/http/struts_code_exec_classloader"
"CVE-2012-0391","multi/http/struts_code_exec_exception_delegator"
"CVE-2011-3923","multi/http/struts_code_exec_parameters"
"CVE-2013-2251","multi/http/struts_default_action_mapper"
"CVE-2012-0394","multi/http/struts_dev_mode"
"CVE-2013-2115","multi/http/struts_include_params"
"CVE-2013-1966","multi/http/struts_include_params"
"CVE-2010-0361","multi/http/sun_jsws_dav_options"
"CVE-2009-3843","multi/http/tomcat_mgr_deploy"
"CVE-2009-4189","multi/http/tomcat_mgr_deploy"
"CVE-2009-4188","multi/http/tomcat_mgr_deploy"
"CVE-2010-0557","multi/http/tomcat_mgr_deploy"
"CVE-2010-4094","multi/http/tomcat_mgr_deploy"
"CVE-2009-3548","multi/http/tomcat_mgr_deploy"
"CVE-2009-3843","multi/http/tomcat_mgr_upload"
"CVE-2009-4189","multi/http/tomcat_mgr_upload"
"CVE-2009-4188","multi/http/tomcat_mgr_upload"
"CVE-2010-0557","multi/http/tomcat_mgr_upload"
"CVE-2010-4094","multi/http/tomcat_mgr_upload"
"CVE-2009-3548","multi/http/tomcat_mgr_upload"
"CVE-2014-8516","multi/http/visual_mining_netcharts_upload"
"CVE-2014-2268","multi/http/vtiger_install_rce"
"CVE-2013-3591","multi/http/vtiger_php_exec"
"CVE-2013-3214","multi/http/vtiger_soap_upload"
"CVE-2013-3215","multi/http/vtiger_soap_upload"
"CVE-2011-4451","multi/http/wikka_spam_exec"
"CVE-2013-3628","multi/http/zabbix_script_exec"
"CVE-2015-0779","multi/http/zenworks_configuration_management_upload"
"CVE-2013-1080","multi/http/zenworks_control_center_upload"
"CVE-2006-5276","multi/ids/snort_dce_rpc"
"CVE-2012-4361","multi/misc/hp_vsa_exec"
"CVE-2001-0311","multi/misc/openview_omniback_exec"
"CVE-2015-1497","multi/misc/persistent_hpca_radexec_exec"
"CVE-2004-1389","multi/misc/veritas_netbackup_cmdexec"
"CVE-2010-0304","multi/misc/wireshark_lwres_getaddrbyname"
"CVE-2010-0304","multi/misc/wireshark_lwres_getaddrbyname_loop"
"CVE-2001-0414","multi/ntp/ntp_overflow"
"CVE-2007-1286","multi/php/php_unserialize_zval_cookie"
"CVE-2002-1643","multi/realserver/describe"
"CVE-2002-1318","multi/samba/nttrans"
"CVE-2007-2447","multi/samba/usermap_script"
"CVE-1999-0502","multi/ssh/sshexec"
"CVE-2004-0397","multi/svn/svnserve_date"
"CVE-2012-5958","multi/upnp/libupnp_ssdp_overflow"
"CVE-2013-1428","multi/vpn/tincd_bof"
"CVE-2009-0695","multi/wyse/hagent_untrusted_hsdata"
"CVE-2005-2852","netware/smb/lsass_cifs"
"CVE-2004-0430","osx/afp/loginext"
"CVE-2005-0491","osx/arkeia/type77"
"CVE-2011-0065","osx/browser/mozilla_mchannel"
"CVE-2011-3230","osx/browser/safari_file_policy"
"CVE-2006-0848","osx/browser/safari_metadata_archive"
"CVE-2007-5863","osx/browser/software_update"
"CVE-2006-0395","osx/email/mailapp_image_exec"
"CVE-2007-6165","osx/email/mailapp_image_exec"
"CVE-2004-0695","osx/ftp/webstar_ftp_user"
"CVE-2010-2309","osx/http/evocam_webserver"
"CVE-2014-4404","osx/local/iokit_keyboard_root"
"CVE-2015-1130","osx/local/rootpipe"
"CVE-2012-3485","osx/local/setuid_tunnelblick"
"CVE-2012-4284","osx/local/setuid_viscosity"
"CVE-2013-1775","osx/local/sudo_password_bypass"
"CVE-2014-6271","osx/local/vmware_bash_function_root"
"CVE-2007-2386","osx/mdns/upnp_location"
"CVE-2007-6166","osx/rtsp/quicktime_rtsp_content_type"
"CVE-2007-2446","osx/samba/lsa_transnames_heap"
"CVE-2003-0201","osx/samba/trans2open"
"CVE-2001-0803","solaris/dtspcd/heap_noir"
"CVE-2001-1583","solaris/lpd/sendmail_exec"
"CVE-2007-2446","solaris/samba/lsa_transnames_heap"
"CVE-2003-0201","solaris/samba/trans2open"
"CVE-2008-4556","solaris/sunrpc/sadmind_adm_build_path"
"CVE-2003-0722","solaris/sunrpc/sadmind_exec"
"CVE-1999-0209","solaris/sunrpc/ypupdated_exec"
"CVE-2007-0882","solaris/telnet/fuser"
"CVE-2001-0797","solaris/telnet/ttyprompt"
"CVE-2014-6271","unix/dhcp/bash_environment"
"CVE-2015-3306","unix/ftp/proftpd_modcopy_exec"
"CVE-2011-5010","unix/http/ctek_skyrouter"
"CVE-2012-4869","unix/http/freepbx_callmenum"
"CVE-2011-2763","unix/http/lifesize_room"
"CVE-2014-7236","unix/http/twiki_debug_plugins"
"CVE-2014-5073","unix/http/vmturbo_vmtadmin_exec_noauth"
"CVE-2010-2075","unix/irc/unreal_ircd_3281_backdoor"
"CVE-2004-2687","unix/misc/distcc_exec"
"CVE-2006-2447","unix/misc/spamassassin_exec"
"CVE-2009-4502","unix/misc/zabbix_agent_exec"
"CVE-2007-4560","unix/smtp/clamav_milter_blackhole"
"CVE-2010-4344","unix/smtp/exim4_string_format"
"CVE-2010-4345","unix/smtp/exim4_string_format"
"CVE-2012-5975","unix/ssh/tectia_passwd_changereq"
"CVE-2005-0116","unix/webapp/awstats_configdir_exec"
"CVE-2006-2237","unix/webapp/awstats_migrate_exec"
"CVE-2008-3922","unix/webapp/awstatstotals_multisort"
"CVE-2005-2847","unix/webapp/barracuda_img_exec"
"CVE-2006-2685","unix/webapp/base_qry_common"
"CVE-2010-4335","unix/webapp/cakephp_cache_corruption"
"CVE-2010-4566","unix/webapp/citrix_access_gateway_exec"
"CVE-2008-0506","unix/webapp/coppermine_piceditor"
"CVE-2013-1412","unix/webapp/datalife_preview_exec"
"CVE-2012-6329","unix/webapp/foswiki_maketext"
"CVE-2014-1903","unix/webapp/freepbx_config_exec"
"CVE-2005-3757","unix/webapp/google_proxystylesheet_exec"
"CVE-2013-5093","unix/webapp/graphite_pickle_exec"
"CVE-1999-1053","unix/webapp/guestbook_ssi_exec"
"CVE-2011-4542","unix/webapp/hastymail_exec"
"CVE-2014-1691","unix/webapp/horde_unserialize_exec"
"CVE-2012-5692","unix/webapp/invision_pboard_unserialize_exec"
"CVE-2014-7228","unix/webapp/joomla_akeeba_unserialize"
"CVE-2013-5576","unix/webapp/joomla_media_upload_exec"
"CVE-2011-4908","unix/webapp/joomla_tinybrowser"
"CVE-2015-1587","unix/webapp/maarch_letterbox_file_upload"
"CVE-2008-2905","unix/webapp/mambo_cache_lite"
"CVE-2012-6081","unix/webapp/moinmoin_twikidraw"
"CVE-2012-6096","unix/webapp/nagios3_history_cgi"
"CVE-2009-2288","unix/webapp/nagios3_statuswml_ping"
"CVE-2009-4140","unix/webapp/open_flash_chart_upload_exec"
"CVE-2013-1349","unix/webapp/opensis_modname_exec"
"CVE-2005-2773","unix/webapp/openview_connectednodes_exec"
"CVE-2009-4098","unix/webapp/openx_banner_edit"
"CVE-2010-3585","unix/webapp/oracle_vm_agent_utl"
"CVE-2006-1551","unix/webapp/pajax_remote_exec"
"CVE-2005-0511","unix/webapp/php_vbulletin_template"
"CVE-2014-6446","unix/webapp/php_wordpress_infusionsoft"
"CVE-2005-2612","unix/webapp/php_wordpress_lastpost"
"CVE-2013-2010","unix/webapp/php_wordpress_total_cache"
"CVE-2005-1921","unix/webapp/php_xmlrpc_eval"
"CVE-2005-2086","unix/webapp/phpbb_highlight"
"CVE-2004-1315","unix/webapp/phpbb_highlight"
"CVE-2009-1151","unix/webapp/phpmyadmin_config"
"CVE-2003-0050","unix/webapp/qtss_parse_xml_exec"
"CVE-2011-4929","unix/webapp/redmine_scm_exec"
"CVE-2008-5191","unix/webapp/seportal_sqli_exec"
"CVE-2015-1592","unix/webapp/sixapart_movabletype_storable_exec"
"CVE-2014-1683","unix/webapp/skybluecanvas_exec"
"CVE-2005-2733","unix/webapp/sphpblog_file_upload"
"CVE-2013-5036","unix/webapp/squash_yaml_exec"
"CVE-2003-0990","unix/webapp/squirrelmail_pgp_plugin"
"CVE-2012-0694","unix/webapp/sugarcrm_unserialize_exec"
"CVE-2007-5423","unix/webapp/tikiwiki_graph_formula_exec"
"CVE-2006-4602","unix/webapp/tikiwiki_jhot_exec"
"CVE-2012-0911","unix/webapp/tikiwiki_unserialize_exec"
"CVE-2008-6825","unix/webapp/trixbox_langchoice"
"CVE-2014-8791","unix/webapp/tuleap_unserialize_exec"
"CVE-2005-2877","unix/webapp/twiki_history"
"CVE-2012-6329","unix/webapp/twiki_maketext"
"CVE-2004-1037","unix/webapp/twiki_search"
"CVE-2013-3522","unix/webapp/vbulletin_vote_sqli_exec"
"CVE-2013-4467","unix/webapp/vicidial_manager_send_cmd_exec"
"CVE-2013-4468","unix/webapp/vicidial_manager_send_cmd_exec"
"CVE-2012-2982","unix/webapp/webmin_show_cgi_exec"
"CVE-2012-4915","unix/webapp/wp_google_document_embedder_exec"
"CVE-2015-1172","unix/webapp/wp_holding_pattern_file_upload"
"CVE-2014-6446","unix/webapp/wp_infusionsoft_upload"
"CVE-2005-2612","unix/webapp/wp_lastpost_exec"
"CVE-2014-9312","unix/webapp/wp_photo_gallery_unrestricted_file_upload"
"CVE-2014-5460","unix/webapp/wp_slideshowgallery_upload"
"CVE-2013-2010","unix/webapp/wp_total_cache_exec"
"CVE-2013-7091","unix/webapp/zimbra_lfi"
"CVE-2013-0232","unix/webapp/zoneminder_packagecontrol_exec"
"CVE-2009-1429","windows/antivirus/ams_xfr"
"CVE-2013-5014","windows/antivirus/symantec_endpoint_manager_rce"
"CVE-2013-5015","windows/antivirus/symantec_endpoint_manager_rce"
"CVE-2009-1430","windows/antivirus/symantec_iao"
"CVE-2006-2630","windows/antivirus/symantec_rtvscan"
"CVE-2014-1649","windows/antivirus/symantec_workspace_streaming_exec"
"CVE-2007-1070","windows/antivirus/trendmicro_serverprotect"
"CVE-2007-2508","windows/antivirus/trendmicro_serverprotect_createbinding"
"CVE-2007-2508","windows/antivirus/trendmicro_serverprotect_earthagent"
"CVE-2005-0491","windows/arkeia/type77"
"CVE-2010-0103","windows/backdoor/energizer_duo_payload"
"CVE-2004-1172","windows/backupexec/name_service"
"CVE-2005-0773","windows/backupexec/remote_agent"
"CVE-2008-4397","windows/brightstor/ca_arcserve_342"
"CVE-2005-2535","windows/brightstor/discovery_tcp"
"CVE-2005-0260","windows/brightstor/discovery_udp"
"CVE-2007-4620","windows/brightstor/etrust_itm_alert"
"CVE-2007-5082","windows/brightstor/hsmserver"
"CVE-2007-0449","windows/brightstor/lgserver"
"CVE-2007-3216","windows/brightstor/lgserver_multi"
"CVE-2007-5003","windows/brightstor/lgserver_rxrlogin"
"CVE-2007-3216","windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter"
"CVE-2007-3216","windows/brightstor/lgserver_rxsuselicenseini"
"CVE-2005-0581","windows/brightstor/license_gcr"
"CVE-2007-2139","windows/brightstor/mediasrv_sunrpc"
"CVE-2007-0169","windows/brightstor/message_engine"
"CVE-2006-5143","windows/brightstor/message_engine_heap"
"CVE-2005-1272","windows/brightstor/sql_agent"
"CVE-2006-6076","windows/brightstor/tape_engine"
"CVE-2005-1018","windows/brightstor/universal_agent"
"CVE-2010-2883","windows/browser/adobe_cooltype_sing"
"CVE-2014-0497","windows/browser/adobe_flash_avm2"
"CVE-2014-0569","windows/browser/adobe_flash_casi32_int_overflow"
"CVE-2014-0556","windows/browser/adobe_flash_copy_pixels_to_byte_array"
"CVE-2015-0359","windows/browser/adobe_flash_domain_memory_uaf"
"CVE-2013-5331","windows/browser/adobe_flash_filters_type_confusion"
"CVE-2012-0754","windows/browser/adobe_flash_mp4_cprt"
"CVE-2015-0336","windows/browser/adobe_flash_net_connection_confusion"
"CVE-2012-1535","windows/browser/adobe_flash_otf_font"
"CVE-2015-0318","windows/browser/adobe_flash_pcre"
"CVE-2014-0515","windows/browser/adobe_flash_pixel_bender_bof"
"CVE-2013-0634","windows/browser/adobe_flash_regex_value"
"CVE-2012-0779","windows/browser/adobe_flash_rtmp"
"CVE-2011-2140","windows/browser/adobe_flash_sps"
"CVE-2015-0311","windows/browser/adobe_flash_uncompress_zlib_uaf"
"CVE-2014-8440","windows/browser/adobe_flash_uncompress_zlib_uninitialized"
"CVE-2015-0313","windows/browser/adobe_flash_worker_byte_array_uaf"
"CVE-2011-2110","windows/browser/adobe_flashplayer_arrayindexing"
"CVE-2011-0609","windows/browser/adobe_flashplayer_avm"
"CVE-2011-0611","windows/browser/adobe_flashplayer_flash10o"
"CVE-2010-1297","windows/browser/adobe_flashplayer_newfunction"
"CVE-2009-3459","windows/browser/adobe_flatedecode_predictor02"
"CVE-2009-0927","windows/browser/adobe_geticon"
"CVE-2009-0658","windows/browser/adobe_jbig2decode"
"CVE-2009-4324","windows/browser/adobe_media_newplayer"
"CVE-2010-3653","windows/browser/adobe_shockwave_rcsl_corruption"
"CVE-2013-3346","windows/browser/adobe_toolbutton"
"CVE-2008-2992","windows/browser/adobe_utilprintf"
"CVE-2014-2364","windows/browser/advantech_webaccess_dvs_getcolor"
"CVE-2004-0636","windows/browser/aim_goaway"
"CVE-2009-0323","windows/browser/amaya_bdo"
"CVE-2006-5650","windows/browser/aol_icq_downloadagent"
"CVE-2005-0043","windows/browser/apple_itunes_playlist"
"CVE-2010-1818","windows/browser/apple_quicktime_marshaled_punk"
"CVE-2012-3753","windows/browser/apple_quicktime_mime_type"
"CVE-2013-1017","windows/browser/apple_quicktime_rdrf"
"CVE-2007-0015","windows/browser/apple_quicktime_rtsp"
"CVE-2010-1799","windows/browser/apple_quicktime_smil_debug"
"CVE-2012-3752","windows/browser/apple_quicktime_texml_font_table"
"CVE-2007-5107","windows/browser/ask_shortformat"
"CVE-2012-4924 ","windows/browser/asus_net4switch_ipswcom"
"CVE-2009-4588","windows/browser/awingsoft_web3d_bof"
"CVE-2009-4850","windows/browser/awingsoft_winds3d_sceneurl"
"CVE-2009-1612","windows/browser/baofeng_storm_onbeforevideodownload"
"CVE-2007-3435","windows/browser/barcode_ax49"
"CVE-2008-2683","windows/browser/blackice_downloadimagefileurl"
"CVE-2008-2551","windows/browser/c6_messenger_downloaderactivex"
"CVE-2008-1472","windows/browser/ca_brightstor_addcolumn"
"CVE-2008-5002","windows/browser/chilkat_crypt_writefile"
"CVE-2011-2039","windows/browser/cisco_anyconnect_exec"
"CVE-2012-0284","windows/browser/cisco_playerpt_setsource_surl"
"CVE-2011-2882","windows/browser/citrix_gateway_actx"
"CVE-2012-0708","windows/browser/clear_quest_cqole"
"CVE-2008-0955","windows/browser/creative_software_cachefolder"
"CVE-2010-2590","windows/browser/crystal_reports_printcontrol"
"CVE-2009-2011","windows/browser/dxstudio_player_exec"
"CVE-2007-4466","windows/browser/ea_checkrequirements"
"CVE-2007-2919","windows/browser/ebook_flipviewer_fviewerloading"
"CVE-2008-4830","windows/browser/enjoysapgui_comp_download"
"CVE-2007-3605","windows/browser/enjoysapgui_preparetoposthtml"
"CVE-2008-5711","windows/browser/facebook_extractiptc"
"CVE-2014-2206","windows/browser/getgodm_http_response_bof"
"CVE-2007-5779","windows/browser/gom_openurl"
"CVE-2013-0108","windows/browser/honeywell_hscremotedeploy_exec"
"CVE-2011-4786","windows/browser/hp_easy_printer_care_xmlcachemgr"
"CVE-2011-2404","windows/browser/hp_easy_printer_care_xmlsimpleaccessor"
"CVE-2008-0492","windows/browser/hp_loadrunner_addfile"
"CVE-2007-6530","windows/browser/hp_loadrunner_addfolder"
"CVE-2013-2370","windows/browser/hp_loadrunner_writefilebinary"
"CVE-2013-4798","windows/browser/hp_loadrunner_writefilestring"
"CVE-2007-1819","windows/browser/hpmqc_progcolor"
"CVE-2010-0679","windows/browser/hyleos_chemviewx_activex"
"CVE-2012-5946","windows/browser/ibm_spss_c1sizer"
"CVE-2012-0198","windows/browser/ibm_tivoli_pme_activex_bof"
"CVE-2009-0215","windows/browser/ibmegath_getxmlvalue"
"CVE-2007-4474","windows/browser/ibmlotusdomino_dwa_uploadmodule"
"CVE-2012-4792","windows/browser/ie_cbutton_uaf"
"CVE-2013-1347","windows/browser/ie_cgenericelement_uaf"
"CVE-2006-0003","windows/browser/ie_createobject"
"CVE-2006-4704","windows/browser/ie_createobject"
"CVE-2012-4969","windows/browser/ie_execcommand_uaf"
"CVE-2006-1016","windows/browser/ie_iscomponentinstalled"
"CVE-2013-3893","windows/browser/ie_setmousecapture_uaf"
"CVE-2011-0340","windows/browser/indusoft_issymbol_internationalseparator"
"CVE-2012-2175","windows/browser/inotes_dwa85w_bof"
"CVE-2012-5896","windows/browser/intrust_annotatex_add"
"CVE-2010-3563","windows/browser/java_basicservice_impl"
"CVE-2013-1493","windows/browser/java_cmm"
"CVE-2010-4452","windows/browser/java_codebase_trust"
"CVE-2010-3552","windows/browser/java_docbase_bof"
"CVE-2010-0842","windows/browser/java_mixer_sequencer"
"CVE-2010-0886","windows/browser/java_ws_arginject_altjvm"
"CVE-2010-1423","windows/browser/java_ws_arginject_altjvm"
"CVE-2012-1533","windows/browser/java_ws_double_quote"
"CVE-2012-0500","windows/browser/java_ws_vmargs"
"CVE-2006-2086","windows/browser/juniper_sslvpn_ive_setupdll"
"CVE-2007-5217","windows/browser/kazaa_altnet_heap"
"CVE-2012-2516","windows/browser/keyhelp_launchtripane_exec"
"CVE-2007-2918","windows/browser/logitechvideocall_start"
"CVE-2008-4384","windows/browser/lpviewer_url"
"CVE-2007-5660","windows/browser/macrovision_downloadandexecute"
"CVE-2007-5660","windows/browser/macrovision_unsafe"
"CVE-2014-4936","windows/browser/malwarebytes_update_exec"
"CVE-2006-3961","windows/browser/mcafee_mcsubmgr_vsprintf"
"CVE-2012-4598","windows/browser/mcafee_mvt_exec"
"CVE-2006-6707","windows/browser/mcafeevisualtrace_tracetarget"
"CVE-2003-1336","windows/browser/mirc_irc_url"
"CVE-2011-3659","windows/browser/mozilla_attribchildremoved"
"CVE-2013-1690","windows/browser/mozilla_firefox_onreadystatechange"
"CVE-2013-0753","windows/browser/mozilla_firefox_xmlserializer"
"CVE-2010-3765","windows/browser/mozilla_interleaved_write"
"CVE-2011-0065","windows/browser/mozilla_mchannel"
"CVE-2011-3658","windows/browser/mozilla_nssvgvalue"
"CVE-2011-0073","windows/browser/mozilla_nstreerange"
"CVE-2011-2371","windows/browser/mozilla_reduceright"
"CVE-2003-0344","windows/browser/ms03_020_ie_objecttype"
"CVE-2005-1790","windows/browser/ms05_054_onload"
"CVE-2005-4560","windows/browser/ms06_001_wmf_setabortproc"
"CVE-2006-1359","windows/browser/ms06_013_createtextrange"
"CVE-2006-4868","windows/browser/ms06_055_vml_method"
"CVE-2006-3730","windows/browser/ms06_057_webview_setslice"
"CVE-2006-4777","windows/browser/ms06_067_keyframe"
"CVE-2006-5745","windows/browser/ms06_071_xml_core"
"CVE-2007-0038","windows/browser/ms07_017_ani_loadimage_chunksize"
"CVE-2008-2463","windows/browser/ms08_041_snapshotviewer"
"CVE-2008-3008","windows/browser/ms08_053_mediaencoder"
"CVE-2008-3704","windows/browser/ms08_070_visual_studio_msmask"
"CVE-2008-4844","windows/browser/ms08_078_xml_corruption"
"CVE-2009-0075","windows/browser/ms09_002_memory_corruption"
"CVE-2009-1534","windows/browser/ms09_043_owc_htmlurl"
"CVE-2009-1136","windows/browser/ms09_043_owc_msdso"
"CVE-2009-3672","windows/browser/ms09_072_style_object"
"CVE-2010-0249","windows/browser/ms10_002_aurora"
"CVE-2010-0248","windows/browser/ms10_002_ie_object"
"CVE-2010-0806","windows/browser/ms10_018_ie_behaviors"
"CVE-2010-0805","windows/browser/ms10_018_ie_tabular_activex"
"CVE-2010-0483","windows/browser/ms10_022_ie_vbscript_winhlp32"
"CVE-2010-0480","windows/browser/ms10_026_avi_nsamplespersec"
"CVE-2010-1885","windows/browser/ms10_042_helpctr_xss_cmd_exec"
"CVE-2010-2568","windows/browser/ms10_046_shortcut_icon_dllloader"
"CVE-2010-3962","windows/browser/ms10_090_ie_css_clip"
"CVE-2010-3971","windows/browser/ms11_003_ie_css_import"
"CVE-2011-1260","windows/browser/ms11_050_mshtml_cobjectelement"
"CVE-2011-1996","windows/browser/ms11_081_option"
"CVE-2011-3400","windows/browser/ms11_093_ole32"
"CVE-2012-0003","windows/browser/ms12_004_midi"
"CVE-2012-1876","windows/browser/ms12_037_ie_colspan"
"CVE-2012-1875","windows/browser/ms12_037_same_id"
"CVE-2013-0025","windows/browser/ms13_009_ie_slayoutrun_uaf"
"CVE-2013-0074","windows/browser/ms13_022_silverlight_script_object"
"CVE-2013-3896","windows/browser/ms13_022_silverlight_script_object"
"CVE-2013-2551","windows/browser/ms13_037_svg_dashstyle"
"CVE-2013-3163","windows/browser/ms13_055_canchor"
"CVE-2013-3184","windows/browser/ms13_059_cflatmarkuppointer"
"CVE-2013-3205","windows/browser/ms13_069_caret"
"CVE-2013-3897","windows/browser/ms13_080_cdisplaypointer"
"CVE-2013-3918","windows/browser/ms13_090_cardspacesigninhelper"
"CVE-2014-0322","windows/browser/ms14_012_cmarkup_uaf"
"CVE-2014-0307","windows/browser/ms14_012_textrange"
"CVE-2014-6332","windows/browser/ms14_064_ole_code_execution"
"CVE-2008-0015","windows/browser/msvidctl_mpeg2"
"CVE-2007-2238","windows/browser/mswhale_checkforupdates"
"CVE-2012-1889","windows/browser/msxml_get_definition_code_exec"
"CVE-2007-0018","windows/browser/nctaudiofile2_setformatlikesample"
"CVE-2004-0363","windows/browser/nis2004_antispam"
"CVE-2007-1689","windows/browser/nis2004_get"
"CVE-2012-2174","windows/browser/notes_handler_cmdinject"
"CVE-2012-0439","windows/browser/novell_groupwise_gwcls1_actvx"
"CVE-2010-1527","windows/browser/novelliprint_callbackurl"
"CVE-2009-1569","windows/browser/novelliprint_datetime"
"CVE-2008-0935","windows/browser/novelliprint_executerequest"
"CVE-2010-3106","windows/browser/novelliprint_executerequest_dbg"
"CVE-2008-2908","windows/browser/novelliprint_getdriversettings"
"CVE-2010-4321","windows/browser/novelliprint_getdriversettings_2"
"CVE-2009-1568","windows/browser/novelliprint_target_frame"
"CVE-2012-0266","windows/browser/ntr_activex_check_bof"
"CVE-2012-0267","windows/browser/ntr_activex_stopmodule"
"CVE-2012-0549","windows/browser/oracle_autovue_setmarkupmode"
"CVE-2007-4607","windows/browser/oracle_dc_submittoexpress"
"CVE-2013-1559","windows/browser/oracle_webcenter_checkoutandopen"
"CVE-2009-0187","windows/browser/orbit_connecting"
"CVE-2012-3569","windows/browser/ovftool_format_string"
"CVE-2011-4044","windows/browser/pcvue_func"
"CVE-2009-3693","windows/browser/persits_xupload_traversal"
"CVE-2012-2176","windows/browser/quickr_qp2_bof"
"CVE-2010-3747","windows/browser/realplayer_cdda_uri"
"CVE-2008-1309","windows/browser/realplayer_console"
"CVE-2007-5601","windows/browser/realplayer_import"
"CVE-2011-2950","windows/browser/realplayer_qcp"
"CVE-2005-0455","windows/browser/realplayer_smil"
"CVE-2007-1559","windows/browser/roxio_cineplayer"
"CVE-2011-1774","windows/browser/safari_xslt_output"
"CVE-2012-4333","windows/browser/samsung_neti_wiewer_backuptoavi_bof"
"CVE-2007-4475","windows/browser/sapgui_saveviewtosessionfile"
"CVE-2007-1682","windows/browser/softartisans_getdrivename"
"CVE-2007-5603","windows/browser/sonicwall_addrouteentry"
"CVE-2009-3028","windows/browser/symantec_altirisdeployment_downloadandinstall"
"CVE-2009-3033","windows/browser/symantec_altirisdeployment_runcmd"
"CVE-2008-4388","windows/browser/symantec_appstream_unsafe"
"CVE-2007-6016","windows/browser/symantec_backupexec_pvcalendar"
"CVE-2009-3031","windows/browser/symantec_consoleutilities_browseandsavefile"
"CVE-2008-4385","windows/browser/systemrequirementslab_unsafe"
"CVE-2011-2217","windows/browser/tom_sawyer_tsgetx71ex552"
"CVE-2010-3189","windows/browser/trendmicro_extsetowner"
"CVE-2007-0325","windows/browser/trendmicro_officescan"
"CVE-2008-1724","windows/browser/tumbleweed_filetransfer"
"CVE-2012-4177","windows/browser/ubisoft_uplay_cmd_exec"
"CVE-2012-4876","windows/browser/ultramjcam_openfiledig_bof"
"CVE-2008-3878","windows/browser/ultraoffice_httpupload"
"CVE-2008-5492","windows/browser/verypdf_pdfview"
"CVE-2010-0356","windows/browser/viscom_movieplayer_drawtext"
"CVE-2010-3275","windows/browser/vlc_amv"
"CVE-2012-1775","windows/browser/vlc_mms_bof"
"CVE-2008-3558","windows/browser/webex_ucf_newobject"
"CVE-2013-2827","windows/browser/wellintech_kingscada_kxclientdownload"
"CVE-2006-0476","windows/browser/winamp_playlist_unc"
"CVE-2008-0065","windows/browser/winamp_ultravox"
"CVE-2007-0348","windows/browser/windvd7_applicationtype"
"CVE-2006-5198","windows/browser/winzip_fileview"
"CVE-2010-3973","windows/browser/wmi_admintools"
"CVE-2006-6063","windows/browser/xmplay_asx"
"CVE-2007-4515","windows/browser/yahoomessenger_fvcom"
"CVE-2007-3147","windows/browser/yahoomessenger_server"
"CVE-2007-2987","windows/browser/zenturiprogramchecker_unsafe"
"CVE-2011-2657","windows/browser/zenworks_helplauncher_exec"
"CVE-2003-0352","windows/dcerpc/ms03_026_dcom"
"CVE-2005-0059","windows/dcerpc/ms05_017_msmq"
"CVE-2007-1748","windows/dcerpc/ms07_029_msdns_zonename"
"CVE-2007-3039","windows/dcerpc/ms07_065_msmq"
"CVE-2007-0038","windows/email/ms07_017_ani_loadimage_chunksize"
"CVE-2007-1765","windows/email/ms07_017_ani_loadimage_chunksize"
"CVE-2010-0266","windows/email/ms10_045_outlook_ref_only"
"CVE-2010-0266","windows/email/ms10_045_outlook_ref_resolve"
"CVE-2008-2158","windows/emc/alphastor_agent"
"CVE-2013-0928","windows/emc/alphastor_device_manager_exec"
"CVE-2012-2288","windows/emc/networker_format_string"
"CVE-2011-0647","windows/emc/replication_manager_exec"
"CVE-2011-2595","windows/fileformat/acdsee_fotoslate_string"
"CVE-2007-2193","windows/fileformat/acdsee_xpm"
"CVE-2007-5659","windows/fileformat/adobe_collectemailinfo"
"CVE-2010-2883","windows/fileformat/adobe_cooltype_sing"
"CVE-2010-3654","windows/fileformat/adobe_flashplayer_button"
"CVE-2010-1297","windows/fileformat/adobe_flashplayer_newfunction"
"CVE-2009-3459","windows/fileformat/adobe_flatedecode_predictor02"
"CVE-2009-0927","windows/fileformat/adobe_geticon"
"CVE-2009-4195","windows/fileformat/adobe_illustrator_v14_eps"
"CVE-2009-0658","windows/fileformat/adobe_jbig2decode"
"CVE-2010-0188","windows/fileformat/adobe_libtiff"
"CVE-2009-4324","windows/fileformat/adobe_media_newplayer"
"CVE-2010-1240","windows/fileformat/adobe_pdf_embedded_exe"
"CVE-2010-1240","windows/fileformat/adobe_pdf_embedded_exe_nojs"
"CVE-2011-2462","windows/fileformat/adobe_reader_u3d"
"CVE-2013-3346","windows/fileformat/adobe_toolbutton"
"CVE-2009-3953","windows/fileformat/adobe_u3d_meshdecl"
"CVE-2008-2992","windows/fileformat/adobe_utilprintf"
"CVE-2007-3314","windows/fileformat/altap_salamander_pdb"
"CVE-2011-0257","windows/fileformat/apple_quicktime_pnsize"
"CVE-2013-1017","windows/fileformat/apple_quicktime_rdrf"
"CVE-2012-0663","windows/fileformat/apple_quicktime_texml"
"CVE-2009-0476","windows/fileformat/audio_wkstn_pls"
"CVE-2009-0476","windows/fileformat/audiotran_pls"
"CVE-2006-6199","windows/fileformat/blazedvd_plf"
"CVE-2014-2973","windows/fileformat/bpftp_client_bps_bof"
"CVE-2007-2864","windows/fileformat/ca_cab"
"CVE-2008-5405","windows/fileformat/cain_abel_4918_rdp"
"CVE-2013-3928","windows/fileformat/chasys_draw_ies_bmp_bof"
"CVE-2012-4914","windows/fileformat/coolpdf_image_stream_bof"
"CVE-2013-3248","windows/fileformat/corelpdf_fusion_bof"
"CVE-2012-0270","windows/fileformat/csound_getnum_bof"
"CVE-2006-6665","windows/fileformat/deepburner_path"
"CVE-2009-3429","windows/fileformat/destinymediaplayer16"
"CVE-2009-4656","windows/fileformat/djstudio_pls_bof"
"CVE-2008-4922","windows/fileformat/djvu_imageurl"
"CVE-2007-3068","windows/fileformat/dvdx_plf_bof"
"CVE-2010-2343","windows/fileformat/easycdda_pls_bof"
"CVE-2013-0726","windows/fileformat/erdas_er_viewer_bof"
"CVE-2013-3482","windows/fileformat/erdas_er_viewer_rf_report_error"
"CVE-2011-3494","windows/fileformat/esignal_styletemplate_bof"
"CVE-2009-4225","windows/fileformat/etrust_pestscan"
"CVE-2009-1028","windows/fileformat/ezip_wizard_bof"
"CVE-2009-4962","windows/fileformat/fatplayer_wav"
"CVE-2009-0184","windows/fileformat/fdm_torrent"
"CVE-2009-0546","windows/fileformat/feeddemon_opml"
"CVE-2009-0837","windows/fileformat/foxit_reader_launch"
"CVE-2006-0564","windows/fileformat/hhw_hhp_compiledfile_bof"
"CVE-2006-0564","windows/fileformat/hhw_hhp_contentfile_bof"
"CVE-2009-0133","windows/fileformat/hhw_hhp_indexfile_bof"
"CVE-2009-2485","windows/fileformat/ht_mp3player_ht3_bof"
"CVE-2013-5447","windows/fileformat/ibm_forms_viewer_fontname"
"CVE-2012-0201","windows/fileformat/ibm_pcm_ws"
"CVE-2013-4988","windows/fileformat/icofx_bof"
"CVE-2009-4265","windows/fileformat/ideal_migration_ipj"
"CVE-2012-0897","windows/fileformat/irfanview_jpeg2000_bof"
"CVE-2012-4711","windows/fileformat/kingview_kingmess_kvl"
"CVE-2012-2915","windows/fileformat/lattice_pac_bof"
"CVE-2011-1213","windows/fileformat/lotusnotes_lzh"
"CVE-2009-2650","windows/fileformat/mediajukebox"
"CVE-2010-4742","windows/fileformat/moxa_mediadbplayback"
"CVE-2009-3129","windows/fileformat/ms09_067_excel_featheader"
"CVE-2010-0033","windows/fileformat/ms10_004_textbytesatom"
"CVE-2010-0822","windows/fileformat/ms10_038_excel_obj_bof"
"CVE-2010-3333","windows/fileformat/ms10_087_rtf_pfragments_bof"
"CVE-2010-3970","windows/fileformat/ms11_006_createsizeddibsection"
"CVE-2011-0105","windows/fileformat/ms11_021_xlb_bof"
"CVE-2012-0013","windows/fileformat/ms12_005"
"CVE-2012-0158","windows/fileformat/ms12_027_mscomctl_bof"
"CVE-2013-0810","windows/fileformat/ms13_071_theme"
"CVE-2014-1761","windows/fileformat/ms14_017_rtf"
"CVE-2014-4114","windows/fileformat/ms14_060_sandworm"
"CVE-2014-6352","windows/fileformat/ms14_064_packager_python"
"CVE-2014-6352","windows/fileformat/ms14_064_packager_run_as_admin"
"CVE-2015-0096","windows/fileformat/ms15_020_shortcut_icon_dllloader"
"CVE-2007-4776","windows/fileformat/ms_visual_basic_vbp"
"CVE-2013-3906","windows/fileformat/mswin_tiff_overflow"
"CVE-2008-1898","windows/fileformat/msworks_wkspictureinterface"
"CVE-2008-0320","windows/fileformat/openoffice_ole"
"CVE-2008-1602","windows/fileformat/orbit_download_failed_bof"
"CVE-2010-0688","windows/fileformat/orbital_viewer_orb"
"CVE-2012-3569","windows/fileformat/ovf_format_string"
"CVE-2009-3214","windows/fileformat/proshow_cellimage_bof"
"CVE-2014-0980","windows/fileformat/publishit_pui"
"CVE-2012-5691","windows/fileformat/real_player_url_property_bof"
"CVE-2013-7260","windows/fileformat/realplayer_ver_attribute_bof"
"CVE-2009-3861","windows/fileformat/safenet_softremote_groupname"
"CVE-2008-6898","windows/fileformat/sascam_get"
"CVE-2011-4535","windows/fileformat/scadaphone_zip"
"CVE-2008-4779","windows/fileformat/tugzip"
"CVE-2009-1260","windows/fileformat/ultraiso_ccd"
"CVE-2007-2888","windows/fileformat/ultraiso_cue"
"CVE-2005-0308","windows/fileformat/ursoft_w32dasm"
"CVE-2008-4654","windows/fileformat/videolan_tivo"
"CVE-2011-0499","windows/fileformat/videospirit_visprj"
"CVE-2011-0500","windows/fileformat/videospirit_visprj"
"CVE-2010-1681","windows/fileformat/visio_dxf_bof"
"CVE-2011-2386","windows/fileformat/visiwave_vwr_type"
"CVE-2011-1574","windows/fileformat/vlc_modplug_s3m"
"CVE-2008-5036","windows/fileformat/vlc_realtext"
"CVE-2009-2484","windows/fileformat/vlc_smb_uri"
"CVE-2011-0531","windows/fileformat/vlc_webm"
"CVE-2006-6251","windows/fileformat/vuplayer_m3u"
"CVE-2009-1831","windows/fileformat/winamp_maki_bof"
"CVE-2014-2299","windows/fileformat/wireshark_mpeg_overflow"
"CVE-2011-1591","windows/fileformat/wireshark_packet_dect"
"CVE-2008-2789","windows/fileformat/xradio_xrl_sehbof"
"CVE-2004-0964","windows/fileformat/zinfaudioplayer221_pls"
"CVE-2004-0362","windows/firewall/blackice_pam_icq"
"CVE-2003-0220","windows/firewall/kerio_auth"
"CVE-2005-0277","windows/ftp/3cdaemon_ftp_user"
"CVE-2004-1626","windows/ftp/ability_server_stor"
"CVE-2011-5164","windows/ftp/absolute_ftp_list_bof"
"CVE-2006-2961","windows/ftp/cesarftp_mkd"
"CVE-2004-2074","windows/ftp/dreamftp_format"
"CVE-2006-3952","windows/ftp/easyfilesharing_pass"
"CVE-2006-3726","windows/ftp/filecopa_list_overflow"
"CVE-2005-3683","windows/ftp/freeftpd_user"
"CVE-2005-1415","windows/ftp/globalscapeftp_input"
"CVE-2006-6576","windows/ftp/goldenftp_pass_bof"
"CVE-2009-4769","windows/ftp/httpdx_tolog_format"
"CVE-2003-0558","windows/ftp/leapftp_pasv_reply"
"CVE-2009-3023","windows/ftp/ms09_053_ftpd_nlst"
"CVE-2005-1323","windows/ftp/netterm_netftpd_user"
"CVE-2010-2620","windows/ftp/open_ftpd_wbem"
"CVE-2003-0727","windows/ftp/oracle9i_xdb_ftp_pass"
"CVE-2003-0727","windows/ftp/oracle9i_xdb_ftp_unlock"
"CVE-2009-3976","windows/ftp/proftp_banner"
"CVE-2012-5002","windows/ftp/ricoh_dl_bof"
"CVE-2006-0441","windows/ftp/sami_ftpd_user"
"CVE-2006-2212","windows/ftp/sami_ftpd_user"
"CVE-2011-3976","windows/ftp/scriptftp_list"
"CVE-2004-2111","windows/ftp/servu_chmod"
"CVE-2004-0330","windows/ftp/servu_mdtm"
"CVE-2005-2373","windows/ftp/slimftpd_list_concat"
"CVE-2010-1465","windows/ftp/trellian_client_pasv"
"CVE-1999-0256","windows/ftp/warftpd_165_pass"
"CVE-1999-0256","windows/ftp/warftpd_165_user"
"CVE-2006-4318","windows/ftp/wftpd_size"
"CVE-2004-1135","windows/ftp/wsftp_server_503_mkd"
"CVE-2006-4847","windows/ftp/wsftp_server_505_xmd5"
"CVE-2006-5792","windows/ftp/xlink_client"
"CVE-2006-5792","windows/ftp/xlink_server"
"CVE-2004-0735","windows/games/mohaa_getinfo"
"CVE-2007-4370","windows/games/racer_503beta5"
"CVE-2004-0608","windows/games/ut2004_secure"
"CVE-2009-3068","windows/http/adobe_robohelper_authbypass"
"CVE-2008-4193","windows/http/altn_securitygateway"
"CVE-2003-0471","windows/http/altn_webadmin"
"CVE-2002-0392","windows/http/apache_chunked"
"CVE-2006-3747","windows/http/apache_mod_rewrite_ldap"
"CVE-2007-0774","windows/http/apache_modjk_overflow"
"CVE-2012-3811","windows/http/avaya_ccr_imageupload_exec"
"CVE-2005-0595","windows/http/badblue_ext_overflow"
"CVE-2007-6377","windows/http/badblue_passthru"
"CVE-2008-5457","windows/http/bea_weblogic_jsessionid"
"CVE-2008-3257","windows/http/bea_weblogic_post_bof"
"CVE-2008-4008","windows/http/bea_weblogic_transfer_encoding"
"CVE-2010-4417","windows/http/beehive"
"CVE-2011-3011","windows/http/ca_arcserve_rpc_authbypass"
"CVE-2005-3190","windows/http/ca_igateway_debug"
"CVE-2011-1653","windows/http/ca_totaldefense_regeneratereports"
"CVE-2014-3789","windows/http/cogent_datahub_command"
"CVE-2009-2265","windows/http/coldfusion_fckeditor"
"CVE-2013-7390","windows/http/desktopcentral_file_upload"
"CVE-2014-5005","windows/http/desktopcentral_statusupdate_upload"
"CVE-2006-5478","windows/http/edirectory_host"
"CVE-2005-2551","windows/http/edirectory_imonitor"
"CVE-2004-2466","windows/http/efs_easychatserver_username"
"CVE-2012-5357","windows/http/ektron_xslt_exec"
"CVE-2014-3913","windows/http/ericom_access_now_bof"
"CVE-2009-0183","windows/http/fdm_auth_header"
"CVE-2013-6221","windows/http/hp_autopass_license_traversal"
"CVE-2013-4822","windows/http/hp_imc_bims_upload"
"CVE-2012-5201","windows/http/hp_imc_mibfileupload"
"CVE-2013-4837","windows/http/hp_loadrunner_copyfiletoserver"
"CVE-2011-4166","windows/http/hp_mpa_job_acct"
"CVE-2010-1555","windows/http/hp_nnm_getnnmdata_hostname"
"CVE-2010-1554","windows/http/hp_nnm_getnnmdata_icount"
"CVE-2010-1553","windows/http/hp_nnm_getnnmdata_maxage"
"CVE-2011-0266","windows/http/hp_nnm_nnmrptconfig_nameparams"
"CVE-2011-0267","windows/http/hp_nnm_nnmrptconfig_schdparams"
"CVE-2007-6204","windows/http/hp_nnm_openview5"
"CVE-2009-4179","windows/http/hp_nnm_ovalarm_lang"
"CVE-2008-1697","windows/http/hp_nnm_ovas"
"CVE-2011-3167","windows/http/hp_nnm_ovbuildpath_textfile"
"CVE-2009-4178","windows/http/hp_nnm_ovwebhelp"
"CVE-2010-1964","windows/http/hp_nnm_ovwebsnmpsrv_main"
"CVE-2010-1961","windows/http/hp_nnm_ovwebsnmpsrv_ovutil"
"CVE-2010-1960","windows/http/hp_nnm_ovwebsnmpsrv_uro"
"CVE-2009-3849","windows/http/hp_nnm_snmp"
"CVE-2010-1552","windows/http/hp_nnm_snmpviewer_actapp"
"CVE-2008-0067","windows/http/hp_nnm_toolbar_01"
"CVE-2009-0920","windows/http/hp_nnm_toolbar_02"
"CVE-2010-2703","windows/http/hp_nnm_webappmon_execvp"
"CVE-2010-2709","windows/http/hp_nnm_webappmon_ovjavalocale"
"CVE-2011-0276","windows/http/hp_openview_insight_backdoor"
"CVE-2013-4812","windows/http/hp_pcm_snac_update_certificates"
"CVE-2013-4811","windows/http/hp_pcm_snac_update_domain"
"CVE-2009-3999","windows/http/hp_power_manager_filename"
"CVE-2009-2685","windows/http/hp_power_manager_login"
"CVE-2013-2367","windows/http/hp_sitescope_runomagentcommand"
"CVE-2009-3711","windows/http/httpdx_handlepeer"
"CVE-2009-4769","windows/http/httpdx_tolog_format"
"CVE-2003-1192","windows/http/ia_webmail"
"CVE-2011-1220","windows/http/ibm_tivoli_endpoint_bof"
"CVE-2007-1868","windows/http/ibm_tpmfosd_overflow"
"CVE-2007-4880","windows/http/ibm_tsm_cad_header"
"CVE-2004-1561","windows/http/icecast_header"
"CVE-2004-0798","windows/http/ipswitch_wug_maincfgret"
"CVE-2014-2314","windows/http/jira_collector_traversal"
"CVE-2002-2268","windows/http/kolibri_http"
"CVE-2012-1195","windows/http/landesk_thinkmanagement_upload_asp"
"CVE-2012-1196","windows/http/landesk_thinkmanagement_upload_asp"
"CVE-2014-8741","windows/http/lexmark_markvision_gfd_upload"
"CVE-2005-1348","windows/http/mailenable_auth_header"
"CVE-2006-4305","windows/http/maxdb_webdbm_database"
"CVE-2005-0684","windows/http/maxdb_webdbm_get_overflow"
"CVE-2006-5156","windows/http/mcafee_epolicy_source"
"CVE-2003-1200","windows/http/mdaemon_worldclient_form2raw"
"CVE-2004-2271","windows/http/minishare_get_overflow"
"CVE-2006-5112","windows/http/navicopa_get_overflow"
"CVE-2012-1465","windows/http/netdecision_http_bof"
"CVE-2013-1081","windows/http/novell_mdm_lfi"
"CVE-2006-0992","windows/http/novell_messenger_acceptlang"
"CVE-2008-0871","windows/http/nowsms"
"CVE-2003-0727","windows/http/oracle9i_xdb_pass"
"CVE-2013-3763","windows/http/oracle_endeca_exec"
"CVE-2014-2424","windows/http/oracle_event_processing_upload"
"CVE-2010-0904","windows/http/osb_uname_jlist"
"CVE-2006-1148","windows/http/peercast_url"
"CVE-2012-2329","windows/http/php_apache_request_headers_bof"
"CVE-2006-3252","windows/http/privatewire_gateway"
"CVE-2004-0313","windows/http/psoproxy91_overflow"
"CVE-2014-6287","windows/http/rejetto_hfs_exec"
"CVE-2004-2086","windows/http/sambar6_search_results"
"CVE-2007-3614","windows/http/sapdb_webtools"
"CVE-2002-1120","windows/http/savant_31_overflow"
"CVE-2009-4006","windows/http/servu_session_cookie"
"CVE-2004-1373","windows/http/shoutcast_format"
"CVE-2006-5216","windows/http/shttpd_post"
"CVE-2015-2284","windows/http/solarwinds_fsm_userlogin"
"CVE-2012-2962","windows/http/sonicwall_scrutinizer_sqli"
"CVE-2008-0550","windows/http/steamcast_useragent"
"CVE-2005-2297","windows/http/sybase_easerver"
"CVE-2012-6530","windows/http/sysax_create_folder"
"CVE-2005-0478","windows/http/trackercam_phparg_overflow"
"CVE-2014-4872","windows/http/trackit_file_upload"
"CVE-2008-1365","windows/http/trendmicro_officescan"
"CVE-2013-5019","windows/http/ultraminihttp_bof"
"CVE-2013-3520","windows/http/vmware_vcenter_chargeback_upload"
"CVE-2002-2268","windows/http/webster_http"
"CVE-2007-5067","windows/http/xitami_if_mod_since"
"CVE-2011-2653","windows/http/zenworks_assetmgmt_uploadservlet"
"CVE-2001-0241","windows/iis/ms01_023_printer"
"CVE-2001-0333","windows/iis/ms01_026_dbldecode"
"CVE-2001-0500","windows/iis/ms01_033_idq"
"CVE-1999-0874","windows/iis/ms02_018_htr"
"CVE-2002-1142","windows/iis/ms02_065_msadc"
"CVE-2003-0109","windows/iis/ms03_007_ntdll_webdav"
"CVE-1999-1011","windows/iis/msadc"
"CVE-2005-4267","windows/imap/eudora_list"
"CVE-2004-1520","windows/imap/imail_delete"
"CVE-2007-3925","windows/imap/ipswitch_search"
"CVE-2006-6423","windows/imap/mailenable_login"
"CVE-2005-2278","windows/imap/mailenable_status"
"CVE-2005-3155","windows/imap/mailenable_w3c_select"
"CVE-2004-1520","windows/imap/mdaemon_cram_md5"
"CVE-2008-1358","windows/imap/mdaemon_fetch"
"CVE-2006-1255","windows/imap/mercur_imap_select_overflow"
"CVE-2006-1255","windows/imap/mercur_login"
"CVE-2007-1373","windows/imap/mercury_login"
"CVE-2004-1211","windows/imap/mercury_rename"
"CVE-2006-6425","windows/imap/novell_netmail_append"
"CVE-2005-3314","windows/imap/novell_netmail_status"
"CVE-2006-6761","windows/imap/novell_netmail_subscribe"
"CVE-2000-1089","windows/isapi/ms00_094_pbserver"
"CVE-2003-0349","windows/isapi/ms03_022_nsiislog_post"
"CVE-2003-0822","windows/isapi/ms03_051_fp30reg_chunked"
"CVE-2005-4734","windows/isapi/rsa_webagent_redirect"
"CVE-2004-1134","windows/isapi/w3who_query"
"CVE-2004-0297","windows/ldap/imail_thc"
"CVE-2001-1320","windows/ldap/pgp_keyserver7"
"CVE-2005-0581","windows/license/calicclnt_getconfig"
"CVE-2005-0581","windows/license/calicserv_getconfig"
"CVE-2005-0353","windows/license/sentinel_lm7_udp"
"CVE-2013-2730","windows/local/adobe_sandbox_adobecollabsync"
"CVE-2014-4971","windows/local/bthpan"
"CVE-1999-0504","windows/local/current_user_psexec"
"CVE-2015-2219","windows/local/lenovo_systemupdate"
"CVE-2014-4971","windows/local/mqac_write"
"CVE-2010-0232","windows/local/ms10_015_kitrap0d"
"CVE-2010-3338","windows/local/ms10_092_schelevator"
"CVE-2011-2005","windows/local/ms11_080_afdjoinleaf"
"CVE-2013-0008","windows/local/ms13_005_hwnd_broadcast"
"CVE-2013-1300","windows/local/ms13_053_schlamperei"
"CVE-2013-3881","windows/local/ms13_081_track_popup_menu"
"CVE-2013-5045","windows/local/ms13_097_ie_registry_symlink"
"CVE-2014-0257","windows/local/ms14_009_ie_dfsvc"
"CVE-2014-4113","windows/local/ms14_058_track_popup_menu"
"CVE-2014-4076","windows/local/ms14_070_tcpip_ioctl"
"CVE-2015-0016","windows/local/ms15_004_tswbproxy"
"CVE-2015-1701","windows/local/ms15_051_client_copy_image"
"CVE-2013-5065","windows/local/ms_ndproxy"
"CVE-2015-0002","windows/local/ntapphelpcachecontrol"
"CVE-2013-0109","windows/local/nvidia_nvsvc"
"CVE-1999-0504","windows/local/powershell_remoting"
"CVE-2013-3660","windows/local/ppr_flatten_rec"
"CVE-2014-2477","windows/local/virtual_box_guest_additions"
"CVE-2014-0983","windows/local/virtual_box_opengl_escape"
"CVE-1999-0504","windows/local/wmi"
"CVE-2008-2240","windows/lotus/domino_http_accept_language"
"CVE-2010-3407","windows/lotus/domino_icalendar_organizer"
"CVE-2008-2499","windows/lotus/domino_sametime_stmux"
"CVE-2011-1213","windows/lotus/lotusnotes_lzh"
"CVE-2005-1815","windows/lpd/hummingbird_exceed"
"CVE-2003-1141","windows/lpd/niprint"
"CVE-2008-0621","windows/lpd/saplpd"
"CVE-2008-5159","windows/lpd/wincomlpd_admin"
"CVE-2010-1318","windows/misc/agentxpp_receive_agentx"
"CVE-2008-2286","windows/misc/altiris_ds_sqli"
"CVE-2007-6166","windows/misc/apple_quicktime_rtsp_response"
"CVE-2008-1491","windows/misc/asus_dpcproxy_overflow"
"CVE-2011-5003","windows/misc/avidphoneticindexer"
"CVE-2005-1009","windows/misc/bakbone_netvault_heap"
"CVE-2011-5124","windows/misc/bcaaa_bof"
"CVE-2008-1914","windows/misc/bigant_server"
"CVE-2008-1914","windows/misc/bigant_server_250"
"CVE-2012-6274","windows/misc/bigant_server_dupf_upload"
"CVE-2012-6275","windows/misc/bigant_server_sch_dupf_bof"
"CVE-2006-0460","windows/misc/bomberclone_overflow"
"CVE-2009-2227","windows/misc/bopup_comm"
"CVE-2007-3566","windows/misc/borland_interbase"
"CVE-2008-0311","windows/misc/borland_starteam"
"CVE-2008-1661","windows/misc/doubletake"
"CVE-2006-3838","windows/misc/eiqnetworks_esa"
"CVE-2006-3838","windows/misc/eiqnetworks_esa_topology"
"CVE-2011-5227","windows/misc/enterasys_netsight_syslog_bof"
"CVE-2009-3837","windows/misc/eureka_mail_err"
"CVE-2013-2492","windows/misc/fb_cnct_group"
"CVE-2007-5243","windows/misc/fb_isc_attach_database"
"CVE-2007-5243","windows/misc/fb_isc_create_database"
"CVE-2007-5243","windows/misc/fb_svc_attach"
"CVE-2012-2763","windows/misc/gimp_script_fu"
"CVE-2014-2623","windows/misc/hp_dataprotector_cmd_exec"
"CVE-2013-2333","windows/misc/hp_dataprotector_crs"
"CVE-2010-3007","windows/misc/hp_dataprotector_dtbclslogin"
"CVE-2013-2347","windows/misc/hp_dataprotector_exec_bar"
"CVE-2012-0124","windows/misc/hp_dataprotector_new_folder"
"CVE-2013-6194","windows/misc/hp_dataprotector_traversal"
"CVE-2012-3274","windows/misc/hp_imc_uam"
"CVE-2013-4800","windows/misc/hp_loadrunner_magentproc"
"CVE-2011-4789","windows/misc/hp_magentservice"
"CVE-2007-2280","windows/misc/hp_omniinet_1"
"CVE-2009-3844","windows/misc/hp_omniinet_2"
"CVE-2011-1865","windows/misc/hp_omniinet_3"
"CVE-2011-1865","windows/misc/hp_omniinet_4"
"CVE-2012-2019","windows/misc/hp_operations_agent_coda_34"
"CVE-2012-2020","windows/misc/hp_operations_agent_coda_8c"
"CVE-2007-3872","windows/misc/hp_ovtrace"
"CVE-2007-5243","windows/misc/ib_isc_attach_database"
"CVE-2007-5243","windows/misc/ib_isc_create_database"
"CVE-2007-5243","windows/misc/ib_svc_attach"
"CVE-2012-0202","windows/misc/ibm_cognos_tm1admsd_bof"
"CVE-2009-0880","windows/misc/ibm_director_cim_dllinject"
"CVE-2009-3853","windows/misc/ibm_tsm_cad_ping"
"CVE-2008-4828","windows/misc/ibm_tsm_rca_dicugetidentify"
"CVE-2007-1674","windows/misc/landesk_aolnsrvr"
"CVE-2013-3563","windows/misc/lianja_db_net"
"CVE-2005-4411","windows/misc/mercury_phonebook"
"CVE-2009-5109","windows/misc/mini_stream"
"CVE-2008-4449","windows/misc/mirc_privmsg_server"
"CVE-2007-3901","windows/misc/ms07_064_sami"
"CVE-2010-3964","windows/misc/ms10_104_sharepoint"
"CVE-2004-1317","windows/misc/netcat110_nt"
"CVE-2009-1029","windows/misc/poppeeper_date"
"CVE-2009-1029","windows/misc/poppeeper_uidl"
"CVE-2008-5664","windows/misc/realtek_playlist"
"CVE-2009-4988","windows/misc/sap_2005_license"
"CVE-2012-2611","windows/misc/sap_netweaver_dispatcher"
"CVE-2004-1595","windows/misc/shixxnote_font"
"CVE-2011-5052","windows/misc/stream_down_bof"
"CVE-2007-2711","windows/misc/tiny_identd_overflow"
"CVE-2011-5001","windows/misc/trendmicro_cmdprocessor_addtask"
"CVE-2007-4006","windows/misc/windows_rsh"
"CVE-2011-3360","windows/misc/wireshark_lua"
"CVE-2011-1591","windows/misc/wireshark_packet_dect"
"CVE-2010-0478","windows/mmsp/ms10_025_wmss_connect_funnel"
"CVE-2008-1117","windows/motorola/timbuktu_fileupload"
"CVE-2005-4145","windows/mssql/lyris_listmanager_weak_pass"
"CVE-2002-0649","windows/mssql/ms02_039_slammer"
"CVE-2002-1123","windows/mssql/ms02_056_hello"
"CVE-2008-5416","windows/mssql/ms09_004_sp_replwritetovarbin"
"CVE-2008-5416","windows/mssql/ms09_004_sp_replwritetovarbin_sqli"
"CVE-2000-0402","windows/mssql/mssql_payload"
"CVE-2000-1209","windows/mssql/mssql_payload"
"CVE-2000-0402","windows/mssql/mssql_payload_sqli"
"CVE-2000-1209","windows/mssql/mssql_payload_sqli"
"CVE-2012-5613","windows/mysql/mysql_mof"
"CVE-2012-5613","windows/mysql/mysql_start_up"
"CVE-2008-0226","windows/mysql/mysql_yassl_hello"
"CVE-2012-3951","windows/mysql/scrutinizer_upload_exec"
"CVE-2006-5780","windows/nfs/xlink_nfsd"
"CVE-2005-1213","windows/nntp/ms05_030_nntp"
"CVE-2012-4959","windows/novell/file_reporter_fsfui_upload"
"CVE-2008-2703","windows/novell/groupwisemessenger_client"
"CVE-2006-6424","windows/novell/nmap_stor"
"CVE-2005-1543","windows/novell/zenworks_desktop_agent"
"CVE-2011-3176","windows/novell/zenworks_preboot_op4c_bof"
"CVE-2011-3175","windows/novell/zenworks_preboot_op6c_bof"
"CVE-2010-3600","windows/oracle/client_system_analyzer_upload"
"CVE-2008-5444","windows/oracle/osb_ndmp_auth"
"CVE-2001-0499","windows/oracle/tns_arguments"
"CVE-2009-1979","windows/oracle/tns_auth_sesskey"
"CVE-2002-0965","windows/oracle/tns_service_name"
"CVE-2003-0264","windows/pop3/seattlelab_pass"
"CVE-2005-4085","windows/proxy/bluecoat_winproxy_host"
"CVE-2004-2416","windows/proxy/ccproxy_telnet_ping"
"CVE-2004-0326","windows/proxy/proxypro_http_get"
"CVE-2006-2926","windows/proxy/qbik_wingate_wwwproxy"
"CVE-2008-2639","windows/scada/citect_scada_odbc"
"CVE-2012-4705","windows/scada/codesys_gateway_server_traversal"
"CVE-2011-5007","windows/scada/codesys_web_server"
"CVE-2011-3492","windows/scada/daq_factory_bof"
"CVE-2014-0750","windows/scada/ge_proficy_cimplicity_gefebt"
"CVE-2011-2089","windows/scada/iconics_webhmi_setactivexguid"
"CVE-2011-1567","windows/scada/igss9_igssdataserver_listall"
"CVE-2011-1567","windows/scada/igss9_igssdataserver_rename"
"CVE-2011-1565","windows/scada/igss9_misc"
"CVE-2011-1566","windows/scada/igss9_misc"
"CVE-2011-1566","windows/scada/igss_exec_17"
"CVE-2011-4051","windows/scada/indusoft_webstudio_exec"
"CVE-2010-4741","windows/scada/moxa_mdmtool"
"CVE-2011-3322","windows/scada/procyon_core_server"
"CVE-2008-4322","windows/scada/realwin"
"CVE-2011-1563","windows/scada/realwin_on_fc_binfile_a"
"CVE-2011-1563","windows/scada/realwin_on_fcs_login"
"CVE-2010-4142","windows/scada/realwin_scpc_initialize"
"CVE-2010-4142","windows/scada/realwin_scpc_initialize_rf"
"CVE-2010-4142","windows/scada/realwin_scpc_txtevent"
"CVE-2011-3497","windows/scada/scadapro_cmdexe"
"CVE-2011-0517","windows/scada/winlog_runtime"
"CVE-2012-3815","windows/scada/winlog_runtime_2"
"CVE-2014-0784","windows/scada/yokogawa_bkbcopyd_bof"
"CVE-2014-0782","windows/scada/yokogawa_bkesimmgr_bof"
"CVE-2014-3888","windows/scada/yokogawa_bkfsim_vhfd"
"CVE-2014-0783","windows/scada/yokogawa_bkhodeq_bof"
"CVE-2006-3524","windows/sip/aim_triton_cseq"
"CVE-2006-3524","windows/sip/sipxezphone_cseq"
"CVE-2006-3524","windows/sip/sipxphone_cseq"
"CVE-2015-0925","windows/smb/ipass_pipe_exec"
"CVE-2003-0812","windows/smb/ms03_049_netapi"
"CVE-2003-0818","windows/smb/ms04_007_killbill"
"CVE-2003-0533","windows/smb/ms04_011_lsass"
"CVE-2004-0206","windows/smb/ms04_031_netdde"
"CVE-2005-1983","windows/smb/ms05_039_pnp"
"CVE-2006-2370","windows/smb/ms06_025_rasmans_reg"
"CVE-2006-2370","windows/smb/ms06_025_rras"
"CVE-2006-3439","windows/smb/ms06_040_netapi"
"CVE-2006-4688","windows/smb/ms06_066_nwapi"
"CVE-2006-4688","windows/smb/ms06_066_nwwks"
"CVE-2006-4691","windows/smb/ms06_070_wkssvc"
"CVE-2007-1748","windows/smb/ms07_029_msdns_zonename"
"CVE-2008-4250","windows/smb/ms08_067_netapi"
"CVE-2009-3103","windows/smb/ms09_050_smb2_negotiate_func_index"
"CVE-2010-2568","windows/smb/ms10_046_shortcut_icon_dllloader"
"CVE-2010-2729","windows/smb/ms10_061_spoolss"
"CVE-2015-0096","windows/smb/ms15_020_shortcut_icon_dllloader"
"CVE-2009-1350","windows/smb/netidentity_xtierrpcpipe"
"CVE-1999-0504","windows/smb/psexec"
"CVE-1999-0504","windows/smb/psexec_psh"
"CVE-2008-4037","windows/smb/smb_relay"
"CVE-2009-1394","windows/smb/timbuktu_plughntcommand_bof"
"CVE-2004-1638","windows/smtp/mailcarrier_smtp_ehlo"
"CVE-2007-4440","windows/smtp/mercury_cram_md5"
"CVE-2003-0714","windows/smtp/ms03_046_exchange2000_xexch50"
"CVE-2011-4040","windows/smtp/njstar_smtp_bof"
"CVE-2005-2287","windows/smtp/wmailserver"
"CVE-2004-1558","windows/smtp/ypops_overflow1"
"CVE-2006-2407","windows/ssh/freeftpd_key_exchange"
"CVE-2012-6066","windows/ssh/freesshd_authbypass"
"CVE-2006-2407","windows/ssh/freesshd_key_exchange"
"CVE-2002-1359","windows/ssh/putty_msg_debug"
"CVE-2002-1059","windows/ssh/securecrt_ssh1"
"CVE-2003-0719","windows/ssl/ms04_011_pct"
"CVE-2000-0665","windows/telnet/gamsoft_telsrv_username"
"CVE-2005-0768","windows/telnet/goodtech_telnet"
"CVE-2006-6184","windows/tftp/attftp_long_filename"
"CVE-2012-6664","windows/tftp/distinct_tftp_traversal"
"CVE-2007-1435","windows/tftp/dlink_long_filename"
"CVE-2005-1812","windows/tftp/futuresoft_transfermode"
"CVE-2009-1730","windows/tftp/netdecision_tftp_traversal"
"CVE-2008-2161","windows/tftp/opentftp_error_code"
"CVE-2008-1610","windows/tftp/quick_tftp_pro_mode"
"CVE-2002-2226","windows/tftp/tftpd32_long_filename"
"CVE-2006-4948","windows/tftp/tftpdwin_long_filename"
"CVE-2008-1611","windows/tftp/tftpserver_wrq_bof"
"CVE-2006-6183","windows/tftp/threectftpsvc_long_mode"
"CVE-2005-2668","windows/unicenter/cam_log_security"
"CVE-2001-0167","windows/vnc/realvnc_client"
"CVE-2006-1652","windows/vnc/ultravnc_client"
"CVE-2008-0610","windows/vnc/ultravnc_viewer_bof"
"CVE-2001-0168","windows/vnc/winvnc_http_get"
"CVE-2009-1943","windows/vpn/safenet_ike_11"
"CVE-2004-1080","windows/wins/ms04_045_wins"
"CVE-2012-5519","multi/escalate/cups_root_file_read"
"CVE-2010-2743","windows/escalate/ms10_073_kbdlayout"
"CVE-2011-3402","windows/gather/forensics/duqu_check"
"CVE-2007-4387","admin/2wire/xslt_password_reset"
"CVE-2014-6041","admin/android/google_play_store_uxss_xframe_rce"
"CVE-2005-2611","admin/backupexec/dump"
"CVE-2005-0771","admin/backupexec/registry"
"CVE-2011-0951","admin/cisco/cisco_secure_acs_bypass"
"CVE-2006-4313","admin/cisco/vpn_3000_ftp_bypass"
"CVE-2004-0795","admin/db2/db2rcmd"
"CVE-2008-0926","admin/edirectory/edirectory_edirutil"
"CVE-2008-2157","admin/emc/alphastor_devicemanager_exec"
"CVE-2008-2157","admin/emc/alphastor_librarymanager_exec"
"CVE-2011-0923","admin/hp/hp_data_protector_cmd"
"CVE-2013-4824","admin/hp/hp_imc_som_create_account"
"CVE-2015-0964","admin/http/arris_motorola_surfboard_backdoor_xss"
"CVE-2015-0965","admin/http/arris_motorola_surfboard_backdoor_xss"
"CVE-2015-0966","admin/http/arris_motorola_surfboard_backdoor_xss"
"CVE-2012-4940","admin/http/axigen_file_access"
"CVE-2013-2050","admin/http/cfme_manageiq_evm_pass_reset"
"CVE-2013-2113","admin/http/foreman_openstack_satellite_priv_esc"
"CVE-2010-2731","admin/http/iis_auth_bypass"
"CVE-2009-2367","admin/http/iomega_storcenterpro_sessionid"
"CVE-2010-0738","admin/http/jboss_bshdeployer"
"CVE-2010-0738","admin/http/jboss_deploymentfilerepository"
"CVE-2010-1871","admin/http/jboss_seam_exec"
"CVE-2013-2143","admin/http/katello_satellite_priv_esc"
"CVE-2014-7862","admin/http/manage_engine_dc_create_admin"
"CVE-2014-7863","admin/http/manageengine_dir_listing"
"CVE-2014-7863","admin/http/manageengine_file_download"
"CVE-2014-8499","admin/http/manageengine_pmp_privesc"
"CVE-2013-0136","admin/http/mutiny_frontend_read_delete"
"CVE-2014-5445","admin/http/netflow_file_download"
"CVE-2011-2750","admin/http/novell_file_reporter_filedelete"
"CVE-2013-3617","admin/http/openbravo_xxe"
"CVE-2013-0233","admin/http/rails_devise_pass_reset"
"CVE-2012-2626","admin/http/scrutinizer_add_user"
"CVE-2013-2641","admin/http/sophos_wpa_traversal"
"CVE-2008-2938","admin/http/tomcat_utf8_traversal"
"CVE-2008-2938","admin/http/trendmicro_dlp_traversal"
"CVE-2009-0815","admin/http/typo3_sa_2009_002"
"CVE-2015-2673","admin/http/wp_easycart_privilege_escalation"
"CVE-2014-6324","admin/kerberos/ms14_068_kerberos_checksum"
"CVE-2008-0244","admin/maxdb/maxdb_cons_exec"
"CVE-2004-1550","admin/motorola/wr850g_cred"
"CVE-2008-3466","admin/ms/ms08_059_his2006"
"CVE-2008-2439","admin/officescan/tmlisten_traversal"
"CVE-2008-5448","admin/oracle/osb_execqr"
"CVE-2009-1977","admin/oracle/osb_execqr2"
"CVE-2009-1978","admin/oracle/osb_execqr2"
"CVE-2010-0904","admin/oracle/osb_execqr3"
"CVE-2014-0763","admin/scada/advantech_webaccess_dbvisitor_sqli"
"CVE-2013-0653","admin/scada/ge_proficy_substitute_traversal"
"CVE-2007-6507","admin/serverprotect/file"
"CVE-1999-0504","admin/smb/psexec_command"
"CVE-2003-0027","admin/sunrpc/solaris_kcms_readfile"
"CVE-2006-5702","admin/tikiwiki/tikidblib"
"CVE-2006-2369","admin/vnc/realvnc_41_bypass"
"CVE-2012-2983","admin/webmin/edit_html_fileaccess"
"CVE-2006-3392","admin/webmin/file_disclosure"
"CVE-2000-0380","dos/cisco/ios_http_percentpercent"
"CVE-2010-2156","dos/dhcp/isc_dhcpd_clientid"
"CVE-2006-0900","dos/freebsd/nfsd/nfsd_mount"
"CVE-2011-0514","dos/hp/data_protector_rds"
"CVE-2004-2691","dos/http/3com_superstack_switch"
"CVE-2014-0050","dos/http/apache_commons_fileupload_dos"
"CVE-2010-0425","dos/http/apache_mod_isapi"
"CVE-2011-3192","dos/http/apache_range_dos"
"CVE-2010-2227","dos/http/apache_tomcat_transfer_encoding"
"CVE-2013-4615","dos/http/canon_wireless_printer"
"CVE-2004-0331","dos/http/dell_openmanage_post"
"CVE-2011-5034","dos/http/hashcollision_dos"
"CVE-2011-5035","dos/http/hashcollision_dos"
"CVE-2011-4885","dos/http/hashcollision_dos"
"CVE-2011-4858","dos/http/hashcollision_dos"
"CVE-2013-3843","dos/http/monkey_headers"
"CVE-2015-1635","dos/http/ms15_034_ulonglongadd"
"CVE-2013-4450","dos/http/nodejs_pipelining"
"CVE-2012-4956","dos/http/novell_file_reporter_heap_bof"
"CVE-2013-6414","dos/http/rails_action_view"
"CVE-2013-4164","dos/http/rails_json_float_dos"
"CVE-2008-3656","dos/http/webrick_regex"
"CVE-2008-5081","dos/mdns/avahi_portzero"
"CVE-2009-3591","dos/misc/dopewars"
"CVE-2013-3986","dos/misc/ibm_sametime_webplayer_dos"
"CVE-2011-4971","dos/misc/memcached"
"CVE-2009-3563","dos/ntp/ntpd_reserved_dos"
"CVE-2002-1214","dos/pptp/ms02_063_pptp_dos"
"CVE-2007-2446","dos/samba/lsa_addprivs_heap"
"CVE-2007-2446","dos/samba/lsa_transnames_heap"
"CVE-2013-4124","dos/samba/read_nttrans_ea_list"
"CVE-2011-3486","dos/scada/beckhoff_twincat"
"CVE-2011-4050","dos/scada/igss9_dataserver"
"CVE-2014-0781","dos/scada/yokogawa_logsvr"
"CVE-2003-0694","dos/smtp/sendmail_prescan"
"CVE-2005-4797","dos/solaris/lpd/cascade_delete"
"CVE-2009-1386","dos/ssl/dtls_changecipherspec"
"CVE-2014-0195","dos/ssl/dtls_fragment_overflow"
"CVE-2012-2686","dos/ssl/openssl_aesni"
"CVE-2011-3200","dos/syslog/rsyslog_long_tag"
"CVE-2013-0229","dos/upnp/miniupnpd_dos"
"CVE-2007-6509","dos/windows/appian/appian_bpm"
"CVE-2009-2514","dos/windows/browser/ms09_065_eot_integer"
"CVE-2005-3589","dos/windows/ftp/filezilla_admin_user"
"CVE-2006-6565","dos/windows/ftp/filezilla_server_port"
"CVE-2008-4572","dos/windows/ftp/guildftp_cwdlist"
"CVE-2010-3972","dos/windows/ftp/iis75_ftpd_iac_bof"
"CVE-2009-2521","dos/windows/ftp/iis_list_exhaustion"
"CVE-2008-6082","dos/windows/ftp/titan626_site"
"CVE-2008-2031","dos/windows/ftp/vicftps50_list"
"CVE-2008-6829","dos/windows/ftp/vicftps50_list"
"CVE-2008-5666","dos/windows/ftp/winftp230_nlst"
"CVE-2008-5626","dos/windows/ftp/xmeasy560_nlst"
"CVE-2008-5626","dos/windows/ftp/xmeasy570_nlst"
"CVE-2010-1899","dos/windows/http/ms10_065_ii6_asp_dos"
"CVE-2008-6938","dos/windows/http/pi3web_isapi"
"CVE-2011-0657","dos/windows/llmnr/ms11_030_dnsapi"
"CVE-2006-5614","dos/windows/nat/nat_helper"
"CVE-2012-0002","dos/windows/rdp/ms12_020_maxchannelids"
"CVE-2005-2120","dos/windows/smb/ms05_047_pnp"
"CVE-2006-3942","dos/windows/smb/ms06_035_mailslot"
"CVE-2006-3942","dos/windows/smb/ms06_063_trans"
"CVE-2008-4114","dos/windows/smb/ms09_001_write"
"CVE-2009-3103","dos/windows/smb/ms09_050_smb2_negotiate_pidhigh"
"CVE-2009-3103","dos/windows/smb/ms09_050_smb2_session_logoff"
"CVE-2010-0017","dos/windows/smb/ms10_006_negotiate_response_loop"
"CVE-2010-2550","dos/windows/smb/ms10_054_queryfs_pool_overflow"
"CVE-2011-0654","dos/windows/smb/ms11_019_electbowser"
"CVE-2006-0027","dos/windows/smtp/ms06_019_exchange"
"CVE-2008-1311","dos/windows/tftp/pt360_write"
"CVE-2010-2115","dos/windows/tftp/solarwinds"
"CVE-2013-4074","dos/wireshark/capwap"
"CVE-2007-3389","dos/wireshark/chunked"
"CVE-2011-1140","dos/wireshark/cldap"
"CVE-2008-1562","dos/wireshark/ldap"
"CVE-2010-4804","gather/android_htmlfileprovider"
"CVE-2014-6041","gather/android_stock_browser_uxss"
"CVE-2013-1814","gather/apache_rave_creds"
"CVE-2015-1126","gather/apple_safari_ftp_url_cookie_theft"
"CVE-2012-6663","gather/d20pass"
"CVE-2012-4554","gather/drupal_openid_xxe"
"CVE-1999-0532","gather/enum_dns"
"CVE-2014-6038","gather/eventlog_cred_disclosure"
"CVE-2014-6039","gather/eventlog_cred_disclosure"
"CVE-2014-4671","gather/flash_rosetta_jsonp_url_disclosure"
"CVE-2013-6031","gather/huawei_wifi_info"
"CVE-2013-3975","gather/ibm_sametime_enumerate_users"
"CVE-2013-3977","gather/ibm_sametime_room_brute"
"CVE-2013-3982","gather/ibm_sametime_version"
"CVE-2015-0072","gather/ie_uxss_injection"
"CVE-2014-2238","gather/mantisbt_admin_sqli"
"CVE-2015-0921","gather/mcafee_epo_xxe"
"CVE-2015-0922","gather/mcafee_epo_xxe"
"CVE-2013-7331","gather/ms14_052_xmldom"
"CVE-2015-0975","gather/opennms_xxe"
"CVE-2015-1155","gather/safari_file_url_navigation"
"CVE-2014-9566","gather/solarwinds_orion_sqli"
"CVE-2014-4872","gather/trackit_sql_domain_creds"
"CVE-2013-3522","gather/vbulletin_vote_sqli"
"CVE-2009-0836","pdf/foxit/authbypass"
"CVE-2003-0270","scanner/acpp/login"
"CVE-2010-0103","scanner/backdoor/energizer_duo_detect"
"CVE-1999-0103","scanner/chargen/chargen_probe"
"CVE-1999-0502","scanner/db2/db2_auth"
"CVE-2014-7992","scanner/dlsw/dlsw_leak_capture"
"CVE-1999-0502","scanner/ftp/ftp_login"
"CVE-2015-2856","scanner/http/accellion_fta_statecode_file_read"
"CVE-2009-3960","scanner/http/adobe_xml_inject"
"CVE-2014-9222","scanner/http/allegro_rompager_misfortune_cookie"
"CVE-2010-1587","scanner/http/apache_activemq_source_disclosure"
"CVE-2014-6271","scanner/http/apache_mod_cgi_bash_env"
"CVE-2014-6278","scanner/http/apache_mod_cgi_bash_env"
"CVE-2001-1013","scanner/http/apache_userdir_enum"
"CVE-2012-2926","scanner/http/atlassian_crowd_fileaccess"
"CVE-2010-0219","scanner/http/axis_login"
"CVE-2012-5192","scanner/http/bitweaver_overlay_type_traversal"
"CVE-2014-8270","scanner/http/bmc_trackit_passwd_reset"
"CVE-2013-4614","scanner/http/canon_wireless"
"CVE-2000-0945","scanner/http/cisco_device_manager"
"CVE-2001-0537","scanner/http/cisco_ios_auth_bypass"
"CVE-2011-3305","scanner/http/cisco_nac_manager_traversal"
"CVE-2014-2127","scanner/http/cisco_ssl_vpn_priv_esc"
"CVE-2010-2861","scanner/http/coldfusion_locale_traversal"
"CVE-1999-0502","scanner/http/dell_idrac"
"CVE-2009-1535","scanner/http/dir_webdav_unicode_bypass"
"CVE-2009-1122","scanner/http/dir_webdav_unicode_bypass"
"CVE-1999-0502","scanner/http/dlink_dir_300_615_http_login"
"CVE-1999-0502","scanner/http/dlink_dir_615h_http_login"
"CVE-1999-0502","scanner/http/dlink_dir_session_cgi_http_login"
"CVE-2011-0807","scanner/http/glassfish_login"
"CVE-2014-9707","scanner/http/goahead_traversal"
"CVE-2012-0419","scanner/http/groupwise_agents_http_traversal"
"CVE-2013-4823","scanner/http/hp_imc_bims_downloadservlet_traversal"
"CVE-2012-5202","scanner/http/hp_imc_faultdownloadservlet_traversal"
"CVE-2012-5204","scanner/http/hp_imc_ictdownloadservlet_traversal"
"CVE-2012-5203","scanner/http/hp_imc_reportimgservlt_traversal"
"CVE-2013-4826","scanner/http/hp_imc_som_file_download"
"CVE-1999-0502","scanner/http/http_login"
"CVE-2008-3273","scanner/http/jboss_status"
"CVE-2010-0738","scanner/http/jboss_vulnscan"
"CVE-1999-0502","scanner/http/joomla_bruteforce_login"
"CVE-2015-2562","scanner/http/joomla_ecommercewd_sqli_scanner"
"CVE-2010-2333","scanner/http/litespeed_source_disclosure"
"CVE-2011-0049","scanner/http/majordomo2_directory_traversal"
"CVE-2011-0063","scanner/http/majordomo2_directory_traversal"
"CVE-2014-5377","scanner/http/manageengine_deviceexpert_user_creds"
"CVE-2009-1535","scanner/http/ms09_020_webdav_unicode_bypass"
"CVE-2009-1122","scanner/http/ms09_020_webdav_unicode_bypass"
"CVE-2015-1635","scanner/http/ms15034_http_sys_memory_dump"
"CVE-2015-1635","scanner/http/ms15_034_http_sys_memory_dump"
"CVE-2010-2263","scanner/http/nginx_source_disclosure"
"CVE-2012-4958","scanner/http/novell_file_reporter_fsfui_fileaccess"
"CVE-2012-4957","scanner/http/novell_file_reporter_srs_fileaccess"
"CVE-2013-1081","scanner/http/novell_mdm_creds"
"CVE-2005-3398","scanner/http/options"
"CVE-2005-3498","scanner/http/options"
"CVE-2013-5795","scanner/http/oracle_demantra_database_credentials_leak"
"CVE-2013-5880","scanner/http/oracle_demantra_database_credentials_leak"
"CVE-2013-5877","scanner/http/oracle_demantra_file_retrieval"
"CVE-2013-5880","scanner/http/oracle_demantra_file_retrieval"
"CVE-2013-0333","scanner/http/rails_json_yaml_scanner"
"CVE-2013-0156","scanner/http/rails_xml_yaml_scanner"
"CVE-2011-3368","scanner/http/rewrite_proxy_bypass"
"CVE-2013-3621","scanner/http/smt_ipmi_cgi_scanner"
"CVE-2013-3623","scanner/http/smt_ipmi_cgi_scanner"
"CVE-2013-3619","scanner/http/smt_ipmi_static_cert_scanner"
"CVE-2014-3566","scanner/http/ssl_version"
"CVE-2011-2474","scanner/http/sybase_easerver_traversal"
"CVE-2012-4347","scanner/http/symantec_brightmail_logfile"
"CVE-2013-1625","scanner/http/titan_ftp_admin_pwd"
"CVE-2009-0580","scanner/http/tomcat_enum"
"CVE-2009-3843","scanner/http/tomcat_mgr_login"
"CVE-2009-4189","scanner/http/tomcat_mgr_login"
"CVE-2009-4188","scanner/http/tomcat_mgr_login"
"CVE-2010-0557","scanner/http/tomcat_mgr_login"
"CVE-2010-4094","scanner/http/tomcat_mgr_login"
"CVE-2009-3548","scanner/http/tomcat_mgr_login"
"CVE-1999-0502","scanner/http/tomcat_mgr_login"
"CVE-2012-5687","scanner/http/tplink_traversal_noauth"
"CVE-2009-3733","scanner/http/vmware_server_dir_trav"
"CVE-2011-4404","scanner/http/vmware_update_manager_traversal"
"CVE-2014-7816","scanner/http/wildfly_traversal"
"CVE-2015-0235","scanner/http/wordpress_ghost_scanner"
"CVE-2009-2335","scanner/http/wordpress_login_enum"
"CVE-1999-0502","scanner/http/wordpress_xmlrpc_login"
"CVE-2015-2065","scanner/http/wp_contus_video_gallery_sqli"
"CVE-2014-8799","scanner/http/wp_dukapress_file_read"
"CVE-2011-4350","scanner/http/yaws_traversal"
"CVE-2012-4933","scanner/http/zenworks_assetmanagement_fileaccess"
"CVE-2012-4933","scanner/http/zenworks_assetmanagement_getconfig"
"CVE-2013-1391","scanner/misc/dvr_config_disclosure"
"CVE-2012-2215","scanner/misc/zenworks_preboot_fileaccess"
"CVE-1999-0506","scanner/mssql/mssql_login"
"CVE-2012-2122","scanner/mysql/mysql_authbypass_hashdump"
"CVE-1999-0502","scanner/mysql/mysql_login"
"CVE-1999-0170","scanner/nfs/nfsmount"
"CVE-2013-5211","scanner/ntp/ntp_monlist"
"CVE-1999-0502","scanner/oracle/oracle_login"
"CVE-1999-0502","scanner/pcanywhere/pcanywhere_login"
"CVE-2013-1899","scanner/postgres/postgres_dbname_flag_injection"
"CVE-1999-0502","scanner/postgres/postgres_login"
"CVE-2012-0002","scanner/rdp/ms12_020_check"
"CVE-1999-0651","scanner/rservices/rexec_login"
"CVE-1999-0502","scanner/rservices/rexec_login"
"CVE-1999-0651","scanner/rservices/rlogin_login"
"CVE-1999-0502","scanner/rservices/rlogin_login"
"CVE-1999-0651","scanner/rservices/rsh_login"
"CVE-1999-0502","scanner/rservices/rsh_login"
"CVE-2013-3319","scanner/sap/sap_hostctrl_getcomputersystem"
"CVE-2010-0738","scanner/sap/sap_icm_urlscan"
"CVE-2006-6010","scanner/sap/sap_soap_rfc_system_info"
"CVE-2011-1900","scanner/scada/indusoft_ntwebserver_fileaccess"
"CVE-1999-0504","scanner/smb/psexec_loggedin_users"
"CVE-1999-0506","scanner/smb/smb_login"
"CVE-2015-0240","scanner/smb/smb_uninit_cred"
"CVE-1999-0531","scanner/smtp/smtp_enum"
"CVE-1999-0508","scanner/snmp/snmp_login"
"CVE-2006-5229","scanner/ssh/ssh_enumusers"
"CVE-1999-0502","scanner/ssh/ssh_login"
"CVE-2014-0224","scanner/ssl/openssl_ccs"
"CVE-2014-0160","scanner/ssl/openssl_heartbleed"
"CVE-1999-0502","scanner/telnet/brocade_enable_login"
"CVE-2011-4862","scanner/telnet/telnet_encrypt_overflow"
"CVE-1999-0502","scanner/telnet/telnet_login"
"CVE-2012-1803","scanner/telnet/telnet_ruggedcom"
"CVE-2011-4722","scanner/tftp/ipswitch_whatsupgold_tftp"
"CVE-2009-1730","scanner/tftp/netdecision_tftp"
"CVE-1999-0502","scanner/vmware/vmauthd_login"
"CVE-1999-0502","scanner/vmware/vmware_http_login"
"CVE-2009-3733","scanner/vmware/vmware_server_dir_trav"
"CVE-2011-4404","scanner/vmware/vmware_update_manager_traversal"
"CVE-1999-0506","scanner/vnc/vnc_login"
"CVE-1999-0502","scanner/winrm/winrm_login"
"CVE-1999-0526","scanner/x11/open_x11"
"CVE-2014-6271","server/dhclient_bash_env"
"CVE-2014-0160","server/openssl_heartbeat_client_memory"
"CVE-2014-8517","server/tnftp_savefile"
"CVE-2014-4877","server/wget_symlink_file_write"
"CVE-1999-0667","spoof/arp/arp_poisoning"
"CVE-2008-1447","spoof/dns/bailiwicked_domain"
"CVE-2008-1447","spoof/dns/bailiwicked_host"
"CVE-2008-3996","sqli/oracle/dbms_cdc_ipublish"
"CVE-2008-3995","sqli/oracle/dbms_cdc_publish"
"CVE-2010-0870","sqli/oracle/dbms_cdc_publish2"
"CVE-2010-2415","sqli/oracle/dbms_cdc_publish3"
"CVE-2005-4832","sqli/oracle/dbms_cdc_subscribe_activate_subscription"
"CVE-2006-2081","sqli/oracle/dbms_export_extension"
"CVE-2008-3979","sqli/oracle/droptable_trigger"
"CVE-2010-0866","sqli/oracle/jvm_os_code_10g"
"CVE-2010-0866","sqli/oracle/jvm_os_code_11g"
"CVE-2008-3982","sqli/oracle/lt_compressworkspace"
"CVE-2007-5511","sqli/oracle/lt_findricset_cursor"
"CVE-2008-3983","sqli/oracle/lt_mergeworkspace"
"CVE-2008-3984","sqli/oracle/lt_removeworkspace"
"CVE-2009-0978","sqli/oracle/lt_rollbackworkspace"
"CVE-2014-3300","voip/cisco_cucdm_call_forward"
"CVE-2014-3300","voip/cisco_cucdm_speed_dials"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment