<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

<!-- begin pulling JS & CSS files from juniper.net -->
<script type="text/javascript" src="http://www.juniper.net/assets/js/api.js"></script>
<script type="text/javascript" src="http://www.juniper.net/assets/js/jquery/latest.js"></script>
<script type="text/javascript" src="http://www.juniper.net/assets/js/swfobject.js"></script>
<link rel="stylesheet" href="http://www.juniper.net/assets/toolKit09/assets/css/global-vendor-jnpr.css" type="text/css" media="all" charset="utf-8" />
<link rel="stylesheet" href="http://www.juniper.net/assets/css/print.css" type="text/css" media="print" charset="utf-8" />
<!-- end pulling JS & CSS files from juniper.net -->

<!-- begin local css & js -->
<!-- end local css & js -->

<title>Signatures - Security Intelligence Center - Juniper Networks</title>

</head>
<body>
<div id="navOpen" class="container">
  <div class="contentWrapper">
    <!-- begin header -->
    <div class="left" id="header">
      <div class="topLogo left"> <a tabindex="1" title="Juniper Networks" href="http://www.juniper.net/us/en/"> <img alt="Juniper Networks" src="http://www.juniper.net/shared/img/header/logo-top-m.gif"/></a> </div>
    </div>
    <!--end header -->
    <!-- begain topnav -->
    <div style="width: 935px;">
      <div class="left" id="navbar">
        <div class="navbarItem" id="menuWidthA"> 
       	  <a href="http://www.juniper.net/us/en/solutions/" style="width:154px;">Solutions</a>        </div>
        <div class="navbarItem" id="menuWidthC"> 
       	  <a href="http://www.juniper.net/us/en/products-services/" style="width:159px;">Products &amp; Services</a>        </div>
        <div class="navbarItem" id="menuWidthA"> 
       	  <a href="http://www.juniper.net/us/en/company/" style="width:154px;">Company</a>        </div>
        <div class="navbarItem" id="menuWidthB"> 
       	  <a href="http://www.juniper.net/us/en/partners/" style="width: 156px;">Partners</a>        </div>
        <div class="navbarItem" id="menuWidthB"> 
       	  <a href="http://www.juniper.net/us/en/support/" style="width: 156px;">Support</a>        </div>
        <div class="navbarItem" id="menuWidthB"> 
       	  <a href="http://www.juniper.net/us/en/training/" style="width: 156px;">Education</a>        </div>
    </div>
    </div>
    <!-- end topnav -->

    <!--begin herospace banner  -->
    <div class="hero" id="hero">
      <div id="heroContentShort">
        <div class="heroContentShort">
         <h1>Signatures</h1>
        </div>
      </div>
    </div>
    <!--end herospace banner  -->
    <!--begin left content  -->
    <div class="leftNav" id="leftNav">
     <div class="parent"><a class="leftNavParent" title="Security Intelligence Center" href="http://juniper.net/security/">Security Intelligence Center</a><a class="leftNavParent" title="Security Intelligence Center" href="http://juniper.net/security/"></a></div>
     
     
      <div class="current">
       <div class="currentInside">Signatures</div>
      </div>
      
      <div class="navBorder"> </div>
      
     
      <div class="child"> <a title="Application Signatures" href="http://services.netscreen.com/documentation/applications/index.html">Application Signatures</a></div>
      
      <div class="navBorder"> </div>
      
     
      <div class="child"> <a title="Report a Security Vulnerability" href="http://www.juniper.net/us/en/security/report-vulnerability/">Report a Security Vulnerability</a></div>
      
      <div class="navBorder"> </div>
      
     
      <div class="child"> <a title="Documentation" href="http://services.netscreen.com/documentation/index.html">Documentation</a></div>
      
      <div class="navBorder"> </div>
      
     
      <div class="child"> <a title="Resources" href="http://www.juniper.net/us/en/security/resources/">Resources</a></div>
      
      <div class="navBorder"> </div>
      
     
      <div class="child"> <a title="About us" href="http://www.juniper.net/us/en/security/about-us/">About us</a></div>
      
      <div class="navBorder"> </div>
      
    </div>
    <!-- end of left content  -->
    <div class="sharing">
      <div id="printBtn"> <a title="Print" href="javascript:print()"> <img alt="Print" src="http://www.juniper.net/shared/img/global/btn-print.gif"/> </a> </div>
      <div id="shareBtn">
        <script type="text/javascript">
        addToOnload(drawShare,"favorites, email, digg, delicious"); 
        var addthis_language = "en";
    </script>
      </div>
    </div>
    
    <!-- begin middle column content -->
    <!-- begin tabular -->
    <div id="body" class="body">
      <div class="scmDefault clear">
       

<a href="#APP">APP</a>
&nbsp;

<a href="#CHARGEN">CHARGEN</a>
&nbsp;

<a href="#CHAT">CHAT</a>
&nbsp;

<a href="#DB">DB</a>
&nbsp;

<a href="#DDOS">DDOS</a>
&nbsp;

<a href="#DHCP">DHCP</a>
&nbsp;

<a href="#DISCARD">DISCARD</a>
&nbsp;

<a href="#DNS">DNS</a>
&nbsp;

<a href="#DOS">DOS</a>
&nbsp;

<a href="#ECHO">ECHO</a>
&nbsp;

<a href="#FINGER">FINGER</a>
&nbsp;

<a href="#FTP">FTP</a>
&nbsp;

<a href="#GOPHER">GOPHER</a>
&nbsp;

<a href="#HTTP">HTTP</a>
&nbsp;

<a href="#ICMP">ICMP</a>
&nbsp;

<a href="#IDENT">IDENT</a>
&nbsp;

<a href="#IKE">IKE</a>
&nbsp;

<a href="#IMAP">IMAP</a>
&nbsp;

<a href="#IP">IP</a>
&nbsp;

<a href="#LDAP">LDAP</a>
&nbsp;

<a href="#LPD">LPD</a>
&nbsp;

<a href="#LPR">LPR</a>
&nbsp;

<a href="#MISC">MISC</a>
&nbsp;

<a href="#MS-RPC">MS-RPC</a>
&nbsp;

<a href="#NDMP">NDMP</a>
&nbsp;

<a href="#NETBIOS">NETBIOS</a>
&nbsp;

<a href="#NFS">NFS</a>
&nbsp;

<a href="#NNTP">NNTP</a>
&nbsp;

<a href="#NTP">NTP</a>
&nbsp;

<a href="#OS">OS</a>
&nbsp;

<a href="#P2P">P2P</a>
&nbsp;

<a href="#POP3">POP3</a>
&nbsp;

<a href="#PORTMAPPER">PORTMAPPER</a>
&nbsp;

<a href="#PROTOCOLS">PROTOCOLS</a>
&nbsp;

<a href="#RADIUS">RADIUS</a>
&nbsp;

<a href="#REXEC">REXEC</a>
&nbsp;

<a href="#RLOGIN">RLOGIN</a>
&nbsp;

<a href="#RPC">RPC</a>
&nbsp;

<a href="#RSH">RSH</a>
&nbsp;

<a href="#RSYNC">RSYNC</a>
&nbsp;

<a href="#RTSP">RTSP</a>
&nbsp;

<a href="#RUSERS">RUSERS</a>
&nbsp;

<a href="#SCADA">SCADA</a>
&nbsp;

<a href="#SCAN">SCAN</a>
&nbsp;

<a href="#SCREENOS">SCREENOS</a>
&nbsp;

<a href="#SHELLCODE">SHELLCODE</a>
&nbsp;

<a href="#SMB">SMB</a>
&nbsp;

<a href="#SMTP">SMTP</a>
&nbsp;

<a href="#SNMP">SNMP</a>
&nbsp;

<a href="#SNMPTRAP">SNMPTRAP</a>
&nbsp;

<a href="#SPYWARE">SPYWARE</a>
&nbsp;

<a href="#SSH">SSH</a>
&nbsp;

<a href="#SSL">SSL</a>
&nbsp;

<a href="#SYSLOG">SYSLOG</a>
&nbsp;

<a href="#TCP">TCP</a>
&nbsp;

<a href="#TELNET">TELNET</a>
&nbsp;

<a href="#TFTP">TFTP</a>
&nbsp;

<a href="#TIP">TIP</a>
&nbsp;

<a href="#TROJAN">TROJAN</a>
&nbsp;

<a href="#UDP">UDP</a>
&nbsp;

<a href="#VIRUS">VIRUS</a>
&nbsp;

<a href="#VNC">VNC</a>
&nbsp;

<a href="#VOIP">VOIP</a>
&nbsp;

<a href="#WHOIS">WHOIS</a>
&nbsp;

<a href="#WORM">WORM</a>
&nbsp;

<a href="#X11">X11</a>


&nbsp;<b><a href="#recommended">Recommended</a></b>

<table cellspacing="0" cellpadding="2" class="jTable">
 <tbody>
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="APP"></a>APP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3A2WIRE-DSL-VULN.html">APP:2WIRE-DSL-VULN</a></b></td>
   <td width="500" valign="top">
    MISC: 2Wire DSL Router Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AABB-NETSCANHOST-OF.html">APP:ABB-NETSCANHOST-OF</a></b></td>
   <td width="500" valign="top">
    APP: ABB Products RobNetScanHost.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AACCELLION-FILE-TRANSFER.html">APP:ACCELLION-FILE-TRANSFER</a></b></td>
   <td width="500" valign="top">
    APP: Accellion File Transfer Appliance Message Routing Daemon Default Encryption Keys
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AADOBE-CF-DIR-TRAV.html">APP:ADOBE-CF-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Adobe ColdFusion Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AADOBE-COLDFUSION-WEBSOCKET.html">APP:ADOBE-COLDFUSION-WEBSOCKET</a></b></td>
   <td width="500" valign="top">
    APP: Adobe ColdFusion Unauthorized ColdFusion Components (CFC) Invokation via Web Socket
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AADOBE-FLASH-RTMP-RCE.html">APP:ADOBE-FLASH-RTMP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP Message Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAFP-LEN-OF.html">APP:AFP-LEN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Apple Filing Protocol Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAGENTX-RECEIVE-INT-OF.html">APP:AGENTX-RECEIVE-INT-OF</a></b></td>
   <td width="500" valign="top">
    APP: AgentX++ receive_agentx Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAGENTX-RECEIVE-OF.html">APP:AGENTX-RECEIVE-OF</a></b></td>
   <td width="500" valign="top">
    APP: AgentX++ receive_agentx Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAI%3ANO-MATCH.html">APP:AI:NO-MATCH</a></b></td>
   <td width="500" valign="top">
    APP: No Application Identification Match
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAI%3APARTIAL-MATCH.html">APP:AI:PARTIAL-MATCH</a></b></td>
   <td width="500" valign="top">
    APP: Partial Application Identification Match
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAI%3APROTOCOL-MISMATCH.html">APP:AI:PROTOCOL-MISMATCH</a></b></td>
   <td width="500" valign="top">
    APP: Protocol Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AALTN-WORLDCLIENT-MEM.html">APP:ALTN-WORLDCLIENT-MEM</a></b></td>
   <td width="500" valign="top">
    APP: Alt-N MDaemon WorldClient Service Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAMANDA%3AAMANDA-ROOT-OF1.html">APP:AMANDA:AMANDA-ROOT-OF1</a></b></td>
   <td width="500" valign="top">
    APP: Amanda Amindexd Remote Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAMANDA%3AAMANDA-ROOT-OF2.html">APP:AMANDA:AMANDA-ROOT-OF2</a></b></td>
   <td width="500" valign="top">
    APP: Amanda Amindexd Remote Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAPPLE-CUPS-PNG-FILTER-OF.html">APP:APPLE-CUPS-PNG-FILTER-OF</a></b></td>
   <td width="500" valign="top">
    APP: Apple CUPS PNG Filter Overly Large Image Height Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAPPLE-MACOSX-ODP-RCE.html">APP:APPLE-MACOSX-ODP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Apple Mac OS X ODProxy Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAPPLE-SIRI.html">APP:APPLE-SIRI</a></b></td>
   <td width="500" valign="top">
    APP: Apple Siri Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAPT-WWW-PROXY%3AAWPLOG-DOS.html">APP:APT-WWW-PROXY:AWPLOG-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Apt-www-proxy awp_log() Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AARKEIA%3AAGENT-ACCESS.html">APP:ARKEIA:AGENT-ACCESS</a></b></td>
   <td width="500" valign="top">
    APP: Arkeia Network Backup Agent Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AARKEIA%3AAGENT-CONFIG.html">APP:ARKEIA:AGENT-CONFIG</a></b></td>
   <td width="500" valign="top">
    APP: Arkeia Network Backup Agent Config Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AARKEIA%3ADEFAULT-ADMIN-PW.html">APP:ARKEIA:DEFAULT-ADMIN-PW</a></b></td>
   <td width="500" valign="top">
    APP: Arkeia Network Backup Default Admin Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AARKEIA%3ADEFAULT-PASSWORD.html">APP:ARKEIA:DEFAULT-PASSWORD</a></b></td>
   <td width="500" valign="top">
    APP: Arkeia Network Backup Default Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AARKEIA%3ATYPE-77-OF.html">APP:ARKEIA:TYPE-77-OF</a></b></td>
   <td width="500" valign="top">
    APP: Arkeia Network Backup Type 77 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AASTERISK-PJSIP-MODULE-DOS.html">APP:ASTERISK-PJSIP-MODULE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Asterisk PJSIP Module Event Package SIP SUBSCRIBE Request Handling Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AASTIUM-PBX-DOS.html">APP:ASTIUM-PBX-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Astium PBX Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AASUS-WRT-INFOSVR-COMND-EXEC.html">APP:ASUS-WRT-INFOSVR-COMND-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Asus Write Infosvr Service Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AAVAYA-CCRWEBCLIENT-RCE.html">APP:AVAYA-CCRWEBCLIENT-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABAKBON-NETVAULT-HEAP-OF.html">APP:BAKBON-NETVAULT-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    BakBone NetVault Remote Heap Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABAKBON-NETVAULT-INT-OF.html">APP:BAKBON-NETVAULT-INT-OF</a></b></td>
   <td width="500" valign="top">
    APP: BakBone NetVault Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABIGANT-SCH-CMD-BOF.html">APP:BIGANT-SCH-CMD-BOF</a></b></td>
   <td width="500" valign="top">
    APP: BigAnt Server SCH Request Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABIGANT-SERVER-FILE-UPLOAD.html">APP:BIGANT-SERVER-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: BigAnt Server File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABIGANT-USV-BOF.html">APP:BIGANT-USV-BOF</a></b></td>
   <td width="500" valign="top">
    APP: BigAnt Server USV Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABLUECOAT-AAA-OF.html">APP:BLUECOAT-AAA-OF</a></b></td>
   <td width="500" valign="top">
    APP: Blue Coat Authentication and Authorization Agent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABLUECOAT-BCAAA-BOF.html">APP:BLUECOAT-BCAAA-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Blue Coat Authentication and Authorization Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABOMBER-BO.html">APP:BOMBER-BO</a></b></td>
   <td width="500" valign="top">
    APP: Bomberclone Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABORLAND-STARTEAM.html">APP:BORLAND-STARTEAM</a></b></td>
   <td width="500" valign="top">
    APP: Borland StarTeam Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABORLAND%3AVISIBROKER.html">APP:BORLAND:VISIBROKER</a></b></td>
   <td width="500" valign="top">
    APP: Borland VisiBroker Smart Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ABRG-MAIL-US-PASS.html">APP:BRG-MAIL-US-PASS</a></b></td>
   <td width="500" valign="top">
    APP: BirghtMail-Anti-Spam-Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AALERT-SRV-OF.html">APP:CA:ALERT-SRV-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Alert Notification Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABACKUP-CMD-EXEC.html">APP:CA:ARCSRV:BACKUP-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: BrightStor ARCserve Backup Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCK-MESSAGE.html">APP:CA:ARCSRV:BCK-MESSAGE</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Mssage Engine Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCK-MSG.html">APP:CA:ARCSRV:BCK-MSG</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Message Engine Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCKUP-AUTHSRV-CE.html">APP:CA:ARCSRV:BCKUP-AUTHSRV-CE</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup Authentication Service Invalid Virtual Function Call Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCKUP-AUTHSRV-DOS.html">APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup Authentication Service Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABME-OP-117.html">APP:CA:ARCSRV:BME-OP-117</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Message Engine Opcode 117 Buffer 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABRIGHTSTOR-BKP-BO.html">APP:CA:ARCSRV:BRIGHTSTOR-BKP-BO</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCServe Backup LGServer Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ACALOGGERD-BO.html">APP:CA:ARCSRV:CALOGGERD-BO</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup caloggerd Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ACAMEDIASRV.html">APP:CA:ARCSRV:CAMEDIASRV</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Mediasrv.exe RPC Request Code Execution (CVE-2007-17850)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ACAMEDIASRV-UDP.html">APP:CA:ARCSRV:CAMEDIASRV-UDP</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Mediasrv.exe RPC Request Code Execution (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AD2D-AXIS2-RCE.html">APP:CA:ARCSRV:D2D-AXIS2-RCE</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve D2D Axis2 Default Credentials Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ADIRTRAV.html">APP:CA:ARCSRV:DIRTRAV</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve NetBackup Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ADISCSRV-DOS.html">APP:CA:ARCSRV:DISCSRV-DOS</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup Discovery Service Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AFILE-UPLOAD.html">APP:CA:ARCSRV:FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve NetBackup File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AGWT-INFO-DISC.html">APP:CA:ARCSRV:GWT-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve D2D GWT RPC Request Credentials Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AHSM-OF.html">APP:CA:ARCSRV:HSM-OF</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor HSM Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALG-SERVER-RCE.html">APP:CA:ARCSRV:LG-SERVER-RCE</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCServe Backup for Laptops and Desktops LGServer Service Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALGSERVER-AUTH.html">APP:CA:ARCSRV:LGSERVER-AUTH</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCServe Backup LGServer Authentication Password Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALGSERVER-AUTH-USR.html">APP:CA:ARCSRV:LGSERVER-AUTH-USR</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCServe Backup LGServer Authentication Username Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALGSERVER-CMDNAME.html">APP:CA:ARCSRV:LGSERVER-CMDNAME</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup for Laptops and Desktops LGServer Multiple Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALGSERVER-HSHAKE.html">APP:CA:ARCSRV:LGSERVER-HSHAKE</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup for Laptops and Desktops LGServer Handshake Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ALOGGERD-DOS.html">APP:CA:ARCSRV:LOGGERD-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Backup caloggerd.exe Null Hostname Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMAILSLOT-OF.html">APP:CA:ARCSRV:MAILSLOT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Mailslot Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMEDIASERVER-BO.html">APP:CA:ARCSRV:MEDIASERVER-BO</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Media Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMETHD-EXPOSURE.html">APP:CA:ARCSRV:METHD-EXPOSURE</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Backup Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMETHOD-EXPOSURE.html">APP:CA:ARCSRV:METHOD-EXPOSURE</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Message Engine Insecure Method Exposure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMOBILE.html">APP:CA:ARCSRV:MOBILE</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCServe Backup LGServer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3APORTMAPPER.html">APP:CA:ARCSRV:PORTMAPPER</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Backup Portmapper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ARPC-MEMCORRUPT.html">APP:CA:ARCSRV:RPC-MEMCORRUPT</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Tape Engine RPC Procedure Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ARPC-MEMRCORRUPT.html">APP:CA:ARCSRV:RPC-MEMRCORRUPT</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Tape RPC Procedure Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ARPC-TAPE-ENG.html">APP:CA:ARCSRV:RPC-TAPE-ENG</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCServer Tape Engine Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ASQLOF.html">APP:CA:ARCSRV:SQLOF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Backup Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ATAPE-ENGINE-DOS.html">APP:CA:ARCSRV:TAPE-ENGINE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: CA ARCserve Backup Tape Engine Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ATAPE-ENGNE-DOS.html">APP:CA:ARCSRV:TAPE-ENGNE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Backup Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ATAPE-OP-207.html">APP:CA:ARCSRV:TAPE-OP-207</a></b></td>
   <td width="500" valign="top">
    App: CA BrightStor ARCserve Backup Tape Engine RPC Opcode 207 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ATCP-BOF.html">APP:CA:ARCSRV:TCP-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Backup Buffer Overflow via TCP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AUA-OF.html">APP:CA:ARCSRV:UA-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Universal Agent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AUNICENTERAGENT-2.html">APP:CA:ARCSRV:UNICENTERAGENT-2</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor Unicenter Agent Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AUNICENTERAGENT-OF.html">APP:CA:ARCSRV:UNICENTERAGENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor Unicenter Agent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AXDR-PARSING-BO.html">APP:CA:ARCSRV:XDR-PARSING-BO</a></b></td>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup XDR Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ACONSOLE-LOGIN-OVERFLOW.html">APP:CA:CONSOLE-LOGIN-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    APP: CA Multiple Products Console Server Login Credentials Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ADBA-SVR-POINT.html">APP:CA:DBA-SVR-POINT</a></b></td>
   <td width="500" valign="top">
         APP: CA Multiple Products DBASVR RPC Server Pointer Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ADBASVR-POINT.html">APP:CA:DBASVR-POINT</a></b></td>
   <td width="500" valign="top">
    APP: CA Multiple Products DBASVR RPC Server Crafted Pointer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AETRUST-ID-KEY-DOS.html">APP:CA:ETRUST-ID-KEY-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: CA eTrust Intrusion Detection Encryption Key Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AIGATEWAY-BOF.html">APP:CA:IGATEWAY-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates iGateway Debug Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AIGATEWAY-CNT-LEN-OF.html">APP:CA:IGATEWAY-CNT-LEN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Content-Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AIGATEWAY-DEBUG.html">APP:CA:IGATEWAY-DEBUG</a></b></td>
   <td width="500" valign="top">
    APP:  Computer Associates iTechnology iGateway Debug Mode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-COMMAND-OF.html">APP:CA:LIC-COMMAND-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-GCR-OF-CLT.html">APP:CA:LIC-GCR-OF-CLT</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software GCR Buffer Overflow (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-GCR-OF-SVR.html">APP:CA:LIC-GCR-OF-SVR</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software GCR Buffer Overflow (CVE-2005-0581)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-GETCONFIG-OF-CLT.html">APP:CA:LIC-GETCONFIG-OF-CLT</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software GETCONFIG Buffer Overflow (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-GETCONFIG-OF-SVR.html">APP:CA:LIC-GETCONFIG-OF-SVR</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software GETCONFIG buffer overflow (CVE-2005-0581)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-GETCONFIG-OF2.html">APP:CA:LIC-GETCONFIG-OF2</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software GETCONFIG Buffer Overflow 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALIC-PUTOLF-OF.html">APP:CA:LIC-PUTOLF-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates License Software PUTOLF Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ALOG-SEC-BOF.html">APP:CA:LOG-SEC-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates log_security Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3AMESSAGE-QUEUE-HEAP.html">APP:CA:MESSAGE-QUEUE-HEAP</a></b></td>
   <td width="500" valign="top">
    APP: CA Products Message Queuing Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3APRODUCT-DISC-BOF.html">APP:CA:PRODUCT-DISC-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Products Discovery Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ARPC-MSG-BO.html">APP:CA:RPC-MSG-BO</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Products Message Engine RPC Server Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ARPC-MSG-OF.html">APP:CA:RPC-MSG-OF</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Products Message Engine RPC Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACA%3ARPC-MSG-OF-2.html">APP:CA:RPC-MSG-OF-2</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates Products Message Engine RPC Server Buffer Overflow 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACAIN-ABEL-CISCO-IOS-BOF.html">APP:CAIN-ABEL-CISCO-IOS-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Cain &amp; Abel Cisco IOS Configuration File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACDE-DTSPCD-OF.html">APP:CDE-DTSPCD-OF</a></b></td>
   <td width="500" valign="top">
    APP: CDE dtspcd Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACHKPOINT-FW-INFO-DISC.html">APP:CHKPOINT-FW-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    APP: Checkpoint Firewall WebUI Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACHKPOINT-FW-WEBUI-REDIRECT.html">APP:CHKPOINT-FW-WEBUI-REDIRECT</a></b></td>
   <td width="500" valign="top">
    APP: CheckPoint Firewall WebUI Arbitrary Site Redirect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACHROME-ENGINE-4-DOS.html">APP:CHROME-ENGINE-4-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Chrome Engine 4 Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AACS-FS.html">APP:CISCO:ACS-FS</a></b></td>
   <td width="500" valign="top">
    APP: Cisco ACS Format String Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AACS-OF.html">APP:CISCO:ACS-OF</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Secure ACS Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3ACNS-NETWORK-DOS.html">APP:CISCO:CNS-NETWORK-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Cisco CNS Network Registrar Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AFW-SCCP-DOS.html">APP:CISCO:FW-SCCP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Firewall Services Module SCCP Inspection Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3ALAN-MGMT-SOL-RCE.html">APP:CISCO:LAN-MGMT-SOL-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Prime LAN Management Solution Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3ANX-OS-PRIV-ESC.html">APP:CISCO:NX-OS-PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    APP: Cisco NX-OS Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AREGISTRAR-AUTH-BYPASS.html">APP:CISCO:REGISTRAR-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Network Registrar Default Credentials Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3ASECUREACS-AUTH-BYPASS.html">APP:CISCO:SECUREACS-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Secure Access Control Server Authorization Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3ASECURITY-AGENT-CE.html">APP:CISCO:SECURITY-AGENT-CE</a></b></td>
   <td width="500" valign="top">
    APP: Cisco Security Agent Management Center Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AVIDEO-SURVEILANCE-LFI.html">APP:CISCO:VIDEO-SURVEILANCE-LFI</a></b></td>
   <td width="500" valign="top">
    APP: Video Surveillance Operations Manager Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACISCO%3AVIDEO-SURVEILANCE-XSS.html">APP:CISCO:VIDEO-SURVEILANCE-XSS</a></b></td>
   <td width="500" valign="top">
    APP: Video Surveillance Operations Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AAG-CMD-INJ.html">APP:CITRIX:AG-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Access Gateway Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AAGENT-OF.html">APP:CITRIX:AGENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Program Neighborhood Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AAGENT-OF-2.html">APP:CITRIX:AGENT-OF-2</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Program Neighborhood Agent Buffer Overflow 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AIMA-BO.html">APP:CITRIX:IMA-BO</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Systems Multiple Products IMA Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AMETA-IMA-AUTH.html">APP:CITRIX:META-IMA-AUTH</a></b></td>
   <td width="500" valign="top">
    APP: Citrix MetaFrame IMA Authentication Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3ANSEPACOM-BOF.html">APP:CITRIX:NSEPACOM-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3APROVISIONING-OPCODE.html">APP:CITRIX:PROVISIONING-OPCODE</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services Opcode Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3APROVISIONINGSERV-UF.html">APP:CITRIX:PROVISIONINGSERV-UF</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services streamprocess.exe Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3ASTEAM-OF.html">APP:CITRIX:STEAM-OF</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services Streamprocess Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3ASTREAMPROCESS-BOF.html">APP:CITRIX:STREAMPROCESS-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services streamprocess.exe Component Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACITRIX%3AXENAPP-XML-RCE.html">APP:CITRIX:XENAPP-XML-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Citrix XenApp and XenDesktop XML Service Interface Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACLAMAV-UPX-OF-HTTP.html">APP:CLAMAV-UPX-OF-HTTP</a></b></td>
   <td width="500" valign="top">
    APP: ClamAV UPX File Handling Buffer Overflow (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACLAMAV-UPX-OF-SMTP.html">APP:CLAMAV-UPX-OF-SMTP</a></b></td>
   <td width="500" valign="top">
    APP: ClamAV UPX File Handling Heap Overflow (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACOLDFUSIONMX-ACC.html">APP:COLDFUSIONMX-ACC</a></b></td>
   <td width="500" valign="top">
    APP: Macromedia ColdFusion MX Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACONEXANT-LOGIN.html">APP:CONEXANT-LOGIN</a></b></td>
   <td width="500" valign="top">
    MISC: Conexant Chipset DSL Router Default Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACPANEL-RESETPASS.html">APP:CPANEL-RESETPASS</a></b></td>
   <td width="500" valign="top">
    APP: cPanel Resetpass Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS-GIF-BO.html">APP:CUPS-GIF-BO</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendor CUPS GIF Decoding Routine Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS-IPP-RCE.html">APP:CUPS-IPP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Apple CUPS IPP Use-after-free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3AAPPLE-DOSELECT.html">APP:CUPS:APPLE-DOSELECT</a></b></td>
   <td width="500" valign="top">
    APP: Apple CUPS cupsdDoSelect Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3ACGI-ADMIN-OF.html">APP:CUPS:CGI-ADMIN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: CUPS Administration Interface CGI Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3ACOMMAND-CHAR.html">APP:CUPS:COMMAND-CHAR</a></b></td>
   <td width="500" valign="top">
    APP: CUPS Command Shell Escape Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3ACUPS-JOBS-EXP.html">APP:CUPS:CUPS-JOBS-EXP</a></b></td>
   <td width="500" valign="top">
    APP: CUPS Jobs Form Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3AGIF-READ-LZW-OF.html">APP:CUPS:GIF-READ-LZW-OF</a></b></td>
   <td width="500" valign="top">
    APP: Apple CUPS gif_read_lzw Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3AHPGL-PC-OF.html">APP:CUPS:HPGL-PC-OF</a></b></td>
   <td width="500" valign="top">
    APP: CUPS HPGL Filter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3AJBIG2-SYMBOLDICTIONARY.html">APP:CUPS:JBIG2-SYMBOLDICTIONARY</a></b></td>
   <td width="500" valign="top">
    APP: CUPS JBIG2 Symbol Dictionary Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACUPS%3ATEXTTOPS-OF.html">APP:CUPS:TEXTTOPS-OF</a></b></td>
   <td width="500" valign="top">
    APP: Apple CUPS Text-to-PostScript Filter Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3AARGUMENTX-CMD.html">APP:CVS:ARGUMENTX-CMD</a></b></td>
   <td width="500" valign="top">
    APP: CVS Argumentx Command Double Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3ACVS-AUTHOR-OF.html">APP:CVS:CVS-AUTHOR-OF</a></b></td>
   <td width="500" valign="top">
    APP: CVS: Author Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3ACVS-FILE-INFO.html">APP:CVS:CVS-FILE-INFO</a></b></td>
   <td width="500" valign="top">
    APP: CVS File Existence Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3ADIR-OVERFLOW.html">APP:CVS:DIR-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    APP: CVS Directory Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3AENTRY-TAG-OF.html">APP:CVS:ENTRY-TAG-OF</a></b></td>
   <td width="500" valign="top">
    APP: CVS Entry Line Tag Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ACVS%3AEXCESSIVE-MAX-DOTDOT.html">APP:CVS:EXCESSIVE-MAX-DOTDOT</a></b></td>
   <td width="500" valign="top">
    APP: CVS Excessive Max-dotdot Argument
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADELL-OPENMANAGE-BO.html">APP:DELL-OPENMANAGE-BO</a></b></td>
   <td width="500" valign="top">
    APP: Dell OpenManage Web Server Malformed Request Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-COOKIE-OF.html">APP:DIGIUM-ASTERISK-COOKIE-OF</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk Cookie Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-MGR-CMDEXEC.html">APP:DIGIUM-ASTERISK-MGR-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk Manager User Shell Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-OF.html">APP:DIGIUM-ASTERISK-OF</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk HTTP Management Interface Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-SKINNY-DOS.html">APP:DIGIUM-ASTERISK-SKINNY-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk Skinny Channel NULL-Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-IAX2-DOS.html">APP:DIGIUM-IAX2-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk IAX2 Call Number Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADIGIUM-IAX2-POKE-DOS.html">APP:DIGIUM-IAX2-POKE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Digium Asterisk IAX2 POKE Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADISKPULSE-GETSERVERINFO-OF.html">APP:DISKPULSE-GETSERVERINFO-OF</a></b></td>
   <td width="500" valign="top">
    APP: DiskPulse Server &#39;GetServerInfo&#39; Buffer Overflow Remote Code Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ADISTCC-EXEC.html">APP:DISTCC-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Distributed C Compiler Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEIQ-LM-OF.html">APP:EIQ-LM-OF</a></b></td>
   <td width="500" valign="top">
    APP: eIQnetworks License Manager Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMBARCADERO-CONNECT-OF.html">APP:EMBARCADERO-CONNECT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Embarcadero InterBase Connect Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-ALPHA-BO.html">APP:EMC-ALPHA-BO</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStor Agent Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTOR-BOF.html">APP:EMC-ALPHASTOR-BOF</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStor Device Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTOR-LIB-BOF.html">APP:EMC-ALPHASTOR-LIB-BOF</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStor Library Control Program Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTORE-CMDEXEC.html">APP:EMC-ALPHASTORE-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStore Mutiple Parameter Parsing Command Injecton
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-ALPSTR-LIB-MGR-CMD-EXEC.html">APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStor Library Manager Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-APLHASTORE-FMTSTR.html">APP:EMC-APLHASTORE-FMTSTR</a></b></td>
   <td width="500" valign="top">
    APP: EMC AlphaStore Multiple Parameter Parsing Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-AUTOSTART-BOF.html">APP:EMC-AUTOSTART-BOF</a></b></td>
   <td width="500" valign="top">
    APP: EMC AutoStart Error Logging Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-CMCNE-INFO-DISC.html">APP:EMC-CMCNE-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    APP: EMC CMCNE FileUploadController Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-DATA-PROTECTION-DOS.html">APP:EMC-DATA-PROTECTION-DOS</a></b></td>
   <td width="500" valign="top">
    APP: EMC Data Protection Advisor Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-DATAPROTECTION-NULL-DOS.html">APP:EMC-DATAPROTECTION-NULL-DOS</a></b></td>
   <td width="500" valign="top">
    APP: EMC Data Protection Advisor NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-DOS.html">APP:EMC-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Retrospect Agent Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-NETWORKER-BYPASS.html">APP:EMC-NETWORKER-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: EMC NetWorker librpc.dll Security Check Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-NETWORKER-NSRD-BO.html">APP:EMC-NETWORKER-NSRD-BO</a></b></td>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrd.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-NETWORKER-NSRINDEXD-OF.html">APP:EMC-NETWORKER-NSRINDEXD-OF</a></b></td>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrindexd.exe Procedure 0x01 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-NSRINDEXD-BO.html">APP:EMC-NSRINDEXD-BO</a></b></td>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrindexd RPC Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-NSRINDEXD-DOS.html">APP:EMC-NSRINDEXD-DOS</a></b></td>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrexecd.exe RPC Packet Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-PACKT-INJ-COM-EXEC.html">APP:EMC-PACKT-INJ-COM-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: EMC AutoStart Packet Injection Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEMC-REPLICATION-MGR-CMD-EXE.html">APP:EMC-REPLICATION-MGR-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    APP: EMC Replication Manager Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AENCRYPTED-TRAFFIC-1.html">APP:ENCRYPTED-TRAFFIC-1</a></b></td>
   <td width="500" valign="top">
    Unidentified Encrypted Traffic (Loose)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AENCRYPTED-TRAFFIC-2.html">APP:ENCRYPTED-TRAFFIC-2</a></b></td>
   <td width="500" valign="top">
    Unidentified Encrypted Traffic (moderate threshold)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AENCRYPTED-TRAFFIC-3.html">APP:ENCRYPTED-TRAFFIC-3</a></b></td>
   <td width="500" valign="top">
    Unidentified Encrypted Traffic (Strict)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AESIGNAL%3AOVERFLOW-EXPLOIT.html">APP:ESIGNAL:OVERFLOW-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    APP: eSignal Buffer Overflow Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3A3G-A11-B0F.html">APP:ETHEREAL:3G-A11-B0F</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal 3G-A11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3ADISTCC-OF.html">APP:ETHEREAL:DISTCC-OF</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal DistCC Protocol Dissector Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3AEIGRP-OF-CLT.html">APP:ETHEREAL:EIGRP-OF-CLT</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal EIGRP Protocol Dissector Overflow (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3AEIGRP-OF-STC.html">APP:ETHEREAL:EIGRP-OF-STC</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal EIGRP Protocol Dissector Overflow (STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3AIGAP-ACCT-OF.html">APP:ETHEREAL:IGAP-ACCT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal IGAP Protocol Dissector Account Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3ANETFLOW-OF.html">APP:ETHEREAL:NETFLOW-OF</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal UDP Netflow Dissector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3ATCP-80-DOS.html">APP:ETHEREAL:TCP-80-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Ethereal Denial of Service over 80
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AETHEREAL%3ATCPDUMP-ISAKMP-DOS.html">APP:ETHEREAL:TCPDUMP-ISAKMP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: TCPDump ISAKMP Packet Parsing DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AEXCHANGE%3AEMSMDB32-DOS.html">APP:EXCHANGE:EMSMDB32-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Exchange EMSMDB32 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFCKEDITOR-RCE-UPLOAD.html">APP:FCKEDITOR-RCE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: FCKeditor Arbitrary File Upload Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFEDORA-DIR-SER-INFO-LEAK.html">APP:FEDORA-DIR-SER-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    APP: Fedora Directory Server Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFLASH-RTMP-RESP.html">APP:FLASH-RTMP-RESP</a></b></td>
   <td width="500" valign="top">
    APP: Adobe Flash Player Malformed RTMP Server Response Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFLASH-SRV-DOS.html">APP:FLASH-SRV-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Flash Server Administration Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFLEXERA-FLXNETPUB-IMGRD-BO.html">APP:FLEXERA-FLXNETPUB-IMGRD-BO</a></b></td>
   <td width="500" valign="top">
    APP: Flexera FlexNet Publisher License Server Manager lmgrd Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFREEPBX-ARI-DOS.html">APP:FREEPBX-ARI-DOS</a></b></td>
   <td width="500" valign="top">
    APP: FreePBX ARI Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFREEPBX-CALLMENUM.html">APP:FREEPBX-CALLMENUM</a></b></td>
   <td width="500" valign="top">
    APP: FreePBX callmenum Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFREEPBX-FILE-UPLOAD.html">APP:FREEPBX-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: FreePBX Recording Interface File Upload Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AFREEPBX-RECORDING-RCE.html">APP:FREEPBX-RECORDING-RCE</a></b></td>
   <td width="500" valign="top">
    APP: FreePBX Recordings Interface Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ACOD4-CONNECT.html">APP:GAME:COD4-CONNECT</a></b></td>
   <td width="500" valign="top">
    GAME: Call of Duty 4 Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ACS-CONNECT.html">APP:GAME:CS-CONNECT</a></b></td>
   <td width="500" valign="top">
    GAME: Counter-Strike Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ACS-S-CONNECT.html">APP:GAME:CS-S-CONNECT</a></b></td>
   <td width="500" valign="top">
    GAME: Counter-Strike Source Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ADIABLO3.html">APP:GAME:DIABLO3</a></b></td>
   <td width="500" valign="top">
    APP: Diablo 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ADIRECTPLAY-DOS.html">APP:GAME:DIRECTPLAY-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft DirectPlay DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ADIRECTPLAY-NULL-PTR.html">APP:GAME:DIRECTPLAY-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    GAME: DirectPlay Null Pointer Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ADIRECTPLAY-PLAYER-DOS.html">APP:GAME:DIRECTPLAY-PLAYER-DOS</a></b></td>
   <td width="500" valign="top">
    GAME: DirectPlay Fake Player Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AEAD-LOGIN.html">APP:GAME:EAD-LOGIN</a></b></td>
   <td width="500" valign="top">
    GAME: Electronic Arts Downloader Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AMEDAL-OF-HONOR-BO.html">APP:GAME:MEDAL-OF-HONOR-BO</a></b></td>
   <td width="500" valign="top">
    APP: Medal Of Honor Allied Assault Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3APS-APPLICATIONS.html">APP:GAME:PS-APPLICATIONS</a></b></td>
   <td width="500" valign="top">
    APP: Sony PlayStation Application Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3APS-CHAT.html">APP:GAME:PS-CHAT</a></b></td>
   <td width="500" valign="top">
    APP: Sony PlayStation Chat Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3APS-COMMUNITY.html">APP:GAME:PS-COMMUNITY</a></b></td>
   <td width="500" valign="top">
    APP: Sony PlayStation Community Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3APS-UPDATE.html">APP:GAME:PS-UPDATE</a></b></td>
   <td width="500" valign="top">
    APP: Sony PlayStation Software Update Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ASOURCE-QUERY.html">APP:GAME:SOURCE-QUERY</a></b></td>
   <td width="500" valign="top">
    GAME: Source Engine Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ASTARDOCK-IMPULSE.html">APP:GAME:STARDOCK-IMPULSE</a></b></td>
   <td width="500" valign="top">
    GAME: Stardock Impulse Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ASTEAM-LOGIN.html">APP:GAME:STEAM-LOGIN</a></b></td>
   <td width="500" valign="top">
    GAME: Steam Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3ASTEAM-URI.html">APP:GAME:STEAM-URI</a></b></td>
   <td width="500" valign="top">
    APP: Local Steam URI In Internet Site
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AUNREAL-GAMESPY-QP-BOF.html">APP:GAME:UNREAL-GAMESPY-QP-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Unreal Gamespy Query Protocol Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AUT2004-QUERY.html">APP:GAME:UT2004-QUERY</a></b></td>
   <td width="500" valign="top">
    GAME: Unreal Tournament 2004 Server Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AUT3-QUERY.html">APP:GAME:UT3-QUERY</a></b></td>
   <td width="500" valign="top">
    GAME: Unreal Tournament 3 Server Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AWII-ACTIVITY.html">APP:GAME:WII-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    APP: Nintendo Wii Video Game Console Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AWORDS-WITH-FRIENDS.html">APP:GAME:WORDS-WITH-FRIENDS</a></b></td>
   <td width="500" valign="top">
    APP: Words With Friends
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AWOW-LOGIN.html">APP:GAME:WOW-LOGIN</a></b></td>
   <td width="500" valign="top">
    GAME: World of Warcraft Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AWOW-REALM.html">APP:GAME:WOW-REALM</a></b></td>
   <td width="500" valign="top">
    GAME: World of Warcraft Realm Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AXBOX-DASHBOARD.html">APP:GAME:XBOX-DASHBOARD</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft XBox Console Dashboard Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AXBOX-HTTP-ACCESS.html">APP:GAME:XBOX-HTTP-ACCESS</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft XBox Device HTTP Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AXBOX-KERBEROS-LOGIN.html">APP:GAME:XBOX-KERBEROS-LOGIN</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft XBox Kerberos Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AXBOX-LIVE.html">APP:GAME:XBOX-LIVE</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft XBox Live Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAME%3AXBOX-LIVE-MARKETPLACE.html">APP:GAME:XBOX-LIVE-MARKETPLACE</a></b></td>
   <td width="500" valign="top">
    APP: Xbox Live Marketplace
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGAUNTLET%3AGAUNTLET-URL-OF.html">APP:GAUNTLET:GAUNTLET-URL-OF</a></b></td>
   <td width="500" valign="top">
    APP: Gauntlet URL Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGE-PROFICY-RT-DIRTRAVERSAL.html">APP:GE-PROFICY-RT-DIRTRAVERSAL</a></b></td>
   <td width="500" valign="top">
    MISC: GE Proficy Real-Time Information Portal Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGIMP-SCRIPTFU-OF.html">APP:GIMP-SCRIPTFU-OF</a></b></td>
   <td width="500" valign="top">
    APP: GIMP Script-Fu Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGIOP-COMM.html">APP:GIOP-COMM</a></b></td>
   <td width="500" valign="top">
    APP: GIOP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGOOG-PICASA.html">APP:GOOG-PICASA</a></b></td>
   <td width="500" valign="top">
    APP: Google Picasa Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AGTS-WAP-PASSDISC.html">APP:GTS-WAP-PASSDISC</a></b></td>
   <td width="500" valign="top">
    MISC: GlobalSunTech WAP Admin Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHORDE-WEBMAIL-CSRF.html">APP:HORDE-WEBMAIL-CSRF</a></b></td>
   <td width="500" valign="top">
    APP: Horde Groupware Webmail Edition Ingo Filter Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-ACMSERVLETDOWNLOAD.html">APP:HP-ACMSERVLETDOWNLOAD</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center UAM acmServletDownload Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-AIO-BO.html">APP:HP-AIO-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP AIO Archive Query Server oasoa.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROC-NEW-FOLDER.html">APP:HP-DATA-PROC-NEW-FOLDER</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Create New Folder Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-DOS.html">APP:HP-DATA-PROTECTOR-DOS</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Express Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-DTBCLS-OF.html">APP:HP-DATA-PROTECTOR-DTBCLS-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Express DtbClsLogin Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-FIN-SQL.html">APP:HP-DATA-PROTECTOR-FIN-SQL</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Multiple Products FinishedCopy SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-GET-SQL.html">APP:HP-DATA-PROTECTOR-GET-SQL</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Multiple Products GetPolicies SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-MMD-BOF.html">APP:HP-DATA-PROTECTOR-MMD-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Manager MMD Service Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-OP-DOS.html">APP:HP-DATA-PROTECTOR-OP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Media Operations Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-REQ-SQL.html">APP:HP-DATA-PROTECTOR-REQ-SQL</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Multiple Products RequestCopy SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-SIGN-DOS.html">APP:HP-DATA-PROTECTOR-SIGN-DOS</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Media Operations SignInName Parameter Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-SQL.html">APP:HP-DATA-PROTECTOR-SQL</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector LogClientInstallation SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-DBSERVER-BO.html">APP:HP-DATA-PRTCTR-DBSERVER-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Media Operation DBServer.exe Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-EXEC-BAR-CE.html">APP:HP-DATA-PRTCTR-EXEC-BAR-CE</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector EXEC_BAR Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-EXEC_CMD-BO.html">APP:HP-DATA-PRTCTR-EXEC_CMD-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Storage Data Protector EXEC_CMD Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-EXEC_CMD-RCE.html">APP:HP-DATA-PRTCTR-EXEC_CMD-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Client EXEC_CMD Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-EXEC_SETUP.html">APP:HP-DATA-PRTCTR-EXEC_SETUP</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Backup Client Service EXEC_SETUP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-MULTI-OP-OF.html">APP:HP-DATA-PRTCTR-MULTI-OP-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Express Opcode Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP-27.html">APP:HP-DATA-PRTCTR-OP-27</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 27 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP1091-305.html">APP:HP-DATA-PRTCTR-OP1091-305</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 1091 And 305 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP1092-BO.html">APP:HP-DATA-PRTCTR-OP1092-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 1092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP211-264.html">APP:HP-DATA-PRTCTR-OP211-264</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcodes 211 And 264 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP215-263.html">APP:HP-DATA-PRTCTR-OP215-263</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcodes 215 And 263 Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP227-BO.html">APP:HP-DATA-PRTCTR-OP227-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 227 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP234-BO.html">APP:HP-DATA-PRTCTR-OP234-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 234 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP235-BO.html">APP:HP-DATA-PRTCTR-OP235-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 235 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP259-BO.html">APP:HP-DATA-PRTCTR-OP259-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 259 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP260-BO.html">APP:HP-DATA-PRTCTR-OP260-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 260 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP267-BO.html">APP:HP-DATA-PRTCTR-OP267-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 267 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP28-11.html">APP:HP-DATA-PRTCTR-OP28-11</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 28 and 11 Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP42-DIR-TRV.html">APP:HP-DATA-PRTCTR-OP42-DIR-TRV</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 42 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP45-46.html">APP:HP-DATA-PRTCTR-OP45-46</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 45 and 46 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OPCODE.html">APP:HP-DATA-PRTCTR-OPCODE</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Multiple Opcode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OPCODES.html">APP:HP-DATA-PRTCTR-OPCODES</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Multiple Opcode Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-RDS-DOS.html">APP:HP-DATA-PRTCTR-RDS-DOS</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Manager RDS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DBARCHIVE-GIOP-BO.html">APP:HP-DBARCHIVE-GIOP-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Database Archiving Software GIOP Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-DIAGNOSTICS-OF.html">APP:HP-DIAGNOSTICS-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Diagnostics magentservice.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-FAULTDOWNLOADSERVLET.html">APP:HP-FAULTDOWNLOADSERVLET</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center FaultDownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-ICTDOWNLOADSERVLET.html">APP:HP-ICTDOWNLOADSERVLET</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center IctDownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-INODEMNGCHECKER-EXE-BOF.html">APP:HP-INODEMNGCHECKER-EXE-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP iNode Management Center iNodeMngChecker.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-INSIGHT-MANAGER-RCE.html">APP:HP-INSIGHT-MANAGER-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard Insight Manager JMX Remote Method Invocation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-INTELLI-MGMT-TFTP-BO.html">APP:HP-INTELLI-MGMT-TFTP-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center TFTP Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-INTELLIGENT-INFO-DISC.html">APP:HP-INTELLIGENT-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Intelligent Management Center Database Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LASERJET-EWS-XSS.html">APP:HP-LASERJET-EWS-XSS</a></b></td>
   <td width="500" valign="top">
    APP: HP Laser Jet ews_functions Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-HYDRA-DIAG-OF.html">APP:HP-LEFTHAND-HYDRA-DIAG-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance hydra Diag Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-HYDRA-INFO-DISC.html">APP:HP-LEFTHAND-HYDRA-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance hydra Credential Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-HYDRA-PING-OF.html">APP:HP-LEFTHAND-HYDRA-PING-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance hydra Ping Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-VIRT-SAN.html">APP:HP-LEFTHAND-VIRT-SAN</a></b></td>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LIPS-HSSPD.html">APP:HP-LIPS-HSSPD</a></b></td>
   <td width="500" valign="top">
    APP: HP Linux Imaging and Printing System HSSPD.PY Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-BO.html">APP:HP-LOADRUNNER-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP LoadRunner Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-RCE.html">APP:HP-LOADRUNNER-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP LoadRunner magentproc.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-SSL.html">APP:HP-LOADRUNNER-SSL</a></b></td>
   <td width="500" valign="top">
    APP: HP LoadRunner magentproc.exe Stack Buffer Overflow (SSL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-LOGIN-BOF.html">APP:HP-LOGIN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP StorageWorks P4000 Virtual SAN Appliance Login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MEDIA-SIGN-IN-NAME-DOS.html">APP:HP-MEDIA-SIGN-IN-NAME-DOS</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Media Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-BIMS-FILE-UPLOAD.html">APP:HP-MGMT-BIMS-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center BIMS UploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-CENTER-BO.html">APP:HP-MGMT-CENTER-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-DBMAN-OF.html">APP:HP-MGMT-DBMAN-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center dbman Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-FILE-UPLOAD.html">APP:HP-MGMT-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-IMG-OF.html">APP:HP-MGMT-IMG-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center img Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-SOM-SDFILE.html">APP:HP-MGMT-SOM-SDFILE</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center SOM sdFileDownload Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-TFTP-DATA-OF.html">APP:HP-MGMT-TFTP-DATA-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center TFTP Server DATA and ERROR Packets Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-TFTP-MODE-RCE.html">APP:HP-MGMT-TFTP-MODE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center TFTP Server MODE Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-MGMT-UAM-BO.html">APP:HP-MGMT-UAM-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center uam Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-NNM-HLEN-BOF.html">APP:HP-NNM-HLEN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP Network Node Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-OPENVIEW-DTPRTCTR-BO.html">APP:HP-OPENVIEW-DTPRTCTR-BO</a></b></td>
   <td width="500" valign="top">
    APP:HP Open View Storage Data Protector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-OPNVIEWSTORAGE-BOF.html">APP:HP-OPNVIEWSTORAGE-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP Open View Storage Data Protector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-OPNVW-STORAGE-DATA-BO.html">APP:HP-OPNVW-STORAGE-DATA-BO</a></b></td>
   <td width="500" valign="top">
    APP:HP Open Storage Data Protector Buffer Overflow 0137
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PM-EXP-DATA-LOGS.html">APP:HP-PM-EXP-DATA-LOGS</a></b></td>
   <td width="500" valign="top">
    APP: HP Power Manager formExportDataLogs Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCRVE-MANAGER-CE.html">APP:HP-PROCRVE-MANAGER-CE</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager EJBInvokerServlet or JMXInvokerServlet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCRVE-SNAC-FILE-UPLD.html">APP:HP-PROCRVE-SNAC-FILE-UPLD</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-BYPASS.html">APP:HP-PROCURVE-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC GetDomainControllerServlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FILE-UPLD-SSL.html">APP:HP-PROCURVE-FILE-UPLD-SSL</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FILE-UPLOAD.html">APP:HP-PROCURVE-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FUPLOAD-SSL.html">APP:HP-PROCURVE-FUPLOAD-SSL</a></b></td>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PROTECTOR-DIR-TRAV.html">APP:HP-PROTECTOR-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: HP DataProtector Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-PWR-MGR-DIR-TRAV.html">APP:HP-PWR-MGR-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: HP Power Manager formExportDataLogs Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-REPORTIMGSERVLET.html">APP:HP-REPORTIMGSERVLET</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center ReportImgServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SAN-IQ-CMD-INJ.html">APP:HP-SAN-IQ-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: HP SAN iQ Multiple Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SITESCOPE-CMD-INJ.html">APP:HP-SITESCOPE-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope runOMAgentCommand Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SM-RCE.html">APP:HP-SM-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP System Management iprange Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-STORAGEWORKS-BO.html">APP:HP-STORAGEWORKS-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP StorageWorks File Migration Agent RsaFTP.dll Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-STORAGEWORKS-BOF.html">APP:HP-STORAGEWORKS-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP StorageWorks Storage Mirroring Software Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-STORAGEWORKS-CIFS.html">APP:HP-STORAGEWORKS-CIFS</a></b></td>
   <td width="500" valign="top">
    APP: HP StorageWorks File Migration Agent RsaCIFS.dll Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-STORAGEWORKS-OPC22-BO.html">APP:HP-STORAGEWORKS-OPC22-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP StorageWorks Opcode 0x22 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SYS-IPRANGE-OF.html">APP:HP-SYS-IPRANGE-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP System Management Homepage iprange Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SYS-MANGMNT-CMD-INJ.html">APP:HP-SYS-MANGMNT-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: HP System Management Homepage Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-SYS-RCE.html">APP:HP-SYS-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP System Management Homepage iprange Parameter Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHP-VIRTUAL-SAN.html">APP:HP-VIRTUAL-SAN</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard Virtual SAN Appliance Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPIM-SOM-EUACCNT-BYPASS.html">APP:HPIM-SOM-EUACCNT-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center SOM euAccountSerivce Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPLOADRUNNER-XDR-BO.html">APP:HPLOADRUNNER-XDR-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP LoadRunner XDR Data Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ACMD-INJ.html">APP:HPOV:CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett Packard OpenView Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ADEMANDPOLL-FMT-STR.html">APP:HPOV:DEMANDPOLL-FMT-STR</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovet_demandpoll.exe Format String Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AHP-DPBC-OF.html">APP:HPOV:HP-DPBC-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Backup Client Service GET_FILE Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AHPOPSMGT-OF.html">APP:HPOV:HPOPSMGT-OF</a></b></td>
   <td width="500" valign="top">
    HP Operations Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AINT-MGMT-CTR-DIRTRAV.html">APP:HPOV:INT-MGMT-CTR-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center Reporting Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AINT-MGMT-CTR-INFO-DIS.html">APP:HPOV:INT-MGMT-CTR-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    APP:  HP Intelligent Management Center Database Credentials Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-BO.html">APP:HPOV:NNM-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Openview Network Node Manager Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-DISPLAYWIDTH-BOF.html">APP:HPOV:NNM-DISPLAYWIDTH-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager displayWidth Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-EVTCOR-CMD-INJ.html">APP:HPOV:NNM-EVTCOR-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager Event Correlation Service Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-EXECVP-NC-OF.html">APP:HPOV:NNM-EXECVP-NC-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager webappmon.exe execvp_nc Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-GETNNMDATA-OF.html">APP:HPOV:NNM-GETNNMDATA-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager getnnmdata.exe Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-HTTP-OF.html">APP:HPOV:NNM-HTTP-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager HTTP Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-HTTP-REQUEST.html">APP:HPOV:NNM-HTTP-REQUEST</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager webappmon.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-LOGIN-BOF.html">APP:HPOV:NNM-LOGIN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovsessionmgr.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-OVALARM-IO.html">APP:HPOV:NNM-OVALARM-IO</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovalarmsrv Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-OVLAUNCH-BO.html">APP:HPOV:NNM-OVLAUNCH-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovlaunch HTTP Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-OVW-MSG.html">APP:HPOV:NNM-OVW-MSG</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovw.dll Message Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-RADIA-NOTIFY.html">APP:HPOV:NNM-RADIA-NOTIFY</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager Radia Notify Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-RPING-BOF.html">APP:HPOV:NNM-RPING-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager rping Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-SNMP-BOF.html">APP:HPOV:NNM-SNMP-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ovwebsnmpsrv.exe OVwSelection Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-SNMP-HOST.html">APP:HPOV:NNM-SNMP-HOST</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager snmpviewer.exe Host Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNM-XSS.html">APP:HPOV:NNM-XSS</a></b></td>
   <td width="500" valign="top">
    APP: HP Network Node Manager i Multiple Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMI-BO.html">APP:HPOV:NNMI-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Network Node Manager(NNMi) ovopi.dll Options Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMRPTCONFIG-EXE-BOF.html">APP:HPOV:NNMRPTCONFIG-EXE-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager nnmRptConfig.exe nameParams text1 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMRPTCONFIG-EXE-OF.html">APP:HPOV:NNMRPTCONFIG-EXE-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager nnmRptConfig.exe Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMRPTCONFIG-EXE-RCE.html">APP:HPOV:NNMRPTCONFIG-EXE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager nnmRptConfig.exe schd_select1 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMRPTCONG-TEMPL.html">APP:HPOV:NNMRPTCONG-TEMPL</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager nnmRptConfig.exe Template Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ANODE-MGR-NNMRPTCONFIG.html">APP:HPOV:NODE-MGR-NNMRPTCONFIG</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager nnmRptConfig.exe Template Format String Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOALARM-LANG-OF.html">APP:HPOV:OALARM-LANG-OF</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OVAlarm OvAcceptLang Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOID-OF.html">APP:HPOV:OID-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView NNM snmp.exe Long OID Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOMNIBACK-II-ACE.html">APP:HPOV:OMNIBACK-II-ACE</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Omniback II Remote Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOMNIINET-OF.html">APP:HPOV:OMNIINET-OF</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard Application Recovery Manager OmniInet Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOMNILNET-NULL.html">APP:HPOV:OMNILNET-NULL</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector OmniInet Service NULL Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOPE-AGENT-CODA-BO.html">APP:HPOV:OPE-AGENT-CODA-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Operations Agent Opcode coda.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVALARMSRV-DOS.html">APP:HPOV:OVALARMSRV-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView Alarm Service Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVALARMSRV-DOS2.html">APP:HPOV:OVALARMSRV-DOS2</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView Alarm Denial of Service (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVALARMSRV-FMT-STR.html">APP:HPOV:OVALARMSRV-FMT-STR</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView Alarm Service Format String Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVALARMSRV-OF.html">APP:HPOV:OVALARMSRV-OF</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView Alarm Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVDLL-OVBUILDPATH-BOF.html">APP:HPOV:OVDLL-OVBUILDPATH-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVJAVALOCALE-OF.html">APP:HPOV:OVJAVALOCALE-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Network Node Manager OvJavaLocale Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVTRACE.html">APP:HPOV:OVTRACE</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView OVTrace Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AOVWEBSNMPSRV-OF.html">APP:HPOV:OVWEBSNMPSRV-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView NNM ovwebsnmpsrv.exe Command Line Argument Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3APERFORMANCE-INSIGHT.html">APP:HPOV:PERFORMANCE-INSIGHT</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Performance Insight Server Backdoor Account Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AREQ_SEV_CHANGE-DOS.html">APP:HPOV:REQ_SEV_CHANGE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard OpenView Alarm Service REQUEST_SEV_CHANGE Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ASDPM-HEAP-BOF.html">APP:HPOV:SDPM-HEAP-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView Storage Data Protector Cell Manager Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3ASNMPVIEWER-APP-OF.html">APP:HPOV:SNMPVIEWER-APP-OF</a></b></td>
   <td width="500" valign="top">
    APP: HP OpenView NNM snmpviewer.exe App Parameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHPOV%3AUNAUTH-FILE-UPLOAD.html">APP:HPOV:UNAUTH-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: Hewlett-Packard Operations Manager Server Unauthorized File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AHTTPD-MODLOG-COOKIE.html">APP:HTTPD-MODLOG-COOKIE</a></b></td>
   <td width="500" valign="top">
    APP: Apache HTTPD mod_log_config Cookie Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIA-WEBMAIL-OF.html">APP:IA-WEBMAIL-OF</a></b></td>
   <td width="500" valign="top">
    APP: IA WebMail Server Long GET Request Buffer Overrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ABLADECENTER-AMM-CSRF.html">APP:IBM:BLADECENTER-AMM-CSRF</a></b></td>
   <td width="500" valign="top">
    APP: IBM BladeCenter Advanced Management Module Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ABLADECENTER-DOS.html">APP:IBM:BLADECENTER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: IBM BladeCenter Advanced Management Module Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ABLADECENTER-INFO.html">APP:IBM:BLADECENTER-INFO</a></b></td>
   <td width="500" valign="top">
    APP: IBM BladeCenter Management Module Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ACOGNOS-BACKDOOR.html">APP:IBM:COGNOS-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    APP: IBM Cognos Express Hardcoded Credentials Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ACOGNOS-TM1-BOF.html">APP:IBM:COGNOS-TM1-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Cognos TM1 Admin Server Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ADB2-KUDDB2-DOS.html">APP:IBM:DB2-KUDDB2-DOS</a></b></td>
   <td width="500" valign="top">
    APP: IBM DB2 kuddb2 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ADIRECTOR-AGENT-DOS.html">APP:IBM:DIRECTOR-AGENT-DOS</a></b></td>
   <td width="500" valign="top">
    APP: IBM Director Agent Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ADIRECTOR-CIM-DOS.html">APP:IBM:DIRECTOR-CIM-DOS</a></b></td>
   <td width="500" valign="top">
    APP: IBM Director CIM Server Consumer Name Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ADOMINO-BYPASS.html">APP:IBM:DOMINO-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: IBM Lotus Domino Remote Console Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ADOMINO-BYPASS-1.html">APP:IBM:DOMINO-BYPASS-1</a></b></td>
   <td width="500" valign="top">
    APP: IBM Lotus Domino Remote Console Auth Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AFORMVIEWER-XFDL-BOF.html">APP:IBM:FORMVIEWER-XFDL-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Forms Viewer XFDL Form Fontname Tag Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AFXCLI-EXECBO.html">APP:IBM:FXCLI-EXECBO</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server FXCLI_OraBR_Exec_Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AIDS-LIBRPC.html">APP:IBM:IDS-LIBRPC</a></b></td>
   <td width="500" valign="top">
    APP: Informix Dynamic Server Lib RPC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AINFORMIX-CMD-OF.html">APP:IBM:INFORMIX-CMD-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server Command Argument Processing Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AINFORMIX-DBINFO-BOF.html">APP:IBM:INFORMIX-DBINFO-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server DBINFO Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AINFORMIX-EXPLAIN.html">APP:IBM:INFORMIX-EXPLAIN</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server oninit.exe EXPLAIN Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AINFORMIX-EXPLAIN-BOF.html">APP:IBM:INFORMIX-EXPLAIN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server oninit.exe EXPLAIN Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AINFORMIX-LIBRPC-DLL-BOF.html">APP:IBM:INFORMIX-LIBRPC-DLL-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server librpc.dll Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ALDAP-MODIFYREQUEST-BO.html">APP:IBM:LDAP-MODIFYREQUEST-BO</a></b></td>
   <td width="500" valign="top">
    APP: IBM Domino LDAP Server ModifyRequest Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ALOTUS-NOTES-HTML-OF.html">APP:IBM:LOTUS-NOTES-HTML-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Lotus Notes HTML Message Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ASET-ENVIRONMENT-BOF.html">APP:IBM:SET-ENVIRONMENT-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Informix Dynamic Server SET ENVIRONMENT Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ASOLIDDB-DOS.html">APP:IBM:SOLIDDB-DOS</a></b></td>
   <td width="500" valign="top">
    APP: IBM SolidDB Packets Processing Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ASYMPHONY-SOAP-BOF.html">APP:IBM:SYMPHONY-SOAP-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Platform Symphony SOAP Requests Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ASYS-DIRECTOR-DLL-LOAD.html">APP:IBM:SYS-DIRECTOR-DLL-LOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM System Director Remote DLL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATEALEAF-PCA-CMDEXEC.html">APP:IBM:TEALEAF-PCA-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    APP: IBM TeaLeaf Passive Capture Application Module Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-DS-IBMSLAPD-EXE.html">APP:IBM:TIV-DS-IBMSLAPD-EXE</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Directory Server ibmslapd.exe Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1329-BOF.html">APP:IBM:TIV-OP1329-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1329 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1331-CMDINJ.html">APP:IBM:TIV-OP1331-CMDINJ</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Opcode 1331 Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1339-CMDINJ.html">APP:IBM:TIV-OP1339-CMDINJ</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Opcode 1339 Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-SCHEDULEPARAM-XSS.html">APP:IBM:TIV-SCHEDULEPARAM-XSS</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Endpoint Manager Web Reports ScheduleParam Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-SM-CAD.html">APP:IBM:TIV-SM-CAD</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager Client CAD Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-BOF.html">APP:IBM:TIVOLI-FASTBACK-BOF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli FastBack Service Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-OF.html">APP:IBM:TIVOLI-FASTBACK-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Mount Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-OP-BO.html">APP:IBM:TIVOLI-FASTBACK-OP-BO</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1332 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-RCE.html">APP:IBM:TIVOLI-FASTBACK-RCE</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Mount Service Code Execution (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-SER-RCE.html">APP:IBM:TIVOLI-FASTBACK-SER-RCE</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Mount Service Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-MAN-HEAP.html">APP:IBM:TIVOLI-MAN-HEAP</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager Express Backup Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-OF.html">APP:IBM:TIVOLI-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Management Framework Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-OP4115-BO.html">APP:IBM:TIVOLI-OP4115-BO</a></b></td>
   <td width="500" valign="top">
    APP: Tivoli Storage Manager FastBack Server Opcode 4115 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-PRO-MGR-BO.html">APP:IBM:TIVOLI-PRO-MGR-BO</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Provisioning Manager for OS Deployment HTTP Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-SRV-OP1301.html">APP:IBM:TIVOLI-SRV-OP1301</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1301 Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-SRV-OP1335.html">APP:IBM:TIVOLI-SRV-OP1335</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1335 Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATME-AGENT.html">APP:IBM:TME-AGENT</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Monitoring Express Universal Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-CLIENT-OF.html">APP:IBM:TSM-CLIENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Tivoli Storage Manager Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-CVE-2015-0119-BO.html">APP:IBM:TSM-CVE-2015-0119-BO</a></b></td>
   <td width="500" valign="top">
    APP: IBM TSM FastBack Opcode 0x09 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-NODE-NAME-OF.html">APP:IBM:TSM-NODE-NAME-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager NodeName Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-RCE.html">APP:IBM:TSM-RCE</a></b></td>
   <td width="500" valign="top">
    App: IBM Tivoli Storage Manager Fastback Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-SIGN-ON-OF.html">APP:IBM:TSM-SIGN-ON-OF</a></b></td>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager Initial Sign-on Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AWCM-XPATH-INJ.html">APP:IBM:WCM-XPATH-INJ</a></b></td>
   <td width="500" valign="top">
    APP: IBM Web Content Manager (WCM) XPath Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AWS-APPSRV-RCE.html">APP:IBM:WS-APPSRV-RCE</a></b></td>
   <td width="500" valign="top">
    APP: IBM WebSphere Application Server Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIBM%3AWS-APPSRV-RCE2.html">APP:IBM:WS-APPSRV-RCE2</a></b></td>
   <td width="500" valign="top">
     APP: IBM WebSphere Application Server Remote Code Execution 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AICECAST-BOF.html">APP:ICECAST-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Icecast 2.0 Server Header Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINDUSOFT-WEB-STUDIO-BO.html">APP:INDUSOFT-WEB-STUDIO-BO</a></b></td>
   <td width="500" valign="top">
    APP: InduSoft Web Studio Remote Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINDUSOFT-WEB-STUDIO-RCE.html">APP:INDUSOFT-WEB-STUDIO-RCE</a></b></td>
   <td width="500" valign="top">
    APP: InduSoft Web Studio Unauthenticated Insecure Remote Operations
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINDUSOFT-WEBSTUDIO-RCE.html">APP:INDUSOFT-WEBSTUDIO-RCE</a></b></td>
   <td width="500" valign="top">
    APP: InduSoft WebStudio Unauthenticated Remote Operations Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINGRES%3ADB-COMM-SVR-OF.html">APP:INGRES:DB-COMM-SVR-OF</a></b></td>
   <td width="500" valign="top">
    APP: Ingress Database Communications Server Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINGRES%3ADB-COMP-BO.html">APP:INGRES:DB-COMP-BO</a></b></td>
   <td width="500" valign="top">
    APP: Ingres Database Communications Server Component Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINTERSYSTEMS-CACHE-OF.html">APP:INTERSYSTEMS-CACHE-OF</a></b></td>
   <td width="500" valign="top">
    APP: InterSystems Cache &#39;UtilConfigHome.csp&#39; Remote Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AINVISIONIX-RS-RFI.html">APP:INVISIONIX-RS-RFI</a></b></td>
   <td width="500" valign="top">
    APP: Invisionix Roaming System Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIPMI-CIPHER-ZERO.html">APP:IPMI-CIPHER-ZERO</a></b></td>
   <td width="500" valign="top">
    APP: IPMI Cipher Zero Authentication Bypass And Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIPSO-FILE-VIEW.html">APP:IPSO-FILE-VIEW</a></b></td>
   <td width="500" valign="top">
    APP: Nokia IPSO File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AIPSWITCH%3ALOGGING-SVC-DOS.html">APP:IPSWITCH:LOGGING-SVC-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Ipswitch WS_FTP Logging Server DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AISCSI-TARGET-FMT-STR.html">APP:ISCSI-TARGET-FMT-STR</a></b></td>
   <td width="500" valign="top">
    APP: iSCSI target Multiple Implementations Format String Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AISCSI-TARGET-OF.html">APP:ISCSI-TARGET-OF</a></b></td>
   <td width="500" valign="top">
    APP: iSCSI target Multiple Implementations iSNS Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AJBOSS-JMX-AUTH-BYPASS.html">APP:JBOSS-JMX-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: RedHat JBoss Enterprise Application Platform JMX Console Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AJONDO-PROXY.html">APP:JONDO-PROXY</a></b></td>
   <td width="500" valign="top">
    APP: Jondo Privacy Generator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ABLDPRINCIPAL-VA1.html">APP:KERBEROS:BLDPRINCIPAL-VA1</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 build_principal_va Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ABLDPRINCIPAL-VA2.html">APP:KERBEROS:BLDPRINCIPAL-VA2</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 build_principal_va Denial of Service 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ACHKSUM-PRIV-ESC.html">APP:KERBEROS:CHKSUM-PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Checksum Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ADBLFREE.html">APP:KERBEROS:DBLFREE</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Heap Double Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ADBLFREE-2.html">APP:KERBEROS:DBLFREE-2</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Heap Double Free (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ADOS.html">APP:KERBEROS:DOS</a></b></td>
   <td width="500" valign="top">
    APP: MS Server Kerberos Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ADOS-TCP.html">APP:KERBEROS:DOS-TCP</a></b></td>
   <td width="500" valign="top">
    APP: MS Server Kerberos Denial of Service over TCP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AEXCESSIVE-ERRORS.html">APP:KERBEROS:EXCESSIVE-ERRORS</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos v5 Excessive Errors
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AGSS-ZERO-TOKEN.html">APP:KERBEROS:GSS-ZERO-TOKEN</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Zero-Length GSS Token
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AINV-TOKEN-DOS-TCP.html">APP:KERBEROS:INV-TOKEN-DOS-TCP</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AINV-TOKEN-DOS-UDP.html">APP:KERBEROS:INV-TOKEN-DOS-UDP</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKBR-DOS-TCP-2.html">APP:KERBEROS:KBR-DOS-TCP-2</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Denial of Service over TCP (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKDC-AUTH-DOS.html">APP:KERBEROS:KDC-AUTH-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos KDC Authentication Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKDC-NULL-DOS.html">APP:KERBEROS:KDC-NULL-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos KDC NULL Pointer Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKPASSWD-UDP-DOS.html">APP:KERBEROS:KPASSWD-UDP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 kpasswd UDP Ping-Pong Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKRB5-DOS.html">APP:KERBEROS:KRB5-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKRB5-MITM-DES.html">APP:KERBEROS:KRB5-MITM-DES</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos MITM DES
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMIT-KRB5-DOS.html">APP:KERBEROS:MIT-KRB5-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 KDC pkinit_check_kdc_pkid NULL Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMIT-KRB5-KDC-DOS.html">APP:KERBEROS:MIT-KRB5-KDC-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Key Distribution Center Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMS-KERB-ASN-BIT.html">APP:KERBEROS:MS-KERB-ASN-BIT</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Microsoft ASN.1 Library Bit String Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMS-WIN-2000-DOMAIN.html">APP:KERBEROS:MS-WIN-2000-DOMAIN</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Windows 2000 Domain Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMULTI-REALM-DOS.html">APP:KERBEROS:MULTI-REALM-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Kerberos Multi-realm KDC NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3APREP-REPROCESS-REQ.html">APP:KERBEROS:PREP-REPROCESS-REQ</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 KDC prep_reprocess_req NULL Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AREAD-MSG-DOS.html">APP:KERBEROS:READ-MSG-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Read Message Data Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3ASPNEGO-5-DOS.html">APP:KERBEROS:SPNEGO-5-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 SPNEGO Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AXREALM-DOS.html">APP:KERBEROS:XREALM-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos KDC Cross Realm Referral Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKERBEROS%3AXREALM-KDC-DOS.html">APP:KERBEROS:XREALM-KDC-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MIT Kerberos Cross-Realm Referrals KDC Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AKINDLE-BROWSER-NPAPI-RCE.html">APP:KINDLE-BROWSER-NPAPI-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Kindle Touch Browser Plugin libkindleplugin.so Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALANDESK-OF.html">APP:LANDESK-OF</a></b></td>
   <td width="500" valign="top">
    APP: LANDesk Management Suite Alert Service Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALANDESK-QIP-HEAL.html">APP:LANDESK-QIP-HEAL</a></b></td>
   <td width="500" valign="top">
    APP: LANDesk Management Suite QIP Service Heal Packet Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALANDESK-THINKMGT-DIRTRVRSAL.html">APP:LANDESK-THINKMGT-DIRTRVRSAL</a></b></td>
   <td width="500" valign="top">
    APP: LANDesk ThinkManagement Suite SetTaskLogByFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALENOVO-RCE-UPLOAD.html">APP:LENOVO-RCE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: Lenovo ThinkManagement Console Arbitrary File Upload Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALIBGTOP-FMT-STR.html">APP:LIBGTOP-FMT-STR</a></b></td>
   <td width="500" valign="top">
    APP: LibGTop Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ALINUX-SCTP-FWD-TSN-BO.html">APP:LINUX-SCTP-FWD-TSN-BO</a></b></td>
   <td width="500" valign="top">
    APP: Linux Kernel SCTP FWD-TSN Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMAL-AFP-DSI-REQ.html">APP:MAL-AFP-DSI-REQ</a></b></td>
   <td width="500" valign="top">
    APP: Apple Filing Protocol Malformed DSI Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-AM-INFO-DISC-SSL.html">APP:MCAFEE-AM-INFO-DISC-SSL</a></b></td>
   <td width="500" valign="top">
    SSL: McAfee Asset Manager downloadReport Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-AM-INPUT.html">APP:MCAFEE-AM-INPUT</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Asset Manager ReportsAudit.jsp Input Validation Error (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-AM-INPUT-SSL.html">APP:MCAFEE-AM-INPUT-SSL</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Asset Manager ReportsAudit.jsp Input Validation Error (SSL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-DIR-TRAVERSAL.html">APP:MCAFEE-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    SSL: McAfee Cloud Single Sign On ExtensionAccessServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-DLP-MGR-INFO-DISCL.html">APP:MCAFEE-DLP-MGR-INFO-DISCL</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Data Loss Prevention Manager Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-SQLI.html">APP:MCAFEE-EPOLICY-SQLI</a></b></td>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator UID Multiple SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-XML.html">APP:MCAFEE-EPOLICY-XML</a></b></td>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator XML External Entity Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-XSS.html">APP:MCAFEE-EPOLICY-XSS</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Epolicy Orchestrator Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-FIREWALL-RCE.html">APP:MCAFEE-FIREWALL-RCE</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Firewall Reporter isValidClient Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-ORCH-BO.html">APP:MCAFEE-ORCH-BO</a></b></td>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator Framework Services Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-ORCHESTRATOR-FS.html">APP:MCAFEE-ORCHESTRATOR-FS</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Framework ePolicy Orchestrator Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMCAFEE-WR-JBOSS-RCE.html">APP:MCAFEE-WR-JBOSS-RCE</a></b></td>
   <td width="500" valign="top">
    APP: McAfee Web Reporter JBoss EJBInvokerServlet Marshalled Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMDAEMON%3AFORM2RAW-OF.html">APP:MDAEMON:FORM2RAW-OF</a></b></td>
   <td width="500" valign="top">
    APP: MDaemon Form2Raw Message Handler Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMDAEMON%3ALIST-OF.html">APP:MDAEMON:LIST-OF</a></b></td>
   <td width="500" valign="top">
    MDaemon LIST Message Handler Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMDAEMON%3AMDCONFIG-VER.html">APP:MDAEMON:MDCONFIG-VER</a></b></td>
   <td width="500" valign="top">
    APP: MDConfig Malformed Version Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMDAEMON%3ASEND-OF.html">APP:MDAEMON:SEND-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: MDaemon Mail Server Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMEDIAWIKI-RCE.html">APP:MEDIAWIKI-RCE</a></b></td>
   <td width="500" valign="top">
    APP: MediaWiki Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMERCURY-BOF.html">APP:MERCURY-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Mercury Mail Transport System Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMERCURY-PH-BO.html">APP:MERCURY-PH-BO</a></b></td>
   <td width="500" valign="top">
    APP: Mercury PH Server Module Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AACROREAD-XML-URL.html">APP:MISC:ACROREAD-XML-URL</a></b></td>
   <td width="500" valign="top">
    APP: Adobe Reader 7 XML External Entity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AACTFAX-BO.html">APP:MISC:ACTFAX-BO</a></b></td>
   <td width="500" valign="top">
    APP: ActFax RAW Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AACTFAX-BO-HTTP.html">APP:MISC:ACTFAX-BO-HTTP</a></b></td>
   <td width="500" valign="top">
    APP: ActFax RAW Server Buffer Overflow over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AACTMQ-SHUTDN-CMD.html">APP:MISC:ACTMQ-SHUTDN-CMD</a></b></td>
   <td width="500" valign="top">
    APP: Apache ActiveMQ Shutdown Command Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AADOBE-RTMP-UAF.html">APP:MISC:ADOBE-RTMP-UAF</a></b></td>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP Use-After-Free (CVE-2014-0551)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AALIENVALT-BAKUP-COM-RE.html">APP:MISC:ALIENVALT-BAKUP-COM-RE</a></b></td>
   <td width="500" valign="top">
    AlienVault OSSIM Backup Command Unspecified Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-QPID-SEQSET-DOS.html">APP:MISC:APACHE-QPID-SEQSET-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Apache Qpid Sequence Set Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-QPID-SESS-DOS.html">APP:MISC:APACHE-QPID-SESS-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Apache Qpid Session Gap Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-SVN-IO.html">APP:MISC:APACHE-SVN-IO</a></b></td>
   <td width="500" valign="top">
    APP: Apache Subversion SVN Protocol Parser Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AARCSERVE-BKUP.html">APP:MISC:ARCSERVE-BKUP</a></b></td>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Backup Memory Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AARCSERVE-GETBACKUP.html">APP:MISC:ARCSERVE-GETBACKUP</a></b></td>
   <td width="500" valign="top">
    APP: Arcserve GetBackupPolicy Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAUTONOMY-CONN-TYPE-13.html">APP:MISC:AUTONOMY-CONN-TYPE-13</a></b></td>
   <td width="500" valign="top">
    APP: Autonomy Connected Backup Type 13 Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAV-USM-DESER-RCE.html">APP:MISC:AV-USM-DESER-RCE</a></b></td>
   <td width="500" valign="top">
    APP: AlientVault USM Deserialization Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAVAYA-WINPDM.html">APP:MISC:AVAYA-WINPDM</a></b></td>
   <td width="500" valign="top">
    APP: Avaya Windows Portable Device Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAVID-MEDIA-OF.html">APP:MISC:AVID-MEDIA-OF</a></b></td>
   <td width="500" valign="top">
    APP: Avid Media Composer Remote Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AAVIRA-ANTIVIR.html">APP:MISC:AVIRA-ANTIVIR</a></b></td>
   <td width="500" valign="top">
    APP: Avira AntiVir Personal Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ABIGANT-DDNF-BO.html">APP:MISC:BIGANT-DDNF-BO</a></b></td>
   <td width="500" valign="top">
    APP: BigAnt Server DDNF Request Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ABIGANT-IM-ANTSERVER-OF.html">APP:MISC:BIGANT-IM-ANTSERVER-OF</a></b></td>
   <td width="500" valign="top">
    APP: BigAnt IM Server AntServer Module USV Request Handling Remote Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ACITADEL-BO.html">APP:MISC:CITADEL-BO</a></b></td>
   <td width="500" valign="top">
    APP: Citadel UX Buffer Overrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ACLEARSCADA-OPF-PARSE.html">APP:MISC:CLEARSCADA-OPF-PARSE</a></b></td>
   <td width="500" valign="top">
    APP: Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ACNTWR-FV-GIF-LZWMCS-MC.html">APP:MISC:CNTWR-FV-GIF-LZWMCS-MC</a></b></td>
   <td width="500" valign="top">
    APP: Contaware FreeVimager GIF LZWMinimumCodeSize Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ACVE-2014-0549-RTMP-MC.html">APP:MISC:CVE-2014-0549-RTMP-MC</a></b></td>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP CVE-2014-0549 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AD-LINK-SEC-BYPASS.html">APP:MISC:D-LINK-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: D-Link DAP-1160 Wireless Access Point DCC Protocol Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ADOGFOOD-RCE.html">APP:MISC:DOGFOOD-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Dogfood CRM Mail spell.php Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ADOMINO-MGR-FS.html">APP:MISC:DOMINO-MGR-FS</a></b></td>
   <td width="500" valign="top">
    APP: Lotus Domino Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ADSM-SLICEUPLOAD-RCE.html">APP:MISC:DSM-SLICEUPLOAD-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Synology DiskStation Manager SliceUpload Functionality Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AEMC-AS-INSECUREOPS.html">APP:MISC:EMC-AS-INSECUREOPS</a></b></td>
   <td width="500" valign="top">
    APP: EMC AutoStart Insecure Operations RCE Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AEMC-AUTOSTART-NULLBYTE.html">APP:MISC:EMC-AUTOSTART-NULLBYTE</a></b></td>
   <td width="500" valign="top">
    APP: EMC AutoStart ftAgent.exe Null Byte Write
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AENTERASYS-NETSIGHT-BOF.html">APP:MISC:ENTERASYS-NETSIGHT-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Enterasys NetSight nssyslogd.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AESIGNAL-WINSIG-BO.html">APP:MISC:ESIGNAL-WINSIG-BO</a></b></td>
   <td width="500" valign="top">
    APP: eSignal WinSig.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AEZHOMETECH-EZSERVER-BO.html">APP:MISC:EZHOMETECH-EZSERVER-BO</a></b></td>
   <td width="500" valign="top">
    APP: EZHome Tech EZServer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AF-SECURE-WEB-BO.html">APP:MISC:F-SECURE-WEB-BO</a></b></td>
   <td width="500" valign="top">
    APP: F-Secure Products Web Console Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AFARONICS-DFE-RCE.html">APP:MISC:FARONICS-DFE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Faronics Deep Freeze Enterprise RCE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AFUJITSU-WEB-DIR-TRAV.html">APP:MISC:FUJITSU-WEB-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Fujitsu Web-Based Admin View Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AGANGLIA-METE-BOF.html">APP:MISC:GANGLIA-METE-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Ganglia Meta Daemon Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AGITORIOUS-RCE.html">APP:MISC:GITORIOUS-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Gitorious Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AGOOGLE-EARTH.html">APP:MISC:GOOGLE-EARTH</a></b></td>
   <td width="500" valign="top">
    APP: Google Earth Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AGUESTBOOK-CGI.html">APP:MISC:GUESTBOOK-CGI</a></b></td>
   <td width="500" valign="top">
    APP: Guestbook CGI Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHEARTBEAT-OF.html">APP:MISC:HEARTBEAT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Heartbeat Buffer Overflow (Linux/x86)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHICP-HOSTNAME.html">APP:MISC:HICP-HOSTNAME</a></b></td>
   <td width="500" valign="top">
    APP: IntelliCom NetBiter Config Utility Hostname Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-AUTOKEYLIB-CE.html">APP:MISC:HP-AUTOKEYLIB-CE</a></b></td>
   <td width="500" valign="top">
    APP: HP Autonomy KeyView Library Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-AUTOKEYLIB-RCE.html">APP:MISC:HP-AUTOKEYLIB-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP Autonomy KeyView Library Remote Code Execution Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-DATA-PROTECTOR-TRAV.html">APP:MISC:HP-DATA-PROTECTOR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: HP Data Protector Media Operations Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-INODE-BO.html">APP:MISC:HP-INODE-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP iNode Management Center iNodeMngChecker.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-MERCURY-BOF.html">APP:MISC:HP-MERCURY-BOF</a></b></td>
   <td width="500" valign="top">
    APP: HP Mercury Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-OA-HEALTH-BO.html">APP:MISC:HP-OA-HEALTH-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Operations Agent for NonStop Server HEALTH Packet Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-RADIO-CLI-MEMCP.html">APP:MISC:HP-RADIO-CLI-MEMCP</a></b></td>
   <td width="500" valign="top">
    APP: HP Radio Client Automation Memory Corruption Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-CE.html">APP:MISC:HP-SITESCOPE-CE</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope issueSiebelCmd SOAP Request Handling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-DIR-TRAV.html">APP:MISC:HP-SITESCOPE-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-LOADFILE.html">APP:MISC:HP-SITESCOPE-LOADFILE</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope loadFileContent SOAP Request Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-SOAP.html">APP:MISC:HP-SITESCOPE-SOAP</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope SOAP Call APIPreferenceImpl Multiple Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SSC-APIMONITORIMPL.html">APP:MISC:HP-SSC-APIMONITORIMPL</a></b></td>
   <td width="500" valign="top">
    APP: HP SiteScope SOAP Call APIMonitorImpl Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AJRE-PACK200-OF.html">APP:MISC:JRE-PACK200-OF</a></b></td>
   <td width="500" valign="top">
    APP: Sun Java Runtime Environment Pack200 Decompression Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AKADMIN-4-OF.html">APP:MISC:KADMIN-4-OF</a></b></td>
   <td width="500" valign="top">
    APP: Kadmin for krb-4.1.2 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ALCDPROC-BOF.html">APP:MISC:LCDPROC-BOF</a></b></td>
   <td width="500" valign="top">
    APP: LCDproc Open Source Software Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ALCDPROC-TEST-FUNC-FS.html">APP:MISC:LCDPROC-TEST-FUNC-FS</a></b></td>
   <td width="500" valign="top">
    APP: LCDproc LCDd test_func Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMCAFEE-EPOL-ORCH.html">APP:MISC:MCAFEE-EPOL-ORCH</a></b></td>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMS-ACTIVE-DIR-RCE.html">APP:MISC:MS-ACTIVE-DIR-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Active Directory Federation Services Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-DOS.html">APP:MISC:MUL-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Denial Of Service Vilnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-DOS-UDP.html">APP:MISC:MUL-DOS-UDP</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Denial Of Service Vilnerability (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-MEMCP-1.html">APP:MISC:MUL-MEMCP-1</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Memory Corruption 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-MEMCP-2.html">APP:MISC:MUL-MEMCP-2</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Memory Corruption 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-PRDCTS-CMD-EXEC.html">APP:MISC:MUL-PRDCTS-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Products Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-VENDORS-ID.html">APP:MISC:MUL-VENDORS-ID</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Information Disclosure Vulnerability (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMULTI-VENDORS-BOF.html">APP:MISC:MULTI-VENDORS-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Buffer Overflow (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMULTI-VENDORS-OF.html">APP:MISC:MULTI-VENDORS-OF</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Vendors Buffer Overflow (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AMULTIPLE-RCE.html">APP:MISC:MULTIPLE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Products Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ANAGIOS-NRPE-CE.html">APP:MISC:NAGIOS-NRPE-CE</a></b></td>
   <td width="500" valign="top">
    APP: Nagios Remote Plugin Executor 2.13 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ANAGIOS-NRPE-CHKUSRS-CI.html">APP:MISC:NAGIOS-NRPE-CHKUSRS-CI</a></b></td>
   <td width="500" valign="top">
    APP: Nagios Remote Plugin Executor Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ANEC-EXPCLU-BO.html">APP:MISC:NEC-EXPCLU-BO</a></b></td>
   <td width="500" valign="top">
    APP: NEC EXPCLUSTER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ANETVAULT-SD-DOS.html">APP:MISC:NETVAULT-SD-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Netvault SmartDisk Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AOBJ-OBJDB-BO.html">APP:MISC:OBJ-OBJDB-BO</a></b></td>
   <td width="500" valign="top">
    APP: OBJECTIVE DB Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AOP5-APP-PASSWORD.html">APP:MISC:OP5-APP-PASSWORD</a></b></td>
   <td width="500" valign="top">
    APP: op5 Appliance Password Parameter Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AOP5-APP-TIMESTAMP.html">APP:MISC:OP5-APP-TIMESTAMP</a></b></td>
   <td width="500" valign="top">
    APP: op5 Appliance Timestamp Parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3APIGEON-DOS.html">APP:MISC:PIGEON-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Pigeon Server Login Field DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3APXESERVICE-UDP.html">APP:MISC:PXESERVICE-UDP</a></b></td>
   <td width="500" valign="top">
    APP: Fujitsu SystemcastWizard PXEService Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AQUEST-NETVAULT-DOS.html">APP:MISC:QUEST-NETVAULT-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Quest NetVault SmartDisk libnvbasics.dll Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AREDHAT-JBOSS-JNDI.html">APP:MISC:REDHAT-JBOSS-JNDI</a></b></td>
   <td width="500" valign="top">
    APP: RedHat JBoss JNDI Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAM-ACTQ-MULTI.html">APP:MISC:SAM-ACTQ-MULTI</a></b></td>
   <td width="500" valign="top">
    APP: Samsung Security Manager ActiveMQ Broker Service Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAMSUNG-ALLSHARE-DOS.html">APP:MISC:SAMSUNG-ALLSHARE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Samsung AllShare Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAMSUNG-NET-I-WARE-DOS.html">APP:MISC:SAMSUNG-NET-I-WARE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Samsung NET-i ware Multiple Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAMSUNG-SWIFTKEY-RCE.html">APP:MISC:SAMSUNG-SWIFTKEY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung SwiftKey SDK Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAMSUNG-TV-BD-DOS.html">APP:MISC:SAMSUNG-TV-BD-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Samsung TV and BD Products Multiple Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAMSUNG-TV-SERVER-DOS.html">APP:MISC:SAMSUNG-TV-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Samsung PS50C7700 TV GET Request Handling DOS 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASAP-NETWEAVER-SOAP-RCE.html">APP:MISC:SAP-NETWEAVER-SOAP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver Unsafe SOAP Requests
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASCHNEIDER-ACCUTECH-B0.html">APP:MISC:SCHNEIDER-ACCUTECH-B0</a></b></td>
   <td width="500" valign="top">
    APP: Schneider Electric Accutech Manager HTTP Request Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASCHNEIDER-ELE-MGR-BO.html">APP:MISC:SCHNEIDER-ELE-MGR-BO</a></b></td>
   <td width="500" valign="top">
    APP: Schneider Electric Accutech Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASCHNEIDER-INDUSOFT-RCE.html">APP:MISC:SCHNEIDER-INDUSOFT-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Schneider Electric InduSoft Web Studio Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASCHNEIDER-SQLI-RCE.html">APP:MISC:SCHNEIDER-SQLI-RCE</a></b></td>
   <td width="500" valign="top">
    App: Schneider SQLI Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASIELCO-SISTEMI-WINLOG.html">APP:MISC:SIELCO-SISTEMI-WINLOG</a></b></td>
   <td width="500" valign="top">
    APP: Sielco Sistemi Winlog Pro Malformed Packet Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASIMENS-GIGAST-DOS.html">APP:MISC:SIMENS-GIGAST-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Siemens Gigaset SE361 WLAN Data Flood Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASOPHOS-WEBAPP-RCE.html">APP:MISC:SOPHOS-WEBAPP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Sophos Web Protection Appliance Sblistpack Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASPLASHTOP-DOS.html">APP:MISC:SPLASHTOP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Splashtop Streamer Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASPREE-SEARCH-CMD-EXE.html">APP:MISC:SPREE-SEARCH-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    APP: Spree Search ProductScope Class search send Parameter Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ASYNERGY-CLPBRD-OF.html">APP:MISC:SYNERGY-CLPBRD-OF</a></b></td>
   <td width="500" valign="top">
    APP: Synergy Clipboard DCLP Request Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ATANNE-FMT-STR.html">APP:MISC:TANNE-FMT-STR</a></b></td>
   <td width="500" valign="top">
    APP: Tanne logger() Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3ATVMOBILI-DOS.html">APP:MISC:TVMOBILI-DOS</a></b></td>
   <td width="500" valign="top">
    APP: TVMOBiLi CVE-2012-5451 Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AUNISYS-BIS.html">APP:MISC:UNISYS-BIS</a></b></td>
   <td width="500" valign="top">
    APP: Unisys Business Information Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AUPLUS-FTP-WEB-OF.html">APP:MISC:UPLUS-FTP-WEB-OF</a></b></td>
   <td width="500" valign="top">
    APP: UPlus FTP Server Web Interface Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AWSHARK-ENTTEC-BO.html">APP:MISC:WSHARK-ENTTEC-BO</a></b></td>
   <td width="500" valign="top">
    App: Wireshark ENTTEC DMX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AYEALINK-IP-PHONE-BO.html">APP:MISC:YEALINK-IP-PHONE-BO</a></b></td>
   <td width="500" valign="top">
    APP: YeaLink IP Phone SIP-T20P Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AYEALINK-IP-PHONE-CSRF.html">APP:MISC:YEALINK-IP-PHONE-CSRF</a></b></td>
   <td width="500" valign="top">
    APP: YeaLink IP Phone SIP-T20P Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AZABBIC-NODE-PROCESS-CE.html">APP:MISC:ZABBIC-NODE-PROCESS-CE</a></b></td>
   <td width="500" valign="top">
    APP: Zabbix NodeProcess Command Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AZABBIX-AGENT-RCE.html">APP:MISC:ZABBIX-AGENT-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Zabbix Agent NET_TCP_LISTEN Function Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AZABBIX-SQLI.html">APP:MISC:ZABBIX-SQLI</a></b></td>
   <td width="500" valign="top">
    APP: Zabbix 2.0.8 SQL Injection And Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AZEND-XMLRPC-INFO-DISC.html">APP:MISC:ZEND-XMLRPC-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    APP: Zend Technologies Zend Framework Zend_XmlRpc Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMISC%3AZIMBRA-COLLAB-INFODISC.html">APP:MISC:ZIMBRA-COLLAB-INFODISC</a></b></td>
   <td width="500" valign="top">
    APP: Zimbra Collaboration Server Local File Inclusion Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMOZY-ACTY.html">APP:MOZY-ACTY</a></b></td>
   <td width="500" valign="top">
    APP: Mozy Backup Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMS-SMS-DOS.html">APP:MS-SMS-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Systems Management Server (SMS) Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMS-SNABASE-EXE-DOS.html">APP:MS-SNABASE-EXE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Host Integration Server snabase.exe Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMS-SNBASE.html">APP:MS-SNBASE</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Host Integration Server (snabase.exe) Infinite Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AMSDOTNET-CVE-2014-1806.html">APP:MSDOTNET-CVE-2014-1806</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft .NET Framework CVE-2014-1806 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANAV-ENT-WEB-OF.html">APP:NAV-ENT-WEB-OF</a></b></td>
   <td width="500" valign="top">
    APP: Norton Anti-Virus Enterprise OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANAV-ENT-WEB-OF-2.html">APP:NAV-ENT-WEB-OF-2</a></b></td>
   <td width="500" valign="top">
    APP: Norton Anti-Virus Enterprise Web OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANETSUPPORT-MANAGER-BO.html">APP:NETSUPPORT-MANAGER-BO</a></b></td>
   <td width="500" valign="top">
    APP: NetSupport Manager Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL-EDIR-LEN-DOS.html">APP:NOVELL-EDIR-LEN-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory Unchecked Length Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL-NET-FTP-DEL-CMD-OF.html">APP:NOVELL-NET-FTP-DEL-CMD-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell Netware FTP Server DELE Command Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL-SECURITY-BYPASS.html">APP:NOVELL-SECURITY-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Novell Sentinel Log Manager Retention Policy Security Restriction Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ACASA-PAM-BOF.html">APP:NOVELL:CASA-PAM-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell CASA PAM Module Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ADIS-PRINT-SRV.html">APP:NOVELL:DIS-PRINT-SRV</a></b></td>
   <td width="500" valign="top">
    APP: Novell Distributed Print Services Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AEDIR-CONTENT-LEN-OF.html">APP:NOVELL:EDIR-CONTENT-LEN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory HTTP Request Content-Length Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AEDIR-HEADER-DOS.html">APP:NOVELL:EDIR-HEADER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory HTTP Headers Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AEDIR-PLUGIN-OF.html">APP:NOVELL:EDIR-PLUGIN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell iManager eDirectory Plugin Schema Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AEDIRECTORY-DOS.html">APP:NOVELL:EDIRECTORY-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AEDIRECTORY-ME-OF.html">APP:NOVELL:EDIRECTORY-ME-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory Monitored Events Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISE-ADDRESS.html">APP:NOVELL:GROUPWISE-ADDRESS</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Addressbook Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISE-ADDRESSBK.html">APP:NOVELL:GROUPWISE-ADDRESSBK</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Addressbook Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISE-CLIENT-BO.html">APP:NOVELL:GROUPWISE-CLIENT-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISE-MAILTO-BO.html">APP:NOVELL:GROUPWISE-MAILTO-BO</a></b></td>
   <td width="500" valign="top">
    HTTP:Novell GroupWise mailto URI Handler Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISE-WA.html">APP:NOVELL:GROUPWISE-WA</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise WebAccess HTTP Basic Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGROUPWISEIA-ICAL-DOS.html">APP:NOVELL:GROUPWISEIA-ICAL-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Internet Agent iCalendar Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGRPWISE-HOST-RCE.html">APP:NOVELL:GRPWISE-HOST-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Agent Host Header Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGWCLIENT-BOF.html">APP:NOVELL:GWCLIENT-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger HTTP Response Handling Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AGWMGR-INFODISC.html">APP:NOVELL:GWMGR-INFODISC</a></b></td>
   <td width="500" valign="top">
    APP: Novell Groupwise Messenger Server Process Memory Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AHTTP-NOVELL-REDIRECT.html">APP:NOVELL:HTTP-NOVELL-REDIRECT</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory HTTP Server Redirection Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-ARB-UPLOAD.html">APP:NOVELL:IMANAGER-ARB-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: Novell iManager getMultiPartParameters Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-CREATE-BO.html">APP:NOVELL:IMANAGER-CREATE-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell iManager Create Attribute EnteredAttrName Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-FILE-UPLOAD.html">APP:NOVELL:IMANAGER-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: Novell iManager getMultiPartParameters Unauthorized File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-TREE-NAME.html">APP:NOVELL:IMANAGER-TREE-NAME</a></b></td>
   <td width="500" valign="top">
    APP: Novell iManager Tree Name Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMONITOR-OF.html">APP:NOVELL:IMONITOR-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory iMonitor Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AINTERNET-AGENT-BOF.html">APP:NOVELL:INTERNET-AGENT-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Internet Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AIPRINT-ATTRIB-BO.html">APP:NOVELL:IPRINT-ATTRIB-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell iPrint Server attributes-natural-language Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-BOF.html">APP:NOVELL:MESSENGER-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell Messenger Client Filename Parameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-DOS.html">APP:NOVELL:MESSENGER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-LOGIN.html">APP:NOVELL:MESSENGER-LOGIN</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger nmma.exe Login Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-SERVER-BOF.html">APP:NOVELL:MESSENGER-SERVER-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell Messenger Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AMSNGR-CREATESEARCH.html">APP:NOVELL:MSNGR-CREATESEARCH</a></b></td>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger createsearch Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ANDS-IO.html">APP:NOVELL:NDS-IO</a></b></td>
   <td width="500" valign="top">
    APP: Novell eDirectory NDS Verb 0x01 Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ANETIQ-EDIR-BOF.html">APP:NOVELL:NETIQ-EDIR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell NetIQ eDirectory Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ANETWARE-XNFS-BO.html">APP:NOVELL:NETWARE-XNFS-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell Netware XNFS.NLM Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ANMAP-NETMAIL-STOR.html">APP:NOVELL:NMAP-NETMAIL-STOR</a></b></td>
   <td width="500" valign="top">
    APP: Novell Netmail Stor Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3APREBOOT-POLICY-BO.html">APP:NOVELL:PREBOOT-POLICY-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management Preboot Policy Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3ARECORD-TAG-BOF.html">APP:NOVELL:RECORD-TAG-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter Engine RECORD Tag Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREMOTE-MGR-DOS.html">APP:NOVELL:REMOTE-MGR-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Novell Remote Manager Off-by-One Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREPORTER-AGENT.html">APP:NOVELL:REPORTER-AGENT</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter VOL Tag Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREPORTER-AGENT-BOF.html">APP:NOVELL:REPORTER-AGENT-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter Agent XML Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREPORTER-FSFUI.html">APP:NOVELL:REPORTER-FSFUI</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter FSFUI Arbitrary File Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREPORTER-SRS.html">APP:NOVELL:REPORTER-SRS</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter SRS Arbitrary File Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AREPORTER-VOL.html">APP:NOVELL:REPORTER-VOL</a></b></td>
   <td width="500" valign="top">
    APP: Novell File Reporter VOL Tag Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AXNFS-NLM.html">APP:NOVELL:XNFS-NLM</a></b></td>
   <td width="500" valign="top">
    APP: Novell Netware Network Lock Manager Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-AGENT-OF.html">APP:NOVELL:ZENWORKS-AGENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-CONFMGR-BO.html">APP:NOVELL:ZENWORKS-CONFMGR-BO</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management PreBoot Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-CONTENT-LEN.html">APP:NOVELL:ZENWORKS-CONTENT-LEN</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Malformed Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-DIR-TRAV.html">APP:NOVELL:ZENWORKS-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management PreBoot Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-DIR-TRVRS.html">APP:NOVELL:ZENWORKS-DIR-TRVRS</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management File Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-FHIPCND-EXE.html">APP:NOVELL:ZENWORKS-FHIPCND-EXE</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-LG-DIR-TRAV.html">APP:NOVELL:ZENWORKS-LG-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Management Language Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MGMT-DIR.html">APP:NOVELL:ZENWORKS-MGMT-DIR</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Handheld Management Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MGT-UPLOAD.html">APP:NOVELL:ZENWORKS-MGT-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP:ZENworks Handheld Management File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MOBILE-LFI.html">APP:NOVELL:ZENWORKS-MOBILE-LFI</a></b></td>
   <td width="500" valign="top">
    APP: Novell Zenworks Mobile Device Managment Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MSG-DLL-OF.html">APP:NOVELL:ZENWORKS-MSG-DLL-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Asset Management Msg.dll Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-PREBOOT-SVC.html">APP:NOVELL:ZENWORKS-PREBOOT-SVC</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management Preboot Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-TFTPD-RCE.html">APP:NOVELL:ZENWORKS-TFTPD-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Desktop Management on Linux TFTPD Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-ZFHIPCND-OF.html">APP:NOVELL:ZENWORKS-ZFHIPCND-OF</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow (CVE-2010-4299)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKSCM-DIRTRVRSL.html">APP:NOVELL:ZENWORKSCM-DIRTRVRSL</a></b></td>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management newDocumentWizard Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOW-SMS-OF.html">APP:NOW-SMS-OF</a></b></td>
   <td width="500" valign="top">
    APP: Now SMS MMS Gateway Web Authorization Buffer Overflow Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANOW-SMS-OF-MSF.html">APP:NOW-SMS-OF-MSF</a></b></td>
   <td width="500" valign="top">
    APP: Now SMS/MMS Gateway Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ANTOP-WEB-FS1.html">APP:NTOP-WEB-FS1</a></b></td>
   <td width="500" valign="top">
    APP: Ntop Web Interface Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AOBSERVICED-BOF.html">APP:OBSERVICED-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Secure Backup observiced.exe Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AOBSERVICED-OF.html">APP:OBSERVICED-OF</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Secure Backup observiced.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AOPENVIEW-STORAGE-BO.html">APP:OPENVIEW-STORAGE-BO</a></b></td>
   <td width="500" valign="top">
    APP: HP Open View Strage Data Protector Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ABUSINESS-FLSHSVC-RCE.html">APP:ORACLE:BUSINESS-FLSHSVC-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Business Transaction Management Server FlashTunnelService Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ACLNT-SYS-ANLZR-FL-UP.html">APP:ORACLE:CLNT-SYS-ANLZR-FL-UP</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Database Client System Analyzer Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AGOLDENGATE-SOAP-OF.html">APP:ORACLE:GOLDENGATE-SOAP-OF</a></b></td>
   <td width="500" valign="top">
    APP: Oracle GoldenGate Veridata Server XML SOAP Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AJAVA-RMI-RCE.html">APP:ORACLE:JAVA-RMI-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Java RMI Services Default Configuration Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AMEMCACHED-PLUGIN.html">APP:ORACLE:MEMCACHED-PLUGIN</a></b></td>
   <td width="500" valign="top">
    APP: Oracle MySQL Server InnoDB Memcached Plugin Resource Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOHS-PROXY-BYPASS.html">APP:ORACLE:OHS-PROXY-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Oracle HTTP Server Proxy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOOXML-TAG.html">APP:ORACLE:OOXML-TAG</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Outside In OOXML Relationship Tag Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOUTSIDE-IN-FLASHPIX.html">APP:ORACLE:OUTSIDE-IN-FLASHPIX</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Outside In FlashPix Image Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOUTSIDE-JPEG2-CODCOC.html">APP:ORACLE:OUTSIDE-JPEG2-CODCOC</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Outside In JPEG 2000 COD and COC Parameter Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOUTSIDE-JPEG2-CRG.html">APP:ORACLE:OUTSIDE-JPEG2-CRG</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Outside In JPEG 2000 CRG Segment Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AOUTSIDEIN-MET-HOVF.html">APP:ORACLE:OUTSIDEIN-MET-HOVF</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Outside In OS 2 Metafile Parser Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ARAPID-WEBSRV-XSS.html">APP:ORACLE:RAPID-WEBSRV-XSS</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Rapid Install Web Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AREPORT-CMD-INJ.html">APP:ORACLE:REPORT-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Report Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ARHINOSCRIPT-BYPASS.html">APP:ORACLE:RHINOSCRIPT-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Java Applet Rhino Script Engine Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ASBAS-AUTH-BYPASS.html">APP:ORACLE:SBAS-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Secure Backup Administration Server Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ASECURE-BACKUP-INJ.html">APP:ORACLE:SECURE-BACKUP-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Secure Backup Administration Server Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ASQL-QUERY-DIR-TRAV.html">APP:ORACLE:SQL-QUERY-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Database Server SQL Query Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3ASYSTEM-ARRAYCOPY-RCE.html">APP:ORACLE:SYSTEM-ARRAYCOPY-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Java System.arraycopy Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AVIRTUAL-AGENT-CMDINJ.html">APP:ORACLE:VIRTUAL-AGENT-CMDINJ</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Virtual Server Agent Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AVIRTUAL-AGT-CMDIJ-HS.html">APP:ORACLE:VIRTUAL-AGT-CMDIJ-HS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Virtual Server Agent Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBCACHE-INSECURE.html">APP:ORACLE:WEBCACHE-INSECURE</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Web Cache Insecure Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBCACHE-INSECURE2.html">APP:ORACLE:WEBCACHE-INSECURE2</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Web Cache Insecure Version 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBCACHE-METHOD-OF.html">APP:ORACLE:WEBCACHE-METHOD-OF</a></b></td>
   <td width="500" valign="top">
    APP: Oracle Web Cache Method Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBLOGIC-CMD-EXEC.html">APP:ORACLE:WEBLOGIC-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Oracle WebLogic Server Node Manager Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBLOGIC-SRV-RCE.html">APP:ORACLE:WEBLOGIC-SRV-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Oracle WebLogic Server Commons-Collections Library Insecure Deserialization
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBUI-CMD-INJ.html">APP:ORACLE:WEBUI-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Oracle WebUI Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AOSSIM-COMMAND-EXEC.html">APP:OSSIM-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: AlienVault OSSIM Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3AHOST-SERVICES.html">APP:PCANYWHERE:HOST-SERVICES</a></b></td>
   <td width="500" valign="top">
    APP: Symantec PcAnywhere Host Services Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3ALOGIN-ADMIN.html">APP:PCANYWHERE:LOGIN-ADMIN</a></b></td>
   <td width="500" valign="top">
    APP: PCAnywhere Administrator Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3ALOGIN-FAILURE.html">APP:PCANYWHERE:LOGIN-FAILURE</a></b></td>
   <td width="500" valign="top">
    APP: PCAnywhere Login Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3ALOGIN-PASSWD-BO.html">APP:PCANYWHERE:LOGIN-PASSWD-BO</a></b></td>
   <td width="500" valign="top">
    APP: PCAnywhere Login-Password Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3ASERVER-DOS.html">APP:PCANYWHERE:SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: PCAnywhere Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APCANYWHERE%3ASTARTUP.html">APP:PCANYWHERE:STARTUP</a></b></td>
   <td width="500" valign="top">
    APP: PCAnywhere Status Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APEER2MAIL.html">APP:PEER2MAIL</a></b></td>
   <td width="500" valign="top">
    APP: Peer2Mail Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APEERCAST-FS.html">APP:PEERCAST-FS</a></b></td>
   <td width="500" valign="top">
    APP: PeerCast Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APERSISTENT-COMMAND-EXEC.html">APP:PERSISTENT-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Persistent Systems Radia Client Automation Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APOSTFIX-GLD-FS.html">APP:POSTFIX-GLD-FS</a></b></td>
   <td width="500" valign="top">
    APP: Postfix Greylisting Daemon Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APOSTFIX-GREYLISTD-OF.html">APP:POSTFIX-GREYLISTD-OF</a></b></td>
   <td width="500" valign="top">
    APP: Postfix Greylisting Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APOSTFIX-IPV6-RELAYING-ISSUE.html">APP:POSTFIX-IPV6-RELAYING-ISSUE</a></b></td>
   <td width="500" valign="top">
    APP: Postfix IPv6 Relaying Security Issue
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APPTP%3AMICROSOFT-PPTP.html">APP:PPTP:MICROSOFT-PPTP</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft PPTP DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APPTP%3APOPTOP-OF.html">APP:PPTP:POPTOP-OF</a></b></td>
   <td width="500" valign="top">
    APP: PoPToP &#39;poptop-sane.c&#39; Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APPTP%3APPTP-UNK-CTRL.html">APP:PPTP:PPTP-UNK-CTRL</a></b></td>
   <td width="500" valign="top">
    APP: Point to Point Tunneling Protocol Unknown Control Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-ACCEPT-LANG-DOS.html">APP:PROXY:SQUID-ACCEPT-LANG-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Squid strHdrAcptLangGetItem Value Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-HOST-HDR-BYPASS.html">APP:PROXY:SQUID-HOST-HDR-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Squid Proxy Host Header Bypass Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-PROXY-CACHE.html">APP:PROXY:SQUID-PROXY-CACHE</a></b></td>
   <td width="500" valign="top">
    APP: Squid Proxy Cache cachemgr.cgi Resource Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-SSLBUMP-CERT.html">APP:PROXY:SQUID-SSLBUMP-CERT</a></b></td>
   <td width="500" valign="top">
    APP: Squid Proxy SSL-Bump Certificate Validation Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-WCCP-BO.html">APP:PROXY:SQUID-WCCP-BO</a></b></td>
   <td width="500" valign="top">
    APP: Squid WCCP Message Receive Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-WCCP-DOS.html">APP:PROXY:SQUID-WCCP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: SQUID WCCP Message Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQEMU-VNC-SETPIXEL-PTR-DEREF.html">APP:QEMU-VNC-SETPIXEL-PTR-DEREF</a></b></td>
   <td width="500" valign="top">
    APP: QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQNX-QCONN-CMDEXEC.html">APP:QNX-QCONN-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    APP: QNX QCONN Remote Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQT-SERVER%3ADESCRIBE-DOS.html">APP:QT-SERVER:DESCRIBE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Quicktime: Describe DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQT-SERVER%3ADEV-URL-DOS.html">APP:QT-SERVER:DEV-URL-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Apple QuickTime Streaming Server Device URL Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQT-SERVER%3APARSE-XML-CGI-RCE.html">APP:QT-SERVER:PARSE-XML-CGI-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Apple Streaming Servers parse_xml.cgi Shell Metacharacter Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AQUEST-BIG-BRO-FD.html">APP:QUEST-BIG-BRO-FD</a></b></td>
   <td width="500" valign="top">
    APP: Quest Software Big Brother Arbitrary File Deletion and Overwriting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ARDP-BRUTE-FORCE.html">APP:RDP-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    APP: Windows Remote Desktop Protocol (RDP) Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AHELIX-NTLM-OF.html">APP:REAL:HELIX-NTLM-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks Helix Server NTLM Authentication Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AHELIX-URL-OF.html">APP:REAL:HELIX-URL-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks Helix Universal Server URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AHTML-PARSING-DOS.html">APP:REAL:HTML-PARSING-DOS</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer .html File Parsing Memory Corruption Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AIVR-OF.html">APP:REAL:IVR-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer IVR Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AIVR-OF-1.html">APP:REAL:IVR-OF-1</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer IVR Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AMAL-FLV-FILE.html">APP:REAL:MAL-FLV-FILE</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer FLV Parsing Two Integer Overflow Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3ANEG-CONT-LEN.html">APP:REAL:NEG-CONT-LEN</a></b></td>
   <td width="500" valign="top">
    APP: Helix Universal Server Invalid Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-FILE-SEC-BYPASS.html">APP:REAL:PLAYER-FILE-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer Local File Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-FORMAT-STRING.html">APP:REAL:PLAYER-FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-INVALID-CHUNK.html">APP:REAL:PLAYER-INVALID-CHUNK</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer Invalid Chunk Size Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-MAL-META-FILE.html">APP:REAL:PLAYER-MAL-META-FILE</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer Malicious Metafile Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-MAL-SKIN.html">APP:REAL:PLAYER-MAL-SKIN</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer Malicious Skin Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3APLAYER-SMIL-OF.html">APP:REAL:PLAYER-SMIL-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealPlayer SMIL File Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3ARAM-FILE-OF.html">APP:REAL:RAM-FILE-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealMedia RAM File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AREAL-MPG-WIDTH.html">APP:REAL:REAL-MPG-WIDTH</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer MPG Width Integer Underflow Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AREALTEXT-ERR-OF.html">APP:REAL:REALTEXT-ERR-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealText Error Message Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3ARMP-FILE-OF.html">APP:REAL:RMP-FILE-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer RMP File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3ASERVER-DOS.html">APP:REAL:SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: RealServer Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3ASMIL-WALLCLOCK-OF.html">APP:REAL:SMIL-WALLCLOCK-OF</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer SMIL Wallclock Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREAL%3AVIDPLIN-DLL.html">APP:REAL:VIDPLIN-DLL</a></b></td>
   <td width="500" valign="top">
    APP: Realplayer vidplin.dll AVI Header Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREALNETWORKS-HELIXSRV-DOS.html">APP:REALNETWORKS-HELIXSRV-DOS</a></b></td>
   <td width="500" valign="top">
    APP: RealNetworks Helix Server SNMP Master Agent Open-PDU Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREDIS-GETNUM-IO.html">APP:REDIS-GETNUM-IO</a></b></td>
   <td width="500" valign="top">
    APP: Redis Lua Scripting Component getnum Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ACVE-2015-2373-RCE.html">APP:REMOTE:CVE-2015-2373-RCE</a></b></td>
   <td width="500" valign="top">
    APP: CVE-2015-2373 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3AGOTOMYPC.html">APP:REMOTE:GOTOMYPC</a></b></td>
   <td width="500" valign="top">
    APP: GoToMyPC Remote Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3AGOTOMYPC-CONN-TEST.html">APP:REMOTE:GOTOMYPC-CONN-TEST</a></b></td>
   <td width="500" valign="top">
    APP: GoToMyPC Connection Test
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ALOGMEIN.html">APP:REMOTE:LOGMEIN</a></b></td>
   <td width="500" valign="top">
    APP: LogMeIn Remote Access Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3AMS-RDP-ACTIVEX-RCE.html">APP:REMOTE:MS-RDP-ACTIVEX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Remote Desktop Client Unsafe ActiveX Control Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3AMS-WIN-RDP-RCE.html">APP:REMOTE:MS-WIN-RDP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Windows Remote Desktop Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ANETTRANSPORT-DM.html">APP:REMOTE:NETTRANSPORT-DM</a></b></td>
   <td width="500" valign="top">
    APP: NetTransport Download Manager Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-CONNECT.html">APP:REMOTE:RDP-CONNECT</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Protocol Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-DOS.html">APP:REMOTE:RDP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Remote Desktop Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-HEAP-BO.html">APP:REMOTE:RDP-HEAP-BO</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Client Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-HEAP-OF.html">APP:REMOTE:RDP-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Client Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-MEM-OBJ.html">APP:REMOTE:RDP-MEM-OBJ</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Protocol Memory Object Reference Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-RCE.html">APP:REMOTE:RDP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Remote Desktop Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ATEAMVIEWER.html">APP:REMOTE:TEAMVIEWER</a></b></td>
   <td width="500" valign="top">
    APP: TeamViewer Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ATEAMVIEWER-HTTP.html">APP:REMOTE:TEAMVIEWER-HTTP</a></b></td>
   <td width="500" valign="top">
    APP: TeamViewer Activity (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ATEAMVIEWER-URL-MODE.html">APP:REMOTE:TEAMVIEWER-URL-MODE</a></b></td>
   <td width="500" valign="top">
    APP: TeamViewer HTTP Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ATIMBUKTU-AUTH-OF.html">APP:REMOTE:TIMBUKTU-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    APP: Motorola Timbuktu Authentication Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREMOTE%3ATIMBUKTU-CONNECT.html">APP:REMOTE:TIMBUKTU-CONNECT</a></b></td>
   <td width="500" valign="top">
    APP: Motorola Timbuktu Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AREPLISTOR-DOS.html">APP:REPLISTOR-DOS</a></b></td>
   <td width="500" valign="top">
    APP: EMC RepliStor rep_srv and ctrlservice Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ARETRO-CL-BO.html">APP:RETRO-CL-BO</a></b></td>
   <td width="500" valign="top">
    APP: EMC Retrospect Client Crafted Packet Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ARH-ICOMMERCE-ANYFILE.html">APP:RH-ICOMMERCE-ANYFILE</a></b></td>
   <td width="500" valign="top">
    APP: RedHat Interchange Commerce Arbitrary File Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ARIM-BLACKBERRY-DOS.html">APP:RIM-BLACKBERRY-DOS</a></b></td>
   <td width="500" valign="top">
    APP: BlackBerry Server SRP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AROCKET-SERVERGRAPH-CE.html">APP:ROCKET-SERVERGRAPH-CE</a></b></td>
   <td width="500" valign="top">
    APP: Rocket Servergraph Admin Center userRequest and tsmRequest Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ARWHOISD%3ARWHOISD-FS.html">APP:RWHOISD:RWHOISD-FS</a></b></td>
   <td width="500" valign="top">
    APP: rwhoisd Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAFENET-VPN-OF.html">APP:SAFENET-VPN-OF</a></b></td>
   <td width="500" valign="top">
    APP: SafeNet VPN Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3A3DVIS-FLIC-BO.html">APP:SAP:3DVIS-FLIC-BO</a></b></td>
   <td width="500" valign="top">
    APP: SAP 3D Visual Enterprise Viewer Flic Animation Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ABIS-LIC-MGR-BOF.html">APP:SAP:BIS-LIC-MGR-BOF</a></b></td>
   <td width="500" valign="top">
    APP: SAP Business One License Manager 2005 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ACONFIGSERVLET-CMD-EXEC.html">APP:SAP:CONFIGSERVLET-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver Portal ConfigServlet Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3AIGS-OF.html">APP:SAP:IGS-OF</a></b></td>
   <td width="500" valign="top">
    APP: SAP Internet Graphics Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3AINT-GRAPHICS-PARAMS-XSS.html">APP:SAP:INT-GRAPHICS-PARAMS-XSS</a></b></td>
   <td width="500" valign="top">
    APP: SAP Internet Graphics Server PARAMS Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3AMSG-SRV-GRP.html">APP:SAP:MSG-SRV-GRP</a></b></td>
   <td width="500" valign="top">
    APP: SAP Message Server Group Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-BO.html">APP:SAP:NETWEAVER-BO</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver Dispatcher Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-DIAGI-DOS.html">APP:SAP:NETWEAVER-DIAGI-DOS</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver DiagiEventSource Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-DOS.html">APP:SAP:NETWEAVER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver DiagTraceHex Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-MSG-RCE.html">APP:SAP:NETWEAVER-MSG-RCE</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver Message Server Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-MSG-SERVER-B0.html">APP:SAP:NETWEAVER-MSG-SERVER-B0</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver Message Server AdIExecBlkConv Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-SOAP-RCE.html">APP:SAP:NETWEAVER-SOAP-RCE</a></b></td>
   <td width="500" valign="top">
    APP: SAP NetWeaver SOAP Interface Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3ASYBASE-ESPPARSE-DOS.html">APP:SAP:SYBASE-ESPPARSE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP Sybase esp_parse Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3AWEB-SRV-OF.html">APP:SAP:WEB-SRV-OF</a></b></td>
   <td width="500" valign="top">
    APP: SAP Web Server Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASAP%3AWEBAS-DOS.html">APP:SAP:WEBAS-DOS</a></b></td>
   <td width="500" valign="top">
    APP: SAP WebAS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASBS-TRAINING-OF2.html">APP:SBS-TRAINING-OF2</a></b></td>
   <td width="500" valign="top">
    APP: Step-by-Step Interactive Training Overflow 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASCOHELP-OF1.html">APP:SCOHELP-OF1</a></b></td>
   <td width="500" valign="top">
    APP: Netscape Fastrack scohelp Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASECURECRT-CONF.html">APP:SECURECRT-CONF</a></b></td>
   <td width="500" valign="top">
    APP: SecureCRT Configuration File in TELNET URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASENTINEL-LM-OF.html">APP:SENTINEL-LM-OF</a></b></td>
   <td width="500" valign="top">
    APP: Sentinel License Manager Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASHOUTCAST%3AICY-OVERFLOW.html">APP:SHOUTCAST:ICY-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    APP: Shoutcast &#39;icy-name&#39; Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASIEMENS-SIMATIC-WINCC-BO.html">APP:SIEMENS-SIMATIC-WINCC-BO</a></b></td>
   <td width="500" valign="top">
    APP: Siemens SIMATIC WinCC Flexible Runtime Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASITEMINDER-AUTH-REDIR.html">APP:SITEMINDER-AUTH-REDIR</a></b></td>
   <td width="500" valign="top">
    APP: Netegrity Siteminder Authentication Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASNORT%3ABACKORIFICE-BOF.html">APP:SNORT:BACKORIFICE-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Snort BackOrifice Preprocessor Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASNORT%3ABACKORIFICE-DOS.html">APP:SNORT:BACKORIFICE-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Snort BackOrifice Preprocessor Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASNORT%3ADCE-RPC-DOS.html">APP:SNORT:DCE-RPC-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Snort DCE RPC Processor Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASNORT%3AGARBAGE-PACKET.html">APP:SNORT:GARBAGE-PACKET</a></b></td>
   <td width="500" valign="top">
    APP: Malformed Packet Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASNORT%3AREPORT-RCE.html">APP:SNORT:REPORT-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Snort Report Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOCKS%3ASMTP-PROXY-HTTP.html">APP:SOCKS:SMTP-PROXY-HTTP</a></b></td>
   <td width="500" valign="top">
    APP: SOCKS SMTP Proxy Request via SOCKS using HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOLARWINDS-LOG-EVENT-MANAGR.html">APP:SOLARWINDS-LOG-EVENT-MANAGR</a></b></td>
   <td width="500" valign="top">
    APP: SolarWinds Log and Event Manager Static Credentials
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOPHOS-WA-PWD-CHG.html">APP:SOPHOS-WA-PWD-CHG</a></b></td>
   <td width="500" valign="top">
    APP: Sophos Web Appliance change_password Admin Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOPHOS-WA-PWD-CHG-SSL.html">APP:SOPHOS-WA-PWD-CHG-SSL</a></b></td>
   <td width="500" valign="top">
    APP: Sophos Web Appliance change_password Admin Password Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOPHOS-WEBAPP-CMDEXEC.html">APP:SOPHOS-WEBAPP-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    APP: Sophos Web Appliance SophosConfig Arbitrary Command Execution (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASOPHOS-WEBAPP-CMDEXEC-SSL.html">APP:SOPHOS-WEBAPP-CMDEXEC-SSL</a></b></td>
   <td width="500" valign="top">
    APP: Sophos Web Appliance SophosConfig Arbitrary Command Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASPREECOMMERCE-RCE.html">APP:SPREECOMMERCE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Spreecommerce orders.json script Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASQUID-HTCP-DOS.html">APP:SQUID-HTCP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Squid Proxy HTCP Packet Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASQUID-HTTPVER-DOS.html">APP:SQUID-HTTPVER-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Squid HTTP Version Number Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASQUID-SNMPHANDLEUDP-CE.html">APP:SQUID-SNMPHANDLEUDP-CE</a></b></td>
   <td width="500" valign="top">
    APP: Squid snmpHandleUdp Off-by-one Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASUN-JAVA-SERVER-ADMIN-DOS.html">APP:SUN-JAVA-SERVER-ADMIN-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Sun Java System Web Server Admin Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASUN-JAVA-SYSCAL-TZID-DOS.html">APP:SUN-JAVA-SYSCAL-TZID-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Sun Java System Calendar Server tzid Parameter Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASUNPROXY.html">APP:SUNPROXY</a></b></td>
   <td width="500" valign="top">
    APP: Sun Java Web Proxy Server Socks Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASUPERSCOUT-USERDB.html">APP:SUPERSCOUT-USERDB</a></b></td>
   <td width="500" valign="top">
    APP: SuperScout Web Reports Server User Database Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASVN-DATE-OF.html">APP:SVN-DATE-OF</a></b></td>
   <td width="500" valign="top">
    APP: Subversion Date Parsing Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASVN-DATE-SERVE.html">APP:SVN-DATE-SERVE</a></b></td>
   <td width="500" valign="top">
    APP: Subversion Date Svnserve
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASVN-PROTOCOL-STRING-OF.html">APP:SVN-PROTOCOL-STRING-OF</a></b></td>
   <td width="500" valign="top">
    APP: Subversion Protocol String Parsing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAGENT-RM-CMD.html">APP:SYMC:AGENT-RM-CMD</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Common Base Agent Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AALERT-MGT.html">APP:SYMC:ALERT-MGT</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AALERT-MGT-FILE-TRNS.html">APP:SYMC:ALERT-MGT-FILE-TRNS</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System Intel File Transfer Service Arbitrary Program Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AALTIRIS-DS-SQL-INJ.html">APP:SYMC:ALTIRIS-DS-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Altiris DS SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAMS-HNDLRSVC-RCE.html">APP:SYMC:AMS-HNDLRSVC-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System HNDLRSVC Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAMS-MODEM-STRING-OF.html">APP:SYMC:AMS-MODEM-STRING-OF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System Modem String Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAMS-PIN-OF.html">APP:SYMC:AMS-PIN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System Pin Number Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAMS-SEND-ALERT-ACK-OF.html">APP:SYMC:AMS-SEND-ALERT-ACK-OF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Alert Management System AMSSendAlertAck Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAV-AHS-DOS.html">APP:SYMC:AV-AHS-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Antivirus Intel Alert Handler Service Denial of Service (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAV-INTEL-ALERT.html">APP:SYMC:AV-INTEL-ALERT</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Antivirus Intel Alert Handler Service Denial of Service (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AAV-MGT-SVC-BOF.html">APP:SYMC:AV-MGT-SVC-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Antivirus Management Service Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ABACKUP-EXEC.html">APP:SYMC:BACKUP-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Backup Exec System Recovery Manager Unauthorized File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ABLOCKED-PHP-SQLI.html">APP:SYMC:BLOCKED-PHP-SQLI</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Web Gateway blocked.php Blind SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AENCRYPTED-CMD-EXEC.html">APP:SYMC:ENCRYPTED-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Encryption Management Server Local Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-ADM-INJ.html">APP:SYMC:IM-MGR-ADM-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec IM Manager Administrator Interface SQL injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-INJ.html">APP:SYMC:IM-MGR-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec IM Manager Administrator Console Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-WEB-UI-INJ.html">APP:SYMC:IM-MGR-WEB-UI-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec IM Manager Web Interface ProcessAction Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ALIVE-UPDATE-SEC-BYPASS.html">APP:SYMC:LIVE-UPDATE-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Symantec LiveUpdate Administrator Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ALUA-HTML-INJ.html">APP:SYMC:LUA-HTML-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec LiveUpdate Administrator Management GUI HTML Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AMESSAGING-DIR-TRAV.html">APP:SYMC:MESSAGING-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AMESSAGING-SAVE.DO-CSRF.html">APP:SYMC:MESSAGING-SAVE.DO-CSRF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Save.do Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AMESSAGING-SSH-PASSWORD.html">APP:SYMC:MESSAGING-SSH-PASSWORD</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Default SSH Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AMGM-CONSOLE-XSS.html">APP:SYMC:MGM-CONSOLE-XSS</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Management Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ANETBACKUP-CMD-EXEC.html">APP:SYMC:NETBACKUP-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Veritas NetBackup bpcd.exe Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3ASCAN-ENG-AUTH-BYPASS.html">APP:SYMC:SCAN-ENG-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Scan Engine Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AVERITAS-VXSVC-BO.html">APP:SYMC:VERITAS-VXSVC-BO</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Veritas Enterprise Administrator Service vxsvc Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AVRTSWEB-EXEC.html">APP:SYMC:VRTSWEB-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Symantec VERITAS Web Server Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWEB-GATEWAY-CSRF.html">APP:SYMC:WEB-GATEWAY-CSRF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Web Gateway Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWEB-GATEWAY-OS-CMD-INJ.html">APP:SYMC:WEB-GATEWAY-OS-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWEB-GW-PWD-CHG.html">APP:SYMC:WEB-GW-PWD-CHG</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Web Gateway Password Change
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWG-PBCONTROL.html">APP:SYMC:WG-PBCONTROL</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway pbcontrol.php Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWORKSPACE-FILE-UPLOAD.html">APP:SYMC:WORKSPACE-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Workspace Streaming XML-RPC Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AWORKSPACE-RCE.html">APP:SYMC:WORKSPACE-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Workspace Streaming 7.5.0.493 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ASYMC%3AXFERWAN-OF.html">APP:SYMC:XFERWAN-OF</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Discovery XFERWAN Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ACONTROL-MANAGER-CMD.html">APP:TMIC:CONTROL-MANAGER-CMD</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro Control Manager &#39;CmdProcessor.exe&#39; Remote Code  Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ACTRLMGR-CHUNKED.html">APP:TMIC:CTRLMGR-CHUNKED</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro Control Manager Chunked Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3AINTERSCAN-XSS.html">APP:TMIC:INTERSCAN-XSS</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro InterScan Messaging Security Suite Cross-site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3AOFFICESCAN-AUTH.html">APP:TMIC:OFFICESCAN-AUTH</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro OfficeScan Console Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3AOFFICESCAN-PW-OF.html">APP:TMIC:OFFICESCAN-PW-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro OfficeScan Password Data Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-CREATE-BIND-OF.html">APP:TMIC:SP-CREATE-BIND-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect Create Binding DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-CREATEBIND-OF.html">APP:TMIC:SP-CREATEBIND-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect CreateBinding DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-EARTH-AGENT-OF.html">APP:TMIC:SP-EARTH-AGENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect Earth Agent DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-EARTHAGENT-OF.html">APP:TMIC:SP-EARTHAGENT-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect EarthAgent DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATMIC%3ATMREGCHANGE.html">APP:TMIC:TMREGCHANGE</a></b></td>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect TMregChange Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATRACKERCAM-OF.html">APP:TRACKERCAM-OF</a></b></td>
   <td width="500" valign="top">
    APP: TrackerCam TunerGuide Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATROLLTECH-QT-BMP-OF.html">APP:TROLLTECH-QT-BMP-OF</a></b></td>
   <td width="500" valign="top">
    APP: Trolltech Qt BMP Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3A6TO4-TUNNEL.html">APP:TUN:6TO4-TUNNEL</a></b></td>
   <td width="500" valign="top">
    APP: 6to4 Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AANCHORFREE-VPN-SSL.html">APP:TUN:ANCHORFREE-VPN-SSL</a></b></td>
   <td width="500" valign="top">
    APP: AnchorFree Hotspot Shield VPN (SSL-Fallback) Tunnel Active
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AANCHORFREE-VPN-TCP.html">APP:TUN:ANCHORFREE-VPN-TCP</a></b></td>
   <td width="500" valign="top">
    APP: AnchorFree Hotspot Shield VPN (TCP) Tunnel Active
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AANCHORFREE-VPN-UDP.html">APP:TUN:ANCHORFREE-VPN-UDP</a></b></td>
   <td width="500" valign="top">
    APP: AnchorFree Hotspot Shield VPN (UDP) Tunnel Active
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AESP-OVER-UDP.html">APP:TUN:ESP-OVER-UDP</a></b></td>
   <td width="500" valign="top">
    APPLICATION: ESP over UDP / NAT-T
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AESP-TUNNEL.html">APP:TUN:ESP-TUNNEL</a></b></td>
   <td width="500" valign="top">
    APP: ESP IPSec Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AGPRS-TUNNEL.html">APP:TUN:GPRS-TUNNEL</a></b></td>
   <td width="500" valign="top">
    APP: GPRS Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AGRE-TUNNEL.html">APP:TUN:GRE-TUNNEL</a></b></td>
   <td width="500" valign="top">
    APP: GRE Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3AIPV6-OVER-IPV4.html">APP:TUN:IPV6-OVER-IPV4</a></b></td>
   <td width="500" valign="top">
    APP: IPv6 over IPv4 Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3APACKETIX-VPN-CONNECT.html">APP:TUN:PACKETIX-VPN-CONNECT</a></b></td>
   <td width="500" valign="top">
    APP: Packetix VPN Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATEREDO-INFO.html">APP:TUN:TEREDO-INFO</a></b></td>
   <td width="500" valign="top">
    APP: Windows Firewall Teredo Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATEREDO-TUNNEL.html">APP:TUN:TEREDO-TUNNEL</a></b></td>
   <td width="500" valign="top">
    APP: Teredo IPv6 Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATIC-LOGIN.html">APP:TUN:TIC-LOGIN</a></b></td>
   <td width="500" valign="top">
    APP: AICCU TIC Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATOR-1.html">APP:TUN:TOR-1</a></b></td>
   <td width="500" valign="top">
    APP: The Onion Router (TOR) - 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATOR-2.html">APP:TUN:TOR-2</a></b></td>
   <td width="500" valign="top">
    APP: The Onion Router (TOR) - 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATOR-3.html">APP:TUN:TOR-3</a></b></td>
   <td width="500" valign="top">
    APP: The Onion Router (TOR) - 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3ATUN%3ATOR-EXIT-HOSTHEADER.html">APP:TUN:TOR-EXIT-HOSTHEADER</a></b></td>
   <td width="500" valign="top">
    APP: Tor &quot;exit&quot; Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUNIVERSAL-CMDB-AXIS2-RCE.html">APP:UNIVERSAL-CMDB-AXIS2-RCE</a></b></td>
   <td width="500" valign="top">
    APP: HP Universal CMDB Server Axis2 Default Credentials Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3AAPPLE-MDNS.html">APP:UPNP:APPLE-MDNS</a></b></td>
   <td width="500" valign="top">
    APP: Apple mDNSResponder Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3ADLINK-SEARCH-NOTIFY.html">APP:UPNP:DLINK-SEARCH-NOTIFY</a></b></td>
   <td width="500" valign="top">
    APP: D-Link Router SEARCH/NOTIFY Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-DSN-BOF.html">APP:UPNP:LIBUPNP-DSN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp Device Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-ROOT-DSN-BOF.html">APP:UPNP:LIBUPNP-ROOT-DSN-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp Root Device Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-UUID-BOF.html">APP:UPNP:LIBUPNP-UUID-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp UUID Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3AMINIUPNPD-DOS.html">APP:UPNP:MINIUPNPD-DOS</a></b></td>
   <td width="500" valign="top">
    APP: MiniUPnPd Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AUPNP%3AMS-UPNP.html">APP:UPNP:MS-UPNP</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Universal Plug and Play Invalid Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVCENTER-JMX-RCE.html">APP:VCENTER-JMX-RCE</a></b></td>
   <td width="500" valign="top">
    APP: VMware vCenter Server JMX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVCENTER-JMX-RCE2.html">APP:VCENTER-JMX-RCE2</a></b></td>
   <td width="500" valign="top">
     APP: VMware vCenter Server JMX Remote Code Execution 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS-ADMIN-BO.html">APP:VERITAS-ADMIN-BO</a></b></td>
   <td width="500" valign="top">
    APP: Symantec VERITAS Storage Foundation Administrator Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AAGENT-NAME-OF.html">APP:VERITAS:AGENT-NAME-OF</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Backup Agent Hostname Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ACLIENT-AUTH-OF.html">APP:VERITAS:CLIENT-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Backup Agent Client Authentication Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ACOMMAND-CHAIN.html">APP:VERITAS:COMMAND-CHAIN</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Command Chain
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AMAL-REQUEST-DOS.html">APP:VERITAS:MAL-REQUEST-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Backup Agent Malformed Request DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANB-VMD-OF.html">APP:VERITAS:NB-VMD-OF</a></b></td>
   <td width="500" valign="top">
    APP: Veritas NetBackup Volume Manager Daemon Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANB-VMD-OF2.html">APP:VERITAS:NB-VMD-OF2</a></b></td>
   <td width="500" valign="top">
    APP: Veritas NetBackup Volume Manager Daemon Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANETBACKUP-BPCD.html">APP:VERITAS:NETBACKUP-BPCD</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Netbackup BPCD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANETBACKUP-FS.html">APP:VERITAS:NETBACKUP-FS</a></b></td>
   <td width="500" valign="top">
    APP: Veritas NetBackup Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANETBACKUP-VNETD.html">APP:VERITAS:NETBACKUP-VNETD</a></b></td>
   <td width="500" valign="top">
    APP: Symantec VERITAS NetBackup vnetd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3ANETBCKP-CMD-EXEC.html">APP:VERITAS:NETBCKP-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    APP: Veritas NetBackup Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AREG-WRITE.html">APP:VERITAS:REG-WRITE</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Backup Agent Registry Access Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AREG-WRITE-2.html">APP:VERITAS:REG-WRITE-2</a></b></td>
   <td width="500" valign="top">
    APP: Veritas Backup Agent Registry Access Exploit 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AVERITAS-FILE-DUMP.html">APP:VERITAS:VERITAS-FILE-DUMP</a></b></td>
   <td width="500" valign="top">
    APP: Veritas File Dump
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVERITAS%3AVERITAS-NULL-PTR.html">APP:VERITAS:VERITAS-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    APP: Symantec Veritas Storage Foundation Scheduler Service NULL Session Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVIDEOSPIRIT-OF.html">APP:VIDEOSPIRIT-OF</a></b></td>
   <td width="500" valign="top">
    APP: VideoSpirit valitem Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVINZANT-ARCHTCTR-AUTHWKNESS.html">APP:VINZANT-ARCHTCTR-AUTHWKNESS</a></b></td>
   <td width="500" valign="top">
    APP: Vinzant Global ECS Architectural Authentication Weakness
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVLC-RTSP-PLUGIN-BO.html">APP:VLC-RTSP-PLUGIN-BO</a></b></td>
   <td width="500" valign="top">
    APP: VLC Media Player RTSP Plugin Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMAUTH-FS.html">APP:VMAUTH-FS</a></b></td>
   <td width="500" valign="top">
    APP: VMware Authorization Service User Credential Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMS-8.3.5-CMD-EXE.html">APP:VMS-8.3.5-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    APP: VisNetic MailServer 8.3.5 Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMWARE-ESX-SOAP-DOS.html">APP:VMWARE-ESX-SOAP-DOS</a></b></td>
   <td width="500" valign="top">
    APP: VMware ESX and ESXi Server SOAP Request Handling Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMWARE-ISAPI-DOS.html">APP:VMWARE-ISAPI-DOS</a></b></td>
   <td width="500" valign="top">
    APP: VMware Server ISAPI Extension Remote Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMWARE-OVF-FMTSTR.html">APP:VMWARE-OVF-FMTSTR</a></b></td>
   <td width="500" valign="top">
    APP: VMware OVF Tools Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMWARE-SPRING-CLASSLOADER.html">APP:VMWARE-SPRING-CLASSLOADER</a></b></td>
   <td width="500" valign="top">
    APP: VMware SpringSource Spring Framework class.classloader Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AVMWARE-VCENTER-CHARGEBACK.html">APP:VMWARE-VCENTER-CHARGEBACK</a></b></td>
   <td width="500" valign="top">
    APP: VMWare VCenter Chargeback Manager ImageUploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWEBSENS-TRITON-RCE.html">APP:WEBSENS-TRITON-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Websense Triton Improper Validation Network User Specified Path Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWEBSENSE-FAV-BYPASS.html">APP:WEBSENSE-FAV-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Multiple Websense Products &#39;favorites.exe&#39; Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWEBSENSE-PROXY-BYPASS.html">APP:WEBSENSE-PROXY-BYPASS</a></b></td>
   <td width="500" valign="top">
    APP: Websense Proxy Filter Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWEBSENSE-TRITON-RCE.html">APP:WEBSENSE-TRITON-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Websense Triton &#39;ws_irpt.exe&#39; Remote Command Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWHATSUP%3AIPSWITCH-DIR-TRV.html">APP:WHATSUP:IPSWITCH-DIR-TRV</a></b></td>
   <td width="500" valign="top">
    APP: Ipswitch Whatsup Small Business Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3AAMF-BO.html">APP:WINAMP:AMF-BO</a></b></td>
   <td width="500" valign="top">
    APP: Nullsoft Winamp Advanced Module Format File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3AAVI-STREAM-BO.html">APP:WINAMP:AVI-STREAM-BO</a></b></td>
   <td width="500" valign="top">
    APP: Nullsoft Winamp AVI Stream Count Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3ACAF-OF.html">APP:WINAMP:CAF-OF</a></b></td>
   <td width="500" valign="top">
    APP: Winamp CAF File Processing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3ACDA-DEV-NAME-OF.html">APP:WINAMP:CDA-DEV-NAME-OF</a></b></td>
   <td width="500" valign="top">
    APP: WinAmp CDA Device Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3AMIDI-FILE-OF.html">APP:WINAMP:MIDI-FILE-OF</a></b></td>
   <td width="500" valign="top">
    APP: Nullsoft Winamp MIDI File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3AMP4-MC.html">APP:WINAMP:MP4-MC</a></b></td>
   <td width="500" valign="top">
    APP: Nullsoft Winamp MP4 Files Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINAMP%3ARIFF-INFO.html">APP:WINAMP:RIFF-INFO</a></b></td>
   <td width="500" valign="top">
    APP: Nullsoft Winamp RIFF INFO Record Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINCOM-AUTH-BO.html">APP:WINCOM-AUTH-BO</a></b></td>
   <td width="500" valign="top">
    APP: WinComLPD Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINMAIL-PATH-DIS.html">APP:WINMAIL-PATH-DIS</a></b></td>
   <td width="500" valign="top">
    APP: WinMail Path Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINMEDIASRV-RCE.html">APP:WINMEDIASRV-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Windows Media Service Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWINPRICE.html">APP:WINPRICE</a></b></td>
   <td width="500" valign="top">
    APP: WinPrice
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWIRESHARK-LWRES.html">APP:WIRESHARK-LWRES</a></b></td>
   <td width="500" valign="top">
    APP: Wireshark Dissector LWRES Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWMP%3ADSHOW-BIGCHUNK-HTTP.html">APP:WMP:DSHOW-BIGCHUNK-HTTP</a></b></td>
   <td width="500" valign="top">
    APP: Windows Media Player DirectShow Vulnerability (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWMP%3ADSHOW-BIGCHUNK-SMB.html">APP:WMP:DSHOW-BIGCHUNK-SMB</a></b></td>
   <td width="500" valign="top">
    APP: Windows Media Player DirectShow Vulnerability (SMB)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWMP%3ADSHOW-BIGCHUNK-SMTP.html">APP:WMP:DSHOW-BIGCHUNK-SMTP</a></b></td>
   <td width="500" valign="top">
    APP: Windows Media Player DirectShow Vulnerability (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AWSDAPI-OF.html">APP:WSDAPI-OF</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft Web Service on Devices Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AXDMCP%3ADTLOGIN-DBL-FREE.html">APP:XDMCP:DTLOGIN-DBL-FREE</a></b></td>
   <td width="500" valign="top">
    XDMCP: dtlogin Double Free Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AXEROX-DS-SQ-INJ.html">APP:XEROX-DS-SQ-INJ</a></b></td>
   <td width="500" valign="top">
    APP: Xerox DocuShare ResultBackgroundJobMultiple SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AYOUNGZSOFT-CONNECT.html">APP:YOUNGZSOFT-CONNECT</a></b></td>
   <td width="500" valign="top">
    APP: Youngzsoft CCProxy CONNECT Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AYOUSENDIT.html">APP:YOUSENDIT</a></b></td>
   <td width="500" valign="top">
    APP: YouSendIt File Sharing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AYOUSENDIT-ENCRYPTED.html">APP:YOUSENDIT-ENCRYPTED</a></b></td>
   <td width="500" valign="top">
    APP: YouSendIt File Sharing (Encrypted)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AZEND-SERVER-JAVA-RCE.html">APP:ZEND-SERVER-JAVA-RCE</a></b></td>
   <td width="500" valign="top">
    APP: Zend Server Java Bridge Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="APP%3AZLIB-COMPRES-LIB-DOS.html">APP:ZLIB-COMPRES-LIB-DOS</a></b></td>
   <td width="500" valign="top">
    APP: Zlib Compression Library Denial Of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="CHARGEN"></a>CHARGEN</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHARGEN%3AECHO-DOS.html">CHARGEN:ECHO-DOS</a></b></td>
   <td width="500" valign="top">
    CHARGEN: Echo DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHARGEN%3AEXPLOIT%3AUNEXPECTED-REQ.html">CHARGEN:EXPLOIT:UNEXPECTED-REQ</a></b></td>
   <td width="500" valign="top">
    CHARGEN: Unexpected Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHARGEN%3ATRAFFIC.html">CHARGEN:TRAFFIC</a></b></td>
   <td width="500" valign="top">
    CHARGEN: Traffic
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="CHAT"></a>CHAT</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ACLOSE-CONNECTION.html">CHAT:AIM:CLOSE-CONNECTION</a></b></td>
   <td width="500" valign="top">
    AIM: Client Connection Closing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AFILE-EXE.html">CHAT:AIM:FILE-EXE</a></b></td>
   <td width="500" valign="top">
    AIM: Client File Receive Executable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AFILE-GET.html">CHAT:AIM:FILE-GET</a></b></td>
   <td width="500" valign="top">
    AIM: Client File Receive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AFILE-SEND.html">CHAT:AIM:FILE-SEND</a></b></td>
   <td width="500" valign="top">
    AIM: Client File Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AHTTP-PROXY.html">CHAT:AIM:HTTP-PROXY</a></b></td>
   <td width="500" valign="top">
    AIM: HTTP Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AHTTPS-LOGIN.html">CHAT:AIM:HTTPS-LOGIN</a></b></td>
   <td width="500" valign="top">
    AIM: AOL Instant Messenger HTTPS Login Page Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ALINK-EXEC.html">CHAT:AIM:LINK-EXEC</a></b></td>
   <td width="500" valign="top">
    AIM: Embedded Link Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ALOGIN-ATTEMPT.html">CHAT:AIM:LOGIN-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    AIM: Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AMESSAGE-RECEIVE.html">CHAT:AIM:MESSAGE-RECEIVE</a></b></td>
   <td width="500" valign="top">
    AIM: Client Message Received
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AMESSAGE-SEND.html">CHAT:AIM:MESSAGE-SEND</a></b></td>
   <td width="500" valign="top">
    AIM: Client Message Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AOVERFLOW%3AAIM-HTTP-AWAY.html">CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY</a></b></td>
   <td width="500" valign="top">
    CHAT: AOL Instant Messenger Away Message Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AOVERFLOW%3AAWAY-FS.html">CHAT:AIM:OVERFLOW:AWAY-FS</a></b></td>
   <td width="500" valign="top">
    AIM: Away Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AOVERFLOW%3ATRILIN-XML-BO.html">CHAT:AIM:OVERFLOW:TRILIN-XML-BO</a></b></td>
   <td width="500" valign="top">
    CHAT: Trillian XML Tag Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3AOVERFLOW%3ATRILLIAN-XML.html">CHAT:AIM:OVERFLOW:TRILLIAN-XML</a></b></td>
   <td width="500" valign="top">
    CHAT: Cerulean Studios Trillian Image Filename XML Tag Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ASERVER-READY.html">CHAT:AIM:SERVER-READY</a></b></td>
   <td width="500" valign="top">
    AIM: Server Ready for Operation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ATOC.html">CHAT:AIM:TOC</a></b></td>
   <td width="500" valign="top">
    AIM: OSCAR Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAIM%3ATUNNEL.html">CHAT:AIM:TUNNEL</a></b></td>
   <td width="500" valign="top">
    AIM: Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAPPLE-IMESSAGE-CONNECTION.html">CHAT:APPLE-IMESSAGE-CONNECTION</a></b></td>
   <td width="500" valign="top">
    CHAT: Apple iMessage Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3AINV-TLV-LEN.html">CHAT:AUDIT:AIM:INV-TLV-LEN</a></b></td>
   <td width="500" valign="top">
    AIM: Invalid TLV Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3AINVALID-TLV.html">CHAT:AUDIT:AIM:INVALID-TLV</a></b></td>
   <td width="500" valign="top">
    AIM: Invalid TLV
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3AMSG-HEADER.html">CHAT:AUDIT:AIM:MSG-HEADER</a></b></td>
   <td width="500" valign="top">
    AIM: Invalid Message Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3AMSG-TOO-BIG.html">CHAT:AUDIT:AIM:MSG-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    AIM: Oversized Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3AMSG-TOO-SHORT.html">CHAT:AUDIT:AIM:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    AIM: Undersized Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AAIM%3ATLV-LEN-OVFLW.html">CHAT:AUDIT:AIM:TLV-LEN-OVFLW</a></b></td>
   <td width="500" valign="top">
    AIM: Excessive TLV Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AIRC-CMD.html">CHAT:AUDIT:IRC-CMD</a></b></td>
   <td width="500" valign="top">
    IRC: Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AIRC-CMD-CHR.html">CHAT:AUDIT:IRC-CMD-CHR</a></b></td>
   <td width="500" valign="top">
    IRC: Invalid Command Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3ACMD.html">CHAT:AUDIT:MSN:CMD</a></b></td>
   <td width="500" valign="top">
    MSN: Invalid Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AGROUP-NAME.html">CHAT:AUDIT:MSN:GROUP-NAME</a></b></td>
   <td width="500" valign="top">
    MSN: Group Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AIP-PORT.html">CHAT:AUDIT:MSN:IP-PORT</a></b></td>
   <td width="500" valign="top">
    MSN: IP Port Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AMSG.html">CHAT:AUDIT:MSN:MSG</a></b></td>
   <td width="500" valign="top">
    MSN: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AMSG-2LONG.html">CHAT:AUDIT:MSN:MSG-2LONG</a></b></td>
   <td width="500" valign="top">
    MSN: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AMSN-USER-NAME.html">CHAT:AUDIT:MSN:MSN-USER-NAME</a></b></td>
   <td width="500" valign="top">
    MSN: Username Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3APHONE-NUM.html">CHAT:AUDIT:MSN:PHONE-NUM</a></b></td>
   <td width="500" valign="top">
    MSN: Phone Number Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AURL.html">CHAT:AUDIT:MSN:URL</a></b></td>
   <td width="500" valign="top">
    MSN: URL Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AMSN%3AUSER-STATE.html">CHAT:AUDIT:MSN:USER-STATE</a></b></td>
   <td width="500" valign="top">
    MSN: User State Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AACTIVITY.html">CHAT:AUDIT:YMSG:ACTIVITY</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AACTIVITY-SIZE.html">CHAT:AUDIT:YMSG:ACTIVITY-SIZE</a></b></td>
   <td width="500" valign="top">
    YMSG: Activity Size Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ABUD-LIST.html">CHAT:AUDIT:YMSG:BUD-LIST</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Buddy List
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ABUD-LST.html">CHAT:AUDIT:YMSG:BUD-LST</a></b></td>
   <td width="500" valign="top">
    YMSG: Buddy List Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ABUD-NAME.html">CHAT:AUDIT:YMSG:BUD-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Buddy Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ABUDY-LIST.html">CHAT:AUDIT:YMSG:BUDY-LIST</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Buddy List
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACHALLENGE.html">CHAT:AUDIT:YMSG:CHALLENGE</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Challenge
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACHAT-NAME-OF.html">CHAT:AUDIT:YMSG:CHAT-NAME-OF</a></b></td>
   <td width="500" valign="top">
    YMSG: Chatroom Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACHATRM-MSG.html">CHAT:AUDIT:YMSG:CHATRM-MSG</a></b></td>
   <td width="500" valign="top">
    YMSG: Chatroom Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACHATROOM-NAME.html">CHAT:AUDIT:YMSG:CHATROOM-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Chatroom Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACONF-HOST.html">CHAT:AUDIT:YMSG:CONF-HOST</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Conference Host
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACONF-INVIT.html">CHAT:AUDIT:YMSG:CONF-INVIT</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Conference Invitee
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACONF-MSG.html">CHAT:AUDIT:YMSG:CONF-MSG</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Conference Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACONF-NAME.html">CHAT:AUDIT:YMSG:CONF-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Conference Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACONTACT-NAME.html">CHAT:AUDIT:YMSG:CONTACT-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Contact Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACOOKIE.html">CHAT:AUDIT:YMSG:COOKIE</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Cookie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ACRYPT-PASSWD.html">CHAT:AUDIT:YMSG:CRYPT-PASSWD</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Crypted Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ADATA-TYPE.html">CHAT:AUDIT:YMSG:DATA-TYPE</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Data Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AEVENT-CODE.html">CHAT:AUDIT:YMSG:EVENT-CODE</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Event Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AFILE-NAME.html">CHAT:AUDIT:YMSG:FILE-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: File Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AFILE-SEND.html">CHAT:AUDIT:YMSG:FILE-SEND</a></b></td>
   <td width="500" valign="top">
    YMSG: File Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AFILE-SEND-HTTP.html">CHAT:AUDIT:YMSG:FILE-SEND-HTTP</a></b></td>
   <td width="500" valign="top">
    YMSG: File Send Via HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AGROUP-NAME.html">CHAT:AUDIT:YMSG:GROUP-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Group Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AINV-GROUP-NAME.html">CHAT:AUDIT:YMSG:INV-GROUP-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Group Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AINV-STAT-CODE.html">CHAT:AUDIT:YMSG:INV-STAT-CODE</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Status Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMAIL-ADDR.html">CHAT:AUDIT:YMSG:MAIL-ADDR</a></b></td>
   <td width="500" valign="top">
    YMSG: Mail Address Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMAIL-SNDR-ADDR.html">CHAT:AUDIT:YMSG:MAIL-SNDR-ADDR</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Mail Sender Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMAIL-SNDR-NAME.html">CHAT:AUDIT:YMSG:MAIL-SNDR-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Mail Sender Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMAIL-SUBJECT.html">CHAT:AUDIT:YMSG:MAIL-SUBJECT</a></b></td>
   <td width="500" valign="top">
    YMSG: Mail Subject Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMEMBER-NAME.html">CHAT:AUDIT:YMSG:MEMBER-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Member Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMESSAGE-RECEIVE.html">CHAT:AUDIT:YMSG:MESSAGE-RECEIVE</a></b></td>
   <td width="500" valign="top">
    YMSG: Message Receive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMESSAGE-SEND.html">CHAT:AUDIT:YMSG:MESSAGE-SEND</a></b></td>
   <td width="500" valign="top">
    YMSG: Message Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMSG.html">CHAT:AUDIT:YMSG:MSG</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMSG-SIZE.html">CHAT:AUDIT:YMSG:MSG-SIZE</a></b></td>
   <td width="500" valign="top">
    YMSG: Message Size Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AMSG-TOO-BIG.html">CHAT:AUDIT:YMSG:MSG-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    YMSG: Message Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-CHALNG.html">CHAT:AUDIT:YMSG:OFLOW-CHALNG</a></b></td>
   <td width="500" valign="top">
    YMSG: Challenge Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-CONF-MSG.html">CHAT:AUDIT:YMSG:OFLOW-CONF-MSG</a></b></td>
   <td width="500" valign="top">
    YMSG: Conference Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-CONF-NAME.html">CHAT:AUDIT:YMSG:OFLOW-CONF-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Conference Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-COOKIE.html">CHAT:AUDIT:YMSG:OFLOW-COOKIE</a></b></td>
   <td width="500" valign="top">
    YMSG: Cookie Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-GRP-NAME.html">CHAT:AUDIT:YMSG:OFLOW-GRP-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Group Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-PASSWD.html">CHAT:AUDIT:YMSG:OFLOW-PASSWD</a></b></td>
   <td width="500" valign="top">
    YMSG: Crypted Password Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-RESP-CRPT.html">CHAT:AUDIT:YMSG:OFLOW-RESP-CRPT</a></b></td>
   <td width="500" valign="top">
    YMSG: Response Crypt Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AOFLOW-URL.html">CHAT:AUDIT:YMSG:OFLOW-URL</a></b></td>
   <td width="500" valign="top">
    YMSG: URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ARECIPIENT.html">CHAT:AUDIT:YMSG:RECIPIENT</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Recipient
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ARESP-CRYPT.html">CHAT:AUDIT:YMSG:RESP-CRYPT</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Response Crypt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ASENDER.html">CHAT:AUDIT:YMSG:SENDER</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Sender
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ASEPARATOR.html">CHAT:AUDIT:YMSG:SEPARATOR</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Separator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3ASTATUS-CODE.html">CHAT:AUDIT:YMSG:STATUS-CODE</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing Status Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AURL.html">CHAT:AUDIT:YMSG:URL</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AUSER-NAME.html">CHAT:AUDIT:YMSG:USER-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Missing User Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AUSERNAME.html">CHAT:AUDIT:YMSG:USERNAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Username Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AVALUE.html">CHAT:AUDIT:YMSG:VALUE</a></b></td>
   <td width="500" valign="top">
    YMSG: Invalid Value For Data Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AAUDIT%3AYMSG%3AWEBCAM-KEY.html">CHAT:AUDIT:YMSG:WEBCAM-KEY</a></b></td>
   <td width="500" valign="top">
    YMSG: WebcamKey Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGADU-GADU%3ABANNER.html">CHAT:GADU-GADU:BANNER</a></b></td>
   <td width="500" valign="top">
    CHAT: Gadu-Gadu Connect Server Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGADU-GADU%3ACLIENT-REQ.html">CHAT:GADU-GADU:CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    CHAT: Gadu-Gadu Connect Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGADU-GADU%3ADISCOVER.html">CHAT:GADU-GADU:DISCOVER</a></b></td>
   <td width="500" valign="top">
    CHAT: Gadu-Gadu Server Discovery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AGTALK-CALL.html">CHAT:GOOGLE:GTALK-CALL</a></b></td>
   <td width="500" valign="top">
    CHAT: Google Talk Voice Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AGTALK-PHONE-SESSION.html">CHAT:GOOGLE:GTALK-PHONE-SESSION</a></b></td>
   <td width="500" valign="top">
    CHAT: GTalk Phone Call Session Setup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AGTALK-SSL.html">CHAT:GOOGLE:GTALK-SSL</a></b></td>
   <td width="500" valign="top">
    CHAT: Google Talk Client Setup Over SSL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AGTALK-STARTUP.html">CHAT:GOOGLE:GTALK-STARTUP</a></b></td>
   <td width="500" valign="top">
    CHAT: Google Talk Client Startup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AJABBER.html">CHAT:GOOGLE:JABBER</a></b></td>
   <td width="500" valign="top">
    CHAT: Google Jabber Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3AJABBER-SSL.html">CHAT:GOOGLE:JABBER-SSL</a></b></td>
   <td width="500" valign="top">
    CHAT: Google Jabber Activity Over SSL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3ASEND-HTTP.html">CHAT:GOOGLE:SEND-HTTP</a></b></td>
   <td width="500" valign="top">
    CHAT: GMail Chat Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3ASTART.html">CHAT:GOOGLE:START</a></b></td>
   <td width="500" valign="top">
    CHAT: GMail Chat Start
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3ATALKGADGET.html">CHAT:GOOGLE:TALKGADGET</a></b></td>
   <td width="500" valign="top">
    CHAT: Google TalkGadget
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AGOOGLE%3ATALKGADGET-ACTIVITY.html">CHAT:GOOGLE:TALKGADGET-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    CHAT: Google TalkGadget Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AICQ%3AFILE-RECEIVE.html">CHAT:ICQ:FILE-RECEIVE</a></b></td>
   <td width="500" valign="top">
    ICQ: File Receive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AICQ%3AFILE-SEND.html">CHAT:ICQ:FILE-SEND</a></b></td>
   <td width="500" valign="top">
    ICQ: File Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AICQ%3AISS-BLACKICE-OF.html">CHAT:ICQ:ISS-BLACKICE-OF</a></b></td>
   <td width="500" valign="top">
    ICQ: ISS BlackIce ICQ Decoder META_USER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ABOTNET%3AAGOBOT-CMD.html">CHAT:IRC:BOTNET:AGOBOT-CMD</a></b></td>
   <td width="500" valign="top">
    IRC: Agobot IRC Command Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ABOTNET%3ADOWNLOAD-CMD.html">CHAT:IRC:BOTNET:DOWNLOAD-CMD</a></b></td>
   <td width="500" valign="top">
    IRC: Botnet Download Command Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ABOTNET%3ARA1NX-BOT-CE.html">CHAT:IRC:BOTNET:RA1NX-BOT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ra1NX PHP Bot PubCall Authentication Bypass Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ABOTNET%3ASDBOT-CMD.html">CHAT:IRC:BOTNET:SDBOT-CMD</a></b></td>
   <td width="500" valign="top">
    IRC: SDBot/UrXBot IRC Command Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ACC-NUMBER.html">CHAT:IRC:CC-NUMBER</a></b></td>
   <td width="500" valign="top">
    IRC: Credit Card Number In IRC Chat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ACOLLOQUY-DOS.html">CHAT:IRC:COLLOQUY-DOS</a></b></td>
   <td width="500" valign="top">
    CHAT: Colloquy Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ACOLLOQUY-INVITE-FS.html">CHAT:IRC:COLLOQUY-INVITE-FS</a></b></td>
   <td width="500" valign="top">
    CHAT: Colloquy INVITE Request Remote Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3AARGS.html">CHAT:IRC:INVALID:ARGS</a></b></td>
   <td width="500" valign="top">
    IRC: Missing Arguments
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3AFORMAT-STR.html">CHAT:IRC:INVALID:FORMAT-STR</a></b></td>
   <td width="500" valign="top">
    IRC: Bahamut Format String Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3AMSG.html">CHAT:IRC:INVALID:MSG</a></b></td>
   <td width="500" valign="top">
    IRC: Malformed Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3ANULL-CHAR.html">CHAT:IRC:INVALID:NULL-CHAR</a></b></td>
   <td width="500" valign="top">
    IRC: Null Character in Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3ANUM-REPLY.html">CHAT:IRC:INVALID:NUM-REPLY</a></b></td>
   <td width="500" valign="top">
    IRC: Client-to-Server Numeric Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AINVALID%3APREFIX.html">CHAT:IRC:INVALID:PREFIX</a></b></td>
   <td width="500" valign="top">
    IRC: Malformed Prefix
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ALOIC-HIVE-LOGIN.html">CHAT:IRC:LOIC-HIVE-LOGIN</a></b></td>
   <td width="500" valign="top">
    CHAT: Low Orbit Ion Cannon (LOIC) User Hive Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AMIRC-PRIVMSG.html">CHAT:IRC:MIRC-PRIVMSG</a></b></td>
   <td width="500" valign="top">
    IRC: mIRC PRIVMSG Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ANICK.html">CHAT:IRC:NICK</a></b></td>
   <td width="500" valign="top">
    IRC: Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3ACHANNEL.html">CHAT:IRC:OVERFLOW:CHANNEL</a></b></td>
   <td width="500" valign="top">
    IRC: Channel Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3ALINE.html">CHAT:IRC:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    IRC: Line Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3ANICK.html">CHAT:IRC:OVERFLOW:NICK</a></b></td>
   <td width="500" valign="top">
    IRC: Nickname Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3ANUM-REPLY.html">CHAT:IRC:OVERFLOW:NUM-REPLY</a></b></td>
   <td width="500" valign="top">
    IRC: Numeric Reply Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3AOPENBSD-DOS.html">CHAT:IRC:OVERFLOW:OPENBSD-DOS</a></b></td>
   <td width="500" valign="top">
    CHAT: OpenBSD IRC Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3APASSWORD.html">CHAT:IRC:OVERFLOW:PASSWORD</a></b></td>
   <td width="500" valign="top">
    IRC: Password Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3AUSERNAME.html">CHAT:IRC:OVERFLOW:USERNAME</a></b></td>
   <td width="500" valign="top">
    IRC: Username Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AOVERFLOW%3AXCHAT-SOCKS.html">CHAT:IRC:OVERFLOW:XCHAT-SOCKS</a></b></td>
   <td width="500" valign="top">
    CHAT: XChat SOCKS 5 Buffer Overrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ARATBOX-MCAPAB-DOS.html">CHAT:IRC:RATBOX-MCAPAB-DOS</a></b></td>
   <td width="500" valign="top">
    CHAT: Ratbox IRCd &#39;m_capab.c&#39; Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ASRV-RESPONSE.html">CHAT:IRC:SRV-RESPONSE</a></b></td>
   <td width="500" valign="top">
    IRC: Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3ASSN-CLEARTEXT.html">CHAT:IRC:SSN-CLEARTEXT</a></b></td>
   <td width="500" valign="top">
    IRC: Social Security Number in Cleartext Submission
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AIRC%3AUNREALRCD-BACKDOOR.html">CHAT:IRC:UNREALRCD-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    IRC: UnrealIRCd Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AJABBER%3AJABBER-CTRAF.html">CHAT:JABBER:JABBER-CTRAF</a></b></td>
   <td width="500" valign="top">
    CHAT: Jabber Cleartext Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AJABBER%3AJABBER-XTRAF.html">CHAT:JABBER:JABBER-XTRAF</a></b></td>
   <td width="500" valign="top">
    CHAT: Jabber Encrypted Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AJABBER%3ANIMBUZZ.html">CHAT:JABBER:NIMBUZZ</a></b></td>
   <td width="500" valign="top">
    Nimbuzz
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AJABBER%3AUNAME-OF.html">CHAT:JABBER:UNAME-OF</a></b></td>
   <td width="500" valign="top">
    CHAT: Jabber 2.x Username Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMS-LYNC-2010-CE.html">CHAT:MS-LYNC-2010-CE</a></b></td>
   <td width="500" valign="top">
    CHAT: Microsoft Lync 2010 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AACCESS.html">CHAT:MSN:ACCESS</a></b></td>
   <td width="500" valign="top">
    MSN: Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3ABRIDGE.html">CHAT:MSN:BRIDGE</a></b></td>
   <td width="500" valign="top">
    CHAT: Windows Live Chat Bridging
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AGIF-OVERFLOW.html">CHAT:MSN:GIF-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    MSN: Gif File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AHTTP%3ACALL.html">CHAT:MSN:HTTP:CALL</a></b></td>
   <td width="500" valign="top">
    CHAT: MSN Over HTTP Call Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AHTTP%3ACHAT.html">CHAT:MSN:HTTP:CHAT</a></b></td>
   <td width="500" valign="top">
    CHAT: MSN over HTTP Chat Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AHTTP%3ALOGIN.html">CHAT:MSN:HTTP:LOGIN</a></b></td>
   <td width="500" valign="top">
    CHAT: MSN over HTTP Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AHTTP%3AMSNFTP-INVITE.html">CHAT:MSN:HTTP:MSNFTP-INVITE</a></b></td>
   <td width="500" valign="top">
    CHAT: MSN over HTTP File Transfer Invitation Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AINVALID%3AMSN-VID-FRAME.html">CHAT:MSN:INVALID:MSN-VID-FRAME</a></b></td>
   <td width="500" valign="top">
    CHAT: MSN Invalid Video Frame
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AINVALID%3APNG-HEIGHT.html">CHAT:MSN:INVALID:PNG-HEIGHT</a></b></td>
   <td width="500" valign="top">
    MSN: Invalid PNG Height
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AINVALID%3APNG-WIDTH.html">CHAT:MSN:INVALID:PNG-WIDTH</a></b></td>
   <td width="500" valign="top">
    MSN: Invalid PNG Width
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AINVITE-RECV.html">CHAT:MSN:INVITE-RECV</a></b></td>
   <td width="500" valign="top">
    MSN: Chat Invitation Received
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3AINVITE-SEND.html">CHAT:MSN:INVITE-SEND</a></b></td>
   <td width="500" valign="top">
    MSN: Chat Invitation Sent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3ALOGIN-ATTEMPT.html">CHAT:MSN:LOGIN-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    MSN: Windows Live Chat Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3APIDGIN-MSN-IO.html">CHAT:MSN:PIDGIN-MSN-IO</a></b></td>
   <td width="500" valign="top">
    CHAT: Pidgin MSN MSNP2P Message Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AMSN%3APOINT-TO-POINT.html">CHAT:MSN:POINT-TO-POINT</a></b></td>
   <td width="500" valign="top">
    CHAT: Windows Live Chat Point-to-Point Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AOOVOO-ACTIVITY.html">CHAT:OOVOO-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    CHAT: ooVoo Chat Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3APOPO-CHAT-LOGIN.html">CHAT:POPO-CHAT-LOGIN</a></b></td>
   <td width="500" valign="top">
    CHAT: Popo Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AQQ%3AQQ-CONNECT.html">CHAT:QQ:QQ-CONNECT</a></b></td>
   <td width="500" valign="top">
    CHAT: QQ Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AQQ%3AQQ-CONNECT-TCP.html">CHAT:QQ:QQ-CONNECT-TCP</a></b></td>
   <td width="500" valign="top">
    CHAT: QQ Connection TCP Fallback
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3ASTEAM-FRIENDS.html">CHAT:STEAM-FRIENDS</a></b></td>
   <td width="500" valign="top">
    CHAT: Steam Friends
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3ADOUBLE-EXT.html">CHAT:YIM:DOUBLE-EXT</a></b></td>
   <td width="500" valign="top">
    CHAT: Yahoo! Messenger File Transfer Filename Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AFILE-TRANSFER.html">CHAT:YIM:FILE-TRANSFER</a></b></td>
   <td width="500" valign="top">
    CHAT: Yahoo! Messenger File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AHTTP-FILE-TRANSFER.html">CHAT:YIM:HTTP-FILE-TRANSFER</a></b></td>
   <td width="500" valign="top">
    YIM: HTTP File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AHTTP-TUNNEL.html">CHAT:YIM:HTTP-TUNNEL</a></b></td>
   <td width="500" valign="top">
    YMSG: HTTP Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3ALOGIN-ATTEMPT.html">CHAT:YIM:LOGIN-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    YMSG: Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3ALONG-FILE-NAME.html">CHAT:YIM:LONG-FILE-NAME</a></b></td>
   <td width="500" valign="top">
    CHAT: Yahoo! Messenger File Transfer Filename Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AOVERFLOW%3ASPOOFED-NAME.html">CHAT:YIM:OVERFLOW:SPOOFED-NAME</a></b></td>
   <td width="500" valign="top">
    YMSG: Spoofed Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AXSS.html">CHAT:YIM:XSS</a></b></td>
   <td width="500" valign="top">
    YMSG: Yahoo Instant Messenger Cross-Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="CHAT%3AYIM%3AYAHOO-HTTP-PROXY.html">CHAT:YIM:YAHOO-HTTP-PROXY</a></b></td>
   <td width="500" valign="top">
    CHAT: Yahoo Messenger Over HTTP Proxy
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DB"></a>DB</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ABORLAND-MSG-BO.html">DB:BORLAND-MSG-BO</a></b></td>
   <td width="500" valign="top">
    DB: Borland InterBase Database Message Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3ACONNECT-DOS.html">DB:DB2:CONNECT-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Database Server CONNECT Request DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3ADB2-DOS.html">DB:DB2:DB2-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Database Server Invalid Data Stream Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3AHS-DOS.html">DB:DB2:HS-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Universal Database Connection Handshake Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3AIBM-DAS-BOF.html">DB:DB2:IBM-DAS-BOF</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Universal Database receiveDASMessage Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3AINVALID-DATA-STREAM-DOS.html">DB:DB2:INVALID-DATA-STREAM-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Database Server Invalid Data Stream Denial of Service (CVE-2009-0173)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3AJDBC-OF.html">DB:DB2:JDBC-OF</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 JDBC Applet Server Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3ASQL-REPEAT-OF.html">DB:DB2:SQL-REPEAT-OF</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 Database Server SQL REPEAT Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ADB2%3AXML-QUERY-OF.html">DB:DB2:XML-QUERY-OF</a></b></td>
   <td width="500" valign="top">
    DB: IBM DB2 XML Query Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AFIREBIRD-DOS.html">DB:FIREBIRD-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Firebird SQL Connect Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AFIREBIRD-USER-BO.html">DB:FIREBIRD-USER-BO</a></b></td>
   <td width="500" valign="top">
    DB: Firebird Database Server Username Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AFIREBIRD-XDR-DOS.html">DB:FIREBIRD-XDR-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Firebird XDR Operation Request Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AIB%3ABORLAND-INTERBASE-BOF.html">DB:IB:BORLAND-INTERBASE-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Borland InterBase Multiple Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AIB%3ACONNECT-BOF.html">DB:IB:CONNECT-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Borland InterBase Connect Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AIBM-SOLIDBD-WHERE-DOS.html">DB:IBM-SOLIDBD-WHERE-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM solidDB Redundant WHERE Clause Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AIBM-SOLIDDB-AUTH-BYPASS.html">DB:IBM-SOLIDDB-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: IBM solidDB solid.exe Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AIBM-SOLIDDB-ROWNUM.html">DB:IBM-SOLIDDB-ROWNUM</a></b></td>
   <td width="500" valign="top">
    DB: IBM solidDB ROWNUM Subquery Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AINGRES-UUID_FROM_CHAR-OF.html">DB:INGRES-UUID_FROM_CHAR-OF</a></b></td>
   <td width="500" valign="top">
    DB: Ingres Database uuid_from_char Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AINGRESDB-IIDBMS-OF.html">DB:INGRESDB-IIDBMS-OF</a></b></td>
   <td width="500" valign="top">
    DB: Ingres Database iidbms Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMONGODB-NATIVEHELPER-RCE.html">DB:MONGODB-NATIVEHELPER-RCE</a></b></td>
   <td width="500" valign="top">
    DB: MongoDB nativeHelper.apply Feature Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3A2000-SP_START_JOB.html">DB:MS-SQL:2000-SP_START_JOB</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SP_START_JOB Program Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ACOMMAND-BO.html">DB:MS-SQL:COMMAND-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Multiple Commands Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ACONVERT-OF.html">DB:MS-SQL:CONVERT-OF</a></b></td>
   <td width="500" valign="top">
    DB: Microsoft SQL Server Query Convert Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ADOS1.html">DB:MS-SQL:DOS1</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server Network-Based DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AHELLO-OF.html">DB:MS-SQL:HELLO-OF</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server HELLO Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AINSERT-CMD-BOF.html">DB:MS-SQL:INSERT-CMD-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Microsoft SQL Server INSERT Statement Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ALOGIN-FAILURE.html">DB:MS-SQL:LOGIN-FAILURE</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Login Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AMAL-INSERT.html">DB:MS-SQL:MAL-INSERT</a></b></td>
   <td width="500" valign="top">
    DB: Microsoft SQL Server Malformed Insert Statement
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AMSSQL-LGN-BRUTE-FORCE.html">DB:MS-SQL:MSSQL-LGN-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Login Brute Force
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ANULL-PSWRD.html">DB:MS-SQL:NULL-PSWRD</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server Null-Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3APREAUTH-OVERFLOW.html">DB:MS-SQL:PREAUTH-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Pre-Auth Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3APWD-CHANGE.html">DB:MS-SQL:PWD-CHANGE</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Password Change
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3APWD-ENCRYPT.html">DB:MS-SQL:PWD-ENCRYPT</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server pwdencrypt() Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AREPLWRITETIVARBIN-DB.html">DB:MS-SQL:REPLWRITETIVARBIN-DB</a></b></td>
   <td width="500" valign="top">
    DB: MSSQL Replwritetovarbin Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASA-LOGIN.html">DB:MS-SQL:SA-LOGIN</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server SA Account Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-EMPTY-PKT.html">DB:MS-SQL:SQLMON-EMPTY-PKT</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Empty Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-HEAP-OFLOW.html">DB:MS-SQL:SQLMON-HEAP-OFLOW</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-MALFORM-DOS.html">DB:MS-SQL:SQLMON-MALFORM-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Malformed DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-MDAC-OFLOW.html">DB:MS-SQL:SQLMON-MDAC-OFLOW</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON MDAC Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-PING-DOS.html">DB:MS-SQL:SQLMON-PING-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Ping DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-STACK-OFLOW.html">DB:MS-SQL:SQLMON-STACK-OFLOW</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASTOR-PROC-PRIV-UPGRD.html">DB:MS-SQL:STOR-PROC-PRIV-UPGRD</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Stored Procedure Privilege Upgrade
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ATDI-OVERFLOW.html">DB:MS-SQL:TDI-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL TDI Packet Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ATDS-FRAG-FLOOD.html">DB:MS-SQL:TDS-FRAG-FLOOD</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL TDS Fragmentation Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3ATDS-FRAG-LEN-ZERO.html">DB:MS-SQL:TDS-FRAG-LEN-ZERO</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL TDS Fragmentation With Length Zero
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AUSER-ADD.html">DB:MS-SQL:USER-ADD</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server User Addition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AWINCC-DEFAULT-PASS.html">DB:MS-SQL:WINCC-DEFAULT-PASS</a></b></td>
   <td width="500" valign="top">
    DB: Siemens SIMATIC WinCC Default Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AX-RAY-SCANNER.html">DB:MS-SQL:X-RAY-SCANNER</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL X-Ray SQL Scanning Tool Active
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AXP-DIRTREE1.html">DB:MS-SQL:XP-DIRTREE1</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL Server 7 xp_dirtree Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AXP_CMDSHELL-SMB.html">DB:MS-SQL:XP_CMDSHELL-SMB</a></b></td>
   <td width="500" valign="top">
    MS-SQL: XP_CMDSHELL Program Execution (SMB)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMS-SQL%3AXP_CMDSHELL-TDS.html">DB:MS-SQL:XP_CMDSHELL-TDS</a></b></td>
   <td width="500" valign="top">
    DB: MS-SQL XP_CMDSHELL Program Execution (TDS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AAUTH-BYPASS.html">DB:MYSQL:AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AAUTHENTICATION-BYPASS.html">DB:MYSQL:AUTHENTICATION-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Authentication Bypass Password Dump
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ABENCHMARK-DOS.html">DB:MYSQL:BENCHMARK-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Excessive Benchmark Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ABRUTE-FORCE.html">DB:MYSQL:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    DB: MySQL &quot;Brute-Force&quot; Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACLIENT-BOF.html">DB:MYSQL:CLIENT-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Client Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACOM-FIELD-LIST-BO.html">DB:MYSQL:COM-FIELD-LIST-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Database COM_FIELD_LIST Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACOMMANDS-BO.html">DB:MYSQL:COMMANDS-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Multiple Commands Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACOMTABLEDUMP-OF.html">DB:MYSQL:COMTABLEDUMP-OF</a></b></td>
   <td width="500" valign="top">
    DB: MySQL COM_TABLE_DUMP Function Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACREATE-FUNCTION.html">DB:MYSQL:CREATE-FUNCTION</a></b></td>
   <td width="500" valign="top">
    DB: MYSQL Create Function Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ACREATE-TABLE.html">DB:MYSQL:CREATE-TABLE</a></b></td>
   <td width="500" valign="top">
    DB: MYSQL Create Table
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AEXTRACT-VAL-RCE.html">DB:MYSQL:EXTRACT-VAL-RCE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySql Uninitialized Variable Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AFS-REQUEST.html">DB:MYSQL:FS-REQUEST</a></b></td>
   <td width="500" valign="top">
    SQL: Format String In Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AGEOMETRY-INT-OVF.html">DB:MYSQL:GEOMETRY-INT-OVF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Server Geometry Query Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AGRANT-FILE-BO.html">DB:MYSQL:GRANT-FILE-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Grant File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AIN-NULL-ARG-DOS.html">DB:MYSQL:IN-NULL-ARG-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Database IN and CASE NULL Argument Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-FAILED.html">DB:MYSQL:LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Login Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-INFO-DISCLOSURE.html">DB:MYSQL:LOGIN-INFO-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Login Handshake Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-NO-PSWD.html">DB:MYSQL:LOGIN-NO-PSWD</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Login Without Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-NO-USER.html">DB:MYSQL:LOGIN-NO-USER</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Login Without Username
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-OVERLONG-PSWD.html">DB:MYSQL:LOGIN-OVERLONG-PSWD</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Overlong Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALOGIN-OVERLONG-USER.html">DB:MYSQL:LOGIN-OVERLONG-USER</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Overlong Username
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ALONG-FUNC.html">DB:MYSQL:LONG-FUNC</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Long Function Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMAXDB-CMD.html">DB:MYSQL:MAXDB-CMD</a></b></td>
   <td width="500" valign="top">
    DB: SAP MaxDB Remote Arbitrary Commands Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMAXDB-GET-OF.html">DB:MYSQL:MAXDB-GET-OF</a></b></td>
   <td width="500" valign="top">
    DB: MaxDB Get Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMAXDB-SERVER-OF.html">DB:MYSQL:MAXDB-SERVER-OF</a></b></td>
   <td width="500" valign="top">
    DB: MaxDB WebDBM Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMAXDB-WEB-OF.html">DB:MYSQL:MAXDB-WEB-OF</a></b></td>
   <td width="500" valign="top">
    DB: MySQL MaxDB Web Interface Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMAXDB-WEBDAV-OF.html">DB:MYSQL:MAXDB-WEBDAV-OF</a></b></td>
   <td width="500" valign="top">
    DB: MaxDB WebDAV Buffer OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMOF-EXEC.html">DB:MYSQL:MOF-EXEC</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL MOF Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMS-DOS-NAMES-DOS.html">DB:MYSQL:MS-DOS-NAMES-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL MS-DOS Device Name Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-DATE-FS.html">DB:MYSQL:MYSQL-DATE-FS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Date Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-IFDOS.html">DB:MYSQL:MYSQL-IFDOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL IF Query Handling Remote Denial Of Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-LDAP-DOS.html">DB:MYSQL:MYSQL-LDAP-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MYSQL LDAP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-PASSWORD-OF.html">DB:MYSQL:MYSQL-PASSWORD-OF</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Password Field Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-PFIELD-TYPE.html">DB:MYSQL:MYSQL-PFIELD-TYPE</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Password Field Type Modification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AMYSQL-USE-DOS.html">DB:MYSQL:MYSQL-USE-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL USE Command Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AORACLE-XPATH-DOS.html">DB:MYSQL:ORACLE-XPATH-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Server XPath Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3APROC-ANALYSE-DOS.html">DB:MYSQL:PROC-ANALYSE-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL PROCEDURE ANALYSE Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AROOT-USER.html">DB:MYSQL:ROOT-USER</a></b></td>
   <td width="500" valign="top">
    DB: MySQL &quot;root&quot; User Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ASELECT-SUB-DOS.html">DB:MYSQL:SELECT-SUB-DOS</a></b></td>
   <td width="500" valign="top">
    MySQL: SELECT Subquery Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ASHORT-MSG.html">DB:MYSQL:SHORT-MSG</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ASINGLE-ROW-DOS.html">DB:MYSQL:SINGLE-ROW-DOS</a></b></td>
   <td width="500" valign="top">
    DB: MySQL Single Row Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3ASSL-OF.html">DB:MYSQL:SSL-OF</a></b></td>
   <td width="500" valign="top">
    DB: MySQL SSL Hello Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AUNIQ-SET-COL-JOIN-DOS.html">DB:MYSQL:UNIQ-SET-COL-JOIN-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Database Unique SET Column Join Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AUPDATEXML.html">DB:MYSQL:UPDATEXML</a></b></td>
   <td width="500" valign="top">
    DB: MySQL UpdateXML 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AUPDATEXML-DOS.html">DB:MYSQL:UPDATEXML-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL UpdateXML Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AUSER-ENUMERATION.html">DB:MYSQL:USER-ENUMERATION</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL User Enumeration Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AWIN-RCE.html">DB:MYSQL:WIN-RCE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Windows Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AWINDOWS-REMOTE-ROOT.html">DB:MYSQL:WINDOWS-REMOTE-ROOT</a></b></td>
   <td width="500" valign="top">
    DB: Oracle MySQL Windows Remote Root Exploitation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AYASSL-HELLO-BO.html">DB:MYSQL:YASSL-HELLO-BO</a></b></td>
   <td width="500" valign="top">
    DB: MySQL YaSSL SSL Hello Message Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AMYSQL%3AZERO-LEN-PW.html">DB:MYSQL:ZERO-LEN-PW</a></b></td>
   <td width="500" valign="top">
    DB: MYSQL Zero Length Password Auth Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AAPPDET-CONNECT.html">DB:ORACLE:APPDET-CONNECT</a></b></td>
   <td width="500" valign="top">
    DB: Oracle AppDetective SQL Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AAS-EMCHARTBEAN-TRAV.html">DB:ORACLE:AS-EMCHARTBEAN-TRAV</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Application Server Directory Traversal Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ACOMPILER-ACL.html">DB:ORACLE:COMPILER-ACL</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database SQL Compiler Access Control Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ACREATE-VIEW.html">DB:ORACLE:CREATE-VIEW</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server Create View
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ACREATE_TABLES-INJ.html">DB:ORACLE:CREATE_TABLES-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle CREATE_TABLES SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS-ASSERT.html">DB:ORACLE:DBMS-ASSERT</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database dbms_assert Filter Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS-CDC-PUBLISH-INJ.html">DB:ORACLE:DBMS-CDC-PUBLISH-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server DBMS_CDC_PUBLISH SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AAQELM-OF.html">DB:ORACLE:DBMS:AQELM-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_AQELM Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3ACDC-AQJM-UNSAFE.html">DB:ORACLE:DBMS:CDC-AQJM-UNSAFE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS CDC/AQJM Unsafe Function
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3ACORE-DOS.html">DB:ORACLE:DBMS:CORE-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Core RDBMS Component Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AEXP-EXT-UNSAFE.html">DB:ORACLE:DBMS:EXP-EXT-UNSAFE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_EXPORT_EXTENSION Unsafe Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AEXPORT-EXTENSION.html">DB:ORACLE:DBMS:EXPORT-EXTENSION</a></b></td>
   <td width="500" valign="top">
    DB: Oracle 10g DBMS_EXPORT_EXTENSION Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AEXPORT-PRIV.html">DB:ORACLE:DBMS:EXPORT-PRIV</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_EXPORT_EXTENSION Package Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AJVM-EXP-PERMS.html">DB:ORACLE:DBMS:JVM-EXP-PERMS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_JVM_EXP_PERMS Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AJVM-SYS-CMD.html">DB:ORACLE:DBMS:JVM-SYS-CMD</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_JVM_EXP_PERMS System Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AMETADATA-UNSAFE.html">DB:ORACLE:DBMS:METADATA-UNSAFE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_METADATA Unsafe Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AOPMN-LOG-FMT-STR.html">DB:ORACLE:DBMS:OPMN-LOG-FMT-STR</a></b></td>
   <td width="500" valign="top">
    DB: Oracle OPMN Service Log Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AOUTPUT-TO-JAVA.html">DB:ORACLE:DBMS:OUTPUT-TO-JAVA</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_JAVA.SET_OUTPUT_TO_JAVA Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3ASUB_NAME-SQL-INJ.html">DB:ORACLE:DBMS:SUB_NAME-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database SUBSCRIPTION_NAME Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AVAL-REMOTE-INJ.html">DB:ORACLE:DBMS:VAL-REMOTE-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_REPCAT_RPC.VALIDATE_REMOTE_RC SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ADECLARE-EXEC.html">DB:ORACLE:DECLARE-EXEC</a></b></td>
   <td width="500" valign="top">
    DB: TNS Declare/Exec SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AEMANAGEMENT-BOF.html">DB:ORACLE:EMANAGEMENT-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Emanagement Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AEVTDUMP.html">DB:ORACLE:EVTDUMP</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TimesTen In-Memory Database evtdump
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AEXP-APP-WEBCACHE.html">DB:ORACLE:EXP-APP-WEBCACHE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Application Server Web Cache
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AFUSION-XLS-IO.html">DB:ORACLE:FUSION-XLS-IO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Fusion Middleware Outside In Excel File Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AGRANT-TYPE-ACCESS-INJ.html">DB:ORACLE:GRANT-TYPE-ACCESS-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_AQADM_SYS Package GRANT_TYPE_ACCESS Procedure SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AINSECURE-TNS-LISTENER.html">DB:ORACLE:INSECURE-TNS-LISTENER</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Insecure TNS Listener Configuration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AINVALID-LOGIN.html">DB:ORACLE:INVALID-LOGIN</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Invalid Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ALINK-BOF.html">DB:ORACLE:LINK-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Create Database Link Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ALOGIN-BYPASS.html">DB:ORACLE:LOGIN-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Login Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ALOGIN-CMD-INJ.html">DB:ORACLE:LOGIN-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Secure Backup Administration Server login.php Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AMETAFILE-PARSER-DOS.html">DB:ORACLE:METAFILE-PARSER-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Outside In OS 2 Metafile Parser Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AODCITABLESTART-OF.html">DB:ORACLE:ODCITABLESTART-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database SYS.OLAPIMPL_T Package ODCITABLESTART Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AORACLE-DSI.html">DB:ORACLE:ORACLE-DSI</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_SNAP_INTERNAL Package Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AORACLE-SQL-BOF.html">DB:ORACLE:ORACLE-SQL-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle SQL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AOSB-NDMP-OF.html">DB:ORACLE:OSB-NDMP-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Secure Backup NDMP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AOUTSIDE-IN-XPM-IMG-BO.html">DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Outside In XPM Image Processing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AADAMS.html">DB:ORACLE:PASSWD:ADAMS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;adams&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AAURORA.html">DB:ORACLE:PASSWD:AURORA</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;aurora&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ABLAKE.html">DB:ORACLE:PASSWD:BLAKE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;blake&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ACLARK.html">DB:ORACLE:PASSWD:CLARK</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;clark&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ACTXSYS.html">DB:ORACLE:PASSWD:CTXSYS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;ctxsys&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ADBSNMP.html">DB:ORACLE:PASSWD:DBSNMP</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;dbsnmp&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AJONES.html">DB:ORACLE:PASSWD:JONES</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;jones&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AMDSYS.html">DB:ORACLE:PASSWD:MDSYS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;mdsys&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AORDCOMMON.html">DB:ORACLE:PASSWD:ORDCOMMON</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;ordcommon&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AORDPLUGINS.html">DB:ORACLE:PASSWD:ORDPLUGINS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;ordplugins&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AORDSYS.html">DB:ORACLE:PASSWD:ORDSYS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;ordsys&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3AOUTLN.html">DB:ORACLE:PASSWD:OUTLN</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;outln&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ASCOTT.html">DB:ORACLE:PASSWD:SCOTT</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;scott&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ASYS.html">DB:ORACLE:PASSWD:SYS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;sys&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ASYSTEM.html">DB:ORACLE:PASSWD:SYSTEM</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;system&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APASSWD%3ATRACESVR.html">DB:ORACLE:PASSWD:TRACESVR</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Default Password For User &quot;tracesvr&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3APITRIG-TRUNC-DROP.html">DB:ORACLE:PITRIG-TRUNC-DROP</a></b></td>
   <td width="500" valign="top">
    DB: Oracle PITRIG TRUNCATE DROP Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AREPORTS-XML-DISC.html">DB:ORACLE:REPORTS-XML-DISC</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Reports XML Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AROLLBACKWORKSPACE.html">DB:ORACLE:ROLLBACKWORKSPACE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server LT.ROLLBACKWORKSPACE SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASDO-CODE-AUTH-BYPASS.html">DB:ORACLE:SDO-CODE-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server SDO_CODE_SIZE Authorization Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASDO_CS-TRANS-OF.html">DB:ORACLE:SDO_CS-TRANS-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle SDO_CS.TRANSFORM_LAYER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASDO_TOPO_DROP_FTBL.html">DB:ORACLE:SDO_TOPO_DROP_FTBL</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Trigger MDSYS.SDO_TOPO_DROP_FTBL SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASEARCH-P-GROUPS.html">DB:ORACLE:SEARCH-P-GROUPS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Secure Enterprise Search search_p_groups Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASQL-PLUS-LOAD-UIX.html">DB:ORACLE:SQL-PLUS-LOAD-UIX</a></b></td>
   <td width="500" valign="top">
    DB: Oracle ISQL*Plus load.uix Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASTRCONV-BOF.html">DB:ORACLE:STRCONV-BOF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server String Conversion Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3AKUPVFT-UNSAFE.html">DB:ORACLE:SYS:KUPVFT-UNSAFE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle SYS.KUPV Unsafe Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3AKUPW-WORKER.html">DB:ORACLE:SYS:KUPW-WORKER</a></b></td>
   <td width="500" valign="top">
    DB: Oracle SYS.KUPW-WORKER Malformed Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3ALPXFSMSAX-NAME-BO.html">DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server LpxFSMSax QName Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3ALT-FINDRICSET.html">DB:ORACLE:SYS:LT-FINDRICSET</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database SYS.LT.FINDRICSET Unsafe Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3ALT-WORKSPACE.html">DB:ORACLE:SYS:LT-WORKSPACE</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database SYS.LT_WORKSPACE Unsafe Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3AMDSYS-SDO-LRS.html">DB:ORACLE:SYS:MDSYS-SDO-LRS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server MDSYS.SDO_LRS Package SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3APBSDE-INIT-OF.html">DB:ORACLE:SYS:PBSDE-INIT-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle sys.pbsde.init Procedure Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATIMES-TEN-HTTP-DOS.html">DB:ORACLE:TIMES-TEN-HTTP-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TimesTen In-Memory Database HTTP Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AACC-CONTROL-BP.html">DB:ORACLE:TNS:ACC-CONTROL-BP</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server Login Access Control Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AAUTH-SESSKEY.html">DB:ORACLE:TNS:AUTH-SESSKEY</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server Network Authentication AUTH_SESSKEY Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AAUTH-SESSKEY-OF-1.html">DB:ORACLE:TNS:AUTH-SESSKEY-OF-1</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS AUTH_SESSKEY Buffer Overflow (CVE-2009-1979) (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AAUTH-SESSKEY-OF-2.html">DB:ORACLE:TNS:AUTH-SESSKEY-OF-2</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS AUTH_SESSKEY Buffer Overflow (CVE-2009-1979) (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ABEQ-BYPASS.html">DB:ORACLE:TNS:BEQ-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database DBMS TNS Listener Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ACMD-EXEC.html">DB:ORACLE:TNS:CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ADBMS-OF.html">DB:ORACLE:TNS:DBMS-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ADOS.html">DB:ORACLE:TNS:DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Listener Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AINTERMEDIA-DOS.html">DB:ORACLE:TNS:INTERMEDIA-DOS</a></b></td>
   <td width="500" valign="top">
    TNS: Oracle Database InterMedia Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ALOOP-DOS.html">DB:ORACLE:TNS:LOOP-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Listener Infinite Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AMALFORMED-IP.html">DB:ORACLE:TNS:MALFORMED-IP</a></b></td>
   <td width="500" valign="top">
    TNS: Malformed IP Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AMALFORMED-PORT.html">DB:ORACLE:TNS:MALFORMED-PORT</a></b></td>
   <td width="500" valign="top">
    TNS: Malformed Port Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AOF.html">DB:ORACLE:TNS:OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Listener Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AORACLE-PRIVESC.html">DB:ORACLE:TNS:ORACLE-PRIVESC</a></b></td>
   <td width="500" valign="top">
    DB: Oracle DBMS_Scheduler Privilege Escalation Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AOVERFLOW_MSG.html">DB:ORACLE:TNS:OVERFLOW_MSG</a></b></td>
   <td width="500" valign="top">
    TNS: Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ARDBMS-DOS.html">DB:ORACLE:TNS:RDBMS-DOS</a></b></td>
   <td width="500" valign="top">
    DB: Oracle RDBMS TNS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ASERVICE-AUTH.html">DB:ORACLE:TNS:SERVICE-AUTH</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database TNS Listener Service Registration Lack of Authentication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ASERVICE-NAME-OF.html">DB:ORACLE:TNS:SERVICE-NAME-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNSListener SERVICE_NAME Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ASHORT_MSG.html">DB:ORACLE:TNS:SHORT_MSG</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ATABLEFUNC-ASOWN.html">DB:ORACLE:TNS:TABLEFUNC-ASOWN</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database CTXSYS.DRVDISP.TABLEFUNC_ASOWN Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ATRACE-OF.html">DB:ORACLE:TNS:TRACE-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle TNS Trace Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AUNK-COMMAND.html">DB:ORACLE:TNS:UNK-COMMAND</a></b></td>
   <td width="500" valign="top">
    TNS: Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3AUNSAFE-CMD.html">DB:ORACLE:TNS:UNSAFE-CMD</a></b></td>
   <td width="500" valign="top">
    TNS: Unsafe Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AUSERNAME-DUMP.html">DB:ORACLE:USERNAME-DUMP</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Username Dump
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AVULN-VER-10.1.0.1.html">DB:ORACLE:VULN-VER-10.1.0.1</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Vulnerable Version 10.1.0.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AVULN-VER-9.2.0.4.html">DB:ORACLE:VULN-VER-9.2.0.4</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Vulnerable Version 9.2.0.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AWAREHOUSE-BUILDER.html">DB:ORACLE:WAREHOUSE-BUILDER</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Warehouse Builder Multiple SQL Injections
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AWEBLOGIC-SERVER.html">DB:ORACLE:WEBLOGIC-SERVER</a></b></td>
   <td width="500" valign="top">
    DB: Oracle WebLogic Server Session Fixation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AWORKSPACE-MGR-INJ.html">DB:ORACLE:WORKSPACE-MGR-INJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server Workspace Manager Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AXDB-DROPMETADATA.html">DB:ORACLE:XDB-DROPMETADATA</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server XDB PITRIG_DROPMETADATA Procedure Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AXDB-PITRIG-SQLINJ.html">DB:ORACLE:XDB-PITRIG-SQLINJ</a></b></td>
   <td width="500" valign="top">
    DB: Oracle Database Server XDB PITRIG TRUNCATE and DROP Procedures SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3AORACLE%3AXML-SCHEMA-OF.html">DB:ORACLE:XML-SCHEMA-OF</a></b></td>
   <td width="500" valign="top">
    DB: Oracle XML SCHEMA Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ACACHEW-OF.html">DB:POSTGRESQL:CACHEW-OF</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Cash_Words Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ADATETIME-BO.html">DB:POSTGRESQL:DATETIME-BO</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database Datetime Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ADATETIME-BO-1.html">DB:POSTGRESQL:DATETIME-BO-1</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database Datetime Buffer Overflow 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ADBA-AUTH-BYPASS.html">DB:POSTGRESQL:DBA-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: Postgres Plus Advanced Server DBA Management Server Component Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ADBNAME-CLIFLAGINJ.html">DB:POSTGRESQL:DBNAME-CLIFLAGINJ</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database Name Command-line Flag Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3AGEO-OPS-PATH-IN.html">DB:POSTGRESQL:GEO-OPS-PATH-IN</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database geo_ops path_in Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ALINUX-DBLINK-RCE.html">DB:POSTGRESQL:LINUX-DBLINK-RCE</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database Link Library Linux Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3APOSTGRE-DBSEC-BP.html">DB:POSTGRESQL:POSTGRE-DBSEC-BP</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ASET-ROLE-BYPASS.html">DB:POSTGRESQL:SET-ROLE-BYPASS</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Database SET ROLE Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ASUBSTRING-OF.html">DB:POSTGRESQL:SUBSTRING-OF</a></b></td>
   <td width="500" valign="top">
    DB: PostgreSQL Bit Substring Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASALESLOGIX-DISC.html">DB:SALESLOGIX-DISC</a></b></td>
   <td width="500" valign="top">
    DB: Best Software SalesLogix Database Credentials Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASAPDB-WEB-OF.html">DB:SAPDB-WEB-OF</a></b></td>
   <td width="500" valign="top">
    DB: SapDB Web Management OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASOLIDDB-DOS.html">DB:SOLIDDB-DOS</a></b></td>
   <td width="500" valign="top">
    DB: IBM SolidDB Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASOLIDDB-LOG-FS.html">DB:SOLIDDB-LOG-FS</a></b></td>
   <td width="500" valign="top">
    DB: IBM solidDB Logging Function Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASYBASE%3AMOBILINK-BO.html">DB:SYBASE:MOBILINK-BO</a></b></td>
   <td width="500" valign="top">
    DB: Sybase SQL Anywhere MobiLink Crafted Strings Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASYBASE%3AOPEN-SERVER-CE.html">DB:SYBASE:OPEN-SERVER-CE</a></b></td>
   <td width="500" valign="top">
    DB: Sybase Open Server Function Pointer Array Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DB%3ASYBASE%3AOPEN-SERVER-MC.html">DB:SYBASE:OPEN-SERVER-MC</a></b></td>
   <td width="500" valign="top">
    DB: Sybase Open Server Null Byte Stack Memory Corruption
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DDOS"></a>DDOS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ADIRTJUMPER.html">DDOS:DIRTJUMPER</a></b></td>
   <td width="500" valign="top">
    DDOS: Dirt Jumper C&amp;C Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3AHOIC-HTTP-METHOD.html">DDOS:HOIC-HTTP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: High Orbit Ion Cannon (HOIC) HTTP Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3AJAVALOIC-TCP-METHOD.html">DDOS:JAVALOIC-TCP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: Java Low Orbit Ion Cannon (JAVALOIC) TCP Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3AJAVALOIC-TWITTER.html">DDOS:JAVALOIC-TWITTER</a></b></td>
   <td width="500" valign="top">
    DDOS: JavaLOIC Twitter GET ORDERS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3AJAVALOIC-UDP-METHOD.html">DDOS:JAVALOIC-UDP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: Java Low Orbit Ion Cannon (JAVALOIC) UDP Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALOIC-ANONYMOUS-HTTP.html">DDOS:LOIC-ANONYMOUS-HTTP</a></b></td>
   <td width="500" valign="top">
    DDOS: LOIC Anonymous HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALOIC-HTTP-METHOD.html">DDOS:LOIC-HTTP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: Low Orbit Ion Cannon (LOIC) HTTP Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALOIC-TCP-METHOD.html">DDOS:LOIC-TCP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: Low Orbit Ion Cannon (LOIC) TCP Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALOIC-UDP-METHOD.html">DDOS:LOIC-UDP-METHOD</a></b></td>
   <td width="500" valign="top">
    DDOS: Low Orbit Ion Cannon (LOIC) UDP Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALOIC-WEB.html">DDOS:LOIC-WEB</a></b></td>
   <td width="500" valign="top">
    DDOS: Low Orbit Ion Cannon Webpage Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ALONGCAT.html">DDOS:LONGCAT</a></b></td>
   <td width="500" valign="top">
    DDOS: LongCat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ASHAFT%3AAGENT-TO-HANDLER.html">DDOS:SHAFT:AGENT-TO-HANDLER</a></b></td>
   <td width="500" valign="top">
    DDOS: Shaft Agent to Handler
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ASHAFT%3AAGENT-TO-HANDLER-PKT.html">DDOS:SHAFT:AGENT-TO-HANDLER-PKT</a></b></td>
   <td width="500" valign="top">
    DDOS: Shaft Agent to Handler Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ASHAFT%3ACLIENT-TO-HANDLER.html">DDOS:SHAFT:CLIENT-TO-HANDLER</a></b></td>
   <td width="500" valign="top">
    DDOS: Shaft Client to Handler
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ASHAFT%3AHANDLER-TO-AGENT.html">DDOS:SHAFT:HANDLER-TO-AGENT</a></b></td>
   <td width="500" valign="top">
    DDOS: Shaft Handler to Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-CMD.html">DDOS:TRIN00:DAEMON-CMD</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Master to Daemon Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-CMD-SHI.html">DDOS:TRIN00:DAEMON-CMD-SHI</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Master to Daemon Command (shi)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-CMD-XYZ.html">DDOS:TRIN00:DAEMON-CMD-XYZ</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Master to Daemon Command (xyz)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-TO-MASTER-1.html">DDOS:TRIN00:DAEMON-TO-MASTER-1</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Daemon to Master (HELLO)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-TO-MASTER-2.html">DDOS:TRIN00:DAEMON-TO-MASTER-2</a></b></td>
   <td width="500" valign="top">
    DDOS TRIN00 Daemon to Master (PONG)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-TO-MSTR1-PKT.html">DDOS:TRIN00:DAEMON-TO-MSTR1-PKT</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Daemon to Master Packet (HELLO)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3ADAEMON-TO-MSTR2-PKT.html">DDOS:TRIN00:DAEMON-TO-MSTR2-PKT</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Daemon to Master Packet (PONG)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-DOS.html">DDOS:TRIN00:MASTER-CMD-DOS</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (dos)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-KILLDEAD.html">DDOS:TRIN00:MASTER-CMD-KILLDEAD</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (killdead)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-MDIE.html">DDOS:TRIN00:MASTER-CMD-MDIE</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (mdie)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-MDOS.html">DDOS:TRIN00:MASTER-CMD-MDOS</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (mdos)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-MPING.html">DDOS:TRIN00:MASTER-CMD-MPING</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (mping)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-CMD-MSIZE.html">DDOS:TRIN00:MASTER-CMD-MSIZE</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker To Master Command (msize)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTER-PROMPT.html">DDOS:TRIN00:MASTER-PROMPT</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Master Prompt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTERPW-DEF-KDIE.html">DDOS:TRIN00:MASTERPW-DEF-KDIE</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker to Master (Default MDIE Password)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTERPW-DEF-REMOTE.html">DDOS:TRIN00:MASTERPW-DEF-REMOTE</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker to Master (Default Remote Password)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTERPW-DEF-STRTUP.html">DDOS:TRIN00:MASTERPW-DEF-STRTUP</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Attacker to Master (Default Startup Password)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRIN00%3AMASTERPW-DEFLT-WIN.html">DDOS:TRIN00:MASTERPW-DEFLT-WIN</a></b></td>
   <td width="500" valign="top">
    DDOS: TRIN00 Master To Daemon (Windows PW)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DDOS%3ATRINITY%3ADEFAULT-PW.html">DDOS:TRINITY:DEFAULT-PW</a></b></td>
   <td width="500" valign="top">
    DDOS: Trinity Default Password
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DHCP"></a>DHCP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3ABOOT-FNAME-NOT-T2.html">DHCP:AUDIT:BOOT-FNAME-NOT-T2</a></b></td>
   <td width="500" valign="top">
    DHCP: Boot Filename Not Null Terminated Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3ACLI-HW-MISMATCH.html">DHCP:AUDIT:CLI-HW-MISMATCH</a></b></td>
   <td width="500" valign="top">
    DHCP: Client HW Address Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3ACLI-HWADDR-NOT-T2.html">DHCP:AUDIT:CLI-HWADDR-NOT-T2</a></b></td>
   <td width="500" valign="top">
    DHCP: Client HW Address Not NULL Terminated Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3AINV-CLI-SRC-PORT.html">DHCP:AUDIT:INV-CLI-SRC-PORT</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Client Source Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3AINV-SVR-SRC-PORT.html">DHCP:AUDIT:INV-SVR-SRC-PORT</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Server Source Port Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3AMISS-MAGIC-COOKIE.html">DHCP:AUDIT:MISS-MAGIC-COOKIE</a></b></td>
   <td width="500" valign="top">
    DHCP: Missing Magic Cookie Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3ASVRNAME-NOT-T2.html">DHCP:AUDIT:SVRNAME-NOT-T2</a></b></td>
   <td width="500" valign="top">
    DHCP: Server Name Not NULL Terminated Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3AUNK-HW-TYPE.html">DHCP:AUDIT:UNK-HW-TYPE</a></b></td>
   <td width="500" valign="top">
    DHCP: Unknown HW Type Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AAUDIT%3AUNK-OPCODE.html">DHCP:AUDIT:UNK-OPCODE</a></b></td>
   <td width="500" valign="top">
    DHCP: Unknown Opcode Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AERROR%3AINV-HW-LEN.html">DHCP:ERROR:INV-HW-LEN</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid HW Length Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AERROR%3AINV-MAGIC-COOKIE.html">DHCP:ERROR:INV-MAGIC-COOKIE</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Magic Cookie Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AERROR%3AINV-MSG-TYPE.html">DHCP:ERROR:INV-MSG-TYPE</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Message Type Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AEXPLOIT%3AHOSTNAME-HTML.html">DHCP:EXPLOIT:HOSTNAME-HTML</a></b></td>
   <td width="500" valign="top">
    DHCP: HTML Tags in DHCP Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AEXPLOIT%3AMSG-TOO-SHORT.html">DHCP:EXPLOIT:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    DHCP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AEXPLOIT%3ASOLARIS-EXEC.html">DHCP:EXPLOIT:SOLARIS-EXEC</a></b></td>
   <td width="500" valign="top">
    DHCP: Sun Solaris DHCP Client Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AISC-ZERO-LEN-DOS.html">DHCP:ISC-ZERO-LEN-DOS</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server Zero Length Client ID Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ABAD-HOSTNAME.html">DHCP:OPT:BAD-HOSTNAME</a></b></td>
   <td width="500" valign="top">
    DHCP: Bad Host Name Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ADEF-TTL-ZERO.html">DHCP:OPT:DEF-TTL-ZERO</a></b></td>
   <td width="500" valign="top">
    DHCP: Default TTL Zero Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ADHCPD-PKT-SIZE-BO.html">DHCP:OPT:DHCPD-PKT-SIZE-BO</a></b></td>
   <td width="500" valign="top">
    DHCP: Dhcpcd Packet Size Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AIFMTU-TOO-SMALL.html">DHCP:OPT:IFMTU-TOO-SMALL</a></b></td>
   <td width="500" valign="top">
    DHCP: Interface MTU Too Small Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AINV-NB-NODE-TYPE.html">DHCP:OPT:INV-NB-NODE-TYPE</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid NetBIOS Node Type Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AINV-OPT-LEN.html">DHCP:OPT:INV-OPT-LEN</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Option Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AINV-OPT-VAL.html">DHCP:OPT:INV-OPT-VAL</a></b></td>
   <td width="500" valign="top">
    DHCP: Invalid Option Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AISC-DHCPD-MMS-DOS.html">DHCP:OPT:ISC-DHCPD-MMS-DOS</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCPD Server Maximum Message Size Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ALEASE-TIME-ZERO.html">DHCP:OPT:LEASE-TIME-ZERO</a></b></td>
   <td width="500" valign="top">
    DHCP: Lease Time Zero Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ALOG-BUF-OVERFLOW.html">DHCP:OPT:LOG-BUF-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DHCP: Option LOG-BUF-OVERFLOW
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AMAX-DGM-SZ-2-SMALL.html">DHCP:OPT:MAX-DGM-SZ-2-SMALL</a></b></td>
   <td width="500" valign="top">
    DHCP: Maximum Datagram Reassembly Size Too Small
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AMAX-MSG-SIZE-2-SMALL.html">DHCP:OPT:MAX-MSG-SIZE-2-SMALL</a></b></td>
   <td width="500" valign="top">
    DHCP: Maximum Message Size Too Small
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AMISSING-EOO.html">DHCP:OPT:MISSING-EOO</a></b></td>
   <td width="500" valign="top">
    DHCP: Missing End of Options
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3AMS-OPT-OF.html">DHCP:OPT:MS-OPT-OF</a></b></td>
   <td width="500" valign="top">
    DHCP: Microsoft Windows DHCP Client Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3AOPT%3ATCP-DEF-TTL-ZERO.html">DHCP:OPT:TCP-DEF-TTL-ZERO</a></b></td>
   <td width="500" valign="top">
    DHCP: TCP Default TTL Zero Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AFMT-STR.html">DHCP:SERVER:FMT-STR</a></b></td>
   <td width="500" valign="top">
    DHCP: Format String in FQDN Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AGNU-BASH-CMD-EXE.html">DHCP:SERVER:GNU-BASH-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    DHCP: GNU Bash Environment Variable Handling Command Execution DHCP Vector
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-CMD-INJ.html">DHCP:SERVER:ISC-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC Network Configuration Script Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-DHCLIENT-BOF.html">DHCP:SERVER:ISC-DHCLIENT-BOF</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP dhclient script_write_params Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-DHCPD-BO.html">DHCP:SERVER:ISC-DHCPD-BO</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Buffer Overflow Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-DISCOVER-DOS.html">DHCP:SERVER:ISC-DISCOVER-DOS</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server DHCPOFFER Client Identifier Field Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-DUID-BO.html">DHCP:SERVER:ISC-DUID-BO</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server DUID Handling Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-FORMAT-STRING.html">DHCP:SERVER:ISC-FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCPDv3 Format String Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-MAL-CLID.html">DHCP:SERVER:ISC-MAL-CLID</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server Malformed Client Identifier Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-PACKET-DOS.html">DHCP:SERVER:ISC-PACKET-DOS</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server Packet Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-PACKET-PRO-DOS.html">DHCP:SERVER:ISC-PACKET-PRO-DOS</a></b></td>
   <td width="500" valign="top">
    DHCP: ISC DHCP Packet Processing Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DISCARD"></a>DISCARD</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DISCARD%3AEXPLOIT%3AUNEXPECTED-REP.html">DISCARD:EXPLOIT:UNEXPECTED-REP</a></b></td>
   <td width="500" valign="top">
    DISCARD: Unexpected Server Reply Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DISCARD%3AINFO%3AASCEND-DISCARD.html">DISCARD:INFO:ASCEND-DISCARD</a></b></td>
   <td width="500" valign="top">
    DISCARD: Ascent/Lucent Router Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DISCARD%3ATRAFFIC.html">DISCARD:TRAFFIC</a></b></td>
   <td width="500" valign="top">
    DISCARD: Traffic
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DNS"></a>DNS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AAAAA-RR.html">DNS:AUDIT:AAAA-RR</a></b></td>
   <td width="500" valign="top">
    DNS: IPv6 Resource Record Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ACLASS-NON-IN.html">DNS:AUDIT:CLASS-NON-IN</a></b></td>
   <td width="500" valign="top">
    DNS: Class is not IN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ACLASS-UNKNOWN.html">DNS:AUDIT:CLASS-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    DNS: Class Unknown
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AINVALID-RCODE.html">DNS:AUDIT:INVALID-RCODE</a></b></td>
   <td width="500" valign="top">
    DNS: Invalid RCODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AINVALID-Z.html">DNS:AUDIT:INVALID-Z</a></b></td>
   <td width="500" valign="top">
    DNS: Z Bit Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AMISMATCHING-AN-CNAME.html">DNS:AUDIT:MISMATCHING-AN-CNAME</a></b></td>
   <td width="500" valign="top">
    DNS: Mismatching Reply AN in CNAME
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AOPT-NMB-EXCEEDED.html">DNS:AUDIT:OPT-NMB-EXCEEDED</a></b></td>
   <td width="500" valign="top">
    DNS: Too many OPT RRs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AQCLASS-UNEXP.html">DNS:AUDIT:QCLASS-UNEXP</a></b></td>
   <td width="500" valign="top">
    DNS: QCLASS in Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ARCODE-FORMAT-ERROR.html">DNS:AUDIT:RCODE-FORMAT-ERROR</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Format Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ARCODE-NAME-ERROR.html">DNS:AUDIT:RCODE-NAME-ERROR</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Name Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ARCODE-NOT-IMPL.html">DNS:AUDIT:RCODE-NOT-IMPL</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Function Not Implemented
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ARCODE-REFUSED.html">DNS:AUDIT:RCODE-REFUSED</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Operation Refused
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREP-MISMATCHING-AN.html">DNS:AUDIT:REP-MISMATCHING-AN</a></b></td>
   <td width="500" valign="top">
    DNS: Mismatching Reply AN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREP-MISMATCHING-QD.html">DNS:AUDIT:REP-MISMATCHING-QD</a></b></td>
   <td width="500" valign="top">
    DNS: Mismatching Reply QD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREP-QTYPE-UNEXPECTED.html">DNS:AUDIT:REP-QTYPE-UNEXPECTED</a></b></td>
   <td width="500" valign="top">
    DNS: QTYPE in Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREP-S2C-QUERY.html">DNS:AUDIT:REP-S2C-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: Query Bit Not Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREQ-ANSWERS-IN-QUERY.html">DNS:AUDIT:REQ-ANSWERS-IN-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: Answers in Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREQ-C2S-RESPONSE.html">DNS:AUDIT:REQ-C2S-RESPONSE</a></b></td>
   <td width="500" valign="top">
    DNS: Query Bit Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AREQ-INVALID-HDR-RA.html">DNS:AUDIT:REQ-INVALID-HDR-RA</a></b></td>
   <td width="500" valign="top">
    DNS: RA Bit Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ATYPE-ALL.html">DNS:AUDIT:TYPE-ALL</a></b></td>
   <td width="500" valign="top">
    DNS: Type &quot;ALL&quot; Used
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ATYPE-EXPERIMENTAL.html">DNS:AUDIT:TYPE-EXPERIMENTAL</a></b></td>
   <td width="500" valign="top">
    DNS: Experimental Type Used
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ATYPE-NON-1035.html">DNS:AUDIT:TYPE-NON-1035</a></b></td>
   <td width="500" valign="top">
    DNS: Non-RFC1035 Type Used
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ATYPE-OBSOLETE.html">DNS:AUDIT:TYPE-OBSOLETE</a></b></td>
   <td width="500" valign="top">
    DNS: Obsolete Type Used
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3ATYPE-UNKNOWN.html">DNS:AUDIT:TYPE-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    DNS: Unknown Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AUNASSIGNED-OPCODE.html">DNS:AUDIT:UNASSIGNED-OPCODE</a></b></td>
   <td width="500" valign="top">
    DNS: Unassigned Opcode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AAUDIT%3AZ-RESERVED-OPT.html">DNS:AUDIT:Z-RESERVED-OPT</a></b></td>
   <td width="500" valign="top">
    DNS: Z Option Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-DBC-ASSERT-DOS.html">DNS:BIND-DBC-ASSERT-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND db.c Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-DELEGATION-HANDLNG-DOS.html">DNS:BIND-DELEGATION-HANDLNG-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND Delegation Handling Resource Exhaustion Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-NXT-OVERFLOW1.html">DNS:BIND-NXT-OVERFLOW1</a></b></td>
   <td width="500" valign="top">
    DNS: BIND NXT Overflow (Linux)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-NXT-OVERFLOW2.html">DNS:BIND-NXT-OVERFLOW2</a></b></td>
   <td width="500" valign="top">
    DNS: BIND NXT Overflow (Solaris)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-NXT-OVERFLOW3.html">DNS:BIND-NXT-OVERFLOW3</a></b></td>
   <td width="500" valign="top">
    DNS: BIND NXT Overflow (BSD)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-NXT-OVERFLOW4.html">DNS:BIND-NXT-OVERFLOW4</a></b></td>
   <td width="500" valign="top">
    DNS: BIND NXT Overflow (BSD, no chroot)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-RRSIG-DOS.html">DNS:BIND-RRSIG-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND RRSIG RRsets Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-RRSIG-DOS-2.html">DNS:BIND-RRSIG-DOS-2</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND RRSIG RRsets Denial of Service 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND-RRSIG-QUERY-DOS.html">DNS:BIND-RRSIG-QUERY-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND RRSIG Query With RPZ Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ABIND9-ASSERT-DOS.html">DNS:BIND9-ASSERT-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Bind9 Assertion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ACRAFTED-MX.html">DNS:CRAFTED-MX</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Exchange Crafted MX Record
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ADYNAMICUPDATE.html">DNS:DYNAMICUPDATE</a></b></td>
   <td width="500" valign="top">
    DNS: BIND Dynamic Update Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-ADDSOA.html">DNS:EXPLOIT:BIND-ADDSOA</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND query_addsoa Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-KEYPARSE-DOS.html">DNS:EXPLOIT:BIND-KEYPARSE-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND DNSSEC Key Parsing Buffer Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-MULT-RRSET.html">DNS:EXPLOIT:BIND-MULT-RRSET</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND DNSSEC Validation Multiple RRsets Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-OPENPGPKEY-DOS.html">DNS:EXPLOIT:BIND-OPENPGPKEY-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND openpgpkey Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AEMPTY-UDP-MSG.html">DNS:EXPLOIT:EMPTY-UDP-MSG</a></b></td>
   <td width="500" valign="top">
    DNS: Empty UDP Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AEXPLOIT-BIND9-RT.html">DNS:EXPLOIT:EXPLOIT-BIND9-RT</a></b></td>
   <td width="500" valign="top">
    DNS: BIND 9 RT Record Reply Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AISC-BIND-DNS64-RPZ.html">DNS:EXPLOIT:ISC-BIND-DNS64-RPZ</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND DNS64 RPZ Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AISC-BIND-RDATA-DOS.html">DNS:EXPLOIT:ISC-BIND-RDATA-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND RDATA Records Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AMAL-TXT-REC.html">DNS:EXPLOIT:MAL-TXT-REC</a></b></td>
   <td width="500" valign="top">
    DNS: Malformed DNS TXT Record
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3APNTRS-PERNAME-EXCD.html">DNS:EXPLOIT:PNTRS-PERNAME-EXCD</a></b></td>
   <td width="500" valign="top">
    DNS: Pointer Number Exceeded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3APOINTER-LOOP.html">DNS:EXPLOIT:POINTER-LOOP</a></b></td>
   <td width="500" valign="top">
    DNS: Pointer Loop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AREQUEST-SHORT-MSG.html">DNS:EXPLOIT:REQUEST-SHORT-MSG</a></b></td>
   <td width="500" valign="top">
    DNS: Message Ends Prematurely
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ASQUID-PROXY-DOS.html">DNS:EXPLOIT:SQUID-PROXY-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Squid Proxy Malformed DNS Response DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ASQUID-PROXY-PTR-DOS.html">DNS:EXPLOIT:SQUID-PROXY-PTR-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Squid Proxy Malformed DNS Pointer Response DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ATRANSPOOF-2.html">DNS:EXPLOIT:TRANSPOOF-2</a></b></td>
   <td width="500" valign="top">
    DNS: Transaction Spoofing (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AFAILURE%3ARCODE_NOTAUTH.html">DNS:FAILURE:RCODE_NOTAUTH</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Not Auth
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AFAILURE%3ARCODE_NOTZONE.html">DNS:FAILURE:RCODE_NOTZONE</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Not Zone
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AGNUTLS-DANE-BOF.html">DNS:GNUTLS-DANE-BOF</a></b></td>
   <td width="500" valign="top">
    DNS: GnuTLS DANE dane.c Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AHEADERERROR%3AINVALID-OPCODE.html">DNS:HEADERERROR:INVALID-OPCODE</a></b></td>
   <td width="500" valign="top">
    DNS: Invalid OPCODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3AOVERSIZED_ADV_PAYLOAD.html">DNS:INFO:OVERSIZED_ADV_PAYLOAD</a></b></td>
   <td width="500" valign="top">
    DNS: Oversized advertised payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3ARCODE-BADVERS.html">DNS:INFO:RCODE-BADVERS</a></b></td>
   <td width="500" valign="top">
    DNS:RCODE bad version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3ARCODE-SERVER-FAILURE.html">DNS:INFO:RCODE-SERVER-FAILURE</a></b></td>
   <td width="500" valign="top">
    DNS: RCODE Server Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3ATYPE-AXFR.html">DNS:INFO:TYPE-AXFR</a></b></td>
   <td width="500" valign="top">
    DNS: Zone Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3AXFER-BAD.html">DNS:INFO:XFER-BAD</a></b></td>
   <td width="500" valign="top">
    DNS: Zone Xfer Unsuccessful
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AINFO%3AXFER-GOOD.html">DNS:INFO:XFER-GOOD</a></b></td>
   <td width="500" valign="top">
    DNS: Zone Xfer Successful
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISATAPREG.html">DNS:ISATAPREG</a></b></td>
   <td width="500" valign="top">
    DNS: ISATAP Registration Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-BIND-DNSSEC-DOS.html">DNS:ISC-BIND-DNSSEC-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND DNSSEC Validation Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-BIND-EDNS-OPT-DOS.html">DNS:ISC-BIND-EDNS-OPT-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND EDNS Option Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-BIND-REGEX-DOS.html">DNS:ISC-BIND-REGEX-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND Regular Expression Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-BIND-RRSIG-DOS.html">DNS:ISC-BIND-RRSIG-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND CNAME RRSIG Query With RPZ Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-BIND-TKEY-DOS.html">DNS:ISC-BIND-TKEY-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND  TKEY Queries Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AISC-INSIST-DOS.html">DNS:ISC-INSIST-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND apl_42.c INSIST Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AMAILENABLE-SPF.html">DNS:MAILENABLE-SPF</a></b></td>
   <td width="500" valign="top">
    DNS: MailEnable SMTP Service SPF Lookup Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AMICROSOFT-DNS-DOS.html">DNS:MICROSOFT-DNS-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft DNS Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AMS-ANY-QUERY-SPOOFING.html">DNS:MS-ANY-QUERY-SPOOFING</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft DNS Server ANY Query Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AMS-FOREFRONT-RCE.html">DNS:MS-FOREFRONT-RCE</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Forefront Threat Management Gateway Client Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AMS-ISA-CE.html">DNS:MS-ISA-CE</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Internet Security Acceleration Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ANEGANY.html">DNS:NEGANY</a></b></td>
   <td width="500" valign="top">
    DNS: Negative Response ANY Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AADM-TCP.html">DNS:OVERFLOW:ADM-TCP</a></b></td>
   <td width="500" valign="top">
    DNS: ADM Buffer Overflow (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ABAD-CHAR-UDP.html">DNS:OVERFLOW:BAD-CHAR-UDP</a></b></td>
   <td width="500" valign="top">
    DNS: Illegal Characters (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ADNS-ATMA-SIZE-OF.html">DNS:OVERFLOW:DNS-ATMA-SIZE-OF</a></b></td>
   <td width="500" valign="top">
    DNS: ATMA Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AGNU-C-GLIBC.html">DNS:OVERFLOW:GNU-C-GLIBC</a></b></td>
   <td width="500" valign="top">
    DNS: GNU C Library glibc getanswer_r Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AHOSTNAME-OF.html">DNS:OVERFLOW:HOSTNAME-OF</a></b></td>
   <td width="500" valign="top">
    DNS: Internet Explorer Hostname Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AINVALID-LABEL-LEN.html">DNS:OVERFLOW:INVALID-LABEL-LEN</a></b></td>
   <td width="500" valign="top">
    DNS: Label Length Too Large Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AINVALID-POINTER.html">DNS:OVERFLOW:INVALID-POINTER</a></b></td>
   <td width="500" valign="top">
    DNS: Pointer Pointing Beyond Data End Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ANAME-TOO-LONG.html">DNS:OVERFLOW:NAME-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    DNS: Name Too Long Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ANOOP-RQUERY.html">DNS:OVERFLOW:NOOP-RQUERY</a></b></td>
   <td width="500" valign="top">
    DNS: NOOP In DNS Reverse Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ANXT-OVERFLOW.html">DNS:OVERFLOW:NXT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DNS: BIND NXT Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AOPT-DOS.html">DNS:OVERFLOW:OPT-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: BIND OPT DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AOPT-OVERFLOW.html">DNS:OVERFLOW:OPT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DNS: OPT too long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASCO-NAMED2-OF1.html">DNS:OVERFLOW:SCO-NAMED2-OF1</a></b></td>
   <td width="500" valign="top">
    DNS: SCO Openserver named Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASCO-NAMED2-OF2.html">DNS:OVERFLOW:SCO-NAMED2-OF2</a></b></td>
   <td width="500" valign="top">
    DNS: SCO Openserver named Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASIG-OVERFLOW.html">DNS:OVERFLOW:SIG-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    DNS: BIND SIG Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASPARC-TCP.html">DNS:OVERFLOW:SPARC-TCP</a></b></td>
   <td width="500" valign="top">
    DNS: SPARC Buffer Overflow (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASYMANTEC-CNAME.html">DNS:OVERFLOW:SYMANTEC-CNAME</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec DNS CNAME Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ASYMNTEC-CNAME.html">DNS:OVERFLOW:SYMNTEC-CNAME</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec DNS CNAME Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ATCP-RESPONSE.html">DNS:OVERFLOW:TCP-RESPONSE</a></b></td>
   <td width="500" valign="top">
    DNS: TCP Response Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ATFTPD32.html">DNS:OVERFLOW:TFTPD32</a></b></td>
   <td width="500" valign="top">
    DNS: Tftpd32 DNS Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ATOO-LONG-TCP-MSG.html">DNS:OVERFLOW:TOO-LONG-TCP-MSG</a></b></td>
   <td width="500" valign="top">
    DNS: TCP Message Too Long Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ATXTRECORD.html">DNS:OVERFLOW:TXTRECORD</a></b></td>
   <td width="500" valign="top">
    DNS: DNS TXT Record Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3APDNS-AUTHSERV-DOS.html">DNS:PDNS-AUTHSERV-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: PowerDNS Authoritative Server DNS Packet Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3APHP-PARSERR-HEAP-BO.html">DNS:PHP-PARSERR-HEAP-BO</a></b></td>
   <td width="500" valign="top">
    DNS: PHP php_parserr DNS_TXT Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3APOWERDNS-NAMESRVR-UDP-DOS.html">DNS:POWERDNS-NAMESRVR-UDP-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: PowerDNS Nameserver Label Decompression Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3APOWERDNS-NAMSRVR-TCP-DOS.html">DNS:POWERDNS-NAMSRVR-TCP-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: PowerDNS Nameserver Label Decompression DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AAUTHORS.html">DNS:QUERY:AUTHORS</a></b></td>
   <td width="500" valign="top">
    DNS: BIND Authors Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3ABIND-IQUERY-BO.html">DNS:QUERY:BIND-IQUERY-BO</a></b></td>
   <td width="500" valign="top">
    DNS: BIND iquery Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AENC-STATUS-SPOOF.html">DNS:QUERY:ENC-STATUS-SPOOF</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Internet Explorer Status Bar Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AHOSTNAME.html">DNS:QUERY:HOSTNAME</a></b></td>
   <td width="500" valign="top">
    DNS: BIND Hostname Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AISC-BIND-NSEC3-DOS.html">DNS:QUERY:ISC-BIND-NSEC3-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: ISC BIND NSEC3-Signed Zones Queries Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3ANULL-QUERY.html">DNS:QUERY:NULL-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: Null Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3ASYMC-DNS-CACHE.html">DNS:QUERY:SYMC-DNS-CACHE</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec Gateway Products DNS Cache Poisoning
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AVERSION-QUERY.html">DNS:QUERY:VERSION-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: BIND Version Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AQUERY%3AWIN-DNS-SERVER-SPOOF.html">DNS:QUERY:WIN-DNS-SERVER-SPOOF</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Windows DNS Server Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AREPERR%3ANAPRT-IOF.html">DNS:REPERR:NAPRT-IOF</a></b></td>
   <td width="500" valign="top">
    DNS: Name Authority Pointer Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AREPERR%3ANULL-RDATA-LEN.html">DNS:REPERR:NULL-RDATA-LEN</a></b></td>
   <td width="500" valign="top">
    DNS: Null RDATA Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AREQUEST-RRTYPE-ANY.html">DNS:REQUEST-RRTYPE-ANY</a></b></td>
   <td width="500" valign="top">
    DNS: Request With DNS Resource Record Type &#39;ANY&#39;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AREQUEST%3ASUN-JRE-DOS.html">DNS:REQUEST:SUN-JRE-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Sun Java JRE DNS Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ARESOLVER-BO.html">DNS:RESOLVER-BO</a></b></td>
   <td width="500" valign="top">
    DNS: Red Hat Enterprise Linux DNS Resolver Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ARESP-SPOOF.html">DNS:RESP-SPOOF</a></b></td>
   <td width="500" valign="top">
    DNS: Microsoft Windows SMTP Service DNS Response Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ARRSIG-QUERY.html">DNS:RRSIG-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: RRSIG Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ASAMBA-DNS-REPLY-FLAG-DOS.html">DNS:SAMBA-DNS-REPLY-FLAG-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Samba DNS Reply Flag Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ASQUID-DNS-RESPONSE-SPOOF.html">DNS:SQUID-DNS-RESPONSE-SPOOF</a></b></td>
   <td width="500" valign="top">
    DNS: Squid Proxy DNS Response Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ASYMANTEC-DNS-POISIONING.html">DNS:SYMANTEC-DNS-POISIONING</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec Enterprise Firewall DNSD Proxy Cache Poisoning
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ASYMANTEC-DNS-RESPONSE-DOS.html">DNS:SYMANTEC-DNS-RESPONSE-DOS</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec DNS Response DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ASYMNTC-FIREWALL-MULT.html">DNS:SYMNTC-FIREWALL-MULT</a></b></td>
   <td width="500" valign="top">
    DNS: Symantec Firewall Multiple Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATOO-MANY-ERRORS.html">DNS:TOO-MANY-ERRORS</a></b></td>
   <td width="500" valign="top">
    DNS: Too Many Errors ON Flow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATRAFFIC-TCP.html">DNS:TRAFFIC-TCP</a></b></td>
   <td width="500" valign="top">
    DNS: Traffic (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATRAFFIC-UDP.html">DNS:TRAFFIC-UDP</a></b></td>
   <td width="500" valign="top">
    DNS: Traffic (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3ADNS2TCP.html">DNS:TUNNEL:DNS2TCP</a></b></td>
   <td width="500" valign="top">
    DNS: DNS2TCP Tunneling Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3AI2P-DNS-QUERY.html">DNS:TUNNEL:I2P-DNS-QUERY</a></b></td>
   <td width="500" valign="top">
    DNS: I2P Address Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3AIODINE.html">DNS:TUNNEL:IODINE</a></b></td>
   <td width="500" valign="top">
    DNS: Iodine Tunneling Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3ANULL-RECORD.html">DNS:TUNNEL:NULL-RECORD</a></b></td>
   <td width="500" valign="top">
    DNS: NULL Record Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3AOZYMANDNS.html">DNS:TUNNEL:OZYMANDNS</a></b></td>
   <td width="500" valign="top">
    DNS: OzymanDNS Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3ATUNNEL%3ASHORT-TTL.html">DNS:TUNNEL:SHORT-TTL</a></b></td>
   <td width="500" valign="top">
    DNS: Short Time To Live Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AWORDPRESS-SOAK-SOAK-MALWARE.html">DNS:WORDPRESS-SOAK-SOAK-MALWARE</a></b></td>
   <td width="500" valign="top">
    DNS: Wordpress Soak Soak Malware Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DNS%3AWPADREG.html">DNS:WPADREG</a></b></td>
   <td width="500" valign="top">
    DNS: WPAD Registration Query
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="DOS"></a>DOS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AAPPLICATION%3ADOS.html">DOS:APPLICATION:DOS</a></b></td>
   <td width="500" valign="top">
    DOS: RealAudio Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AAPPLICATION%3AMS-HIS-TCP.html">DOS:APPLICATION:MS-HIS-TCP</a></b></td>
   <td width="500" valign="top">
    DOS: Microsoft Host Integration Server Denial of Service over TCP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AAPPLICATION%3AMS-HIS-UDP.html">DOS:APPLICATION:MS-HIS-UDP</a></b></td>
   <td width="500" valign="top">
    DOS: Microsoft Host Integration Server Denial of Service over UDP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ADELL-NETVAULT-DOS.html">DOS:DELL-NETVAULT-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Dell NetVault Backup Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AEMULE-DOS.html">DOS:EMULE-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: eMule DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AFREEBSD-ROUTED-DAEMON.html">DOS:FREEBSD-ROUTED-DAEMON</a></b></td>
   <td width="500" valign="top">
    DOS: FreeBSD Routed Daemon Routing Information Protocol Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3AASCONF-CHUNK-PARSE.html">DOS:IP:ASCONF-CHUNK-PARSE</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel SCTP ASCONF Chunk Parameter Parsing Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ACHARGEN-BOMB.html">DOS:IP:CHARGEN-BOMB</a></b></td>
   <td width="500" valign="top">
    DOS: UDP CHARGEN Bomb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ACISCO-IOS-NHRP.html">DOS:IP:CISCO-IOS-NHRP</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS Next Hop Resolution Protocol Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3AFRAGMENT.html">DOS:IP:FRAGMENT</a></b></td>
   <td width="500" valign="top">
    DOS: IGMP Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3AIGMP-LINUX.html">DOS:IP:IGMP-LINUX</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel IGMP Queries Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3AIGMP-OVERSIZE.html">DOS:IP:IGMP-OVERSIZE</a></b></td>
   <td width="500" valign="top">
    DOS: IGMP Oversize
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALIN-KERNEL-SKACK-DOS.html">DOS:IP:LIN-KERNEL-SKACK-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel sk_ack Denial-Of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALINUX-CHUNKINIT-DOS.html">DOS:IP:LINUX-CHUNKINIT-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel sctp_process_unk_param SCTPChunkInit Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALINUX-DCCP-DOS.html">DOS:IP:LINUX-DCCP-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel DCCP Protocol Handler Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALINUX-KERNEL-INIT.html">DOS:IP:LINUX-KERNEL-INIT</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel SCTP Packet Handling NULL Pointer Dereference Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALINUX-KERNEL-NF-DOS.html">DOS:IP:LINUX-KERNEL-NF-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel NetFilter SCTP Unknown Chunk Types Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3ALINUX-KERNEL-OOTB.html">DOS:IP:LINUX-KERNEL-OOTB</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel Out of The Blue Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AIP%3APGM.html">DOS:IP:PGM</a></b></td>
   <td width="500" valign="top">
    APP: Microsoft PGM Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ALINUX-COOKIE-ECHO-DOS.html">DOS:LINUX-COOKIE-ECHO-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Linux Kernel COOKIE ECHO Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AMULTIVENDOR-TCP-TIMESTAMP.html">DOS:MULTIVENDOR-TCP-TIMESTAMP</a></b></td>
   <td width="500" valign="top">
    DOS: Multi Vendor TCP Timestamp Option Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AASCEND-KILL.html">DOS:NETDEV:ASCEND-KILL</a></b></td>
   <td width="500" valign="top">
    DOS: Ascend Router
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AASCEND-KILL2.html">DOS:NETDEV:ASCEND-KILL2</a></b></td>
   <td width="500" valign="top">
    DOS: Ascend Router (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACATALYST-SSH-DOS.html">DOS:NETDEV:CATALYST-SSH-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco Catalyst SSH Protocol Mismatch DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-5000.html">DOS:NETDEV:CISCO-5000</a></b></td>
   <td width="500" valign="top">
    DOS: CISCO Catalyst 5000
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-HTTPD-DOS.html">DOS:NETDEV:CISCO-HTTPD-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS httpd DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-IPMOBILITY.html">DOS:NETDEV:CISCO-IPMOBILITY</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS Interface Blocked by IPv4 Packet (IP Mobility)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-PIM.html">DOS:NETDEV:CISCO-PIM</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS Interface Blocked by IPv4 Packet (PIM)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-SUNND.html">DOS:NETDEV:CISCO-SUNND</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS Interface Blocked by IPv4 Packet (Sun ND)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-SWIPE.html">DOS:NETDEV:CISCO-SWIPE</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco IOS Interface Blocked by IPv4 Packet (SWIPE)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-SYSLOG-DOS.html">DOS:NETDEV:CISCO-SYSLOG-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco Syslog UDP Flood Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ACISCO-TELNET-BOF1.html">DOS:NETDEV:CISCO-TELNET-BOF1</a></b></td>
   <td width="500" valign="top">
    DOS: Cisco Telnet Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AD-LINK-DNS-320.html">DOS:NETDEV:D-LINK-DNS-320</a></b></td>
   <td width="500" valign="top">
    DOS: D-Link DNS-320 ShareCenter Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AHP-LCD-MOD-9001.html">DOS:NETDEV:HP-LCD-MOD-9001</a></b></td>
   <td width="500" valign="top">
    DOS: HP JetDirect LCD Modification (TCP/9001)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AHP-LCD-MOD-9100.html">DOS:NETDEV:HP-LCD-MOD-9100</a></b></td>
   <td width="500" valign="top">
    DOS: HP JetDirect LCD Modification (TCP/9100)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ALINKSYS-GOZILA-DOS2.html">DOS:NETDEV:LINKSYS-GOZILA-DOS2</a></b></td>
   <td width="500" valign="top">
    DOS: LinkSys Cable/DSL Router Gozila sysPasswd Parameter DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ALINKSYS-GOZILA-DOS3.html">DOS:NETDEV:LINKSYS-GOZILA-DOS3</a></b></td>
   <td width="500" valign="top">
    DOS: LinkSys Cable/DSL Router Gozila DomainName Parameter DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ALIVINGSTON.html">DOS:NETDEV:LIVINGSTON</a></b></td>
   <td width="500" valign="top">
    DOS: Livingston Router
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ANETWORK-3COM-DOS.html">DOS:NETDEV:NETWORK-3COM-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: 3Com OfficeConnect HTTP Router Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3ANORTEL-MARLIN.html">DOS:NETDEV:NORTEL-MARLIN</a></b></td>
   <td width="500" valign="top">
    DOS: Nortel Nautica Marlin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AROUTEFINDER-VPN-DOS.html">DOS:NETDEV:ROUTEFINDER-VPN-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: SOHO RouteFinder 550 VPN DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AWEBJET-FW-INFOLEAK.html">DOS:NETDEV:WEBJET-FW-INFOLEAK</a></b></td>
   <td width="500" valign="top">
    DOS: HP Web JetAdmin Framework Infoleak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AWEBJET-HTS-DOT.html">DOS:NETDEV:WEBJET-HTS-DOT</a></b></td>
   <td width="500" valign="top">
    DOS: HP Web JetAdmin HTS. Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ANETDEV%3AWEBJET-WRITETOFILE.html">DOS:NETDEV:WEBJET-WRITETOFILE</a></b></td>
   <td width="500" valign="top">
    DOS: HP Web JetAdmin WriteToFile Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3ASLOWHTTPTEST-TOOL.html">DOS:SLOWHTTPTEST-TOOL</a></b></td>
   <td width="500" valign="top">
    DOS: SlowHTTPTest HTTP Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AUPNP-CHARGEN-DOS.html">DOS:UPNP-CHARGEN-DOS</a></b></td>
   <td width="500" valign="top">
    UPNP: NOTIFY Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AHTTP-SYS.html">DOS:WINDOWS:HTTP-SYS</a></b></td>
   <td width="500" valign="top">
    DOS: Windows Server HTTP.sys Denial of Service 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AISCSI-TARGET.html">DOS:WINDOWS:ISCSI-TARGET</a></b></td>
   <td width="500" valign="top">
    DOS: Microsoft Windows iSCSI Target CVE-2014-0255
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AMS-RDP-PATTERN-DOS.html">DOS:WINDOWS:MS-RDP-PATTERN-DOS</a></b></td>
   <td width="500" valign="top">
    DOS: Windows XP RDP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AWINNUKE-NETBIOS.html">DOS:WINDOWS:WINNUKE-NETBIOS</a></b></td>
   <td width="500" valign="top">
    DOS: WinNuke (netbios)
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="ECHO"></a>ECHO</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ECHO%3AAUDIT%3ALINE.html">ECHO:AUDIT:LINE</a></b></td>
   <td width="500" valign="top">
    ECHO: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ECHO%3ACHARGEN-DOS.html">ECHO:CHARGEN-DOS</a></b></td>
   <td width="500" valign="top">
    ECHO: Chargen DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ECHO%3AEXPLOIT%3AMISMATCHING-REPLY.html">ECHO:EXPLOIT:MISMATCHING-REPLY</a></b></td>
   <td width="500" valign="top">
    ECHO: Mismatching Server Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ECHO%3AEXPLOIT%3ASERVER-NO-RESPONSE.html">ECHO:EXPLOIT:SERVER-NO-RESPONSE</a></b></td>
   <td width="500" valign="top">
    ECHO: No Response From Server
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="FINGER"></a>FINGER</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AAUDIT%3AREQ-WRONG-FORMAT.html">FINGER:AUDIT:REQ-WRONG-FORMAT</a></b></td>
   <td width="500" valign="top">
    FINGER: Bad Request Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3ABACKDOOR%3ACMD-ROOTSH.html">FINGER:BACKDOOR:CMD-ROOTSH</a></b></td>
   <td width="500" valign="top">
    FINGER: Cmd_rootsh
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3ADOS%3ABOMB.html">FINGER:DOS:BOMB</a></b></td>
   <td width="500" valign="top">
    FINGER: Bomb DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3AACCOUNT-ENUM.html">FINGER:EXPLOIT:ACCOUNT-ENUM</a></b></td>
   <td width="500" valign="top">
    FINGER: Account Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3ADOT-AT-HOST.html">FINGER:EXPLOIT:DOT-AT-HOST</a></b></td>
   <td width="500" valign="top">
    FINGER: .@host Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3ANULL-BYTE.html">FINGER:EXPLOIT:NULL-BYTE</a></b></td>
   <td width="500" valign="top">
    FINGER: NULL Byte Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3APIPE.html">FINGER:EXPLOIT:PIPE</a></b></td>
   <td width="500" valign="top">
    FINGER: Pipe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3AREDIRECTION.html">FINGER:EXPLOIT:REDIRECTION</a></b></td>
   <td width="500" valign="top">
    FINGER: Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AEXPLOIT%3AZERO-AT-HOST.html">FINGER:EXPLOIT:ZERO-AT-HOST</a></b></td>
   <td width="500" valign="top">
    FINGER: 0@host Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AOVERFLOW%3ALINE.html">FINGER:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    FINGER: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AREPLYERROR%3ABIN-DATA.html">FINGER:REPLYERROR:BIN-DATA</a></b></td>
   <td width="500" valign="top">
    FINGER: Binary Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AREQERR%3ABIN-HOST.html">FINGER:REQERR:BIN-HOST</a></b></td>
   <td width="500" valign="top">
    FINGER: Binary Data in Host
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AREQERR%3AREQ-BINARY-DATA.html">FINGER:REQERR:REQ-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    FINGER: Binary Data in Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AREQERR%3AUNEXP-LINE.html">FINGER:REQERR:UNEXP-LINE</a></b></td>
   <td width="500" valign="top">
    FINGER: Unexpected Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AUSER%3AROOT.html">FINGER:USER:ROOT</a></b></td>
   <td width="500" valign="top">
    FINGER: User &quot;root&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AUSER%3ASEARCH.html">FINGER:USER:SEARCH</a></b></td>
   <td width="500" valign="top">
    FINGER: User &quot;search&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FINGER%3AUSER%3ASLASH-FILE.html">FINGER:USER:SLASH-FILE</a></b></td>
   <td width="500" valign="top">
    FINGER: / File Query
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="FTP"></a>FTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3ABINARY-DATA-FOLDER.html">FTP:AUDIT:BINARY-DATA-FOLDER</a></b></td>
   <td width="500" valign="top">
    FTP: Binary In Folder Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3ACOMMAND-FAILED.html">FTP:AUDIT:COMMAND-FAILED</a></b></td>
   <td width="500" valign="top">
    FTP: Command Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3ALOGIN-FAILED.html">FTP:AUDIT:LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    FTP: Login Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREP-BINARY-DATA.html">FTP:AUDIT:REP-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    FTP: Binary Data in Reply Control Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREP-INVALID-REPLY.html">FTP:AUDIT:REP-INVALID-REPLY</a></b></td>
   <td width="500" valign="top">
    FTP: Invalid Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREP-NESTED-REPLY.html">FTP:AUDIT:REP-NESTED-REPLY</a></b></td>
   <td width="500" valign="top">
    FTP: Nested Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREQ-BINARY-DATA.html">FTP:AUDIT:REQ-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    FTP: Binary Data in Request Control Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREQ-INVALID-CMD-SEQ.html">FTP:AUDIT:REQ-INVALID-CMD-SEQ</a></b></td>
   <td width="500" valign="top">
    FTP: Invalid Command Sequence
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREQ-NESTED-REQUEST.html">FTP:AUDIT:REQ-NESTED-REQUEST</a></b></td>
   <td width="500" valign="top">
    FTP: Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AAUDIT%3AREQ-UNKNOWN-CMD.html">FTP:AUDIT:REQ-UNKNOWN-CMD</a></b></td>
   <td width="500" valign="top">
    FTP: Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACISCO-VPN-ACCESS.html">FTP:CISCO-VPN-ACCESS</a></b></td>
   <td width="500" valign="top">
    FTP: Cisco VPN File access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3A3CDAEMON-PATH-DISCL.html">FTP:COMMAND:3CDAEMON-PATH-DISCL</a></b></td>
   <td width="500" valign="top">
    FTP: 3CDaemon Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ACTRL-CHAR.html">FTP:COMMAND:CTRL-CHAR</a></b></td>
   <td width="500" valign="top">
    FTP: Telnet Control Characters in FTP Command Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AFTP-FS-COMMAND.html">FTP:COMMAND:FTP-FS-COMMAND</a></b></td>
   <td width="500" valign="top">
    FTP: Format String in Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AGET-CMD-DIR-TRAV.html">FTP:COMMAND:GET-CMD-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple FTP Server GET Command Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AGET-CMD-DIR-TRAV-2.html">FTP:COMMAND:GET-CMD-DIR-TRAV-2</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple FTP Server GET Command Directory Traversal 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AMALICIOUS-CHARS.html">FTP:COMMAND:MALICIOUS-CHARS</a></b></td>
   <td width="500" valign="top">
    FTP: Malicious Characters In FTP Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AMULTIPLE-CMD-DIRTRA.html">FTP:COMMAND:MULTIPLE-CMD-DIRTRA</a></b></td>
   <td width="500" valign="top">
    FTP: FTP Server Multiple Command Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AMULTIPLE-OF.html">FTP:COMMAND:MULTIPLE-OF</a></b></td>
   <td width="500" valign="top">
    FTP:Multiple Vendor Command Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3APLATFTP-CD-DOS.html">FTP:COMMAND:PLATFTP-CD-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Platinum FTP Malformed Pathname
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3APUT-CMD-DIR-TRAV.html">FTP:COMMAND:PUT-CMD-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple FTP Server PUT Command Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASITE-CMD-INJ.html">FTP:COMMAND:SITE-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    FTP: SITE Command Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASITE-EXEC.html">FTP:COMMAND:SITE-EXEC</a></b></td>
   <td width="500" valign="top">
    FTP: Command &quot;site exec&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASLIMFTP-LIST.html">FTP:COMMAND:SLIMFTP-LIST</a></b></td>
   <td width="500" valign="top">
    FTP: SlimFTPd LIST Concatenation Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASTOR-RHOSTS.html">FTP:COMMAND:STOR-RHOSTS</a></b></td>
   <td width="500" valign="top">
    FTP: STOR RHOSTS File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASYMLINK.html">FTP:COMMAND:SYMLINK</a></b></td>
   <td width="500" valign="top">
    FTP: Symbolic Link
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AVICFTPS-DOS.html">FTP:COMMAND:VICFTPS-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: VicFTPS LIST Command Denial of Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AWINFTP-LIST-CMD-BO.html">FTP:COMMAND:WINFTP-LIST-CMD-BO</a></b></td>
   <td width="500" valign="top">
    FTP: Win FTP Server WFTPSRV.exe LIST FTP Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AWS-FTP-REST.html">FTP:COMMAND:WS-FTP-REST</a></b></td>
   <td width="500" valign="top">
    FTP: WS-FTP REST Command Large File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AWS_FTP-CMD-BO.html">FTP:COMMAND:WS_FTP-CMD-BO</a></b></td>
   <td width="500" valign="top">
    FTP: WS_FTP Server Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ACURL-OF-BANNER.html">FTP:CURL-OF-BANNER</a></b></td>
   <td width="500" valign="top">
    FTP: cURL Malicious Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADIRECTORY%3ACISCOFTP-OF.html">FTP:DIRECTORY:CISCOFTP-OF</a></b></td>
   <td width="500" valign="top">
    FTP: Cisco IOS FTP Server Remote Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADIRECTORY%3ADOT-DOT.html">FTP:DIRECTORY:DOT-DOT</a></b></td>
   <td width="500" valign="top">
    FTP: Directory ../..
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADIRECTORY%3ADOT-PCT-20-DOT.html">FTP:DIRECTORY:DOT-PCT-20-DOT</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;.%20&quot; Directory
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADIRECTORY%3AFTP-REQ-DIR-TRAV.html">FTP:DIRECTORY:FTP-REQ-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    FTP: Directory Traversal Detected on FTP Request Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADIRECTORY%3ATILDE-ROOT.html">FTP:DIRECTORY:TILDE-ROOT</a></b></td>
   <td width="500" valign="top">
    FTP: ~root Directory
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AFTPDMIN-LIST-CMD.html">FTP:DOS:FTPDMIN-LIST-CMD</a></b></td>
   <td width="500" valign="top">
    FTP: FTPDMIN List Command Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AGEN-GLOB-DOS.html">FTP:DOS:GEN-GLOB-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Globbing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AGOOGLE-CHROME-DOS.html">FTP:DOS:GOOGLE-CHROME-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Google Chrome FTP 257 Response Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AMACOSX-FTPD.html">FTP:DOS:MACOSX-FTPD</a></b></td>
   <td width="500" valign="top">
    FTP: MacOSX ftpd Remote Resource Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AMS-IIS-WILDCARD.html">FTP:DOS:MS-IIS-WILDCARD</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft IIS FTP Wildcard Characters Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AMUL-FTP-DOS.html">FTP:DOS:MUL-FTP-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple FTP Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3ANULL-CRED.html">FTP:DOS:NULL-CRED</a></b></td>
   <td width="500" valign="top">
    FTP: NULL Credential Denial Of Service Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AVSFTPD-CONNECTION.html">FTP:DOS:VSFTPD-CONNECTION</a></b></td>
   <td width="500" valign="top">
    FTP: VSFTPD Connection Handling DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AVSFTPD-STAT.html">FTP:DOS:VSFTPD-STAT</a></b></td>
   <td width="500" valign="top">
    FTP: vsftpd FTP Server Remote Denial of Service 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ADOS%3AXM-NLST-NEG.html">FTP:DOS:XM-NLST-NEG</a></b></td>
   <td width="500" valign="top">
    FTP: XM Easy Personal FTP Server NLST Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ABOUNCE-ATTACK.html">FTP:EXPLOIT:BOUNCE-ATTACK</a></b></td>
   <td width="500" valign="top">
    FTP: Bounce Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ACA-FTP-LIST-PASV.html">FTP:EXPLOIT:CA-FTP-LIST-PASV</a></b></td>
   <td width="500" valign="top">
    FTP: CA Secure Content Manager FTP Gateway LIST and PASV Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AFTPBIN-WRITEABLE.html">FTP:EXPLOIT:FTPBIN-WRITEABLE</a></b></td>
   <td width="500" valign="top">
    FTP: /Bin Directory Writeable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AGLFTPD-KAKAKA.html">FTP:EXPLOIT:GLFTPD-KAKAKA</a></b></td>
   <td width="500" valign="top">
    FTP: GLftpd Administrator Account Compromise
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AILLEGAL-PORT.html">FTP:EXPLOIT:ILLEGAL-PORT</a></b></td>
   <td width="500" valign="top">
    FTP: Request to Connect to Illegal Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ALEAPFTP-CLI-BO.html">FTP:EXPLOIT:LEAPFTP-CLI-BO</a></b></td>
   <td width="500" valign="top">
    FTP: LeapWare LeapFTP PASV Reply Client Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AMOD-INCLUDE-BOF.html">FTP:EXPLOIT:MOD-INCLUDE-BOF</a></b></td>
   <td width="500" valign="top">
    FTP: Apache mod_include SSL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AOPENFTPD-MSG-FS.html">FTP:EXPLOIT:OPENFTPD-MSG-FS</a></b></td>
   <td width="500" valign="top">
    FTP: OpenFTPD SITE MSG Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ASYNTAX-ERROR.html">FTP:EXPLOIT:SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    FTP: Invalid Syntax
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ATYPSOFT-DOS.html">FTP:EXPLOIT:TYPSOFT-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: TypSoft FTP Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AVERMILLION-PORT-OF.html">FTP:EXPLOIT:VERMILLION-PORT-OF</a></b></td>
   <td width="500" valign="top">
    FTP: Vermillion FTPD PORT Command Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AWIN32-WFTPD-BOF.html">FTP:EXPLOIT:WIN32-WFTPD-BOF</a></b></td>
   <td width="500" valign="top">
    FTP: WFTPD Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AWSFTP-FMT-STR.html">FTP:EXPLOIT:WSFTP-FMT-STR</a></b></td>
   <td width="500" valign="top">
    FTP: Ipswitch WS_FTP Client Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3AZYXEL-CONF-GET.html">FTP:EXPLOIT:ZYXEL-CONF-GET</a></b></td>
   <td width="500" valign="top">
    FTP: Zyxel Configuration File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXT%3ADOT-EXEC.html">FTP:EXT:DOT-EXEC</a></b></td>
   <td width="500" valign="top">
    FTP: Executable Extension File Transfer Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AEXT%3ADOT-PDF.html">FTP:EXT:DOT-PDF</a></b></td>
   <td width="500" valign="top">
    FTP: Adobe Portable Document File (PDF) Extension File Transfer Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFILE%3AFREEFLOAT-AUTH-BYPASS.html">FTP:FILE:FREEFLOAT-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    FTP: FreeFloat FTP Server Authorization Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFILE%3ARETR.html">FTP:FILE:RETR</a></b></td>
   <td width="500" valign="top">
    FTP: File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFILE%3ASPACE.ASP.html">FTP:FILE:SPACE.ASP</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;space.asp&quot; Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFILE%3ASTOR.html">FTP:FILE:STOR</a></b></td>
   <td width="500" valign="top">
    FTP: File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFORMAT-STRING-IN-CMD.html">FTP:FORMAT-STRING-IN-CMD</a></b></td>
   <td width="500" valign="top">
    FTP: Format String in FTP Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AFREEFLOAT-CMD-BO.html">FTP:FREEFLOAT-CMD-BO</a></b></td>
   <td width="500" valign="top">
    FTP: FreeFloat FTP Server Invalid Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ALUKEMFTP%3AURG-RELOGIN.html">FTP:LUKEMFTP:URG-RELOGIN</a></b></td>
   <td width="500" valign="top">
    FTP: Lukemftp URG Relogin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AMS-FTP%3AIIS-BOF.html">FTP:MS-FTP:IIS-BOF</a></b></td>
   <td width="500" valign="top">
    FTP: IIS Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AMS-FTP%3AIIS7-5-DOS.html">FTP:MS-FTP:IIS7-5-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft IIS 7.5 Unauthenticated Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AMS-FTP%3AMSFTPSVC-DOS.html">FTP:MS-FTP:MSFTPSVC-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft IIS FTP Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AMS-FTP%3AMSFTPSVC-EXEC.html">FTP:MS-FTP:MSFTPSVC-EXEC</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft IIS FTP Server Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AMS-FTP%3ASTAT-GLOB.html">FTP:MS-FTP:STAT-GLOB</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft FTP Service STAT Globbing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AASCII-WRITE.html">FTP:OVERFLOW:ASCII-WRITE</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTP ASCII Off By Two Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ACMD-NOOP-SLED.html">FTP:OVERFLOW:CMD-NOOP-SLED</a></b></td>
   <td width="500" valign="top">
    FTP: Command NOOP Sled Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ACMD-OF.html">FTP:OVERFLOW:CMD-OF</a></b></td>
   <td width="500" valign="top">
    FTP: Command Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AEASY-FTP-OF.html">FTP:OVERFLOW:EASY-FTP-OF</a></b></td>
   <td width="500" valign="top">
    FTP: Easy FTP Server Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AFREE-FTPD-PASS.html">FTP:OVERFLOW:FREE-FTPD-PASS</a></b></td>
   <td width="500" valign="top">
    FTP: freeFTPd PASS Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AFREEFLOAT-MULTICMD.html">FTP:OVERFLOW:FREEFLOAT-MULTICMD</a></b></td>
   <td width="500" valign="top">
    FTP: Freefloat FTP Server Multiple Commands Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AGUILDFTP-HEAP.html">FTP:OVERFLOW:GUILDFTP-HEAP</a></b></td>
   <td width="500" valign="top">
    FTP: Guild FTPD Heap Corruption Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AK4FTP-OF1.html">FTP:OVERFLOW:K4FTP-OF1</a></b></td>
   <td width="500" valign="top">
    FTP: Kerberos 4 FTP Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ALINE-TOO-LONG.html">FTP:OVERFLOW:LINE-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    FTP: Line Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AMS-IE-FTP-RES-MC.html">FTP:OVERFLOW:MS-IE-FTP-RES-MC</a></b></td>
   <td width="500" valign="top">
    FTP: Microsoft Internet Explorer FTP Response Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AMUL-FTP-MKDOF.html">FTP:OVERFLOW:MUL-FTP-MKDOF</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple Vendor FTP MKD Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AOPENBSD-FTPD-GLOB.html">FTP:OVERFLOW:OPENBSD-FTPD-GLOB</a></b></td>
   <td width="500" valign="top">
    FTP: OpenBSD FTP Daemon glob() Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APASS-TOO-LONG.html">FTP:OVERFLOW:PASS-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    FTP: Password Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APATH-LINUX-X86-3.html">FTP:OVERFLOW:PATH-LINUX-X86-3</a></b></td>
   <td width="500" valign="top">
    FTP: Linux x86 Long Pathname Buffer Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APATH-TOO-LONG.html">FTP:OVERFLOW:PATH-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    FTP: Pathname Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APCMAN-STOR-BOF.html">FTP:OVERFLOW:PCMAN-STOR-BOF</a></b></td>
   <td width="500" valign="top">
    FTP: PCMan&#39;s FTP Server STOR Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AREST-INT-OF.html">FTP:OVERFLOW:REST-INT-OF</a></b></td>
   <td width="500" valign="top">
    FTP: REST Command Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AS2C-PATH-OF.html">FTP:OVERFLOW:S2C-PATH-OF</a></b></td>
   <td width="500" valign="top">
    FTP: FlashGet FTP PWD Command Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ASAMI-LIST-CMND-BO.html">FTP:OVERFLOW:SAMI-LIST-CMND-BO</a></b></td>
   <td width="500" valign="top">
    FTP: Sami FTP Server LIST Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ASITESTRING-2-LONG.html">FTP:OVERFLOW:SITESTRING-2-LONG</a></b></td>
   <td width="500" valign="top">
    FTP: Sitestring Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ATYPSOFT-SERVER.html">FTP:OVERFLOW:TYPSOFT-SERVER</a></b></td>
   <td width="500" valign="top">
    FTP: TYPSoft FTP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AUPLUS-MULTI-CMDS.html">FTP:OVERFLOW:UPLUS-MULTI-CMDS</a></b></td>
   <td width="500" valign="top">
    FTP: UplusFtp Server Multiple Commands Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AUSERNAME-2-LONG.html">FTP:OVERFLOW:USERNAME-2-LONG</a></b></td>
   <td width="500" valign="top">
    FTP: Username Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AWFTPD-MKD-OVERFLOW.html">FTP:OVERFLOW:WFTPD-MKD-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    FTP: WFTPD &#39;MKD&#39; Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AWFTPD-SIZE.html">FTP:OVERFLOW:WFTPD-SIZE</a></b></td>
   <td width="500" valign="top">
    FTP: SIZE Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AWINFTP-DATA-OF.html">FTP:OVERFLOW:WINFTP-DATA-OF</a></b></td>
   <td width="500" valign="top">
    FTP: WinFtp Server Data Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AWUBSD-SE-RACE.html">FTP:OVERFLOW:WUBSD-SE-RACE</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD and BSDi-ftpd SITE EXEC Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AXLINK-CLIENT.html">FTP:OVERFLOW:XLINK-CLIENT</a></b></td>
   <td width="500" valign="top">
    FTP: Xlink FTP Client Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APABLO-FTP%3AFORMAT-STRING.html">FTP:PABLO-FTP:FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    FTP: Pablo FTP Server Format String DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3ABRUTE-FORCE.html">FTP:PASSWORD:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    FTP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3ACOMMON-PASSWD.html">FTP:PASSWORD:COMMON-PASSWD</a></b></td>
   <td width="500" valign="top">
    FTP: Common Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3ADEFAULT-USERNM-PW.html">FTP:PASSWORD:DEFAULT-USERNM-PW</a></b></td>
   <td width="500" valign="top">
    FTP: Default Username and Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3AFTPPASS-BLUESKIES.html">FTP:PASSWORD:FTPPASS-BLUESKIES</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;blueskies&quot; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3AH0TB0X.html">FTP:PASSWORD:H0TB0X</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;h0tb0x&quot; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3ALRKR0X.html">FTP:PASSWORD:LRKR0X</a></b></td>
   <td width="500" valign="top">
    FTP: &#39;lrkr0x&#39; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3APLUS.html">FTP:PASSWORD:PLUS</a></b></td>
   <td width="500" valign="top">
    FTP: &#39;+&#39; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3AROOT.html">FTP:PASSWORD:ROOT</a></b></td>
   <td width="500" valign="top">
    FTP: &#39;root&#39; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3ASATORI.html">FTP:PASSWORD:SATORI</a></b></td>
   <td width="500" valign="top">
    FTP: &#39;satori&#39; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3AUSER-DICT.html">FTP:PASSWORD:USER-DICT</a></b></td>
   <td width="500" valign="top">
    FTP: User Name Dictionary Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APASSWORD%3AWH00T.html">FTP:PASSWORD:WH00T</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;wh00t&quot; Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APHP-FILE-UPLOAD.html">FTP:PHP-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    FTP: PHP File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3AMOD-SQL-HEAP-OF.html">FTP:PROFTP:MOD-SQL-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTP mod_sql Remote Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3AOFF-BY-ONE.html">FTP:PROFTP:OFF-BY-ONE</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD MKD Off-By-One
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3AOVERFLOW1.html">FTP:PROFTP:OVERFLOW1</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD-1.2.0 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3APPC-FS2.html">FTP:PROFTP:PPC-FS2</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD (Linux PPC) User Command Vulnerability (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3APROFTP-FS-MKDIR.html">FTP:PROFTP:PROFTP-FS-MKDIR</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPd Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3AREMOTE-FILE-COPY.html">FTP:PROFTP:REMOTE-FILE-COPY</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD SITE CPFR And CPTO Commands Unauthenticated Remote File Copying 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3ASIZE-DOS2.html">FTP:PROFTP:SIZE-DOS2</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD Size DoS (Detected by Pathname)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3APROFTP%3AUSER-DOS.html">FTP:PROFTP:USER-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD USER DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AREQERR%3AGNULS-WIDTH-DOS.html">FTP:REQERR:GNULS-WIDTH-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: GNU ls Oversize Width Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AREQERR%3AREQ-MISSING-ARGS.html">FTP:REQERR:REQ-MISSING-ARGS</a></b></td>
   <td width="500" valign="top">
    FTP: Missing Arguments in Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AREQERR%3AREQ-TOO-MANY-ARGS.html">FTP:REQERR:REQ-TOO-MANY-ARGS</a></b></td>
   <td width="500" valign="top">
    FTP: Too Many Arguments in Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ARPLERR%3ACUTEFTP-OF.html">FTP:RPLERR:CUTEFTP-OF</a></b></td>
   <td width="500" valign="top">
    FTP: CuteFTP Response Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASERVU%3ACHMOD-OVERFLOW.html">FTP:SERVU:CHMOD-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    FTP: ServU CHMOD Filename Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASERVU%3ALIST-OVERFLOW.html">FTP:SERVU:LIST-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    FTP: Serv-U LIST -l Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASERVU%3AMDTM-OVERFLOW.html">FTP:SERVU:MDTM-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    FTP: Serv-U MDTM TimeZone Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASERVU%3ARNTO-TRAV.html">FTP:SERVU:RNTO-TRAV</a></b></td>
   <td width="500" valign="top">
    FTP: Rhino Software Serv-U FTP Server rnto Command Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASERVU%3ASTOU-DOS.html">FTP:SERVU:STOU-DOS</a></b></td>
   <td width="500" valign="top">
    FTP: Serv-U &#39;STOU&#39; Command Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASHELLSHOCK.html">FTP:SHELLSHOCK</a></b></td>
   <td width="500" valign="top">
    FTP: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ASYMLINKS-WGET-INPT-VALID.html">FTP:SYMLINKS-WGET-INPT-VALID</a></b></td>
   <td width="500" valign="top">
    FTP: GNU wget FTP Remote File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3ATRIPWIRE-FORMAT-STRING.html">FTP:TRIPWIRE-FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    FTP: Tripwire Email Reporting Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AACFTP-BAD-LOGIN.html">FTP:USER:ACFTP-BAD-LOGIN</a></b></td>
   <td width="500" valign="top">
    FTP: acFTP Invalid Login Issue
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AANONYMOUS.html">FTP:USER:ANONYMOUS</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;anonymous&quot; or &quot;ftp&quot; User
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AFORMAT-STRING.html">FTP:USER:FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    FTP: Username Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AFREEBSD-OFF-BY-ONE-MC.html">FTP:USER:FREEBSD-OFF-BY-ONE-MC</a></b></td>
   <td width="500" valign="top">
    FTP: FreeBSD 8.0 Off By One Heap Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AIRIX-DEF-ACCT.html">FTP:USER:IRIX-DEF-ACCT</a></b></td>
   <td width="500" valign="top">
    FTP: IRIX Default Account Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AUSER%3AROOT.html">FTP:USER:ROOT</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;root&quot; Account Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVSFTPD-BACKDOOR.html">FTP:VSFTPD-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    FTP: VSFTPd Backdoor Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3ASERV-U-FTP-2-6.html">FTP:VULN:SERV-U-FTP-2-6</a></b></td>
   <td width="500" valign="top">
    FTP: Vulnerable Serv-U FTP version (&lt; 2.6)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3ASERV-U-FTP-4-2.html">FTP:VULN:SERV-U-FTP-4-2</a></b></td>
   <td width="500" valign="top">
    FTP: Vulnerable Serv-U FTP version (&lt; 4.2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3ASERV-U-FTP-5-0-0-6.html">FTP:VULN:SERV-U-FTP-5-0-0-6</a></b></td>
   <td width="500" valign="top">
    FTP: Vulnerable Serv-U FTP Version (&lt; 5.0.0.6)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3ASERVU-FTP-BO.html">FTP:VULN:SERVU-FTP-BO</a></b></td>
   <td width="500" valign="top">
    FTP: ServU Timezone MDTM Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3AWS-FTP-4-0-2.html">FTP:VULN:WS-FTP-4-0-2</a></b></td>
   <td width="500" valign="top">
    FTP: Vulnerable Ipswitch WS_FTP Version (&lt; 4.0.3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AVULN%3AWS-FTP-5-0-4.html">FTP:VULN:WS-FTP-5-0-4</a></b></td>
   <td width="500" valign="top">
    FTP: Vulnerable Ipswitch WS_FTP Version (&lt; 5.0.4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWS-FTP%3ACPWD.html">FTP:WS-FTP:CPWD</a></b></td>
   <td width="500" valign="top">
    FTP: WS FTP Server &quot;SITE CPWD&quot; Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWS-FTP%3AWS-FTP-COMM-OF.html">FTP:WS-FTP:WS-FTP-COMM-OF</a></b></td>
   <td width="500" valign="top">
    FTP: Ipswitch WS_FTP Server FTP Commands Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3AFTPD-BSD-X86.html">FTP:WU-FTP:FTPD-BSD-X86</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD BSD x86 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3AGLOBARG.html">FTP:WU-FTP:GLOBARG</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD ftpglob() Input Validation Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3AIREPLY-FS.html">FTP:WU-FTP:IREPLY-FS</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD Ireply() Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3ALINUX-OF.html">FTP:WU-FTP:LINUX-OF</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD Linux x86 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3AOFFBYONE-BOF.html">FTP:WU-FTP:OFFBYONE-BOF</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD Off-by-One Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3ASETPROCTITLE.html">FTP:WU-FTP:SETPROCTITLE</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD Setproctitle() Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3ASITE-OF.html">FTP:WU-FTP:SITE-OF</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD 2.6.2 SITE EXEC Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="FTP%3AWU-FTP%3AWUFTPD-FMT-STR.html">FTP:WU-FTP:WUFTPD-FMT-STR</a></b></td>
   <td width="500" valign="top">
    FTP: WU-FTPD Format String
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="GOPHER"></a>GOPHER</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AIE-GOPHER-OF.html">GOPHER:IE-GOPHER-OF</a></b></td>
   <td width="500" valign="top">
    GOPHER: Internet Explorer Gopher Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AINVALID%3ADOC-TYPE.html">GOPHER:INVALID:DOC-TYPE</a></b></td>
   <td width="500" valign="top">
    GOPHER: Invalid Doc Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AINVALID%3AEOL.html">GOPHER:INVALID:EOL</a></b></td>
   <td width="500" valign="top">
    GOPHER: Invalid EOL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AINVALID%3ANST-REQ.html">GOPHER:INVALID:NST-REQ</a></b></td>
   <td width="500" valign="top">
    GOPHER: Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AINVALID%3APORT.html">GOPHER:INVALID:PORT</a></b></td>
   <td width="500" valign="top">
    GOPHER: Invalid Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AINVALID%3ATRUNC-LINE.html">GOPHER:INVALID:TRUNC-LINE</a></b></td>
   <td width="500" valign="top">
    GOPHER: Truncated Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AOVERFLOW%3ADISPLAY.html">GOPHER:OVERFLOW:DISPLAY</a></b></td>
   <td width="500" valign="top">
    GOPHER: Display Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AOVERFLOW%3AHOST.html">GOPHER:OVERFLOW:HOST</a></b></td>
   <td width="500" valign="top">
    GOPHER: Host Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AOVERFLOW%3ALINE.html">GOPHER:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    GOPHER: Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="GOPHER%3AOVERFLOW%3ASELECTOR.html">GOPHER:OVERFLOW:SELECTOR</a></b></td>
   <td width="500" valign="top">
    GOPHER: Selector Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="HTTP"></a>HTTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3A3COM%3A3COM-PASS-LEAK.html">HTTP:3COM:3COM-PASS-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: 3COM 3CRADSL72 Wireless Router Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3A3COM%3AADMIN-LOGOUT.html">HTTP:3COM:ADMIN-LOGOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: 3Com 3crwe754g72-a Administrator Logout
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3A3COM%3ACONF-DOWNLOAD.html">HTTP:3COM:CONF-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: 3Com 3crwe754g72-a Configuration File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3A3COM%3ALOG-CLEAN.html">HTTP:3COM:LOG-CLEAN</a></b></td>
   <td width="500" valign="top">
    HTTP: 3Com 3crwe754g72-a Unauthorized Log Clearance
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3A3COM%3AOFFICECONNECT.html">HTTP:3COM:OFFICECONNECT</a></b></td>
   <td width="500" valign="top">
    HTTP: OfficeConnect Wireless Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AACMS-ASSETS-INFODISC.html">HTTP:ACMS-ASSETS-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: aCMS Assets Page Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AACMS-ASSETS-INFODISC1.html">HTTP:ACMS-ASSETS-INFODISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: aCMS Assets Page Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-FLASH-PLAYER-BO.html">HTTP:ADOBE-FLASH-PLAYER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-FLASHPLYR-PRIV-ESC.html">HTTP:ADOBE-FLASHPLYR-PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-FLASHPLYR-PRIV-ESC1.html">HTTP:ADOBE-FLASHPLYR-PRIV-ESC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Privilege Escalation1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-INDESIGN-SOAP-RCE.html">HTTP:ADOBE-INDESIGN-SOAP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe IndesignServer SOAP Server Arbitrary Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-INDESIGN-SOAP-RCE1.html">HTTP:ADOBE-INDESIGN-SOAP-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe IndesignServer SOAP Server Arbitrary Script Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-ROBOHELP-FILE-UPLOA1.html">HTTP:ADOBE-ROBOHELP-FILE-UPLOA1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AADOBE-ROBOHELP-FILE-UPLOAD.html">HTTP:ADOBE-ROBOHELP-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAGORA%3AAUTH.html">HTTP:AGORA:AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Agora auth.txt Cross-Site Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAGORA%3ADBACCESS.html">HTTP:AGORA:DBACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Agora dbaccess.txt Cross-Site Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAGORA%3APOSTGRES65.html">HTTP:AGORA:POSTGRES65</a></b></td>
   <td width="500" valign="top">
    HTTP: Agora postgres65.txt Cross-Site Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AALLATORI-JAVA-OBFUSCATOR.html">HTTP:ALLATORI-JAVA-OBFUSCATOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Allatori Obfuscated Java .jar File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AALTN-SG-OF.html">HTTP:ALTN-SG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Alt-N Security Gateway Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AALTNWADMIN.html">HTTP:ALTNWADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Alt-N WebAdmin USER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AALTNWADMIN11.html">HTTP:ALTNWADMIN11</a></b></td>
   <td width="500" valign="top">
    HTTP: Alt-N WebAdmin USER Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AANGLER-EK-LP.html">HTTP:ANGLER-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Base64
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AANGLER-EK-LP1.html">HTTP:ANGLER-EK-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AANGLER-EK-RD.html">HTTP:ANGLER-EK-RD</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPACHE-CHUNKREQ-DOS.html">HTTP:APACHE:APACHE-CHUNKREQ-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Malformed Chunk Request Handling Remote Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPACHE-NIO-DOS.html">HTTP:APACHE:APACHE-NIO-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat NIO Connector Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPR-DOS.html">HTTP:APACHE:APR-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache APR apr_fnmatch Stack Overflow Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPR-PSPRINTF-MC.html">HTTP:APACHE:APR-PSPRINTF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache APR_PSPrintf Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPR-UTIL-LIB-DOS.html">HTTP:APACHE:APR-UTIL-LIB-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache apr-util IPv6 URI Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAXIS-SOAP-DOS.html">HTTP:APACHE:AXIS-SOAP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Axis Multiple Vendor SOAP Arrays Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ABYTE-RANGE-LEAK.html">HTTP:APACHE:BYTE-RANGE-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Range Byte Header Memory Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ACAMEL-XSLT-JCE.html">HTTP:APACHE:CAMEL-XSLT-JCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Camel XSLT Component Java Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ACOUCHDB-UUID-DOS.html">HTTP:APACHE:COUCHDB-UUID-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache CouchDB CVE-2014-2668 UUID Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ADAV-SVN-HEAP-OVRFLW.html">HTTP:APACHE:DAV-SVN-HEAP-OVRFLW</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Subversion mod_dav_svn Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AENCODED-DIRTRAV.html">HTTP:APACHE:ENCODED-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache For Windows Encoded Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AFILEUPLOAD-CNT-TYPE.html">HTTP:APACHE:FILEUPLOAD-CNT-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat FileUpload Content-Type Header Infinite Loop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AFILTER-DISPATCHER.html">HTTP:APACHE:FILTER-DISPATCHER</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts FilterDispatcher and DefaultStaticContentLoader Classes Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTGREP-HDR.html">HTTP:APACHE:HTGREP-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache htgrep Header Information Leakage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTTP-SERVER-MOD-DOS.html">HTTP:APACHE:HTTP-SERVER-MOD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_deflate and mod_proxy Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTTPD-ERROR-400.html">HTTP:APACHE:HTTPD-ERROR-400</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTPD Error Code 400 httpOnly Cookie Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTTPD-MODLOG-COOKIE.html">HTTP:APACHE:HTTPD-MODLOG-COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTPD mod_log_config Cookie Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AINV-HEADER-DOS.html">HTTP:APACHE:INV-HEADER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Invalid Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ALDAPFS.html">HTTP:APACHE:LDAPFS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache auth_ldap Username Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ALONG-HEADER-DOS.html">HTTP:APACHE:LONG-HEADER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Overly Long Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-CACHE-DOS.html">HTTP:APACHE:MOD-CACHE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server Mod_Cache Caching Forward Proxy Configuration NULL Pointer Dereference Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-CACHE-DOS-CLT.html">HTTP:APACHE:MOD-CACHE-DOS-CLT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache mod_cache Denial of Service (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-CACHE-DOS-STC.html">HTTP:APACHE:MOD-CACHE-DOS-STC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache mod_cache Denial of Service (STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-DAV-MERGE-DOS.html">HTTP:APACHE:MOD-DAV-MERGE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_dav MERGE Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-ISAPI-RCE.html">HTTP:APACHE:MOD-ISAPI-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-ISAPI-RCE1.html">HTTP:APACHE:MOD-ISAPI-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-LOG-CONFIG-DOS.html">HTTP:APACHE:MOD-LOG-CONFIG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_log_config Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-NTLM-BOF1.html">HTTP:APACHE:MOD-NTLM-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache mod_ntlm Authorization Buffer Overflow 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-PROXY-SECBYPASS.html">HTTP:APACHE:MOD-PROXY-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTPD mod_proxy Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-REWRITE-CMD-EXE.html">HTTP:APACHE:MOD-REWRITE-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_rewrite RewriteLog Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-TCL-FS.html">HTTP:APACHE:MOD-TCL-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_tcl Module Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMODPHP-UPLOAD-HOF.html">HTTP:APACHE:MODPHP-UPLOAD-HOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache mod_php php_mime_split Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMODPROXY-AJP-DOS.html">HTTP:APACHE:MODPROXY-AJP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTPD mod_proxy_ajp Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMODRPAF-XFWD-DOS.html">HTTP:APACHE:MODRPAF-XFWD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_rpaf x-forwarded-for Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMYFACES-DIR-TRAV.html">HTTP:APACHE:MYFACES-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache MyFaces Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ANOSEJOB.html">HTTP:APACHE:NOSEJOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache-nosejob.c Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3APHP-DOS.html">HTTP:APACHE:PHP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Multipart Form-Data Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ARANGE-DOS.html">HTTP:APACHE:RANGE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Header Range Memory Exhaustion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ARESIN-WEB-INF.html">HTTP:APACHE:RESIN-WEB-INF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache/Resin WEB-INF Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AREV-PROXY-EXPLOIT.html">HTTP:APACHE:REV-PROXY-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server Reverse Proxy/Rewrite URL Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AREWRITE-OF.html">HTTP:APACHE:REWRITE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache mod_rewrite Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AROLLER-OGNL-RCE.html">HTTP:APACHE:ROLLER-OGNL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Roller OGNL Injection Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ARPC-RAVE-INFO-DISC.html">HTTP:APACHE:RPC-RAVE-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Rave User RPC API Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASCALP.html">HTTP:APACHE:SCALP</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache-scalp.c Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASERVER-MOD-STATS-BO.html">HTTP:APACHE:SERVER-MOD-STATS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Server Mod Status Race Condition Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASERVER-MODPROXY-DOS.html">HTTP:APACHE:SERVER-MODPROXY-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_proxy Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASERVER-STATUS-PROBE.html">HTTP:APACHE:SERVER-STATUS-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache server-status Page Probe Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASOLR-FILE-DISC.html">HTTP:APACHE:SOLR-FILE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Solr SolrResourceLoader Arbitrary File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-CI-SECBYPASS.html">HTTP:APACHE:STRUTS-CI-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts CookieInterceptor Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-INCLUDPARAMS.html">HTTP:APACHE:STRUTS-INCLUDPARAMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts includeParams Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-OGNL-CE.html">HTTP:APACHE:STRUTS-OGNL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts Wildcard Matching OGNL Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-OGNL-CMDEXEC.html">HTTP:APACHE:STRUTS-OGNL-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts OGNL Expression Parsing Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-RCE.html">HTTP:APACHE:STRUTS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-SECBYPASS.html">HTTP:APACHE:STRUTS-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts Improper classLoader Parameter Handling Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-SKILLNAME-CE.html">HTTP:APACHE:STRUTS-SKILLNAME-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts2 skillName Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-URI-CMDEXEC.html">HTTP:APACHE:STRUTS-URI-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Multiple URI Parameters Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-URIREDIRECT.html">HTTP:APACHE:STRUTS-URIREDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Multiple URI Parameters Arbitrary Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-COOKIE-OGNL.html">HTTP:APACHE:STRUTS2-COOKIE-OGNL</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 CookieInterceptor OGNL Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-OGNL-CE.html">HTTP:APACHE:STRUTS2-OGNL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 ParametersInterceptor OGNL Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-OGNL-INJ.html">HTTP:APACHE:STRUTS2-OGNL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 ConversionErrorInterceptor OGNL Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-PI-RCE.html">HTTP:APACHE:STRUTS2-PI-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts2 ParametersInterceptor Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AUSER-ENUM.html">HTTP:APACHE:USER-ENUM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache User Account Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AWEBDAV-PROPFIND.html">HTTP:APACHE:WEBDAV-PROPFIND</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache WebDav PROPFIND Directory Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AWILDCARD-CMD-EXEC.html">HTTP:APACHE:WILDCARD-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts Wildcard Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AWIN32BATCH.html">HTTP:APACHE:WIN32BATCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Win32 Batch File Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AWWWPASSWD-FILE-DISC.html">HTTP:APACHE:WWWPASSWD-FILE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache .wwwpasswd File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AXSPACE.html">HTTP:APACHE:XSPACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache 2.0 Multi-Space Header DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPPLE-QT-TTD-BO.html">HTTP:APPLE-QT-TTD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Quicktime Text Track Descriptors Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPPLE-SAFARI-BYPASS.html">HTTP:APPLE-SAFARI-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari URL Handling Cross-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPPLE-SGI-BOF.html">HTTP:APPLE-SGI-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple CUPS SGI Image Format Decoding imagetops Filter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAPPLE-SGI-BOF1.html">HTTP:APPLE-SGI-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple CUPS SGI Image Format Decoding imagetops Filter Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AASC-TIMETABLES-SUBJECT-BOF.html">HTTP:ASC-TIMETABLES-SUBJECT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: aSc Timetables Add Subject String Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AATLASIAN-JIRA-DIR-TRAVER.html">HTTP:ATLASIAN-JIRA-DIR-TRAVER</a></b></td>
   <td width="500" valign="top">
    HTTP: Atlassian JIRA Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AACMS-FLV-URLSPOOF.html">HTTP:AUDIT:ACMS-FLV-URLSPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: aCMS FLV Player SWF File Access URL Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ABINARY-IN-URLENCODE.html">HTTP:AUDIT:BINARY-IN-URLENCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Non-Encoded Binary Detected In URLEncode Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ACHUNKED-TRANSFER.html">HTTP:AUDIT:CHUNKED-TRANSFER</a></b></td>
   <td width="500" valign="top">
    HTTP: Chunked Transfer Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AFW1-SCHEME-OF.html">HTTP:AUDIT:FW1-SCHEME-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: CheckPoint AI/SD Scheme Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AGENERIC-FMT-STR.html">HTTP:AUDIT:GENERIC-FMT-STR</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Format String in Url
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AHTTP-1.0-HOST-HEADER.html">HTTP:AUDIT:HTTP-1.0-HOST-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTP Version 1.0 with Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AHTTP-VER-1.0.html">HTTP:AUDIT:HTTP-VER-1.0</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTP Version 1.0 Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AINV-HTTP-VER.html">HTTP:AUDIT:INV-HTTP-VER</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid HTTP Version (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-1024.html">HTTP:AUDIT:LENGTH-OVER-1024</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 1024 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-2048.html">HTTP:AUDIT:LENGTH-OVER-2048</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 2048 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-256.html">HTTP:AUDIT:LENGTH-OVER-256</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 256 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-4096.html">HTTP:AUDIT:LENGTH-OVER-4096</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 4096 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-512.html">HTTP:AUDIT:LENGTH-OVER-512</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 512 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ALENGTH-OVER-8192.html">HTTP:AUDIT:LENGTH-OVER-8192</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Length Over 8192 Bytes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ANULL-HREF.html">HTTP:AUDIT:NULL-HREF</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Null HREF Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3APDF-SCIIHEXDECODE.html">HTTP:AUDIT:PDF-SCIIHEXDECODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF SCIIHexDecode Evasion Method Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3APDF-SCIIHEXDECODE1.html">HTTP:AUDIT:PDF-SCIIHEXDECODE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF SCIIHexDecode Evasion Method Detection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AREQ-LONG-UTF8CODE.html">HTTP:AUDIT:REQ-LONG-UTF8CODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Too Long UTF8 Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AROBOTS.TXT.html">HTTP:AUDIT:ROBOTS.TXT</a></b></td>
   <td width="500" valign="top">
    HTTP: Robots.txt Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3ATOO-MANY-HEADERS.html">HTTP:AUDIT:TOO-MANY-HEADERS</a></b></td>
   <td width="500" valign="top">
    HTTP: Too Many Headers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AUNKNOWN-VERB.html">HTTP:AUDIT:UNKNOWN-VERB</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Request Verb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AUNWISE-CHAR.html">HTTP:AUDIT:UNWISE-CHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Unwise Characters in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUDIT%3AURL.html">HTTP:AUDIT:URL</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Access Information
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAUTOCAD-FAS-FILE-EXEC.html">HTTP:AUTOCAD-FAS-FILE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Autodesk AutoCAD Insecure FAS File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAVIRA-SECURE-BCKUP-REG-BO1.html">HTTP:AVIRA-SECURE-BCKUP-REG-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Avira Secure Backup Registry Value Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AAVIRA-SECURE-BCKUP-REG-BOF.html">HTTP:AVIRA-SECURE-BCKUP-REG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Avira Secure Backup Registry Value Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABACKDOOR-UPATRE-UA.html">HTTP:BACKDOOR-UPATRE-UA</a></b></td>
   <td width="500" valign="top">
    Suspicious Backdoor Upatre User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABADBLUE%3AINVALID-GET-DOS.html">HTTP:BADBLUE:INVALID-GET-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: BadBlue Invalid GET Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABADBLUE%3AMFC-ISAPI-CMD-OF.html">HTTP:BADBLUE:MFC-ISAPI-CMD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: BadBlue MFC ISAPI Command Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABADBLUE%3APROXY-RELAY.html">HTTP:BADBLUE:PROXY-RELAY</a></b></td>
   <td width="500" valign="top">
    HTTP: BadBlue Proxy Relay
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABARRACUDA%3APREV-EXEC.html">HTTP:BARRACUDA:PREV-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Barracuda Spam Filter Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABH-COOL-EK-LAND-PG.html">HTTP:BH-COOL-EK-LAND-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackholev2 Cool Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABH-COOL-EK-LANDPG.html">HTTP:BH-COOL-EK-LANDPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackholev2 Cool Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABH-DLEECH-EK-LANDPG.html">HTTP:BH-DLEECH-EK-LANDPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackholev2/Darkleech Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABH2-EK-URL-STRUCT.html">HTTP:BH2-EK-URL-STRUCT</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackholev2 Exploit Kit URL Structure Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABIGBROTHER%3AINFO-DISCLOSURE.html">HTTP:BIGBROTHER:INFO-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: BigBrother Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLEEDINGLIFE-EK.html">HTTP:BLEEDINGLIFE-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life ExploitKkit Outbound Jar Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLEEDINGLIFE-EK-FLASH.html">HTTP:BLEEDINGLIFE-EK-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Outbound Adobe Flash Exploit Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLEEDINGLIFE-EK-OB.html">HTTP:BLEEDINGLIFE-EK-OB</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLEEDINGLIFE-EK-OB1.html">HTTP:BLEEDINGLIFE-EK-OB1</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Outbound Connection 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLIFE-EK-MODCALL.html">HTTP:BLIFE-EK-MODCALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLIFE-EK-MODCALL1.html">HTTP:BLIFE-EK-MODCALL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLIFE-EK-MODCALL3.html">HTTP:BLIFE-EK-MODCALL3</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABLIFE-MODCALL-4.html">HTTP:BLIFE-MODCALL-4</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER-WINDOW-INJECTION.html">HTTP:BROWSER-WINDOW-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Browsers Window Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER-WINDOW-INJECTION1.html">HTTP:BROWSER-WINDOW-INJECTION1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Browsers Window Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3ACHROME-JS-ENG-MC.html">HTTP:BROWSER:CHROME-JS-ENG-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome V8 JavaScript Engine Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3AFIREFOX-DATA-URI.html">HTTP:BROWSER:FIREFOX-DATA-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox DATA URI File Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3AICQ.html">HTTP:BROWSER:ICQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Browser Detection - ICQ
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3AMOZILLA-DBKEYRANGE.html">HTTP:BROWSER:MOZILLA-DBKEYRANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products IDBKeyRange Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3APOLICY-BYPASS.html">HTTP:BROWSER:POLICY-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome XSSAuditor Filter Security Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ABROWSER%3AURI-OBFUSCATION.html">HTTP:BROWSER:URI-OBFUSCATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser URI Display Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AC99-SHELL-BACKDOOR.html">HTTP:C99-SHELL-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: C99 Backdoor Actiivity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AC99-SHELL-BACKDOOR1.html">HTTP:C99-SHELL-BACKDOOR1</a></b></td>
   <td width="500" valign="top">
    TROJAN: C99 Backdoor Actiivity1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACA-XOSOFT-XOSOAP.html">HTTP:CA-XOSOFT-XOSOAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Computer Associates XOsoft xosoapapi.asmx Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACARBERP-BACKDOOR-RCE.html">HTTP:CARBERP-BACKDOOR-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Carberp Backdoor Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AALLAIRE-SHELL-ATTEMPT.html">HTTP:CGI:ALLAIRE-SHELL-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Allaire Pro Web Shell Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AALTAVISTA-TRAVERSAL.html">HTTP:CGI:ALTAVISTA-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: AltaVista Search Engine Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AANYFORM-SEMICOLON.html">HTTP:CGI:ANYFORM-SEMICOLON</a></b></td>
   <td width="500" valign="top">
    HTTP: Anyform Semicolon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAPM-ACC-BYPASS.html">HTTP:CGI:APM-ACC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cyclades AlterPath Manager Access Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAPPLE-QT-FILEDISC1.html">HTTP:CGI:APPLE-QT-FILEDISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Streaming Server parse_xml.cgi File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAWC-XSL-CMD-INJ.html">HTTP:CGI:AWC-XSL-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Audio and Web Conferencing xsl Parameter Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAWSTATS.html">HTTP:CGI:AWSTATS</a></b></td>
   <td width="500" valign="top">
    HTTP: AwStat: Malicious Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAXIS-ACCOUNT.html">HTTP:CGI:AXIS-ACCOUNT</a></b></td>
   <td width="500" valign="top">
    HTTP: Axis Video Server Remote Account Addition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AAXIS-EXEC.html">HTTP:CGI:AXIS-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Axis Video Server Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-CODE-INJECTION.html">HTTP:CGI:BASH-CODE-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-INJECTION-HEADER.html">HTTP:CGI:BASH-INJECTION-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection In Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-INJECTION-URL.html">HTTP:CGI:BASH-INJECTION-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection In URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABATCH-PIPE.html">HTTP:CGI:BATCH-PIPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache for Win32 Batch-Pipe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABOOZT-CGI-OF.html">HTTP:CGI:BOOZT-CGI-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: BOOZT! Not So Standard CGI Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABUGZILLA-SEMICOLON.html">HTTP:CGI:BUGZILLA-SEMICOLON</a></b></td>
   <td width="500" valign="top">
    HTTP: Bugzilla process_bug.cgi &#39;;&#39; Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ABUGZILLA%3APRIV-UP.html">HTTP:CGI:BUGZILLA:PRIV-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: Bugzilla Account Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACAREY-COMMERCE-DIR-TRV.html">HTTP:CGI:CAREY-COMMERCE-DIR-TRV</a></b></td>
   <td width="500" valign="top">
    HTTP: Carey Internet commerce.cgi Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACDOMAINFREE-RMT-EXEC.html">HTTP:CGI:CDOMAINFREE-RMT-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: CDomainFree Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACHETCPASSWD-OF.html">HTTP:CGI:CHETCPASSWD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: CHETCPASSWD Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACPANEL5-GB-EXEC.html">HTTP:CGI:CPANEL5-GB-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: CPanel 5 guestbook.cgi Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACSGUESTBOOK-PLUGIN-CE.html">HTTP:CGI:CSGUESTBOOK-PLUGIN-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: csGuestbook Multiple Plugins Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACTEK-SKYROUTER-EXEC.html">HTTP:CGI:CTEK-SKYROUTER-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Ctek SkyRouter 4200 and 4300 Series Routers Remote Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACVSWEB-CGI-SEMICOLON.html">HTTP:CGI:CVSWEB-CGI-SEMICOLON</a></b></td>
   <td width="500" valign="top">
    HTTP: CVSWEB cvsweb.cgi &#39;;&#39; Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ACYBEROFFICE-DB-REQUEST.html">HTTP:CGI:CYBEROFFICE-DB-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: CyberOffice Shopping Cart Database Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ADLINK-ROUTER-CMD-INJ.html">HTTP:CGI:DLINK-ROUTER-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Router SOAP Element Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEASY-MB-PRINT.html">HTTP:CGI:EASY-MB-PRINT</a></b></td>
   <td width="500" valign="top">
    HTTP: Easy Message Board Print Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEASYNEWS-ADMIN1.html">HTTP:CGI:EASYNEWS-ADMIN1</a></b></td>
   <td width="500" valign="top">
    HTTP: EasyNews
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEMAIL-VIRTUAL-APP.html">HTTP:CGI:EMAIL-VIRTUAL-APP</a></b></td>
   <td width="500" valign="top">
    HTTP: E-Mail Security Virtual Appliance learn-msg.cgi Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEMUMAIL-INFO-LEAK.html">HTTP:CGI:EMUMAIL-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: EMUmail.cgi Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEXCITE-AT-ADMIN-CGI.html">HTTP:CGI:EXCITE-AT-ADMIN-CGI</a></b></td>
   <td width="500" valign="top">
    HTTP: Excite AT-admin.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AEXTROPIA-DIR-TRAVERSAL.html">HTTP:CGI:EXTROPIA-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: eXtropia WebStore Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AFAXSURVEY-REMOTE-EXEC.html">HTTP:CGI:FAXSURVEY-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Hylafax Faxsurvey Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AFORMMAIL-VULN.html">HTTP:CGI:FORMMAIL-VULN</a></b></td>
   <td width="500" valign="top">
    HTTP: CGI FormMail Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AGENERIC-WEB-APP-CE.html">HTTP:CGI:GENERIC-WEB-APP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Web Application Unix Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AGLIMPSE-PIPE.html">HTTP:CGI:GLIMPSE-PIPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Glimpse Piped Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AGLIMPSE-PIPE1.html">HTTP:CGI:GLIMPSE-PIPE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Glimpse Piped Command Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AGROUNDWORK-MONITOR-CE.html">HTTP:CGI:GROUNDWORK-MONITOR-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: GroundWork Monitor Enterprise Monarch Component Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AHASSAN-DIR-TRAVERSAL.html">HTTP:CGI:HASSAN-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Hassan Consulting Shopping Cart Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AHTDIG-INCLUSION.html">HTTP:CGI:HTDIG-INCLUSION</a></b></td>
   <td width="500" valign="top">
    HTTP: ht://dig Arbitrary File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AIKONBOARD-BADCOOKIE.html">HTTP:CGI:IKONBOARD-BADCOOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ikonboard Illegal Cookie Language
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AINCLUDER-EXEC.html">HTTP:CGI:INCLUDER-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Includer.cgi Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AINFOSRCH-REMOTE-EXEC.html">HTTP:CGI:INFOSRCH-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: IRIX InfoSearch fname Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AKORWEBLOG-PATHDISC.html">HTTP:CGI:KORWEBLOG-PATHDISC</a></b></td>
   <td width="500" valign="top">
    HTTP: KorWebLog Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ALANDSK-UPLOAD-RCE.html">HTTP:CGI:LANDSK-UPLOAD-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: LANDesk Management Suite Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ALIBCGI-RFP-OVERWRITE.html">HTTP:CGI:LIBCGI-RFP-OVERWRITE</a></b></td>
   <td width="500" valign="top">
    HTTP: LIB CGI Remote Frame Pointer Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ALIBCGI-TUXBR-OF1.html">HTTP:CGI:LIBCGI-TUXBR-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: LIB CGI-tuxbr Sample3.cgi Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ALISTSERV-BO.html">HTTP:CGI:LISTSERV-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: ListServ Multiple Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ALITESERV-CGI-DISC.html">HTTP:CGI:LITESERV-CGI-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: LiteServe CGI Alias Filter Source Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMAGENTO-RCE.html">HTTP:CGI:MAGENTO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Magento Web Application Parameter Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMAIL-FORM-ACCESS.html">HTTP:CGI:MAIL-FORM-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mail Form Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AME-DESKTOP-CENT-ADMIN.html">HTTP:CGI:ME-DESKTOP-CENT-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Desktop Central Unauthorized Administrative Password Reset
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMONALBUM.html">HTTP:CGI:MONALBUM</a></b></td>
   <td width="500" valign="top">
    HTTP: Mon Album Unauthorized Admin Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMONALBUM-INFO.html">HTTP:CGI:MONALBUM-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Mon Album Priviledged Information Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMOVABLE-TYPE-UPGRADE.html">HTTP:CGI:MOVABLE-TYPE-UPGRADE</a></b></td>
   <td width="500" valign="top">
    HTTP: Movable Type Upgrade Script Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AMS-OFFICE-URL-BOF.html">HTTP:CGI:MS-OFFICE-URL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office XP URL Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-CMD-INJ.html">HTTP:CGI:NAGIOS-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-CORE-DOS.html">HTTP:CGI:NAGIOS-CORE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios core CGI Process_cgivars Off-By-One
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-HISTORY-PRM-BO.html">HTTP:CGI:NAGIOS-HISTORY-PRM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios history.cgi Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-XI-AUTODISC-CMD.html">HTTP:CGI:NAGIOS-XI-AUTODISC-CMD</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios XI Autodiscovery Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ANULL-ENCODING.html">HTTP:CGI:NULL-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Null Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AOFFICESCAN-CGI-BO.html">HTTP:CGI:OFFICESCAN-CGI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan Multiple CGI Modules HTTP Form Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AORACLE-RPT-INFOLEAK.html">HTTP:CGI:ORACLE-RPT-INFOLEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Report Server Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3APERL%3ADUMPENV-PROBE.html">HTTP:CGI:PERL:DUMPENV-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Dumpenv.pl Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3APERL%3AWEBHINT-CMD-INJ.html">HTTP:CGI:PERL:WEBHINT-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: WebHints Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AQUIKSTORE-CFG-ACCESS.html">HTTP:CGI:QUIKSTORE-CFG-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: QuikStore Config Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AREF-CMD-INJECT.html">HTTP:CGI:REF-CMD-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Command Execution Attempt in Referer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AROADS-FILE-DISCLOSURE.html">HTTP:CGI:ROADS-FILE-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Martin Hamilton ROADS File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ARSA-AGENT-BOF.html">HTTP:CGI:RSA-AGENT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: RSA Agent Redirect Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASCRUTINIZER-CE.html">HTTP:CGI:SCRUTINIZER-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Scrutinizer Hidden User Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASHELLSHOCK.html">HTTP:CGI:SHELLSHOCK</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASITESEARCHER-EXEC.html">HTTP:CGI:SITESEARCHER-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Super Site Searcher Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASMARTSEARCH-EXEC.html">HTTP:CGI:SMARTSEARCH-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: SmartSearch.cgi Keywords Input Validation Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASOFTCART.html">HTTP:CGI:SOFTCART</a></b></td>
   <td width="500" valign="top">
    HTTP: Mercantec SoftCart CGI Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASOJOURN-FILE-VIEW.html">HTTP:CGI:SOJOURN-FILE-VIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: Sojourn File View Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASPIDERSALES.html">HTTP:CGI:SPIDERSALES</a></b></td>
   <td width="500" valign="top">
    HTTP: SpiderSales Shopping Cart Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASTORE-ATTEMPT.html">HTTP:CGI:STORE-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Store.cgi Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASUNPS-IRUNBOOK.html">HTTP:CGI:SUNPS-IRUNBOOK</a></b></td>
   <td width="500" valign="top">
    HTTP: SunPS iRunbook 2.5.2 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ASUPERMICRO-BOF.html">HTTP:CGI:SUPERMICRO-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Supermicro Onboard IPMI close_window.cgi Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATECHNOTE-MAIN-DCLSR.html">HTTP:CGI:TECHNOTE-MAIN-DCLSR</a></b></td>
   <td width="500" valign="top">
    HTTP: Technote main.cgi &quot;filename&quot; Variable File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATECHNOTE-PRINT-DSCLSR.html">HTTP:CGI:TECHNOTE-PRINT-DSCLSR</a></b></td>
   <td width="500" valign="top">
    HTTP: Technote print.cgi &quot;board&quot; Function File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATEST-CGI.html">HTTP:CGI:TEST-CGI</a></b></td>
   <td width="500" valign="top">
    HTTP: test.cgi Files Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATEXIS-INFOPROBE.html">HTTP:CGI:TEXIS-INFOPROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: TEXIS Webroot Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATWIKI-MAKETEXT-RCE.html">HTTP:CGI:TWIKI-MAKETEXT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: TWiki and Foswiki MAKETEXT Variable Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATWIKI-REV-CMD-INJ.html">HTTP:CGI:TWIKI-REV-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: TWiki Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATWIKI-SEARCH-CMD-EXEC.html">HTTP:CGI:TWIKI-SEARCH-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: TWiki Search Module Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3ATWIKI-VIEW-EXEC.html">HTTP:CGI:TWIKI-VIEW-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: TWiki VIEW Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AUBNT-AIROS-CMD-INJ.html">HTTP:CGI:UBNT-AIROS-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Ubiquiti Networks AirOS Remote Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AUSERONLINE-LOGLEAK.html">HTTP:CGI:USERONLINE-LOGLEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: UserOnline User Log Leakage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AVIRTUAL-VISION-TRVRSL.html">HTTP:CGI:VIRTUAL-VISION-TRVRSL</a></b></td>
   <td width="500" valign="top">
    HTTP: Virtual Vision FTP Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AWAYBOARD-FILE-DISCLSR.html">HTTP:CGI:WAYBOARD-FILE-DISCLSR</a></b></td>
   <td width="500" valign="top">
    HTTP: Way-Board File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AWEBPALS-EXEC.html">HTTP:CGI:WEBPALS-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: MnSCU/PALS WebPALS Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AWEBSCADA.html">HTTP:CGI:WEBSCADA</a></b></td>
   <td width="500" valign="top">
    HTTP: Netbiter webSCADA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AWEBSCADA3.html">HTTP:CGI:WEBSCADA3</a></b></td>
   <td width="500" valign="top">
    HTTP: Netbiter webSCADA3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AYABB-DIR-TRAVERSAL.html">HTTP:CGI:YABB-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Yabb Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AZAMFOO-CMD-INJ.html">HTTP:CGI:ZAMFOO-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: ZamFoo Reseller Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACGI%3AZEN-LB-CMD-EXEC.html">HTTP:CGI:ZEN-LB-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: ZEN Load Balancer Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACHKP%3AAUTH-FMT-STR.html">HTTP:CHKP:AUTH-FMT-STR</a></b></td>
   <td width="500" valign="top">
    HTTP: Authentication Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACHKP%3AAUTH-HDR-BOF.html">HTTP:CHKP:AUTH-HDR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Checkpoint Auth Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AASA-VPN-SEC-BYPASS.html">HTTP:CISCO:ASA-VPN-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco ASA SSL WebVPN Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACATALYST-ARB-CMD.html">HTTP:CISCO:CATALYST-ARB-CMD</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Catalyst 3500 XL Remote Arbitrary Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACISCOWORKS-DIR-TRAV.html">HTTP:CISCO:CISCOWORKS-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: CiscoWorks Common Services Auditing Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACONTROLLER-CSRF.html">HTTP:CISCO:CONTROLLER-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Wireless Lan Controller 7.2.110.0 CSRF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACSUSERCGI-BOF.html">HTTP:CISCO:CSUSERCGI-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco User-Changeable Password CSuserCGI.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACUCM-DIR-TRAV.html">HTTP:CISCO:CUCM-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Unified Communications Manager IVRGetAudioFile.do Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ADOWNLOADSERVLET-FU.html">HTTP:CISCO:DOWNLOADSERVLET-FU</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager DownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AFILEUPLOADSERVLET.html">HTTP:CISCO:FILEUPLOADSERVLET</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager FileUploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AIOS-ADMIN-ACCESS.html">HTTP:CISCO:IOS-ADMIN-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco IOS HTTP Configuration Administrative Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AIOS-HTML-INJ.html">HTTP:CISCO:IOS-HTML-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco IOS HTTP Service HTML Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-APPLY-RCE.html">HTTP:CISCO:LINKSYS-APPLY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Linksys E1500/E2500 apply.cgi Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-CMD-INJ.html">HTTP:CISCO:LINKSYS-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-CODE-INJ.html">HTTP:CISCO:LINKSYS-CODE-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Linksys WRT110 Router Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-WRT54GL-CSRF.html">HTTP:CISCO:LINKSYS-WRT54GL-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Password Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-WRT54GL-XSS.html">HTTP:CISCO:LINKSYS-WRT54GL-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Cross-site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AMARS-JMX.html">HTTP:CISCO:MARS-JMX</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco MARS JMX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3APROCESSIMAGESAVE-FU.html">HTTP:CISCO:PROCESSIMAGESAVE-FU</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager processImageSave.jsp Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ASCANNER-PROBE.html">HTTP:CISCO:SCANNER-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Scanner Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ASERVLETEXEC.html">HTTP:CISCO:SERVLETEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Collaboration Server ServletEXEC File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3ASOURCE-CODE-DISC.html">HTTP:CISCO:SOURCE-CODE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Collaboration Server Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AUNIFIED-XSS.html">HTTP:CISCO:UNIFIED-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Unified Operations Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AUNIFIED-XSS-2.html">HTTP:CISCO:UNIFIED-XSS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Unified Operations Manager Cross Site Scripting 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AVOIP%3APORT-INFO-DOS.html">HTTP:CISCO:VOIP:PORT-INFO-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco VoIP Phone PortInformation DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AVOIP%3APORT-INFO-DOS1.html">HTTP:CISCO:VOIP:PORT-INFO-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco VoIP Phone PortInformation DOS1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AVOIP%3ASTREAM-ID-DOS.html">HTTP:CISCO:VOIP:STREAM-ID-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco VoIP Phone StreamingStatistics DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AVOIP%3ASTREAM-ID-REQ.html">HTTP:CISCO:VOIP:STREAM-ID-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco VoIP Phone Streaming Statistics Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AWIFI-AUTH-DOS.html">HTTP:CISCO:WIFI-AUTH-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Wireless LAN Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACISCO%3AWIFI-CONTROLLER-DOS.html">HTTP:CISCO:WIFI-CONTROLLER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Wireless Lan Controller 7.2.110.0 DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACLAMAV-ENCRYPT-PDF-MC.html">HTTP:CLAMAV-ENCRYPT-PDF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV Encrypted PDF File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACLANSPHERE-COOKIE-LFI.html">HTTP:CLANSPHERE-COOKIE-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: ClanSphere 2011.3 Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACNT-IFRAME-RDIR.html">HTTP:CNT-IFRAME-RDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: iFRAMEr Successful cnt.php Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOBALT%3ACONF-DIR-TRAV.html">HTTP:COBALT:CONF-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Cobalt RAQ 4 Configuration Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOBALT%3ASEC-REQ-PROBE.html">HTTP:COBALT:SEC-REQ-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Cobalt RaQ 4 Security Hardening Update Discovery Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOBALT%3ASEC-REQ-PROBE-2.html">HTTP:COBALT:SEC-REQ-PROBE-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Cobalt RaQ 4 Security Hardening Update OverflowTestEmail.cgi Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOBALT%3ASERVICE-DOS.html">HTTP:COBALT:SERVICE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cobalt RAQ 4 Service.cgi Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AADMIN-PROBE.html">HTTP:COLDFUSION:ADMIN-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Coldfusion Administrator Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACF-CLASS-DWLD.html">HTTP:COLDFUSION:CF-CLASS-DWLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Coldfusion Java Class Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACFCACHE-MAP.html">HTTP:COLDFUSION:CFCACHE-MAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Coldfusion cfcache.map Info Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACFIDE-AUTHBYPAS.html">HTTP:COLDFUSION:CFIDE-AUTHBYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion CFIDE Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACFM-FILE.html">HTTP:COLDFUSION:CFM-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Coldfusion Cfm File Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACVE-2013-3336.html">HTTP:COLDFUSION:CVE-2013-3336</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion CVE-2013-3336 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AENV-VAR-OW.html">HTTP:COLDFUSION:ENV-VAR-OW</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion Environment Variable Overwrite Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AGETFILE-PROBE.html">HTTP:COLDFUSION:GETFILE-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Coldfusion Getfile.cfm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AHEADER-LOG-OF.html">HTTP:COLDFUSION:HEADER-LOG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: ColdFusion JRun Header Logger Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AXML-CMD-INJ.html">HTTP:COLDFUSION:XML-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion/BlazeDS/LiveCycle XML Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACONTENTKEEPER-BENETOOL-CE.html">HTTP:CONTENTKEEPER-BENETOOL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: ContentKeeper Web Appliance benetool Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOTTONCASTLE-EK.html">HTTP:COTTONCASTLE-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACOTTONCASTLE-EK-DL.html">HTTP:COTTONCASTLE-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Encrypted Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRIMEBOSS-EK-JAVA-DL2.html">HTTP:CRIMEBOSS-EK-JAVA-DL2</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Java Exploit Download 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRIMEBOSS-EK-OUTCONN.html">HTTP:CRIMEBOSS-EK-OUTCONN</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Outbound Connection 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRIMEBOSS-EK-OUTCONN3.html">HTTP:CRIMEBOSS-EK-OUTCONN3</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Outbound Connection 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRIMEBOSS-EK-REDIR2.html">HTTP:CRIMEBOSS-EK-REDIR2</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Redirection Attempt 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRIMEPACK-EK-LANDPG.html">HTTP:CRIMEPACK-EK-LANDPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimepack Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK.html">HTTP:CRITX-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Landing Page Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-FLA.html">HTTP:CRITX-EK-FLA</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Outbound Request For Adobe Flash Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-JAVA-DL.html">HTTP:CRITX-EK-JAVA-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java Exploit Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-JAVA-EXPL-REQ.html">HTTP:CRITX-EK-JAVA-EXPL-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java Exploit Request Structure 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-LP1.html">HTTP:CRITX-EK-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-OB.html">HTTP:CRITX-EK-OB</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Outbound Request For Oracle Java Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-PDF-DL.html">HTTP:CRITX-EK-PDF-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit PDF Exploit Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACRITX-EK-PE-DL.html">HTTP:CRITX-EK-PE-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Portable Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2010-0248-RCE.html">HTTP:CVE-2010-0248-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2010-0248 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2010-3335-RCE.html">HTTP:CVE-2010-3335-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2010-3335 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2010-3972-RCE.html">HTTP:CVE-2010-3972-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2010-3972 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0029-RCE.html">HTTP:CVE-2011-0029-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0029 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0032-RCE.html">HTTP:CVE-2011-0032-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0032 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0033-RCE.html">HTTP:CVE-2011-0033-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0033 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0035-RCE.html">HTTP:CVE-2011-0035-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0035 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0036-RCE.html">HTTP:CVE-2011-0036-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0036 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0042-RCE.html">HTTP:CVE-2011-0042-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0098-RCE.html">HTTP:CVE-2011-0098-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0098 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0101-RCE.html">HTTP:CVE-2011-0101-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0101 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0978-RCE.html">HTTP:CVE-2011-0978-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0978 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2011-0979-RCE.html">HTTP:CVE-2011-0979-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2011-0979 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-12.html">HTTP:CVE-2013-2551-EXP-12</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-12
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-13.html">HTTP:CVE-2013-2551-EXP-13</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection-13
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-14.html">HTTP:CVE-2013-2551-EXP-14</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection-14
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-15.html">HTTP:CVE-2013-2551-EXP-15</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection-15
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-16.html">HTTP:CVE-2013-2551-EXP-16</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection-16
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-17.html">HTTP:CVE-2013-2551-EXP-17</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-17
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-18.html">HTTP:CVE-2013-2551-EXP-18</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-18
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-19.html">HTTP:CVE-2013-2551-EXP-19</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection-19
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-33.html">HTTP:CVE-2013-2551-EXP-33</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2013-2551 Infection-33
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-36.html">HTTP:CVE-2013-2551-EXP-36</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2013-2551 Infection-36
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-EXP-39.html">HTTP:CVE-2013-2551-EXP-39</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2013-2551 Infection-39
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-RCE.html">HTTP:CVE-2013-2551-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-1.html">HTTP:CVE-2013-2551-SUSP-1</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-10.html">HTTP:CVE-2013-2551-SUSP-10</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-10
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-13.html">HTTP:CVE-2013-2551-SUSP-13</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-13
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-16.html">HTTP:CVE-2013-2551-SUSP-16</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-16
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-19.html">HTTP:CVE-2013-2551-SUSP-19</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-19
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-22.html">HTTP:CVE-2013-2551-SUSP-22</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-22
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-25.html">HTTP:CVE-2013-2551-SUSP-25</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-25
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-28.html">HTTP:CVE-2013-2551-SUSP-28</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-28
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-31.html">HTTP:CVE-2013-2551-SUSP-31</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-31
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-34.html">HTTP:CVE-2013-2551-SUSP-34</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-34
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-37.html">HTTP:CVE-2013-2551-SUSP-37</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-37
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-4.html">HTTP:CVE-2013-2551-SUSP-4</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-40.html">HTTP:CVE-2013-2551-SUSP-40</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-40
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-43.html">HTTP:CVE-2013-2551-SUSP-43</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-43
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-46.html">HTTP:CVE-2013-2551-SUSP-46</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-46
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-49.html">HTTP:CVE-2013-2551-SUSP-49</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-49
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-52.html">HTTP:CVE-2013-2551-SUSP-52</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-52
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-55.html">HTTP:CVE-2013-2551-SUSP-55</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-55
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-58.html">HTTP:CVE-2013-2551-SUSP-58</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-58
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-61.html">HTTP:CVE-2013-2551-SUSP-61</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-61
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-64.html">HTTP:CVE-2013-2551-SUSP-64</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-64
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-2551-SUSP-7.html">HTTP:CVE-2013-2551-SUSP-7</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-2551 Infection Detected-7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2013-3912-RCE.html">HTTP:CVE-2013-3912-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2013-3912 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0282-RCE.html">HTTP:CVE-2014-0282-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0282 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0283-RCE.html">HTTP:CVE-2014-0283-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0283 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0284-RCE.html">HTTP:CVE-2014-0284-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0284 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0285-RCE.html">HTTP:CVE-2014-0285-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0285 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0286-RCE.html">HTTP:CVE-2014-0286-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0286 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0287-RCE.html">HTTP:CVE-2014-0287-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0287 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0288-RCE.html">HTTP:CVE-2014-0288-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0288 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0297-RCE.html">HTTP:CVE-2014-0297-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0297 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0299-RCE.html">HTTP:CVE-2014-0299-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0299 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0302-RCE.html">HTTP:CVE-2014-0302-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0302 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0306-RCE.html">HTTP:CVE-2014-0306-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0306 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0309-RCE.html">HTTP:CVE-2014-0309-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0309 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0312-RCE.html">HTTP:CVE-2014-0312-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0312 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-20.html">HTTP:CVE-2014-0515-EXP-20</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-20
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-22.html">HTTP:CVE-2014-0515-EXP-22</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-22
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-23.html">HTTP:CVE-2014-0515-EXP-23</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-23
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-24.html">HTTP:CVE-2014-0515-EXP-24</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection-24
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-25.html">HTTP:CVE-2014-0515-EXP-25</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-25
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-26.html">HTTP:CVE-2014-0515-EXP-26</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-26
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-27.html">HTTP:CVE-2014-0515-EXP-27</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection -27
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-28.html">HTTP:CVE-2014-0515-EXP-28</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-28
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-32.html">HTTP:CVE-2014-0515-EXP-32</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-0515 Infection-32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-35.html">HTTP:CVE-2014-0515-EXP-35</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-0515 Infection-35
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-EXP-38.html">HTTP:CVE-2014-0515-EXP-38</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-0515 Infection-38
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-12.html">HTTP:CVE-2014-0515-INFCT-12</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-12
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-15.html">HTTP:CVE-2014-0515-INFCT-15</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-15
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-18.html">HTTP:CVE-2014-0515-INFCT-18</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-18
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-21.html">HTTP:CVE-2014-0515-INFCT-21</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-21
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-24.html">HTTP:CVE-2014-0515-INFCT-24</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-24
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-27.html">HTTP:CVE-2014-0515-INFCT-27</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-27
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-3.html">HTTP:CVE-2014-0515-INFCT-3</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-30.html">HTTP:CVE-2014-0515-INFCT-30</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-30
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-33.html">HTTP:CVE-2014-0515-INFCT-33</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-33
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-36.html">HTTP:CVE-2014-0515-INFCT-36</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-36
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-39.html">HTTP:CVE-2014-0515-INFCT-39</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-39
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-42.html">HTTP:CVE-2014-0515-INFCT-42</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-42
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-45.html">HTTP:CVE-2014-0515-INFCT-45</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-45
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-48.html">HTTP:CVE-2014-0515-INFCT-48</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-48
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-51.html">HTTP:CVE-2014-0515-INFCT-51</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-51
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-54.html">HTTP:CVE-2014-0515-INFCT-54</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-54
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-57.html">HTTP:CVE-2014-0515-INFCT-57</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-57
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-6.html">HTTP:CVE-2014-0515-INFCT-6</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-60.html">HTTP:CVE-2014-0515-INFCT-60</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-60
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-63.html">HTTP:CVE-2014-0515-INFCT-63</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-63
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-INFCT-9.html">HTTP:CVE-2014-0515-INFCT-9</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Infection Detected-9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-0515-RCE.html">HTTP:CVE-2014-0515-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1755-RCE.html">HTTP:CVE-2014-1755-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1755 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1765-RCE.html">HTTP:CVE-2014-1765-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1765 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1775-RCE.html">HTTP:CVE-2014-1775-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1775 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1795-RCE.html">HTTP:CVE-2014-1795-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1795 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1802-RCE.html">HTTP:CVE-2014-1802-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1802 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-1815-RCE.html">HTTP:CVE-2014-1815-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-1815 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-2795-RCE.html">HTTP:CVE-2014-2795-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-2795 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-2801-RCE.html">HTTP:CVE-2014-2801-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-2801 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-2824-RCE.html">HTTP:CVE-2014-2824-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-2824 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4080-RCE.html">HTTP:CVE-2014-4080-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4080 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4082-RCE.html">HTTP:CVE-2014-4082-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4082 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4087-RCE.html">HTTP:CVE-2014-4087-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4094-RCE.html">HTTP:CVE-2014-4094-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4094 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4124-RCE.html">HTTP:CVE-2014-4124-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4124 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4127-RCE.html">HTTP:CVE-2014-4127-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4127 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4132-RCE.html">HTTP:CVE-2014-4132-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4132 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4137-RCE.html">HTTP:CVE-2014-4137-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4137 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4140-RCE.html">HTTP:CVE-2014-4140-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4140 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-4141-RCE.html">HTTP:CVE-2014-4141-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-4141 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6327-RCE.html">HTTP:CVE-2014-6327-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6327 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6329-RCE.html">HTTP:CVE-2014-6329-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6329 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-01.html">HTTP:CVE-2014-6332-EXP-01</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-01
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-02.html">HTTP:CVE-2014-6332-EXP-02</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-02
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-03.html">HTTP:CVE-2014-6332-EXP-03</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-03
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-04.html">HTTP:CVE-2014-6332-EXP-04</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-04
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-05.html">HTTP:CVE-2014-6332-EXP-05</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-05
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-06.html">HTTP:CVE-2014-6332-EXP-06</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-06
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-07.html">HTTP:CVE-2014-6332-EXP-07</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-07
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-08.html">HTTP:CVE-2014-6332-EXP-08</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-08
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-09.html">HTTP:CVE-2014-6332-EXP-09</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-09
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-10.html">HTTP:CVE-2014-6332-EXP-10</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-10
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-11.html">HTTP:CVE-2014-6332-EXP-11</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection-11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-30.html">HTTP:CVE-2014-6332-EXP-30</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-30
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-31.html">HTTP:CVE-2014-6332-EXP-31</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-6332 Infection-31
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-34.html">HTTP:CVE-2014-6332-EXP-34</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-6332 Infection-34
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-EXP-40.html">HTTP:CVE-2014-6332-EXP-40</a></b></td>
   <td width="500" valign="top">
    HTTP:CVE-2014-6332 Infection-40
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-11.html">HTTP:CVE-2014-6332-MAL-11</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-14.html">HTTP:CVE-2014-6332-MAL-14</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-14
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-17.html">HTTP:CVE-2014-6332-MAL-17</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-17
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-2.html">HTTP:CVE-2014-6332-MAL-2</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-20.html">HTTP:CVE-2014-6332-MAL-20</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-20
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-23.html">HTTP:CVE-2014-6332-MAL-23</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-23
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-26.html">HTTP:CVE-2014-6332-MAL-26</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-26
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-29.html">HTTP:CVE-2014-6332-MAL-29</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-29
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-32.html">HTTP:CVE-2014-6332-MAL-32</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-35.html">HTTP:CVE-2014-6332-MAL-35</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-35
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-38.html">HTTP:CVE-2014-6332-MAL-38</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-38
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-41.html">HTTP:CVE-2014-6332-MAL-41</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-41
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-44.html">HTTP:CVE-2014-6332-MAL-44</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-44
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-47.html">HTTP:CVE-2014-6332-MAL-47</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-47
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-5.html">HTTP:CVE-2014-6332-MAL-5</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-50.html">HTTP:CVE-2014-6332-MAL-50</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-50
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-53.html">HTTP:CVE-2014-6332-MAL-53</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-53
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-56.html">HTTP:CVE-2014-6332-MAL-56</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-56
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-59.html">HTTP:CVE-2014-6332-MAL-59</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-59
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-62.html">HTTP:CVE-2014-6332-MAL-62</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-62
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-65.html">HTTP:CVE-2014-6332-MAL-65</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-65
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-MAL-8.html">HTTP:CVE-2014-6332-MAL-8</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Infection Detected-8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6332-RCE.html">HTTP:CVE-2014-6332-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6337-RCE.html">HTTP:CVE-2014-6337-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6337 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6343-RCE.html">HTTP:CVE-2014-6343-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6343 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6347-RCE.html">HTTP:CVE-2014-6347-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6347 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6349-RCE.html">HTTP:CVE-2014-6349-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6349 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6357-RCE.html">HTTP:CVE-2014-6357-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6357 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6360-RCE.html">HTTP:CVE-2014-6360-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6360 Remote Coce Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6364-RCE.html">HTTP:CVE-2014-6364-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6364 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6369-RCE.html">HTTP:CVE-2014-6369-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6369 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-6375-RCE.html">HTTP:CVE-2014-6375-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-6375 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2014-8967-RCE.html">HTTP:CVE-2014-8967-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-8967 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0019-RCE.html">HTTP:CVE-2015-0019-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0019 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0038-RCE.html">HTTP:CVE-2015-0038-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0038 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0039-RCE.html">HTTP:CVE-2015-0039-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0039 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0042-RCE.html">HTTP:CVE-2015-0042-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0045-RCE.html">HTTP:CVE-2015-0045-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0045 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0053-RCE.html">HTTP:CVE-2015-0053-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0053 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0063-RCE.html">HTTP:CVE-2015-0063-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0063 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0081-RCE.html">HTTP:CVE-2015-0081-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0081 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0085-RCE.html">HTTP:CVE-2015-0085-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0085 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0099-RCE.html">HTTP:CVE-2015-0099-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-0099 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-0309-RCE.html">HTTP:CVE-2015-0309-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE2015-0309 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1652-RCE.html">HTTP:CVE-2015-1652-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1652 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1666-RCE.html">HTTP:CVE-2015-1666-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1666 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1671-RCE.html">HTTP:CVE-2015-1671-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1671 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1699-RCE.html">HTTP:CVE-2015-1699-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1699 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1709-RCE.html">HTTP:CVE-2015-1709-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1709 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1727-RCE.html">HTTP:CVE-2015-1727-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1727 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1730-RCE.html">HTTP:CVE-2015-1730-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1730 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1733-RCE.html">HTTP:CVE-2015-1733-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1733 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-1753-RCE.html">HTTP:CVE-2015-1753-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-1753 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-2442-RCE.html">HTTP:CVE-2015-2442-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-2442 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-2448-RCE.html">HTTP:CVE-2015-2448-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-2448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-2513-RCE.html">HTTP:CVE-2015-2513-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-2513 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-2524-PE.html">HTTP:CVE-2015-2524-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-2524 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-2557-RCE.html">HTTP:CVE-2015-2557-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-2557 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACVE-2015-312-RCE.html">HTTP:CVE-2015-312-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2015-312 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACYCLADES%3ACONSOLE-CON.html">HTTP:CYCLADES:CONSOLE-CON</a></b></td>
   <td width="500" valign="top">
    HTTP: Cyclades AlterPath Manager consoleConnect.jsp Arbitrary Console Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ACYCLADES%3ASAVEUSER-PRIV.html">HTTP:CYCLADES:SAVEUSER-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Cyclades AlterPath Manager saveUser.do Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADFIND-PROBE.html">HTTP:DFIND-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: DFind Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIGIUM-ASTERISK-BO.html">HTTP:DIGIUM-ASTERISK-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Digium Asterisk Management Interface HTTP Digest Authentication Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIGIUM-ASTERISK-BO1.html">HTTP:DIGIUM-ASTERISK-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Digium Asterisk Management Interface HTTP Digest Authentication Stack Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AADMIN-PATH-TRAVERSAL.html">HTTP:DIR:ADMIN-PATH-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: NULL NUKE admin.php file Parameter Absolute Path Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ABARRACUDA-DIRTRAV.html">HTTP:DIR:BARRACUDA-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Barracuda Spam Firewall Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ACA-ERWIN-WEB-PORTAL.html">HTTP:DIR:CA-ERWIN-WEB-PORTAL</a></b></td>
   <td width="500" valign="top">
    HTTP: CA ERwin Web Portal Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ACRYSTAL-REPORTS.html">HTTP:DIR:CRYSTAL-REPORTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Crystal Reports Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ADLINK-DNS-DIR-TRAV.html">HTTP:DIR:DLINK-DNS-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DNS-323 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AENDECA-ETLSERVER-DT.html">HTTP:DIR:ENDECA-ETLSERVER-DT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Information Discovery Integrator ETL Server MoveFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHP-LOADRUNNER-EMU.html">HTTP:DIR:HP-LOADRUNNER-EMU</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LoadRunner Virtual User Generator EmulationAdmin Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-ENCODING.html">HTTP:DIR:HTTP-ACCEPT-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Accept Encoding Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-HDR.html">HTTP:DIR:HTTP-ACCEPT-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Accept Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-LANG.html">HTTP:DIR:HTTP-ACCEPT-LANG</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Accept Language Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-AUTH-HDR.html">HTTP:DIR:HTTP-AUTH-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Authorization Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-CONT-TYPE.html">HTTP:DIR:HTTP-CONT-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Content Type Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-CONTENT-MD5.html">HTTP:DIR:HTTP-CONTENT-MD5</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Content md5 Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-COOKIE-HDR.html">HTTP:DIR:HTTP-COOKIE-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Cookie Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-HOST-HDR.html">HTTP:DIR:HTTP-HOST-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-REFERER-HDR.html">HTTP:DIR:HTTP-REFERER-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Referer Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-REQ-URL.html">HTTP:DIR:HTTP-REQ-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Request URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-REQUEST-HDR.html">HTTP:DIR:HTTP-REQUEST-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal in HTTP Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-UA-HDR.html">HTTP:DIR:HTTP-UA-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP User Agent Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMANAGEENGINE.html">HTTP:DIR:MANAGEENGINE</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products File Attachment Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMANAGEENGINE-DIR-TRA.html">HTTP:DIR:MANAGEENGINE-DIR-TRA</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine ServiceDesk File Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMESMP-DIR-TRAV.html">HTTP:DIR:MESMP-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Security Manager Plus Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMNGE-ENGINE-FILE-DLD.html">HTTP:DIR:MNGE-ENGINE-FILE-DLD</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine NetFlow Analyzer Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMS-SHAREPOINT.html">HTTP:DIR:MS-SHAREPOINT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AMUL-VEN-DIR-TRAV.html">HTTP:DIR:MUL-VEN-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Directory Traversal Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ANOVELL-GROUPWSE-DIRTRA.html">HTTP:DIR:NOVELL-GROUPWSE-DIRTRA</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Admin Service FileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ANOVELL-ZENWORKS.html">HTTP:DIR:NOVELL-ZENWORKS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ANOVELL-ZENWORKS-TRAV.html">HTTP:DIR:NOVELL-ZENWORKS-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AORACLE-HYPERION-TRAV.html">HTTP:DIR:ORACLE-HYPERION-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Hyperion 11 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AORACLE-INFO-DISCOVERY.html">HTTP:DIR:ORACLE-INFO-DISCOVERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3APARAMETER-TRAVERSE.html">HTTP:DIR:PARAMETER-TRAVERSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AREPRISE-EDIT-IFPROCESS.html">HTTP:DIR:REPRISE-EDIT-IFPROCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Reprise License Manager edit_lf_process Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ATRAV-ENCODED.html">HTTP:DIR:TRAV-ENCODED</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple HTTP Server Encoded Directory Traversal Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3ATRAVERSE-DIRECTORY.html">HTTP:DIR:TRAVERSE-DIRECTORY</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AVISUALMINING-NETCHARTS.html">HTTP:DIR:VISUALMINING-NETCHARTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Mining NetCharts Server File Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AWINACE-DIR-TRVRS.html">HTTP:DIR:WINACE-DIR-TRVRS</a></b></td>
   <td width="500" valign="top">
    HTTP: WinACE RAR and TAR Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADIR%3AWP-UNGALLERY-LFD.html">HTTP:DIR:WP-UNGALLERY-LFD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress UnGallery &#39;pic&#39; Parameter Local File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLINK-AUTHENTICATION-BO.html">HTTP:DLINK-AUTHENTICATION-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Dlink Authentication CGI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLINK-CMD-RCE.html">HTTP:DLINK-CMD-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Multiple Router Cmd Parameter Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLINK-DIR605L-CAPTCHA-BOF.html">HTTP:DLINK-DIR605L-CAPTCHA-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Dlink D-Link DIR-605L Improper Variable Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLINK-DIR605L-CAPTCHA-BOF1.html">HTTP:DLINK-DIR605L-CAPTCHA-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Dlink D-Link DIR-605L Improper Variable Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLL-REQ-VIA-WEBDAV.html">HTTP:DLL-REQ-VIA-WEBDAV</a></b></td>
   <td width="500" valign="top">
    HTTP: DLL File Download via WebDAV
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADLL-REQ-VIA-WEBDAV1.html">HTTP:DLL-REQ-VIA-WEBDAV1</a></b></td>
   <td width="500" valign="top">
    HTTP: DLL File Download via WebDAV1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AACCEPT-LANG-OF.html">HTTP:DOMINO:ACCEPT-LANG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino Accept Language Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3ACSP-SRC-DISCLOSURE.html">HTTP:DOMINO:CSP-SRC-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino CSP Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AHASH-DUMPER.html">HTTP:DOMINO:HASH-DUMPER</a></b></td>
   <td width="500" valign="top">
    HTTP: Domino Hash Dumper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AHPRAGENTNAME-BOF.html">HTTP:DOMINO:HPRAGENTNAME-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Domino HPRAgentName Parameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AINFO-LEAK.html">HTTP:DOMINO:INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3ANSF-DIR-TRAVERSAL.html">HTTP:DOMINO:NSF-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino .nsf Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3ANSF-PASSWORD-BYPASS.html">HTTP:DOMINO:NSF-PASSWORD-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino .nsf Password Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3APOST-DOS2.html">HTTP:DOMINO:POST-DOS2</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino Post DoS (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AREDIR-BOF.html">HTTP:DOMINO:REDIR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Domino HTTP Redirect Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3ASAMETIME-URL-OF.html">HTTP:DOMINO:SAMETIME-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Sametime URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOMINO%3AUSERNAME-DISCOVERY.html">HTTP:DOMINO:USERNAME-DISCOVERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Domino Username Discovery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AAPACHE-TOMCAT-CHUNKED.html">HTTP:DOS:APACHE-TOMCAT-CHUNKED</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Large Chunked Transfer Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ADOMSHTTPD-BO.html">HTTP:DOS:DOMSHTTPD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: DomsHttpd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ADRUPAL-XML-RPC-IEE.html">HTTP:DOS:DRUPAL-XML-RPC-IEE</a></b></td>
   <td width="500" valign="top">
    HTTP: Drupal Core XML-RPC Endpoint Internal Entity Expansion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ADRUPAL-XMLRPC-TAGS.html">HTTP:DOS:DRUPAL-XMLRPC-TAGS</a></b></td>
   <td width="500" valign="top">
    HTTP: Drupal Core XML-RPC Endpoint Tags Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AGOLDENEYE-DOS.html">HTTP:DOS:GOLDENEYE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: GoldenEye HTTP Denial Of Service Tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AHTTPKILLER-KEEPALIVE.html">HTTP:DOS:HTTPKILLER-KEEPALIVE</a></b></td>
   <td width="500" valign="top">
    HTTP: FHTTP HTTPKiller Denial of Service Probes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AHULK-DOS.html">HTTP:DOS:HULK-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: HULK Unbearable Load Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ALAN-MSG-DOS.html">HTTP:DOS:LAN-MSG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: LAN Messenger Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AMUL-PRODUCTS.html">HTTP:DOS:MUL-PRODUCTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Denial Of Service Vilnerability (STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3AMUL-VENDORS.html">HTTP:DOS:MUL-VENDORS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Denial Of Service Vilnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ANOOP-SLED-REQ-MALF.html">HTTP:DOS:NOOP-SLED-REQ-MALF</a></b></td>
   <td width="500" valign="top">
    HTTP: No Operation Sled in HTTP Request (Malformed)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ASAFARI-FILE-DOWNLOAD.html">HTTP:DOS:SAFARI-FILE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Safari File Download Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ASCHNEIDER-EXPRT-SCADA.html">HTTP:DOS:SCHNEIDER-EXPRT-SCADA</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric SCADA Expert ClearSCADA Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ASLOW-HEADER-DOS.html">HTTP:DOS:SLOW-HEADER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Slow Header Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOS%3ASQUID-HDR-RANGE.html">HTTP:DOS:SQUID-HDR-RANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Range Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ADOURAN-ARB-FILE-DL.html">HTTP:DOURAN-ARB-FILE-DL</a></b></td>
   <td width="500" valign="top">
    HTTP:Douran Portal &#39;download.aspx&#39; Arbitrary File Download Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEASYLAN-REG-BOF.html">HTTP:EASYLAN-REG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Easy LAN Folder Share .reg FIle Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEASYLAN-REG-BOF1.html">HTTP:EASYLAN-REG-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Easy LAN Folder Share .reg FIle Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLE-EXPLOIT-DWNLD.html">HTTP:EK-ANGLE-EXPLOIT-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash SWF Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-BIN-DWNLD.html">HTTP:EK-ANGLER-BIN-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Encrypted Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-DOWNLOAD.html">HTTP:EK-ANGLER-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Exploit Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH.html">HTTP:EK-ANGLER-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-DOWNLOAD3.html">HTTP:EK-ANGLER-FLASH-DOWNLOAD3</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash SWF Exploit Download 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-DOWNLOAD5.html">HTTP:EK-ANGLER-FLASH-DOWNLOAD5</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash SWF Exploit Download 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-DWNLD.html">HTTP:EK-ANGLER-FLASH-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash SWF Exploit Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-EXPLOIT.html">HTTP:EK-ANGLER-FLASH-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash SWF Exploit Download 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-REQ.html">HTTP:EK-ANGLER-FLASH-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Outbound Adobe Flash Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-FLASH-SHELLCODE.html">HTTP:EK-ANGLER-FLASH-SHELLCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Adobe Flash Encoded Shellcode Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-IE-SHELLCODE.html">HTTP:EK-ANGLER-IE-SHELLCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Internet Explorer Encoded Shellcode Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-JAVA.html">HTTP:EK-ANGLER-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Exploit Kit Angler Java
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-JAVA-REQ.html">HTTP:EK-ANGLER-JAVA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Outbound Oracle Java Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-JAVA-SHELLCODE.html">HTTP:EK-ANGLER-JAVA-SHELLCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Oracle Java Encoded Shellcode Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-JAVA1.html">HTTP:EK-ANGLER-JAVA1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Exploit Kit Angler Java1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LANDING-PG.html">HTTP:EK-ANGLER-LANDING-PG</a></b></td>
   <td width="500" valign="top">
    Angler Exploit Kit Landing Page2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP.html">HTTP:EK-ANGLER-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP-1.html">HTTP:EK-ANGLER-LP-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP-2.html">HTTP:EK-ANGLER-LP-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP-DETECTED.html">HTTP:EK-ANGLER-LP-DETECTED</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP2.html">HTTP:EK-ANGLER-LP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP3.html">HTTP:EK-ANGLER-LP3</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP4.html">HTTP:EK-ANGLER-LP4</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-LP5.html">HTTP:EK-ANGLER-LP5</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Landing Page Detected 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-OBFU-FLASH1.html">HTTP:EK-ANGLER-OBFU-FLASH1</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Obfuscated Flash Actionscript Classname Detected 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-OUT-URL.html">HTTP:EK-ANGLER-OUT-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Outbound URL Structure 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-OUTBOUND-URL.html">HTTP:EK-ANGLER-OUTBOUND-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Outbound URL Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-RELAY.html">HTTP:EK-ANGLER-RELAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Relay Traffic Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-RELAY-TRAFFIC.html">HTTP:EK-ANGLER-RELAY-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Relay Traffic Detected1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-URI-STRUCT.html">HTTP:EK-ANGLER-URI-STRUCT</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Outbound URI Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ASTRUM-DWNLD-REQ.html">HTTP:EK-ASTRUM-DWNLD-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Astrum Exploit Kit Multiple Exploit Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLACKHOLE-LP.html">HTTP:EK-BLACKHOLE-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackhole Exploit Kit Landing Page Requested
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLACKHOLE-V2-LP1.html">HTTP:EK-BLACKHOLE-V2-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackholev2/Darkleech Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDING0LIFE-MOD-CALL2.html">HTTP:EK-BLEEDING0LIFE-MOD-CALL2</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD.html">HTTP:EK-BLEEDINGLIFE-MOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-C12.html">HTTP:EK-BLEEDINGLIFE-MOD-C12</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 12
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CAL.html">HTTP:EK-BLEEDINGLIFE-MOD-CAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CALL.html">HTTP:EK-BLEEDINGLIFE-MOD-CALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CALL10.html">HTTP:EK-BLEEDINGLIFE-MOD-CALL10</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 10
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CALL11.html">HTTP:EK-BLEEDINGLIFE-MOD-CALL11</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CALL8.html">HTTP:EK-BLEEDINGLIFE-MOD-CALL8</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-BLEEDINGLIFE-MOD-CALL9.html">HTTP:EK-BLEEDINGLIFE-MOD-CALL9</a></b></td>
   <td width="500" valign="top">
    HTTP: Bleeding Life Exploit Kit Module Call 9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CK-LANDING-PAGE.html">HTTP:EK-CK-LANDING-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: CK Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CK-MAL-JS-PACKER.html">HTTP:EK-CK-MAL-JS-PACKER</a></b></td>
   <td width="500" valign="top">
    HTTP: CK Exploit Kit Malicious Javascript Packer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-COTTONCASTLE-DECRYPT-OR.html">HTTP:EK-COTTONCASTLE-DECRYPT-OR</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Decryption Page Outbound Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-COTTONCASTLE-FLASH-OC.html">HTTP:EK-COTTONCASTLE-FLASH-OC</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Flash Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-COTTONCASTLE-JAVA-CONN.html">HTTP:EK-COTTONCASTLE-JAVA-CONN</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Java Outbound Connection 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-COTTONCASTLE-JAVA-OC.html">HTTP:EK-COTTONCASTLE-JAVA-OC</a></b></td>
   <td width="500" valign="top">
    HTTP: CottonCastle Exploit Kit Java Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-CONN.html">HTTP:EK-CRIMEBOSS-CONN</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-DA.html">HTTP:EK-CRIMEBOSS-DA</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Portable Executable Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-JAVA-ED.html">HTTP:EK-CRIMEBOSS-JAVA-ED</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Java Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-JED.html">HTTP:EK-CRIMEBOSS-JED</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Java Exploit Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-JO.html">HTTP:EK-CRIMEBOSS-JO</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Java On
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-PEDA.html">HTTP:EK-CRIMEBOSS-PEDA</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Portable Executable Download Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-PEXEC.html">HTTP:EK-CRIMEBOSS-PEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Portable Executable Download Attempt 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-RA.html">HTTP:EK-CRIMEBOSS-RA</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-SA.html">HTTP:EK-CRIMEBOSS-SA</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Stats Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-SETUP.html">HTTP:EK-CRIMEBOSS-SETUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Setup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEBOSS-SL.html">HTTP:EK-CRIMEBOSS-SL</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimeboss Exploit Kit Stats Loaded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEPACK-CPA.html">HTTP:EK-CRIMEPACK-CPA</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimepack Exploit Kit Control Panel Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEPACK-DR.html">HTTP:EK-CRIMEPACK-DR</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimepack Exploit Kit Post-Exploit Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIMEPACK-PDF.html">HTTP:EK-CRIMEPACK-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Crimepack Exploit Kit Malicious PDF Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-DA.html">HTTP:EK-CRITX-DA</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Possible Plugin Detection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-EXECUT-REQ.html">HTTP:EK-CRITX-EXECUT-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Portable Executable Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-JAVA-REQ.html">HTTP:EK-CRITX-JAVA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java Exploit Request Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-LANDING-PAGE.html">HTTP:EK-CRITX-LANDING-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Critx Exploit Kit Landng Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-PDF.html">HTTP:EK-CRITX-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Malicious PDF Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-PDF-REQ.html">HTTP:EK-CRITX-PDF-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit PDF Exploit Request Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-PG-REDIRECT.html">HTTP:EK-CRITX-PG-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit Critx Landing Page Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-PR.html">HTTP:EK-CRITX-PR</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Malicious Payload Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-REDIRECT.html">HTTP:EK-CRITX-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Possible Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRITX-REDIRECTION-PAGE.html">HTTP:EK-CRITX-REDIRECTION-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-CRIX-JAVA-ED.html">HTTP:EK-CRIX-JAVA-ED</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java V5 Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-INBOUND-JAVA.html">HTTP:EK-DOTKACHEF-INBOUND-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef Rmayana DotCache Exploit Kit Inbound Java Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-JAVA.html">HTTP:EK-DOTKACHEF-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef Rmayana DotCache Exploit Kit Inbound Java Exploit Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-LP.html">HTTP:EK-DOTKACHEF-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef Rmayana DotCache Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-MAL-CAMP.html">HTTP:EK-DOTKACHEF-MAL-CAMP</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef/Rmayana/DotCache Exploit Kit Malvertising Campaign
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-REDIR.html">HTTP:EK-DOTKACHEF-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef/Rmayana Exploit Kit Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-RMAYANA.html">HTTP:EK-DOTKACHEF-RMAYANA</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef Rmayana DotCache Exploit Kit Zeroaccess Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DOTKACHEF-ZEROACCESS.html">HTTP:EK-DOTKACHEF-ZEROACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: DotkaChef Rmayana DotCache Exploit Kit Zeroaccess Download Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-DRIVEBY-DWNLD.html">HTTP:EK-DRIVEBY-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Exlpoit Kit Driveby Download Redirection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ELEANORE-EFR.html">HTTP:EK-ELEANORE-EFR</a></b></td>
   <td width="500" valign="top">
    HTTP: Eleanore Exploit Kit Exploit Fetch Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ELEANORE-PDF-PR.html">HTTP:EK-ELEANORE-PDF-PR</a></b></td>
   <td width="500" valign="top">
    HTTP: Eleanore Exploit Kit PDF Exploit Page Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ELEANORE-PR.html">HTTP:EK-ELEANORE-PR</a></b></td>
   <td width="500" valign="top">
    HTTP: Eleanore Exploit Kit Post-exploit Page Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FAKE-TRANS-REDIRECT.html">HTTP:EK-FAKE-TRANS-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Fake Transaction Redirect Rage To Exploit Kit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-ADOBE-DWNLD.html">HTTP:EK-FIESTA-ADOBE-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Adobe Reader Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-FLASH-DWLD.html">HTTP:EK-FIESTA-FLASH-DWLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Adobe Flash Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-JAVA-DWNLD.html">HTTP:EK-FIESTA-JAVA-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Oracle Java Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-PD.html">HTTP:EK-FIESTA-PD</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Landing Page Detection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-REDIRECTION.html">HTTP:EK-FIESTA-REDIRECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FIESTA-SILVERLIGHT-DWLD.html">HTTP:EK-FIESTA-SILVERLIGHT-DWLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Fiesta Exploit Kit Microsoft Silverlight Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASH-DWNLD.html">HTTP:EK-FLASH-DWNLD</a></b></td>
   <td width="500" valign="top">
    Multiple exploit kit flash file download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-JAVA-V6.html">HTTP:EK-FLASHPACK-JAVA-V6</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack Safe CritX Exploit Kit Java V6 Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-JAVA-V7.html">HTTP:EK-FLASHPACK-JAVA-V7</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack Safe CritX Exploit Kit Java V7 Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-LP.html">HTTP:EK-FLASHPACK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack Safe CritX Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-MAL-DOWNLOAD.html">HTTP:EK-FLASHPACK-MAL-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack Safe CritX Exploit Kit Malware Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-PLUGIN-DET.html">HTTP:EK-FLASHPACK-PLUGIN-DET</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack Safe CritX Exploit Kit Plugin Detection Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-SAFE-CRITX.html">HTTP:EK-FLASHPACK-SAFE-CRITX</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack/Safe/CritX Exploit Kit Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLASHPACK-SAFE-JAR.html">HTTP:EK-FLASHPACK-SAFE-JAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Flashpack/Safe/CritX Exploit Kit Jar File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLIM-LP.html">HTTP:EK-FLIM-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Flim Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-FLIM-PE-DOWNLOAD.html">HTTP:EK-FLIM-PE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Flim Exploit Kit Portable Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-GLAZUNOV-OUT-JNLP.html">HTTP:EK-GLAZUNOV-OUT-JNLP</a></b></td>
   <td width="500" valign="top">
    HTTP: Glazunov Exploit Kit Outbound jnlp Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-GONGDA-LP.html">HTTP:EK-GONGDA-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Gong Da Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-GONGDA-RP.html">HTTP:EK-GONGDA-RP</a></b></td>
   <td width="500" valign="top">
    HTTP: Gong Da Exploit Kit Redirection Page Received
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-HANJUAN-ER.html">HTTP:EK-HANJUAN-ER</a></b></td>
   <td width="500" valign="top">
    HTTP: Hanjuan Exploit Kit Silverlight Exploit Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-HANJUAN-LP.html">HTTP:EK-HANJUAN-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Hanjuan Exploit Kit Landing Page Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-HELLO-LIGHTOUT-LP.html">HTTP:EK-HELLO-LIGHTOUT-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Hello LightsOut Exploit Kit Landing Page Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-HELLSPAWN-JAVA-REQ.html">HTTP:EK-HELLSPAWN-JAVA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Hellspawn Exploit Kit Outbound Oracle Java Jar Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-HELLSPAWN-LP.html">HTTP:EK-HELLSPAWN-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Hellspawn Exploit Kit Landing Page 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-IFRAMER-INJ-SS.html">HTTP:EK-IFRAMER-INJ-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: IFramer Injection tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-IFRAMER-INJECTION-SS.html">HTTP:EK-IFRAMER-INJECTION-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: IFramer Injection Specific Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-IMPACT-LANDPAGE.html">HTTP:EK-IMPACT-LANDPAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Impact Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-IMPACT-LP.html">HTTP:EK-IMPACT-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Impact Stamp Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-IMPACT-STAMP-LP.html">HTTP:EK-IMPACT-STAMP-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Impact Stamp Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-KAIXIN-ATTACK.html">HTTP:EK-KAIXIN-ATTACK</a></b></td>
   <td width="500" valign="top">
    HTTP: KaiXin Exploit Kit Attack Vector Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-KAIXIN-ATTACK-VECTOR.html">HTTP:EK-KAIXIN-ATTACK-VECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: KaiXin Exploit Kit Attack Vector Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-KAIXIN-JAVA-CLS-DL.html">HTTP:EK-KAIXIN-JAVA-CLS-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: KaiXin Exploit Kit Java Class Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-FONT-FILE-REQ.html">HTTP:EK-MAGNITUDE-FONT-FILE-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude Exploit Kit Embedded Open Type Font File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-IE-REQ.html">HTTP:EK-MAGNITUDE-IE-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude Exploit Kit Microsoft Internet Explorer Payload Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-JAVA.html">HTTP:EK-MAGNITUDE-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit Magnitude Oracle Java
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-JNLP-REQ.html">HTTP:EK-MAGNITUDE-JNLP-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude/Popads/Nuclear Exploit Kit jnlp Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-LANDING-PG.html">HTTP:EK-MAGNITUDE-LANDING-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit Magnitude Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MAGNITUDE-ORACLE.html">HTTP:EK-MAGNITUDE-ORACLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude Exploit Kit Oracle Java
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MIULT-LP-SS.html">HTTP:EK-MIULT-LP-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Landing Page Specific Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-JAR-FILE-DROPPED.html">HTTP:EK-MUL-JAR-FILE-DROPPED</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Jar File Dropped
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-LP-SS.html">HTTP:EK-MUL-LP-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Landing Page Specific Structure 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-PAYLOAD-DOWN-1.html">HTTP:EK-MUL-PAYLOAD-DOWN-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-PE-DOWNLOAD.html">HTTP:EK-MUL-PE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Portable Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-SUCCESSFUL-REDIR.html">HTTP:EK-MUL-SUCCESSFUL-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Successful Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MUL-SUCCESSFUL-REDIR1.html">HTTP:EK-MUL-SUCCESSFUL-REDIR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Successful Redirection 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MULT-JAVA-PAYLOAD.html">HTTP:EK-MULT-JAVA-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Java Payload Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MULT-PAYLOAD-INFO.html">HTTP:EK-MULT-PAYLOAD-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit info.dll Payload Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MULTIPLE-FLASH.html">HTTP:EK-MULTIPLE-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Flash File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MULTIPLE-OUTBOUND.html">HTTP:EK-MULTIPLE-OUTBOUND</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Outbound
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-MULTIPLE-REDIRECTION-GT.html">HTTP:EK-MULTIPLE-REDIRECTION-GT</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Redirection Gate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-FIREFOX.html">HTTP:EK-NAILED-FIREFOX</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Firefox Autopwn Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-FLASH.html">HTTP:EK-NAILED-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Flash Autopwn Remote Code Execution Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-IE.html">HTTP:EK-NAILED-IE</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Internet Explorer Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-JMXBEAN.html">HTTP:EK-NAILED-JMXBEAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit jmxbean Remote Code Execution Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-LANDING-S2.html">HTTP:EK-NAILED-LANDING-S2</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Landing Page Stage 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-LP-SS.html">HTTP:EK-NAILED-LP-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NAILED-RHINO.html">HTTP:EK-NAILED-RHINO</a></b></td>
   <td width="500" valign="top">
    HTTP: Nailed Exploit Kit Rhino Remote Code Execution Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NECLEAR-OBFU-FILE.html">HTTP:EK-NECLEAR-OBFU-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Obfuscated File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-LP.html">HTTP:EK-NEUTRINO-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-LP-2.html">HTTP:EK-NEUTRINO-LP-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Landing Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-LP-3.html">HTTP:EK-NEUTRINO-LP-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-OUT-PLUGIN.html">HTTP:EK-NEUTRINO-OUT-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Outbound Plugin Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-RP.html">HTTP:EK-NEUTRINO-RP</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NEUTRINO-RP-2.html">HTTP:EK-NEUTRINO-RP-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Redirection Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NGLER-BROWSER-VER.html">HTTP:EK-NGLER-BROWSER-VER</a></b></td>
   <td width="500" valign="top">
    HTTP: Angler Exploit Kit Browser Version Detection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-ADOBE-FLASH-1.html">HTTP:EK-NUCLEAR-ADOBE-FLASH-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear/Magnitude Exploit Kit Adobe Flash Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-FLASH-DWNLD.html">HTTP:EK-NUCLEAR-FLASH-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Adobe Flash Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-FLASH-FILE1.html">HTTP:EK-NUCLEAR-FLASH-FILE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Flash File Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-IE-VULN-REQ.html">HTTP:EK-NUCLEAR-IE-VULN-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Microsoft Internet Explorer Vulnerability Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-JAR-DWNLD.html">HTTP:EK-NUCLEAR-JAR-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Jar File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-JAVA-REQ.html">HTTP:EK-NUCLEAR-JAVA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Oracle Java Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LAND-PG.html">HTTP:EK-NUCLEAR-LAND-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page Detected1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LP.html">HTTP:EK-NUCLEAR-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LP-DETECTION.html">HTTP:EK-NUCLEAR-LP-DETECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LP1.html">HTTP:EK-NUCLEAR-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LP2.html">HTTP:EK-NUCLEAR-LP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page Detected 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-LP3.html">HTTP:EK-NUCLEAR-LP3</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Landing Page Detected 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-MS-IE-VULN.html">HTTP:EK-NUCLEAR-MS-IE-VULN</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Microsoft Internet Explorer Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-MS-SILVERLIGH.html">HTTP:EK-NUCLEAR-MS-SILVERLIGH</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Microsoft Silverlight Exploit Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-ORACLE-JAR-FILE.html">HTTP:EK-NUCLEAR-ORACLE-JAR-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Oracle Java Jar File Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-ORACLE-JAVA.html">HTTP:EK-NUCLEAR-ORACLE-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear/Magnitude Exploit Kit Oracle Java Exploit Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-ORACLE-JAVA-1.html">HTTP:EK-NUCLEAR-ORACLE-JAVA-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear/Magnitude Exploit Kit Oracle Java Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-OUT-JAR-REQ.html">HTTP:EK-NUCLEAR-OUT-JAR-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Jar Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-OUTBOUND.html">HTTP:EK-NUCLEAR-OUTBOUND</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Flash Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-OUTBOUND-REQ.html">HTTP:EK-NUCLEAR-OUTBOUND-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit Nuclear Outbound Payload Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-OUTBOUND-STR.html">HTTP:EK-NUCLEAR-OUTBOUND-STR</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-PAYLOAD-REQ.html">HTTP:EK-NUCLEAR-PAYLOAD-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Payload Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-PD.html">HTTP:EK-NUCLEAR-PD</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Payload Delivery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-PDF-REQ.html">HTTP:EK-NUCLEAR-PDF-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Pdf Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-PDF-REQUEST.html">HTTP:EK-NUCLEAR-PDF-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit Nuclear Outbound PDF Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-POST-JAVA-COMP.html">HTTP:EK-NUCLEAR-POST-JAVA-COMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear/Magnitude Exploit Kit Post Java Compromise
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-NUCLEAR-SPOOFED-HOST.html">HTTP:EK-NUCLEAR-SPOOFED-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Spoofed Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ORACLE-JAVA-DWNLD.html">HTTP:EK-ORACLE-JAVA-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Exlpoit Downloads Oracle Java Jar file 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-PHOENIX-POST.html">HTTP:EK-PHOENIX-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: Phoenix Exploit Kit Post Compromise Behavior
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-PORTABLE-EXEC-BAD-DOS.html">HTTP:EK-PORTABLE-EXEC-BAD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Portable Executable Downloaded With Bad DOS Stub
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-POST-COMPRO-STRREV.html">HTTP:EK-POST-COMPRO-STRREV</a></b></td>
   <td width="500" valign="top">
    HTTP: Possible Exploit Kit Post Compromise StrReverse Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-POST-COMPRO-TASKKILL.html">HTTP:EK-POST-COMPRO-TASKKILL</a></b></td>
   <td width="500" valign="top">
    HTTP: Possible Exploit Kit Post Compromise Taskkill Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-PROPACK-OUTBOUND-CONN.html">HTTP:EK-PROPACK-OUTBOUND-CONN</a></b></td>
   <td width="500" valign="top">
    HTTP: ProPack Exploit Kit Outbound Connection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-PROPACK-REQUEST.html">HTTP:EK-PROPACK-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: ProPack Exploit Kit Outbound Payload Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RAWIN-OUTBOUND-JAVA-RET.html">HTTP:EK-RAWIN-OUTBOUND-JAVA-RET</a></b></td>
   <td width="500" valign="top">
    HTTP: Rawin Exploit Kit Outbound Java Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RED-DOT-EXE-RETRI.html">HTTP:EK-RED-DOT-EXE-RETRI</a></b></td>
   <td width="500" valign="top">
    HTTP: Red Dot Executable Retrieval Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RED-DOT-LP1.html">HTTP:EK-RED-DOT-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Red Dot Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-ENC-BIN.html">HTTP:EK-REDKIT-ENC-BIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Encrypted Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-JAVA-EXPLOIT.html">HTTP:EK-REDKIT-JAVA-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Java Exploit Delivery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-LP.html">HTTP:EK-REDKIT-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-LP-1.html">HTTP:EK-REDKIT-LP-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-LP-REDIR.html">HTTP:EK-REDKIT-LP-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-LP-REDIRECTION.html">HTTP:EK-REDKIT-LP-REDIRECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page Redirection 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-LP2.html">HTTP:EK-REDKIT-LP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-REDKIT-OBFUS-PE.html">HTTP:EK-REDKIT-OBFUS-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Obfuscated Portable Executable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RIG-DGA-REQ.html">HTTP:EK-RIG-DGA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Rig Exploit Kit Outbound DGA Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RIG-MS-SILVERLIGHT-REQ.html">HTTP:EK-RIG-MS-SILVERLIGHT-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Rig Exploit Kit Outbound Microsoft Silverlight Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RIG-OUTBOUND-COM.html">HTTP:EK-RIG-OUTBOUND-COM</a></b></td>
   <td width="500" valign="top">
    HTTP: Rig Exploit Kit Outbound Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-RIG-OUTBOUND-COM-1.html">HTTP:EK-RIG-OUTBOUND-COM-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Rig Exploit Kit Outbound Communication1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-EXP-REQ.html">HTTP:EK-SAKURA-EXP-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Exploit Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-JAR.html">HTTP:EK-SAKURA-JAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Rhino Jar Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-JAR-DOWN-DET.html">HTTP:EK-SAKURA-JAR-DOWN-DET</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Jar Download Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-LP-REC.html">HTTP:EK-SAKURA-LP-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Landing Page Received
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-LT.html">HTTP:EK-SAKURA-LT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Logo Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-PDF-DOWN.html">HTTP:EK-SAKURA-PDF-DOWN</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Pdf Download Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SAKURA-REDIR-STRUCT.html">HTTP:EK-SAKURA-REDIR-STRUCT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Redirection Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SCANBOX-ENUM.html">HTTP:EK-SCANBOX-ENUM</a></b></td>
   <td width="500" valign="top">
    HTTP: Scanbox Exploit Kit Enumeration Code Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SCANBOX-ENUM-CD.html">HTTP:EK-SCANBOX-ENUM-CD</a></b></td>
   <td width="500" valign="top">
    HTTP: Scanbox Exploit Kit Enumeration Code Detected 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SCANBOX-EXFILTER1.html">HTTP:EK-SCANBOX-EXFILTER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Scanbox Exploit Kit Exfiltration Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SCANBOX-EXFILTRATION.html">HTTP:EK-SCANBOX-EXFILTRATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Scanbox Exploit Kit Exfiltration Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SET-JAVA-APPLET-LOAD.html">HTTP:EK-SET-JAVA-APPLET-LOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: SET Java Applet Load Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SIBHOST.html">HTTP:EK-SIBHOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Sibhost Exploit Kit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STAMP-LP.html">HTTP:EK-STAMP-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STAMP-MAL-PYLOAD-DL.html">HTTP:EK-STAMP-MAL-PYLOAD-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit Malicious Payload Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STAMP-PE-DOWNLOAD.html">HTTP:EK-STAMP-PE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit Portable Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-JORG.html">HTTP:EK-STYX-JORG</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Plugin Detection Connection Jorg
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-JOVF.html">HTTP:EK-STYX-JOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Plugin Detection Connection Jovf
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-LANDPAGE.html">HTTP:EK-STYX-LANDPAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-LP.html">HTTP:EK-STYX-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-LP-3.html">HTTP:EK-STYX-LP-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-LP1.html">HTTP:EK-STYX-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-LP4.html">HTTP:EK-STYX-LP4</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-MAL-REDIR.html">HTTP:EK-STYX-MAL-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Malicious Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-OUT-CONN.html">HTTP:EK-STYX-OUT-CONN</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Outbound Connection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-STYX-REDIRECTION-PAGE.html">HTTP:EK-STYX-REDIRECTION-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SUSPICIOUS-FILESYSOBJ.html">HTTP:EK-SUSPICIOUS-FILESYSOBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious StrReverse Scripting FileSystemObject
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SUSPICIOUS-REV-SHELL.html">HTTP:EK-SUSPICIOUS-REV-SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious StrReverse Shell
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SUSPICIOUS-TASKKILL.html">HTTP:EK-SUSPICIOUS-TASKKILL</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Taskkill Script StrReverse
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-JAR-LP.html">HTTP:EK-SWEET-ORANGE-JAR-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-LP.html">HTTP:EK-SWEET-ORANGE-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-LP-URI.html">HTTP:EK-SWEET-ORANGE-LP-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page in.php Base64 URI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-LP2.html">HTTP:EK-SWEET-ORANGE-LP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-LP3.html">HTTP:EK-SWEET-ORANGE-LP3</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-LP4.html">HTTP:EK-SWEET-ORANGE-LP4</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEET-ORANGE-STRUCT-LP.html">HTTP:EK-SWEET-ORANGE-STRUCT-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEETORAANGE-LP.html">HTTP:EK-SWEETORAANGE-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEETORANGE-LANDPAGE.html">HTTP:EK-SWEETORANGE-LANDPAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet-Orange Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEETORANGE-LP.html">HTTP:EK-SWEETORANGE-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Landing Page2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-SWEETORANGE-OC.html">HTTP:EK-SWEETORANGE-OC</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Non-standard Port Outbound Connection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TELETUBBIES-PAYLOAD-1.html">HTTP:EK-TELETUBBIES-PAYLOAD-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TELETUBBIES-SEC.html">HTTP:EK-TELETUBBIES-SEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Secondary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TELETUBBIES-SEC-PAYLOAD.html">HTTP:EK-TELETUBBIES-SEC-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Secondary Payload 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TOPIC-OUTBOUND-C1.html">HTTP:EK-TOPIC-OUTBOUND-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Topic Exploit Kit Outbound Connection 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TOPIC-OUTBOUND-C2.html">HTTP:EK-TOPIC-OUTBOUND-C2</a></b></td>
   <td width="500" valign="top">
    HTTP: Topic Exploit Kit Outbound Connection 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TOPIC-OUTBOUND-C3.html">HTTP:EK-TOPIC-OUTBOUND-C3</a></b></td>
   <td width="500" valign="top">
    HTTP: Topic Exploit Kit Outbound Connection 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-TOPIC-OUTBOUND-C4.html">HTTP:EK-TOPIC-OUTBOUND-C4</a></b></td>
   <td width="500" valign="top">
    HTTP: Topic Exploit Kit Outbound Connection 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-UNIX-BACKDOOR-CDORKED.html">HTTP:EK-UNIX-BACKDOOR-CDORKED</a></b></td>
   <td width="500" valign="top">
    HTTP: Unix Backdoor Cdorked Blackhole Request Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-UNKNOWN-MAL-HOSTILE.html">HTTP:EK-UNKNOWN-MAL-HOSTILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Malvertising Exploit Kit Hostile Jar pipe.class
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-UNKNOWN-MAL-S1.html">HTTP:EK-UNKNOWN-MAL-S1</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Malvertising Exploit Kit Stage 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-UNKNOWN-SCRIPT-INJ.html">HTTP:EK-UNKNOWN-SCRIPT-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Exploit Kit Script Injection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-URI-MALREQ.html">HTTP:EK-URI-MALREQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Exploit Kit URI Request For Known Malicious URI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-WHITEHOLE-LP.html">HTTP:EK-WHITEHOLE-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Whitehole Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-X20-POST-JAVA-EXPLOIT.html">HTTP:EK-X20-POST-JAVA-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: X2O Exploit Kit Post Java Exploit Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ZUPONCIC-LP.html">HTTP:EK-ZUPONCIC-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Zuponcic Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEK-ZUPONCIC-ORACLE-JAVA.html">HTTP:EK-ZUPONCIC-ORACLE-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Zuponcic Exploit Kit Oracle Java File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AELASTICSEARCH-REST-ACE.html">HTTP:ELASTICSEARCH-REST-ACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Elastic Search Rest Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEMBED-IFRAME-REDIR-EK2.html">HTTP:EMBED-IFRAME-REDIR-EK2</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEMBED-IFRAMEINJ-TOOL.html">HTTP:EMBED-IFRAMEINJ-TOOL</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Injection Tool Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEMBEDDED-IFRAME-REDIR.html">HTTP:EMBEDDED-IFRAME-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEMC-DPA-EJBSERVLET-RCE.html">HTTP:EMC-DPA-EJBSERVLET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: EMC Data Protection Advisor Illuminator EJBInvokerServlet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEMC-DPA-EJBSERVLET-RCE1.html">HTTP:EMC-DPA-EJBSERVLET-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: EMC Data Protection Advisor Illuminator EJBInvokerServlet Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AESTSOFT-ALZIP-MIM-BO.html">HTTP:ESTSOFT-ALZIP-MIM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: ESTsoft ALZip MIM File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AESTSOFT-ALZIP-MIM-BO1.html">HTTP:ESTSOFT-ALZIP-MIM-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: ESTsoft ALZip MIM File Processing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-CONTACTS-EXE.html">HTTP:EXPLOIT-KIT-CONTACTS-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit contacts.exe Payload Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-CRITX-JAVA-V6.html">HTTP:EXPLOIT-KIT-CRITX-JAVA-V6</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java V6 Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-CRITX-JAVA-V7.html">HTTP:EXPLOIT-KIT-CRITX-JAVA-V7</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit Java V7 Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-CRITX-PDF.html">HTTP:EXPLOIT-KIT-CRITX-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: CritX Exploit Kit PDF Library Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-JAR-DOWNLOAD.html">HTTP:EXPLOIT-KIT-JAR-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Malicious Jar Archive Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-JAR-REDIRECT.html">HTTP:EXPLOIT-KIT-JAR-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Redirect To Malicious Java Archive Aattempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-JAVA-USR-AGENT.html">HTTP:EXPLOIT-KIT-JAVA-USR-AGENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Java User-Agent Flowbit Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-JDB-LP.html">HTTP:EXPLOIT-KIT-JDB-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: JDB Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-JDB-LP1.html">HTTP:EXPLOIT-KIT-JDB-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: JDB Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-PROPACK.html">HTTP:EXPLOIT-KIT-PROPACK</a></b></td>
   <td width="500" valign="top">
    HTTP: ProPack Exploit Kit Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-REDIRECTION-PG.html">HTTP:EXPLOIT-KIT-REDIRECTION-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: Unknown Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-REDKIT.html">HTTP:EXPLOIT-KIT-REDKIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-STYX-EXE.html">HTTP:EXPLOIT-KIT-STYX-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Portable Executable Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT-KIT-STYX-PLU.html">HTTP:EXPLOIT-KIT-STYX-PLU</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Plugin Detection Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AAMBIG-CONTENT-LEN.html">HTTP:EXPLOIT:AMBIG-CONTENT-LEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Ambiguous Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AAMBIG-CONTENT-LEN1.html">HTTP:EXPLOIT:AMBIG-CONTENT-LEN1</a></b></td>
   <td width="500" valign="top">
    HTTP: Ambiguous Content Length 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ABIN-IN-AUTH-BASIC.html">HTTP:EXPLOIT:BIN-IN-AUTH-BASIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Basic Authentication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ABRUTE-FORCE.html">HTTP:EXPLOIT:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ABRUTE-SEARCH.html">HTTP:EXPLOIT:BRUTE-SEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Brute Search Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AD-LINK-ADMIN-PW.html">HTTP:EXPLOIT:D-LINK-ADMIN-PW</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Admin Password Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AD-LINK-ADMIN-PW1.html">HTTP:EXPLOIT:D-LINK-ADMIN-PW1</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Admin Password Probe1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AFP2K-ASP-UPLOAD.html">HTTP:EXPLOIT:FP2K-ASP-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage 2000 ASP File Upload Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AGENERIC-EVASION-AT.html">HTTP:EXPLOIT:GENERIC-EVASION-AT</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Evasion Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AHOST-RANDOM-1.html">HTTP:EXPLOIT:HOST-RANDOM-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Randomized Host Header (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AHOST-RANDOM-2.html">HTTP:EXPLOIT:HOST-RANDOM-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Randomized Host Header (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AHOST-RANDOM-3.html">HTTP:EXPLOIT:HOST-RANDOM-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Randomized Host Header (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AHOST-RANDOM-4.html">HTTP:EXPLOIT:HOST-RANDOM-4</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Randomized Host Header (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AHOST-RANDOM-5.html">HTTP:EXPLOIT:HOST-RANDOM-5</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Randomized Host Header (5)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AIE-SAVE-AS-HIDE.html">HTTP:EXPLOIT:IE-SAVE-AS-HIDE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Save As Extension Hiding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AILLEGAL-HOST-CHAR.html">HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Illegal Characters in Host Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AILLEGAL-HOST-CHR-1.html">HTTP:EXPLOIT:ILLEGAL-HOST-CHR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Illegal Characters in Host Header Field (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AMAL-LNK.html">HTTP:EXPLOIT:MAL-LNK</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft LNK File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AMAL-LNK1.html">HTTP:EXPLOIT:MAL-LNK1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft LNK File Download1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AMS-DOS-DEV.html">HTTP:EXPLOIT:MS-DOS-DEV</a></b></td>
   <td width="500" valign="top">
    HTTP: MS-DOS Device Name in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AMS-TCPSTACK-URLDOS.html">HTTP:EXPLOIT:MS-TCPSTACK-URLDOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TCP-IP Stack URL QoS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3API3WEB-USERS.html">HTTP:EXPLOIT:PI3WEB-USERS</a></b></td>
   <td width="500" valign="top">
    HTTP: Pi3Web ISAPI Users Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AREDMINE-CMD-EXEC.html">HTTP:EXPLOIT:REDMINE-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Redmine SCM Repository Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASHOUTCAST-FMT-STR.html">HTTP:EXPLOIT:SHOUTCAST-FMT-STR</a></b></td>
   <td width="500" valign="top">
    HTTP: Shoutcast Format String Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASLASH-EVASION.html">HTTP:EXPLOIT:SLASH-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackhole Forward-Slash Evasion Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASMALL-FIRST-DATA.html">HTTP:EXPLOIT:SMALL-FIRST-DATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Small First Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASQLXML-ISAPI-OF.html">HTTP:EXPLOIT:SQLXML-ISAPI-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server SQLXML-ASAPI Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASWS-NO-LINEFEED.html">HTTP:EXPLOIT:SWS-NO-LINEFEED</a></b></td>
   <td width="500" valign="top">
    HTTP: SWS Web Server &quot;No-Linefeed&quot; DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASYM-FILEUPLOAD.html">HTTP:EXPLOIT:SYM-FILEUPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Backup FileUpload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AURI-RANDOM-HOST.html">HTTP:EXPLOIT:URI-RANDOM-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious URI Request with Randomized Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AVAR-RESPONSE-SPLIT.html">HTTP:EXPLOIT:VAR-RESPONSE-SPLIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Response Splitting in HTTP Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AWEBMIN-FS-INT.html">HTTP:EXPLOIT:WEBMIN-FS-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: Webmin Format String Integer Wrap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AWEBSTER-URL-OF.html">HTTP:EXPLOIT:WEBSTER-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Webster HTTP Server Long Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AXERVER-NULL-INJ.html">HTTP:EXPLOIT:XERVER-NULL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Xerver NULL Char Injection In URI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AXITAMI-HEAD-DOS.html">HTTP:EXPLOIT:XITAMI-HEAD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: iMatix Xitami Web Server HEAD Processing Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-CHM.html">HTTP:EXT:DOT-CHM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Compiled Help (.chm) File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-GRP.html">HTTP:EXT:DOT-GRP</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Groupfile Download via HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-HLP.html">HTTP:EXT:DOT-HLP</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Help File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-JOB.html">HTTP:EXT:DOT-JOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Task Scheduler (.job) File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-LNK.html">HTTP:EXT:DOT-LNK</a></b></td>
   <td width="500" valign="top">
    HTTP: .LNK File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-PIF.html">HTTP:EXT:DOT-PIF</a></b></td>
   <td width="500" valign="top">
    HTTP: PIF File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-PPT.html">HTTP:EXT:DOT-PPT</a></b></td>
   <td width="500" valign="top">
    HTTP: PowerPoint Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-RAT.html">HTTP:EXT:DOT-RAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-RPT.html">HTTP:EXT:DOT-RPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Crystal Reports .RPT File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-UNSAFE.html">HTTP:EXT:DOT-UNSAFE</a></b></td>
   <td width="500" valign="top">
    HTTP: Unsafe File Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-VML.html">HTTP:EXT:DOT-VML</a></b></td>
   <td width="500" valign="top">
    HTTP: .VML File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ADOT-XUL.html">HTTP:EXT:DOT-XUL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XUL Browser Interface Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3AFILE-EXT-IN-DIR.html">HTTP:EXT:FILE-EXT-IN-DIR</a></b></td>
   <td width="500" valign="top">
    HTTP: File Extension in Directory Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3AHTRSRCFRAG.html">HTTP:EXT:HTRSRCFRAG</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS HTR Source Fragment Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3AMETAFILE.html">HTTP:EXT:METAFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Metafile Extension Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ARAT-SVR-PUSH.html">HTTP:EXT:RAT-SVR-PUSH</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File Download (Server Push)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ASCR.html">HTTP:EXT:SCR</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous Extension Download (SCR)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AEXT%3ASCR3.html">HTTP:EXT:SCR3</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous Extension Download (SCR)3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFIREFLY-MEDIA-SERVER-DOS1.html">HTTP:FIREFLY-MEDIA-SERVER-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefly Media Server Denial Of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFIREFOX-IDN-SPOOF.html">HTTP:FIREFOX-IDN-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products IDN Spoofing Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFIREFOX-XDOMAIN-INFODISC.html">HTTP:FIREFOX-XDOMAIN-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFORTINET-HELLO-MSG-BOF.html">HTTP:FORTINET-HELLO-MSG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Fortinet Single Sign On Message Dispatcher Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFORTINET-HELLO-MSG-DOS.html">HTTP:FORTINET-HELLO-MSG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Fortinet Single Sign On Hello Message Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFORTINET-HELLO-MSG-DOS1.html">HTTP:FORTINET-HELLO-MSG-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Fortinet Single Sign On Hello Message Denial Of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFOXIT-FF-URL-STG-BO.html">HTTP:FOXIT-FF-URL-STG-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFOXIT-FF-URL-STG-BO1.html">HTTP:FOXIT-FF-URL-STG-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFOXIT-PNG-PDF-BO.html">HTTP:FOXIT-PNG-PDF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Multiple Products PNG To PDF Conversion Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFOXIT-PNG-PDF-BO1.html">HTTP:FOXIT-PNG-PDF-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Multiple Products PNG To PDF Conversion Heap Buffer Overflow2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFOXIT-PNG-PDF-BO11.html">HTTP:FOXIT-PNG-PDF-BO11</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Multiple Products PNG To PDF Conversion Heap Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3AADMIN.PWD-REQ.html">HTTP:FRONTPAGE:ADMIN.PWD-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Frontpage: administrators.pwd File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3AAUTH-PWD-PROBE.html">HTTP:FRONTPAGE:AUTH-PWD-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Frontpage Authors.pwd Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3AAUTHOR-PWD-INFO.html">HTTP:FRONTPAGE:AUTHOR-PWD-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3ADOS-NAME-DOS.html">HTTP:FRONTPAGE:DOS-NAME-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Frontpage MS-DOS Device Name DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3AFRM-RES-PROBE.html">HTTP:FRONTPAGE:FRM-RES-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: Frontpage Form_results Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFRONTPAGE%3ASERVICE.PWD-REQ.html">HTTP:FRONTPAGE:SERVICE.PWD-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Frontpage service.pwd File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFTP-ACTIVEX-CE.html">HTTP:FTP-ACTIVEX-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Attachmate Reflection FTP Client ActiveX CE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AFTP-ACTIVEX-CE1.html">HTTP:FTP-ACTIVEX-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Attachmate Reflection FTP Client ActiveX CE1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AG01PACK-EK-REDIR.html">HTTP:G01PACK-EK-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: g01pack Exploit Kit Redirection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGD-GRAPHICS-PNG.html">HTTP:GD-GRAPHICS-PNG</a></b></td>
   <td width="500" valign="top">
    HTTP: GD Graphics Library PNG Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGD-GRAPHICS-PNG1.html">HTTP:GD-GRAPHICS-PNG1</a></b></td>
   <td width="500" valign="top">
    HTTP: GD Graphics Library PNG Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGLAZUNOV-EK-DL.html">HTTP:GLAZUNOV-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Glazunov Exploit Kit Zip File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGLAZUNOV-EK-LP.html">HTTP:GLAZUNOV-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Glazunov Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGLPI-INSTALLPHP-RCE.html">HTTP:GLPI-INSTALLPHP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: GLPI install.php Script Arbitrary Command and SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGMAIL%3AFILE-DOWNLOAD.html">HTTP:GMAIL:FILE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Gmail File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGMAIL%3AFILE-UPLOAD.html">HTTP:GMAIL:FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Gmail File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGONG-DA-EK-JAVAREQ.html">HTTP:GONG-DA-EK-JAVAREQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Gong Da Exploit Kit Java Exploit Requested
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGONGDA-EK-LAND-PG2.html">HTTP:GONGDA-EK-LAND-PG2</a></b></td>
   <td width="500" valign="top">
    HTTP: Gong Da Exploit Kit Landing Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGONGDA-EK-REQ1.html">HTTP:GONGDA-EK-REQ1</a></b></td>
   <td width="500" valign="top">
    HTTP: Gong Da Exploit Kit Java Exploit Requested 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOOGLE-SKETCHUP-BMP-BO.html">HTTP:GOOGLE-SKETCHUP-BMP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOOGLE-SKETCHUP-BMP-BO1.html">HTTP:GOOGLE-SKETCHUP-BMP-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664)1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-EK-BIN.html">HTTP:GOON-EK-BIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon Exploit Kit Encrypted Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-EK-ENC-DL.html">HTTP:GOON-EK-ENC-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon Exploit Kit Encrypted Binary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-EK-EXE.html">HTTP:GOON-EK-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon Exploit Kit Malicious Portable Executable File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-EK-LP.html">HTTP:GOON-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-EK-LP1.html">HTTP:GOON-EK-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AGOON-INFIN-EK-IFRAME.html">HTTP:GOON-INFIN-EK-IFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Goon/Infinity Exploit Kit Iframe Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHANJUAN-EK.html">HTTP:HANJUAN-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: Hanjuan Exploit Kit Encrypted Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHELLO-EK.html">HTTP:HELLO-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: Hello Exploit Kit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHELLO-EK-3.html">HTTP:HELLO-EK-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Hello Exploit Kit3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHELLO-EK-PAYLOAD.html">HTTP:HELLO-EK-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Hello Exploit Kit Payload Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHELLO-EK-XP.html">HTTP:HELLO-EK-XP</a></b></td>
   <td width="500" valign="top">
    HTTP: Hello Exploit Kit1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHIMAN-EK-DL.html">HTTP:HIMAN-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Payload Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHIMAN-EK-DL-2.html">HTTP:HIMAN-EK-DL-2</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Payload Download Attempt 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-LP-FLASH.html">HTTP:HITMAN-EK-LP-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Flash Exploit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-OUT.html">HTTP:HITMAN-EK-OUT</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Outbound Exploit Retrieval Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-OUTBOUND.html">HTTP:HITMAN-EK-OUTBOUND</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Outbound Flash Exploit Retrieval Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-PAYLOAD.html">HTTP:HITMAN-EK-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Outbound Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-PAYLOAD2.html">HTTP:HITMAN-EK-PAYLOAD2</a></b></td>
   <td width="500" valign="top">
    HTTP: Himan Exploit Kit Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-EK-POST.html">HTTP:HITMAN-EK-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: HiMan Exploit Kit Outbound POST
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHITMAN-PAYLOAD-EK.html">HTTP:HITMAN-PAYLOAD-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: Himan Exploit Kit Payload 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3AEXE-DOWNLOAD.html">HTTP:HOTMAIL:EXE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Hotmail Executable File Extension Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3AFILE-DOWNLOAD.html">HTTP:HOTMAIL:FILE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Hotmail File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3AFILE-UPLOAD.html">HTTP:HOTMAIL:FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Hotmail File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3ALIVE-ACTIVITY.html">HTTP:HOTMAIL:LIVE-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live User Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3ALIVE-ATTACH.html">HTTP:HOTMAIL:LIVE-ATTACH</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3ALIVE-EXE-ATTACH.html">HTTP:HOTMAIL:LIVE-EXE-ATTACH</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live Executable File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHOTMAIL%3AZIP-DOWNLOAD.html">HTTP:HOTMAIL:ZIP-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Hotmail Compressed File Extension Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-INSIGHT-DIAGNOSTICS-LF1.html">HTTP:HP-INSIGHT-DIAGNOSTICS-LF1</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Insight Diagnostics CVE-2013-3575 Local File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-INSIGHT-DIAGNOSTICS-LFI.html">HTTP:HP-INSIGHT-DIAGNOSTICS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Insight Diagnostics CVE-2013-3575 Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-PRINTER-INFO-DISCLOSUR1.html">HTTP:HP-PRINTER-INFO-DISCLOSUR1</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LaserJet Pro Printers Remote Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-PRINTER-INFO-DISCLOSURE.html">HTTP:HP-PRINTER-INFO-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LaserJet Pro Printers Remote Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-SITESCOPE-INF-DISC.html">HTTP:HP-SITESCOPE-INF-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: HP SiteScope Log Analyzer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHP-SITESCOPE-INF-DISC1.html">HTTP:HP-SITESCOPE-INF-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: HP SiteScope Log Analyzer Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AHTTP-INVALID-PORT-VALUE.html">HTTP:HTTP-INVALID-PORT-VALUE</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Port Value in Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIESHIMS-DLL-HIJACK.html">HTTP:IESHIMS-DLL-HIJACK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer IESHIMS.DLL Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIESHIMS-DLL-HIJACK1.html">HTTP:IESHIMS-DLL-HIJACK1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer IESHIMS.DLL Insecure Library Loading1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR.html">HTTP:IFRAME-EK-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR3.html">HTTP:IFRAME-EK-REDIR3</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR4.html">HTTP:IFRAME-EK-REDIR4</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR5.html">HTTP:IFRAME-EK-REDIR5</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR6.html">HTTP:IFRAME-EK-REDIR6</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAME-EK-REDIR7.html">HTTP:IFRAME-EK-REDIR7</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Iframe Redirection Exploit Kit Indicator 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAMER-EK-EMBEDJS.html">HTTP:IFRAMER-EK-EMBEDJS</a></b></td>
   <td width="500" valign="top">
    HTTP: IFRAMEr Tool Embedded Javascript Attack Method Specific Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAMER-IFRAMEINJ-EK.html">HTTP:IFRAMER-IFRAMEINJ-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: IFramer Toolkit Injected Iframe Detected Specific Structure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIFRAMER-INJ-DETECTION.html">HTTP:IFRAMER-INJ-DETECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: IFRAMEr Injection Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3A4-INTERNAL-IP-DISC.html">HTTP:IIS:4-INTERNAL-IP-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 4.0 Internal IP Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AAD-SERVER-CONFIG.html">HTTP:IIS:AD-SERVER-CONFIG</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Ad Server Configuration Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AADFS-MAL-HEADER.html">HTTP:IIS:ADFS-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Active Directory Federation Services Malicious Header Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AADMIN-PROBE.html">HTTP:IIS:ADMIN-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Admin Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASN-1-BOF.html">HTTP:IIS:ASN-1-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: ASN.1 Stack-Based Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASN.1-BIT-STRING.html">HTTP:IIS:ASN.1-BIT-STRING</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Malformed ASN.1 Bit String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-CHUNKED-OF.html">HTTP:IIS:ASP-CHUNKED-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP Chunked Encoding Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-DOT-NET-BACKSLASH.html">HTTP:IIS:ASP-DOT-NET-BACKSLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP.Net Directory Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-DOT-NET-VSTATE.html">HTTP:IIS:ASP-DOT-NET-VSTATE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP .NET ViewState Input Sanitization
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-FORMS-DISCLOSURE.html">HTTP:IIS:ASP-FORMS-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: ASP.NET Forms Authentication Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-NET-FORM-REDIRECT.html">HTTP:IIS:ASP-NET-FORM-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Form Authentication Insecure Redirect 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-NET-MVC-SEC-BYPASS.html">HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: ASP.NET MVC Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-PAGE-BOF.html">HTTP:IIS:ASP-PAGE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Server Crafted ASP Page Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-RCE.html">HTTP:IIS:ASP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Information Services ASP Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-SEARCH-PROBE.html">HTTP:IIS:ASP-SEARCH-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP Search Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-SHOWCODE.html">HTTP:IIS:ASP-SHOWCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP Showcode Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASPNET-DISCLOSURE.html">HTTP:IIS:ASPNET-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: ASP.NET File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASPNET-DOS.html">HTTP:IIS:ASPNET-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: ASP.NET Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASPX-DOS.html">HTTP:IIS:ASPX-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 6.0 aux.aspx Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AASPX-URL.html">HTTP:IIS:ASPX-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Crafted ASP URL Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ABAT-AMP.html">HTTP:IIS:BAT-AMP</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .bat?&amp; Arbitrary File Exec
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ACGI-BIN-CMD-EXE.html">HTTP:IIS:CGI-BIN-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS cgi-bin/cmd.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ACMDSHELL-ATTEMPT.html">HTTP:IIS:CMDSHELL-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Cmdshell Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ACMS%3AMAL-CMS-REQ.html">HTTP:IIS:CMS:MAL-CMS-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Content Management Server Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ACMS%3AMAL-CMS-REQ-2.html">HTTP:IIS:CMS:MAL-CMS-REQ-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Content Management Server Request (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ACOLDFUSION-INFOLEAK.html">HTTP:IIS:COLDFUSION-INFOLEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: ColdFusion MX 6.1 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ADATA-DISCLOSURE.html">HTTP:IIS:DATA-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP ::$Data Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ADIR-BYPASS.html">HTTP:IIS:DIR-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Directory Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ADLL-URL-REQ.html">HTTP:IIS:DLL-URL-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS .DLL URL Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ADOT-NET-SERVER-DOS.html">HTTP:IIS:DOT-NET-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Dot Net Technology  Server Side Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3APERC-PERC-1.html">HTTP:IIS:ENCODING:PERC-PERC-1</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Double Percentage Encoding (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3APERC-PERC-2.html">HTTP:IIS:ENCODING:PERC-PERC-2</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Double Percentage Encoding (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3APERC-PERC-3.html">HTTP:IIS:ENCODING:PERC-PERC-3</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Double Percentage Encoding (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3ASINGLE-DIG-1.html">HTTP:IIS:ENCODING:SINGLE-DIG-1</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Single Encoding (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3ASINGLE-DIG-2.html">HTTP:IIS:ENCODING:SINGLE-DIG-2</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Single Encoding (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3AUNICODE.html">HTTP:IIS:ENCODING:UNICODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Unicode Encoding in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3AUNICODE-BP.html">HTTP:IIS:ENCODING:UNICODE-BP</a></b></td>
   <td width="500" valign="top">
    HTTP: Half-Full Width Unicode Encoding and Double Encoding Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AENUMDSN-ATTEMPT.html">HTTP:IIS:ENUMDSN-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS SQL Server xp_enumdsn Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AEXAIR-DOS.html">HTTP:IIS:EXAIR-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ExAir DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AFASTCGI.html">HTTP:IIS:FASTCGI</a></b></td>
   <td width="500" valign="top">
    HTTP: FastCGI Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AFILE-LIST-ATTEMPT.html">HTTP:IIS:FILE-LIST-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Filelist Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AFP30REG-CSS1.html">HTTP:IIS:FP30REG-CSS1</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS fp30reg.dll Cross-Site Scripting Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AFPCOUNT-OVERFLOW.html">HTTP:IIS:FPCOUNT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 4.0 fpcount.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AHDR-EVASION.html">HTTP:IIS:HDR-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS URL-Encoded Header Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AHEADER-HOST-DOS.html">HTTP:IIS:HEADER-HOST-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Host Header DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AHTR-OF-2.html">HTTP:IIS:HTR-OF-2</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .Htr Overflow Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AHTR-OVERFLOW.html">HTTP:IIS:HTR-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS HTR/IDC/STM Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AHTW-CROSS-SITE.html">HTTP:IIS:HTW-CROSS-SITE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .htw Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-6-7-AUTH-BYPASS.html">HTTP:IIS:IIS-6-7-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    Microsoft IIS 6.0 / 7.5 Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-ADS-BYPASS.html">HTTP:IIS:IIS-ADS-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Alternate Data Stream Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-AUTH-BYPASS.html">HTTP:IIS:IIS-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Information Services (IIS) Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-BYPASS.html">HTTP:IIS:IIS-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS 5 NTLM and Basic Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-DISC.html">HTTP:IIS:IIS-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-EXT-BYPASS.html">HTTP:IIS:IIS-EXT-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Multiple Extensions Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-HILIGHT-BYPASS.html">HTTP:IIS:IIS-HILIGHT-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Hit Highlighting Authentication Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-HTR-CHUNKED.html">HTTP:IIS:IIS-HTR-CHUNKED</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS HTR/ASP Chunked Encoding Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIISADMPWD-PROXY-PASSWD.html">HTTP:IIS:IISADMPWD-PROXY-PASSWD</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 4.0 IISADMPWD Proxied Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AIISCHECK-PROBE.html">HTTP:IIS:IISCHECK-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .htr Heap Overflow Scanner Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AINDEX-SERVER-SQLQHIT.html">HTTP:IIS:INDEX-SERVER-SQLQHIT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS SQLQHit.asp Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AINDEX-SERVER-SRC-CODE.html">HTTP:IIS:INDEX-SERVER-SRC-CODE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Index Server File Source Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AINT-OVERFLOW-DOS.html">HTTP:IIS:INT-OVERFLOW-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Webserver Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AISAPI-IDA-OVERFLOW.html">HTTP:IIS:ISAPI-IDA-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .ida ISAPI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AISAPI-IDQ-OVERFLOW.html">HTTP:IIS:ISAPI-IDQ-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .idq ISAPI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AISAPI-PRINTER-OVERFLOW.html">HTTP:IIS:ISAPI-PRINTER-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS .printer ISAPI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AISM.DLL-FILENAME.html">HTTP:IIS:ISM.DLL-FILENAME</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ism.dll Malformed Filename Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AJET-DB-VBA-REMOTE-EXEC.html">HTTP:IIS:JET-DB-VBA-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS JET Database Engine VBA Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ALOCALHOST-SPOOF.html">HTTP:IIS:LOCALHOST-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Localhost SERVER_NAME Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMALFORMED-EXT-DATA.html">HTTP:IIS:MALFORMED-EXT-DATA</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 4.0/5.0 Malformed Extension Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMALFORMED-HTR-REQUEST.html">HTTP:IIS:MALFORMED-HTR-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS 4.0/5.0 Malformed .htr Request (AuthChangeUrl)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMDAC-DATASTUB.html">HTTP:IIS:MDAC-DATASTUB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Data Access Services RDS Data Stub Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMDAC-RDS.html">HTTP:IIS:MDAC-RDS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS MDAC Remote Data Services Component Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMDAC-RDS-2.html">HTTP:IIS:MDAC-RDS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS MDAC Remote Data Services &#39;newdsn&#39; Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMFC-EXT-OF.html">HTTP:IIS:MFC-EXT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS MFC ISAPI Framework Overflow (via ext.dll)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMS-RD-WEB-ACCESS-XSS.html">HTTP:IIS:MS-RD-WEB-ACCESS-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Remote Desktop Web Access Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMS-SHAREPOINT-DOS.html">HTTP:IIS:MS-SHAREPOINT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMSADC-PROBE.html">HTTP:IIS:MSADC-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS &quot;msadcs.dll&quot; Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AMSADC-VBBO-ACCESS.html">HTTP:IIS:MSADC-VBBO-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS MSADC VbBusObj Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ANSIISLOG-CHUNKED-POST.html">HTTP:IIS:NSIISLOG-CHUNKED-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: Chunked POST Request to nsiislog.dll
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ANSIISLOG-OF.html">HTTP:IIS:NSIISLOG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Services NSIISlog.DLL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AODATA-PROTOCOL-DOS.html">HTTP:IIS:ODATA-PROTOCOL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Information Services OData web applications Protocol Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3APBSERVER-PARAM-OF.html">HTTP:IIS:PBSERVER-PARAM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Phone Book Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3APERC-2E-ASP.html">HTTP:IIS:PERC-2E-ASP</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS PERC-2E ASP View Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3APERL-0A-ATTEMPT.html">HTTP:IIS:PERL-0A-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Perl Browse 0x0a Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3APROPFIND.html">HTTP:IIS:PROPFIND</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Malformed PROPFIND Remote DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AREGREAD-ATTEMPT.html">HTTP:IIS:REGREAD-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS regread Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASAM-DOWNLOAD-ATTEMPT.html">HTTP:IIS:SAM-DOWNLOAD-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS SAM Database Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASAMPLE-ACCESS.html">HTTP:IIS:SAMPLE-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Samples Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASCHANNEL-IMPROPER-CERT.html">HTTP:IIS:SCHANNEL-IMPROPER-CERT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS SChannel Improper Certificate Verification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASENSEPOST.EXE.html">HTTP:IIS:SENSEPOST.EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Sensepost.exe Hacker Tool Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASERVERVARIABLES-INFO.html">HTTP:IIS:SERVERVARIABLES-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: ServerVariables_JScript.asp Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHARE-ID1.html">HTTP:IIS:SHARE-ID1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Team Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHARE-ID2.html">HTTP:IIS:SHARE-ID2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Team Information Disclosure2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHARE-ID3.html">HTTP:IIS:SHARE-ID3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Team Information Disclosure3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHARE-ID4.html">HTTP:IIS:SHARE-ID4</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Team Information Disclosure4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-2010-XSS.html">HTTP:IIS:SHAREPOINT-2010-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: SharePoint Server 2010 Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-CONVERT.html">HTTP:IIS:SHAREPOINT-CONVERT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Sharepoint Document Conversion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-DOS.html">HTTP:IIS:SHAREPOINT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Help.aspx Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-MUL-XSS.html">HTTP:IIS:SHAREPOINT-MUL-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-PRIV-ESC.html">HTTP:IIS:SHAREPOINT-PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Sharepoint Server 2007 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-XSS.html">HTTP:IIS:SHAREPOINT-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Contact Details Reflected Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASITE-SERVER-FILE-UPLD.html">HTTP:IIS:SITE-SERVER-FILE-UPLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Site Server 2.0 with IIS 4.0 File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASOURCE-CODE-DISC.html">HTTP:IIS:SOURCE-CODE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS HTR/ASP UNC Mapped Virtual Host Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ASP-SCRIPTRESX-XSS.html">HTTP:IIS:SP-SCRIPTRESX-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint scriptresx.ashx Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ATILDE-INFO-DISC.html">HTTP:IIS:TILDE-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Tilde in Short File/Folder Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3ATRACK-REQUEST.html">HTTP:IIS:TRACK-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS TRACK Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AUNC-PATH-DISC.html">HTTP:IIS:UNC-PATH-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS UNC Path Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEB-CONFIG-INFO-LEAK.html">HTTP:IIS:WEB-CONFIG-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Web.config Information Disclosure Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AAUTH-BYPASS.html">HTTP:IIS:WEBDAV:AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS WebDAV Remote Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3ACOMMAND-OF.html">HTTP:IIS:WEBDAV:COMMAND-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS5.0 WebDAV Command URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AMALFORMED-REQ1.html">HTTP:IIS:WEBDAV:MALFORMED-REQ1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed WebDAV Request (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AMALFORMED-REQ2.html">HTTP:IIS:WEBDAV:MALFORMED-REQ2</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed WebDAV Request (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AREQ-DISCLO.html">HTTP:IIS:WEBDAV:REQ-DISCLO</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS WebDAV Request Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3ASEARCH-OF.html">HTTP:IIS:WEBDAV:SEARCH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS WebDAV SEARCH Command URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AWINDOWS-SHELL.html">HTTP:IIS:WEBDAV:WINDOWS-SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Shell File Name Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AXML-HANDLER-DOS.html">HTTP:IIS:WEBDAV:XML-HANDLER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WebDAV XML Message Handler Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIIS%3AX-SITE-SCRIPT.html">HTTP:IIS:X-SITE-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Index service Cross site scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFINITY-EK-LP.html">HTTP:INFINITY-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Infinity Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFINITY-EK-LP1.html">HTTP:INFINITY-EK-LP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Infinity Exploit Kit Landing page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFINITY-EK-PAYLOAD-DL.html">HTTP:INFINITY-EK-PAYLOAD-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Infinity Exploit Kit Payload Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFLATE%3AOVERFLOW.html">HTTP:INFLATE:OVERFLOW</a></b></td>
   <td width="500" valign="top">
    INFLATE: Inflate ratio too high Match
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFLATE%3ATYPE-MISMATCH.html">HTTP:INFLATE:TYPE-MISMATCH</a></b></td>
   <td width="500" valign="top">
    INFLATE: Inflate format type mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK-CC.html">HTTP:INFO-LEAK-CC</a></b></td>
   <td width="500" valign="top">
    HTTP: Variable information leak - CC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK-SSN.html">HTTP:INFO-LEAK-SSN</a></b></td>
   <td width="500" valign="top">
    HTTP: Variable information leak - SSN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AASP-ORACLE-PAD.html">HTTP:INFO-LEAK:ASP-ORACLE-PAD</a></b></td>
   <td width="500" valign="top">
    HTTP: ASP.NET Padding Oracle Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AASP-WEB-CONFIG.html">HTTP:INFO-LEAK:ASP-WEB-CONFIG</a></b></td>
   <td width="500" valign="top">
    HTTP: Web.config File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABANNERMATIC.html">HTTP:INFO-LEAK:BANNERMATIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Bannermatic Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABARRACUDADRIVE1.html">HTTP:INFO-LEAK:BARRACUDADRIVE1</a></b></td>
   <td width="500" valign="top">
    HTTP: BarracudaDrive Web Server Scripts Source Visualization1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABOOT-INI.html">HTTP:INFO-LEAK:BOOT-INI</a></b></td>
   <td width="500" valign="top">
    HTTP: boot.ini Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABOOT-INI-TCP.html">HTTP:INFO-LEAK:BOOT-INI-TCP</a></b></td>
   <td width="500" valign="top">
    HTTP: boot.ini Probe over TCP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABUGZILLA-DISC.html">HTTP:INFO-LEAK:BUGZILLA-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Bugzilla Misconfiguration Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACA-TOTAL-DEFENSE.html">HTTP:INFO-LEAK:CA-TOTAL-DEFENSE</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Total Defense Suite UNCWS getDBConfigSettings Credential Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACART32-INFO-LEAK.html">HTTP:INFO-LEAK:CART32-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: CART32 Info Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACC-CLEAR-VAR.html">HTTP:INFO-LEAK:CC-CLEAR-VAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Credit Card Number in Cleartext Submission
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACHECK-POINT-MUL.html">HTTP:INFO-LEAK:CHECK-POINT-MUL</a></b></td>
   <td width="500" valign="top">
    HTTP: Check Point Multiple Products Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACOFFEECUP.html">HTTP:INFO-LEAK:COFFEECUP</a></b></td>
   <td width="500" valign="top">
    HTTP: CoffeeCup Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACONCRETE5.html">HTTP:INFO-LEAK:CONCRETE5</a></b></td>
   <td width="500" valign="top">
    HTTP: Concrete5 Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACUTENEWS.html">HTTP:INFO-LEAK:CUTENEWS</a></b></td>
   <td width="500" valign="top">
    HTTP: CuteNews Debug Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AD-LINK-MUL.html">HTTP:INFO-LEAK:D-LINK-MUL</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Products Multiple Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ADOT-NET-CODE.html">HTTP:INFO-LEAK:DOT-NET-CODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Code Access Security Info Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ADOT-NET-CODE1.html">HTTP:INFO-LEAK:DOT-NET-CODE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Code Access Security Info Disclosure Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ADS-STORE.html">HTTP:INFO-LEAK:DS-STORE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Macintosh OS X .DS_Store directory Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ADVR-VS-LOG-DISC.html">HTTP:INFO-LEAK:DVR-VS-LOG-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Tools DVR VS cgi-bin/util/ziplogs.py filename Parameter Log File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ADVR-VS-PWD-DISC.html">HTTP:INFO-LEAK:DVR-VS-PWD-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Tools DVR VS Admin Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AF-SECURE-MANAGER.html">HTTP:INFO-LEAK:F-SECURE-MANAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: F-Secure Policy Manager information disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AF5-BIG-IP-XML.html">HTTP:INFO-LEAK:F5-BIG-IP-XML</a></b></td>
   <td width="500" valign="top">
    HTTP: F5 BIG-IP XML Entity References Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AGOAHEAD-PERM.html">HTTP:INFO-LEAK:GOAHEAD-PERM</a></b></td>
   <td width="500" valign="top">
    HTTP: GoAhead WebServer Directory Permissions Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AGOOGLEMAP-PLUGIN.html">HTTP:INFO-LEAK:GOOGLEMAP-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Googlemaps Joomla Plugin Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHP-APISITESCOPE.html">HTTP:INFO-LEAK:HP-APISITESCOPE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP SiteScope SOAP Call APISiteScopeImpl Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHP-LASERJET-PRO.html">HTTP:INFO-LEAK:HP-LASERJET-PRO</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LaserJet Pro Webadmin Password Reset
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHP-SITESCOPE.html">HTTP:INFO-LEAK:HP-SITESCOPE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP SiteScope integrationViewer Default Credentials
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHTACCESS.html">HTTP:INFO-LEAK:HTACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: .htaccess Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHTPASSWD-REQUEST.html">HTTP:INFO-LEAK:HTPASSWD-REQUEST</a></b></td>
   <td width="500" valign="top">
    HTTP: .htpasswd File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHTTP-SHARE-ENUM.html">HTTP:INFO-LEAK:HTTP-SHARE-ENUM</a></b></td>
   <td width="500" valign="top">
    HTTP: SMB Share Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AIBM-FP-SERLET.html">HTTP:INFO-LEAK:IBM-FP-SERLET</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Rational Focal Point Login And RequestAccessController Servlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AIIS-FILE-ACCESS.html">HTTP:INFO-LEAK:IIS-FILE-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Web server Unauthorized File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AJBOSS-JSP-SRC.html">HTTP:INFO-LEAK:JBOSS-JSP-SRC</a></b></td>
   <td width="500" valign="top">
    HTTP: JBoss JSP Source Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AJETY-SRV-RESP.html">HTTP:INFO-LEAK:JETY-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    HTTP: Eclipse Foundation Jetty Web Server HttpParser Remote Memory Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AJOOMLA-SQLREPORT.html">HTTP:INFO-LEAK:JOOMLA-SQLREPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla SQLReport Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ALAYTON-TECH.html">HTTP:INFO-LEAK:LAYTON-TECH</a></b></td>
   <td width="500" valign="top">
    HTTP: Layton Technologies Helpbox product Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ALIVE-WIRE.html">HTTP:INFO-LEAK:LIVE-WIRE</a></b></td>
   <td width="500" valign="top">
    HTTP: Live Wire For Wordpress Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMISS-DATE.html">HTTP:INFO-LEAK:MISS-DATE</a></b></td>
   <td width="500" valign="top">
    MISS-DATE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMISS-ETAG.html">HTTP:INFO-LEAK:MISS-ETAG</a></b></td>
   <td width="500" valign="top">
    MISS-ETAG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMS-IE-MOUSE-MVMT.html">HTTP:INFO-LEAK:MS-IE-MOUSE-MVMT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Mouse Movement Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMS-PKCS-INFODISC.html">HTTP:INFO-LEAK:MS-PKCS-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft ASP.NET PKCS Padding Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMS-VISIO-XML.html">HTTP:INFO-LEAK:MS-VISIO-XML</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Crafted XML File Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMS-VISIO-XML1.html">HTTP:INFO-LEAK:MS-VISIO-XML1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Crafted XML File Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMUL-VENDORS-1.html">HTTP:INFO-LEAK:MUL-VENDORS-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Information Disclosure Vulnerability (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMULTIPLE-VENDORS.html">HTTP:INFO-LEAK:MULTIPLE-VENDORS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANET-INFO-DISC.html">HTTP:INFO-LEAK:NET-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANETGEAR-CONFLEAK.html">HTTP:INFO-LEAK:NETGEAR-CONFLEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: NetGear Pre-Authentication Configuration File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANETGEAR-MUL.html">HTTP:INFO-LEAK:NETGEAR-MUL</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear Multiple Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANOVELL-ZENWORKS.html">HTTP:INFO-LEAK:NOVELL-ZENWORKS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management Session ID Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANSCONFIG.html">HTTP:INFO-LEAK:NSCONFIG</a></b></td>
   <td width="500" valign="top">
    HTTP: .nsconfig Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AORACLE-SQL.html">HTTP:INFO-LEAK:ORACLE-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle SQL Configuration Information Leakage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3APHP-PROXIMA.html">HTTP:INFO-LEAK:PHP-PROXIMA</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-PROXIMA File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3APOLYCOM.html">HTTP:INFO-LEAK:POLYCOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Polycom Viewstation - Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AREDHAT-JBOSS.html">HTTP:INFO-LEAK:REDHAT-JBOSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Red Hat JBoss Seam InterfaceGenerator Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ASALESCART-DB.html">HTTP:INFO-LEAK:SALESCART-DB</a></b></td>
   <td width="500" valign="top">
    HTTP: Salescart Database Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ASELENA-WEBSTORE.html">HTTP:INFO-LEAK:SELENA-WEBSTORE</a></b></td>
   <td width="500" valign="top">
    HTTP: Selena Sol WebStore order.log Retrieval Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ASHAREPOINT-INFO.html">HTTP:INFO-LEAK:SHAREPOINT-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ASNOOP-DISLOSURE.html">HTTP:INFO-LEAK:SNOOP-DISLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Snoop Servlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ASSN-CLEARTEXT.html">HTTP:INFO-LEAK:SSN-CLEARTEXT</a></b></td>
   <td width="500" valign="top">
    HTTP: Social Security Number in Cleartext Submission
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ATOSTATICHTML-API.html">HTTP:INFO-LEAK:TOSTATICHTML-API</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft toStaticHTML API Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AVIGNETTE-DIAG.html">HTTP:INFO-LEAK:VIGNETTE-DIAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Vignette Application Portal Unauthenticated Diagnostics Page Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AVIGNETTE-LEAK.html">HTTP:INFO-LEAK:VIGNETTE-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Vignette Story Server Sensitive Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AVIGNETTE-LEAK-2.html">HTTP:INFO-LEAK:VIGNETTE-LEAK-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Vignette Story Server Script Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWEB-INF-DOT.html">HTTP:INFO-LEAK:WEB-INF-DOT</a></b></td>
   <td width="500" valign="top">
    HTTP: WEB-INF. JSP Code Information Leakage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT.html">HTTP:INFO-LEAK:WFCHAT</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT1.html">HTTP:INFO-LEAK:WFCHAT1</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT2.html">HTTP:INFO-LEAK:WFCHAT2</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT3.html">HTTP:INFO-LEAK:WFCHAT3</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT4.html">HTTP:INFO-LEAK:WFCHAT4</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT5.html">HTTP:INFO-LEAK:WFCHAT5</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT6.html">HTTP:INFO-LEAK:WFCHAT6</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT7.html">HTTP:INFO-LEAK:WFCHAT7</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT8.html">HTTP:INFO-LEAK:WFCHAT8</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWFCHAT9.html">HTTP:INFO-LEAK:WFCHAT9</a></b></td>
   <td width="500" valign="top">
    HTTP: WFChat Information Disclosure9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWIN-INI.html">HTTP:INFO-LEAK:WIN-INI</a></b></td>
   <td width="500" valign="top">
    HTTP: win.ini Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWORDPRES-GAZETTE.html">HTTP:INFO-LEAK:WORDPRES-GAZETTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Gazette Edition For Wordpress Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWP-DBM-CFG.html">HTTP:INFO-LEAK:WP-DBM-CFG</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress DBManager Config Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AWP-MUL-PLUGINS.html">HTTP:INFO-LEAK:WP-MUL-PLUGINS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Multiple Plugins Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AZYXEL-PRESTIGE.html">HTTP:INFO-LEAK:ZYXEL-PRESTIGE</a></b></td>
   <td width="500" valign="top">
    HTTP: ZyXEL Prestige 650 HW Router Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AAUTH-NEGOTIATE.html">HTTP:INFO:AUTH-NEGOTIATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Authorization Type Negotiate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3ACHARSET-ASCII.html">HTTP:INFO:CHARSET-ASCII</a></b></td>
   <td width="500" valign="top">
    HTTP: Character Set US-ASCII
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AFACEBOOK.html">HTTP:INFO:FACEBOOK</a></b></td>
   <td width="500" valign="top">
    HTTP: Facebook Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AFACEBOOK1.html">HTTP:INFO:FACEBOOK1</a></b></td>
   <td width="500" valign="top">
    HTTP: Facebook Access1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AFARK.html">HTTP:INFO:FARK</a></b></td>
   <td width="500" valign="top">
    HTTP: Fark Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AHTML5-CONTENT.html">HTTP:INFO:HTML5-CONTENT</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Version 5 Content
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AHTML5-CONTENT1.html">HTTP:INFO:HTML5-CONTENT1</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Version 5 Content1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AHTTPPOST-GETSTYLE.html">HTTP:INFO:HTTPPOST-GETSTYLE</a></b></td>
   <td width="500" valign="top">
    HTTP: POST Request with GET Parameters
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AIDN-HOSTNAME.html">HTTP:INFO:IDN-HOSTNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: IDN Hostname
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AMS-UPDATE.html">HTTP:INFO:MS-UPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Update Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AMWS-SEARCH-OF1.html">HTTP:INFO:MWS-SEARCH-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: MyWebServer HandleSearch.html Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3ANULL-AUTH.html">HTTP:INFO:NULL-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Null Password Authentication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AOFFLINE-CACHING-HTML5.html">HTTP:INFO:OFFLINE-CACHING-HTML5</a></b></td>
   <td width="500" valign="top">
    HTTP: Offline Caching Manifest File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AREQ-NO-CONTENT-LENGTH.html">HTTP:INFO:REQ-NO-CONTENT-LENGTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Missing Content-Length in HTTP/1.1 PUT/POST
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3ARESIN-DEV-WEBROOT.html">HTTP:INFO:RESIN-DEV-WEBROOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Resin MSDOS Device Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3ASPIDER-ROBOT.html">HTTP:INFO:SPIDER-ROBOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Web Spider/Robot access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3ATMICRO-PROXY-REQ.html">HTTP:INFO:TMICRO-PROXY-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: TrendMicro VirusWall Proxy Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AXEROX-DS-INFO.html">HTTP:INFO:XEROX-DS-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Xerox DocuShare Upload Helper Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AYOUTUBE.html">HTTP:INFO:YOUTUBE</a></b></td>
   <td width="500" valign="top">
    HTTP: YouTube Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINFO%3AYOUTUBE-APP.html">HTTP:INFO:YOUTUBE-APP</a></b></td>
   <td width="500" valign="top">
    HTTP: YouTube App Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINOUT-ARTICLE-BASE-CSRF.html">HTTP:INOUT-ARTICLE-BASE-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Inout Article Base Ultimate Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINOUT-ARTICLE-BASE-CSRF1.html">HTTP:INOUT-ARTICLE-BASE-CSRF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Inout Article Base Ultimate Cross Site Request Forgery1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINTEGARD-PASSWORD-BOF.html">HTTP:INTEGARD-PASSWORD-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Integard Web Interface Password Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINTEGARD-PASSWORD-BOF1.html">HTTP:INTEGARD-PASSWORD-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Integard Web Interface Password Parameter Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINTEGARD-VERSION-CHECK1.html">HTTP:INTEGARD-VERSION-CHECK1</a></b></td>
   <td width="500" valign="top">
    HTTP: Integard Home and Pro Password Remote Version Check1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINTELLITAMPER-DEFER-BO1.html">HTTP:INTELLITAMPER-DEFER-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: IntelliTamper defer Attribute Buffer Overflow Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ABAD-CONTENT-LENGTH.html">HTTP:INVALID:BAD-CONTENT-LENGTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Bad Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ACHUNK-EVASION.html">HTTP:INVALID:CHUNK-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Chunk Evasion Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ACHUNK-HEADER.html">HTTP:INVALID:CHUNK-HEADER</a></b></td>
   <td width="500" valign="top">
    CHUNK-HEADER
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ADUPLICATE-HEADER.html">HTTP:INVALID:DUPLICATE-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Duplicate Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AEXPECT.html">HTTP:INVALID:EXPECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Expect Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AHDR-FIELD.html">HTTP:INVALID:HDR-FIELD</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Value in Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AHOST_HEADER_S2C.html">HTTP:INVALID:HOST_HEADER_S2C</a></b></td>
   <td width="500" valign="top">
    HOST_HEADER_S2C
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AINVLD-AUTH-CHAR.html">HTTP:INVALID:INVLD-AUTH-CHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Auth Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AINVLD-AUTH-LEN.html">HTTP:INVALID:INVLD-AUTH-LEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Auth Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AMISSING-REQ.html">HTTP:INVALID:MISSING-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Missing Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AMSNG-HTTP-VER.html">HTTP:INVALID:MSNG-HTTP-VER</a></b></td>
   <td width="500" valign="top">
    HTTP: Missing HTTP Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ANON-STAND-W-SPACE.html">HTTP:INVALID:NON-STAND-W-SPACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid White Space Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3ASTATUS-CODE.html">HTTP:INVALID:STATUS-CODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Status Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AUNEXPECTCHAR.html">HTTP:INVALID:UNEXPECTCHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Unexpected Character in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AINVALID%3AVAR-NEG-LG.html">HTTP:INVALID:VAR-NEG-LG</a></b></td>
   <td width="500" valign="top">
    HTTP: Variable Negative length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIRIX%3ACGI-BIN-REMOTE-EXEC.html">HTTP:IRIX:CGI-BIN-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: IRIX cgi-bin Handler Remote Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AIRIX%3ACGI-BIN-WRAP.html">HTTP:IRIX:CGI-BIN-WRAP</a></b></td>
   <td width="500" valign="top">
    HTTP: IRIX cgi-bin Wrap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AISA-AUTH-BYPASS.html">HTTP:ISA-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft ISA Server 2006 Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AISAPI-RSA-WEB.html">HTTP:ISAPI-RSA-WEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IIS ISAPI RSA WebAgent Redirect Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJABBER-SERVER-BYPASS.html">HTTP:JABBER-SERVER-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Jive Software Openfire Jabber Server Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJABBER-SERVER-BYPASS1.html">HTTP:JABBER-SERVER-BYPASS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Jive Software Openfire Jabber Server Authentication Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVA-EXPRESS-HTML-INJ1.html">HTTP:JAVA-EXPRESS-HTML-INJ1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System Communications Express HTML Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVA-JSP-SRC-CODE-DISC1.html">HTTP:JAVA-JSP-SRC-CODE-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System Web Server JSP Source Code Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVA-UA-EXE-DL.html">HTTP:JAVA-UA-EXE-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Executable File Downloaded by Java User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVA-UPDATE-RCE.html">HTTP:JAVA-UPDATE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Software Update Weakness
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVA-UPDATE-RCE1.html">HTTP:JAVA-UPDATE-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Software Update Weakness1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJAVAUA-PE-DL-EK.html">HTTP:JAVAUA-PE-DL-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: Java UA PE Download Exploit Kit Behavior
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJDB-EK-LANDPAGE.html">HTTP:JDB-EK-LANDPAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: JDB Exploit Kit Landing Page Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJENKINS-CI-SERVER-CE.html">HTTP:JENKINS-CI-SERVER-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Jenkins CI Server Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJOOMLA-MEDIAMGR-FILEUPLOAD.html">HTTP:JOOMLA-MEDIAMGR-FILEUPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Media Manager Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AJOOMLA-WEBRING-RFI.html">HTTP:JOOMLA-WEBRING-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Webring Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AKASPERSKY-URI-PARSING-DOS1.html">HTTP:KASPERSKY-URI-PARSING-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Kaspersky Products URI Parsing Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AKORE-EK-JSEXPL-DL.html">HTTP:KORE-EK-JSEXPL-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Kore Exploit Kit Successful Java Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AKORE-EK-LANDPG.html">HTTP:KORE-EK-LANDPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Kore Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AKORE-EK-LANDPG-3.html">HTTP:KORE-EK-LANDPG-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Kore Exploit Kit Landing Page 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AKORE-EL-PAYLOAD-OUT.html">HTTP:KORE-EL-PAYLOAD-OUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Kore Exploit Kit Outbound Payload Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALAYTON-HELPBOX-AUTH-BYPASS.html">HTTP:LAYTON-HELPBOX-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Layton Technologies Helpbox editrequestuser.asp Possible Authorization Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALEXMARK-LIB-FILE-DIR-TRAV.html">HTTP:LEXMARK-LIB-FILE-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Lexmark Markvision LibraryFileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALHTTPD%3AFCGI-HEADER-OF.html">HTTP:LHTTPD:FCGI-HEADER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Light HTTPD FastCGI Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALHTTPD%3AGET-BOF.html">HTTP:LHTTPD:GET-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Light HTTPD Get Request Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALHTTPD%3AHOST-DOT-DOT-SLASH.html">HTTP:LHTTPD:HOST-DOT-DOT-SLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Light HTTPD Host Header Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALHTTPD%3AHOST-DOT-DOT-SLASH1.html">HTTP:LHTTPD:HOST-DOT-DOT-SLASH1</a></b></td>
   <td width="500" valign="top">
    HTTP: Light HTTPD Host Header Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALIGHTHTTPD-CONNECTION-DOS.html">HTTP:LIGHTHTTPD-CONNECTION-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: lighttpd Connection Header Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALIGHTSOUT-EK-1.html">HTTP:LIGHTSOUT-EK-1</a></b></td>
   <td width="500" valign="top">
    HTTP: LightsOut Exploit Kit1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALIGHTSOUT-EK-2.html">HTTP:LIGHTSOUT-EK-2</a></b></td>
   <td width="500" valign="top">
    HTTP: LightsOut Exploit Kit2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALIGHTSOUT-EK-DL.html">HTTP:LIGHTSOUT-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: LightsOut Exploit Kit Java Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALIGHTSOUT-EK-HDR.html">HTTP:LIGHTSOUT-EK-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: LightsOut Exploit Kit Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALINUX%3ADD-WRT-MGMT-GUI.html">HTTP:LINUX:DD-WRT-MGMT-GUI</a></b></td>
   <td width="500" valign="top">
    HTTP: DD-WRT Management GUI HTTP Daemon Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALINUX%3AREDHAT-ACCEPT-LANG.html">HTTP:LINUX:REDHAT-ACCEPT-LANG</a></b></td>
   <td width="500" valign="top">
    HTTP: Red Hat Directory Server Accept-Language HTTP Header Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALINUX%3ARPM-QUERY.html">HTTP:LINUX:RPM-QUERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Caldera Linux rpm_query Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALOCALHOST-ON-INTERNET.html">HTTP:LOCALHOST-ON-INTERNET</a></b></td>
   <td width="500" valign="top">
    HTTP: Localhost Host Header in Trans-Internet Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ALOCALHOST-ON-INTERNET1.html">HTTP:LOCALHOST-ON-INTERNET1</a></b></td>
   <td width="500" valign="top">
    HTTP: Localhost Host Header in Trans-Internet Request1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMACROCHECK-DOCUMENT.html">HTTP:MACROCHECK-DOCUMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious MACROCHECK OLE Document
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAGENTO-PAR-AUTH-BYPASS.html">HTTP:MAGENTO-PAR-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Magento Forwarded Parameter Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAGNITUDE-EK-LAND.html">HTTP:MAGNITUDE-EK-LAND</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude/Nuclear  Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAGNITUDE-EK-RDIR.html">HTTP:MAGNITUDE-EK-RDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnitude Exploit Kit Embedded Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAILCHIMP-PLUGIN-PHP-CE.html">HTTP:MAILCHIMP-PLUGIN-PHP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: MailChimp Plugin for WordPress Remote PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-43.html">HTTP:MAL-REDIRECT-EXP-43</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-43
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-46.html">HTTP:MAL-REDIRECT-EXP-46</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-46
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-49.html">HTTP:MAL-REDIRECT-EXP-49</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-49
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-52.html">HTTP:MAL-REDIRECT-EXP-52</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-52
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-55.html">HTTP:MAL-REDIRECT-EXP-55</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-55
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-58.html">HTTP:MAL-REDIRECT-EXP-58</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-58
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-61.html">HTTP:MAL-REDIRECT-EXP-61</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-61
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-64.html">HTTP:MAL-REDIRECT-EXP-64</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-64
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-67.html">HTTP:MAL-REDIRECT-EXP-67</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-67
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-70.html">HTTP:MAL-REDIRECT-EXP-70</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-70
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-73.html">HTTP:MAL-REDIRECT-EXP-73</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-73
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-REDIRECT-EXP-76.html">HTTP:MAL-REDIRECT-EXP-76</a></b></td>
   <td width="500" valign="top">
    HTTP:MAL-REDIRECT Infection-76
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-URL-REQUEST-1.html">HTTP:MAL-URL-REQUEST-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious URL Request 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-URL-REQUEST-2.html">HTTP:MAL-URL-REQUEST-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious URL Request 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAL-URL-REQUEST-3.html">HTTP:MAL-URL-REQUEST-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious URL Request 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMALICIOUS-SESSION-COOKIE.html">HTTP:MALICIOUS-SESSION-COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious Session Cookie in HTTP Request  
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAMBO-MYSQL-INF-DISCLOSUR1.html">HTTP:MAMBO-MYSQL-INF-DISCLOSUR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mambo MySQL Database Info Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAMBO-MYSQL-INF-DISCLOSURE.html">HTTP:MAMBO-MYSQL-INF-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mambo MySQL Database Info Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-APP.html">HTTP:MANAGENGINE-APP</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Applications Manager SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-APP1.html">HTTP:MANAGENGINE-APP1</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Applications Manager SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-EVENTLOG-CSRF.html">HTTP:MANAGENGINE-EVENTLOG-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-EVTLG-INF-DISC.html">HTTP:MANAGENGINE-EVTLG-INF-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer Hostdetails Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-INF-DISC.html">HTTP:MANAGENGINE-INF-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-INF-DISC1.html">HTTP:MANAGENGINE-INF-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-POL-BYPASS.html">HTTP:MANAGENGINE-POL-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine ServiceDesk Plus User Privileges Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAXTHON-HISTORY-XSS.html">HTTP:MAXTHON-HISTORY-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Maxthon History Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMAXTHON-HISTORY-XSS1.html">HTTP:MAXTHON-HISTORY-XSS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Maxthon History Cross Site Scripting1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMICROSOFT-ASPNET-POST-DOS.html">HTTP:MICROSOFT-ASPNET-POST-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft ASP.NET Post Request Parameters Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMICROSOFT-ASPNET-POST-DOS1.html">HTTP:MICROSOFT-ASPNET-POST-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft ASP.NET Post Request Parameters Handling Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMICROSOFT-IE-USEAFTERFREE.html">HTTP:MICROSOFT-IE-USEAFTERFREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE onreadystatechange Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMICROSOFT-WORKS-WKSSS-BO1.html">HTTP:MICROSOFT-WORKS-WKSSS-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Works wksss Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMICROSYS-BASE64-BO.html">HTTP:MICROSYS-BASE64-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsys Promotic PmBase64Decode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAA-COOKIE-PARAM-RCE.html">HTTP:MISC:AA-COOKIE-PARAM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: ActualAnalyzer Lite Ant Cookie Parameter Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AABYSS-HDR-DOS.html">HTTP:MISC:ABYSS-HDR-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Abyss Empty Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AADOBE-COLDFUSION-HTML.html">HTTP:MISC:ADOBE-COLDFUSION-HTML</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion &#39;cfadminpassword.cfm&#39; HTML Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AALCATEL-OMNIPCX-CE.html">HTTP:MISC:ALCATEL-OMNIPCX-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AALCATEL-OMNIPCX-RCE.html">HTTP:MISC:ALCATEL-OMNIPCX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Alcatel-Lucent OmniPCX Enterprise FastJSData Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AALIEN-VAULT-OSSIM-CE.html">HTTP:MISC:ALIEN-VAULT-OSSIM-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM av-centerd SOAP Requests Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AALIENVAULT-OSSIM-CE.html">HTTP:MISC:ALIENVAULT-OSSIM-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPPLE-CUPS-RCE.html">HTTP:MISC:APPLE-CUPS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple CUPS Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPPLE-INSTALLER-FS.html">HTTP:MISC:APPLE-INSTALLER-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Mac OS X Installer Package Filename Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPPLE-MAPS-APP.html">HTTP:MISC:APPLE-MAPS-APP</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Maps Application Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPSTRUTS-DEV-EXEC.html">HTTP:MISC:APSTRUTS-DEV-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Developer Mode OGNL Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AARRIS-VAP-RCE.html">HTTP:MISC:ARRIS-VAP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Arris VAP Management Portal Password Comparison Failure Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AASTIUM-PBX-PHP-CE.html">HTTP:MISC:ASTIUM-PBX-PHP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Astium VoIP PBX Arbitrary File Upload PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAV-INVALID-CHKSUM.html">HTTP:MISC:AV-INVALID-CHKSUM</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAV-INVALID-CHKSUM1.html">HTTP:MISC:AV-INVALID-CHKSUM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAVAILABLEMEDIA-REQ.html">HTTP:MISC:AVAILABLEMEDIA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Availablemedia Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAVIRA-MGNT-HEADER-BOF.html">HTTP:MISC:AVIRA-MGNT-HEADER-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Avira Management Console Server HTTP Header Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AAWSTATS-EXEC.html">HTTP:MISC:AWSTATS-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: AWStats Remote Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABEETEL-TC1-450-CSRF.html">HTTP:MISC:BEETEL-TC1-450-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Beetel TC1-450 Wireless Router Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABELKIN-ROUTER-UPLOAD.html">HTTP:MISC:BELKIN-ROUTER-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Belkin WeMo Router UPnP Arbitrary Firmware Upload Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABLKIN-PARAM-HNDLNG-CE.html">HTTP:MISC:BLKIN-PARAM-HNDLNG-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Belkin N750 Guest Network Web Interface Parameter Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABLUECOAT-ADMIN.html">HTTP:MISC:BLUECOAT-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Blue Coat Administrator Account Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABLUECOAT-HOST-HDR-OF.html">HTTP:MISC:BLUECOAT-HOST-HDR-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Blue Coat Host Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABLUECOAT-LICENSE.html">HTTP:MISC:BLUECOAT-LICENSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Blue Coat Add License
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ABUFFALO-LINK-INFO.html">HTTP:MISC:BUFFALO-LINK-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Buffalo Technology LinkStation Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACHASYS-BO.html">HTTP:MISC:CHASYS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Chasys Draw IES Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOGENT-SERVER-CMD-INJ.html">HTTP:MISC:COGENT-SERVER-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Cogent DataHub Web Server GetPermissions.asp Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOOL-EXKIT-JAR-DL.html">HTTP:MISC:COOL-EXKIT-JAR-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Cool Exploit Kit JAR Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOPPERMINE-SQL-INJ.html">HTTP:MISC:COPPERMINE-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Coppermine Photo Gallery SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOREL-PDF-FUSION-XPS.html">HTTP:MISC:COREL-PDF-FUSION-XPS</a></b></td>
   <td width="500" valign="top">
    HTTP: Corel PDF Fusion XPS Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACUTEZIP-BO.html">HTTP:MISC:CUTEZIP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: GlobalSCAPE CuteZIP Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2013-3214-AB.html">HTTP:MISC:CVE-2013-3214-AB</a></b></td>
   <td width="500" valign="top">
    HTTP: VTiger CRM SOAP Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-BOF.html">HTTP:MISC:CVE-2014-6332-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-OF.html">HTTP:MISC:CVE-2014-6332-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-RCE.html">HTTP:MISC:CVE-2014-6332-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2015-5718-BO.html">HTTP:MISC:CVE-2015-5718-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Websense Triton Content Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVSTRAC-FILEDIFF-RCE.html">HTTP:MISC:CVSTRAC-FILEDIFF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: CVSTrac filediff Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AD-LINK-DAP-1160.html">HTTP:MISC:D-LINK-DAP-1160</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DAP-1160 Wireless Access Point Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AD-LINK-DIR-615-PASSWD.html">HTTP:MISC:D-LINK-DIR-615-PASSWD</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DIR-615 Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADB-POMER-AMP-BO.html">HTTP:MISC:DB-POMER-AMP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: dBpowerAMP Audio Player Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CAMERA-CMD-INJ.html">HTTP:MISC:DLINK-CAMERA-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Dlink IP Camera Video Stream Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CAMERA-VIDEO-BY.html">HTTP:MISC:DLINK-CAMERA-VIDEO-BY</a></b></td>
   <td width="500" valign="top">
    HTTP: Dlink IP Camera Video Stream Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CAPTCHA-BO.html">HTTP:MISC:DLINK-CAPTCHA-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Wireless Router CAPTCHA Data Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CE.html">HTTP:MISC:DLINK-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DIR615h OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CMD-INJECTION.html">HTTP:MISC:DLINK-CMD-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Device Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-COOKI-HANDLN-BO.html">HTTP:MISC:DLINK-COOKI-HANDLN-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Cookie Value Handling Remote Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-EXSHEL-PARAM-CE.html">HTTP:MISC:DLINK-EXSHEL-PARAM-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: DLink DIR-300 Input Validation Failure Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-INFO-DISCLOSURE.html">HTTP:MISC:DLINK-INFO-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link Device Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-INFOCGI-BO.html">HTTP:MISC:DLINK-INFOCGI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link info.cgi POST Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-IP-CAMERA-ID.html">HTTP:MISC:DLINK-IP-CAMERA-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: DLINK IP CAMERA CVE 2013-1601 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-OS-CMD-INJ.html">HTTP:MISC:DLINK-OS-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DNS-323 OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADOLIBARR-ERP-COMM-INJ.html">HTTP:MISC:DOLIBARR-ERP-COMM-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Dolibarr ERP &amp; CRM 3 Post Authentication Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADVR-VS-RCE.html">HTTP:MISC:DVR-VS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Tools DVR VS Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ADYNDNSUPDATE.html">HTTP:MISC:DYNDNSUPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: DynDnsUpdate Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEDOC-UPLOAD-PHP-CE.html">HTTP:MISC:EDOC-UPLOAD-PHP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: E-Document PHP File Upload Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEK-HIMAN-JAVA.html">HTTP:MISC:EK-HIMAN-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Himan Java Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEK-REDKIT-JAR-DOWNLD.html">HTTP:MISC:EK-REDKIT-JAR-DOWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Jar File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEMULIVE-ADMIN.html">HTTP:MISC:EMULIVE-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: EmuLive Server4 Unauthorized Administrator Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEPO-XMLENTITY-INJ.html">HTTP:MISC:EPO-XMLENTITY-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee ePolicy CVE-2015-0921 XML Entity Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AERS-VIEWER-BO.html">HTTP:MISC:ERS-VIEWER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: ERS Viewer 2013 ERS File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AES-GROOVY-CODEEXEC.html">HTTP:MISC:ES-GROOVY-CODEEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: ElasticSearch Search Groovy Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AESF-PFSENSE-RCE.html">HTTP:MISC:ESF-PFSENSE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: ESF pfSense webConfigurator firewall_aliases_edit.php Input Validation Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AEZGUESTBOOK.html">HTTP:MISC:EZGUESTBOOK</a></b></td>
   <td width="500" valign="top">
    HTTP: HTMLJunction EZGuestbook Database Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AF5-ICONTROL-SOAP-CE.html">HTTP:MISC:F5-ICONTROL-SOAP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: F5 Multiple Products iControl API hostname Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFILE-DOWNLOAD.html">HTTP:MISC:FILE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFLASH-CVE-2014-0554.html">HTTP:MISC:FLASH-CVE-2014-0554</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Local File Access Protection Bypass (CVE-2014-0554) 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFORTIGATE-CSRF.html">HTTP:MISC:FORTIGATE-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Fortigate Firewalls Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFREEPBX-AUTH-BYPASS.html">HTTP:MISC:FREEPBX-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP:  FreePBX unserialize Legacy Package Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFREEPBX-CFG-CODE-EXEC.html">HTTP:MISC:FREEPBX-CFG-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: FreePBX Framework Module config.php Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AFRITZ-SEC-BYPASS-CE.html">HTTP:MISC:FRITZ-SEC-BYPASS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Fritz Box Security Bypass Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGE-GEFEBT-CE.html">HTTP:MISC:GE-GEFEBT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: GE Proficy CIMPLICITY gefebt.exe Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGE-MDS-PULSENET.html">HTTP:MISC:GE-MDS-PULSENET</a></b></td>
   <td width="500" valign="top">
    HTTP: General Electric MDS PulseNET Hidden Support Account Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGE-PULSENET-RCE.html">HTTP:MISC:GE-PULSENET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: GE MDS PulseNET Hidden Support Account Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGITLAB-SH-EXEC.html">HTTP:MISC:GITLAB-SH-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Gitlab-shell Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGITLIST-URI-REQ-CE.html">HTTP:MISC:GITLIST-URI-REQ-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Gitlist Metacharacters In File Name URI Request Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGRAPHITE-RCE.html">HTTP:MISC:GRAPHITE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Graphite Web Unsafe Pickle Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AGSM-SIMEDIT-BO.html">HTTP:MISC:GSM-SIMEDIT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: GSM SIM Editor 5.15 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AHASTYMAIL-CMD-INJ.html">HTTP:MISC:HASTYMAIL-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Hastymail Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AHP-PROCURVE-RESET.html">HTTP:MISC:HP-PROCURVE-RESET</a></b></td>
   <td width="500" valign="top">
    HTTP: Hewlett Packard Procurve Remote Reset
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AHP-RELEASE-CONTROL.html">HTTP:MISC:HP-RELEASE-CONTROL</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Release Control Authenticated Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AHP-SYS-IPRANGE-OF.html">HTTP:MISC:HP-SYS-IPRANGE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: HP System Management Homepage iprange Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIBM-CONSOLE-FILE-READ.html">HTTP:MISC:IBM-CONSOLE-FILE-READ</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Global Console Managers Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIBM-CRDIT-LMT-BYPAS.html">HTTP:MISC:IBM-CRDIT-LMT-BYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Algo Credit Limits CVE-2014-0867 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIBM-JAVA-UTF8-BYPASS.html">HTTP:MISC:IBM-JAVA-UTF8-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Java UTF8 Byte Sequences Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIE-CVE-2013-2551-RCE.html">HTTP:MISC:IE-CVE-2013-2551-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-2551 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIE-CVE-2013-2551-RCE1.html">HTTP:MISC:IE-CVE-2013-2551-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-2551 Remote Code Execution 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AIRFVIEW-JP2-BO.html">HTTP:MISC:IRFVIEW-JP2-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Irfanview JPEG2000 JP2 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AJBOSS-SEAM-EL-RCE.html">HTTP:MISC:JBOSS-SEAM-EL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: JBoss Seam Parameterized Expression Language Expressions Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AJENKINS-CONSOLE-CE.html">HTTP:MISC:JENKINS-CONSOLE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Jenkins Script-Console Java Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AJIGSAW-DEV-DOS1.html">HTTP:MISC:JIGSAW-DEV-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Jigsaw &quot;con&quot; Device DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AJOOMLA-UNSER-CE.html">HTTP:MISC:JOOMLA-UNSER-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Akeeba Kickstart Unserialize Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AKEYFOCUS-KF-DIRTRAV.html">HTTP:MISC:KEYFOCUS-KF-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: KeyFocus KF Web Server Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ALETTERBOX-RCE.html">HTTP:MISC:LETTERBOX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Maarch Multiple Products File Upload Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ALIFESIZE-ROOM-CMD-INJ.html">HTTP:MISC:LIFESIZE-ROOM-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: LifeSize Room Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ALIFESIZE-ROOM-SEC-BY.html">HTTP:MISC:LIFESIZE-ROOM-SEC-BY</a></b></td>
   <td width="500" valign="top">
    HTTP: LifeSize Room Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ALINBIT-LINBOX-BYPASS.html">HTTP:MISC:LINBIT-LINBOX-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Linbit Linbox Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMAC-COMM-EXEC.html">HTTP:MISC:MAC-COMM-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Mac OS X Archive Metadata Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGE-ENGNE-ADMIN-AC.html">HTTP:MISC:MANAGE-ENGNE-ADMIN-AC</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Desktop Central Servlet AddPluginUser Action Admin Account Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGEENGINE-APPS.html">HTTP:MISC:MANAGEENGINE-APPS</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Applications Manager Authenticated Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGEENGINE-FILE-UP.html">HTTP:MISC:MANAGEENGINE-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine DesktopCentral AgentLogUpload Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGEENGINE-PRIV-ESC.html">HTTP:MISC:MANAGEENGINE-PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine ServiceDesk Plus Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGENGINE-EVNTLG-CE.html">HTTP:MISC:MANAGENGINE-EVNTLG-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer agentUpload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMAYA-EO-VIDEO-BO1.html">HTTP:MISC:MAYA-EO-VIDEO-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Maya Studio eo-video Playlist File Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMCAFFEE-SRV-HDR.html">HTTP:MISC:MCAFFEE-SRV-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Server Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMINIUPNPD-SOAP-ACTION.html">HTTP:MISC:MINIUPNPD-SOAP-ACTION</a></b></td>
   <td width="500" valign="top">
    HTTP: MiniUPnPd HTTP Service SOAPAction Handler Remote Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMLTPLE-TABLE-INFO-DIS.html">HTTP:MISC:MLTPLE-TABLE-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer AgentHandler GetTableData Mode Multiple Table Remote Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMOBY-LENGTH-DOS.html">HTTP:MISC:MOBY-LENGTH-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Moby Malformed Content-Length DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMONOWALL-CSRF.html">HTTP:MISC:MONOWALL-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Monowall Firewall/Router Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMOODLE-RCE.html">HTTP:MISC:MOODLE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Moodle Authenticated Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMOODLOGIC-CLIENT.html">HTTP:MISC:MOODLOGIC-CLIENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mood Logic Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMOTOROLA-WR850.html">HTTP:MISC:MOTOROLA-WR850</a></b></td>
   <td width="500" valign="top">
    HTTP: Motorola WR850G Wireless Router Remote Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-FOREFRONT-DOS.html">HTTP:MISC:MS-FOREFRONT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Null Session Cookie Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-MOVIE-MAKER-OCX.html">HTTP:MISC:MS-MOVIE-MAKER-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Movie Maker hhctrl.ocx load attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-OWA-URL-REDIR.html">HTTP:MISC:MS-OWA-URL-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange OWA CVE-2014-6336 URL Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-SHARE-POINT-RCE.html">HTTP:MISC:MS-SHARE-POINT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server CVE-2013-1330 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-USERS-PWD-INFO-DI1.html">HTTP:MISC:MS-USERS-PWD-INFO-DI1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage Extensions File Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-USERS-PWD-INFO-DIS.html">HTTP:MISC:MS-USERS-PWD-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage Extensions File Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-XML-SIG-VAL-DOS.html">HTTP:MISC:MS-XML-SIG-VAL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework XML Signature Validation Entity Expansion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUL-AUTH-BYPASS.html">HTTP:MISC:MUL-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUL-VEND-IMPRO-ACCESS.html">HTTP:MISC:MUL-VEND-IMPRO-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Unauthorized Access Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUL-VENDORS-CSRF.html">HTTP:MISC:MUL-VENDORS-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTI-ANTIVIRUS-ASCII.html">HTTP:MISC:MULTI-ANTIVIRUS-ASCII</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendor AntiVirus Extended ASCII Filename Scan Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTI-PRDCTS-CSRF-1.html">HTTP:MISC:MULTI-PRDCTS-CSRF-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Cross-Site Request Forgery 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-PRDCT-CSRF.html">HTTP:MISC:MULTIPLE-PRDCT-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: MULTIPLE PRODUCTS CSRF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-PRODCT-CSRF.html">HTTP:MISC:MULTIPLE-PRODCT-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Cross-Site Request Forgery 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-PRODUCT-CSRF.html">HTTP:MISC:MULTIPLE-PRODUCT-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Cross-Site Request Forgery(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-VENDORS-CSRF.html">HTTP:MISC:MULTIPLE-VENDORS-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-VENDORS-RCE.html">HTTP:MISC:MULTIPLE-VENDORS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multile Products Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTIPLE-VENDORS-UAF.html">HTTP:MISC:MULTIPLE-VENDORS-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTPLE-EK-JAR-DOWNLD.html">HTTP:MISC:MULTPLE-EK-JAR-DOWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Kit Jar Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTPLE-PRDCTS-RCE.html">HTTP:MISC:MULTPLE-PRDCTS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMULTPLE-PRODUCT-CSRF.html">HTTP:MISC:MULTPLE-PRODUCT-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUTI-PROD-COMND-EXEC.html">HTTP:MISC:MUTI-PROD-COMND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUTINY-5-EDITDOCUMENT.html">HTTP:MISC:MUTINY-5-EDITDOCUMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mutiny 5 EditDocument Servlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUTINY-CMD-INJ.html">HTTP:MISC:MUTINY-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Mutiny Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANEG-CTN-LENGTH-CLT.html">HTTP:MISC:NEG-CTN-LENGTH-CLT</a></b></td>
   <td width="500" valign="top">
    HTTP: Negative Content-Length Overflow (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANEG-CTN-LENGTH-STC.html">HTTP:MISC:NEG-CTN-LENGTH-STC</a></b></td>
   <td width="500" valign="top">
    HTTP: Negative Content-Length Overflow (STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANEOTERIS-IVE-BF.html">HTTP:MISC:NEOTERIS-IVE-BF</a></b></td>
   <td width="500" valign="top">
    HTTP: Neoteris IVE &#39;changepassword.cgi&#39; Brute Force
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANETCHARTS-SER-RCE.html">HTTP:MISC:NETCHARTS-SER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Mining NetCharts Server Path Traversal File Upload Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANETGEAR-CMD-INJ.html">HTTP:MISC:NETGEAR-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear D6300B Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANG-WG602-BACKDOOR.html">HTTP:MISC:NG-WG602-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear WG602 Wireless Access Point Backdoor Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANGINX-CHUNK-TRANS-DOS.html">HTTP:MISC:NGINX-CHUNK-TRANS-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nginx Chunked Transfer Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANGINX-ENCODED-DOS.html">HTTP:MISC:NGINX-ENCODED-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nginx Encoded Directory Traversal Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ANODEJS-DOS.html">HTTP:MISC:NODEJS-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Node.js CVE-2013-4450 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AOPENFILER-NETWORKCARD.html">HTTP:MISC:OPENFILER-NETWORKCARD</a></b></td>
   <td width="500" valign="top">
    HTTP: Openfiler NetworkCard Object Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AOPENPLI-CE.html">HTTP:MISC:OPENPLI-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: DreamBox OpenPLI Webif Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AOPENSIS-PARAM-PHP-INJ.html">HTTP:MISC:OPENSIS-PARAM-PHP-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Opensis Modname Parameter Remote PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APANDORA-SERVICE-CE.html">HTTP:MISC:PANDORA-SERVICE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Pandora FMS Anyterm Service Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APHPMOADMIN-RCE.html">HTTP:MISC:PHPMOADMIN-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: MongoDB PHPMoAdmin Tool Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APHPWIKI-SHELL-CE.html">HTTP:MISC:PHPWIKI-SHELL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: PhpWiki Shell Metacharacters Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APOSTER-SW-PUI-FILE-OF.html">HTTP:MISC:POSTER-SW-PUI-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Poster Software PUBLISH-iT PUI File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APRDCTS-COMMAND-EXEC.html">HTTP:MISC:PRDCTS-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3APRDCTS-COMMAND-INJ.html">HTTP:MISC:PRDCTS-COMMAND-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAILS-ROUTING.html">HTTP:MISC:RAILS-ROUTING</a></b></td>
   <td width="500" valign="top">
    HTTP: Rails Routing Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAILS-ROUTING1.html">HTTP:MISC:RAILS-ROUTING1</a></b></td>
   <td width="500" valign="top">
    HTTP: Rails Routing Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAILS-ROUTING2.html">HTTP:MISC:RAILS-ROUTING2</a></b></td>
   <td width="500" valign="top">
    HTTP: Rails Routing Vulnerability2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAILS-ROUTING3.html">HTTP:MISC:RAILS-ROUTING3</a></b></td>
   <td width="500" valign="top">
    HTTP: Rails Routing Vulnerability3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAILS-ROUTING4.html">HTTP:MISC:RAILS-ROUTING4</a></b></td>
   <td width="500" valign="top">
    HTTP: Rails Routing Vulnerability4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARAS-CFG.html">HTTP:MISC:RAS-CFG</a></b></td>
   <td width="500" valign="top">
    HTTP: 3com RAS 1500 Configuration Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AREAL-RMP-TRAV.html">HTTP:MISC:REAL-RMP-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer .RMP File Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AREPRISE-DOIT-TRAV.html">HTTP:MISC:REPRISE-DOIT-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Reprise License Manager diagnostics_doit Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ARUBY-RAILS-SECRET-RCE.html">HTTP:MISC:RUBY-RAILS-SECRET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby On Rails Secret Deserialization Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASAMSNG-DVR-COOKI-AUTH.html">HTTP:MISC:SAMSNG-DVR-COOKI-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung DVR Cookie Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASAVANT-WEBSERVER-BOF.html">HTTP:MISC:SAVANT-WEBSERVER-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Savant Webserver Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASEAGATE-NAS-RCE.html">HTTP:MISC:SEAGATE-NAS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Seagate Business NAS Pre-Authentication Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASEAGATE-NAS-RCE1.html">HTTP:MISC:SEAGATE-NAS-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Seagate Business NAS Pre-Authentication Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASHAMBALA-DOS1.html">HTTP:MISC:SHAMBALA-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Evolvable Shambala Server Web Server DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASINAPSI-CMD-INJ.html">HTTP:MISC:SINAPSI-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Sinapsi Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASNORT-URICNTNT-EVASON.html">HTTP:MISC:SNORT-URICNTNT-EVASON</a></b></td>
   <td width="500" valign="top">
    HTTP: Snort URI Content Rules Detection Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASONICWALL-AUTH-BYPAS.html">HTTP:MISC:SONICWALL-AUTH-BYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: SonicWALL GMS/Viewpoint/Analyzer Authentication Bypass Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPAM-TO-PHP-REDIR.html">HTTP:MISC:SPAM-TO-PHP-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Spam Link &quot;to.php&quot; Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPLUNK-CUSTOM-APP-CE.html">HTTP:MISC:SPLUNK-CUSTOM-APP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Splunk Custom App Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPLUNK-MAPPY-RCE.html">HTTP:MISC:SPLUNK-MAPPY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Splunk Mappy Search Command Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPRING-HEADER-INJ.html">HTTP:MISC:SPRING-HEADER-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Spring Security HTTP Header Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASQUID-DNS-REPLIES.html">HTTP:MISC:SQUID-DNS-REPLIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid DNS Replies Invalid Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASUPERMICRO-LOGIN-BO.html">HTTP:MISC:SUPERMICRO-LOGIN-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: SuperMicro IPMI login.cgi Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ASYMANTEC-COMMAND-EXEC.html">HTTP:MISC:SYMANTEC-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Encryption Management Server Local Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ATM-INTERSCAN-DIR-TRAV.html">HTTP:MISC:TM-INTERSCAN-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro InterScan Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ATOPTOOLS-HPNST-DOS.html">HTTP:MISC:TOPTOOLS-HPNST-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Hewlett-Packard Instant TopTools hpnst.exe DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3ATP-LINK-TD-8817-CSRF.html">HTTP:MISC:TP-LINK-TD-8817-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: TP-Link TD-8817 Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AUBIQUITI-AIROS-CE.html">HTTP:MISC:UBIQUITI-AIROS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ubiquiti AirOS Remote POST-Auth Root Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AUPTIME-MONTRN-PHP-RCE.html">HTTP:MISC:UPTIME-MONTRN-PHP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: UpTime Monitoring PHP File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AVISNETIC-DOS.html">HTTP:MISC:VISNETIC-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: VisNetic WebSite Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAPP-PARAM-SEC1.html">HTTP:MISC:WAPP-PARAM-SEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Application Parameter Tampering 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAPP-PARAM-SEC2.html">HTTP:MISC:WAPP-PARAM-SEC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Application Parameter Tampering 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAPP-PARAM-SEC3.html">HTTP:MISC:WAPP-PARAM-SEC3</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Application Parameter Tampering 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAPP-SUSP-FILEUL1.html">HTTP:MISC:WAPP-SUSP-FILEUL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Application Parameter Suspicious File Upload Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAVELINK-HDR-PARSE-BO.html">HTTP:MISC:WAVELINK-HDR-PARSE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Wavelink Emulation License Server HTTP Header Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWEB-BBS-CE.html">HTTP:MISC:WEB-BBS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: WebScripts WebBBS Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWEBUI-COMMAND-EXEC.html">HTTP:MISC:WEBUI-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: WebUI Multiple Parameter Validation Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWEBWEAVER-DDP.html">HTTP:MISC:WEBWEAVER-DDP</a></b></td>
   <td width="500" valign="top">
    HTTP: WebWeaver DOS Device Path Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWEEVELY.html">HTTP:MISC:WEEVELY</a></b></td>
   <td width="500" valign="top">
    HTTP: Weevely Network Proxing Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWESTERN-DIGITAL-LFI.html">HTTP:MISC:WESTERN-DIGITAL-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Western Digital Arkeia Appliance Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWIN-MOVIE-MAKER-DOS.html">HTTP:MISC:WIN-MOVIE-MAKER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Movie Maker Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWINDOWS-DLL-LOAD-CE.html">HTTP:MISC:WINDOWS-DLL-LOAD-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DLL Load Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWINDOWS-GREENDAM-BO.html">HTTP:MISC:WINDOWS-GREENDAM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows GreenDam Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWING-FTP-COMMNAD-EXEC.html">HTTP:MISC:WING-FTP-COMMNAD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Wing FTP Server Authenticatd Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWINRAR-FILENM-SPOOF.html">HTTP:MISC:WINRAR-FILENM-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: WinRAR File Name Spoofing  
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWIRESHARK-DECT-OF.html">HTTP:MISC:WIRESHARK-DECT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark DECT Dissector Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWIRESHARK-LUA-RCE.html">HTTP:MISC:WIRESHARK-LUA-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark Lua Console Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWORDPRESS-PHP-ACE.html">HTTP:MISC:WORDPRESS-PHP-ACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress PHP Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWP-IMG-UPLOAD.html">HTTP:MISC:WP-IMG-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Plugin Arbitrary Image Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AWWWACL-PROBE.html">HTTP:MISC:WWWACL-PROBE</a></b></td>
   <td width="500" valign="top">
    HTTP: .wwwacl Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AX-MICRO-WLAN-PASSWORD.html">HTTP:MISC:X-MICRO-WLAN-PASSWORD</a></b></td>
   <td width="500" valign="top">
    HTTP: X-Micro Wireless Router Default Password Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AXENEO-WEBREQ-DOS.html">HTTP:MISC:XENEO-WEBREQ-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Xeneo Web Server % DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AXOOPS-WEBROOT.html">HTTP:MISC:XOOPS-WEBROOT</a></b></td>
   <td width="500" valign="top">
    HTTP: XOOPS Server Reveals Webroot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AZENOSS-CE.html">HTTP:MISC:ZENOSS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Zenoss 3 showDaemonXMLConfig Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AZENOSS-CMD-EXEC.html">HTTP:MISC:ZENOSS-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Zenoss showDaemonXMLConfig Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AZOPE-CMD-RCE.html">HTTP:MISC:ZOPE-CMD-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Zope cmd parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMISC%3AZPANEL-HTPASWD-MOD-CE.html">HTTP:MISC:ZPANEL-HTPASWD-MOD-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: ZPanel Htpasswd Module Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMONGOOSE-HTTPD-URI-OF.html">HTTP:MONGOOSE-HTTPD-URI-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mongoose HTTP Server URI Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMONKEY-HTTPD-BO.html">HTTP:MONKEY-HTTPD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Monkey HTTP Daemon memcpy Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-DOT-NET-HEAP-CORRUPT.html">HTTP:MS-DOT-NET-HEAP-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-DOT-NET-HEAP-CORRUPT1.html">HTTP:MS-DOT-NET-HEAP-CORRUPT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Heap Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-DOT-NET-XAML-RCE.html">HTTP:MS-DOT-NET-XAML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-DOT-NET-XAML-RCE1.html">HTTP:MS-DOT-NET-XAML-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-IE-MEMORY-CORRUPTION.html">HTTP:MS-IE-MEMORY-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2782 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-IE-MEMORY-CORRUPTION1.html">HTTP:MS-IE-MEMORY-CORRUPTION1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2782 Use After Free1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-IE-MHTMLFILE-DOS.html">HTTP:MS-IE-MHTMLFILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE MHTMLFile NULL Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-IE-MHTMLFILE-DOS1.html">HTTP:MS-IE-MHTMLFILE-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE MHTMLFile NULL Dereference1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-LYNC-SERVER-RCE.html">HTTP:MS-LYNC-SERVER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Lync Server ReachJoin.aspx Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-MDAC-RCE1.html">HTTP:MS-MDAC-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MDAC Components Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-OUTLOOK-2003-OBJ-SEC-SB.html">HTTP:MS-OUTLOOK-2003-OBJ-SEC-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook Object Security Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-TELNET-INSECURE-LOADIN1.html">HTTP:MS-TELNET-INSECURE-LOADIN1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Telnet Protocol Handler Insecure Loading1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-TELNET-INSECURE-LOADING.html">HTTP:MS-TELNET-INSECURE-LOADING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Telnet Protocol Handler Insecure Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-VBSCRIPT-UAF-RCE.html">HTTP:MS-VBSCRIPT-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft VBScript CVE-2014-6363 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WIN-FOLDER-GUID-CE.html">HTTP:MS-WIN-FOLDER-GUID-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Folder GUID Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WIN-FOLDER-GUID-CE1.html">HTTP:MS-WIN-FOLDER-GUID-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Folder GUID Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WINDOWS-HYPERLINK-BO.html">HTTP:MS-WINDOWS-HYPERLINK-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Hyperlink Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WINDOWS-HYPERLINK-BO1.html">HTTP:MS-WINDOWS-HYPERLINK-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Hyperlink Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WINDOWS-X509-DOS.html">HTTP:MS-WINDOWS-X509-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows X.509 Certificate Validation Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMS-WORDPERFECT-BOF.html">HTTP:MS-WORDPERFECT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EK-EXE.html">HTTP:MUL-EK-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Single Digit exe Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EK-IFRAME.html">HTTP:MUL-EK-IFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Possibly Malicious iframe Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EK-PAYLOAD-DL.html">HTTP:MUL-EK-PAYLOAD-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EK-SILVERLIGHT-DL.html">HTTP:MUL-EK-SILVERLIGHT-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Silverlight Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EK-XOR.html">HTTP:MUL-EK-XOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Binkey Xored
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EXPLOIT-KIT-ABOUT-EXE.html">HTTP:MUL-EXPLOIT-KIT-ABOUT-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit about.exe Payload Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EXPLOIT-KIT-CALC-EXE.html">HTTP:MUL-EXPLOIT-KIT-CALC-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit calc.exe Payload  Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EXPLOIT-KIT-INFO-EXE.html">HTTP:MUL-EXPLOIT-KIT-INFO-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Info.exe Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMUL-EXPLOIT-KIT-README-EXE.html">HTTP:MUL-EXPLOIT-KIT-README-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Readme.exe Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-32ALPHA-REQ.html">HTTP:MULTI-EK-32ALPHA-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit 32 Alpha JAR Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-LAND-PAGE.html">HTTP:MULTI-EK-LAND-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-PAYLOAD-ABOUT5.html">HTTP:MULTI-EK-PAYLOAD-ABOUT5</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload about.dll
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-PAYLOAD-CALC.html">HTTP:MULTI-EK-PAYLOAD-CALC</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload calc.dll
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-PAYLOAD-CALC3.html">HTTP:MULTI-EK-PAYLOAD-CALC3</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload readme.dll
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-PAYLOAD-CONTACTS2.html">HTTP:MULTI-EK-PAYLOAD-CONTACTS2</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Payload contacts.dll
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTI-EK-REDIR-PAGF.html">HTTP:MULTI-EK-REDIR-PAGF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Exploit Kit Redirection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTIPLE-WEBSER-INFO-LEAK.html">HTTP:MULTIPLE-WEBSER-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Werserver Unauthorized Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AMULTIPLE-WEBSER-INFO-LEAK1.html">HTTP:MULTIPLE-WEBSER-INFO-LEAK1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Werserver Unauthorized Access Attempt1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANAGIOS-CONFMGR-SQLINJ.html">HTTP:NAGIOS-CONFMGR-SQLINJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios Core Config Manager tfPassword Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANAGIOS-GRAPHEXPLORE-CMDINJ.html">HTTP:NAGIOS-GRAPHEXPLORE-CMDINJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios Network Monitor Graph Explorer Component Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANCSA%3ANPH-TEST-CGI.html">HTTP:NCSA:NPH-TEST-CGI</a></b></td>
   <td width="500" valign="top">
    HTTP: nph-test-cgi Directory Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANCSA%3APHF-EXEC.html">HTTP:NCSA:PHF-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: NCSA PHF Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETBSD-TNFTP-CE.html">HTTP:NETBSD-TNFTP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: NetBSD TNFTP fetch_url Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETGEAR%3ADG834G-DEBUG-MODE.html">HTTP:NETGEAR:DG834G-DEBUG-MODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear DG834G Wireless Router Debug Mode Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETGEAR%3ADGN1000B-SETUP-RCE.html">HTTP:NETGEAR:DGN1000B-SETUP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear DGN1000B setup.cgi Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETGEAR%3ANETGEAR-PRO-SAFE.html">HTTP:NETGEAR:NETGEAR-PRO-SAFE</a></b></td>
   <td width="500" valign="top">
    HTTP: Netgear ProSafe Remote Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETSCAPE%3AENTERPRISE-DOS.html">HTTP:NETSCAPE:ENTERPRISE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Netscape Enterprise Server Web Publishing DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANETSCAPE%3AINDEX-DISCLOSURE.html">HTTP:NETSCAPE:INDEX-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Netscape Enterprise Server &#39;Index&#39; Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANEUTRINO-EK-PLUGDET-PG.html">HTTP:NEUTRINO-EK-PLUGDET-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Plugin Detection Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANEUTRINO-EK-REDIR.html">HTTP:NEUTRINO-EK-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Exploit Kit Redirection Received
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANEUTRINO-EK-SB.html">HTTP:NEUTRINO-EK-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Neutrino Payload Exploit Kit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANGINX-CHUNKED-BO.html">HTTP:NGINX-CHUNKED-BO</a></b></td>
   <td width="500" valign="top">
    HTTP:  Nginx Parsed Chunked Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANGINX-CHUNKED-BO1.html">HTTP:NGINX-CHUNKED-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP:  Nginx Parsed Chunked Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANGINX-RQST-URI-SECBYPASS.html">HTTP:NGINX-RQST-URI-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nginx Request URI Verification Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANGINX-RQST-URI-SECBYPASS1.html">HTTP:NGINX-RQST-URI-SECBYPASS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nginx Request URI Verification Security Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL-NETIQ-EVAL-POLBYPAS.html">HTTP:NOVELL-NETIQ-EVAL-POLBYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell NetIQ Privileged User Manager Eval Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL-NETIQ-MOD-POLBYPAS.html">HTTP:NOVELL-NETIQ-MOD-POLBYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL-NETIQ-MOD-POLBYPAS1.html">HTTP:NOVELL-NETIQ-MOD-POLBYPAS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AACT-PARAM-ID.html">HTTP:NOVELL:ACT-PARAM-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management DirectoryViewer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3ADHOST-BOF.html">HTTP:NOVELL:DHOST-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell eDirectory dhost Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3ADHOST-URI-BOF.html">HTTP:NOVELL:DHOST-URI-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell eDirectory dhost URI Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AEDIR-ACCEPT-LANG-OF.html">HTTP:NOVELL:EDIR-ACCEPT-LANG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell eDirectory Management Console Accept-Language Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AEDIR-DHOST.html">HTTP:NOVELL:EDIR-DHOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell eDirectory dhost HTTPSTK Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AEDIRECTORY-SOAP.html">HTTP:NOVELL:EDIRECTORY-SOAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell eDirectory SOAP Handling Accept Language Header Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AFILENAME-PARAM-DT.html">HTTP:NOVELL:FILENAME-PARAM-DT</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell Sentinel Log Manager Filename Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AGROUPWISE-CSS.html">HTTP:NOVELL:GROUPWISE-CSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise WebAccess Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AGROUPWISE-IMG-BOF.html">HTTP:NOVELL:GROUPWISE-IMG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client IMG Tag SRC Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AGROUPWISE-NETAGT-BO.html">HTTP:NOVELL:GROUPWISE-NETAGT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Internet Agent HTTP Interface Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AIMANAGER-TOMCAT-BOF.html">HTTP:NOVELL:IMANAGER-TOMCAT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell iManager Tomcat Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3ANETMAIL-WEBADMIN.html">HTTP:NOVELL:NETMAIL-WEBADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell NetMail WebAdmin Username Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AREPORTER-AGENT.html">HTTP:NOVELL:REPORTER-AGENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell File Reporter Agent XML Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3ATEAMING-UPLOAD.html">HTTP:NOVELL:TEAMING-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell Teaming ajaxUploadImageFile Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AWEBACC-MODIFY.html">HTTP:NOVELL:WEBACC-MODIFY</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise WebAccess Cross Site Scripting Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AZENWORKS-INFODISC.html">HTTP:NOVELL:ZENWORKS-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENWorks Asset Management rtrlet Component Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AZENWORKS-RTRLET-COM.html">HTTP:NOVELL:ZENWORKS-RTRLET-COM</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENWorks Asset Management &#39;rtrlet&#39; Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANTOP-BASIC-AUTHORIZATION1.html">HTTP:NTOP-BASIC-AUTHORIZATION1</a></b></td>
   <td width="500" valign="top">
    HTTP: ntop Basic Authorization Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANUCLEAR-EK-BIN-DL.html">HTTP:NUCLEAR-EK-BIN-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Pack Exploit Kit Binary Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANUCLEAR-OUTBOUND-CONN.html">HTTP:NUCLEAR-OUTBOUND-CONN</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ANUCLEAR-OUTBOUND-PR.html">HTTP:NUCLEAR-OUTBOUND-PR</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuclear Exploit Kit Outbound Payload Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOFFICESCAN-CGIRECVFILE.html">HTTP:OFFICESCAN-CGIRECVFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOFFICESCAN-CGIRECVFILE1.html">HTTP:OFFICESCAN-CGIRECVFILE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOPENMEDIAVAULT-AUTHEN-ACE.html">HTTP:OPENMEDIAVAULT-AUTHEN-ACE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenMediaVault Authentication Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOPENX-AD-SERVER-PHP-CE.html">HTTP:OPENX-AD-SERVER-PHP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenX Ad Server Backdoor Arbitrary PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE-ID-MANAGER-REDIREC1.html">HTTP:ORACLE-ID-MANAGER-REDIREC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Identity Manager backUrl Parameter Open Redirect1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE-ID-MANAGER-REDIRECT.html">HTTP:ORACLE-ID-MANAGER-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Identity Manager backUrl Parameter Open Redirect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE-JRE-INSECURE-LOAD.html">HTTP:ORACLE-JRE-INSECURE-LOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Environment Insecure File Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3A9I-APP-SERVER-DOS.html">HTTP:ORACLE:9I-APP-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle 9i Application Server Web Cache Administration Tool Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AAPEX-HASH.html">HTTP:ORACLE:APEX-HASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Database Application Express  Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AAPP-SERVER-BYPASS.html">HTTP:ORACLE:APP-SERVER-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Application Server Portal Authentication Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ABACKUP-AUTH-BYPASS.html">HTTP:ORACLE:BACKUP-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Secure Backup Administration Server Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ABACKUP-CMD-INJ.html">HTTP:ORACLE:BACKUP-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Secure Backup Administration Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACHAR-CONV-VULN.html">HTTP:ORACLE:CHAR-CONV-VULN</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle 10g Character Conversion Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACONF-ACCESS.html">HTTP:ORACLE:CONF-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Configuration Disclosure Anonymous Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACOPYFILE-DIR-TRAV.html">HTTP:ORACLE:COPYFILE-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Endeca CopyFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACOREL-DRAW-BO.html">HTTP:ORACLE:COREL-DRAW-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In CorelDRAW File Parser Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ADATAINT-ACTIVEX-MC.html">HTTP:ORACLE:DATAINT-ACTIVEX-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Profiling and Data Quality for Data Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ADEMANTRA-FILEACCESS.html">HTTP:ORACLE:DEMANTRA-FILEACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Demantra Demand Management Unauthorized File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AENDECA-SERVER-RCE.html">HTTP:ORACLE:ENDECA-SERVER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Server createDataStore Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AEVNTPRO-DIR-TRAV.html">HTTP:ORACLE:EVNTPRO-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP:Oracle Event Processing FileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AGENERIC-SIGNATUR-MC.html">HTTP:ORACLE:GENERIC-SIGNATUR-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Generic Signature Attribute Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AGLASSFISH-BYPASS.html">HTTP:ORACLE:GLASSFISH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle GlassFish Server Administration Console Remote Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AGLASSFISH-MUL-XSS.html">HTTP:ORACLE:GLASSFISH-MUL-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle GlassFish Enterprise Server Multiple Stored Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AGLASSFISH-REST.html">HTTP:ORACLE:GLASSFISH-REST</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle GlassFish Enterprise Server REST Interface Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AISQLPLUS-OF.html">HTTP:ORACLE:ISQLPLUS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle 10g iSQLPLus Service Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AJAVA-SERVICELOADER.html">HTTP:ORACLE:JAVA-SERVICELOADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ServiceLoader Exception Handling Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AJNLP-CODE-EXEC.html">HTTP:ORACLE:JNLP-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Sun Java JRE Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ALOGIN-COOKIES-INJ.html">HTTP:ORACLE:LOGIN-COOKIES-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Secure Backup Administration Server login.php Cookies Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AORACLE9I-INFO-LEAK.html">HTTP:ORACLE:ORACLE9I-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle9i Unauthorized Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOS-2-METAFILE-BOF.html">HTTP:ORACLE:OS-2-METAFILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDE-IN-MSACCESS.html">HTTP:ORACLE:OUTSIDE-IN-MSACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Microsoft Access 1.x Parser Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDE-IN-PRDOX-BO.html">HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Paradox Database Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDEIN-CORELDRAW.html">HTTP:ORACLE:OUTSIDEIN-CORELDRAW</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In CorelDRAW File Parser Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDEIN-MET-BOF.html">HTTP:ORACLE:OUTSIDEIN-MET-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDEIN-MET-BOF1.html">HTTP:ORACLE:OUTSIDEIN-MET-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOWA-UTIL-INFO-DISC.html">HTTP:ORACLE:OWA-UTIL-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle 9iAS PLSQL OWA_UTIL Unauthorized Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3APARADOX-DB-DOS.html">HTTP:ORACLE:PARADOX-DB-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Paradox Database Stream Filter Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AREPORTS-RCE.html">HTTP:ORACLE:REPORTS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Forms and Reports Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASBA-CMD-INJ.html">HTTP:ORACLE:SBA-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Secure Backup Administration Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASERVER-FORMS-CE.html">HTTP:ORACLE:SERVER-FORMS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Application Server Forms Arbitrary System Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASOAP-ACCESS1.html">HTTP:ORACLE:SOAP-ACCESS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Application Server SOAP Access1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASOAP-CONF.html">HTTP:ORACLE:SOAP-CONF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Application Server SOAP Config File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASRV-OPMN-FS.html">HTTP:ORACLE:SRV-OPMN-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Application Server 10g OPMN Service Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASSO-ACCESS.html">HTTP:ORACLE:SSO-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Single-Sign-On Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AWEBCENTER-SITES-RF.html">HTTP:ORACLE:WEBCENTER-SITES-RF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Sites FatWire Content Server Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AORACLE%3AXML-SIG-SPOOFING.html">HTTP:ORACLE:XML-SIG-SPOOFING</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE XML Digital Signature Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOSSIM-COMMAND-EXEC.html">HTTP:OSSIM-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACCEPT.html">HTTP:OVERFLOW:ACCEPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Accept Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACCEPT-ENCODING.html">HTTP:OVERFLOW:ACCEPT-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Accept Encoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACCEPT-LANGUAGE.html">HTTP:OVERFLOW:ACCEPT-LANGUAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Accept Language Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACDSEE-PRO-IMAGE.html">HTTP:OVERFLOW:ACDSEE-PRO-IMAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: ACDSee PRO Image Processing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACROBATX-HEAP.html">HTTP:OVERFLOW:ACROBATX-HEAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ActiveX Component Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AACROBATX-NULL.html">HTTP:OVERFLOW:ACROBATX-NULL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ActiveX Component NULL Byte Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AATP-HTTPD-OF.html">HTTP:OVERFLOW:ATP-HTTPD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: ATPhttpd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AAUTH-OVERFLOW.html">HTTP:OVERFLOW:AUTH-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Authorization Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AAUTH-OVFLW.html">HTTP:OVERFLOW:AUTH-OVFLW</a></b></td>
   <td width="500" valign="top">
    HTTP: Auth Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AAUTHORIZATION.html">HTTP:OVERFLOW:AUTHORIZATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Authorization Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ABLACK-ICE-BOF.html">HTTP:OVERFLOW:BLACK-ICE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Black Ice Software Inc Barcode SDK (BITiff.ocx) Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACAM2PC.html">HTTP:OVERFLOW:CAM2PC</a></b></td>
   <td width="500" valign="top">
    HTTP: CAM2PC Multiple Files Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACHUNK-LEN-OFLOW.html">HTTP:OVERFLOW:CHUNK-LEN-OFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Chunk Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACHUNK-OVERFLOW.html">HTTP:OVERFLOW:CHUNK-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Chunk Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACHUNKS-TOO-SMALL.html">HTTP:OVERFLOW:CHUNKS-TOO-SMALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Chunks Too Small
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONNECTION.html">HTTP:OVERFLOW:CONNECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Connection Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-ENCODING.html">HTTP:OVERFLOW:CONTENT-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Encoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-LANGUAGE.html">HTTP:OVERFLOW:CONTENT-LANGUAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Language Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-LENGTH.html">HTTP:OVERFLOW:CONTENT-LENGTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-LOCATION.html">HTTP:OVERFLOW:CONTENT-LOCATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Location Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-MD5.html">HTTP:OVERFLOW:CONTENT-MD5</a></b></td>
   <td width="500" valign="top">
    HTTP: Content MD5 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-OVERFLOW.html">HTTP:OVERFLOW:CONTENT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-RANGE.html">HTTP:OVERFLOW:CONTENT-RANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Range Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-TYPE.html">HTTP:OVERFLOW:CONTENT-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Type Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACOOKIE.html">HTTP:OVERFLOW:COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Cookie Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACOREHTTP-URI.html">HTTP:OVERFLOW:COREHTTP-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: CoreHTTP URI Parsing Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AD-LINK-HNAP-BO.html">HTTP:OVERFLOW:D-LINK-HNAP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link HNAP Request Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AEVOCAM-WEBSRV-GET.html">HTTP:OVERFLOW:EVOCAM-WEBSRV-GET</a></b></td>
   <td width="500" valign="top">
    HTTP: EvoCam Web Server GET Request Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AEXPRESSVIEW.html">HTTP:OVERFLOW:EXPRESSVIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: ExpressView Browser Plug-in Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AGAZTEK-HTTPD-OF.html">HTTP:OVERFLOW:GAZTEK-HTTPD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: GazTek HTTP Daemon URL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AGSM-SIM-UTILITY.html">HTTP:OVERFLOW:GSM-SIM-UTILITY</a></b></td>
   <td width="500" valign="top">
    HTTP: GSM SIM Utility SMS Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHEADER.html">HTTP:OVERFLOW:HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHOST.html">HTTP:OVERFLOW:HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Host Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHP-POWERMAN-OF.html">HTTP:OVERFLOW:HP-POWERMAN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Power Manager Login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHTTPDX-GET-URL-OF.html">HTTP:OVERFLOW:HTTPDX-GET-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTPDX Web Server GET URL Overflow DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHTTPDX-POST-BOF.html">HTTP:OVERFLOW:HTTPDX-POST-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTPDX Web Server POST Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHTTPDX-URL.html">HTTP:OVERFLOW:HTTPDX-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Httpdx GET Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AIMAGEMAGICK-EXIF.html">HTTP:OVERFLOW:IMAGEMAGICK-EXIF</a></b></td>
   <td width="500" valign="top">
    HTTP: ImageMagick EXIF ResolutionUnit Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AIMAGEMAGICK-SGI.html">HTTP:OVERFLOW:IMAGEMAGICK-SGI</a></b></td>
   <td width="500" valign="top">
    HTTP: ImageMagick SGI File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AINV-CHUNK-LEN.html">HTTP:OVERFLOW:INV-CHUNK-LEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Chunk Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AIRFANVIEW-PLUGIN.html">HTTP:OVERFLOW:IRFANVIEW-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: IrfanView PlugIn Image Processing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AJANA-PRXY-OF1.html">HTTP:OVERFLOW:JANA-PRXY-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: JanaServer HTTP Proxy Version Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AJESKOLA-BUZZ.html">HTTP:OVERFLOW:JESKOLA-BUZZ</a></b></td>
   <td width="500" valign="top">
    HTTP: Jeskola Buzz Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ALIBYAML-SCANNER.html">HTTP:OVERFLOW:LIBYAML-SCANNER</a></b></td>
   <td width="500" valign="top">
    HTTP: LibYAML Scanner yaml_parser_scan_uri_escapes Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ALINKSYS-APPLY.html">HTTP:OVERFLOW:LINKSYS-APPLY</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54G apply.cgi POST Request Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMAIL-ENABLE-AUTH.html">HTTP:OVERFLOW:MAIL-ENABLE-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: MailEnable HTTP Authorization Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMALICIOUS-HOST.html">HTTP:OVERFLOW:MALICIOUS-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMETHOD-GENRC-OF.html">HTTP:OVERFLOW:METHOD-GENRC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Request Method Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMISSING-VER-BO.html">HTTP:OVERFLOW:MISSING-VER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Missing HTTP Version URL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMS-HTTP-SERVICES.html">HTTP:OVERFLOW:MS-HTTP-SERVICES</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTTP Services Chunked Encoding Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMS-IE-URL-BOF.html">HTTP:OVERFLOW:MS-IE-URL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Long URL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMS-W3WHO-OF.html">HTTP:OVERFLOW:MS-W3WHO-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft W3Who Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMUL-VENDORS-BO.html">HTTP:OVERFLOW:MUL-VENDORS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMULTIPLE-PRODUCTS.html">HTTP:OVERFLOW:MULTIPLE-PRODUCTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Products Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMULTIWEB-REQOF.html">HTTP:OVERFLOW:MULTIWEB-REQOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Server Request Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ANULLHTTPD-ROOT-OF.html">HTTP:OVERFLOW:NULLHTTPD-ROOT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Null httpd Remote Root Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AOPENVIEW-NNM-BO.html">HTTP:OVERFLOW:OPENVIEW-NNM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: HP OpenView Network Node Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AOVWEBHELP-BO.html">HTTP:OVERFLOW:OVWEBHELP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: HP OpenView Network Node Manager OvWebHelp.exe CGI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3API3WEB-SLASH-OF.html">HTTP:OVERFLOW:PI3WEB-SLASH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Pi3web Slash-URL Overflow DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AREFERER.html">HTTP:OVERFLOW:REFERER</a></b></td>
   <td width="500" valign="top">
    HTTP: Referer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ARSA-WEB-OF.html">HTTP:OVERFLOW:RSA-WEB-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: RSA Web Agent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASAMBAR-SEARCH.html">HTTP:OVERFLOW:SAMBAR-SEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Sambar Server search.pl Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASAVANT.html">HTTP:OVERFLOW:SAVANT</a></b></td>
   <td width="500" valign="top">
    HTTP: Savant Web Server Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASENKAS-KALIBRI-BO.html">HTTP:OVERFLOW:SENKAS-KALIBRI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: SENKAS Kolibri Webserver GET Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASERVER.html">HTTP:OVERFLOW:SERVER</a></b></td>
   <td width="500" valign="top">
    HTTP: Server Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASERVU-SESSION.html">HTTP:OVERFLOW:SERVU-SESSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Serv-U Web Client Session Cookie Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASET-COOKIE.html">HTTP:OVERFLOW:SET-COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Set Cookie Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASIMPLE-WEB-SRV-BO.html">HTTP:OVERFLOW:SIMPLE-WEB-SRV-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Simple Web Server Connection Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASTATUS-CODE-OF.html">HTTP:OVERFLOW:STATUS-CODE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Status Code Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASYBASE-WEBCONSOLE.html">HTTP:OVERFLOW:SYBASE-WEBCONSOLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Sybase EAServer WebConsole Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ATRANSFER-ENCODING.html">HTTP:OVERFLOW:TRANSFER-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Transfer Encoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AURL-OVERFLOW.html">HTTP:OVERFLOW:URL-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AUSER-AGENT.html">HTTP:OVERFLOW:USER-AGENT</a></b></td>
   <td width="500" valign="top">
    HTTP: User Agent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AVERB-OVERFLOW.html">HTTP:OVERFLOW:VERB-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Request Verb Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AWEBC-REQ-OF.html">HTTP:OVERFLOW:WEBC-REQ-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: AutomatedShops WebC webc.cgi Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AWEBDAV-JAVASYSTEM.html">HTTP:OVERFLOW:WEBDAV-JAVASYSTEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System Web Server WebDAV Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AWSHELL-CGIC.html">HTTP:OVERFLOW:WSHELL-CGIC</a></b></td>
   <td width="500" valign="top">
    HTTP: HSphere WebShell CGI.C Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AXITAMIIFMOD.html">HTTP:OVERFLOW:XITAMIIFMOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Xitami Web Server If-Modified-Since Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AXNVIEW-IMAGE-FILE.html">HTTP:OVERFLOW:XNVIEW-IMAGE-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: XnView Multiple Image Files Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AOWA%3ALOGIN-REDIR.html">HTTP:OWA:LOGIN-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Outlook Web Access Login Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APARALLEL-PLESK-RCE.html">HTTP:PARALLEL-PLESK-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Parallels Plesk Panel Arbitrary PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APASSWD%3ACOMMON.html">HTTP:PASSWD:COMMON</a></b></td>
   <td width="500" valign="top">
    HTTP: Common Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APCAP-FORMATSTR-GENERIC.html">HTTP:PCAP-FORMATSTR-GENERIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic Libpcap/TCPDump PCAP File Format String Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APFSENSE-ZONE-CSS.html">HTTP:PFSENSE-ZONE-CSS</a></b></td>
   <td width="500" valign="top">
    HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APFSENSE-ZONE-CSS1.html">HTTP:PFSENSE-ZONE-CSS1</a></b></td>
   <td width="500" valign="top">
    HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3A427BB-AUTH-BYPASS.html">HTTP:PHP:427BB-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: 427BB Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3A4IMAGES-RFI.html">HTTP:PHP:4IMAGES-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: 4images Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3A724CMS-LFI.html">HTTP:PHP:724CMS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: 724CMS section.php Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AACAL-AUTH-BYPASS.html">HTTP:PHP:ACAL-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: ACal Calendar Project 2.2.5 Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AACGVCLICK-RFI.html">HTTP:PHP:ACGVCLICK-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: ACGVclick 0.2.0 Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AACONTENT-AUTH-BYPASS.html">HTTP:PHP:ACONTENT-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: ATutor AContent Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AACTIVIST-BASE-RFI.html">HTTP:PHP:ACTIVIST-BASE-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Activist Mobilization Platform 3.2 base.php Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAINS-AD-FUNDUM-RFI.html">HTTP:PHP:AINS-AD-FUNDUM-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Ains Ad Fundum Integratable News Script 0.02b Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAJAXPLORER-RCE.html">HTTP:PHP:AJAXPLORER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: AjaXplorer Remote Command Injection and Local File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAKARRU-SOCIAL-RFI.html">HTTP:PHP:AKARRU-SOCIAL-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Akarru Social BookMarking Engine 4.3.34 Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AALEXPHP-INCLUDE.html">HTTP:PHP:ALEXPHP-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: AlexPHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAPACHE-RQST-HEADER-BO.html">HTTP:PHP:APACHE-RQST-HEADER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP apache_request_headers Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AARDEACORE-RFI.html">HTTP:PHP:ARDEACORE-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: ArdeaCore ardeaInit pathForArdeaCore parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAWACTSCRPT-CMS-FILE-UP.html">HTTP:PHP:AWACTSCRPT-CMS-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: AWAuctionScript CMS Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AAWSTATS-SORT.html">HTTP:PHP:AWSTATS-SORT</a></b></td>
   <td width="500" valign="top">
    HTTP: AWStats Sort PHP Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABACULA-WEB-REPORT.html">HTTP:PHP:BACULA-WEB-REPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Bacula Web report.php Multiple Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABASE-RFI.html">HTTP:PHP:BASE-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Basic Analysis and Security Engine Remote File Inclusion 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABASILIC-CMD-EXE.html">HTTP:PHP:BASILIC-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Basilic diff.php Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABEAUTIFIER-RFI.html">HTTP:PHP:BEAUTIFIER-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Beautifier Core.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABHARAT-MEDIARATTA-RFI.html">HTTP:PHP:BHARAT-MEDIARATTA-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Bharat Mediratta Gallery Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABITRIX-SITE-MGR-CS.html">HTTP:PHP:BITRIX-SITE-MGR-CS</a></b></td>
   <td width="500" valign="top">
    HTTP: Bitrix Site Manager Content Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABITWEAVER-LFI.html">HTTP:PHP:BITWEAVER-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Bitweaver Local File Inclusion 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABLACKBOARD-INC.html">HTTP:PHP:BLACKBOARD-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: BlackBoard Remote PHP Code Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ABZOPEN-OF.html">HTTP:PHP:BZOPEN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP BZOPEN Function Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACACTI-CONFIG-INC.html">HTTP:PHP:CACTI-CONFIG-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: RaXnet Cacti Config_Settings.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACACTI-RDD-LOCAL-SCRIPT.html">HTTP:PHP:CACTI-RDD-LOCAL-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Cacti RDD Local Scripts
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACACTI-RRD-AUTH-BYPASS.html">HTTP:PHP:CACTI-RRD-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cacti RRD Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACACTI-RRD-FILE-INC.html">HTTP:PHP:CACTI-RRD-FILE-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: Cacti RRD Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACAUPOSHOP-LFI.html">HTTP:PHP:CAUPOSHOP-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: CaupoShop template Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACDF-INFINITE-LOOP-DOS.html">HTTP:PHP:CDF-INFINITE-LOOP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP CDF File Handling Infinite Loop DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACEDRIC-EMAIL-PHPINC1.html">HTTP:PHP:CEDRIC-EMAIL-PHPINC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Cedric Email Reader Remote PHP Code Inclusion (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACEDRIC-EMAIL-PHPINC2.html">HTTP:PHP:CEDRIC-EMAIL-PHPINC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Cedric Email Reader Remote PHP Code Inclusion (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACHARTS-RCE.html">HTTP:PHP:CHARTS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: php-Charts Arbitrary PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACLAROLINE-INCLUDE.html">HTTP:PHP:CLAROLINE-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: Claroline Import.lib.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACMD-COMMAND-EXEC.html">HTTP:PHP:CMD-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: PhpFileManager Cmd Parameter Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACMD-INJ.html">HTTP:PHP:CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACMD-INJ-UA.html">HTTP:PHP:CMD-INJ-UA</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Command Injection User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACMSQLITE-LFI.html">HTTP:PHP:CMSQLITE-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: CMSQLITE Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACOMPACTCMS-ENGINE-RFI.html">HTTP:PHP:COMPACTCMS-ENGINE-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: CompactCMS engine.class.php Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACONSTRUCTR-CMS-MUL.html">HTTP:PHP:CONSTRUCTR-CMS-MUL</a></b></td>
   <td width="500" valign="top">
    HTTP: Constructr CMS Multiple Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACOOLFORUM-INJ.html">HTTP:PHP:COOLFORUM-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: CoolForum Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACOOLFORUM-SRC-DISC.html">HTTP:PHP:COOLFORUM-SRC-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Coolforum Source Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACOOLPHP-DIRTRAV.html">HTTP:PHP:COOLPHP-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: CoolPHP &quot;op&quot; Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACOPPERMINE-RCE.html">HTTP:PHP:COPPERMINE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Coppermine Photo Gallery Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACORE-INT-OF-CE.html">HTTP:PHP:CORE-INT-OF-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Core unserialize Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ACVE-2015-2331-BO.html">HTTP:PHP:CVE-2015-2331-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Group PHP ZIP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADATEINTERVAL-DOS.html">HTTP:PHP:DATEINTERVAL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP DateInterval Heap Buffer Overread Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADBGUESTBOOK-DBSBASE.html">HTTP:PHP:DBGUESTBOOK-DBSBASE</a></b></td>
   <td width="500" valign="top">
    HTTP: DBGuestBook DBS_Base_Path Parameter Multiple Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADBGUESTBOOK-DBSBASE1.html">HTTP:PHP:DBGUESTBOOK-DBSBASE1</a></b></td>
   <td width="500" valign="top">
    HTTP: DBGuestBook DBS_Base_Path Parameter Multiple Remote File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADFORUM-PHP-INC.html">HTTP:PHP:DFORUM-PHP-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Forum Remote PHP File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADOTBR-INFO-LEAK.html">HTTP:PHP:DOTBR-INFO-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Dotbr Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADOTBR-PHP-EXEC.html">HTTP:PHP:DOTBR-PHP-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: DotBR PHP Parameter Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ADRIES-BUYTRT-DRUPAL-ID.html">HTTP:PHP:DRIES-BUYTRT-DRUPAL-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Dries Buytaert Drupal Core OpenID Module Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEASYPHP-CODETESTER-RCE.html">HTTP:PHP:EASYPHP-CODETESTER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: EasyPHP codetester.php Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEGROUPWARE-FI.html">HTTP:PHP:EGROUPWARE-FI</a></b></td>
   <td width="500" valign="top">
    HTTP: eGroupware File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEMPIRE-CMS-RFI.html">HTTP:PHP:EMPIRE-CMS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Empire CMS Checklevel.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXIF-HEADER.html">HTTP:PHP:EXIF-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Exif Header Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXIF-HEADER-INT-OF.html">HTTP:PHP:EXIF-HEADER-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Exif Header Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXIF-HEADER1.html">HTTP:PHP:EXIF-HEADER1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Exif Header Parsing Integer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXIF-NULL-DEREFERENCE.html">HTTP:PHP:EXIF-NULL-DEREFERENCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Exif Extension exif_read_data NULL Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXIFF-THUMBNAIL-BOF.html">HTTP:PHP:EXIFF-THUMBNAIL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Exif Extension Thumbnail Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXOOPS-FD.html">HTTP:PHP:EXOOPS-FD</a></b></td>
   <td width="500" valign="top">
    HTTP: Exoops File disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AEXTPLORER-FILE-UPLOAD.html">HTTP:PHP:EXTPLORER-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: eXtplorer Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFAMILY-CONN-CMS-RCE.html">HTTP:PHP:FAMILY-CONN-CMS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Family Connections CMS less.php Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFILE-INCL-DL.html">HTTP:PHP:FILE-INCL-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Inclusion Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFILEINFO-DOS.html">HTTP:PHP:FILEINFO-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Fileinfo Call Stack Exhaustion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFLASHCHAT-RFI.html">HTTP:PHP:FLASHCHAT-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: FlashChat dir[inc] Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFORM-DOS.html">HTTP:PHP:FORM-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP HTTP Multipart Form-Data Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFORMAT-OF.html">HTTP:PHP:FORMAT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP multipart-form-data Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFORMMAIL-INCLUDE.html">HTTP:PHP:FORMMAIL-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: FormMail File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFORMMAIL-SCRIPTROOT.html">HTTP:PHP:FORMMAIL-SCRIPTROOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Formmail Variable Tampering
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFREE-FILE-HOSTING-RFI.html">HTTP:PHP:FREE-FILE-HOSTING-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Free File Hosting Forgot_Pass.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFREENEWS-PHP-INC1.html">HTTP:PHP:FREENEWS-PHP-INC1</a></b></td>
   <td width="500" valign="top">
    HTTP: FreeNews Insecure PHP Code Inclusion (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFTP-GENLIST-ACE.html">HTTP:PHP:FTP-GENLIST-ACE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP ftp_genlist method Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AFTP-GENLIST-IO.html">HTTP:PHP:FTP-GENLIST-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP FTP Genlist Method Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGALLERY%3AEMBED-AUTH.html">HTTP:PHP:GALLERY:EMBED-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Gallery Embedded USER AUTH Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGALLERY%3AEMBED-AUTH-VAR.html">HTTP:PHP:GALLERY:EMBED-AUTH-VAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Gallery Embedded USER AUTH Bypass (postvar)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGALLERY%3AHTTP-VARS.html">HTTP:PHP:GALLERY:HTTP-VARS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Gallery HTTP_VARS In URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGAPICMS-DIRDEPTH-INC.html">HTTP:PHP:GAPICMS-DIRDEPTH-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: GAPI CMS dirDepth Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGESTART-RFI.html">HTTP:PHP:GESTART-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: GestArt Aide.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGHOST-GLIBC-WP.html">HTTP:PHP:GHOST-GLIBC-WP</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress CVE-2015-0235 glibc Hostname RCE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGIF-HEADER-EVASION.html">HTTP:PHP:GIF-HEADER-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP With GIF Header Evasion Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGLOBALS-INJ.html">HTTP:PHP:GLOBALS-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP GLOBALS Variable Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AGLOSSWORD-FILE-UPLOAD.html">HTTP:PHP:GLOSSWORD-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Glossword gw_admin.php Avatar Settings File Upload Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AHORDE-EVAL.html">HTTP:PHP:HORDE-EVAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Horde Arbitrary PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AHORDE-HREF-BACKDOOR.html">HTTP:PHP:HORDE-HREF-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Horde Href Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AHORDE-HREF-BACKDOOR1.html">HTTP:PHP:HORDE-HREF-BACKDOOR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Horde Href Backdoor1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AHPE-HPEINC-RFI.html">HTTP:PHP:HPE-HPEINC-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Headline Portal Engine HPEInc Parameter Multiple Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AHTML-SPCL-CHARS.html">HTTP:PHP:HTML-SPCL-CHARS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP htmlspecialchars htmlentities Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AIBM-PROVENTIA-RFI.html">HTTP:PHP:IBM-PROVENTIA-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Proventia Sensor Appliance Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AINTERPHOTO-IPLANG-LFI.html">HTTP:PHP:INTERPHOTO-IPLANG-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: InterPhoto Image Gallery Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-ADMIN-SCAN.html">HTTP:PHP:JOOMLA-ADMIN-SCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Administration Page Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-COLLECTOR.html">HTTP:PHP:JOOMLA-COM-COLLECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_collector Component Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-PHOCADL-LF1.html">HTTP:PHP:JOOMLA-COM-PHOCADL-LF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_phocadownload Component Local File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-PHOCADL-LF2.html">HTTP:PHP:JOOMLA-COM-PHOCADL-LF2</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_phocadownload Component Local File Inclusion2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-PHOCADL-LF3.html">HTTP:PHP:JOOMLA-COM-PHOCADL-LF3</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_phocadownload Component Local File Inclusion3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-PHOCADL-LF4.html">HTTP:PHP:JOOMLA-COM-PHOCADL-LF4</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_phocadownload Component Local File Inclusion4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-PHOCADL-LFI.html">HTTP:PHP:JOOMLA-COM-PHOCADL-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_phocadownload Component Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-DIR-TRAV.html">HTTP:PHP:JOOMLA-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_frontenduseraccess Local File Include Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-FILE-LISTER.html">HTTP:PHP:JOOMLA-FILE-LISTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Simple File Lister module Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-JCE-FILE-UPLOAD.html">HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla JCE  Editor File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-JE-STORY-LFI.html">HTTP:PHP:JOOMLA-JE-STORY-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla JE Story Submit Component view Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-JMSFILESELL-LFI.html">HTTP:PHP:JOOMLA-JMSFILESELL-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla jmsfileseller Component Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-JOOMTOUCH-LFI.html">HTTP:PHP:JOOMLA-JOOMTOUCH-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla JoomTouch Component controller Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-LOC-FILE.html">HTTP:PHP:JOOMLA-LOC-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Local File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-OBSUGGEST-LFI.html">HTTP:PHP:JOOMLA-OBSUGGEST-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla obSuggest Component controller Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-PHP-OBJ-INJ.html">HTTP:PHP:JOOMLA-PHP-OBJ-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla PHP Object Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-XCLONER.html">HTTP:PHP:JOOMLA-XCLONER</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla XCloner Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AKIETU-HIT-INCLUDE.html">HTTP:PHP:KIETU-HIT-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: Kietu hit.php Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALIBMAGIC-CDF-FILE-DOS.html">HTTP:PHP:LIBMAGIC-CDF-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Fileinfo Module CDF File Parsing Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALIBMAGIC-PE-RCE.html">HTTP:PHP:LIBMAGIC-PE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Libmagic Portable Executable Out Of Bounds Memory Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALOG-INSERT.html">HTTP:PHP:LOG-INSERT</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTPd Logfile PHP Command Insertion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALOKWABB-PRIVM.html">HTTP:PHP:LOKWABB-PRIVM</a></b></td>
   <td width="500" valign="top">
    HTTP: LokwaBB Private Message Disclosure (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALOKWABB-PRIVM2.html">HTTP:PHP:LOKWABB-PRIVM2</a></b></td>
   <td width="500" valign="top">
    HTTP: LokwaBB Private Message Disclosure (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ALOKWABB-PRIVM3.html">HTTP:PHP:LOKWABB-PRIVM3</a></b></td>
   <td width="500" valign="top">
    HTTP: LokwaBB Private Message Disclosure (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMAMBO-PATH-INCL.html">HTTP:PHP:MAMBO-PATH-INCL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mambo Path Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMANTIS-ARB-EXEC1.html">HTTP:PHP:MANTIS-ARB-EXEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mantis &quot;summary_graph_functions.php&quot; Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMANTIS-ARB-EXEC2.html">HTTP:PHP:MANTIS-ARB-EXEC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Mangin_ptis &quot;loage.php&quot; Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMEDIAWIKI-RCE.html">HTTP:PHP:MEDIAWIKI-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: MediaWiki Language Option PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMEDIAWIKI-SCRIPT-INSER.html">HTTP:PHP:MEDIAWIKI-SCRIPT-INSER</a></b></td>
   <td width="500" valign="top">
    HTTP: MediaWiki Parser Script Insertion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMEMORY-LIMIT-CE.html">HTTP:PHP:MEMORY-LIMIT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP memory_limit Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMIDICART-DB.html">HTTP:PHP:MIDICART-DB</a></b></td>
   <td width="500" valign="top">
    HTTP: MidiCart Database Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMLOG-SCREEN.html">HTTP:PHP:MLOG-SCREEN</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP/FI mylog/mlog Exploitation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMOODLE-TEX-FILTER-RCE.html">HTTP:PHP:MOODLE-TEX-FILTER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Moodle Tex Filter Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMYBB-BACKDOOR.html">HTTP:PHP:MYBB-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    HTTP: MyBB Compromised Source Packages Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMYNEWSGROUPS-RFI.html">HTTP:PHP:MYNEWSGROUPS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: MyNewsGroups Layersmenu.INC.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AMYSQL-COMMANDER-RFI.html">HTTP:PHP:MYSQL-COMMANDER-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL Commander Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AN-CMS-PAGE-LFI.html">HTTP:PHP:N-CMS-PAGE-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: n-cms-equipe Parameter Local File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ANARCISSUS-CMD-EXE.html">HTTP:PHP:NARCISSUS-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Narcissus release Parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ANETWORK-WEATHERMAP-LFI.html">HTTP:PHP:NETWORK-WEATHERMAP-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Network Weathermap editor.php Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOABOARD-RFI.html">HTTP:PHP:OABOARD-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: OABoard Forum Script Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPEN-EDUCATION-SYS-RFI.html">HTTP:PHP:OPEN-EDUCATION-SYS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Open Educational System Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPEN-FLASH-CHART-RCE.html">HTTP:PHP:OPEN-FLASH-CHART-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Open Flash Chart ofc_upload_image.php Remote PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPEN-REALITY-XSS-SQLI.html">HTTP:PHP:OPEN-REALITY-XSS-SQLI</a></b></td>
   <td width="500" valign="top">
    HTTP: Open-Reality Cross Site Scripting and SQL Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPENEMR-GLOBALS-AB.html">HTTP:PHP:OPENEMR-GLOBALS-AB</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenEMR globals.php Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPENI-CMS-RFI.html">HTTP:PHP:OPENI-CMS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: OPENi-CMS Plugin Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOPENSSL-X509-CERT-MC.html">HTTP:PHP:OPENSSL-X509-CERT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP OpenSSL Extension X.509 Certificate Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AOSCOMMERCE-ADMIN.html">HTTP:PHP:OSCOMMERCE-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: osCommerce Online Merchant Admin Console Remote Privilege Escalation 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APACER-CMS-FILE-DELETE.html">HTTP:PHP:PACER-CMS-FILE-DELETE</a></b></td>
   <td width="500" valign="top">
    HTTP: Pacer Edition CMS rm Parameter Arbitrary File Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APACER-CMS-FILE-DELETE1.html">HTTP:PHP:PACER-CMS-FILE-DELETE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Pacer Edition CMS rm Parameter Arbitrary File Deletion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APACER-EDITION-CMS-LFI.html">HTTP:PHP:PACER-EDITION-CMS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Pacer Edition CMS l Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APACER-EDITION-CMS-LFI1.html">HTTP:PHP:PACER-EDITION-CMS-LFI1</a></b></td>
   <td width="500" valign="top">
    HTTP: Pacer Edition CMS l Parameter Local File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APAGETOOL-SQL-INJ.html">HTTP:PHP:PAGETOOL-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: myphpPageTool Remote Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APFSENSE-SNORT-INFO-DIS.html">HTTP:PHP:PFSENSE-SNORT-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: ESF pfSense Snort snort_log_view.php Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHAR-PARSE-TARFILE-ID.html">HTTP:PHP:PHAR-PARSE-TARFILE-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP phar_parse_tarfile method Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHAR_SET_INODE-FUNC-BO.html">HTTP:PHP:PHAR_SET_INODE-FUNC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Phar_set_inode Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHORUM%3AADMIN-PW-CHG.html">HTTP:PHP:PHORUM:ADMIN-PW-CHG</a></b></td>
   <td width="500" valign="top">
    HTTP: Phorum admin.php3 Unverified Administrative Password Change
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHORUM%3AREAD-ACCESS.html">HTTP:PHP:PHORUM:READ-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Phorum Read Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHORUM%3AREMOTE-EXEC.html">HTTP:PHP:PHORUM:REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Phorum Remote PHP File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHORUM%3ARESPONSE-SPLIT.html">HTTP:PHP:PHORUM:RESPONSE-SPLIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Phorum HTTP Response Splitting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-CAL-FILE-INC.html">HTTP:PHP:PHP-CAL-FILE-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Calendar File Include Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-CGI-CMD-LINE-RCE.html">HTTP:PHP:PHP-CGI-CMD-LINE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP &#39;php-cgi&#39; Command Line Attribute Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-CORE-UAF.html">HTTP:PHP:PHP-CORE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Core Unserialize Process Nested Data Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-FILE-INCL.html">HTTP:PHP:PHP-FILE-INCL</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP File Inclusion System Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-NEWS-FILE-INC.html">HTTP:PHP:PHP-NEWS-FILE-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP News File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-QUOT-PRINT-ENCODE.html">HTTP:PHP:PHP-QUOT-PRINT-ENCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP php_quot_print_encode Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-XML-CMD.html">HTTP:PHP:PHP-XML-CMD</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP XML Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPADSNEW-RFI1.html">HTTP:PHP:PHPADSNEW-RFI1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPAdsNew Remote Arbitrary Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AAUTH-BYPASS.html">HTTP:PHP:PHPBB:AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AAVATAR-PATH-INC.html">HTTP:PHP:PHPBB:AVATAR-PATH-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Avatar_Path PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AAVATAR-UPLOAD.html">HTTP:PHP:PHPBB:AVATAR-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Avatar Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3ADL-SQL-INJ.html">HTTP:PHP:PHPBB:DL-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Download Module SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AHIGHLIGHT-EXEC.html">HTTP:PHP:PHPBB:HIGHLIGHT-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Search Highlighting Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3ALANG-EXEC.html">HTTP:PHP:PHPBB:LANG-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Language Preference Arbitrary File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3APM-SQL-USER.html">HTTP:PHP:PHPBB:PM-SQL-USER</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Private Message Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3APRIV-DEL.html">HTTP:PHP:PHPBB:PRIV-DEL</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Arbitrary Private Message Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3APROFILE-ADD-DOS.html">HTTP:PHP:PHPBB:PROFILE-ADD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Profile Add DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3APROOTPATH-INJ.html">HTTP:PHP:PHPBB:PROOTPATH-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB phpbb_root_path Parameter Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3ASEARCH-DOS.html">HTTP:PHP:PHPBB:SEARCH-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB Search Flood DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3ASEARCH-INJECT.html">HTTP:PHP:PHPBB:SEARCH-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB search_id SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3ASELECT-FISH.html">HTTP:PHP:PHPBB:SELECT-FISH</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB User Select Fish Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AUID-SQL-INJECT.html">HTTP:PHP:PHPBB:UID-SQL-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB UserID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBB%3AUID-SQL-INJECT1.html">HTTP:PHP:PHPBB:UID-SQL-INJECT1</a></b></td>
   <td width="500" valign="top">
    HTTP: phpBB UserID Parameter SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPBOOK-CODE-INJECTION.html">HTTP:PHP:PHPBOOK-CODE-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPBook Mail Field PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPESCSHELL.html">HTTP:PHP:PHPESCSHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Escapeshell Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPFORUM-INC.html">HTTP:PHP:PHPFORUM-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPForum MAIN_PATH Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPINFO-QUERY.html">HTTP:PHP:PHPINFO-QUERY</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP PHPINFO Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPINFO-SERVER.html">HTTP:PHP:PHPINFO-SERVER</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP PHPINFO Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPLIB-REMOTE-EXEC.html">HTTP:PHP:PHPLIB-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPLIB Remote Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ABACKDOOR-CE.html">HTTP:PHP:PHPMYADMIN:BACKDOOR-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: PhpMyAdmin Backdoor Access and Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3AFMT-OPTION.html">HTTP:PHP:PHPMYADMIN:FMT-OPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3AGOTO-RFI.html">HTTP:PHP:PHPMYADMIN:GOTO-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin goto Parameter Remote File Inclusion 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ALOCALFILE.html">HTTP:PHP:PHPMYADMIN:LOCALFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL_LOCALFILE Infromation Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3APREG-REPLAC.html">HTTP:PHP:PHPMYADMIN:PREG-REPLAC</a></b></td>
   <td width="500" valign="top">
    HTTP: phpMyAdmin preg_replace Function Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ASERVERDB.html">HTTP:PHP:PHPMYADMIN:SERVERDB</a></b></td>
   <td width="500" valign="top">
    HTTP: phpMyAdmin server_databases Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ASETUP-SCAN.html">HTTP:PHP:PHPMYADMIN:SETUP-SCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin Setup Script Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ASVR-PARAM.html">HTTP:PHP:PHPMYADMIN:SVR-PARAM</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin Server Configuration in Parameters
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ASVR-PARAM1.html">HTTP:PHP:PHPMYADMIN:SVR-PARAM1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin Server Configuration in Parameters1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYNEWS-FILE-ACCESS.html">HTTP:PHP:PHPMYNEWS-FILE-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPMyNewsLetter Unauthorized File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYNEWS-INCLUDE.html">HTTP:PHP:PHPMYNEWS-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: phpMyNewsletter Insecure File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNEWS%3ASQL-SENDTO.html">HTTP:PHP:PHPNEWS:SQL-SENDTO</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPNews sendtofriend.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3A4NALBUM-INC.html">HTTP:PHP:PHPNUKE:4NALBUM-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: 4nAlbum PHP-Nuke Module displaycategory.php Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3AADMIN-GUESS.html">HTTP:PHP:PHPNUKE:ADMIN-GUESS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Administrator Password Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3ABOOKMARK-SQL.html">HTTP:PHP:PHPNUKE:BOOKMARK-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: PhpNuke SQL Injection via Bookmark
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3ACID-SQL-INJECT.html">HTTP:PHP:PHPNUKE:CID-SQL-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke CID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3ADELADMIN.html">HTTP:PHP:PHPNUKE:DELADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke DelAdmin Page Unauthorized Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3ADOWNLD-SQL-INJ.html">HTTP:PHP:PHPNUKE:DOWNLD-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Downloads Module SQL Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3AMODULES-DOS.html">HTTP:PHP:PHPNUKE:MODULES-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke modules.php SQL Injection DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3APATH-DISC1.html">HTTP:PHP:PHPNUKE:PATH-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Multiple Files Path Disclosure (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3APATH-DISC2.html">HTTP:PHP:PHPNUKE:PATH-DISC2</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Multiple Files Path Disclosure (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3APRIV-ESC.html">HTTP:PHP:PHPNUKE:PRIV-ESC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Remote Priviledge Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3AQR-SQL-INJECT.html">HTTP:PHP:PHPNUKE:QR-SQL-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Modules.php QUERY Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3ASID-SQL-INJECT.html">HTTP:PHP:PHPNUKE:SID-SQL-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Modules.php SID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPNUKE%3AVIEWADMIN.html">HTTP:PHP:PHPNUKE:VIEWADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke ViewAdmin Page Unauthorized Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPPASS-BYPASS.html">HTTP:PHP:PHPPASS-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: phpPass Authorization Circumvention
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPROJEKT-INC.html">HTTP:PHP:PHPROJEKT-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: PHProjekt &quot;path_pre&quot; Parameter Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPRPC-EXEC.html">HTTP:PHP:PHPRPC-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: phpRPC Library Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI.html">HTTP:PHP:PHPSECUREPAGE-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI1.html">HTTP:PHP:PHPSECUREPAGE-RFI1</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI2.html">HTTP:PHP:PHPSECUREPAGE-RFI2</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI3.html">HTTP:PHP:PHPSECUREPAGE-RFI3</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI4.html">HTTP:PHP:PHPSECUREPAGE-RFI4</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI5.html">HTTP:PHP:PHPSECUREPAGE-RFI5</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI6.html">HTTP:PHP:PHPSECUREPAGE-RFI6</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI7.html">HTTP:PHP:PHPSECUREPAGE-RFI7</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI8.html">HTTP:PHP:PHPSECUREPAGE-RFI8</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSECUREPAGE-RFI9.html">HTTP:PHP:PHPSECUREPAGE-RFI9</a></b></td>
   <td width="500" valign="top">
    HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSPLOIT-POSTEXP.html">HTTP:PHP:PHPSPLOIT-POSTEXP</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPSploit Post Exploitation Backdoor Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPWEB-REMOTE-FILE.html">HTTP:PHP:PHPWEB-REMOTE-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: phpWebsite PHP Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APHPZIPURL.html">HTTP:PHP:PHPZIPURL</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP ZIP URL Wrapper Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APINE-APP-CMD-INJ.html">HTTP:PHP:PINE-APP-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure confpremenu.php Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APINE-APP-CMD-INJE.html">HTTP:PHP:PINE-APP-CMD-INJE</a></b></td>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure conflivelog.pl Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APINEAPP-CMD-INJ.html">HTTP:PHP:PINEAPP-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure test_li_connection.php Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APINEAPP-COMMAND-INJ.html">HTTP:PHP:PINEAPP-COMMAND-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure ldapsyncnow.php Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APINEAPP-LIVELOG-RCE.html">HTTP:PHP:PINEAPP-LIVELOG-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure Livelog.html Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APMACHINE-INCLUDE.html">HTTP:PHP:PMACHINE-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: pMachine Remote PHP Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APMACHINE-PATH-DISC.html">HTTP:PHP:PMACHINE-PATH-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: pMachine Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APODCAST-FILE-INCL.html">HTTP:PHP:PODCAST-FILE-INCL</a></b></td>
   <td width="500" valign="top">
    HTTP: PodCastGen Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APOSTNUKE-CMD-EXEC.html">HTTP:PHP:POSTNUKE-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: PostNuke Theme Parameter Directory Traversal and Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3APROJECTPIER-FILE-UP.html">HTTP:PHP:PROJECTPIER-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: ProjectPier upload.php Script Upload PHP Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AQDPM-FILE-UPLOAD.html">HTTP:PHP:QDPM-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: qdPM File Upload PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ARAXNET-CACTI-RCE.html">HTTP:PHP:RAXNET-CACTI-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: RaXnet Cacti Graph_Image.PHP Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AREDHAT-PIRANHA-PASSWD.html">HTTP:PHP:REDHAT-PIRANHA-PASSWD</a></b></td>
   <td width="500" valign="top">
    HTTP: RedHat 6.2 Piranha passwd.php3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AREDHAT-PIRANHA-PASSWD1.html">HTTP:PHP:REDHAT-PIRANHA-PASSWD1</a></b></td>
   <td width="500" valign="top">
    HTTP: RedHat 6.2 Piranha passwd.php31
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AREGISTER-VARIABLE-CE.html">HTTP:PHP:REGISTER-VARIABLE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP php_register_variable_ex Function Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AREMOTE-FILE-INCL.html">HTTP:PHP:REMOTE-FILE-INCL</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Remote File inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ARUNCMS-FILE-UP.html">HTTP:PHP:RUNCMS-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: RunCMS File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASABDRIMER-RFI.html">HTTP:PHP:SABDRIMER-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Sabdrimer CMS Sabdrimer Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASAVEWEB-PORTAL-RFI.html">HTTP:PHP:SAVEWEB-PORTAL-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: SaveWeb Portal SITE_Path Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASCHEDULEIT-RCE.html">HTTP:PHP:SCHEDULEIT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: phpScheduleIt reserve.php Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASDNTOJEWISH-FUNC-OF.html">HTTP:PHP:SDNTOJEWISH-FUNC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP SdnToJewish Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASEARCHBLOX-REQ-ID.html">HTTP:PHP:SEARCHBLOX-REQ-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: SearchBlox Request Remote Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASILENT-STORM-ADMIN.html">HTTP:PHP:SILENT-STORM-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Silent Storm Portal Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASITE-ASSISTANT-RFI.html">HTTP:PHP:SITE-ASSISTANT-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Site-Assistant Menu.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASITEMAN-USER.html">HTTP:PHP:SITEMAN-USER</a></b></td>
   <td width="500" valign="top">
    HTTP: Siteman User Database Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASPHPBLOG-PW-DOWNLOAD.html">HTTP:PHP:SPHPBLOG-PW-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Simple PHP Blog Password File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASPL-OBJECT-UNSERIALIZE.html">HTTP:PHP:SPL-OBJECT-UNSERIALIZE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP unserialize Call SPL Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASQUIRRELMAIL.html">HTTP:PHP:SQUIRRELMAIL</a></b></td>
   <td width="500" valign="top">
    HTTP: SquirrelMail File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASQUIRRELMAIL-AUTH.html">HTTP:PHP:SQUIRRELMAIL-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: SquirrelMail Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASQUIRRELMAIL-AUTH1.html">HTTP:PHP:SQUIRRELMAIL-AUTH1</a></b></td>
   <td width="500" valign="top">
    HTTP: SquirrelMail Authentication Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASSL-CERT-SEC-BYPASS.html">HTTP:PHP:SSL-CERT-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP SSL Certificate Validation Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASTRIP-TAGS-XSS.html">HTTP:PHP:STRIP-TAGS-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP strip_tags Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASTUNSHELL-RCE.html">HTTP:PHP:STUNSHELL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: STUNSHELL Web Shell Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASUGARCRM-CE.html">HTTP:PHP:SUGARCRM-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: SugarCRM PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-GW-LFI.html">HTTP:PHP:SYM-GW-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Remote LFI root Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-WG-FILE-DOWN-DEL.html">HTTP:PHP:SYM-WG-FILE-DOWN-DEL</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Arbitrary File Download and Delete
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-WG-FILE-UP.html">HTTP:PHP:SYM-WG-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Arbitrary PHP File Upload Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-WG-IPCHANG.html">HTTP:PHP:SYM-WG-IPCHANG</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway ipchange.php Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ASYMC-WEB-CMD-INJ.html">HTTP:PHP:SYMC-WEB-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATAX-DRAWIMAGE-RCE.html">HTTP:PHP:TAX-DRAWIMAGE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PhpTax drawimage.php  Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATHATWARE%3AARTLIST-INC.html">HTTP:PHP:THATWARE:ARTLIST-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: ThatWare artlist.php Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATHATWARE%3AAUTH-INC.html">HTTP:PHP:THATWARE:AUTH-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: ThatWare Authenticated User Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATHATWARE%3ACONFIG-INC.html">HTTP:PHP:THATWARE:CONFIG-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: ThatWare config.php Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATHATWARE%3ATHATFILE-INC.html">HTTP:PHP:THATWARE:THATFILE-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: ThatWare thatfile.php Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATIKIWIKI-CMD-EXEC.html">HTTP:PHP:TIKIWIKI-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: TikiWiki Upload PHP Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATIKIWIKI-FORM.html">HTTP:PHP:TIKIWIKI-FORM</a></b></td>
   <td width="500" valign="top">
    HTTP: TikiWiki tiki-graph_formula Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATIKIWIKI-JHOT.html">HTTP:PHP:TIKIWIKI-JHOT</a></b></td>
   <td width="500" valign="top">
    HTTP: TikiWiki Jhot Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATINYWEBGALLERY-LFI.html">HTTP:PHP:TINYWEBGALLERY-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: TinyWebGallery Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3ATSEP-COLORSWITCH-RFI.html">HTTP:PHP:TSEP-COLORSWITCH-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: TSEP Colorswitch.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AULTIMATE-FUN-BOOK-RFI.html">HTTP:PHP:ULTIMATE-FUN-BOOK-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: Ultimate Fun Book Function.PHP Remote File Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AULTIMATE-PHP-BOARD.html">HTTP:PHP:ULTIMATE-PHP-BOARD</a></b></td>
   <td width="500" valign="top">
    HTTP: Ultimate PHP Board Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AULTIMATE-PHP-CODE-EXEC.html">HTTP:PHP:ULTIMATE-PHP-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Ultimate PHP Board User Agent Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AUPLOAD-LOCATION.html">HTTP:PHP:UPLOAD-LOCATION</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Arbitrary File Upload Location
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AV0PCR3W-WEB-SHELL-RCE.html">HTTP:PHP:V0PCR3W-WEB-SHELL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: v0pCr3w Web Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVAMCART-FU.html">HTTP:PHP:VAMCART-FU</a></b></td>
   <td width="500" valign="top">
    HTTP: VAMCart tinybrowser.php Remote Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVBULLETIN-CODE-EXEC.html">HTTP:PHP:VBULLETIN-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: vBulletin PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVBULLETIN-IMPEX-INC.html">HTTP:PHP:VBULLETIN-IMPEX-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: vBulletin ImpEx Module systempath Variable Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVS-NEWS-RFI.html">HTTP:PHP:VS-NEWS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVS-NEWS-RFI1.html">HTTP:PHP:VS-NEWS-RFI1</a></b></td>
   <td width="500" valign="top">
    HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AVWAROOT-INCLUDE.html">HTTP:PHP:VWAROOT-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: Virtual War vwar_root Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWAN-EMULATOR-CE.html">HTTP:PHP:WAN-EMULATOR-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: WAN Emulator result.php pc Parameter Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWEBCAL-INC.html">HTTP:PHP:WEBCAL-INC</a></b></td>
   <td width="500" valign="top">
    HTTP: WebCalendar Send_Reminders.PHP Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWEBID-FILE-DISCLOSURE.html">HTTP:PHP:WEBID-FILE-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Webid Local File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWEBMIN-TARGET.html">HTTP:PHP:WEBMIN-TARGET</a></b></td>
   <td width="500" valign="top">
    HTTP: phpMyWebmin target Parameter Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWEBSVN-CMD-INJ.html">HTTP:PHP:WEBSVN-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: WebSVN path Parameter Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWEBTESTER-CMD-EXE.html">HTTP:PHP:WEBTESTER-CMD-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: WebTester Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWHMCS-LFI.html">HTTP:PHP:WHMCS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WHMCS templatefile Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWMNEWS-RFI.html">HTTP:PHP:WMNEWS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WMNews Base_Datapath Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWOLTAB-SQL-INJ.html">HTTP:PHP:WOLTAB-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Woltlab Burning Board SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-COOKIE-INJ.html">HTTP:PHP:WORDPRESS-COOKIE-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Cookie Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-MUL-FL-GAL.html">HTTP:PHP:WORDPRESS-MUL-FL-GAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple WordPress 1 Flash Gallery Plugin Vulnerabilities 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-MUL-GND-ALBM.html">HTTP:PHP:WORDPRESS-MUL-GND-ALBM</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple WordPress GRAND Flash Album Gallery Plugin Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-OPS-LFI.html">HTTP:PHP:WORDPRESS-OPS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Old Post Spinner Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-SPEED-RCE.html">HTTP:PHP:WORDPRESS-SPEED-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress PHP Speedy Plugin  &#39;admin_container.php&#39; Remote PHP Code Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-SPELCHECK-FI.html">HTTP:PHP:WORDPRESS-SPELCHECK-FI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Spellchecker Plugin File Parameter File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-UPLOAD.html">HTTP:PHP:WORDPRESS-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress uploadImage.php Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-USER-INJ.html">HTTP:PHP:WORDPRESS-USER-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress Username Parameter PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWORDPRESS-WPCUSTOM-LFI.html">HTTP:PHP:WORDPRESS-WPCUSTOM-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP Custom Pages Plugin url Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-ACF-ABSPATH-RFI.html">HTTP:PHP:WP-ACF-ABSPATH-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Advanced Custom Fields Plugin &quot;acf_abspath&quot; Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-ANNOUNCES-RFI.html">HTTP:PHP:WP-ANNOUNCES-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Announces Plugin abspath Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-BRUTE-FORCE-LOGIN.html">HTTP:PHP:WP-BRUTE-FORCE-LOGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-DOUPLOAD-FU.html">HTTP:PHP:WP-DOUPLOAD-FU</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Member Conversation Plugin doupload.php Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-FILE-UPLOAD.html">HTTP:PHP:WP-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Page Flip Image Gallery Plugin Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-FOXYPRESS-FILE-UP.html">HTTP:PHP:WP-FOXYPRESS-FILE-UP</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Foxypress Plugin Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-GLOBAL-CONT-CE.html">HTTP:PHP:WP-GLOBAL-CONT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Global Content Blocks Code Execution Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-GLOBAL-INFO-DISC.html">HTTP:PHP:WP-GLOBAL-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Global Content Blocks Information Disclosure Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-GRAND-FLASH.html">HTTP:PHP:WP-GRAND-FLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress GRAND Flash Album Gallery Plugin File Overwrite Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-GRAND-FLASH-ALBUM.html">HTTP:PHP:WP-GRAND-FLASH-ALBUM</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress GRAND Flash Album Gallery Plugin Directory Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-INCLUDES-ACCESS.html">HTTP:PHP:WP-INCLUDES-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress &quot;wp-includes&quot; Path Remote Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-IS-HUMAN-CMD-INJ.html">HTTP:PHP:WP-IS-HUMAN-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress is_human Plugin Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-JQUERY-MEGAMENU-LFI.html">HTTP:PHP:WP-JQUERY-MEGAMENU-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress jQuery Mega Menu Widget Plugin skin Parameter Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-MRKPLC-UPLOADIFY.html">HTTP:PHP:WP-MRKPLC-UPLOADIFY</a></b></td>
   <td width="500" valign="top">
    HTTP: WP Marketplace Plugin uploadify.php Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-PROPERTY-RCE.html">HTTP:PHP:WP-PROPERTY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP-Property Plugin Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-README-SCAN.html">HTTP:PHP:WP-README-SCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Readme.html Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-SIMPLE-ADS-MGR-MUL.html">HTTP:PHP:WP-SIMPLE-ADS-MGR-MUL</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Simple Ads Manager Plugin Multiple Security Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-SLIDER-REV-AFD.html">HTTP:PHP:WP-SLIDER-REV-AFD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Slider Revolution Responsive Plug-In Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-WPTOUCH-REDIRECT.html">HTTP:PHP:WP-WPTOUCH-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WPtouch Plugin wptouch_redirect Parameter URI Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-XML-RPC-PINGBACK-PP.html">HTTP:PHP:WP-XML-RPC-PINGBACK-PP</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Pingback Via Patsy Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-XML-RPC-PINGBACK-RQ.html">HTTP:PHP:WP-XML-RPC-PINGBACK-RQ</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress XML RPC Pingback Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-XMLRPC-BRUTE.html">HTTP:PHP:WP-XMLRPC-BRUTE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress XMLRPC Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AXAMPP-FILE-WRITE.html">HTTP:PHP:XAMPP-FILE-WRITE</a></b></td>
   <td width="500" valign="top">
    HTTP: XAMPP File Write Access 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AXML-HEAP-MEM-CORR.html">HTTP:PHP:XML-HEAP-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP xml_parse_into_struct Heap Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AXODA-FILE-UPLOAD.html">HTTP:PHP:XODA-FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: XODA Arbitrary File Upload and HTML Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AXOOPS-BANNERS-LFI.html">HTTP:PHP:XOOPS-BANNERS-LFI</a></b></td>
   <td width="500" valign="top">
    HTTP: XOOPS banners.php Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC.html">HTTP:PHP:YABBSE-PKG-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC1.html">HTTP:PHP:YABBSE-PKG-EXEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC2.html">HTTP:PHP:YABBSE-PKG-EXEC2</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC3.html">HTTP:PHP:YABBSE-PKG-EXEC3</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC4.html">HTTP:PHP:YABBSE-PKG-EXEC4</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC5.html">HTTP:PHP:YABBSE-PKG-EXEC5</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC6.html">HTTP:PHP:YABBSE-PKG-EXEC6</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC7.html">HTTP:PHP:YABBSE-PKG-EXEC7</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC8.html">HTTP:PHP:YABBSE-PKG-EXEC8</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-PKG-EXEC9.html">HTTP:PHP:YABBSE-PKG-EXEC9</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE Packages.php Code Execution9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AYABBSE-SSI-INCLUDE.html">HTTP:PHP:YABBSE-SSI-INCLUDE</a></b></td>
   <td width="500" valign="top">
    HTTP: YabbSE SSI.php Remote PHP Code Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AZEBRAFEEDS-RFI.html">HTTP:PHP:ZEBRAFEEDS-RFI</a></b></td>
   <td width="500" valign="top">
    HTTP: ZebraFeeds zf_path Parameter Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHP%3AZONEMINDER-SERVER-CE.html">HTTP:PHP:ZONEMINDER-SERVER-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: ZoneMinder Video Server packageControl Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHPWIKI-PLOTICUS-ACE.html">HTTP:PHPWIKI-PLOTICUS-ACE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APHPWIKI-PLOTICUS-ACE1.html">HTTP:PHPWIKI-PLOTICUS-ACE1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AALLAIRE-JRUN-DOS.html">HTTP:PKG:ALLAIRE-JRUN-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Allaire JRUN DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AANACONDA-DIR-TRAVERSAL.html">HTTP:PKG:ANACONDA-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Anaconda Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ACARELLO-VBEXEC.html">HTTP:PKG:CARELLO-VBEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Carello 1.3 Remote File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ACART32-ADM-PW-CHG.html">HTTP:PKG:CART32-ADM-PW-CHG</a></b></td>
   <td width="500" valign="top">
    HTTP: cart32 Admin Password Change
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ACART32-CLI-DIS.html">HTTP:PKG:CART32-CLI-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: cart32 Client Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ADB4WEB-FILE-ACCESS.html">HTTP:PKG:DB4WEB-FILE-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: DB4Web Arbitrary File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ADNSTOOLS-AUTH-BYPASS.html">HTTP:PKG:DNSTOOLS-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: DNSTools &quot;Authorization&quot; Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AEWAVE-SERVLET-DOS.html">HTTP:PKG:EWAVE-SERVLET-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Unify eWave ServletExec DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AEZMALL-LOG-ORDER-ACCSS.html">HTTP:PKG:EZMALL-LOG-ORDER-ACCSS</a></b></td>
   <td width="500" valign="top">
    HTTP: EzMall Log Order Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AICQ-WEBFRONT-DOS-2.html">HTTP:PKG:ICQ-WEBFRONT-DOS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: ICQ Webfront DoS (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AMOUNTAIN-WEBCART-DISC.html">HTTP:PKG:MOUNTAIN-WEBCART-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mountain-net WebCart Order Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AMS-JET-VBA.html">HTTP:PKG:MS-JET-VBA</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft JET Database Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ANAI-PGP-ADMIN-ACCESS-1.html">HTTP:PKG:NAI-PGP-ADMIN-ACCESS-1</a></b></td>
   <td width="500" valign="top">
    HTTP: NAI PGP Keyserver Web Admin Access (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ANAI-PGP-ADMIN-ACCESS-2.html">HTTP:PKG:NAI-PGP-ADMIN-ACCESS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: NAI PGP Keyserver Web Admin Access (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AOFFICESCAN-JDKRQNOTIFY.html">HTTP:PKG:OFFICESCAN-JDKRQNOTIFY</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan jdkRqNotify
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ASALESLOGIC-UNAUTH-ADMN.html">HTTP:PKG:SALESLOGIC-UNAUTH-ADMN</a></b></td>
   <td width="500" valign="top">
    HTTP: SalesLogics Unauthenticated slxweb.dll Admin Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ASALESLOGIX-AUTH-BYPASS.html">HTTP:PKG:SALESLOGIX-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Best Software SalesLogix Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ASUPERSCOUT-USERLIST.html">HTTP:PKG:SUPERSCOUT-USERLIST</a></b></td>
   <td width="500" valign="top">
    HTTP: SuperScout Email Filter Administration User Database Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ATUXEDO-DOS.html">HTTP:PKG:TUXEDO-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Tuxedo INIFILE Parameter Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3ATUXEDO-INIFILE.html">HTTP:PKG:TUXEDO-INIFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Tuxedo INIFILE Parameter Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AVWALL-FTPSAV-DLL.html">HTTP:PKG:VWALL-FTPSAV-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Viruswall FtpSave.dll Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AWEBGAIS-REMOTE-EXEC.html">HTTP:PKG:WEBGAIS-REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: WEBgais WebSendmail Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AWEBMIN-BRUTE.html">HTTP:PKG:WEBMIN-BRUTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Webmin Administrator Password Brute Force
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AWEBMIN-FAKE-SESSION.html">HTTP:PKG:WEBMIN-FAKE-SESSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Webmin Fake SessionID Initialization
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AWEBMIN-FILEDISC.html">HTTP:PKG:WEBMIN-FILEDISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Webmin File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APKG%3AWEBMIN-SHOWCGI-CMDEXEC.html">HTTP:PKG:WEBMIN-SHOWCGI-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Webmin show.cgi Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3ACGIPROXY.html">HTTP:PROXY:ANON:CGIPROXY</a></b></td>
   <td width="500" valign="top">
    HTTP: Anonomous Proxy - CGIProxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3ACONCEAL-WS.html">HTTP:PROXY:ANON:CONCEAL-WS</a></b></td>
   <td width="500" valign="top">
    HTTP: conceal.ws Anonomous Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3AFOXY-FILTER.html">HTTP:PROXY:ANON:FOXY-FILTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxy Filtering Proxy Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3APHPROXY.html">HTTP:PROXY:ANON:PHPROXY</a></b></td>
   <td width="500" valign="top">
    HTTP: PHProxy Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3APROXY-1.html">HTTP:PROXY:ANON:PROXY-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Anonomous CGI Proxy (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AANON%3APROXY-2.html">HTTP:PROXY:ANON:PROXY-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Anonomous CGI Proxy (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ACAW-URI-RES.html">HTTP:PROXY:CAW-URI-RES</a></b></td>
   <td width="500" valign="top">
    HTTP: CAW URI Resource Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AHTTP-PROXY-GET.html">HTTP:PROXY:HTTP-PROXY-GET</a></b></td>
   <td width="500" valign="top">
    HTTP: Proxy Using GET
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ALIST%3APROXYFIND.html">HTTP:PROXY:LIST:PROXYFIND</a></b></td>
   <td width="500" valign="top">
    HTTP: Proxy Listing Service - Proxyfind.org
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ALIST%3APUBWEBPROXIES.html">HTTP:PROXY:LIST:PUBWEBPROXIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Proxy Listing Service - PublicWebProxies.com
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3APROXYPRO-GET.html">HTTP:PROXY:PROXYPRO-GET</a></b></td>
   <td width="500" valign="top">
    HTTP: Proxy-Pro Professional GateKeeper GET Request Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3APSOPROXY-OF.html">HTTP:PROXY:PSOPROXY-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: PSOProxy Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-AT-AT.html">HTTP:PROXY:SQUID-AT-AT</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Double @ Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-CACHE-UPDATE.html">HTTP:PROXY:SQUID-CACHE-UPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Proxy Cache Update Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-FTP.html">HTTP:PROXY:SQUID-FTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Proxy FTP URI Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-NTLM-OF.html">HTTP:PROXY:SQUID-NTLM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid NTLM Authentication Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-NULL-PTR.html">HTTP:PROXY:SQUID-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Proxy String Processing NULL Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-OVERSIZE-HDR.html">HTTP:PROXY:SQUID-OVERSIZE-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid Oversized Reply Header Handling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-STRLISTGETITEM.html">HTTP:PROXY:SQUID-STRLISTGETITEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid strListGetItem Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3ASQUID-TRACE.html">HTTP:PROXY:SQUID-TRACE</a></b></td>
   <td width="500" valign="top">
    HTTP:  Squid Proxy TRACE Request Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AWINGATE-OF.html">HTTP:PROXY:WINGATE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Wingate Proxy Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APROXY%3AWPAD-CONNECTION.html">HTTP:PROXY:WPAD-CONNECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Web Proxy Autodiscovery Protocol Configuration File Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APVR-EK-LANDPG.html">HTTP:PVR-EK-LANDPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Private Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APVT-EK-LANDPG3.html">HTTP:PVT-EK-LANDPG3</a></b></td>
   <td width="500" valign="top">
    HTTP: Private Exploit Kit Landing Page 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APVT-EK-LNDPG4.html">HTTP:PVT-EK-LNDPG4</a></b></td>
   <td width="500" valign="top">
    HTTP: Private Exploit Kit Landing Page 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3APVT-EK-OUTBOUND-REQ.html">HTTP:PVT-EK-OUTBOUND-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Private Exploit Kit Outbound Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREAL-DESCBO.html">HTTP:REAL-DESCBO</a></b></td>
   <td width="500" valign="top">
    HTTP: RealServer Describe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREALTEK-MEDIAPLAYER-PLA-B1.html">HTTP:REALTEK-MEDIAPLAYER-PLA-B1</a></b></td>
   <td width="500" valign="top">
    HTTP: Realtek Media Player pla File Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-5DIGIT-APPLET.html">HTTP:REDKIT-EK-5DIGIT-APPLET</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page 5 Digit JAR Applet Request Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-5DIGIT-REQ.html">HTTP:REDKIT-EK-5DIGIT-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Java Exploit 5 Digit Request Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-JAVA-EXPLOIT-DL.html">HTTP:REDKIT-EK-JAVA-EXPLOIT-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Java Exploit Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-JAVACLASS-REQ.html">HTTP:REDKIT-EK-JAVACLASS-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Java Exploit Request To .class File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-LANDPG4.html">HTTP:REDKIT-EK-LANDPG4</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Landing Page 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-MULTI-REQS.html">HTTP:REDKIT-EK-MULTI-REQS</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Multiple Requests
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREDKIT-EK-PAYLOAD.html">HTTP:REDKIT-EK-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Redkit Exploit Kit Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREGIN-CNC-TRAFFIC.html">HTTP:REGIN-CNC-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious REGIN Infected Host Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREGIN-CNC-TRAFFIC1.html">HTTP:REGIN-CNC-TRAFFIC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious REGIN Infected Host Traffic1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREMOTE-URL-IN-VAR.html">HTTP:REMOTE-URL-IN-VAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Remote URL In HTTP Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-ACC-ENC.html">HTTP:REQERR:BIN-DATA-ACC-ENC</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Accept-Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-ACCEPT.html">HTTP:REQERR:BIN-DATA-ACCEPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Accept
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-AUTH.html">HTTP:REQERR:BIN-DATA-AUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Authorization Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-CONT-ENC.html">HTTP:REQERR:BIN-DATA-CONT-ENC</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Content-Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-CONT-LANG.html">HTTP:REQERR:BIN-DATA-CONT-LANG</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Content-Language
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-CONT-LOC.html">HTTP:REQERR:BIN-DATA-CONT-LOC</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in Content-Location
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ABIN-DATA-HEADER.html">HTTP:REQERR:BIN-DATA-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Binary Data in HTTP-Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ADOUBLE-ENCODE.html">HTTP:REQERR:DOUBLE-ENCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Double Encode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AFS-HOST.html">HTTP:REQERR:FS-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Format String In Header Host
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AHEADER-INJECT.html">HTTP:REQERR:HEADER-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: URL Header Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AINV-HTTP-VERSION.html">HTTP:REQERR:INV-HTTP-VERSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid HTTP Version (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AINV-IPV6-HOST-HDR.html">HTTP:REQERR:INV-IPV6-HOST-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid IPv6 Host Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3ANULL-IN-HEADER.html">HTTP:REQERR:NULL-IN-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Null in HTTP Header Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3APOST-MISSING-DATA.html">HTTP:REQERR:POST-MISSING-DATA</a></b></td>
   <td width="500" valign="top">
    HTTP: POST Submission Missing Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AREQ-INJECTION.html">HTTP:REQERR:REQ-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Request Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AREQ-INVALID-FORMAT.html">HTTP:REQERR:REQ-INVALID-FORMAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid Request Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AREQ-MALFORMED-URL.html">HTTP:REQERR:REQ-MALFORMED-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed URL Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AREQ-MISSING-HOST.html">HTTP:REQERR:REQ-MISSING-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Missing HOST Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AURL-LF-CR.html">HTTP:REQERR:URL-LF-CR</a></b></td>
   <td width="500" valign="top">
    HTTP: Url Encoded New Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AREQERR%3AURL-VAR-FS.html">HTTP:REQERR:URL-VAR-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Format String in URL Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARESIN-INFO-DISCLOSURE.html">HTTP:RESIN-INFO-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Resin Application Server Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARESIN-INFO-DISCLOSURE1.html">HTTP:RESIN-INFO-DISCLOSURE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Resin Application Server Source Code Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARMAYANA-EK-OBFTECH.html">HTTP:RMAYANA-EK-OBFTECH</a></b></td>
   <td width="500" valign="top">
    HTTP: Rmayana Exploit Kit Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AROBOHELP-SQL-INJ.html">HTTP:ROBOHELP-SQL-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe RoboHelp Server SQL Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AROBOHELP-SQL-INJ1.html">HTTP:ROBOHELP-SQL-INJ1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe RoboHelp Server SQL Injection Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBY-GEM-SEMICOLON.html">HTTP:RUBY-GEM-SEMICOLON</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby Gem Multiple Wrappers Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBY-GEM-SEMICOLON1.html">HTTP:RUBY-GEM-SEMICOLON1</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby Gem Multiple Wrappers Command Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBYONRAILS-JSONYAML-RCE.html">HTTP:RUBYONRAILS-JSONYAML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBYONRAILS-JSONYAML-RCE1.html">HTTP:RUBYONRAILS-JSONYAML-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBYONRAILS-XMLYAML-RCE.html">HTTP:RUBYONRAILS-XMLYAML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ARUBYONRAILS-XMLYAML-RCE1.html">HTTP:RUBYONRAILS-XMLYAML-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAKURA-EK-EXP-DL.html">HTTP:SAKURA-EK-EXP-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Atomic Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAKURA-EK-OUT.html">HTTP:SAKURA-EK-OUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Outbound Connection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAKURA-EK-PAY.html">HTTP:SAKURA-EK-PAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Exploit Payload Retrieve
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAKURA-EK-PAYLOAD-DL.html">HTTP:SAKURA-EK-PAYLOAD-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Obfuscated Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAKURA-EK-REDIR.html">HTTP:SAKURA-EK-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Sakura Exploit Kit Successful Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAP-MGT-CON-OSEXEC.html">HTTP:SAP-MGT-CON-OSEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP Management Console SOAP Interface Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAP-MGT-CON-OSEXEC1.html">HTTP:SAP-MGT-CON-OSEXEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP Management Console SOAP Interface Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAVANT%3AGET-DOT1.html">HTTP:SAVANT:GET-DOT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Savant Web Server Invalid GET Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASAVANT%3AGET-PERCENT.html">HTTP:SAVANT:GET-PERCENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Savant Web Server GET % Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCADA-WEB-INTERFACE-DOS.html">HTTP:SCADA-WEB-INTERFACE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Trihedral VTScada Network Request Handling Remote Integer Overflow Denial of Service 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-42.html">HTTP:SCRIPT-INJ-EXP-42</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-42
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-45.html">HTTP:SCRIPT-INJ-EXP-45</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-45
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-48.html">HTTP:SCRIPT-INJ-EXP-48</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-48
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-51.html">HTTP:SCRIPT-INJ-EXP-51</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-51
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-54.html">HTTP:SCRIPT-INJ-EXP-54</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-54
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-57.html">HTTP:SCRIPT-INJ-EXP-57</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-57
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-60.html">HTTP:SCRIPT-INJ-EXP-60</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-60
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-63.html">HTTP:SCRIPT-INJ-EXP-63</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-63
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-66.html">HTTP:SCRIPT-INJ-EXP-66</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-66
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-69.html">HTTP:SCRIPT-INJ-EXP-69</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-69
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-72.html">HTTP:SCRIPT-INJ-EXP-72</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-72
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASCRIPT-INJ-EXP-75.html">HTTP:SCRIPT-INJ-EXP-75</a></b></td>
   <td width="500" valign="top">
    HTTP:SCRIPT-INJ Infection-75
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASIBHOST-EK-JAR-DL.html">HTTP:SIBHOST-EK-JAR-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Sibhost Exploit Kit JAR Download Outbound
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASKYPE-EZPMUTILS.html">HTTP:SKYPE-EZPMUTILS</a></b></td>
   <td width="500" valign="top">
    HTTP: Skype ezPMUtils Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASOFOSFO-EK-PLUGIN.html">HTTP:SOFOSFO-EK-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: SofosFO Exploit Kit Plugin Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASOLARWINDS-AUTH-BYPASS.html">HTTP:SOLARWINDS-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Storage Manager AuthenticationFilter Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASOLARWINDS-POLICYBYPASS.html">HTTP:SOLARWINDS-POLICYBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Firewall Security Manager userlogin.jsp Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASOLARWINDS-POLICYBYPASS1.html">HTTP:SOLARWINDS-POLICYBYPASS1</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Firewall Security Manager userlogin.jsp Policy Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASONICWALL-GMS-RCE.html">HTTP:SONICWALL-GMS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: SonicWALL GMS skipSessionCheck Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASONICWALL-GMS-RCE1.html">HTTP:SONICWALL-GMS-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: SonicWALL GMS skipSessionCheck Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASPL2-EK-DL.html">HTTP:SPL2-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: SPL2 Exploit Kit Jar Exploit Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASPL2-EK-LP.html">HTTP:SPL2-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: SPL2 Exploit Kit Landing Page Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASPL2-SILVERLIGHT-PLUG.html">HTTP:SPL2-SILVERLIGHT-PLUG</a></b></td>
   <td width="500" valign="top">
    HTTP: SPL2 Exploit Kit Silverlight Plugin Outbound Connection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASPRING-XMLENTITY-INFODISC.html">HTTP:SPRING-XMLENTITY-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASPRING-XMLENTITY-INFODISC1.html">HTTP:SPRING-XMLENTITY-INFODISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3A4IMAGES-DETAIL-PHP.html">HTTP:SQL:INJ:4IMAGES-DETAIL-PHP</a></b></td>
   <td width="500" valign="top">
    HTTP: 4images details.php script cat_id_sql Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-ENCOD-HDR-1.html">HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Encoding Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-ENCOD-HDR-2.html">HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Encoding Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-ENCOD-HDR-3.html">HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Encoding Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-1.html">HTTP:SQL:INJ:ACCEPT-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-2.html">HTTP:SQL:INJ:ACCEPT-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-3.html">HTTP:SQL:INJ:ACCEPT-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-1.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-2.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-3.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACTIVECAMPAIGN.html">HTTP:SQL:INJ:ACTIVECAMPAIGN</a></b></td>
   <td width="500" valign="top">
    HTTP: ActiveCampaign 1-2-All Broadcast Email 4.0.0 7 SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AADMENTOR-ADMIN.html">HTTP:SQL:INJ:ADMENTOR-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: AdMentor Admin Login SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AAGENT-ADMIN.html">HTTP:SQL:INJ:AGENT-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Immobilier CGI SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AALTER-MYSQL.html">HTTP:SQL:INJ:ALTER-MYSQL</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL Alter Database Injection in HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AAND-NUMBER-EQUALS.html">HTTP:SQL:INJ:AND-NUMBER-EQUALS</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;and..equals&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AASCII-FUNC-CALL.html">HTTP:SQL:INJ:ASCII-FUNC-CALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Large number of calls to ASCII function Possible SQL Injection Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AAUTHID.html">HTTP:SQL:INJ:AUTHID</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL AUTHID Keyword SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AAUTO-TRANS.html">HTTP:SQL:INJ:AUTO-TRANS</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL AUTONOMOUS_TRANSACTION Keyword SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ABIT5-BLOG.html">HTTP:SQL:INJ:BIT5-BLOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Bit 5 Blog SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ABIZTALK.html">HTTP:SQL:INJ:BIZTALK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Biztalk Server SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ABTTLXEFORUM.html">HTTP:SQL:INJ:BTTLXEFORUM</a></b></td>
   <td width="500" valign="top">
    HTTP: BattleAxe Forum SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACA-EXPORTREPORT.html">HTTP:SQL:INJ:CA-EXPORTREPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Total Defense Suite UNCWS exportReport SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACA-TOTAL-DEFENSE.html">HTTP:SQL:INJ:CA-TOTAL-DEFENSE</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Total Defense Suite UNCWS Multiple Report Stored Procedure SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACA-TOTAL-UNCWS.html">HTTP:SQL:INJ:CA-TOTAL-UNCWS</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Total Defense Suite UNCWS UnassignFunctionalRoles Stored Procedure SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACHAR.html">HTTP:SQL:INJ:CHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Character Conversion Evasion in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACHAR-ENCODE.html">HTTP:SQL:INJ:CHAR-ENCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Character Encoding Evasion in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACHR-FUNC-CALL.html">HTTP:SQL:INJ:CHR-FUNC-CALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Large number of calls to CHR OR CHAR function Possible SQL Injection Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACISCO-UCM.html">HTTP:SQL:INJ:CISCO-UCM</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Unified Communications Manager SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACMD-CHAIN-1.html">HTTP:SQL:INJ:CMD-CHAIN-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command Chain in URL Detection (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACMD-CHAIN-2.html">HTTP:SQL:INJ:CMD-CHAIN-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command Chain in URL Detection (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACMD-IN-URL.html">HTTP:SQL:INJ:CMD-IN-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOMMENT.html">HTTP:SQL:INJ:COMMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Comment Evasion in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOMPARISON.html">HTTP:SQL:INJ:COMPARISON</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Comparison Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONCAT.html">HTTP:SQL:INJ:CONCAT</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Concatenate Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONCAT-FUNC-CALL.html">HTTP:SQL:INJ:CONCAT-FUNC-CALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Large number of calls to CONCAT function Possible SQL Injection Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-1.html">HTTP:SQL:INJ:CONT-MD5-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-2.html">HTTP:SQL:INJ:CONT-MD5-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-3.html">HTTP:SQL:INJ:CONT-MD5-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-1.html">HTTP:SQL:INJ:CONT-TYPE-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-2.html">HTTP:SQL:INJ:CONT-TYPE-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-3.html">HTTP:SQL:INJ:CONT-TYPE-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONVERT.html">HTTP:SQL:INJ:CONVERT</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Convert Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONVERT-INJ-OF.html">HTTP:SQL:INJ:CONVERT-INJ-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server Injection Convert Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOOKIE-HDR-1.html">HTTP:SQL:INJ:COOKIE-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Cookie Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOOKIE-HDR-2.html">HTTP:SQL:INJ:COOKIE-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Cookie Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOOKIE-HDR-3.html">HTTP:SQL:INJ:COOKIE-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Cookie Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOVER-VISION-ID.html">HTTP:SQL:INJ:COVER-VISION-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Cover Vision id Parameter SQL Injection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADECLARE-EXEC.html">HTTP:SQL:INJ:DECLARE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;declare...exec&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADELL-SONICWALL.html">HTTP:SQL:INJ:DELL-SONICWALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Dell SonicWALL Scrutinizer SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADH-MLM-LOGIN-PHP.html">HTTP:SQL:INJ:DH-MLM-LOGIN-PHP</a></b></td>
   <td width="500" valign="top">
    HTTP: DH-MLM login.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADRUPAL-DATABASE.html">HTTP:SQL:INJ:DRUPAL-DATABASE</a></b></td>
   <td width="500" valign="top">
    HTTP: Drupal Core database.inc expandArguments SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AEXEC-MASTER.html">HTTP:SQL:INJ:EXEC-MASTER</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;exec master&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AF5-BIGIP-11.2.0.html">HTTP:SQL:INJ:F5-BIGIP-11.2.0</a></b></td>
   <td width="500" valign="top">
    HTTP: F5 BIG-IP 11.2.0 SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AFACTO-CMS.html">HTTP:SQL:INJ:FACTO-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: FactoSystem CMS SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AFORUM-LIVRE.html">HTTP:SQL:INJ:FORUM-LIVRE</a></b></td>
   <td width="500" valign="top">
    HTTP: Forum Livre info_user.asp SQL Injection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AGENERIC.html">HTTP:SQL:INJ:GENERIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic SQL Injection Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AGLOBAL-VAR.html">HTTP:SQL:INJ:GLOBAL-VAR</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL Global Variable Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHAVIJ-UA.html">HTTP:SQL:INJ:HAVIJ-UA</a></b></td>
   <td width="500" valign="top">
    HTTP: Havij SQL Injection Tool User Agent Alert
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHEADER-1.html">HTTP:SQL:INJ:HEADER-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command In Header Fields (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHEADER-2.html">HTTP:SQL:INJ:HEADER-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command In Header Fields (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHEADER-3.html">HTTP:SQL:INJ:HEADER-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Command In Header Fields (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHEADER-COOKIE.html">HTTP:SQL:INJ:HEADER-COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection in HTTP Cookie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHEADER-REFERRER.html">HTTP:SQL:INJ:HEADER-REFERRER</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection in HTTP Referrer Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHP-LOADR-GETREPORT.html">HTTP:SQL:INJ:HP-LOADR-GETREPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LoadRunner Virtual User Generator EmulationAdmin getReport SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-1.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-2.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-3.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-1.html">HTTP:SQL:INJ:HTTP-HOST-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-2.html">HTTP:SQL:INJ:HTTP-HOST-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-3.html">HTTP:SQL:INJ:HTTP-HOST-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-1.html">HTTP:SQL:INJ:HTTP-REQ-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-2.html">HTTP:SQL:INJ:HTTP-REQ-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-3.html">HTTP:SQL:INJ:HTTP-REQ-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AIISPROTECT.html">HTTP:SQL:INJ:IISPROTECT</a></b></td>
   <td width="500" valign="top">
    HTTP: IISProtect SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AIMP.html">HTTP:SQL:INJ:IMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Horde IMP Arbitrary SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AINSERT-VALUES.html">HTTP:SQL:INJ:INSERT-VALUES</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;insert..values&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AINTO-OUTFILE.html">HTTP:SQL:INJ:INTO-OUTFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: INTO OUTFILE/DUMPFILE Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AIS_SRVROLEMEMBER.html">HTTP:SQL:INJ:IS_SRVROLEMEMBER</a></b></td>
   <td width="500" valign="top">
    HTTP: IS_SRVROLEMEMBER/IS_MEMBER MS-SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-AD-DJ.html">HTTP:SQL:INJ:JOOMLA-AD-DJ</a></b></td>
   <td width="500" valign="top">
    HTTP: JOOMLA DJ-Classifieds Extenstion SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-ALLCINEVID.html">HTTP:SQL:INJ:JOOMLA-ALLCINEVID</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla! allCineVid Component &#39;id&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-ALPHA-EMAIL.html">HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla AlphaRegistration Component email Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-AVRELOADED.html">HTTP:SQL:INJ:JOOMLA-AVRELOADED</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla AvReloaded Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CALCBUILDER.html">HTTP:SQL:INJ:JOOMLA-CALCBUILDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Calc Builder Component &#39;id&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CBCONTACT.html">HTTP:SQL:INJ:JOOMLA-CBCONTACT</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_cbcontact Component contact_id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-CCBOARD.html">HTTP:SQL:INJ:JOOMLA-COM-CCBOARD</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla CCBoard Component topic Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-CLAN.html">HTTP:SQL:INJ:JOOMLA-COM-CLAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_clan_members Component id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-JCE.html">HTTP:SQL:INJ:JOOMLA-COM-JCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla JCE Component Itemid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-JCE1.html">HTTP:SQL:INJ:JOOMLA-COM-JCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla JCE Component Itemid Parameter SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-JOOMNIK.html">HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Joomnik Gallery Component album Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-SHOP.html">HTTP:SQL:INJ:JOOMLA-COM-SHOP</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla shop Component editid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COMHOSPITAL.html">HTTP:SQL:INJ:JOOMLA-COMHOSPITAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_hospital Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COMTEAM.html">HTTP:SQL:INJ:JOOMLA-COMTEAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_team Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COMTEAM1.html">HTTP:SQL:INJ:JOOMLA-COMTEAM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_team Component SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CONTROLLER.html">HTTP:SQL:INJ:JOOMLA-CONTROLLER</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Controller Component &#39;Itemid&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-FAQ-BOOK.html">HTTP:SQL:INJ:JOOMLA-FAQ-BOOK</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Minitek FAQ Book Plugin id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-FILTERORDER.html">HTTP:SQL:INJ:JOOMLA-FILTERORDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla! filter_order SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-FOTO.html">HTTP:SQL:INJ:JOOMLA-FOTO</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Foto Component &#39;id_categoria&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-JUICY-PICID.html">HTTP:SQL:INJ:JOOMLA-JUICY-PICID</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Juicy Gallery Component &#39;picId&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-MAPLOCATOR.html">HTTP:SQL:INJ:JOOMLA-MAPLOCATOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla maplocator Component &#39;cid&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-MORFEOSHOW.html">HTTP:SQL:INJ:JOOMLA-MORFEOSHOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_morfeoshow Component idm Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-NEWSSEARCH.html">HTTP:SQL:INJ:JOOMLA-NEWSSEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_newssearch Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-QUESTION.html">HTTP:SQL:INJ:JOOMLA-QUESTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_question Component catID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-RESTAURANTE.html">HTTP:SQL:INJ:JOOMLA-RESTAURANTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla and Mambo Restaurante Component id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-VIRTUAL-MEM.html">HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla Virtual Money com_virtualmoney Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-VIRTUEMART.html">HTTP:SQL:INJ:JOOMLA-VIRTUEMART</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla VirtueMart Component Page Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOSTINA.html">HTTP:SQL:INJ:JOOSTINA</a></b></td>
   <td width="500" valign="top">
    HTTP: Joostina Multiple Components SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AKUBELABS-PHPDUG.html">HTTP:SQL:INJ:KUBELABS-PHPDUG</a></b></td>
   <td width="500" valign="top">
    HTTP: KubeLabs PHPDug id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AL-FORUM.html">HTTP:SQL:INJ:L-FORUM</a></b></td>
   <td width="500" valign="top">
    HTTP: L-Forum SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMAIAN-WEBLOG.html">HTTP:SQL:INJ:MAIAN-WEBLOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Maian Weblog index.php SQL Injection 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMAMBO-COM-DOCMAN.html">HTTP:SQL:INJ:MAMBO-COM-DOCMAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Mambo com_docman Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGE-ENGINE-SM.html">HTTP:SQL:INJ:MANAGE-ENGINE-SM</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Security Manager Plus Advanced Search SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGEENGINER-RCE.html">HTTP:SQL:INJ:MANAGEENGINER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products customerName SQL Injection Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-IT360.html">HTTP:SQL:INJ:MANAGENGINE-IT360</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine IT360 MSP Edition SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-JSON.html">HTTP:SQL:INJ:MANAGENGINE-JSON</a></b></td>
   <td width="500" valign="top">
    HTTP: MANAGEENGINE Admin Services SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-OPMANG.html">HTTP:SQL:INJ:MANAGENGINE-OPMANG</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine OpManager SubmitQuery IntegrationUser SQL Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-RUNQRY.html">HTTP:SQL:INJ:MANAGENGINE-RUNQRY</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer runQuery guest user SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-SRC.html">HTTP:SQL:INJ:MANAGENGINE-SRC</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine OpManager APMAlertOperationsServlet source SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANGENG-SYNCMONITR.html">HTTP:SQL:INJ:MANGENG-SYNCMONITR</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Applications Manager CommonAPIUtil SyncMonitors SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMCAFEE-EMAIL-GTWAY.html">HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Email Gateway 7.6 SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMERCURY-UA.html">HTTP:SQL:INJ:MERCURY-UA</a></b></td>
   <td width="500" valign="top">
    HTTP: MercuryBoard index.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMNG-ENG-SECMNG-PLS.html">HTTP:SQL:INJ:MNG-ENG-SECMNG-PLS</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine Security Manager Plus SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMS-SQL-FUNCTIONS.html">HTTP:SQL:INJ:MS-SQL-FUNCTIONS</a></b></td>
   <td width="500" valign="top">
    HTTP: MS-SQL Function in URL Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMS-SQL-TABLE-NAME.html">HTTP:SQL:INJ:MS-SQL-TABLE-NAME</a></b></td>
   <td width="500" valign="top">
    HTTP: MS-SQL Table Name in URL Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMULTI-VENDORS-1.html">HTTP:SQL:INJ:MULTI-VENDORS-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors SQL Injection Detected (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMULTI-VENDORS-2.html">HTTP:SQL:INJ:MULTI-VENDORS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors SQL Injection Detected (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSCHOOL.html">HTTP:SQL:INJ:MYSCHOOL</a></b></td>
   <td width="500" valign="top">
    HTTP: MySchool SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSHOP.html">HTTP:SQL:INJ:MYSHOP</a></b></td>
   <td width="500" valign="top">
    HTTP: phpMyShop SQL Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSQL-BINLOG-DOS.html">HTTP:SQL:INJ:MYSQL-BINLOG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL BINLOG Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSQL-PRIV-ESCAL.html">HTTP:SQL:INJ:MYSQL-PRIV-ESCAL</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSQL-TABLE-NAME.html">HTTP:SQL:INJ:MYSQL-TABLE-NAME</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL Table Name in URL Variable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ANULL-NULL-NULL.html">HTTP:SQL:INJ:NULL-NULL-NULL</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;null,null,null&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ANULLBYTE-COMMENT.html">HTTP:SQL:INJ:NULLBYTE-COMMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: NullByte Comment Out Query SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOMNISTAR-MAILER.html">HTTP:SQL:INJ:OMNISTAR-MAILER</a></b></td>
   <td width="500" valign="top">
    HTTP: Omnistar Mailer SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOMNISTAR-MAILER1.html">HTTP:SQL:INJ:OMNISTAR-MAILER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Omnistar Mailer SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOPMNGR-AGENT-SQL.html">HTTP:SQL:INJ:OPMNGR-AGENT-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: ManageEngine OpManager AgentDetailsUtil agentKey SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AORACLE-WEBCENTER.html">HTTP:SQL:INJ:ORACLE-WEBCENTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Sites FatWire Content Server SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOSCOM.html">HTTP:SQL:INJ:OSCOM</a></b></td>
   <td width="500" valign="top">
    HTTP: osCommerce products_id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOVERSIZE-STATEMENT.html">HTTP:SQL:INJ:OVERSIZE-STATEMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oversized Cast And Convert  Statement  Possible SQL Injection Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APANGOLIN.html">HTTP:SQL:INJ:PANGOLIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Pangolin SQL Injection Tool Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APARALLEL-PLESK.html">HTTP:SQL:INJ:PARALLEL-PLESK</a></b></td>
   <td width="500" valign="top">
    HTTP: Parallels Plesk Panel SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APHPTOPSITES.html">HTTP:SQL:INJ:PHPTOPSITES</a></b></td>
   <td width="500" valign="top">
    HTTP: phpTopSites edit.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APL-SQL.html">HTTP:SQL:INJ:PL-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: PL/SQL Command in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APOSTNUKE.html">HTTP:SQL:INJ:POSTNUKE</a></b></td>
   <td width="500" valign="top">
    HTTP: PostNuke modules.php Arbitrary SQL Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APROC-GENERIC.html">HTTP:SQL:INJ:PROC-GENERIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Generic SQL Procedure Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-1.html">HTTP:SQL:INJ:REFERER-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-2.html">HTTP:SQL:INJ:REFERER-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-3.html">HTTP:SQL:INJ:REFERER-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREMOTE-EXEC.html">HTTP:SQL:INJ:REMOTE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Remote SQL Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-URL-1.html">HTTP:SQL:INJ:REQ-URL-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request URL 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-URL-2.html">HTTP:SQL:INJ:REQ-URL-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request URL 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-URL-3.html">HTTP:SQL:INJ:REQ-URL-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request URL 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-VAR-1.html">HTTP:SQL:INJ:REQ-VAR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Variable 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-VAR-2.html">HTTP:SQL:INJ:REQ-VAR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Variable 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-VAR-3.html">HTTP:SQL:INJ:REQ-VAR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Variable 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREQ-VAR-4.html">HTTP:SQL:INJ:REQ-VAR-4</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Variable 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ARESPONSE-PAGE.html">HTTP:SQL:INJ:RESPONSE-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Response Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ARUBY-ON-RAILS.html">HTTP:SQL:INJ:RUBY-ON-RAILS</a></b></td>
   <td width="500" valign="top">
    HTTP: Ruby on Rails Where Hash SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AS9Y-SERENDIPITY.html">HTTP:SQL:INJ:S9Y-SERENDIPITY</a></b></td>
   <td width="500" valign="top">
    HTTP: S9Y Serendipity SQL injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AS9Y-SERENDIPITY1.html">HTTP:SQL:INJ:S9Y-SERENDIPITY1</a></b></td>
   <td width="500" valign="top">
    HTTP: S9Y Serendipity SQL injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AS9Y-SERENDIPITY2.html">HTTP:SQL:INJ:S9Y-SERENDIPITY2</a></b></td>
   <td width="500" valign="top">
    HTTP: S9Y Serendipity SQL injection2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AS9Y-SERENDIPITY3.html">HTTP:SQL:INJ:S9Y-SERENDIPITY3</a></b></td>
   <td width="500" valign="top">
    HTTP: S9Y Serendipity SQL injection3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AS9Y-SERENDIPITY4.html">HTTP:SQL:INJ:S9Y-SERENDIPITY4</a></b></td>
   <td width="500" valign="top">
    HTTP: S9Y Serendipity SQL injection4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASCOZNET-ADMINNAME.html">HTTP:SQL:INJ:SCOZNET-ADMINNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: ScozNet ScozBook AdminName Variable SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASELECT-CONCAT-STAT.html">HTTP:SQL:INJ:SELECT-CONCAT-STAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Select Concat statement Possible SQL Injection Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASELECT-SUB-DOS.html">HTTP:SQL:INJ:SELECT-SUB-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: MySQL SELECT Subquery Denial of Service SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASFX-SQLI.html">HTTP:SQL:INJ:SFX-SQLI</a></b></td>
   <td width="500" valign="top">
    HTTP: Select For XML SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASINAPSI-ESOLAR.html">HTTP:SQL:INJ:SINAPSI-ESOLAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Sinapsi eSolar Light Photovoltaic System Monitor SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASLASH-STAR.html">HTTP:SQL:INJ:SLASH-STAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Slash-Star Comment SQL Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASLRWINDS-STORG-MGR.html">HTTP:SQL:INJ:SLRWINDS-STORG-MGR</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Storage Manager LoginServlet SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASOLARWINDS.html">HTTP:SQL:INJ:SOLARWINDS</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Orion GetAccountGroups Multiple SQL Injections
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASQLMAP-ACTIVITY.html">HTTP:SQL:INJ:SQLMAP-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    HTTP: sqlmap SQL Injection Tool Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYMANTEC-IM.html">HTTP:SQL:INJ:SYMANTEC-IM</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec IM Manager LoggedInUsers.lgx Definition File SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYMC-BLOCKED-PHP.html">HTTP:SQL:INJ:SYMC-BLOCKED-PHP</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway blocked.php Blind SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYNDEO-CMS-USRNAME.html">HTTP:SQL:INJ:SYNDEO-CMS-USRNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: SyndeoCMS SQL Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYNERGY-SW.html">HTTP:SQL:INJ:SYNERGY-SW</a></b></td>
   <td width="500" valign="top">
    HTTP: Synergy Software id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYSOBJECTS.html">HTTP:SQL:INJ:SYSOBJECTS</a></b></td>
   <td width="500" valign="top">
    HTTP: MS-SQL sysobjects SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATEDE-SIMPLIFICADO.html">HTTP:SQL:INJ:TEDE-SIMPLIFICADO</a></b></td>
   <td width="500" valign="top">
    HTTP: TEDE Simplificado SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATIVOLI-USER-UPDAT1.html">HTTP:SQL:INJ:TIVOLI-USER-UPDAT1</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Tivoli Provisioning Manager Express User.updateUserValue SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATIVOLI-USER-UPDATE.html">HTTP:SQL:INJ:TIVOLI-USER-UPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Tivoli Provisioning Manager Express User.updateUserValue SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATOLINET-AGENCIA-ID.html">HTTP:SQL:INJ:TOLINET-AGENCIA-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Tolinet Agencia id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATOLINET-AGNCIA-I11.html">HTTP:SQL:INJ:TOLINET-AGNCIA-I11</a></b></td>
   <td width="500" valign="top">
    HTTP: Tolinet Agencia id Parameter SQL Injection1  Description 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-1.html">HTTP:SQL:INJ:UA-HDR-1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-2.html">HTTP:SQL:INJ:UA-HDR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-3.html">HTTP:SQL:INJ:UA-HDR-3</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUNION-SELECT.html">HTTP:SQL:INJ:UNION-SELECT</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;union...select&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUSER-ADD.html">HTTP:SQL:INJ:USER-ADD</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle User Addition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AVENOM-BOARD.html">HTTP:SQL:INJ:VENOM-BOARD</a></b></td>
   <td width="500" valign="top">
    HTTP: Venom Board Post.PHP3 SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AVERSION-DETECT.html">HTTP:SQL:INJ:VERSION-DETECT</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Version Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AVERSION-DETECT1.html">HTTP:SQL:INJ:VERSION-DETECT1</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL Version Detection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWAITFOR-DELAY.html">HTTP:SQL:INJ:WAITFOR-DELAY</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL &#39;waitfor delay&#39; Command Injection Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWEBID-BLIND-SQL.html">HTTP:SQL:INJ:WEBID-BLIND-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: Webid Blind SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWORD-CIRCLE-SQL.html">HTTP:SQL:INJ:WORD-CIRCLE-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: WordCircle Password Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWORDPRESS-ID.html">HTTP:SQL:INJ:WORDPRESS-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Generic &quot;ID&quot; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWORDPRESS-WP-FRM.html">HTTP:SQL:INJ:WORDPRESS-WP-FRM</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP-Forum Plugin Multiple SQL Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY1.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY1</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY2.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY2</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY3.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY3</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY4.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY4</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY5.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY5</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY6.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY6</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY7.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY7</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY8.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY8</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY9.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY9</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-ECOMMERCE.html">HTTP:SQL:INJ:WP-ECOMMERCE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP e-Commerce Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-EVENTS-MGR.html">HTTP:SQL:INJ:WP-EVENTS-MGR</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress Events Manager Extended Plugin Persistent SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-FBCONNECTOR.html">HTTP:SQL:INJ:WP-FBCONNECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress FaceBook Connect SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-GD-STAR-RATING.html">HTTP:SQL:INJ:WP-GD-STAR-RATING</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress GD Star Rating Plugin votes Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-MEDIA-LIBRARY.html">HTTP:SQL:INJ:WP-MEDIA-LIBRARY</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Media Library Categories Plugin termid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-MULTIPLE.html">HTTP:SQL:INJ:WP-MULTIPLE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Multiple SQL Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-PHOTORACER.html">HTTP:SQL:INJ:WP-PHOTORACER</a></b></td>
   <td width="500" valign="top">
    HTTP: Photoracer WordPress Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SERMON-BROWSER.html">HTTP:SQL:INJ:WP-SERMON-BROWSER</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Sermon Browser Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SQL.html">HTTP:SQL:INJ:WP-SQL</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress 2.2 (xmlrpc.php) SQL Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-STARSRATEBOX.html">HTTP:SQL:INJ:WP-STARSRATEBOX</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP-StarsRateBox Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SUPER-CAPTCHA.html">HTTP:SQL:INJ:WP-SUPER-CAPTCHA</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Super CAPTCHA Plugin markspam Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SYMPOSIUM.html">HTTP:SQL:INJ:WP-SYMPOSIUM</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Symposium Plugin get_profile_avatar.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-UNIVERSAL-POST.html">HTTP:SQL:INJ:WP-UNIVERSAL-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Universal Post Manager Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWS2000.html">HTTP:SQL:INJ:WS2000</a></b></td>
   <td width="500" valign="top">
    HTTP: WebStore2000 Item_ID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AXPCMDSHELL.html">HTTP:SQL:INJ:XPCMDSHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: SQL xp_cmdshell Command Shell Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AYABSOFT-GALLERY-ID.html">HTTP:SQL:INJ:YABSOFT-GALLERY-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: YABSoft Advanced Image Hosting Script gallery_id SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3ANOVEL-ZENWORKS.html">HTTP:SQL:NOVEL-ZENWORKS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management schedule.ScheduleQuery SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQL%3ANOVELL-ZENWORKS.html">HTTP:SQL:NOVELL-ZENWORKS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management GetStoredResult.class SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASQUID-HEADER-VALUE-DOS.html">HTTP:SQUID-HEADER-VALUE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Squid httpMakeVaryMark Header Value Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTAMP-EK-BIN.html">HTTP:STAMP-EK-BIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit Malicious Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTAMP-EK-JAR.html">HTTP:STAMP-EK-JAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit jar Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTAMP-EK-LP.html">HTTP:STAMP-EK-LP</a></b></td>
   <td width="500" valign="top">
    HTTP: Stamp Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTATIC-SERVER-BOF.html">HTTP:STATIC-SERVER-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Static HTTP Server ini File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTATIC-SERVER-BOF1.html">HTTP:STATIC-SERVER-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Static HTTP Server ini File Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AABOUT-JAVASCRIPT.html">HTTP:STC:ABOUT-JAVASCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: About Local Link Exploit (JS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3A2X-APPLICATION.html">HTTP:STC:ACTIVEX:2X-APPLICATION</a></b></td>
   <td width="500" valign="top">
    HTTP: 2X ApplicationServer TuxSystem ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AABB-CWGRAPH3D.html">HTTP:STC:ACTIVEX:ABB-CWGRAPH3D</a></b></td>
   <td width="500" valign="top">
    HTTP: ABB Test Signal Viewer CWGraph3D ActiveX Arbitrary File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AACCESS-CORRUPT.html">HTTP:STC:ACTIVEX:ACCESS-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Access Wizard ActiveX Control Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADDCOLUMN.html">HTTP:STC:ACTIVEX:ADDCOLUMN</a></b></td>
   <td width="500" valign="top">
    HTTP: CA BrightStor ARCserve Backup AddColumn ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADESK-AX.html">HTTP:STC:ACTIVEX:ADESK-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Autodesk LiveUpdate16.DLL Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADOBE-DL-MGR.html">HTTP:STC:ACTIVEX:ADOBE-DL-MGR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Download Manager getPlus ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADODB.html">HTTP:STC:ACTIVEX:ADODB</a></b></td>
   <td width="500" valign="top">
    HTTP: ADODB.Stream File Installation Weakness
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADODB-CONNECT.html">HTTP:STC:ACTIVEX:ADODB-CONNECT</a></b></td>
   <td width="500" valign="top">
    HTTP: ADODB.Connection File Installation Weakness
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANCED-FILE.html">HTTP:STC:ACTIVEX:ADVANCED-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Advanced File Vault Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANTECH-BOF.html">HTTP:STC:ACTIVEX:ADVANTECH-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANTECH-OF.html">HTTP:STC:ACTIVEX:ADVANTECH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess SCADA webvact.ocx AccessCode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANTECH-WEB.html">HTTP:STC:ACTIVEX:ADVANTECH-WEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess Unsafe ActiveX Control (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAGILENT-INSERT.html">HTTP:STC:ACTIVEX:AGILENT-INSERT</a></b></td>
   <td width="500" valign="top">
    HTTP: Agilent Technologies Feature Extraction Insert Method Out-Of-Bounds Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAKAMAI-DM.html">HTTP:STC:ACTIVEX:AKAMAI-DM</a></b></td>
   <td width="500" valign="top">
    HTTP: Akamai Download Manager ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AALADDIN.html">HTTP:STC:ACTIVEX:ALADDIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Aladdin Knowledge System PrivAgent Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AALTIRIS.html">HTTP:STC:ACTIVEX:ALTIRIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Altiris Products ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAOL-AMPX.html">HTTP:STC:ACTIVEX:AOL-AMPX</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL Radio AmpX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAOL-PHOBOS.html">HTTP:STC:ACTIVEX:AOL-PHOBOS</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL Phobos.dll Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AASK-COM.html">HTTP:STC:ACTIVEX:ASK-COM</a></b></td>
   <td width="500" valign="top">
    HTTP: Ask.com Toolbar ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AASUS-NETSWITCH.html">HTTP:STC:ACTIVEX:ASUS-NETSWITCH</a></b></td>
   <td width="500" valign="top">
    HTTP: ASUS NET4SWITCH Unsafe Activex Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AATTACHMATE-REF.html">HTTP:STC:ACTIVEX:ATTACHMATE-REF</a></b></td>
   <td width="500" valign="top">
    HTTP: Attachmate Reflection FTP Client Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AATUCFOBJ-DLL.html">HTTP:STC:ACTIVEX:ATUCFOBJ-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Meeting Manager Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAURIGMA.html">HTTP:STC:ACTIVEX:AURIGMA</a></b></td>
   <td width="500" valign="top">
    HTTP: Aurigma Image Uploader Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAURIGMAIMG.html">HTTP:STC:ACTIVEX:AURIGMAIMG</a></b></td>
   <td width="500" valign="top">
    HTTP: Aurigma Image Uploader Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAVAYA-ONE-X.html">HTTP:STC:ACTIVEX:AVAYA-ONE-X</a></b></td>
   <td width="500" valign="top">
    HTTP: Avaya one-X Communicator Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAWINGSOFT.html">HTTP:STC:ACTIVEX:AWINGSOFT</a></b></td>
   <td width="500" valign="top">
    HTTP: Awingsoft Winds3D Viewer ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAXIS-CAMERA.html">HTTP:STC:ACTIVEX:AXIS-CAMERA</a></b></td>
   <td width="500" valign="top">
    HTTP: AXIS Communications Camera Control (AxisCamControl.ocx) Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAXIS-MEDIA-BO.html">HTTP:STC:ACTIVEX:AXIS-MEDIA-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Axis Media Control Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAXVLC.html">HTTP:STC:ACTIVEX:AXVLC</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC ActiveX Control Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABACKDOORS.html">HTTP:STC:ACTIVEX:BACKDOORS</a></b></td>
   <td width="500" valign="top">
    HTTP: ActiveX Malicious Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABACKWEB-LIA.html">HTTP:STC:ACTIVEX:BACKWEB-LIA</a></b></td>
   <td width="500" valign="top">
    HTTP: Backweb LiteInstactivator ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABAOFENG-BO.html">HTTP:STC:ACTIVEX:BAOFENG-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: BaoFeng Storm Unsafe ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABARCODEWIZ.html">HTTP:STC:ACTIVEX:BARCODEWIZ</a></b></td>
   <td width="500" valign="top">
    HTTP: BarCodeWiz Barcode LoadProperties ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABB-LOAD.html">HTTP:STC:ACTIVEX:BB-LOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Blackberry Web Loader Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABENNET-TEC.html">HTTP:STC:ACTIVEX:BENNET-TEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Bennet-Tec TList ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABORLAND-TCHAR1.html">HTTP:STC:ACTIVEX:BORLAND-TCHAR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Borland Silk Central Tee Chart Pro AddSeries Unsafe ActiveX Control Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABROADWIN.html">HTTP:STC:ACTIVEX:BROADWIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Broadwin WebAccess Client Bwocxrun ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ABSTORM-WINGRPH.html">HTTP:STC:ACTIVEX:BSTORM-WINGRPH</a></b></td>
   <td width="500" valign="top">
    HTTP: Beyond Security beSTORM WinGraphviz.dll Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AC6-URL-DL.html">HTTP:STC:ACTIVEX:C6-URL-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: C6 Messenger Installation URL Downloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACA-ETRUST.html">HTTP:STC:ACTIVEX:CA-ETRUST</a></b></td>
   <td width="500" valign="top">
    HTTP: CA eTrust Intrusion Detection CallCode ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACA-PSFORMX-AX.html">HTTP:STC:ACTIVEX:CA-PSFORMX-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Computer Associates PSFormX Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACA-WEBSCAN-AX.html">HTTP:STC:ACTIVEX:CA-WEBSCAN-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Computer Associates WebScan Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACA-XMLSECDB.html">HTTP:STC:ACTIVEX:CA-XMLSECDB</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Internet Security Suite XMLSecDB ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACAPICOM.html">HTTP:STC:ACTIVEX:CAPICOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft CAPICOM Certificates ActiveX 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACHILKAT-FTP2.html">HTTP:STC:ACTIVEX:CHILKAT-FTP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Chilkat FTP-2 ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACHILLKAT-CRYPT.html">HTTP:STC:ACTIVEX:CHILLKAT-CRYPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Chilkat Crypt ActiveX Control &#39;SaveDecrypted&#39; Insecure Method Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACISCO-CSD-WEB.html">HTTP:STC:ACTIVEX:CISCO-CSD-WEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Secure Desktop CSDWebInstaller ActiveX Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACISCO-VPN.html">HTTP:STC:ACTIVEX:CISCO-VPN</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco AnyConnect VPN Client ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACISCO-WVC200.html">HTTP:STC:ACTIVEX:CISCO-WVC200</a></b></td>
   <td width="500" valign="top">
    HTTP: Unsafe Cisco Wireless-G PTZ Internet Video Camera WVC200 ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACITRIX-GATEWAY.html">HTTP:STC:ACTIVEX:CITRIX-GATEWAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Citrix Access Gateway Plug-in ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACITRIX-NSEPA.html">HTTP:STC:ACTIVEX:CITRIX-NSEPA</a></b></td>
   <td width="500" valign="top">
    HTTP: Citrix Access Gateway Plug-in For Windows &#39;nsepacom&#39; Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACLEARQUEST-OLE.html">HTTP:STC:ACTIVEX:CLEARQUEST-OLE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Rational ClearQuest CQOle ActiveX Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACLSID-OBFUS.html">HTTP:STC:ACTIVEX:CLSID-OBFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft ActiveX Control ClassID Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACO-FLEXGRID.html">HTTP:STC:ACTIVEX:CO-FLEXGRID</a></b></td>
   <td width="500" valign="top">
    HTTP: ComponentOne FlexGrid Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACODEBASE.html">HTTP:STC:ACTIVEX:CODEBASE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Codebase ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACODEBASE-2.html">HTTP:STC:ACTIVEX:CODEBASE-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Codebase ActiveX (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACOM-OBJ.html">HTTP:STC:ACTIVEX:COM-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft COM Object Instantiation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACRYSTAL-PRINT.html">HTTP:STC:ACTIVEX:CRYSTAL-PRINT</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP Crystal Reports PrintControl.dll ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACRYSTAL-SEARCH.html">HTTP:STC:ACTIVEX:CRYSTAL-SEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Crystal Reporting Viewer &#39;SearchByFormula()&#39; Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACTSUENG-OCX.html">HTTP:STC:ACTIVEX:CTSUENG-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Creative Labs AutoUpdate &quot;CTSUEng.ocx&quot; Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACVE-2015-0016.html">HTTP:STC:ACTIVEX:CVE-2015-0016</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0016 Directory Traversal Elevation of Privilege 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACYGNICON.html">HTTP:STC:ACTIVEX:CYGNICON</a></b></td>
   <td width="500" valign="top">
    HTTP: CygniCon CyViewer ActiveX Control SaveData Insecure Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACYME-POWER-ENG.html">HTTP:STC:ACTIVEX:CYME-POWER-ENG</a></b></td>
   <td width="500" valign="top">
    HTTP: CYME Power Engineering Software ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADATA-ACTIVEBAR.html">HTTP:STC:ACTIVEX:DATA-ACTIVEBAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Data Dynamics ActiveBar ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADATA-ANALYSIS.html">HTTP:STC:ACTIVEX:DATA-ANALYSIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Data Analysis Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADATASRCCTL.html">HTTP:STC:ACTIVEX:DATASRCCTL</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ActiveX DataSourceControl
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADAXCTLE.html">HTTP:STC:ACTIVEX:DAXCTLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Daxctle.OCX Unsafe Activex
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADBPOWERAMP.html">HTTP:STC:ACTIVEX:DBPOWERAMP</a></b></td>
   <td width="500" valign="top">
    HTTP: dBpowerAMP Audio Player 2 unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADECISIONTOOLS.html">HTTP:STC:ACTIVEX:DECISIONTOOLS</a></b></td>
   <td width="500" valign="top">
    HTTP: DecisionTools SharpGrid ActiveX Control Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADELL-INFO-DISC.html">HTTP:STC:ACTIVEX:DELL-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Dell OpenManage IT Assistant detectIESettingsForITA.OCX Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADELL-SCANNER.html">HTTP:STC:ACTIVEX:DELL-SCANNER</a></b></td>
   <td width="500" valign="top">
    HTTP: Dell DellSystemLite.Scanner Unsafe ActiveX Control Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADELL-WEBCAM.html">HTTP:STC:ACTIVEX:DELL-WEBCAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Dell Webcam Center CrazyTalk4Native.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADERIVO.html">HTTP:STC:ACTIVEX:DERIVO</a></b></td>
   <td width="500" valign="top">
    HTTP: Derivo Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADEV-TOOL.html">HTTP:STC:ACTIVEX:DEV-TOOL</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Developer Tool Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADLINK-DCS-5605.html">HTTP:STC:ACTIVEX:DLINK-DCS-5605</a></b></td>
   <td width="500" valign="top">
    HTTP: D-Link DCS-5605 PTZ ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADOC-CAPTURE-BO.html">HTTP:STC:ACTIVEX:DOC-CAPTURE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Document Capture Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADOM-INOTES-WEB.html">HTTP:STC:ACTIVEX:DOM-INOTES-WEB</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Domino iNotes Web Access Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADOM-TYPE.html">HTTP:STC:ACTIVEX:DOM-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DOM Manipulation Type Confusion Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADRM-MSNETOBJ.html">HTTP:STC:ACTIVEX:DRM-MSNETOBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Digital Rights Management msnetobj.dll Unsafe ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEASEWE-FTP.html">HTTP:STC:ACTIVEX:EASEWE-FTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Easewe FTP And EastFTP Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEASEWE-FTP3.html">HTTP:STC:ACTIVEX:EASEWE-FTP3</a></b></td>
   <td width="500" valign="top">
    HTTP: Easewe FTP And EastFTP Unsafe ActiveX Control1 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEASYMAIL.html">HTTP:STC:ACTIVEX:EASYMAIL</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Document Capture EasyMail Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEASYMAIL-EXP.html">HTTP:STC:ACTIVEX:EASYMAIL-EXP</a></b></td>
   <td width="500" valign="top">
    HTTP: EasyMail Objects SubmitToExpress
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEASYMAIL-LEAK.html">HTTP:STC:ACTIVEX:EASYMAIL-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Document Capture EasyMail ActiveX Control Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEBAY.html">HTTP:STC:ACTIVEX:EBAY</a></b></td>
   <td width="500" valign="top">
    HTTP: eBay Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEBCRYPT-PRNG.html">HTTP:STC:ACTIVEX:EBCRYPT-PRNG</a></b></td>
   <td width="500" valign="top">
    HTTP: EB Design ebCrypt Unsafe Activex Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEBOOK-FLIP.html">HTTP:STC:ACTIVEX:EBOOK-FLIP</a></b></td>
   <td width="500" valign="top">
    HTTP: Ebook Flip Viewer Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEDRAW-LIC-NAME.html">HTTP:STC:ACTIVEX:EDRAW-LIC-NAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Edraw Diagram LicenseName Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEDRAW-OFF-BOF.html">HTTP:STC:ACTIVEX:EDRAW-OFF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Edraw Office Viewer Component Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEDRAW-VIEWER.html">HTTP:STC:ACTIVEX:EDRAW-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: Edraw Office Viewer ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AELECTRIC-PELCO.html">HTTP:STC:ACTIVEX:ELECTRIC-PELCO</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric Pelco Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEMC-KEYHELP.html">HTTP:STC:ACTIVEX:EMC-KEYHELP</a></b></td>
   <td width="500" valign="top">
    HTTP: EMC Captiva QuickScan Pro KeyHelp Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AEMV-PIXTOOLS.html">HTTP:STC:ACTIVEX:EMV-PIXTOOLS</a></b></td>
   <td width="500" valign="top">
    HTTP: EMC Captiva PixTools Distributed Imaging File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AFACEBOOK-PHOTO.html">HTTP:STC:ACTIVEX:FACEBOOK-PHOTO</a></b></td>
   <td width="500" valign="top">
    HTTP: Facebook Photo Uploader Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AFLASH-PLY-NULL.html">HTTP:STC:ACTIVEX:FLASH-PLY-NULL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActiveX Null Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AFLASH9D-CSS.html">HTTP:STC:ACTIVEX:FLASH9D-CSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActiveX CSS Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AFLEXERA.html">HTTP:STC:ACTIVEX:FLEXERA</a></b></td>
   <td width="500" valign="top">
    HTTP: Flexera InstallShield ISGrid2.dll DoFindReplace Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AFLEXERA-ISGRID.html">HTTP:STC:ACTIVEX:FLEXERA-ISGRID</a></b></td>
   <td width="500" valign="top">
    HTTP: Flexera Multiple Products ISGrid.dll ActiveX Control Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGATEWAYX.html">HTTP:STC:ACTIVEX:GATEWAYX</a></b></td>
   <td width="500" valign="top">
    HTTP: Gateway CWebLaunchCtl ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGE-HISTORIAN.html">HTTP:STC:ACTIVEX:GE-HISTORIAN</a></b></td>
   <td width="500" valign="top">
    HTTP: GE Proficy Historian KeyHelp.ocx ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGESTEC-ELONFMT.html">HTTP:STC:ACTIVEX:GESTEC-ELONFMT</a></b></td>
   <td width="500" valign="top">
    HTTP: Gesytec GmbH ElonFmt ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER.html">HTTP:STC:ACTIVEX:GOMPLAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER1.html">HTTP:STC:ACTIVEX:GOMPLAYER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER4.html">HTTP:STC:ACTIVEX:GOMPLAYER4</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER5.html">HTTP:STC:ACTIVEX:GOMPLAYER5</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER6.html">HTTP:STC:ACTIVEX:GOMPLAYER6</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER7.html">HTTP:STC:ACTIVEX:GOMPLAYER7</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER8.html">HTTP:STC:ACTIVEX:GOMPLAYER8</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGOMPLAYER9.html">HTTP:STC:ACTIVEX:GOMPLAYER9</a></b></td>
   <td width="500" valign="top">
    HTTP: Gretech GOM Player Unsafe ActiveX Control 9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGRPWISE-GIXMIM.html">HTTP:STC:ACTIVEX:GRPWISE-GIXMIM</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AGUI-CM-CTRLS.html">HTTP:STC:ACTIVEX:GUI-CM-CTRLS</a></b></td>
   <td width="500" valign="top">
    HTTP: Computer Associates GUI_CM_CTRLS ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHHCTRL-IMAGE.html">HTTP:STC:ACTIVEX:HHCTRL-IMAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HHCtrl.ocx Image ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHNYWLL-OPOS.html">HTTP:STC:ACTIVEX:HNYWLL-OPOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Honeywell OPOS Suite HWOPOSScale.ocx Open Method Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHONEYWELL-EBI.html">HTTP:STC:ACTIVEX:HONEYWELL-EBI</a></b></td>
   <td width="500" valign="top">
    HTTP: Honeywell Enterprise Buildings Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHONEYWELL-TEMA.html">HTTP:STC:ACTIVEX:HONEYWELL-TEMA</a></b></td>
   <td width="500" valign="top">
    HTTP: Honeywell EBI TEMA Remote Installer Unsafe ActiveX Control Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP.html">HTTP:STC:ACTIVEX:HP</a></b></td>
   <td width="500" valign="top">
    HTTP: Hewlett-Packard Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-APP-LIFE.html">HTTP:STC:ACTIVEX:HP-APP-LIFE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Application Lifecycle Management ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-AUDIO-REC.html">HTTP:STC:ACTIVEX:HP-AUDIO-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Photo Creative audio.Record ActiveX Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-EASY-XML.html">HTTP:STC:ACTIVEX:HP-EASY-XML</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Easy Printer Care ActiveX Control Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-EASYPRINTER.html">HTTP:STC:ACTIVEX:HP-EASYPRINTER</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Easy Printer Care Software HPTicketMgr.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-LOADRUNER.html">HTTP:STC:ACTIVEX:HP-LOADRUNER</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LoadRunner micWebAjax.dll Unsafe ActiveX Control Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-MERC-CLR1.html">HTTP:STC:ACTIVEX:HP-MERC-CLR1</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Mercury Quality Center Unsafe ActiveX Method1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-OPOS-DRIVER.html">HTTP:STC:ACTIVEX:HP-OPOS-DRIVER</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Point of Sale OPOS Driver OPOSPOSKeyboard.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-PROTECT-DAM.html">HTTP:STC:ACTIVEX:HP-PROTECT-DAM</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Device Access Manager for HP ProtectTools Heap Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-RCE.html">HTTP:STC:ACTIVEX:HP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Point of Sale OPOS Driver Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-SPRINTER.html">HTTP:STC:ACTIVEX:HP-SPRINTER</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Sprinter Tidestone Formula One ActiveX Multiple Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-SPRINTR-BOF.html">HTTP:STC:ACTIVEX:HP-SPRINTR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Sprinter Tidestone Formula One DefaultFontName Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-SW-UPDATE.html">HTTP:STC:ACTIVEX:HP-SW-UPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Software Update Tool ActiveX Control File Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-XUPLOAD-OCX.html">HTTP:STC:ACTIVEX:HP-XUPLOAD-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Hewlett-Packard LoadRunner XUpload.ocx ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHPIS-DATA-MGR.html">HTTP:STC:ACTIVEX:HPIS-DATA-MGR</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Instant Support HPISDataManager.dll Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHPQUTIL.html">HTTP:STC:ACTIVEX:HPQUTIL</a></b></td>
   <td width="500" valign="top">
    HTTP: HP All-in-One and HP Photo &amp; Imaging Gallery Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHPSUPPORT.html">HTTP:STC:ACTIVEX:HPSUPPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Instant Support Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHPUPDATE.html">HTTP:STC:ACTIVEX:HPUPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Update Software ActiveX Control Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHPVIRTUAL.html">HTTP:STC:ACTIVEX:HPVIRTUAL</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Virtual Rooms hpvirtualrooms14.dll ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHTMLSAFHLP.html">HTTP:STC:ACTIVEX:HTMLSAFHLP</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ActiveX HtmlDlgSafeHelper Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHUSDAWG.html">HTTP:STC:ACTIVEX:HUSDAWG</a></b></td>
   <td width="500" valign="top">
    HTTP: Husdawg LLC System Requirements Lab Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHXVZ.html">HTTP:STC:ACTIVEX:HXVZ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HxTocCtrl ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHYLEOS.html">HTTP:STC:ACTIVEX:HYLEOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Hyleos ChemView ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-ACCESS.html">HTTP:STC:ACTIVEX:IBM-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Access Support Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-C1SIZER.html">HTTP:STC:ACTIVEX:IBM-C1SIZER</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM SPSS SamplePower c1sizer ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-INOTES-BOF.html">HTTP:STC:ACTIVEX:IBM-INOTES-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus iNotes Upload Module ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-LOTUS-QIKR.html">HTTP:STC:ACTIVEX:IBM-LOTUS-QIKR</a></b></td>
   <td width="500" valign="top">
    HTTP:  IBM Lotus Quickr ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-RATIONAL.html">HTTP:STC:ACTIVEX:IBM-RATIONAL</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Rational Rhapsody BB FlashBack FBRecorder Multiple ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-SPSS.html">HTTP:STC:ACTIVEX:IBM-SPSS</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM SPSS SamplePower Unsafe Vsflex8l ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-SPSS-EXHTM.html">HTTP:STC:ACTIVEX:IBM-SPSS-EXHTM</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM SPSS Data Collection and Dimensions ExportHTML.dll ActiveX Control Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-SPSS-MRAB.html">HTTP:STC:ACTIVEX:IBM-SPSS-MRAB</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM SPSS Data Collection and Dimensions mraboutb.dll ActiveX Control Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-TIVOLI.html">HTTP:STC:ACTIVEX:IBM-TIVOLI</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Tivoli Provisioning Manager Express ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-VSVIEW6.html">HTTP:STC:ACTIVEX:IBM-VSVIEW6</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM SPSS SamplePower VsVIEW6.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBMINTS-INT-OF.html">HTTP:STC:ACTIVEX:IBMINTS-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM iNotes Unsafe ActiveX Control Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AICONICS-WEBHM1.html">HTTP:STC:ACTIVEX:ICONICS-WEBHM1</a></b></td>
   <td width="500" valign="top">
    HTTP: ICONICS IcoSetServer Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AICONICS-WEBHMI.html">HTTP:STC:ACTIVEX:ICONICS-WEBHMI</a></b></td>
   <td width="500" valign="top">
    HTTP: ICONICS IcoSetServer Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AICQPHONE-EXEC.html">HTTP:STC:ACTIVEX:ICQPHONE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: ICQPhone SipxPhoneManager ActiveX Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIE-CCRP.html">HTTP:STC:ACTIVEX:IE-CCRP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE CCRP Folder Treeview ActiveX control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIE-DA.html">HTTP:STC:ACTIVEX:IE-DA</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer DirectAnimation ActiveX 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIE-ECENTREX.html">HTTP:STC:ACTIVEX:IE-ECENTREX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE eCentrex VOIP Client UACOMX.OCX ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIE-POPUP.html">HTTP:STC:ACTIVEX:IE-POPUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Popup Blocker Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIEMOUSE-IMGTAG.html">HTTP:STC:ACTIVEX:IEMOUSE-IMGTAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Image Tag Unsafe Activex
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIENIPP.html">HTTP:STC:ACTIVEX:IENIPP</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell iPrint Client ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIETAB-AX.html">HTTP:STC:ACTIVEX:IETAB-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Tabular Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIMAGE-VIEWER.html">HTTP:STC:ACTIVEX:IMAGE-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: Image Viewer CP Pro/Gold Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIMAGESHACK.html">HTTP:STC:ACTIVEX:IMAGESHACK</a></b></td>
   <td width="500" valign="top">
    HTTP: ImageShack Toolbar Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIMESH-IMWEBCON.html">HTTP:STC:ACTIVEX:IMESH-IMWEBCON</a></b></td>
   <td width="500" valign="top">
    HTTP: iMesh &#39;IMWebControl.dll&#39; Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AINDUSOFT-ISSY1.html">HTTP:STC:ACTIVEX:INDUSOFT-ISSY1</a></b></td>
   <td width="500" valign="top">
    HTTP: InduSoft Web Studio ISSymbol Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AINST-SHLD-FO.html">HTTP:STC:ACTIVEX:INST-SHLD-FO</a></b></td>
   <td width="500" valign="top">
    HTTP: InstallShield 2009 &#39;ISWiAutomation15.dll&#39; File Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIPSWITCH-IMAIL.html">HTTP:STC:ACTIVEX:IPSWITCH-IMAIL</a></b></td>
   <td width="500" valign="top">
    HTTP: Ipswitch IMail ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIRFILEIOSRVC.html">HTTP:STC:ACTIVEX:IRFILEIOSRVC</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LoadRunner lrFileIOService Unsafe ActiveX Control Input Validation Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AISIS-AFP-BO.html">HTTP:STC:ACTIVEX:ISIS-AFP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: ISIS Papyrus AFP Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AISOVIEW-BOF.html">HTTP:STC:ACTIVEX:ISOVIEW-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: PTC IsoView ActiveX Control ViewPort Property Remote Code Excution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AISSYMBOL.html">HTTP:STC:ACTIVEX:ISSYMBOL</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech Studio ISSymbol Unsafe ActiveX Control Multiple Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AISUSWEB.html">HTTP:STC:ACTIVEX:ISUSWEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision InstallShield Isusweb.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJAVA-DTK.html">HTTP:STC:ACTIVEX:JAVA-DTK</a></b></td>
   <td width="500" valign="top">
    HTTP: Unsafe Java DTK ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJBOX.html">HTTP:STC:ACTIVEX:JBOX</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo! Music Jukebox ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJETAUDIO-DIR.html">HTTP:STC:ACTIVEX:JETAUDIO-DIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Cowon jetAudio ActiveX Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJNPR-SSL-VPN.html">HTTP:STC:ACTIVEX:JNPR-SSL-VPN</a></b></td>
   <td width="500" valign="top">
    HTTP: Juniper SSL-VPN Client ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJRE-DNSRESOLVE.html">HTTP:STC:ACTIVEX:JRE-DNSRESOLVE</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun JRE isInstalled.dnsResolve Function Memory Exception
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJVIEWPRO.html">HTTP:STC:ACTIVEX:JVIEWPRO</a></b></td>
   <td width="500" valign="top">
    HTTP: JView Profiler Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKASP-AX.html">HTTP:STC:ACTIVEX:KASP-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Kaspersky Anti-Virus ActiveX Control Unsafe Method Exposure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKAZAA-ALTNET.html">HTTP:STC:ACTIVEX:KAZAA-ALTNET</a></b></td>
   <td width="500" valign="top">
    HTTP: Kazaa Altnet Download Manager Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKVIEW-KCHARTX1.html">HTTP:STC:ACTIVEX:KVIEW-KCHARTX1</a></b></td>
   <td width="500" valign="top">
    HTTP: KingView KChartXY.ocx Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKVIEW-KCHARTXY.html">HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</a></b></td>
   <td width="500" valign="top">
    HTTP: KingView KChartXY.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALEADTOOLS.html">HTTP:STC:ACTIVEX:LEADTOOLS</a></b></td>
   <td width="500" valign="top">
    HTTP: LEADTOOLS Imaging ActiveX Control Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALINKSYS.html">HTTP:STC:ACTIVEX:LINKSYS</a></b></td>
   <td width="500" valign="top">
    HTTP: Linksys WVC54GC ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIQUIDXML-MULT.html">HTTP:STC:ACTIVEX:LIQUIDXML-MULT</a></b></td>
   <td width="500" valign="top">
    HTTP: LiquidXML Studio Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIVE-MSG.html">HTTP:STC:ACTIVEX:LIVE-MSG</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live Messenger ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIVE-PROFILE.html">HTTP:STC:ACTIVEX:LIVE-PROFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live Messenger Unsafe ActiveX Method (MSKB 240797)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIVE-WRITER.html">HTTP:STC:ACTIVEX:LIVE-WRITER</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live Writer ActiveX BlogThisLink Method Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALPVIEWER.html">HTTP:STC:ACTIVEX:LPVIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: MGI Software LPViewer ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALTOCXTWAINU.html">HTTP:STC:ACTIVEX:LTOCXTWAINU</a></b></td>
   <td width="500" valign="top">
    HTTP: LEADTOOLS Raster Twain LtocxTwainu.dll Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMACINSTALL.html">HTTP:STC:ACTIVEX:MACINSTALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision InstallShield InstallScript OCI ActiveX Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAGNETO-ICMP.html">HTTP:STC:ACTIVEX:MAGNETO-ICMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnetosoft ICMP Unsafe ActiveX adddestinationentry Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAGNETOSOFT.html">HTTP:STC:ACTIVEX:MAGNETOSOFT</a></b></td>
   <td width="500" valign="top">
    HTTP: MagnetoSoft SNTP v4.0.0.7 Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAGNETOSOFT-OF.html">HTTP:STC:ACTIVEX:MAGNETOSOFT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: MagnetoSoft DNS Unsafe ActiveX DNSLookupHostWithServer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAGNETOSOFT-OV.html">HTTP:STC:ACTIVEX:MAGNETOSOFT-OV</a></b></td>
   <td width="500" valign="top">
    HTTP: Magnetosoft Networkresources Unsafe ActiveX Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAL-CON-2.html">HTTP:STC:ACTIVEX:MAL-CON-2</a></b></td>
   <td width="500" valign="top">
    HTTP: ActiveX Malicous Control (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMAPGUIDE-LAYER.html">HTTP:STC:ACTIVEX:MAPGUIDE-LAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: Autodesk MapGuide Viewer ActiveX LayersViewWidth Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCA-VTRACE.html">HTTP:STC:ACTIVEX:MCA-VTRACE</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Visual Trace ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCAFEE-FREESCN.html">HTTP:STC:ACTIVEX:MCAFEE-FREESCN</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee FreeScan Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCAFEE-MYCIO.html">HTTP:STC:ACTIVEX:MCAFEE-MYCIO</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Security-as-a-Service myCIOScn.dll Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCAFEE-VT.html">HTTP:STC:ACTIVEX:MCAFEE-VT</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Virtual Technician ActiveX Control Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCFE-OVERWRITE.html">HTTP:STC:ACTIVEX:MCFE-OVERWRITE</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Policy Manager naPolicyManager.dll Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCFEE-MCINSCTL.html">HTTP:STC:ACTIVEX:MCFEE-MCINSCTL</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Security Center MCINSCTL.DLL ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMCKESSON.html">HTTP:STC:ACTIVEX:MCKESSON</a></b></td>
   <td width="500" valign="top">
    HTTP: McKesson Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMDAC-DATASPACE.html">HTTP:STC:ACTIVEX:MDAC-DATASPACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Unassociated ActiveX Data Object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMITSUBISHI.html">HTTP:STC:ACTIVEX:MITSUBISHI</a></b></td>
   <td width="500" valign="top">
    HTTP: Mitsubishi EZPcAut260 Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMITSUBISHI-V3.html">HTTP:STC:ACTIVEX:MITSUBISHI-V3</a></b></td>
   <td width="500" valign="top">
    HTTP: Mitsubishi MX Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMOROVIA-BARCOD.html">HTTP:STC:ACTIVEX:MOROVIA-BARCOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Morovia Barcode ActiveX Control Arbitrary File Overwrite Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMOVIE-PLAYER.html">HTTP:STC:ACTIVEX:MOVIE-PLAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: Movie Player Pro SDK ActiveX Control DrawText Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMOXA-PFILENAME.html">HTTP:STC:ACTIVEX:MOXA-PFILENAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Moxa MediaDBPlayback.DLL Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-AGENT-LIB.html">HTTP:STC:ACTIVEX:MS-AGENT-LIB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Agent Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-AGENT-LIB1.html">HTTP:STC:ACTIVEX:MS-AGENT-LIB1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Agent Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DEBUGDIAG1.html">HTTP:STC:ACTIVEX:MS-DEBUGDIAG1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DebugDiag CrashHangExt.dll Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DEBUGDIAG2.html">HTTP:STC:ACTIVEX:MS-DEBUGDIAG2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DebugDiag CrashHangExt.dll Unsafe ActiveX Control2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DEBUGDIAG3.html">HTTP:STC:ACTIVEX:MS-DEBUGDIAG3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DebugDiag CrashHangExt.dll Unsafe ActiveX Control3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DEBUGDIAG4.html">HTTP:STC:ACTIVEX:MS-DEBUGDIAG4</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DebugDiag CrashHangExt.dll Unsafe ActiveX Control4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DOS.html">HTTP:STC:ACTIVEX:MS-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GraphicsControl Unsafe ActiveX Access Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-ICARDIE.html">HTTP:STC:ACTIVEX:MS-ICARDIE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft InformationCardSigninHelper Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-IE-COM-RCE.html">HTTP:STC:ACTIVEX:MS-IE-COM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer COM Object Instantiation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-IE-WMS.html">HTTP:STC:ACTIVEX:MS-IE-WMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WMS Arbitrary File Write Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-IE-WMS1.html">HTTP:STC:ACTIVEX:MS-IE-WMS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WMS Arbitrary File Write Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-MDAC.html">HTTP:STC:ACTIVEX:MS-MDAC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Data Access Control ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-OWC.html">HTTP:STC:ACTIVEX:MS-OWC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Web Components Activex
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-OWC-BOF.html">HTTP:STC:ACTIVEX:MS-OWC-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Web Components URL Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-OWC-RCE.html">HTTP:STC:ACTIVEX:MS-OWC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Web Components DataSource Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-SQLDMO.html">HTTP:STC:ACTIVEX:MS-SQLDMO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server DMO Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-WIN-MSGR.html">HTTP:STC:ACTIVEX:MS-WIN-MSGR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Messenger ActiveX Control Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSACCESS-AX.html">HTTP:STC:ACTIVEX:MSACCESS-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Access Unsafe ActiveX Controls
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSCOMCTL-OCX.html">HTTP:STC:ACTIVEX:MSCOMCTL-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Common Control &#39;MSCOMCTL.OCX&#39; Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSCOMCTL-OCX1.html">HTTP:STC:ACTIVEX:MSCOMCTL-OCX1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Common Control &#39;MSCOMCTL.OCX&#39; Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSCOMM32.html">HTTP:STC:ACTIVEX:MSCOMM32</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Basic MSComm Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSGSC-DLL.html">HTTP:STC:ACTIVEX:MSGSC-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Live Messenger Unsafe ActiveX Method (CVE-2008-0082)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSMASK32-OCX.html">HTTP:STC:ACTIVEX:MSMASK32-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio Msmask32.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSO-DATASRC.html">HTTP:STC:ACTIVEX:MSO-DATASRC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office MSODataSourceControl ActiveX Control Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSVIDCTL-1.html">HTTP:STC:ACTIVEX:MSVIDCTL-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Unsafe Video ActiveX Control (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSVIDCTL-2.html">HTTP:STC:ACTIVEX:MSVIDCTL-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Unsafe Microsoft Video ActiveX Control (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSXML-INFODISC.html">HTTP:STC:ACTIVEX:MSXML-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSXML2-MEMCORR.html">HTTP:STC:ACTIVEX:MSXML2-MEMCORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MSXML2 ActiveX Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMW6-AZTEC-BO.html">HTTP:STC:ACTIVEX:MW6-AZTEC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: MW6 Technologies ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMW6-BARCODE.html">HTTP:STC:ACTIVEX:MW6-BARCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: MW6 Barcode Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMW6-MAXICODE.html">HTTP:STC:ACTIVEX:MW6-MAXICODE</a></b></td>
   <td width="500" valign="top">
    HTTP: MW6 Technologies MaxiCode ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANATIONAL-INST.html">HTTP:STC:ACTIVEX:NATIONAL-INST</a></b></td>
   <td width="500" valign="top">
    HTTP: National Instruments Installer Framework ActiveX Control Arbitrary File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANETCRAFT.html">HTTP:STC:ACTIVEX:NETCRAFT</a></b></td>
   <td width="500" valign="top">
    HTTP: Netcraft Toolbar Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANETIQ-BO.html">HTTP:STC:ACTIVEX:NETIQ-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: NetIQ Security Solutions for ISeries Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANORTON-SYMSPAM.html">HTTP:STC:ACTIVEX:NORTON-SYMSPAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Norton Internet Security symspam.dll Exploit Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANOVELL-CLIENT.html">HTTP:STC:ACTIVEX:NOVELL-CLIENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell Client Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANOVELL-GRPWISE.html">HTTP:STC:ACTIVEX:NOVELL-GRPWISE</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client Unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANOVELL-RCE.html">HTTP:STC:ACTIVEX:NOVELL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client for Windows Unsafe ActiveX Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANSKEY-DLL.html">HTTP:STC:ACTIVEX:NSKEY-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Services ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANTR-BOF.html">HTTP:STC:ACTIVEX:NTR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP:  NTR ActiveX control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AOFFICE-OCX.html">HTTP:STC:ACTIVEX:OFFICE-OCX</a></b></td>
   <td width="500" valign="top">
    HTTP: Office OCX Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AOFFICEVIEW-DOS.html">HTTP:STC:ACTIVEX:OFFICEVIEW-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Office Viewer &#39;OA.ocx&#39; ActiveX Unsafe Method Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AOLE-AUTO.html">HTTP:STC:ACTIVEX:OLE-AUTO</a></b></td>
   <td width="500" valign="top">
    HTTP: OLE Automation Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AOLEAUTO32.html">HTTP:STC:ACTIVEX:OLEAUTO32</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OLEAuto32.dll Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORA-AUTOVUE.html">HTTP:STC:ACTIVEX:ORA-AUTOVUE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle AutoVue AutoVueX ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-CROPROJ.html">HTTP:STC:ACTIVEX:ORACLE-CROPROJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Forms Recognition CroProj.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DATAINT.html">HTTP:STC:ACTIVEX:ORACLE-DATAINT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DOC-CAP.html">HTTP:STC:ACTIVEX:ORACLE-DOC-CAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Document Capture ActiveX Control WriteJPG Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DQ-TRLM.html">HTTP:STC:ACTIVEX:ORACLE-DQ-TRLM</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality Trillium Based Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DSCXB.html">HTTP:STC:ACTIVEX:ORACLE-DSCXB</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality DscXB onloadstatechange Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-FILEC.html">HTTP:STC:ACTIVEX:ORACLE-FILEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality FileChooserDlg onChangeDirectory Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-RCE.html">HTTP:STC:ACTIVEX:ORACLE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality Unsafe ActiveX Control Access Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-SIEBEL.html">HTTP:STC:ACTIVEX:ORACLE-SIEBEL</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Siebel Option Pack NewBusObj
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-SSSPLT.html">HTTP:STC:ACTIVEX:ORACLE-SSSPLT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Forms Recognition Sssplt30.ocx ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-TTF16.html">HTTP:STC:ACTIVEX:ORACLE-TTF16</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Hyperion Strategic Finance TTF16.ocx ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORBIT-DWNLDR.html">HTTP:STC:ACTIVEX:ORBIT-DWNLDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Orbit Downloader ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORCLE-WEBCENTR.html">HTTP:STC:ACTIVEX:ORCLE-WEBCENTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Control Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AOWC.html">HTTP:STC:ACTIVEX:OWC</a></b></td>
   <td width="500" valign="top">
    HTTP: Unsafe Microsoft Office Web Components ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APANASONIC-API.html">HTTP:STC:ACTIVEX:PANASONIC-API</a></b></td>
   <td width="500" valign="top">
    HTTP: Panasonic Security API SDK Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APCVUE-SCADA.html">HTTP:STC:ACTIVEX:PCVUE-SCADA</a></b></td>
   <td width="500" valign="top">
    HTTP: PcVue Scada Multiple ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APDWIZARD.html">HTTP:STC:ACTIVEX:PDWIZARD</a></b></td>
   <td width="500" valign="top">
    HTTP: PDWizard.SetupPkgPanels ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APERSITS-UPLOA1.html">HTTP:STC:ACTIVEX:PERSITS-UPLOA1</a></b></td>
   <td width="500" valign="top">
    HTTP: Persits Software XUpload AddFile Method Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APESTPATROL.html">HTTP:STC:ACTIVEX:PESTPATROL</a></b></td>
   <td width="500" valign="top">
    HTTP: CA eTrust PestPatrol ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APHOTOBASIC-AX.html">HTTP:STC:ACTIVEX:PHOTOBASIC-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: StudioLine Photo Basic &#39;NMSDVDXU.dll&#39; Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APRO-SOFTNET.html">HTTP:STC:ACTIVEX:PRO-SOFTNET</a></b></td>
   <td width="500" valign="top">
    HTTP: Pro Softnet IDrive Online Backup ActiveX SaveToFile Arbitrary File Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APROCLIMA-F1BV.html">HTTP:STC:ACTIVEX:PROCLIMA-F1BV</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima F1BookView Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APVCAL.html">HTTP:STC:ACTIVEX:PVCAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec BackupExec Calendar PVCalendar.ocx ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQTPLUGINX.html">HTTP:STC:ACTIVEX:QTPLUGINX</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Quicktime QTPlugin.ocx ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUEST-INTRUST.html">HTTP:STC:ACTIVEX:QUEST-INTRUST</a></b></td>
   <td width="500" valign="top">
    HTTP: Quest InTrust ArDoc.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUEST-PNLLMCLI.html">HTTP:STC:ACTIVEX:QUEST-PNLLMCLI</a></b></td>
   <td width="500" valign="top">
    HTTP: Quest vWorkspace pnllmcli.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUEST-RCE.html">HTTP:STC:ACTIVEX:QUEST-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Quest InTrust AnnotateX.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUEST-TOAD-DBA.html">HTTP:STC:ACTIVEX:QUEST-TOAD-DBA</a></b></td>
   <td width="500" valign="top">
    HTTP: Quest Toad DBA Suite for Oracle ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUICKTIME-BOF.html">HTTP:STC:ACTIVEX:QUICKTIME-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime QuickTimePlayer.dll ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ARDP-UNSAFE-AX.html">HTTP:STC:ACTIVEX:RDP-UNSAFE-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Remote Desktop ActiveX Unsafe Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-GAMEHOUSE.html">HTTP:STC:ACTIVEX:REAL-GAMEHOUSE</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks GameHouse InstallerDlg.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-IEFRAME.html">HTTP:STC:ACTIVEX:REAL-IEFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Real Networks RealPlayer ieframe.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-IEFRAME1.html">HTTP:STC:ACTIVEX:REAL-IEFRAME1</a></b></td>
   <td width="500" valign="top">
    HTTP: Real Networks RealPlayer ieframe.dll ActiveX1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-IERPCTL.html">HTTP:STC:ACTIVEX:REAL-IERPCTL</a></b></td>
   <td width="500" valign="top">
    HTTP: RealMedia RealPlayer Ierpplug.DLL ActiveX Control Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-PLAYER.html">HTTP:STC:ACTIVEX:REAL-PLAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREAL-PLR-RPAU.html">HTTP:STC:ACTIVEX:REAL-PLR-RPAU</a></b></td>
   <td width="500" valign="top">
    HTTP: Real Player Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AREVEALTRANS.html">HTTP:STC:ACTIVEX:REVEALTRANS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ActiveX RevealTrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ARICHTXT.html">HTTP:STC:ACTIVEX:RICHTXT</a></b></td>
   <td width="500" valign="top">
    HTTP: MS Rich TextBox Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ARKD-BARCODE.html">HTTP:STC:ACTIVEX:RKD-BARCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: RKD Software BarCode ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AROXIO-CINEPL.html">HTTP:STC:ACTIVEX:ROXIO-CINEPL</a></b></td>
   <td width="500" valign="top">
    HTTP: Roxio CinePlayer ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ARWSO.html">HTTP:STC:ACTIVEX:RWSO</a></b></td>
   <td width="500" valign="top">
    HTTP: Rising Web Scan Object OL2005.dll ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAM-CONNECTDDN.html">HTTP:STC:ACTIVEX:SAM-CONNECTDDN</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung NET-i ware ConnectDDNS Method ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAM-DVMR.html">HTTP:STC:ACTIVEX:SAM-DVMR</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung iPOLiS Device Manager Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAM-SMARTVIEW.html">HTTP:STC:ACTIVEX:SAM-SMARTVIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer STWAxConfig Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSNG-KIES.html">HTTP:STC:ACTIVEX:SAMSNG-KIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung Kies Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-BACKUP.html">HTTP:STC:ACTIVEX:SAMSUNG-BACKUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung NET-i ware BackupToAvi Method ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-CNC.html">HTTP:STC:ACTIVEX:SAMSUNG-CNC</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer CNC_Ctrl Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-KIES.html">HTTP:STC:ACTIVEX:SAMSUNG-KIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung Kies Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-NET-I.html">HTTP:STC:ACTIVEX:SAMSUNG-NET-I</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung NET-i Viewer msls31.dll ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-VIEWER.html">HTTP:STC:ACTIVEX:SAMSUNG-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAP-BEXGLOBAL.html">HTTP:STC:ACTIVEX:SAP-BEXGLOBAL</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI SAPBExCommonResources.BExGlobal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAP-CRSTL-RPT.html">HTTP:STC:ACTIVEX:SAP-CRSTL-RPT</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP Crystal Reports Server ActiveX Insecure Method Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAP-GUI-TABONE.html">HTTP:STC:ACTIVEX:SAP-GUI-TABONE</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI TabOne ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAP-IRRFC-OF.html">HTTP:STC:ACTIVEX:SAP-IRRFC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI Sapirrfc.dll Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAP-WEBBVIEWER.html">HTTP:STC:ACTIVEX:SAP-WEBBVIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI WebViewer3D Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAPGUI-AX.html">HTTP:STC:ACTIVEX:SAPGUI-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: SAPGui BusinessObjects BI Unsafe ActiveX Control Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAPI-DLL.html">HTTP:STC:ACTIVEX:SAPI-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Vista Speech Recognition ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASASCAM-WEBCAM1.html">HTTP:STC:ACTIVEX:SASCAM-WEBCAM1</a></b></td>
   <td width="500" valign="top">
    HTTP: SaschArt SasCam Webcam Server ActiveX Control Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER.html">HTTP:STC:ACTIVEX:SCHNEIDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric Multiple Products IsObjectModel RemoveParameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER-ELEC.html">HTTP:STC:ACTIVEX:SCHNEIDER-ELEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima MetaDraw ArrangeObjects Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER-PROC.html">HTTP:STC:ACTIVEX:SCHNEIDER-PROC</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASETHTMLFILE.html">HTTP:STC:ACTIVEX:SETHTMLFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASHELL-APP.html">HTTP:STC:ACTIVEX:SHELL-APP</a></b></td>
   <td width="500" valign="top">
    HTTP: Shell.Application File Installation Weakness
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASIEMENS-SOLID.html">HTTP:STC:ACTIVEX:SIEMENS-SOLID</a></b></td>
   <td width="500" valign="top">
    HTTP: Siemens Solid Edge Unsafe Activex Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASIEMENS-WINCC.html">HTTP:STC:ACTIVEX:SIEMENS-WINCC</a></b></td>
   <td width="500" valign="top">
    HTTP: Siemens SIMATIC WinCC RegReader Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASKINCRAFTER-OF.html">HTTP:STC:ACTIVEX:SKINCRAFTER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: SkinCrafter ActiveX Control Insufficient Boundary Checks Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASNAPVIEW-RCE.html">HTTP:STC:ACTIVEX:SNAPVIEW-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Access Snapshot Viewer ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASNOOPYCTRL.html">HTTP:STC:ACTIVEX:SNOOPYCTRL</a></b></td>
   <td width="500" valign="top">
    HTTP: Electronic Arts SnoopyCtrl ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOFTARTISANS.html">HTTP:STC:ACTIVEX:SOFTARTISANS</a></b></td>
   <td width="500" valign="top">
    HTTP: SoftArtisans XFile FileManager ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOLARWINDS.html">HTTP:STC:ACTIVEX:SOLARWINDS</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Server and Application Monitor Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOLARWINDS-BO.html">HTTP:STC:ACTIVEX:SOLARWINDS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: SolarWinds Server and Application Monitor Unsafe ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASONICWALL-VPN.html">HTTP:STC:ACTIVEX:SONICWALL-VPN</a></b></td>
   <td width="500" valign="top">
    HTTP: SonicWALL SSL VPN End Point ActiveX Control Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASONY-PCOMP-BOF.html">HTTP:STC:ACTIVEX:SONY-PCOMP-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sony PC Companion Multiple ActiveX Stack Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASONY-WIFIMAN.html">HTTP:STC:ACTIVEX:SONY-WIFIMAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Sony VAIO Wireless Manager ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOPCAST-CNAME.html">HTTP:STC:ACTIVEX:SOPCAST-CNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: SopCast Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASPEECH-API.html">HTTP:STC:ACTIVEX:SPEECH-API</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Speech API 4 Dangerous ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASQLVDIR-DLL.html">HTTP:STC:ACTIVEX:SQLVDIR-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server 2000 Client Components ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASTARUML.html">HTTP:STC:ACTIVEX:STARUML</a></b></td>
   <td width="500" valign="top">
    HTTP: StarUML Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASUNWAY.html">HTTP:STC:ACTIVEX:SUNWAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Sunway ForceControl ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYGATE-SSHELP.html">HTTP:STC:ACTIVEX:SYGATE-SSHELP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sygate Personal Firewall &#39;SSHelper.dll&#39; Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYMC-APPSTEAM.html">HTTP:STC:ACTIVEX:SYMC-APPSTEAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec AppStream Client ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYMC-CLIPROXY.html">HTTP:STC:ACTIVEX:SYMC-CLIPROXY</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Client Proxy Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYMC-NAVCOMUI.html">HTTP:STC:ACTIVEX:SYMC-NAVCOMUI</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Norton Antivirus NavComUI.dll Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYMFAX.html">HTTP:STC:ACTIVEX:SYMFAX</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Fax Viewer v10 Unsafe ActiveX Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYNACTISPDF-BO.html">HTTP:STC:ACTIVEX:SYNACTISPDF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Synactis PDF In The Box Unsafe Activex Control.
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATEECHARTPRO-OF.html">HTTP:STC:ACTIVEX:TEECHARTPRO-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: TeeChart Pro ActiveX TeeChart7.ocx AddSeries Method Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATHREEDIFY-BOF.html">HTTP:STC:ACTIVEX:THREEDIFY-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: ThreeDify Designer ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATM-HOUSECALL.html">HTTP:STC:ACTIVEX:TM-HOUSECALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro HouseCall ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATM-ISP-2010.html">HTTP:STC:ACTIVEX:TM-ISP-2010</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATM-OS.html">HTTP:STC:ACTIVEX:TM-OS</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan objRemoveCtrl ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATOM-SAMYER-GET.html">HTTP:STC:ACTIVEX:TOM-SAMYER-GET</a></b></td>
   <td width="500" valign="top">
    HTTP: Tom Sawyer GET Extension Factory COM Object Instantiation ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATRENDNET.html">HTTP:STC:ACTIVEX:TRENDNET</a></b></td>
   <td width="500" valign="top">
    HTTP: TRENDnet TV-IP121WN ActiveX Control 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATRIEDITDOC.html">HTTP:STC:ACTIVEX:TRIEDITDOC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ActiveX TriEditDocument
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATROUBLE-QUERY.html">HTTP:STC:ACTIVEX:TROUBLE-QUERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer: Local Troubleshooter Query Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ATUMBLEWEED.html">HTTP:STC:ACTIVEX:TUMBLEWEED</a></b></td>
   <td width="500" valign="top">
    HTTP: Tumbleweed FileTransfer ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUBISOFT.html">HTTP:STC:ACTIVEX:UBISOFT</a></b></td>
   <td width="500" valign="top">
    HTTP: Ubisoft CoGSManager Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUBISOFT-UPLAY.html">HTTP:STC:ACTIVEX:UBISOFT-UPLAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Ubisoft Uplay Plugin Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AULTRAOFFIC.html">HTTP:STC:ACTIVEX:ULTRAOFFIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Ultra Office Unsafe ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUNCOMMON-AX.html">HTTP:STC:ACTIVEX:UNCOMMON-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Uncommon ActiveX Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUNITONICS-OPLC.html">HTTP:STC:ACTIVEX:UNITONICS-OPLC</a></b></td>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC TeeChart ActiveX RemoveSeries Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUNITRONICS-COR.html">HTTP:STC:ACTIVEX:UNITRONICS-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC TeeCommander Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AURLMON-DLL.html">HTTP:STC:ACTIVEX:URLMON-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer URLMON.DLL Dangerous ActiveX Object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUUSEE-UUPLAYER.html">HTTP:STC:ACTIVEX:UUSEE-UUPLAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: UUSee UUPlayer ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVB-TLBINF32.html">HTTP:STC:ACTIVEX:VB-TLBINF32</a></b></td>
   <td width="500" valign="top">
    HTTP: TLBINF32.DLL ActiveX Control Remote Code Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVERYPDF.html">HTTP:STC:ACTIVEX:VERYPDF</a></b></td>
   <td width="500" valign="top">
    HTTP: VeryPDF OpenPDF Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVFP6R.html">HTTP:STC:ACTIVEX:VFP6R</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual FoxPro vfp6r.dll DoCmd ActiveX Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVIDEOCALL.html">HTTP:STC:ACTIVEX:VIDEOCALL</a></b></td>
   <td width="500" valign="top">
    HTTP: Logitech VideoCall Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVIELIB.html">HTTP:STC:ACTIVEX:VIELIB</a></b></td>
   <td width="500" valign="top">
    HTTP: Vmware VIELIB.DLL Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVISAGESFT-PDF.html">HTTP:STC:ACTIVEX:VISAGESFT-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Visagesoft eXPert PDF Viewer Unsafe ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVISBASIC6-AX-1.html">HTTP:STC:ACTIVEX:VISBASIC6-AX-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous Visual Basic Unsafe ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVLC-PLY-RCE.html">HTTP:STC:ACTIVEX:VLC-PLY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player libdirectx_plugin.dll Plugin Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVLOGIC-MEMCP.html">HTTP:STC:ACTIVEX:VLOGIC-MEMCP</a></b></td>
   <td width="500" valign="top">
    HTTP: Unitronics UniDownloader and VisiLogic OPLC IDE IPWorksSSL.HTTPS Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVMWARE.html">HTTP:STC:ACTIVEX:VMWARE</a></b></td>
   <td width="500" valign="top">
    HTTP: VMWare COM API Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVMWARE-FS.html">HTTP:STC:ACTIVEX:VMWARE-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: VMware Remote Console HOST and MOID Format String Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVS05-INJ.html">HTTP:STC:ACTIVEX:VS05-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Visual Studio Unsafe ActiveX Control Remote Control Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVULN-DHTML.html">HTTP:STC:ACTIVEX:VULN-DHTML</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable DHTML ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBGATE-WESP.html">HTTP:STC:ACTIVEX:WEBGATE-WESP</a></b></td>
   <td width="500" valign="top">
    HTTP: WebGate WESPSDK WESPDiscovery unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBGATE-WESPM.html">HTTP:STC:ACTIVEX:WEBGATE-WESPM</a></b></td>
   <td width="500" valign="top">
    HTTP: WebGate Multiple Products WESPMonitor unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBVIEWER3D1.html">HTTP:STC:ACTIVEX:WEBVIEWER3D1</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI WebViewer3D ActiveX Control Arbitrary File Overwrite1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBVIEWER3D2.html">HTTP:STC:ACTIVEX:WEBVIEWER3D2</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI WebViewer3D ActiveX Control Arbitrary File Overwrite2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBVIEWER3D3.html">HTTP:STC:ACTIVEX:WEBVIEWER3D3</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI WebViewer3D ActiveX Control Arbitrary File Overwrite3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBVIEWER3D4.html">HTTP:STC:ACTIVEX:WEBVIEWER3D4</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP GUI WebViewer3D ActiveX Control Arbitrary File Overwrite4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWELLINTECH.html">HTTP:STC:ACTIVEX:WELLINTECH</a></b></td>
   <td width="500" valign="top">
    HTTP: WellinTech kxClientDownload ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWFICA.html">HTTP:STC:ACTIVEX:WFICA</a></b></td>
   <td width="500" valign="top">
    HTTP: Citrix Presentation Server Client WFICA.ocx ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWFILESTRING.html">HTTP:STC:ACTIVEX:WFILESTRING</a></b></td>
   <td width="500" valign="top">
    HTTP: HP LoadRunner WriteFileString Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWIBUKEY-RT-BO.html">HTTP:STC:ACTIVEX:WIBUKEY-RT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Wibu-Systems WibuKey Runtime for Windows Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWIN2K-AX.html">HTTP:STC:ACTIVEX:WIN2K-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows 2000 Multiple COM Object Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWINDVD7.html">HTTP:STC:ACTIVEX:WINDVD7</a></b></td>
   <td width="500" valign="top">
    HTTP: WinDVD7 Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWINIMGLOG.html">HTTP:STC:ACTIVEX:WINIMGLOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Image Acquisition Logger ActiveX Arbitrary File Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWINZIP-CMDLINE.html">HTTP:STC:ACTIVEX:WINZIP-CMDLINE</a></b></td>
   <td width="500" valign="top">
    HTTP: WinZip Command Line Unsafe Activex Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWKIMGSRV.html">HTTP:STC:ACTIVEX:WKIMGSRV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Works 7 WkImgSrv ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWMEX.html">HTTP:STC:ACTIVEX:WMEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Encoder 9 Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWMI-ADMIN.html">HTTP:STC:ACTIVEX:WMI-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WMI Administrative Tool Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWMP-SCRIPT.html">HTTP:STC:ACTIVEX:WMP-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWONDERWARE.html">HTTP:STC:ACTIVEX:WONDERWARE</a></b></td>
   <td width="500" valign="top">
    HTTP: Invensys Wonderware Info Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWORD-VIEWER.html">HTTP:STC:ACTIVEX:WORD-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word Viewer ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AXML-CORE-3-0.html">HTTP:STC:ACTIVEX:XML-CORE-3-0</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services 3.0 ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AXMLHTTP.html">HTTP:STC:ACTIVEX:XMLHTTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Service XMLHTTP ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AYAHOO-AUDIO.html">HTTP:STC:ACTIVEX:YAHOO-AUDIO</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Messenger AudioConf ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AYAHOO-CD-PLY.html">HTTP:STC:ACTIVEX:YAHOO-CD-PLY</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo CD Player ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AYAHOO-RCE.html">HTTP:STC:ACTIVEX:YAHOO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Messenger ActiveX Control Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AYMAILATTACH-OF.html">HTTP:STC:ACTIVEX:YMAILATTACH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Messenger YMailAttach ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AYSHORTCUT.html">HTTP:STC:ACTIVEX:YSHORTCUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Toolbar URL Shortcut Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AZENWORKS.html">HTTP:STC:ACTIVEX:ZENWORKS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks LaunchHelp.dll ActiveX Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AACUNETIX-EXT-DOMAIN-BO.html">HTTP:STC:ACUNETIX-EXT-DOMAIN-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Acunetix Web Vulnerability Scanner External Domain Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2013-5065-PDF.html">HTTP:STC:ADOBE:2013-5065-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2013-5065 Malicious Dropper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0515-CE1.html">HTTP:STC:ADOBE:2014-0515-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0515-CE2.html">HTTP:STC:ADOBE:2014-0515-CE2</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Remote Code Execution2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0515-CE3.html">HTTP:STC:ADOBE:2014-0515-CE3</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Remote Code Execution3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0515-CE4.html">HTTP:STC:ADOBE:2014-0515-CE4</a></b></td>
   <td width="500" valign="top">
    HTTP: CVE-2014-0515 Remote Code Execution4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0557-RCE.html">HTTP:STC:ADOBE:2014-0557-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0557 Memory Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-8439-RCE.html">HTTP:STC:ADOBE:2014-8439-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Dereferenced Memory Pointer Handling Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2015-0310-REGMCP.html">HTTP:STC:ADOBE:2015-0310-REGMCP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0310 PCRE Memory Access Violation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-BMP-HEAD.html">HTTP:STC:ADOBE:ACROBAT-BMP-HEAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader BMP Image Header Fields Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-GETICON.html">HTTP:STC:ADOBE:ACROBAT-GETICON</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-GLYPH-MC.html">HTTP:STC:ADOBE:ACROBAT-GLYPH-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader TrueType Glyph Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-IFF-OF.html">HTTP:STC:ADOBE:ACROBAT-IFF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader IFF File Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-JPEG2000.html">HTTP:STC:ADOBE:ACROBAT-JPEG2000</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader JPEG2000 Loading Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-JS-XRF.html">HTTP:STC:ADOBE:ACROBAT-JS-XRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader JavaScript Cross Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-PCX-OF.html">HTTP:STC:ADOBE:ACROBAT-PCX-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PCX Image Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-PICT-IMG.html">HTTP:STC:ADOBE:ACROBAT-PICT-IMG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PICT Image Structure Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-U3D-BO.html">HTTP:STC:ADOBE:ACROBAT-U3D-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Universal3D Image Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-U3D-RCE.html">HTTP:STC:ADOBE:ACROBAT-U3D-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Universal3D Image Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROBAT-URL-DF.html">HTTP:STC:ADOBE:ACROBAT-URL-DF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Plugin URL Double Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROFORM-MEM.html">HTTP:STC:ADOBE:ACROFORM-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader &#39;acroform_PlugInMain&#39; Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROFORM-NULL-CE.html">HTTP:STC:ADOBE:ACROFORM-NULL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader AcroForm Null Pointer Dereference Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AAUD-SESSFILE.html">HTTP:STC:ADOBE:AUD-SESSFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Audition Session File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AAUD-TRKM.html">HTTP:STC:ADOBE:AUD-TRKM</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Audition Session File TRKM Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ABMP-HEADER.html">HTTP:STC:ADOBE:BMP-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Multiple Products BMP Image Header Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ABMP-INT-OVF.html">HTTP:STC:ADOBE:BMP-INT-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat RLE Encoded BMP File Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ABYTEARRAY-UAF.html">HTTP:STC:ADOBE:BYTEARRAY-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Byte Array Class Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACAM-RAW-PLUGIN.html">HTTP:STC:ADOBE:CAM-RAW-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Camera Raw Plug-in TIFF Image Processing Buffer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACFF-OF.html">HTTP:STC:ADOBE:CFF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Compact Font Format Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACONVFILTER-UAF.html">HTTP:STC:ADOBE:CONVFILTER-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ConvolutionFilter Matrix Array Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACROSS-SEC-BYPASS.html">HTTP:STC:ADOBE:CROSS-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Cross-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACS-NULL-POINTER.html">HTTP:STC:ADOBE:CS-NULL-POINTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CS Null Pointer Dereference Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-1862-CE.html">HTTP:STC:ADOBE:CVE-2009-1862-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2009-1862 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-2985-MC.html">HTTP:STC:ADOBE:CVE-2009-2985-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Compact Font Format Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-3791-MC.html">HTTP:STC:ADOBE:CVE-2009-3791-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Media Server Memory Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-3959-OF.html">HTTP:STC:ADOBE:CVE-2009-3959-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Malformed U3D Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-0195-CE.html">HTTP:STC:ADOBE:CVE-2010-0195-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat TrueType Font Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-0197-MC.html">HTTP:STC:ADOBE:CVE-2010-0197-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2010-0197 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-2202-MC.html">HTTP:STC:ADOBE:CVE-2010-2202-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2010-2202 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-2873-CE.html">HTTP:STC:ADOBE:CVE-2010-2873-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Director CVE-2010-2873 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-0622-SB.html">HTTP:STC:ADOBE:CVE-2013-0622-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2013-0622 Remote Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3352-CE.html">HTTP:STC:ADOBE:CVE-2013-3352-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3352 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3353.html">HTTP:STC:ADOBE:CVE-2013-3353</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Head Tag Length Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3354-CE.html">HTTP:STC:ADOBE:CVE-2013-3354-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3354 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3355-CE.html">HTTP:STC:ADOBE:CVE-2013-3355-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2013-3355 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3357-MC.html">HTTP:STC:ADOBE:CVE-2013-3357-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3357 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5324-MC.html">HTTP:STC:ADOBE:CVE-2013-5324-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-5324 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5325-CE.html">HTTP:STC:ADOBE:CVE-2013-5325-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2013-5325 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5329-CE.html">HTTP:STC:ADOBE:CVE-2013-5329-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF CVE-2013-5329 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5330-MC.html">HTTP:STC:ADOBE:CVE-2013-5330-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2013-5330 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5331-CE.html">HTTP:STC:ADOBE:CVE-2013-5331-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-5331 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5332-CE.html">HTTP:STC:ADOBE:CVE-2013-5332-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-5332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0493-C1.html">HTTP:STC:ADOBE:CVE-2014-0493-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0493 Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0493-CE.html">HTTP:STC:ADOBE:CVE-2014-0493-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0493 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0497-MC.html">HTTP:STC:ADOBE:CVE-2014-0497-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0497 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0499-MC.html">HTTP:STC:ADOBE:CVE-2014-0499-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0499 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0506-UF.html">HTTP:STC:ADOBE:CVE-2014-0506-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0506 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0511-BO.html">HTTP:STC:ADOBE:CVE-2014-0511-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0511 Heap Based Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0512-CE.html">HTTP:STC:ADOBE:CVE-2014-0512-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0512 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0515-BO.html">HTTP:STC:ADOBE:CVE-2014-0515-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0515 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0517-CE.html">HTTP:STC:ADOBE:CVE-2014-0517-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0517 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0518-CE.html">HTTP:STC:ADOBE:CVE-2014-0518-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0518 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0520-CE.html">HTTP:STC:ADOBE:CVE-2014-0520-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0520 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0521.html">HTTP:STC:ADOBE:CVE-2014-0521</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0521 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0522-MC.html">HTTP:STC:ADOBE:CVE-2014-0522-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0522 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0523-CE.html">HTTP:STC:ADOBE:CVE-2014-0523-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2014-0523 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0524-MC.html">HTTP:STC:ADOBE:CVE-2014-0524-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0524 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0531-MC.html">HTTP:STC:ADOBE:CVE-2014-0531-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0531 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0533-XS.html">HTTP:STC:ADOBE:CVE-2014-0533-XS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0533 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0534-SB.html">HTTP:STC:ADOBE:CVE-2014-0534-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0534 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0537-CE.html">HTTP:STC:ADOBE:CVE-2014-0537-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0537 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0538-UF.html">HTTP:STC:ADOBE:CVE-2014-0538-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player MMgc Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0539-CE.html">HTTP:STC:ADOBE:CVE-2014-0539-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0539 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0544-MC.html">HTTP:STC:ADOBE:CVE-2014-0544-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0544 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0545-MC.html">HTTP:STC:ADOBE:CVE-2014-0545-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0545 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0547-MC.html">HTTP:STC:ADOBE:CVE-2014-0547-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0547 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0548-PB.html">HTTP:STC:ADOBE:CVE-2014-0548-PB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0548 Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0550-BO.html">HTTP:STC:ADOBE:CVE-2014-0550-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0550 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0553-MC.html">HTTP:STC:ADOBE:CVE-2014-0553-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0553 Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0554.html">HTTP:STC:ADOBE:CVE-2014-0554</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Local File Access Protection Bypass (CVE-2014-0554)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0555-BO.html">HTTP:STC:ADOBE:CVE-2014-0555-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0555 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0556-BO.html">HTTP:STC:ADOBE:CVE-2014-0556-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0556 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0558-CE.html">HTTP:STC:ADOBE:CVE-2014-0558-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0558 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0559-BO.html">HTTP:STC:ADOBE:CVE-2014-0559-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0559 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0564-MC.html">HTTP:STC:ADOBE:CVE-2014-0564-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0564 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0565-MC.html">HTTP:STC:ADOBE:CVE-2014-0565-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0565 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0567-OF.html">HTTP:STC:ADOBE:CVE-2014-0567-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0567 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0568-SE.html">HTTP:STC:ADOBE:CVE-2014-0568-SE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0568 Sandbox Escape
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0574-CE.html">HTTP:STC:ADOBE:CVE-2014-0574-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0574 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0574-MC.html">HTTP:STC:ADOBE:CVE-2014-0574-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0574 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0576-CE.html">HTTP:STC:ADOBE:CVE-2014-0576-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0576 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0577-CE.html">HTTP:STC:ADOBE:CVE-2014-0577-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0577 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0578-CE.html">HTTP:STC:ADOBE:CVE-2014-0578-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0578 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0580-SB.html">HTTP:STC:ADOBE:CVE-2014-0580-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0580 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0584-CE.html">HTTP:STC:ADOBE:CVE-2014-0584-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0584 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0586-CE.html">HTTP:STC:ADOBE:CVE-2014-0586-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0586 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0587-MC.html">HTTP:STC:ADOBE:CVE-2014-0587-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0587 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0588-CE.html">HTTP:STC:ADOBE:CVE-2014-0588-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0588 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-4671.html">HTTP:STC:ADOBE:CVE-2014-4671</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player and AIR CVE-2014-4671 Cross-Site Requeset Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8440-CE.html">HTTP:STC:ADOBE:CVE-2014-8440-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8440 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8440-ID.html">HTTP:STC:ADOBE:CVE-2014-8440-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8440 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8441-MC.html">HTTP:STC:ADOBE:CVE-2014-8441-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8441 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8443-MC.html">HTTP:STC:ADOBE:CVE-2014-8443-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8443 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8447-MC.html">HTTP:STC:ADOBE:CVE-2014-8447-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8447 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8449-CE.html">HTTP:STC:ADOBE:CVE-2014-8449-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8449 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8450-CE.html">HTTP:STC:ADOBE:CVE-2014-8450-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8450 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8451-ID.html">HTTP:STC:ADOBE:CVE-2014-8451-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat CVE-2014-8451 Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8452-SB.html">HTTP:STC:ADOBE:CVE-2014-8452-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8452 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8453-CE.html">HTTP:STC:ADOBE:CVE-2014-8453-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8453 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8455-UF.html">HTTP:STC:ADOBE:CVE-2014-8455-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8455 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8458-MC.html">HTTP:STC:ADOBE:CVE-2014-8458-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8458 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8459-MC.html">HTTP:STC:ADOBE:CVE-2014-8459-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8459 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8460-BO.html">HTTP:STC:ADOBE:CVE-2014-8460-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8460 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8461-MC.html">HTTP:STC:ADOBE:CVE-2014-8461-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8461 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9150-SB.html">HTTP:STC:ADOBE:CVE-2014-9150-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9150 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9158-MC.html">HTTP:STC:ADOBE:CVE-2014-9158-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9158 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9159-BO.html">HTTP:STC:ADOBE:CVE-2014-9159-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9159 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9160-CE.html">HTTP:STC:ADOBE:CVE-2014-9160-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9160 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9161-CE.html">HTTP:STC:ADOBE:CVE-2014-9161-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2014-9161 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9162-ID.html">HTTP:STC:ADOBE:CVE-2014-9162-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-9162 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9165-UA.html">HTTP:STC:ADOBE:CVE-2014-9165-UA</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9165 U3D UAF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0087-ID.html">HTTP:STC:ADOBE:CVE-2015-0087-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0087 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0089-ID.html">HTTP:STC:ADOBE:CVE-2015-0089-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0089 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0090-CE.html">HTTP:STC:ADOBE:CVE-2015-0090-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0090 Font Driver Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0091-CE.html">HTTP:STC:ADOBE:CVE-2015-0091-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0092-CE.html">HTTP:STC:ADOBE:CVE-2015-0092-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0093-CE.html">HTTP:STC:ADOBE:CVE-2015-0093-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0301-MC.html">HTTP:STC:ADOBE:CVE-2015-0301-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0301 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0302-ID.html">HTTP:STC:ADOBE:CVE-2015-0302-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0302 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0303-SB.html">HTTP:STC:ADOBE:CVE-2015-0303-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0303 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0305-MC.html">HTTP:STC:ADOBE:CVE-2015-0305-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0305 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0306-MC.html">HTTP:STC:ADOBE:CVE-2015-0306-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0306 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0307-DS.html">HTTP:STC:ADOBE:CVE-2015-0307-DS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0307 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0313-ID.html">HTTP:STC:ADOBE:CVE-2015-0313-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0313 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0314-BO.html">HTTP:STC:ADOBE:CVE-2015-0314-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0314 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0315-CE.html">HTTP:STC:ADOBE:CVE-2015-0315-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0315 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0316-CE.html">HTTP:STC:ADOBE:CVE-2015-0316-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0316 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0317-CE.html">HTTP:STC:ADOBE:CVE-2015-0317-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0317 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0318-CE.html">HTTP:STC:ADOBE:CVE-2015-0318-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0318 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0319-CE.html">HTTP:STC:ADOBE:CVE-2015-0319-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0319 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0320-CE.html">HTTP:STC:ADOBE:CVE-2015-0320-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0320 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0321-CE.html">HTTP:STC:ADOBE:CVE-2015-0321-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0321 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0322-CE.html">HTTP:STC:ADOBE:CVE-2015-0322-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0322 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0323-CE.html">HTTP:STC:ADOBE:CVE-2015-0323-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0323 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0324-CE.html">HTTP:STC:ADOBE:CVE-2015-0324-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0324 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0325-CE.html">HTTP:STC:ADOBE:CVE-2015-0325-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0325 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0326-DS.html">HTTP:STC:ADOBE:CVE-2015-0326-DS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0326 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0327-CE.html">HTTP:STC:ADOBE:CVE-2015-0327-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0327 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0328-CE.html">HTTP:STC:ADOBE:CVE-2015-0328-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0328 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0329-CE.html">HTTP:STC:ADOBE:CVE-2015-0329-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0329 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0330-CE.html">HTTP:STC:ADOBE:CVE-2015-0330-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0330 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0333-MC.html">HTTP:STC:ADOBE:CVE-2015-0333-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0333 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0334-CE.html">HTTP:STC:ADOBE:CVE-2015-0334-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0334 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0335-CE.html">HTTP:STC:ADOBE:CVE-2015-0335-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0335 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0337-PB.html">HTTP:STC:ADOBE:CVE-2015-0337-PB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0337 Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0338-CE.html">HTTP:STC:ADOBE:CVE-2015-0338-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0338 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0339-CE.html">HTTP:STC:ADOBE:CVE-2015-0339-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0339 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0340-CE.html">HTTP:STC:ADOBE:CVE-2015-0340-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0340 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0341-CE.html">HTTP:STC:ADOBE:CVE-2015-0341-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0341 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0342-CE.html">HTTP:STC:ADOBE:CVE-2015-0342-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0342 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0346-CE.html">HTTP:STC:ADOBE:CVE-2015-0346-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0346 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0347-CE.html">HTTP:STC:ADOBE:CVE-2015-0347-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0347 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0348-CE.html">HTTP:STC:ADOBE:CVE-2015-0348-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0348 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0349-CE.html">HTTP:STC:ADOBE:CVE-2015-0349-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0349 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0350-MC.html">HTTP:STC:ADOBE:CVE-2015-0350-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0350 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0351-MC.html">HTTP:STC:ADOBE:CVE-2015-0351-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0351 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0352-MC.html">HTTP:STC:ADOBE:CVE-2015-0352-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0352 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0353-CE.html">HTTP:STC:ADOBE:CVE-2015-0353-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0353 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0354-MC.html">HTTP:STC:ADOBE:CVE-2015-0354-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0354 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0355-MC.html">HTTP:STC:ADOBE:CVE-2015-0355-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0355 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0356-CE.html">HTTP:STC:ADOBE:CVE-2015-0356-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0356 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0357-CE.html">HTTP:STC:ADOBE:CVE-2015-0357-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0357 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0358-CE.html">HTTP:STC:ADOBE:CVE-2015-0358-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0358 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0359-MC.html">HTTP:STC:ADOBE:CVE-2015-0359-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0359 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0360-MC.html">HTTP:STC:ADOBE:CVE-2015-0360-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0360 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-2417-CE.html">HTTP:STC:ADOBE:CVE-2015-2417-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-2417 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3038-MC.html">HTTP:STC:ADOBE:CVE-2015-3038-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3038 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3040-ID.html">HTTP:STC:ADOBE:CVE-2015-3040-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3040  Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3041-CE.html">HTTP:STC:ADOBE:CVE-2015-3041-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3041 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3042-CE.html">HTTP:STC:ADOBE:CVE-2015-3042-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3043-CE.html">HTTP:STC:ADOBE:CVE-2015-3043-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3043 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3044-ID.html">HTTP:STC:ADOBE:CVE-2015-3044-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3044 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3046-CE.html">HTTP:STC:ADOBE:CVE-2015-3046-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3046 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3047-CE.html">HTTP:STC:ADOBE:CVE-2015-3047-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3047 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3050-CE.html">HTTP:STC:ADOBE:CVE-2015-3050-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3051-CE.html">HTTP:STC:ADOBE:CVE-2015-3051-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3051 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3052-CE.html">HTTP:STC:ADOBE:CVE-2015-3052-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3053-CE.html">HTTP:STC:ADOBE:CVE-2015-3053-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3053 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3054-CE.html">HTTP:STC:ADOBE:CVE-2015-3054-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3054 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3055-CE.html">HTTP:STC:ADOBE:CVE-2015-3055-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3055 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3056-MC.html">HTTP:STC:ADOBE:CVE-2015-3056-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3056 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3059-CE.html">HTTP:STC:ADOBE:CVE-2015-3059-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3059 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3062-CE.html">HTTP:STC:ADOBE:CVE-2015-3062-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3062 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3064-CE.html">HTTP:STC:ADOBE:CVE-2015-3064-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3064 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3070-CE.html">HTTP:STC:ADOBE:CVE-2015-3070-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3070 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3072-CE.html">HTTP:STC:ADOBE:CVE-2015-3072-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3072 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3074-CE.html">HTTP:STC:ADOBE:CVE-2015-3074-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3074 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3076-CE.html">HTTP:STC:ADOBE:CVE-2015-3076-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3076 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3077-CE.html">HTTP:STC:ADOBE:CVE-2015-3077-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3077 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3078-DS.html">HTTP:STC:ADOBE:CVE-2015-3078-DS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3078 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3079-SB.html">HTTP:STC:ADOBE:CVE-2015-3079-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3079 Cross Domain Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3080-CE.html">HTTP:STC:ADOBE:CVE-2015-3080-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3080 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3081-BP.html">HTTP:STC:ADOBE:CVE-2015-3081-BP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3081 bypass Internet Explorer Protected Mode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3084-CE.html">HTTP:STC:ADOBE:CVE-2015-3084-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3084 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3085-VB.html">HTTP:STC:ADOBE:CVE-2015-3085-VB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3085 Validation Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3086-CE.html">HTTP:STC:ADOBE:CVE-2015-3086-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3087-CE.html">HTTP:STC:ADOBE:CVE-2015-3087-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3088-BO.html">HTTP:STC:ADOBE:CVE-2015-3088-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3088 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3089-CE.html">HTTP:STC:ADOBE:CVE-2015-3089-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3090-CE.html">HTTP:STC:ADOBE:CVE-2015-3090-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3090 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3091-CE.html">HTTP:STC:ADOBE:CVE-2015-3091-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3092-CE.html">HTTP:STC:ADOBE:CVE-2015-3092-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3093-CE.html">HTTP:STC:ADOBE:CVE-2015-3093-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3096-SB.html">HTTP:STC:ADOBE:CVE-2015-3096-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3096 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3098-CE.html">HTTP:STC:ADOBE:CVE-2015-3098-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3098 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3099-ID.html">HTTP:STC:ADOBE:CVE-2015-3099-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3099 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3100-CE.html">HTTP:STC:ADOBE:CVE-2015-3100-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3102-SB.html">HTTP:STC:ADOBE:CVE-2015-3102-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3102 SOP Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3103-CE.html">HTTP:STC:ADOBE:CVE-2015-3103-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3103 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3104-CE.html">HTTP:STC:ADOBE:CVE-2015-3104-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3106-CE.html">HTTP:STC:ADOBE:CVE-2015-3106-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3107-CE.html">HTTP:STC:ADOBE:CVE-2015-3107-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3108-CE.html">HTTP:STC:ADOBE:CVE-2015-3108-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3108 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3114-ID.html">HTTP:STC:ADOBE:CVE-2015-3114-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3114 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3116-CE.html">HTTP:STC:ADOBE:CVE-2015-3116-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3116 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3117-CE.html">HTTP:STC:ADOBE:CVE-2015-3117-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3117 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3118-CE.html">HTTP:STC:ADOBE:CVE-2015-3118-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3118 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3119-CE.html">HTTP:STC:ADOBE:CVE-2015-3119-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3119 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-312-RCE.html">HTTP:STC:ADOBE:CVE-2015-312-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0312 remote code execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3120-CE.html">HTTP:STC:ADOBE:CVE-2015-3120-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3120 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3121-CE.html">HTTP:STC:ADOBE:CVE-2015-3121-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3121 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3122-C1.html">HTTP:STC:ADOBE:CVE-2015-3122-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3122-CE.html">HTTP:STC:ADOBE:CVE-2015-3122-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3123-CE.html">HTTP:STC:ADOBE:CVE-2015-3123-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3123 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3124-CE.html">HTTP:STC:ADOBE:CVE-2015-3124-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3124 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3125-ID.html">HTTP:STC:ADOBE:CVE-2015-3125-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3125 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3126-CE.html">HTTP:STC:ADOBE:CVE-2015-3126-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3126 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3127-UF.html">HTTP:STC:ADOBE:CVE-2015-3127-UF</a></b></td>
   <td width="500" valign="top">
    Adobe Flash CVE-2015-3127 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3128-CE.html">HTTP:STC:ADOBE:CVE-2015-3128-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3128 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3129-CE.html">HTTP:STC:ADOBE:CVE-2015-3129-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3129 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3130-CE.html">HTTP:STC:ADOBE:CVE-2015-3130-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3132-UF.html">HTTP:STC:ADOBE:CVE-2015-3132-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3132 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3133-DS.html">HTTP:STC:ADOBE:CVE-2015-3133-DS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3133 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3134-BO.html">HTTP:STC:ADOBE:CVE-2015-3134-BO</a></b></td>
   <td width="500" valign="top">
    HTTP:  Adobe Flash CVE-2015-3134 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4429-CE.html">HTTP:STC:ADOBE:CVE-2015-4429-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4429 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4430-CE.html">HTTP:STC:ADOBE:CVE-2015-4430-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4430 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4431-CE.html">HTTP:STC:ADOBE:CVE-2015-4431-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4431 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4433-CE.html">HTTP:STC:ADOBE:CVE-2015-4433-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4433 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4435-CE.html">HTTP:STC:ADOBE:CVE-2015-4435-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4441-CE.html">HTTP:STC:ADOBE:CVE-2015-4441-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4441 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4446-CE.html">HTTP:STC:ADOBE:CVE-2015-4446-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4446 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4447-CE.html">HTTP:STC:ADOBE:CVE-2015-4447-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4447 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4448-CE.html">HTTP:STC:ADOBE:CVE-2015-4448-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-4448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4449-CE.html">HTTP:STC:ADOBE:CVE-2015-4449-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4449 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4451-CE.html">HTTP:STC:ADOBE:CVE-2015-4451-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-4451 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4452-CE.html">HTTP:STC:ADOBE:CVE-2015-4452-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4452 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5085-CE.html">HTTP:STC:ADOBE:CVE-2015-5085-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5085 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5086-CE.html">HTTP:STC:ADOBE:CVE-2015-5086-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5087-CE.html">HTTP:STC:ADOBE:CVE-2015-5087-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5088-CE.html">HTTP:STC:ADOBE:CVE-2015-5088-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5088 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5089-CE.html">HTTP:STC:ADOBE:CVE-2015-5089-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-5089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5090-CE.html">HTTP:STC:ADOBE:CVE-2015-5090-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5090 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5091-CE.html">HTTP:STC:ADOBE:CVE-2015-5091-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5092-CE.html">HTTP:STC:ADOBE:CVE-2015-5092-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5093-CE.html">HTTP:STC:ADOBE:CVE-2015-5093-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5095-CE.html">HTTP:STC:ADOBE:CVE-2015-5095-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5095 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5096-CE.html">HTTP:STC:ADOBE:CVE-2015-5096-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5096 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5098-CE.html">HTTP:STC:ADOBE:CVE-2015-5098-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5098 Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5100-CE.html">HTTP:STC:ADOBE:CVE-2015-5100-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5102-CE.html">HTTP:STC:ADOBE:CVE-2015-5102-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5102 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5104-CE.html">HTTP:STC:ADOBE:CVE-2015-5104-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5105-CE.html">HTTP:STC:ADOBE:CVE-2015-5105-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-5105 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5106-CE.html">HTTP:STC:ADOBE:CVE-2015-5106-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5107-CE.html">HTTP:STC:ADOBE:CVE-2015-5107-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5108-BO.html">HTTP:STC:ADOBE:CVE-2015-5108-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5108 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5109-CE.html">HTTP:STC:ADOBE:CVE-2015-5109-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5109 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5113-CE.html">HTTP:STC:ADOBE:CVE-2015-5113-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5113 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5115-OB.html">HTTP:STC:ADOBE:CVE-2015-5115-OB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5115 Out-of-bound Memory Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5123-CE.html">HTTP:STC:ADOBE:CVE-2015-5123-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5123 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5123-UF.html">HTTP:STC:ADOBE:CVE-2015-5123-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5123 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5125-CE.html">HTTP:STC:ADOBE:CVE-2015-5125-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5125 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5126-CE.html">HTTP:STC:ADOBE:CVE-2015-5126-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5126 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5129-CE.html">HTTP:STC:ADOBE:CVE-2015-5129-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5129 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5130-CE.html">HTTP:STC:ADOBE:CVE-2015-5130-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5131-CE.html">HTTP:STC:ADOBE:CVE-2015-5131-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5131 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5132-CE.html">HTTP:STC:ADOBE:CVE-2015-5132-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5132 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5133-C1.html">HTTP:STC:ADOBE:CVE-2015-5133-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5133 Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5133-CE.html">HTTP:STC:ADOBE:CVE-2015-5133-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5133 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5134-CE.html">HTTP:STC:ADOBE:CVE-2015-5134-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5134 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5539-CE.html">HTTP:STC:ADOBE:CVE-2015-5539-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5539 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5540-CE.html">HTTP:STC:ADOBE:CVE-2015-5540-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5540 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5541-CE.html">HTTP:STC:ADOBE:CVE-2015-5541-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5541 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5543-CE.html">HTTP:STC:ADOBE:CVE-2015-5543-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5543 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5544-CE.html">HTTP:STC:ADOBE:CVE-2015-5544-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5544 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5545-CE.html">HTTP:STC:ADOBE:CVE-2015-5545-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5545 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5546-CE.html">HTTP:STC:ADOBE:CVE-2015-5546-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5546 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5547-CE.html">HTTP:STC:ADOBE:CVE-2015-5547-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5547 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5548-CE.html">HTTP:STC:ADOBE:CVE-2015-5548-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5548 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5549-CE.html">HTTP:STC:ADOBE:CVE-2015-5549-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5549 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5550-CE.html">HTTP:STC:ADOBE:CVE-2015-5550-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5550 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5551-CE.html">HTTP:STC:ADOBE:CVE-2015-5551-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5551 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5552-CE.html">HTTP:STC:ADOBE:CVE-2015-5552-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5552 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5553-CE.html">HTTP:STC:ADOBE:CVE-2015-5553-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5553 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5554-CE.html">HTTP:STC:ADOBE:CVE-2015-5554-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5554 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5555-CE.html">HTTP:STC:ADOBE:CVE-2015-5555-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5555 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5556-CE.html">HTTP:STC:ADOBE:CVE-2015-5556-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5556 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5557-CE.html">HTTP:STC:ADOBE:CVE-2015-5557-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5557 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5558-CE.html">HTTP:STC:ADOBE:CVE-2015-5558-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5558 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5559-CE.html">HTTP:STC:ADOBE:CVE-2015-5559-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5559 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5560-CE.html">HTTP:STC:ADOBE:CVE-2015-5560-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5560 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5561-CE.html">HTTP:STC:ADOBE:CVE-2015-5561-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5561 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5562-CE.html">HTTP:STC:ADOBE:CVE-2015-5562-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5562 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5563-UF.html">HTTP:STC:ADOBE:CVE-2015-5563-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5563 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5564-CE.html">HTTP:STC:ADOBE:CVE-2015-5564-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5564 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5565-CE.html">HTTP:STC:ADOBE:CVE-2015-5565-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5565 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5567-CE.html">HTTP:STC:ADOBE:CVE-2015-5567-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5567 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5568-CE.html">HTTP:STC:ADOBE:CVE-2015-5568-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5568 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5570-CE.html">HTTP:STC:ADOBE:CVE-2015-5570-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5570 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5573-CE.html">HTTP:STC:ADOBE:CVE-2015-5573-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5573 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5574-CE.html">HTTP:STC:ADOBE:CVE-2015-5574-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5574 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5575-CE.html">HTTP:STC:ADOBE:CVE-2015-5575-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5575 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5576-C1.html">HTTP:STC:ADOBE:CVE-2015-5576-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5576 Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5576-CE.html">HTTP:STC:ADOBE:CVE-2015-5576-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5576 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5578-CE.html">HTTP:STC:ADOBE:CVE-2015-5578-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5578 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5579-DS.html">HTTP:STC:ADOBE:CVE-2015-5579-DS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5579 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5580-CE.html">HTTP:STC:ADOBE:CVE-2015-5580-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe CVE-2015-5580 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5581-CE.html">HTTP:STC:ADOBE:CVE-2015-5581-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5581 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5582-SF.html">HTTP:STC:ADOBE:CVE-2015-5582-SF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5580 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5584-CE.html">HTTP:STC:ADOBE:CVE-2015-5584-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5584 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5587-CE.html">HTTP:STC:ADOBE:CVE-2015-5587-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5587 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5588-CE.html">HTTP:STC:ADOBE:CVE-2015-5588-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5588 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6676-CE.html">HTTP:STC:ADOBE:CVE-2015-6676-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6676 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6678-CE.html">HTTP:STC:ADOBE:CVE-2015-6678-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6678 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6679-CE.html">HTTP:STC:ADOBE:CVE-2015-6679-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6679 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6682-CE.html">HTTP:STC:ADOBE:CVE-2015-6682-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6682 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7625-CE.html">HTTP:STC:ADOBE:CVE-2015-7625-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7625 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7627-CE.html">HTTP:STC:ADOBE:CVE-2015-7627-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7627 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7628-PE.html">HTTP:STC:ADOBE:CVE-2015-7628-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7628 Top-level And Inner Frame Navigation 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7629-CE.html">HTTP:STC:ADOBE:CVE-2015-7629-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7629 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7631-CE.html">HTTP:STC:ADOBE:CVE-2015-7631-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7631 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7632-CE.html">HTTP:STC:ADOBE:CVE-2015-7632-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7632 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7633-CE.html">HTTP:STC:ADOBE:CVE-2015-7633-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7633 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7651-CE.html">HTTP:STC:ADOBE:CVE-2015-7651-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7652-CE.html">HTTP:STC:ADOBE:CVE-2015-7652-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7652 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7653-CE.html">HTTP:STC:ADOBE:CVE-2015-7653-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7653 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7654-CE.html">HTTP:STC:ADOBE:CVE-2015-7654-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7654 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7655-CE.html">HTTP:STC:ADOBE:CVE-2015-7655-CE</a></b></td>
   <td width="500" valign="top">
     HTTP: Adobe Flash Player CVE-2015-7655 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7657-CE.html">HTTP:STC:ADOBE:CVE-2015-7657-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7657 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7659-CE.html">HTTP:STC:ADOBE:CVE-2015-7659-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7659 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7660-UF.html">HTTP:STC:ADOBE:CVE-2015-7660-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7660 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7663-CE.html">HTTP:STC:ADOBE:CVE-2015-7663-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7663 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8042-UF.html">HTTP:STC:ADOBE:CVE-2015-8042-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8042 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8048-CE.html">HTTP:STC:ADOBE:CVE-2015-8048-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8060-CE.html">HTTP:STC:ADOBE:CVE-2015-8060-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8060 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8407-CE.html">HTTP:STC:ADOBE:CVE-2015-8407-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8407 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8408-CE.html">HTTP:STC:ADOBE:CVE-2015-8408-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8408 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8414-CE.html">HTTP:STC:ADOBE:CVE-2015-8414-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8414 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8418-CE.html">HTTP:STC:ADOBE:CVE-2015-8418-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8418 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8419-CE.html">HTTP:STC:ADOBE:CVE-2015-8419-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8419 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8435-CE.html">HTTP:STC:ADOBE:CVE-2015-8435-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8436-CE.html">HTTP:STC:ADOBE:CVE-2015-8436-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8436 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8437-CE.html">HTTP:STC:ADOBE:CVE-2015-8437-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8437 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8438-CE.html">HTTP:STC:ADOBE:CVE-2015-8438-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8438 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8439-CE.html">HTTP:STC:ADOBE:CVE-2015-8439-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8439 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8442-CE.html">HTTP:STC:ADOBE:CVE-2015-8442-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8442 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8443-CE.html">HTTP:STC:ADOBE:CVE-2015-8443-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8443 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8444-CE.html">HTTP:STC:ADOBE:CVE-2015-8444-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8444 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8445-CE.html">HTTP:STC:ADOBE:CVE-2015-8445-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8445 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8446-CE.html">HTTP:STC:ADOBE:CVE-2015-8446-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Falsh CVE-2015-8446 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8447-CE.html">HTTP:STC:ADOBE:CVE-2015-8447-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8447 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8448-CE.html">HTTP:STC:ADOBE:CVE-2015-8448-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8449-CE.html">HTTP:STC:ADOBE:CVE-2015-8449-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8449 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8450-CE.html">HTTP:STC:ADOBE:CVE-2015-8450-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8450 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8457-CE.html">HTTP:STC:ADOBE:CVE-2015-8457-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8457 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8459-CE.html">HTTP:STC:ADOBE:CVE-2015-8459-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8459 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8460-CE.html">HTTP:STC:ADOBE:CVE-2015-8460-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8460 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8634-CE.html">HTTP:STC:ADOBE:CVE-2015-8634-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8634 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8635-CE.html">HTTP:STC:ADOBE:CVE-2015-8635-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8635 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8636-CE.html">HTTP:STC:ADOBE:CVE-2015-8636-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8636 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8638-CE.html">HTTP:STC:ADOBE:CVE-2015-8638-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8638 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8639-CE.html">HTTP:STC:ADOBE:CVE-2015-8639-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8639 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8640-CE.html">HTTP:STC:ADOBE:CVE-2015-8640-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8640 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8641-CE.html">HTTP:STC:ADOBE:CVE-2015-8641-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8641 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8642-CE.html">HTTP:STC:ADOBE:CVE-2015-8642-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8642 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8643-CE.html">HTTP:STC:ADOBE:CVE-2015-8643-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8643 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8644-CE.html">HTTP:STC:ADOBE:CVE-2015-8644-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8644 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8645-CE.html">HTTP:STC:ADOBE:CVE-2015-8645-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8645 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8646-CE.html">HTTP:STC:ADOBE:CVE-2015-8646-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8646 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8647-CE.html">HTTP:STC:ADOBE:CVE-2015-8647-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8647 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8648-CE.html">HTTP:STC:ADOBE:CVE-2015-8648-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8648 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8649-CE.html">HTTP:STC:ADOBE:CVE-2015-8649-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8649 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8650-CE.html">HTTP:STC:ADOBE:CVE-2015-8650-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8650 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8651-CE.html">HTTP:STC:ADOBE:CVE-2015-8651-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0931-CE.html">HTTP:STC:ADOBE:CVE-2016-0931-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0931 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0933-CE.html">HTTP:STC:ADOBE:CVE-2016-0933-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0933 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0934-CE.html">HTTP:STC:ADOBE:CVE-2016-0934-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0934 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0935-CE.html">HTTP:STC:ADOBE:CVE-2016-0935-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0935 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0936-CE.html">HTTP:STC:ADOBE:CVE-2016-0936-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0936 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0938-CE.html">HTTP:STC:ADOBE:CVE-2016-0938-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0938 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0939-CE.html">HTTP:STC:ADOBE:CVE-2016-0939-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0939 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0940-CE.html">HTTP:STC:ADOBE:CVE-2016-0940-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0940 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0943-CE.html">HTTP:STC:ADOBE:CVE-2016-0943-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0943 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0944-CE.html">HTTP:STC:ADOBE:CVE-2016-0944-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2016-0944 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0945-CE.html">HTTP:STC:ADOBE:CVE-2016-0945-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0945 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0946-CE.html">HTTP:STC:ADOBE:CVE-2016-0946-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0946 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0947-CE.html">HTTP:STC:ADOBE:CVE-2016-0947-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2016-0947 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE2014-0532-RCE.html">HTTP:STC:ADOBE:CVE2014-0532-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0532 String Escape Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE2014-8456-DOS.html">HTTP:STC:ADOBE:CVE2014-8456-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8456 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE2015-0309-RCE.html">HTTP:STC:ADOBE:CVE2015-0309-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0309 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADC-2015-5097-CE.html">HTTP:STC:ADOBE:DC-2015-5097-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5097 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADEFINEFONT.html">HTTP:STC:ADOBE:DEFINEFONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DefineFont Remote Code Execution (CVE-2011-0626)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADIRECTOR-FILE-M1.html">HTTP:STC:ADOBE:DIRECTOR-FILE-M1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Director file Multiple Record Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADIRECTOR-FILE-MC.html">HTTP:STC:ADOBE:DIRECTOR-FILE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Director file Multiple Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADLMGR-AOM-OF.html">HTTP:STC:ADOBE:DLMGR-AOM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Download Manager AOM File Section Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADOMAIN-MEM-RCE.html">HTTP:STC:ADOBE:DOMAIN-MEM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DomainMemory Clear Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADOMAIN-MEMORY.html">HTTP:STC:ADOBE:DOMAIN-MEMORY</a></b></td>
   <td width="500" valign="top">
    HTTP:Adobe Flash Player-Dangling Pointer-RCE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AEMBED-OBJ-MIME.html">HTTP:STC:ADOBE:EMBED-OBJ-MIME</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe MIMETYPE in Embed/Object HTML Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-ACTIONIF.html">HTTP:STC:ADOBE:FLASH-ACTIONIF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionIf Instruction Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-ACTIVEX-MC.html">HTTP:STC:ADOBE:FLASH-ACTIVEX-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActiveX Plugin Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-ARGCOUNT.html">HTTP:STC:ADOBE:FLASH-ARGCOUNT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Counting Argument Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-ARGREST.html">HTTP:STC:ADOBE:FLASH-ARGREST</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Rest Argument Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-AS-MEM-DOS.html">HTTP:STC:ADOBE:FLASH-AS-MEM-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Corruption Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-AS2-OF.html">HTTP:STC:ADOBE:FLASH-AS2-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 2 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-AS3-INT-OV.html">HTTP:STC:ADOBE:FLASH-AS3-INT-OV</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 3 Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-AS3-MC.html">HTTP:STC:ADOBE:FLASH-AS3-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash AS3 Pcre Assertion Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-BITMAPDATA.html">HTTP:STC:ADOBE:FLASH-BITMAPDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 3 BitmapData Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-BMD-SCROLL.html">HTTP:STC:ADOBE:FLASH-BMD-SCROLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript3 &#39;BitmapData.scroll&#39; Remote Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-BO.html">HTTP:STC:ADOBE:FLASH-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Buffer Overflow (CVE-2012-5676)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-CVE15-0304.html">HTTP:STC:ADOBE:FLASH-CVE15-0304</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0304 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-CVE15-0308.html">HTTP:STC:ADOBE:FLASH-CVE15-0308</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0308 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-DEFINE-TAG.html">HTTP:STC:ADOBE:FLASH-DEFINE-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Mutated DefineSprite Tag Invalid Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-DYN-CALC.html">HTTP:STC:ADOBE:FLASH-DYN-CALC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 3 Dynamic Calculation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-DYN-SCRIPT.html">HTTP:STC:ADOBE:FLASH-DYN-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Dynamic ActionScript3 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-FILEREF-BO.html">HTTP:STC:ADOBE:FLASH-FILEREF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player File Reference Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-FIREFOX.html">HTTP:STC:ADOBE:FLASH-FIREFOX</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Firefox plugin Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-FLV-MEM.html">HTTP:STC:ADOBE:FLASH-FLV-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash FLV File Handling Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INFO-DISC.html">HTTP:STC:ADOBE:FLASH-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0492 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INFODISC.html">HTTP:STC:ADOBE:FLASH-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0508 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INT-DOS.html">HTTP:STC:ADOBE:FLASH-INT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Integer Overflow Remote Denial of Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INT-OV.html">HTTP:STC:ADOBE:FLASH-INT-OV</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Integer Overflow (CVE-2012-5677)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INT-OVF.html">HTTP:STC:ADOBE:FLASH-INT-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Integer Overflow (CVE-2013-3347)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INVOP.html">HTTP:STC:ADOBE:FLASH-INVOP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Invalid Instruction Op Double-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MAL-ACTION.html">HTTP:STC:ADOBE:FLASH-MAL-ACTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Malformed Action Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MATRX3D-IO.html">HTTP:STC:ADOBE:FLASH-MATRX3D-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Matrix3D copyRawDataTo Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MC.html">HTTP:STC:ADOBE:FLASH-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MP3-TAG-CE.html">HTTP:STC:ADOBE:FLASH-MP3-TAG-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash MP3 ID3 Tag Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MP4-NULL.html">HTTP:STC:ADOBE:FLASH-MP4-NULL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player MP4 Null Atom Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MP4LOAD-BO.html">HTTP:STC:ADOBE:FLASH-MP4LOAD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player MP4 Loading Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-NULL-PTR.html">HTTP:STC:ADOBE:FLASH-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player NULL Pointer Dereference Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-OOB-MC.html">HTTP:STC:ADOBE:FLASH-OOB-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Out of Bound Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-OP.html">HTTP:STC:ADOBE:FLASH-OP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player OP_inclocal and OP_declocal Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PL-JPEG-OF.html">HTTP:STC:ADOBE:FLASH-PL-JPEG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player JPEG Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-AIR.html">HTTP:STC:ADOBE:FLASH-PLAYER-AIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player / AIR Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-BO.html">HTTP:STC:ADOBE:FLASH-PLAYER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0507 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-BOF.html">HTTP:STC:ADOBE:FLASH-PLAYER-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player File Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-MP4.html">HTTP:STC:ADOBE:FLASH-PLAYER-MP4</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player MP4 Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-XSS.html">HTTP:STC:ADOBE:FLASH-PLAYER-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0509 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLY-BYPASS.html">HTTP:STC:ADOBE:FLASH-PLY-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0535 Security Bounds Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLY-RCE.html">HTTP:STC:ADOBE:FLASH-PLY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-RCE.html">HTTP:STC:ADOBE:FLASH-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash AS Native NetConnection Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-REGEX-DOS.html">HTTP:STC:ADOBE:FLASH-REGEX-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player RegeEx Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-RUNTIME.html">HTTP:STC:ADOBE:FLASH-RUNTIME</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player RunTime Calculation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-SEQUENCE.html">HTTP:STC:ADOBE:FLASH-SEQUENCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DefineFont4 SequenceIndex Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-SETSLOT.html">HTTP:STC:ADOBE:FLASH-SETSLOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 3 &#39;setslot&#39; Instruction Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-SNATIVE.html">HTTP:STC:ADOBE:FLASH-SNATIVE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ASnative Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-STAGE3D.html">HTTP:STC:ADOBE:FLASH-STAGE3D</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Stage3D ActionScript Class Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-TYPE-CONF.html">HTTP:STC:ADOBE:FLASH-TYPE-CONF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player iExternalizable Interface readExternal Method Type Confusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-XDOMAIN.html">HTTP:STC:ADOBE:FLASH-XDOMAIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 2 Cross Domain Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-XSRF.html">HTTP:STC:ADOBE:FLASH-XSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Cross Site Request Forgery Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLR-FILE-MC.html">HTTP:STC:ADOBE:FLASHPLR-FILE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Improper File Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLR-NUL-MC3.html">HTTP:STC:ADOBE:FLASHPLR-NUL-MC3</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player null Reference Memory Corruption3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLR-NULL-MC.html">HTTP:STC:ADOBE:FLASHPLR-NULL-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player null Reference Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLYR-HEAPOF.html">HTTP:STC:ADOBE:FLASHPLYR-HEAPOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLYR-SBYPAS.html">HTTP:STC:ADOBE:FLASHPLYR-SBYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player URI Handling Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLATEDECODE-BO.html">HTTP:STC:ADOBE:FLATEDECODE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Adobe Reader FlateDecode Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLSHPLYR-INFDISC.html">HTTP:STC:ADOBE:FLSHPLYR-INFDISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player SWF File Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLV-APPENDBYTES.html">HTTP:STC:ADOBE:FLV-APPENDBYTES</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player FLV appendBytes Function Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLV-FILE-DOS.html">HTTP:STC:ADOBE:FLV-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player FLV file Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFP-CASI-MC.html">HTTP:STC:ADOBE:FP-CASI-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player casi32 Implementation Unspecified Integer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AGETANNOTS-RCE.html">HTTP:STC:ADOBE:GETANNOTS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PDF JavaScript getAnnots Method Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AILLUSTRATOR-MC.html">HTTP:STC:ADOBE:ILLUSTRATOR-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Illustrator APSB12-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJBIG2-SYMBOL-RCE.html">HTTP:STC:ADOBE:JBIG2-SYMBOL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader JBIG2 Symbol Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJPEG-FILE-OF.html">HTTP:STC:ADOBE:JPEG-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader JPEG File Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJS-API-CE.html">HTTP:STC:ADOBE:JS-API-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF JavaScript API Execution Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJS-CE.html">HTTP:STC:ADOBE:JS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader JavaScript Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJS-TERMINATE-UAF.html">HTTP:STC:ADOBE:JS-TERMINATE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader PDF Document Closed Prior To Javascript Termination Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ALIBTIF-FETCHDATA.html">HTTP:STC:ADOBE:LIBTIF-FETCHDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat LibTIFF TIFFFetchData Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMAL-BMP.html">HTTP:STC:ADOBE:MAL-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat/Reader PDF Malformed Bitmap Image File (BMP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMAL-FLV-BOF.html">HTTP:STC:ADOBE:MAL-FLV-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Malformed FLV File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMAL-IFF.html">HTTP:STC:ADOBE:MAL-IFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat/Reader PDF Malformed IFF 3D Texture File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMAL-PSD.html">HTTP:STC:ADOBE:MAL-PSD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat/Reader PDF Malformed Adobe Photoshop Image File (PSD)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEM-PTR-LEAK.html">HTTP:STC:ADOBE:MEM-PTR-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Pointer Memory Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMDSC-2014-0552.html">HTTP:STC:ADOBE:MEMDSC-2014-0552</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Disclosure (CVE-2014-0552)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMLK-2014-0542.html">HTTP:STC:ADOBE:MEMLK-2014-0542</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMLK-2014-0543.html">HTTP:STC:ADOBE:MEMLK-2014-0543</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0543 Memory Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMUL-JS-API-CE.html">HTTP:STC:ADOBE:MUL-JS-API-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Pdf Mul JavaScript API Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ANETMONITOR-UAF.html">HTTP:STC:ADOBE:NETMONITOR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player NetMonitor Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APARSE-FLOAT-BOF.html">HTTP:STC:ADOBE:PARSE-FLOAT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ParseFloat Method Stack Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APARSE-FLOAT-BOF1.html">HTTP:STC:ADOBE:PARSE-FLOAT-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ParseFloat Method Stack Buffer Overflow 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-3D-WH.html">HTTP:STC:ADOBE:PDF-3D-WH</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Universal 3D Format Image Width and Height Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-BITDEF-OF.html">HTTP:STC:ADOBE:PDF-BITDEF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: BitDefender Antivirus PDF Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-BITDEF-OF1.html">HTTP:STC:ADOBE:PDF-BITDEF-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: BitDefender Antivirus PDF Processing Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-CATALOG.html">HTTP:STC:ADOBE:PDF-CATALOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PDF Catalog Handling Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-CCITT.html">HTTP:STC:ADOBE:PDF-CCITT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CCITT Encoded Stream Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-CIDFONT.html">HTTP:STC:ADOBE:PDF-CIDFONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Malformed CIDFont Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-CLUT.html">HTTP:STC:ADOBE:PDF-CLUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader ICC CLUT Field Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-COLORS-INT.html">HTTP:STC:ADOBE:PDF-COLORS-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Colors Field Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-COMPACT.html">HTTP:STC:ADOBE:PDF-COMPACT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Compact File Format Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-COOLTYPE-BO.html">HTTP:STC:ADOBE:PDF-COOLTYPE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CoolType Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-COOLTYPE-RCE.html">HTTP:STC:ADOBE:PDF-COOLTYPE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CoolType.dll Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-DESC-FONTS.html">HTTP:STC:ADOBE:PDF-DESC-FONTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF DescendantFonts Recursive Loop Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-DRAWIMG.html">HTTP:STC:ADOBE:PDF-DRAWIMG</a></b></td>
   <td width="500" valign="top">
    HTTP: Xpdf Splash DrawImage Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-EBUK-FORMSTR.html">HTTP:STC:ADOBE:PDF-EBUK-FORMSTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader EBook Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-EMBEDDEDFILE.html">HTTP:STC:ADOBE:PDF-EMBEDDEDFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: EmbeddedFile contained within a PDF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-EVASIVE-FF.html">HTTP:STC:ADOBE:PDF-EVASIVE-FF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader PDF Evasive File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-EXT-OF.html">HTTP:STC:ADOBE:PDF-EXT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader File Extension Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-FIELDDIR.html">HTTP:STC:ADOBE:PDF-FIELDDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Field Directory Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-FLATEDECODE.html">HTTP:STC:ADOBE:PDF-FLATEDECODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF FlateDecode Evasion Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-FONT.html">HTTP:STC:ADOBE:PDF-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat PDF Font Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-FREETYPE.html">HTTP:STC:ADOBE:PDF-FREETYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: PDF FreeType Compact Font Format Multiple Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-GDI-OBJ-RCE.html">HTTP:STC:ADOBE:PDF-GDI-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat GDI object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-GLYPH-OF.html">HTTP:STC:ADOBE:PDF-GLYPH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Glyph Font Definition Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-GOTO-XSS.html">HTTP:STC:ADOBE:PDF-GOTO-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Remote-Go-To Tag Cross Domain Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-HEAP-RCE.html">HTTP:STC:ADOBE:PDF-HEAP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader PDF Heap Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-ICC-PRODESC.html">HTTP:STC:ADOBE:PDF-ICC-PRODESC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader Malformed ICC ProfileDescription Tag Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-ICC-RCE.html">HTTP:STC:ADOBE:PDF-ICC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ICC Stream Remote Code Execution (CVE-2010-3621)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JAVASCRIPT.html">HTTP:STC:ADOBE:PDF-JAVASCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript in Adobe PDF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JBIG2DECODE.html">HTTP:STC:ADOBE:PDF-JBIG2DECODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat PDF Reader JBIG2Decode Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JPEG-FILE-CE.html">HTTP:STC:ADOBE:PDF-JPEG-FILE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat JPEG file Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JPXDECODE.html">HTTP:STC:ADOBE:PDF-JPXDECODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF JPXDecode Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JS-EXECUTION.html">HTTP:STC:ADOBE:PDF-JS-EXECUTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat Sandbox Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JS-FILE.html">HTTP:STC:ADOBE:PDF-JS-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PDF Javascript File Handling Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JS-HIDE.html">HTTP:STC:ADOBE:PDF-JS-HIDE</a></b></td>
   <td width="500" valign="top">
    HTTP: PDF File with Obfuscated Javascript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JS-METHOD.html">HTTP:STC:ADOBE:PDF-JS-METHOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Multiple Products PDF JavaScript Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-JS-NEWPLAYER.html">HTTP:STC:ADOBE:PDF-JS-NEWPLAYER</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat media.newPlayer Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-LAUNCH-CMD.html">HTTP:STC:ADOBE:PDF-LAUNCH-CMD</a></b></td>
   <td width="500" valign="top">
    HTTP: PDF Reader Launch Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-LIBTIFF.html">HTTP:STC:ADOBE:PDF-LIBTIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Import Tiff Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-MAL-JPEG.html">HTTP:STC:ADOBE:PDF-MAL-JPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF File Containing Malformed JPEG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-OBFUSCATION.html">HTTP:STC:ADOBE:PDF-OBFUSCATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Function Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-OPENACTION.html">HTTP:STC:ADOBE:PDF-OPENACTION</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenAction JavaScript in Adobe PDF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-PICT-HEAP-OF.html">HTTP:STC:ADOBE:PDF-PICT-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat PICT Image Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-PRINTSEPS.html">HTTP:STC:ADOBE:PDF-PRINTSEPS</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious Flash File printSeps Function Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-PRINTSEPS-2.html">HTTP:STC:ADOBE:PDF-PRINTSEPS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Memory Corruption Remote Code Execution (APSB10-28)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-SPELL-MC.html">HTTP:STC:ADOBE:PDF-SPELL-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader JavaScript spell.customDictionaryOpen Method Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-TJ-OBJECT.html">HTTP:STC:ADOBE:PDF-TJ-OBJECT</a></b></td>
   <td width="500" valign="top">
    HTTP:  Adobe Acrobat and Reader Malformed Operator Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-U3D-BO.html">HTTP:STC:ADOBE:PDF-U3D-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: PDF U3D RHAdobeMeta Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-U3D-CLOD.html">HTTP:STC:ADOBE:PDF-U3D-CLOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader U3D CLODMeshContinuation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UAC-HANDLE.html">HTTP:STC:ADOBE:PDF-UAC-HANDLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Use After Closed Handle Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UAF-RCE.html">HTTP:STC:ADOBE:PDF-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Use After Free Handle Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UNI-3D.html">HTTP:STC:ADOBE:PDF-UNI-3D</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat/Reader PDF With Universal 3D Content
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UNICODED-SC.html">HTTP:STC:ADOBE:PDF-UNICODED-SC</a></b></td>
   <td width="500" valign="top">
    HTTP: Encoded Shellcode in Adobe PDF JavaScript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UNIVERSAL3D.html">HTTP:STC:ADOBE:PDF-UNIVERSAL3D</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Universal3D Image Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-URI-OACTION.html">HTTP:STC:ADOBE:PDF-URI-OACTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader URI OpenAction Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UTILPRINTF.html">HTTP:STC:ADOBE:PDF-UTILPRINTF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat util.printf Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UUEXEC.html">HTTP:STC:ADOBE:PDF-UUEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader uudecode() File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-XML-XSS.html">HTTP:STC:ADOBE:PDF-XML-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader/Acrobat XML Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APHOTOSHOP-ASSET.html">HTTP:STC:ADOBE:PHOTOSHOP-ASSET</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop Asset Elements Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APHOTOSHOP-CS5-MC.html">HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop CS5 GIF File Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APHOTOSHOP-TIF-OF.html">HTTP:STC:ADOBE:PHOTOSHOP-TIF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop CS4 TIFF Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APM-FONT-OF.html">HTTP:STC:ADOBE:PM-FONT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PageMaker Font-Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APOSTSCRIPT-RCE.html">HTTP:STC:ADOBE:POSTSCRIPT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PostScript Fonts Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APS-CS4-MULTI-BO.html">HTTP:STC:ADOBE:PS-CS4-MULTI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop CS4 Multipe File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APS-CS4-MULTI-BO1.html">HTTP:STC:ADOBE:PS-CS4-MULTI-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop CS4 Multipe File Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APS-PNG-BO.html">HTTP:STC:ADOBE:PS-PNG-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Products PNG File Handling Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APS-TIFF-BOF.html">HTTP:STC:ADOBE:PS-TIFF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop TIFF Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-10.1.4-MC.html">HTTP:STC:ADOBE:READER-10.1.4-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader 10.1.4 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-API-CE.html">HTTP:STC:ADOBE:READER-API-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader API Call Handling Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-BMP.html">HTTP:STC:ADOBE:READER-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader PDF BMP Image Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-BMP-COLOR.html">HTTP:STC:ADOBE:READER-BMP-COLOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader BMP Colors Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-BPROTECT.html">HTTP:STC:ADOBE:READER-BPROTECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader bProtectedMode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-CID-FONT.html">HTTP:STC:ADOBE:READER-CID-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Embedded CID-Keyed Font Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-CRASH.html">HTTP:STC:ADOBE:READER-CRASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Pointer Dereferenced Leads to Crash
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DCT.html">HTTP:STC:ADOBE:READER-DCT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader DCT Dequantizer Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DCT-NULL.html">HTTP:STC:ADOBE:READER-DCT-NULL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader DCT Encoded Stream Null Pointer Dereference Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DOS.html">HTTP:STC:ADOBE:READER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Node Access Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DOTRANGE.html">HTTP:STC:ADOBE:READER-DOTRANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader DOTRANGE Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FILE-DOS.html">HTTP:STC:ADOBE:READER-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Improper File Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FILE-RCE.html">HTTP:STC:ADOBE:READER-FILE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Incorrect File Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FONT-OF.html">HTTP:STC:ADOBE:READER-FONT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Font Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FORM-UAF.html">HTTP:STC:ADOBE:READER-FORM-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Improper Form Handling Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-HEAP-OVF.html">HTTP:STC:ADOBE:READER-HEAP-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3358 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-HYBRID-BY.html">HTTP:STC:ADOBE:READER-HYBRID-BY</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Hybrid File Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-ICC-RCE.html">HTTP:STC:ADOBE:READER-ICC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ICC Stream Remote Code Execution (APSB10-21)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-ICC-RCE1.html">HTTP:STC:ADOBE:READER-ICC-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ICC Stream Remote Code Execution (APSB10-21)1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-INFO-DISC.html">HTTP:STC:ADOBE:READER-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-INFODISC.html">HTTP:STC:ADOBE:READER-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Improper JavaScript Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-INT-OF.html">HTTP:STC:ADOBE:READER-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Unspecified Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-IT.html">HTTP:STC:ADOBE:READER-IT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Free Text Annotation with Invalid Intent (IT) Value Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-JAVA-CE.html">HTTP:STC:ADOBE:READER-JAVA-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Mobile JavaScript Interface Java Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-JP2K-BO.html">HTTP:STC:ADOBE:READER-JP2K-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader JP2K Object Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-JS-RCE.html">HTTP:STC:ADOBE:READER-JS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Eval Function Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-MAL-PDF.html">HTTP:STC:ADOBE:READER-MAL-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Malicious PDF File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-MC-RCE.html">HTTP:STC:ADOBE:READER-MC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Memory Corruption Remote Code Execution (CVE-2012-1530)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-NULL-PTR.html">HTTP:STC:ADOBE:READER-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0495 Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-OOB-WRITE.html">HTTP:STC:ADOBE:READER-OOB-WRITE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Out-of-Bound Wrie Access Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PICT-RLE.html">HTTP:STC:ADOBE:READER-PICT-RLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader PICT Image RLE Encoded Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN1.html">HTTP:STC:ADOBE:READER-PLUGIN1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN2.html">HTTP:STC:ADOBE:READER-PLUGIN2</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN3.html">HTTP:STC:ADOBE:READER-PLUGIN3</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN4.html">HTTP:STC:ADOBE:READER-PLUGIN4</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN5.html">HTTP:STC:ADOBE:READER-PLUGIN5</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN6.html">HTTP:STC:ADOBE:READER-PLUGIN6</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN7.html">HTTP:STC:ADOBE:READER-PLUGIN7</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN8.html">HTTP:STC:ADOBE:READER-PLUGIN8</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PLUGIN9.html">HTTP:STC:ADOBE:READER-PLUGIN9</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-PRC.html">HTTP:STC:ADOBE:READER-PRC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Product Representation Compact Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-SECBYPASS.html">HTTP:STC:ADOBE:READER-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Sandbox Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-STACK-EXH.html">HTTP:STC:ADOBE:READER-STACK-EXH</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Stack Exhaustion Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-TTF-DESC.html">HTTP:STC:ADOBE:READER-TTF-DESC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader TTF Descriptions Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-U3D.html">HTTP:STC:ADOBE:READER-U3D</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader U3D ShadingModifierBlock Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-UAF.html">HTTP:STC:ADOBE:READER-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2014-0527 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-WIDGET.html">HTTP:STC:ADOBE:READER-WIDGET</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Widget Null Pointer Dereference Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-WKT-BO.html">HTTP:STC:ADOBE:READER-WKT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Well-Known Text Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-WRITAV-CE.html">HTTP:STC:ADOBE:READER-WRITAV-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader WriteAV Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-XSLT-BO.html">HTTP:STC:ADOBE:READER-XSLT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader XSLT Engine Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADR-ACROBAT-BO.html">HTTP:STC:ADOBE:READR-ACROBAT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREVOKED-CERT.html">HTTP:STC:ADOBE:REVOKED-CERT</a></b></td>
   <td width="500" valign="top">
    HTTP: Executable Signed With Revoked Adobe Certificate Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ARMAS-RCE.html">HTTP:STC:ADOBE:RMAS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Rich Media Annotations Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASHKWV-LINGO-BOF.html">HTTP:STC:ADOBE:SHKWV-LINGO-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player lingo API Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASHOCKWAVE-3D-OF.html">HTTP:STC:ADOBE:SHOCKWAVE-3D-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave 3D Stucture HeapOoverflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASHOCKWAVE-OOB.html">HTTP:STC:ADOBE:SHOCKWAVE-OOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player rcsL Chunk Parsing Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASHOCKWAVE-RCSL.html">HTTP:STC:ADOBE:SHOCKWAVE-RCSL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player rcsL Chunk Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-2015-5572-SB.html">HTTP:STC:ADOBE:SWF-2015-5572-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5572 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-ACTIONIF-DO.html">HTTP:STC:ADOBE:SWF-ACTIONIF-DO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionIF DoAction Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-ACTIONSCRIPT.html">HTTP:STC:ADOBE:SWF-ACTIONSCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript Function Variable Arguments Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-ACTIONSET.html">HTTP:STC:ADOBE:SWF-ACTIONSET</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionSetTarget Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-APPLY-FUNC.html">HTTP:STC:ADOBE:SWF-APPLY-FUNC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript 3 Apply Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-BUTTON.html">HTTP:STC:ADOBE:SWF-BUTTON</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Button Define Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-DEFINEFONT4.html">HTTP:STC:ADOBE:SWF-DEFINEFONT4</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DefineFont Remote Code Execution (CVE-2011-0619)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-DEFINEFUNC2.html">HTTP:STC:ADOBE:SWF-DEFINEFUNC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DefineFunction2 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-DMNMEM-CP.html">HTTP:STC:ADOBE:SWF-DMNMEM-CP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0311 DomainMemory Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-DMNMEM-CP1.html">HTTP:STC:ADOBE:SWF-DMNMEM-CP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0311 DomainMemory Use-after-Free1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-EVENTLISTEN.html">HTTP:STC:ADOBE:SWF-EVENTLISTEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Event Listener Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-FLASH-BOF.html">HTTP:STC:ADOBE:SWF-FLASH-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Buffer Overflow (CVE-2011-2130)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-FLASH-OF.html">HTTP:STC:ADOBE:SWF-FLASH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Integer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-GRADIENTFIL2.html">HTTP:STC:ADOBE:SWF-GRADIENTFIL2</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player GradientFill Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-GRADIENTFILL.html">HTTP:STC:ADOBE:SWF-GRADIENTFILL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player beginGradientFill Method Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-IN-PDF.html">HTTP:STC:ADOBE:SWF-IN-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Embedded in PDF File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-INFO-DISC.html">HTTP:STC:ADOBE:SWF-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0504 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-INVALID-OBF.html">HTTP:STC:ADOBE:SWF-INVALID-OBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Invalid Object Reference Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-INVALID-OBF1.html">HTTP:STC:ADOBE:SWF-INVALID-OBF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Invalid Object Reference Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-JPG-OF.html">HTTP:STC:ADOBE:SWF-JPG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player JPG Embedded SWF Processing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-LINUX-AS.html">HTTP:STC:ADOBE:SWF-LINUX-AS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player for Linux ActionScript ASnative Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MAL-AS.html">HTTP:STC:ADOBE:SWF-MAL-AS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Malicious ActionScript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MAL-AS-OF.html">HTTP:STC:ADOBE:SWF-MAL-AS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Malicious ActionScript Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MAL-AS-RCE.html">HTTP:STC:ADOBE:SWF-MAL-AS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Malicious ActionScript Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MAL-FILE.html">HTTP:STC:ADOBE:SWF-MAL-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Malformed File Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MEM-COR.html">HTTP:STC:ADOBE:SWF-MEM-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript Null Pointer Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MEM-CORR.html">HTTP:STC:ADOBE:SWF-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-3363 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-NEWFUNC.html">HTTP:STC:ADOBE:SWF-NEWFUNC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player newfunction Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-NEWFUNC1.html">HTTP:STC:ADOBE:SWF-NEWFUNC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player newfunction Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-OPENTYPE-CFF.html">HTTP:STC:ADOBE:SWF-OPENTYPE-CFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player OpenType Compact Font Format Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-POINTOBJ.html">HTTP:STC:ADOBE:SWF-POINTOBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Corrupted Point Objects Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-REMOTE-MC.html">HTTP:STC:ADOBE:SWF-REMOTE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Remote Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-SEC-BYPASS.html">HTTP:STC:ADOBE:SWF-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Security Control Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-SETTARGET.html">HTTP:STC:ADOBE:SWF-SETTARGET</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript SetTarget Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-TYPE-CONFUS.html">HTTP:STC:ADOBE:SWF-TYPE-CONFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Type Confusion Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-UAF-JS.html">HTTP:STC:ADOBE:SWF-UAF-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Use-After-Free Javascript Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-UNC-JUMP.html">HTTP:STC:ADOBE:SWF-UNC-JUMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Unconditional Jump Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-UNVRSL-XSS.html">HTTP:STC:ADOBE:SWF-UNVRSL-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Universal Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-XLS-MALF.html">HTTP:STC:ADOBE:SWF-XLS-MALF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Malformed XLS File Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-XSFORGE.html">HTTP:STC:ADOBE:SWF-XSFORGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Cross-Site Request Forgery Unauthorized Remote Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATEXT-NETCONNECT.html">HTTP:STC:ADOBE:TEXT-NETCONNECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Race Condition Between Text Drawing And NetConnection Object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATEXTLINE-OB-CE.html">HTTP:STC:ADOBE:TEXTLINE-OB-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash TextLine OpaqueBackground Property Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATEXTLINE-OB-CE1.html">HTTP:STC:ADOBE:TEXTLINE-OB-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash TextLine OpaqueBackground Property Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATHUMBNAIL-RCE.html">HTTP:STC:ADOBE:THUMBNAIL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Thumbnail View Remote Code Execurtion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATHUMBNAIL-RCE1.html">HTTP:STC:ADOBE:THUMBNAIL-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader Thumbnail View Remote Code Execurtion1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATOOLBUTTON-UAF.html">HTTP:STC:ADOBE:TOOLBUTTON-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader ToolButton Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATRUETYPE-FONT-CE.html">HTTP:STC:ADOBE:TRUETYPE-FONT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader TrueType Font Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATRUETYPE-OF.html">HTTP:STC:ADOBE:TRUETYPE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader TrueType Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATSAC-STRING.html">HTTP:STC:ADOBE:TSAC-STRING</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director tSAC Chunk String Termination Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATTF-HANDLING.html">HTTP:STC:ADOBE:TTF-HANDLING</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader TTF Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AU3D-CLODMESH-MC.html">HTTP:STC:ADOBE:U3D-CLODMESH-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AU3D-TEXTURE-BOF.html">HTTP:STC:ADOBE:U3D-TEXTURE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader U3D Texture Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AU3D-TEXTURE-BOF1.html">HTTP:STC:ADOBE:U3D-TEXTURE-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader U3D Texture Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWEIGHTVECTOR.html">HTTP:STC:ADOBE:WEIGHTVECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader WeightVector Null Pointer Dereference Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWRITE-CONFUSION.html">HTTP:STC:ADOBE:WRITE-CONFUSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player writeExternal Type Confusion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWRTE-WAT-WHRE-C1.html">HTTP:STC:ADOBE:WRTE-WAT-WHRE-C1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Shader Object Processing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWRTE-WAT-WHRE-CE.html">HTTP:STC:ADOBE:WRTE-WAT-WHRE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Shader Object Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-KEY.html">HTTP:STC:ADOBE:XFIR-KEY</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director File KEY Chunk Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-LNAM.html">HTTP:STC:ADOBE:XFIR-LNAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player Lnam Chunk Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-PAMI.html">HTTP:STC:ADOBE:XFIR-PAMI</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director PAMI Chunk Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-PAMI-RCE.html">HTTP:STC:ADOBE:XFIR-PAMI-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player DIR Files PAMI Chunk Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-PAMM-MEM.html">HTTP:STC:ADOBE:XFIR-PAMM-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director pamm Chunk Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-RCSL.html">HTTP:STC:ADOBE:XFIR-RCSL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director rcsL Chunk Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-RECORD.html">HTTP:STC:ADOBE:XFIR-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player Director File FFFFFF88 Record Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AXFIR-TSAC.html">HTTP:STC:ADOBE:XFIR-TSAC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Director tSAC Chunk Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADVANTEC-INP-PARAM-RC1.html">HTTP:STC:ADVANTEC-INP-PARAM-RC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech ADAMView Input Parameter GNI File Handling Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADVANTEC-INP-PARAM-RCE.html">HTTP:STC:ADVANTEC-INP-PARAM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech ADAMView Input Parameter GNI File Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADVANTEC-WEBACSES-BOF.html">HTTP:STC:ADVANTEC-WEBACSES-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess IP Address Parameter Handling Length Check Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AADVANTECH-WEBACCES-BOF.html">HTTP:STC:ADVANTECH-WEBACCES-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess SCADA Password Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPENDED-MAL-JS.html">HTTP:STC:APPENDED-MAL-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious JavaScript Appended to Existing JavaScript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-CFNETWORK-DOS.html">HTTP:STC:APPLE-CFNETWORK-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple CFNetwork HTTP NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-ICHAT.html">HTTP:STC:APPLE-ICHAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple iChat AIM URL Handler Remote Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-MIME-TYPE-BOF.html">HTTP:STC:APPLE-MIME-TYPE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MIME Type Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-MUL-KERNEL-DOS.html">HTTP:STC:APPLE-MUL-KERNEL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Multiple Product Kernel TCP Out of Band Data Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-QTIME-DREF-BO.html">HTTP:STC:APPLE-QTIME-DREF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Alis Volume Name Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-QTIME-ENOF-OF.html">HTTP:STC:APPLE-QTIME-ENOF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Enof Atom Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-QUIKTME-CE.html">HTTP:STC:APPLE-QUIKTME-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Crafted Movie Files Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-RTSP-DOS.html">HTTP:STC:APPLE-RTSP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime RTSP Response Header Content-Length Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AATL%3ACISCO-UNITY.html">HTTP:STC:ATL:CISCO-UNITY</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Unity Vulnerable ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AATL%3ADIRECTSHOW.html">HTTP:STC:ATL:DIRECTSHOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow Vulnerable ActiveX Control (ATL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AATL%3AMSOFFICE-AX.html">HTTP:STC:ATL:MSOFFICE-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AATL%3AOWC.html">HTTP:STC:ATL:OWC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook OWC Unsafe ActiveX Control (ATL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AATL%3ASHOCKWAVE.html">HTTP:STC:ATL:SHOCKWAVE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player Vulnerable ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAV-GATEWAY-BYPASS.html">HTTP:STC:AV-GATEWAY-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendor AV Gateway Virus Detection Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AAV-MAGIC-EVADE.html">HTTP:STC:AV-MAGIC-EVADE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendor Anti-Virus Magic Byte Detection Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ABLACKBERRY-SVR-DOS.html">HTTP:STC:BLACKBERRY-SVR-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: BlackBerry Comment Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ABROWSER-DISPLAY-BOX-MC.html">HTTP:STC:BROWSER-DISPLAY-BOX-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome and Apple Safari Display Box Rendering Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ABROWSER-FLOAT-STYLE-MC.html">HTTP:STC:BROWSER-FLOAT-STYLE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome and Apple Safari Floating Styles Use-After-Free Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ABROWSER-RUBY-BLOCK.html">HTTP:STC:BROWSER-RUBY-BLOCK</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome and Apple Safari Ruby Before And After Blocks Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ABT%3AFDM-TORRENT-BOF.html">HTTP:STC:BT:FDM-TORRENT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Free Download Manager .torrent File Parsing Multiple Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACACHETIME.html">HTTP:STC:CACHETIME</a></b></td>
   <td width="500" valign="top">
    HTTP: Non-Destructive Cache Timing Browser History Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACANVAS-BABYBOTTLE.html">HTTP:STC:CANVAS-BABYBOTTLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Canvas Babybottle
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACANVAS-BABYBOTTLE-GZIP.html">HTTP:STC:CANVAS-BABYBOTTLE-GZIP</a></b></td>
   <td width="500" valign="top">
    HTTP: Canvas Babybottle gzip
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHAR-CONFLICT.html">HTTP:STC:CHAR-CONFLICT</a></b></td>
   <td width="500" valign="top">
    HTTP: Conflicting CHARSET
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AARRAY-INTOVF.html">HTTP:STC:CHROME:ARRAY-INTOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Array Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AAWSNAP-DOS.html">HTTP:STC:CHROME:AWSNAP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Chrome AwSnap Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ABUG-REPORT-CE.html">HTTP:STC:CHROME:BUG-REPORT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Uninitialized bug_report_pointer Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ABUG-REPORT-CE1.html">HTTP:STC:CHROME:BUG-REPORT-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Uninitialized bug_report_pointer Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ACLPBRD-DATA-MC.html">HTTP:STC:CHROME:CLPBRD-DATA-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Clipboard Data Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ADOM-UAF.html">HTTP:STC:CHROME:DOM-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome DOM Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AEXECCMD-UAF.html">HTTP:STC:CHROME:EXECCMD-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome ExecCommand Heap Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AGURL-XO-BYPASS.html">HTTP:STC:CHROME:GURL-XO-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome GURL Cross Origin Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AGURL-XO-BYPASS1.html">HTTP:STC:CHROME:GURL-XO-BYPASS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome GURL Cross Origin Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AID-ATTR-OBJ-UAF.html">HTTP:STC:CHROME:ID-ATTR-OBJ-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Object Elements Id Attribute Related Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AIFRAME-VIDEO-MC.html">HTTP:STC:CHROME:IFRAME-VIDEO-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Web Browser Video In Iframe Memory Corruption.
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AJS-MSGBOX-DOS.html">HTTP:STC:CHROME:JS-MSGBOX-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Java Script Message Box Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AJS-MSGBOX-DOS1.html">HTTP:STC:CHROME:JS-MSGBOX-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Java Script Message Box Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ALIST-INSIDE-COL.html">HTTP:STC:CHROME:LIST-INSIDE-COL</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Web Browser List Inside Column Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ALOCATION-UAF.html">HTTP:STC:CHROME:LOCATION-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome locationAttributeSetter Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AMUL-FILE-TYPE.html">HTTP:STC:CHROME:MUL-FILE-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Multiple File Type Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AMUTATIONOBS-UAF.html">HTTP:STC:CHROME:MUTATIONOBS-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Mutations Observer Object Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ANOTIFY-IWD-UAF.html">HTTP:STC:CHROME:NOTIFY-IWD-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome NotifyInstanceWasDeleted Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AOBJ-BFRLOAD-UAF.html">HTTP:STC:CHROME:OBJ-BFRLOAD-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Object Beforeload Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3APEPPER-PLGN-UAF.html">HTTP:STC:CHROME:PEPPER-PLGN-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Pepper Plugin User After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARANGE-BLUR-MC.html">HTTP:STC:CHROME:RANGE-BLUR-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Selection In Mutation Event Handler Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARESPONSE-MC.html">HTTP:STC:CHROME:RESPONSE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome HTTP Response Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARESPONSE-MC1.html">HTTP:STC:CHROME:RESPONSE-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome HTTP Response Handling Memory Corruption 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARESPONSE-MC2.html">HTTP:STC:CHROME:RESPONSE-MC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome HTTP Response Handling Memory Corruption 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARESPONSE-MC3.html">HTTP:STC:CHROME:RESPONSE-MC3</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome HTTP Response Handling Memory Corruption 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ASTALE-PTR.html">HTTP:STC:CHROME:STALE-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Stale Pointer in Floats Rendering Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ASVG-DSTRCTR-UAF.html">HTTP:STC:CHROME:SVG-DSTRCTR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Svg Element Destructor Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ASVG-ELMNT-UAF.html">HTTP:STC:CHROME:SVG-ELMNT-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Blink buildShadowAndInstanceTree Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ATABLE-CSS-MC.html">HTTP:STC:CHROME:TABLE-CSS-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ATABLE-CSS-MC1.html">HTTP:STC:CHROME:TABLE-CSS-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ATEMPLTE-DOM-UAF.html">HTTP:STC:CHROME:TEMPLTE-DOM-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome Web Browser Template Element DOM based Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AV8-ARRAY-OOB.html">HTTP:STC:CHROME:V8-ARRAY-OOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome V8 Dehoistable Array Out Of Bound Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AV8-JS-OOB.html">HTTP:STC:CHROME:V8-JS-OOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome V8 JavaSript Engine Out Of Bound Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AWEBKIT-OO.html">HTTP:STC:CHROME:WEBKIT-OO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari and Google Chrome Webkit Object Outline Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHTSKDIC.html">HTTP:STC:CHTSKDIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLAMAV-UPX-DECODE-DOS.html">HTTP:STC:CLAMAV-UPX-DECODE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV UPX File Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AACER-OBJ.html">HTTP:STC:CLSID:ACTIVEX:ACER-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Acer LunchApp.APlunch ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AACROPDF.html">HTTP:STC:CLSID:ACTIVEX:ACROPDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe AcroPDF Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAOL-AX.html">HTTP:STC:CLSID:ACTIVEX:AOL-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL SB.SuperBuddy.1 ActiveX Control Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-01.html">HTTP:STC:CLSID:ACTIVEX:AX-01</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 01
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-02.html">HTTP:STC:CLSID:ACTIVEX:AX-02</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 02
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-05.html">HTTP:STC:CLSID:ACTIVEX:AX-05</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 05
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-06.html">HTTP:STC:CLSID:ACTIVEX:AX-06</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 06
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-07.html">HTTP:STC:CLSID:ACTIVEX:AX-07</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 07
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-08.html">HTTP:STC:CLSID:ACTIVEX:AX-08</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 08
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-09.html">HTTP:STC:CLSID:ACTIVEX:AX-09</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 09
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-10.html">HTTP:STC:CLSID:ACTIVEX:AX-10</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 10
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-100.html">HTTP:STC:CLSID:ACTIVEX:AX-100</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 100
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-101.html">HTTP:STC:CLSID:ACTIVEX:AX-101</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 101
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-102.html">HTTP:STC:CLSID:ACTIVEX:AX-102</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 102
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-103.html">HTTP:STC:CLSID:ACTIVEX:AX-103</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 103
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-104.html">HTTP:STC:CLSID:ACTIVEX:AX-104</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 104
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-105.html">HTTP:STC:CLSID:ACTIVEX:AX-105</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 105
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-106.html">HTTP:STC:CLSID:ACTIVEX:AX-106</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 106
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-107.html">HTTP:STC:CLSID:ACTIVEX:AX-107</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 107
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-108.html">HTTP:STC:CLSID:ACTIVEX:AX-108</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 108
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-109.html">HTTP:STC:CLSID:ACTIVEX:AX-109</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 109
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-11.html">HTTP:STC:CLSID:ACTIVEX:AX-11</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-110.html">HTTP:STC:CLSID:ACTIVEX:AX-110</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 110
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-111.html">HTTP:STC:CLSID:ACTIVEX:AX-111</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 111
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-112.html">HTTP:STC:CLSID:ACTIVEX:AX-112</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 112
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-113.html">HTTP:STC:CLSID:ACTIVEX:AX-113</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 113
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-114.html">HTTP:STC:CLSID:ACTIVEX:AX-114</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 114
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-115.html">HTTP:STC:CLSID:ACTIVEX:AX-115</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 115
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-116.html">HTTP:STC:CLSID:ACTIVEX:AX-116</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 116
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-117.html">HTTP:STC:CLSID:ACTIVEX:AX-117</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 117
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-118.html">HTTP:STC:CLSID:ACTIVEX:AX-118</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 118
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-119.html">HTTP:STC:CLSID:ACTIVEX:AX-119</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 119
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-12.html">HTTP:STC:CLSID:ACTIVEX:AX-12</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 12
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-120.html">HTTP:STC:CLSID:ACTIVEX:AX-120</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 120
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-121.html">HTTP:STC:CLSID:ACTIVEX:AX-121</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 121
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-122.html">HTTP:STC:CLSID:ACTIVEX:AX-122</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 122
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-123.html">HTTP:STC:CLSID:ACTIVEX:AX-123</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 123
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-124.html">HTTP:STC:CLSID:ACTIVEX:AX-124</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 124
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-125.html">HTTP:STC:CLSID:ACTIVEX:AX-125</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 125
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-126.html">HTTP:STC:CLSID:ACTIVEX:AX-126</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 126
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-127.html">HTTP:STC:CLSID:ACTIVEX:AX-127</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 127
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-128.html">HTTP:STC:CLSID:ACTIVEX:AX-128</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 128
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-129.html">HTTP:STC:CLSID:ACTIVEX:AX-129</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 129
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-13.html">HTTP:STC:CLSID:ACTIVEX:AX-13</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 13
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-130.html">HTTP:STC:CLSID:ACTIVEX:AX-130</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 130
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-131.html">HTTP:STC:CLSID:ACTIVEX:AX-131</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 131
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-132.html">HTTP:STC:CLSID:ACTIVEX:AX-132</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 132
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-133.html">HTTP:STC:CLSID:ACTIVEX:AX-133</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 133
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-134.html">HTTP:STC:CLSID:ACTIVEX:AX-134</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 134
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-135.html">HTTP:STC:CLSID:ACTIVEX:AX-135</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 135
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-136.html">HTTP:STC:CLSID:ACTIVEX:AX-136</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 136
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-137.html">HTTP:STC:CLSID:ACTIVEX:AX-137</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 137
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-138.html">HTTP:STC:CLSID:ACTIVEX:AX-138</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 138
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-139.html">HTTP:STC:CLSID:ACTIVEX:AX-139</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 139
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-14.html">HTTP:STC:CLSID:ACTIVEX:AX-14</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 14
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-140.html">HTTP:STC:CLSID:ACTIVEX:AX-140</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 140
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-141.html">HTTP:STC:CLSID:ACTIVEX:AX-141</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 141
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-142.html">HTTP:STC:CLSID:ACTIVEX:AX-142</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 142
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-143.html">HTTP:STC:CLSID:ACTIVEX:AX-143</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 143
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-144.html">HTTP:STC:CLSID:ACTIVEX:AX-144</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 144
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-145.html">HTTP:STC:CLSID:ACTIVEX:AX-145</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 145
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-146.html">HTTP:STC:CLSID:ACTIVEX:AX-146</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 146
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-147.html">HTTP:STC:CLSID:ACTIVEX:AX-147</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 147
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-149.html">HTTP:STC:CLSID:ACTIVEX:AX-149</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 149
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-15.html">HTTP:STC:CLSID:ACTIVEX:AX-15</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 15
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-151.html">HTTP:STC:CLSID:ACTIVEX:AX-151</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 151
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-153.html">HTTP:STC:CLSID:ACTIVEX:AX-153</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 153
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-16.html">HTTP:STC:CLSID:ACTIVEX:AX-16</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 16
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-17.html">HTTP:STC:CLSID:ACTIVEX:AX-17</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 17
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-18.html">HTTP:STC:CLSID:ACTIVEX:AX-18</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 18
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-19.html">HTTP:STC:CLSID:ACTIVEX:AX-19</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 19
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-20.html">HTTP:STC:CLSID:ACTIVEX:AX-20</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 20
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-21.html">HTTP:STC:CLSID:ACTIVEX:AX-21</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 21
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-22.html">HTTP:STC:CLSID:ACTIVEX:AX-22</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 22
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-23.html">HTTP:STC:CLSID:ACTIVEX:AX-23</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 23
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-24.html">HTTP:STC:CLSID:ACTIVEX:AX-24</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 24
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-25.html">HTTP:STC:CLSID:ACTIVEX:AX-25</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 25
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-26.html">HTTP:STC:CLSID:ACTIVEX:AX-26</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 26
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-27.html">HTTP:STC:CLSID:ACTIVEX:AX-27</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 27
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-28.html">HTTP:STC:CLSID:ACTIVEX:AX-28</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 28
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-29.html">HTTP:STC:CLSID:ACTIVEX:AX-29</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 29
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-30.html">HTTP:STC:CLSID:ACTIVEX:AX-30</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 30
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-31.html">HTTP:STC:CLSID:ACTIVEX:AX-31</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 31
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-32.html">HTTP:STC:CLSID:ACTIVEX:AX-32</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-33.html">HTTP:STC:CLSID:ACTIVEX:AX-33</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 33
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-34.html">HTTP:STC:CLSID:ACTIVEX:AX-34</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 34
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-35.html">HTTP:STC:CLSID:ACTIVEX:AX-35</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 35
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-36.html">HTTP:STC:CLSID:ACTIVEX:AX-36</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 36
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-37.html">HTTP:STC:CLSID:ACTIVEX:AX-37</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 37
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-38.html">HTTP:STC:CLSID:ACTIVEX:AX-38</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 38
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-39.html">HTTP:STC:CLSID:ACTIVEX:AX-39</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 39
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-40.html">HTTP:STC:CLSID:ACTIVEX:AX-40</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 40
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-41.html">HTTP:STC:CLSID:ACTIVEX:AX-41</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 41
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-42.html">HTTP:STC:CLSID:ACTIVEX:AX-42</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 42
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-43.html">HTTP:STC:CLSID:ACTIVEX:AX-43</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 43
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-44.html">HTTP:STC:CLSID:ACTIVEX:AX-44</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 44
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-45.html">HTTP:STC:CLSID:ACTIVEX:AX-45</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 45
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-46.html">HTTP:STC:CLSID:ACTIVEX:AX-46</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 46
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-47.html">HTTP:STC:CLSID:ACTIVEX:AX-47</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 47
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-48.html">HTTP:STC:CLSID:ACTIVEX:AX-48</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 48
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-49.html">HTTP:STC:CLSID:ACTIVEX:AX-49</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 49
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-50.html">HTTP:STC:CLSID:ACTIVEX:AX-50</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 50
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-51.html">HTTP:STC:CLSID:ACTIVEX:AX-51</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 51
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-52.html">HTTP:STC:CLSID:ACTIVEX:AX-52</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 52
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-53.html">HTTP:STC:CLSID:ACTIVEX:AX-53</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 53
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-54.html">HTTP:STC:CLSID:ACTIVEX:AX-54</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 54
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-55.html">HTTP:STC:CLSID:ACTIVEX:AX-55</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 55
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-56.html">HTTP:STC:CLSID:ACTIVEX:AX-56</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 56
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-57.html">HTTP:STC:CLSID:ACTIVEX:AX-57</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 57
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-58.html">HTTP:STC:CLSID:ACTIVEX:AX-58</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 58
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-59.html">HTTP:STC:CLSID:ACTIVEX:AX-59</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 59
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-60.html">HTTP:STC:CLSID:ACTIVEX:AX-60</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 60
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-61.html">HTTP:STC:CLSID:ACTIVEX:AX-61</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 61
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-62.html">HTTP:STC:CLSID:ACTIVEX:AX-62</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 62
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-63.html">HTTP:STC:CLSID:ACTIVEX:AX-63</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 63
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-64.html">HTTP:STC:CLSID:ACTIVEX:AX-64</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 64
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-65.html">HTTP:STC:CLSID:ACTIVEX:AX-65</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 65
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-66.html">HTTP:STC:CLSID:ACTIVEX:AX-66</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 66
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-67.html">HTTP:STC:CLSID:ACTIVEX:AX-67</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 67
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-68.html">HTTP:STC:CLSID:ACTIVEX:AX-68</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 68
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-69.html">HTTP:STC:CLSID:ACTIVEX:AX-69</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 69
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-70.html">HTTP:STC:CLSID:ACTIVEX:AX-70</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 70
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-71.html">HTTP:STC:CLSID:ACTIVEX:AX-71</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 71
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-72.html">HTTP:STC:CLSID:ACTIVEX:AX-72</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 72
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-73.html">HTTP:STC:CLSID:ACTIVEX:AX-73</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 73
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-74.html">HTTP:STC:CLSID:ACTIVEX:AX-74</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 74
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-75.html">HTTP:STC:CLSID:ACTIVEX:AX-75</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 75
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-76.html">HTTP:STC:CLSID:ACTIVEX:AX-76</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 76
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-77.html">HTTP:STC:CLSID:ACTIVEX:AX-77</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 77
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-78.html">HTTP:STC:CLSID:ACTIVEX:AX-78</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 78
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-79.html">HTTP:STC:CLSID:ACTIVEX:AX-79</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 79
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-80.html">HTTP:STC:CLSID:ACTIVEX:AX-80</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 80
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-82.html">HTTP:STC:CLSID:ACTIVEX:AX-82</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 82
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-83.html">HTTP:STC:CLSID:ACTIVEX:AX-83</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 83
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-84.html">HTTP:STC:CLSID:ACTIVEX:AX-84</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 84
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-85.html">HTTP:STC:CLSID:ACTIVEX:AX-85</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 85
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-86.html">HTTP:STC:CLSID:ACTIVEX:AX-86</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 86
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-87.html">HTTP:STC:CLSID:ACTIVEX:AX-87</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 87
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-88.html">HTTP:STC:CLSID:ACTIVEX:AX-88</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 88
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-89.html">HTTP:STC:CLSID:ACTIVEX:AX-89</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 89
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-90.html">HTTP:STC:CLSID:ACTIVEX:AX-90</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 90
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-91.html">HTTP:STC:CLSID:ACTIVEX:AX-91</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 91
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-92.html">HTTP:STC:CLSID:ACTIVEX:AX-92</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 92
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-93.html">HTTP:STC:CLSID:ACTIVEX:AX-93</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 93
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-94.html">HTTP:STC:CLSID:ACTIVEX:AX-94</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 94
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-97.html">HTTP:STC:CLSID:ACTIVEX:AX-97</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 97
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-98.html">HTTP:STC:CLSID:ACTIVEX:AX-98</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 98
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AAX-99.html">HTTP:STC:CLSID:ACTIVEX:AX-99</a></b></td>
   <td width="500" valign="top">
    HTTP: Dangerous ClassID in ActiveX Object Type 99
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ABB-PURE.html">HTTP:STC:CLSID:ACTIVEX:BB-PURE</a></b></td>
   <td width="500" valign="top">
    HTTP: Canvas Babybottle Pure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ACREATEOB.html">HTTP:STC:CLSID:ACTIVEX:CREATEOB</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CreateObject ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ACTX-ICA.html">HTTP:STC:CLSID:ACTIVEX:CTX-ICA</a></b></td>
   <td width="500" valign="top">
    HTTP: Citrix Presentation Server Client ActiveX Control Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ADLMGR.html">HTTP:STC:CLSID:ACTIVEX:DLMGR</a></b></td>
   <td width="500" valign="top">
    HTTP: Akamai Download Manager ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ADXSDK.html">HTTP:STC:CLSID:ACTIVEX:DXSDK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX Media SDK ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ADXTLIPI.html">HTTP:STC:CLSID:ACTIVEX:DXTLIPI</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX Media SDK DXTLIPI.DLL Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AEPO-SM.html">HTTP:STC:CLSID:ACTIVEX:EPO-SM</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee ePolicy Orchestrator SiteManager Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AEXECHAND.html">HTTP:STC:CLSID:ACTIVEX:EXECHAND</a></b></td>
   <td width="500" valign="top">
    HTTP: ActiveX Exception Handling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AFPOLE.html">HTTP:STC:CLSID:ACTIVEX:FPOLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual FoxPro ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AHP-AX.html">HTTP:STC:CLSID:ACTIVEX:HP-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Instant Support ActiveX Control Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AHP-MODEM.html">HTTP:STC:CLSID:ACTIVEX:HP-MODEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Hewlett-Packard Modemutil.dll ActiveX Method Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AHRTBEAT.html">HTTP:STC:CLSID:ACTIVEX:HRTBEAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MSN HRTBEAT.OCX ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AHTML-HLP.html">HTTP:STC:CLSID:ACTIVEX:HTML-HLP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AHTML-HP2.html">HTTP:STC:CLSID:ACTIVEX:HTML-HP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help ActiveX Exploit (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AINC-AX.html">HTTP:STC:CLSID:ACTIVEX:INC-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: IncrediMail IMMenuShellExt ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AINOTES6W.html">HTTP:STC:CLSID:ACTIVEX:INOTES6W</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Domino Web Access Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AINTUIT.html">HTTP:STC:CLSID:ACTIVEX:INTUIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Intuit ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AJINIT-AX.html">HTTP:STC:CLSID:ACTIVEX:JINIT-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle JInitiator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ALEN-AX.html">HTTP:STC:CLSID:ACTIVEX:LEN-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Lenovo RunSolution ActiveX Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ALENOVO.html">HTTP:STC:CLSID:ACTIVEX:LENOVO</a></b></td>
   <td width="500" valign="top">
    HTTP: Lenovo ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMACRO-A1.html">HTTP:STC:CLSID:ACTIVEX:MACRO-A1</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMACRO-A2.html">HTTP:STC:CLSID:ACTIVEX:MACRO-A2</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMACRO-A3.html">HTTP:STC:CLSID:ACTIVEX:MACRO-A3</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMACRO-A4.html">HTTP:STC:CLSID:ACTIVEX:MACRO-A4</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMACRO-AX.html">HTTP:STC:CLSID:ACTIVEX:MACRO-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMAGVIEW.html">HTTP:STC:CLSID:ACTIVEX:MAGVIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Magview ActiveX Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMCAFEE.html">HTTP:STC:CLSID:ACTIVEX:MCAFEE</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Manager CLSID Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMDSAUTH.html">HTTP:STC:CLSID:ACTIVEX:MDSAUTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Server ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AMOTIVE.html">HTTP:STC:CLSID:ACTIVEX:MOTIVE</a></b></td>
   <td width="500" valign="top">
    HTTP: Motive ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ANAVOPTS.html">HTTP:STC:CLSID:ACTIVEX:NAVOPTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec NAVOPTS.DLL ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ANCT-AX.html">HTTP:STC:CLSID:ACTIVEX:NCT-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: NCTAudioFile2 ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ANESSCAN.html">HTTP:STC:CLSID:ACTIVEX:NESSCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Nessus Vulnerability Scanner 3.0.6 ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ANESSCAN1.html">HTTP:STC:CLSID:ACTIVEX:NESSCAN1</a></b></td>
   <td width="500" valign="top">
    HTTP: Nessus Vulnerability Scanner 3.0.6 ActiveX Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AORADC.html">HTTP:STC:CLSID:ACTIVEX:ORADC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Control ORADC ActiveX Control Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AORADC2.html">HTTP:STC:CLSID:ACTIVEX:ORADC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Data Control ORADC ActiveX Control Code Execution (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AOSCAN8.html">HTTP:STC:CLSID:ACTIVEX:OSCAN8</a></b></td>
   <td width="500" valign="top">
    HTTP: BitDefender Online Scanner ActiveX Control Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AOUACTR.html">HTTP:STC:CLSID:ACTIVEX:OUACTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office 2000 OUACTR ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3APAVPZ.html">HTTP:STC:CLSID:ACTIVEX:PAVPZ</a></b></td>
   <td width="500" valign="top">
    HTTP: Panda ActiveScan (PAVPZ.dll) Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ARFCGUI.html">HTTP:STC:CLSID:ACTIVEX:RFCGUI</a></b></td>
   <td width="500" valign="top">
    HTTP: EnjoySAP RFCGUISink.DLL ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASAP-AX.html">HTTP:STC:CLSID:ACTIVEX:SAP-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP EnjoySAP KWEdit.DLL ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASHELLAPP.html">HTTP:STC:CLSID:ACTIVEX:SHELLAPP</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL Instant Messenger Shell.Application ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASONICAX.html">HTTP:STC:CLSID:ACTIVEX:SONICAX</a></b></td>
   <td width="500" valign="top">
    HTTP: SonicWALL SSL VPN Client Remote ActiveX Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASONY-XCP.html">HTTP:STC:CLSID:ACTIVEX:SONY-XCP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sony XCP DRM Uninstaller CLSID Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASWCTL.html">HTTP:STC:CLSID:ACTIVEX:SWCTL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave SWCtl.SWCtl ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASYM-FWAX.html">HTTP:STC:CLSID:ACTIVEX:SYM-FWAX</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Norton Personal Firewall 2004 ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ASYM-SS.html">HTTP:STC:CLSID:ACTIVEX:SYM-SS</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Products SupportSoft Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ATREND-AX.html">HTTP:STC:CLSID:ACTIVEX:TREND-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AVANTAGEX.html">HTTP:STC:CLSID:ACTIVEX:VANTAGEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Vantage ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AVBTOVSI.html">HTTP:STC:CLSID:ACTIVEX:VBTOVSI</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio VBTOVSI.DLL ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AVERI-AX.html">HTTP:STC:CLSID:ACTIVEX:VERI-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: VeriSign ConfigChk ActiveX Control Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AVML-AX.html">HTTP:STC:CLSID:ACTIVEX:VML-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: VMLRender ActiveX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AVMWARE.html">HTTP:STC:CLSID:ACTIVEX:VMWARE</a></b></td>
   <td width="500" valign="top">
    HTTP: VMWare ActiveX Control Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AWH32-OF.html">HTTP:STC:CLSID:ACTIVEX:WH32-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: WinHelp32.exe Remote Buffer Overrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AWSH.html">HTTP:STC:CLSID:ACTIVEX:WSH</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Windows Scripting Host Object Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AXMLCORE.html">HTTP:STC:CLSID:ACTIVEX:XMLCORE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services Dangerous CLSID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AYAHOO-IM.html">HTTP:STC:CLSID:ACTIVEX:YAHOO-IM</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo! Messenger Webcam ActiveX Control Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3AYVERINFO.html">HTTP:STC:CLSID:ACTIVEX:YVERINFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Messenger YVerInfo.DLL ActiveX Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACOREL-WP-BOF.html">HTTP:STC:COREL-WP-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Corel WordPerfect Document Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACPTEXIMG2D-IO.html">HTTP:STC:CPTEXIMG2D-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CopyTexImage2D Integer Overflow.
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACSS-RELOADED.html">HTTP:STC:CSS-RELOADED</a></b></td>
   <td width="500" valign="top">
    HTTP: CSS Reloading Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACSS-STATUS-BAR-SPOOF.html">HTTP:STC:CSS-STATUS-BAR-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browsers CSS Status Bar Spoof
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACSS-STATUS-BAR-SPOOF1.html">HTTP:STC:CSS-STATUS-BAR-SPOOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browsers CSS Status Bar Spoof1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACURL-COOKIE-PATH-RCE.html">HTTP:STC:CURL-COOKIE-PATH-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Curl Cookie Path Element Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0058-PRIV.html">HTTP:STC:CVE-2015-0058-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0058 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0062-PRIV.html">HTTP:STC:CVE-2015-0062-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0062 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0076-INF-DSC.html">HTTP:STC:CVE-2015-0076-INF-DSC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0076 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1677-ID.html">HTTP:STC:CVE-2015-1677-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1677 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1699-RCE.html">HTTP:STC:CVE-2015-1699-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1699 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1722-KERNL-PE.html">HTTP:STC:CVE-2015-1722-KERNL-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1722 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1723-CE.html">HTTP:STC:CVE-2015-1723-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-1723 Server Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1724-BO.html">HTTP:STC:CVE-2015-1724-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1724 Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1727-RCE.html">HTTP:STC:CVE-2015-1727-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windowds CVE-2015-1727 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1768-PE.html">HTTP:STC:CVE-2015-1768-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1768 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2484-FD.html">HTTP:STC:CVE-2015-2484-FD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-2484 Remote File Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2507-CE.html">HTTP:STC:CVE-2015-2507-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2507 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2513-RCE.html">HTTP:STC:CVE-2015-2513-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-2513 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2524-PE.html">HTTP:STC:CVE-2015-2524-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2524 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2528-PE.html">HTTP:STC:CVE-2015-2528-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2528 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2545-UAF.html">HTTP:STC:CVE-2015-2545-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2545 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2554-PE.html">HTTP:STC:CVE-2015-2554-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2554 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6049-CE.html">HTTP:STC:CVE-2015-6049-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6049 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6066-UAF.html">HTTP:STC:CVE-2015-6066-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6066 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6088-RCE.html">HTTP:STC:CVE-2015-6088-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6088 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6097-RCE.html">HTTP:STC:CVE-2015-6097-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6097 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6103-RCE.html">HTTP:STC:CVE-2015-6103-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6103 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6130-CE.html">HTTP:STC:CVE-2015-6130-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-6130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6135-CE.html">HTTP:STC:CVE-2015-6135-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6135 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6140-CE.html">HTTP:STC:CVE-2015-6140-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6140 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6143-CE.html">HTTP:STC:CVE-2015-6143-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6143 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6160-CE.html">HTTP:STC:CVE-2015-6160-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6160 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6164-CSS.html">HTTP:STC:CVE-2015-6164-CSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6164 Cross-site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6168-RCE.html">HTTP:STC:CVE-2015-6168-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6168 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6171-PE.html">HTTP:STC:CVE-2015-6171-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6152 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6174-PE.html">HTTP:STC:CVE-2015-6174-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-6174 Kernel Mode Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6175-PE.html">HTTP:STC:CVE-2015-6175-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-6175 Kernel Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0003-RCE.html">HTTP:STC:CVE-2016-0003-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2016-0003 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0012-MC.html">HTTP:STC:CVE-2016-0012-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0012 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0024-RCE.html">HTTP:STC:CVE-2016-0024-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2016-0021 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADATA-SCHEME.html">HTTP:STC:DATA-SCHEME</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML &quot;data:&quot; URL Scheme
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADAVREDIR.html">HTTP:STC:DAVREDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: WebDav Mini-Redirector Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADESKTOP-INI-CODE-EXE.html">HTTP:STC:DESKTOP-INI-CODE-EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Desktop.ini Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADIRECT-AVI-WAV-PARSE-1.html">HTTP:STC:DIRECT-AVI-WAV-PARSE-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX WAV and AVI File Parsing Code Execution (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADIRECTSHOW-AVI-EXEC.html">HTTP:STC:DIRECTSHOW-AVI-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DirectShow AVI File Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADIRECTSHOW-AVI-EXEC1.html">HTTP:STC:DIRECTSHOW-AVI-EXEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DirectShow AVI File Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADIRECTX-AVI-WAV-PARSE.html">HTTP:STC:DIRECTX-AVI-WAV-PARSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX WAV and AVI File Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3A4XM-VULNS.html">HTTP:STC:DL:4XM-VULNS</a></b></td>
   <td width="500" valign="top">
    HTTP: FFmpeg 4xm Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AA-PDF-RCE.html">HTTP:STC:DL:A-PDF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Brothersoft A-PDF WAV to MP3 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACCESS-MEM-CORR.html">HTTP:STC:DL:ACCESS-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Access Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACDSEE-XBM-WIDTH.html">HTTP:STC:DL:ACDSEE-XBM-WIDTH</a></b></td>
   <td width="500" valign="top">
    HTTP: ACD Systems ACDSee Products XBM File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACDSEE-XPM-COLOR.html">HTTP:STC:DL:ACDSEE-XPM-COLOR</a></b></td>
   <td width="500" valign="top">
    HTTP: ACD Systems ACDSee Products XPM File Colors Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACDSEE-XPM-VALUES.html">HTTP:STC:DL:ACDSEE-XPM-VALUES</a></b></td>
   <td width="500" valign="top">
    HTTP: ACD Systems ACDSee Products XPM Values Section Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACE-BO.html">HTTP:STC:DL:ACE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Avast! Antivirus ACE File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AACE-BO1.html">HTTP:STC:DL:ACE-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Avast! Antivirus ACE File Handling Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAOL-DESKTOP-RTX-BOF.html">HTTP:STC:DL:AOL-DESKTOP-RTX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL Desktop .rtx File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAOL-RTX.html">HTTP:STC:DL:AOL-RTX</a></b></td>
   <td width="500" valign="top">
    HTTP: AOL Crafted RTX File Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-DMG-VOLNAME.html">HTTP:STC:DL:APPLE-DMG-VOLNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Computer Finder DMG Volume Name Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-ITUNES-BOF.html">HTTP:STC:DL:APPLE-ITUNES-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple iTunes M3U File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-ITUNES-IO.html">HTTP:STC:DL:APPLE-ITUNES-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple iTunes AAC File Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-PICT.html">HTTP:STC:DL:APPLE-PICT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickDraw PICT Images ARGB Records Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-PLS-FILE-BOF.html">HTTP:STC:DL:APPLE-PLS-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple iTunes PLS File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-FLIC-BO.html">HTTP:STC:DL:APPLE-QT-FLIC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime FLIC Animation File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-FTAB-ATOM.html">HTTP:STC:DL:APPLE-QT-FTAB-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime ftab Atom Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-H264-BOF.html">HTTP:STC:DL:APPLE-QT-H264-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime H.264 Crafted Movie Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-H264-BOF1.html">HTTP:STC:DL:APPLE-QT-H264-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime H.264 Crafted Movie Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-H264-OF.html">HTTP:STC:DL:APPLE-QT-H264-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime H.264 Movie File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-IMAGE-MC.html">HTTP:STC:DL:APPLE-QT-IMAGE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Image Description Atom Sign Extension Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-JPEG-2000.html">HTTP:STC:DL:APPLE-QT-JPEG-2000</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime JPEG 2000 COD Length Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-JPEG-OF.html">HTTP:STC:DL:APPLE-QT-JPEG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime JPEG Atom Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-JPEG-OF3.html">HTTP:STC:DL:APPLE-QT-JPEG-OF3</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime JPEG Atom Buffer Overflow 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-MJPEG-OF.html">HTTP:STC:DL:APPLE-QT-MJPEG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Quicktime MJPEG Frame stsd Atom Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-MOV-DOS.html">HTTP:STC:DL:APPLE-QT-MOV-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Player MOV File Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-MOV-DOS1.html">HTTP:STC:DL:APPLE-QT-MOV-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Player MOV File Handling Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-OBJI.html">HTTP:STC:DL:APPLE-QT-OBJI</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Obji Atom Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-QTIF-DOS.html">HTTP:STC:DL:APPLE-QT-QTIF-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime &#39;.qtif&#39; File Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-RNET-OF.html">HTTP:STC:DL:APPLE-QT-RNET-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime rnet Box Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-TARGA-BO.html">HTTP:STC:DL:APPLE-QT-TARGA-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Targa File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-TEXML.html">HTTP:STC:DL:APPLE-QT-TEXML</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime TeXML Style Element Text Specification Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLE-QT-VR-TRCK-OF.html">HTTP:STC:DL:APPLE-QT-VR-TRCK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime VR Track Header Atom Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLEQT-MP4-CE.html">HTTP:STC:DL:APPLEQT-MP4-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MP4 Absent stbl Box Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AARJ-BO.html">HTTP:STC:DL:ARJ-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: NOD32 AntiVirus ARJ Archive Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AASF-DF.html">HTTP:STC:DL:ASF-DF</a></b></td>
   <td width="500" valign="top">
    HTTP: ASF Header Parsing Invalid Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AASF-SR.html">HTTP:STC:DL:ASF-SR</a></b></td>
   <td width="500" valign="top">
    HTTP: ASF Sample Rate Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AASTONSOFT-DBR-BO.html">HTTP:STC:DL:ASTONSOFT-DBR-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: AstonSoft DeepBurner DBR Compilation Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAV-CAB-HEADER.html">HTTP:STC:DL:AV-CAB-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: CA Multiple Product AV Engine CAB Header Parsing Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVAST-LHA.html">HTTP:STC:DL:AVAST-LHA</a></b></td>
   <td width="500" valign="top">
    HTTP: Avast! Antivirus LHA Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVAST-LHA1.html">HTTP:STC:DL:AVAST-LHA1</a></b></td>
   <td width="500" valign="top">
    HTTP: Avast! Antivirus LHA Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVI-DL-MEM.html">HTTP:STC:DL:AVI-DL-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: AVI File Header Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVI-LIST-OF.html">HTTP:STC:DL:AVI-LIST-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows AVI File List Length Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVI-LIST-OF1.html">HTTP:STC:DL:AVI-LIST-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows AVI File List Length Integer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVI-MMAKER.html">HTTP:STC:DL:AVI-MMAKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Movie Maker &#39;.avi&#39; File Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVI-MMAKER1.html">HTTP:STC:DL:AVI-MMAKER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Movie Maker &#39;.avi&#39; File Remote Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAVISOFT-DTV-PLF-BO.html">HTTP:STC:DL:AVISOFT-DTV-PLF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Aviosoft Digital TV Player PLF File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ABITDEFEND-SCRIPT.html">HTTP:STC:DL:BITDEFEND-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: BitDefender Internet Security Script Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ABZIP2-FILE.html">HTTP:STC:DL:BZIP2-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: BZIP2 Compressed File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACAB-VULNS.html">HTTP:STC:DL:CAB-VULNS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cab File Multiple Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACAB-VULNS1.html">HTTP:STC:DL:CAB-VULNS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Cab File Multiple Vulnerabilities1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACCMPLAYER-M3U-OF.html">HTTP:STC:DL:CCMPLAYER-M3U-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: CCMPlayer m3u File Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACGM-IMG-BOF.html">HTTP:STC:DL:CGM-IMG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CGM Image Converter Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACISCO-FORMAT-PLY-MC.html">HTTP:STC:DL:CISCO-FORMAT-PLY-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Recording Format Player atas32.dll Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACISCO-WEBEX-ATDL.html">HTTP:STC:DL:CISCO-WEBEX-ATDL</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Player ATDL2006.dll Heap Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-CHM-DOS.html">HTTP:STC:DL:CLAMAV-CHM-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV AntiVirus CHM File Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-INT.html">HTTP:STC:DL:CLAMAV-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV CHM File Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-JPEG-DOS.html">HTTP:STC:DL:CLAMAV-JPEG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV AntiVirus cli_check_jpeg_exploit Function Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-MEW-PACKED.html">HTTP:STC:DL:CLAMAV-MEW-PACKED</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV libclamav MEW PE File Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-PE-INT.html">HTTP:STC:DL:CLAMAV-PE-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV libclamav PE File Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-UPX-BO.html">HTTP:STC:DL:CLAMAV-UPX-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV UPX File Handling Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACLAMAV-UPX-FILE-MC.html">HTTP:STC:DL:CLAMAV-UPX-FILE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: ClamAV UPX File PE parsing Memory Access Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACOLORMGMT-PATHNAME.html">HTTP:STC:DL:COLORMGMT-PATHNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Color Management System Crafted Path Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACOM-CLSID-DLL.html">HTTP:STC:DL:COM-CLSID-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACOOLPDF-READER-BO.html">HTTP:STC:DL:COOLPDF-READER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: CoolPDF Reader Image Stream Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACOOLPLAYER-PLAYLIST.html">HTTP:STC:DL:COOLPLAYER-PLAYLIST</a></b></td>
   <td width="500" valign="top">
    HTTP: CoolPlayer Playlist File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACRYSTAL-RPT-OLE.html">HTTP:STC:DL:CRYSTAL-RPT-OLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio Crystal Reports RPT File Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACSOUND-GETNUM-BOF.html">HTTP:STC:DL:CSOUND-GETNUM-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Csound getnum Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2011-1985-CE.html">HTTP:STC:DL:CVE-2011-1985-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows win32k.sys kernel mode null pointer dereference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2013-3893-DROP.html">HTTP:STC:DL:CVE-2013-3893-DROP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3893 Malicious Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-1776-SHELL.html">HTTP:STC:DL:CVE-2014-1776-SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1776 Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6333-MC.html">HTTP:STC:DL:CVE-2014-6333-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2014-6333 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6335-RCE.html">HTTP:STC:DL:CVE-2014-6335-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2014-6335 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6357-RCE.html">HTTP:STC:DL:CVE-2014-6357-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6357 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6360-RCE.html">HTTP:STC:DL:CVE-2014-6360-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2014-6360 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6361-RCE.html">HTTP:STC:DL:CVE-2014-6361-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2014-6361 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6364-RCE.html">HTTP:STC:DL:CVE-2014-6364-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6364 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0003-PRIV.html">HTTP:STC:DL:CVE-2015-0003-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0003 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0054-PRIV.html">HTTP:STC:DL:CVE-2015-0054-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0054 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0063-RCE.html">HTTP:STC:DL:CVE-2015-0063-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Excel CVE-2015-0063 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0064-RCE.html">HTTP:STC:DL:CVE-2015-0064-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Word CVE-2015-0064 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0065-RCE.html">HTTP:STC:DL:CVE-2015-0065-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Word CVE-2015-0065 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0078-PRIV.html">HTTP:STC:DL:CVE-2015-0078-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0078 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0080-ID.html">HTTP:STC:DL:CVE-2015-0080-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0080 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0084-SB.html">HTTP:STC:DL:CVE-2015-0084-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0084 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0085-RCE.html">HTTP:STC:DL:CVE-2015-0085-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word  CVE-2015-0085 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0086-RCE.html">HTTP:STC:DL:CVE-2015-0086-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-0086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0094-ID.html">HTTP:STC:DL:CVE-2015-0094-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsfot Windows CVE-2015-0094 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0332-CE.html">HTTP:STC:DL:CVE-2015-0332-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1642-RCE.html">HTTP:STC:DL:CVE-2015-1642-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-1642 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1644-PRIV.html">HTTP:STC:DL:CVE-2015-1644-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1644 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1649-RCE.html">HTTP:STC:DL:CVE-2015-1649-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office RTF File CVE-2015-1649 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1650-RCE.html">HTTP:STC:DL:CVE-2015-1650-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-1650 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1651-RCE.html">HTTP:STC:DL:CVE-2015-1651-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office RTF File CVE-2015-1651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1671-RCE.html">HTTP:STC:DL:CVE-2015-1671-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Component CVE-2015-1671 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1673-PE.html">HTTP:STC:DL:CVE-2015-1673-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft CCalendar CVE-2015-1673 Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1674-SB.html">HTTP:STC:DL:CVE-2015-1674-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1674 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1675-RCE.html">HTTP:STC:DL:CVE-2015-1675-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1675 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1676-ID.html">HTTP:STC:DL:CVE-2015-1676-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1676 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1678-ID.html">HTTP:STC:DL:CVE-2015-1678-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1678 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1681-DOS.html">HTTP:STC:DL:CVE-2015-1681-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Explorer MSC File Parsing CVE-2015-1681 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1682-RCE.html">HTTP:STC:DL:CVE-2015-1682-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Office CVE-2015-1682 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1683-UAF.html">HTTP:STC:DL:CVE-2015-1683-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office File Modification Password Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1695-RCE.html">HTTP:STC:DL:CVE-2015-1695-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1695 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1698-RCE.html">HTTP:STC:DL:CVE-2015-1698-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1698 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1719-PRIV.html">HTTP:STC:DL:CVE-2015-1719-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1719 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1721-PRIV.html">HTTP:STC:DL:CVE-2015-1721-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Window CVE-2015-1721 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1725-PRIV.html">HTTP:STC:DL:CVE-2015-1725-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1725 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1726-CE.html">HTTP:STC:DL:CVE-2015-1726-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1726 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1728-CE.html">HTTP:STC:DL:CVE-2015-1728-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player CVE-2015-1728 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1739-CE.html">HTTP:STC:DL:CVE-2015-1739-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1739 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1743-RCE.html">HTTP:STC:DL:CVE-2015-1743-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1743 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1759-RCE.html">HTTP:STC:DL:CVE-2015-1759-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-1759 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1770-CE.html">HTTP:STC:DL:CVE-2015-1770-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2015-1770 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2360-PRIV.html">HTTP:STC:DL:CVE-2015-2360-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2360 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2365-PRIV.html">HTTP:STC:DL:CVE-2015-2365-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2365 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2366-PE.html">HTTP:STC:DL:CVE-2015-2366-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kernel CVE-2015-2366 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2367-SB.html">HTTP:STC:DL:CVE-2015-2367-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft CVE-2015-2367 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2370-PRIV.html">HTTP:STC:DL:CVE-2015-2370-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2370 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2376-CE.html">HTTP:STC:DL:CVE-2015-2376-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2376 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2377-UAF.html">HTTP:STC:DL:CVE-2015-2377-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2377 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2378-CE.html">HTTP:STC:DL:CVE-2015-2378-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Viewer CVE-2015-2378 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2387-CE.html">HTTP:STC:DL:CVE-2015-2387-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2387 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2415-RCE.html">HTTP:STC:DL:CVE-2015-2415-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2415 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2426-BOF.html">HTTP:STC:DL:CVE-2015-2426-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2426 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2429-CE.html">HTTP:STC:DL:CVE-2015-2429-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2429 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2431-CE.html">HTTP:STC:DL:CVE-2015-2431-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2431 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2432-RCE.html">HTTP:STC:DL:CVE-2015-2432-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OpenType Fonts CVE-2015-2432 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2455-CE.html">HTTP:STC:DL:CVE-2015-2455-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2455 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2456-CE.html">HTTP:STC:DL:CVE-2015-2456-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2456 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2458-CE.html">HTTP:STC:DL:CVE-2015-2458-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2458 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2459-CE.html">HTTP:STC:DL:CVE-2015-2459-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2459 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2461-CE.html">HTTP:STC:DL:CVE-2015-2461-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2461 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2463-RCE.html">HTTP:STC:DL:CVE-2015-2463-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2015-2463)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2464-RCE.html">HTTP:STC:DL:CVE-2015-2464-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2464 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2467-CE.html">HTTP:STC:DL:CVE-2015-2467-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2467 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2469-CE.html">HTTP:STC:DL:CVE-2015-2469-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2469 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2470-BO.html">HTTP:STC:DL:CVE-2015-2470-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2470 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2477-CE.html">HTTP:STC:DL:CVE-2015-2477-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2477 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2478-PE.html">HTTP:STC:DL:CVE-2015-2478-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2478 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2510-RCE.html">HTTP:STC:DL:CVE-2015-2510-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2510 Remote code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2520-RCE.html">HTTP:STC:DL:CVE-2015-2520-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2520 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2521-RCE.html">HTTP:STC:DL:CVE-2015-2521-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2521 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2523-RCE.html">HTTP:STC:DL:CVE-2015-2523-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2523 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2525-PRIV.html">HTTP:STC:DL:CVE-2015-2525-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Task Scheduler CVE-2015-2525 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2546-UAF.html">HTTP:STC:DL:CVE-2015-2546-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2546 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2550-PRIV.html">HTTP:STC:DL:CVE-2015-2550-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2550 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2555-CE.html">HTTP:STC:DL:CVE-2015-2555-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-2555 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2557-RCE.html">HTTP:STC:DL:CVE-2015-2557-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2557 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-3048-RCE.html">HTTP:STC:DL:CVE-2015-3048-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-3083-CE.html">HTTP:STC:DL:CVE-2015-3083-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Broker CVE-2015-3083 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6038-RCE.html">HTTP:STC:DL:CVE-2015-6038-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6038 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6040-RCE.html">HTTP:STC:DL:CVE-2015-6040-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6040 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6091-RCE.html">HTTP:STC:DL:CVE-2015-6091-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6092-RCE.html">HTTP:STC:DL:CVE-2015-6092-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6093-RCE.html">HTTP:STC:DL:CVE-2015-6093-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6094-RCE.html">HTTP:STC:DL:CVE-2015-6094-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6094 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6096-CE.html">HTTP:STC:DL:CVE-2015-6096-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6096 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6098-BO.html">HTTP:STC:DL:CVE-2015-6098-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6098 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6100-RCE.html">HTTP:STC:DL:CVE-2015-6100-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6101-RCE.html">HTTP:STC:DL:CVE-2015-6101-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6101 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6102-RCE.html">HTTP:STC:DL:CVE-2015-6102-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6102 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6104-RCE.html">HTTP:STC:DL:CVE-2015-6104-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6106-RCE.html">HTTP:STC:DL:CVE-2015-6106-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6107-CE.html">HTTP:STC:DL:CVE-2015-6107-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6113-RCE.html">HTTP:STC:DL:CVE-2015-6113-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6113 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6118-CE.html">HTTP:STC:DL:CVE-2015-6118-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6135 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6122-CE.html">HTTP:STC:DL:CVE-2015-6122-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-6122 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6123-RCE.html">HTTP:STC:DL:CVE-2015-6123-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6123 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6124-RCE.html">HTTP:STC:DL:CVE-2015-6124-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6124 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6127-RCE.html">HTTP:STC:DL:CVE-2015-6127-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Center CVE-2015-6127 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6128-CE.html">HTTP:STC:DL:CVE-2015-6128-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6128 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6131-RCE.html">HTTP:STC:DL:CVE-2015-6131-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Center CVE-2015-6131 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6132-PRIV.html">HTTP:STC:DL:CVE-2015-6132-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6132 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6133-CE.html">HTTP:STC:DL:CVE-2015-6133-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6133 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6172-CE.html">HTTP:STC:DL:CVE-2015-6172-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook CVE-2015-6172 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6173-PRIV.html">HTTP:STC:DL:CVE-2015-6173-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6173 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6177-CE.html">HTTP:STC:DL:CVE-2015-6177-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-6177 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0006-PRIV.html">HTTP:STC:DL:CVE-2016-0006-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0006 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0007-PRIV.html">HTTP:STC:DL:CVE-2016-0007-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0007 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0008-CE.html">HTTP:STC:DL:CVE-2016-0008-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kernel CVE-2016-0008 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0010-RCE.html">HTTP:STC:DL:CVE-2016-0010-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0010 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0014-RCE.html">HTTP:STC:DL:CVE-2016-0014-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CVE-2016-0014 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0015-RCE.html">HTTP:STC:DL:CVE-2016-0015-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0015 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0016-RCE.html">HTTP:STC:DL:CVE-2016-0016-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0016 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0018-RCE.html">HTTP:STC:DL:CVE-2016-0018-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0018 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0020-PRIV.html">HTTP:STC:DL:CVE-2016-0020-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0020 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0035-UAF.html">HTTP:STC:DL:CVE-2016-0035-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2016-0035 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACYBERLINK-LIST-OF.html">HTTP:STC:DL:CYBERLINK-LIST-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: CyberLink PowerDVD PlayList File Handling Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACYTEL-CRSOVR-CYB-BO.html">HTTP:STC:DL:CYTEL-CRSOVR-CYB-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Cytel Studio Crossover CYB File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADBP-FILE-BOF.html">HTTP:STC:DL:DBP-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio dbp File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADIRECTPLAY-HEAP-OF.html">HTTP:STC:DL:DIRECTPLAY-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: DirectPlay Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADIRECTSHOW-QUICK-MC.html">HTTP:STC:DL:DIRECTSHOW-QUICK-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow QuickTime Atom Size Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADIRECTX-SAMI.html">HTTP:STC:DL:DIRECTX-SAMI</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX SAMI File Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADLL-PLANTING-CE.html">HTTP:STC:DL:DLL-PLANTING-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DLL Planting Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOC-2015-2379-CE.html">HTTP:STC:DL:DOC-2015-2379-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Document CVE-2015-2379 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOC-2015-2380-CE.html">HTTP:STC:DL:DOC-2015-2380-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2380 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOC-FIB.html">HTTP:STC:DL:DOC-FIB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word File FIB Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOCX-ACCESS-RCE.html">HTTP:STC:DL:DOCX-ACCESS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Access Violation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOCX-ACCESS-RCE1.html">HTTP:STC:DL:DOCX-ACCESS-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Access Violation Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOT-NET-INFO-DISC.html">HTTP:STC:DL:DOT-NET-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework WinForms Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOT-NET-WEB-PROXY.html">HTTP:STC:DL:DOT-NET-WEB-PROXY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Web Proxy Auto Discovery Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADS-ATOM-TABLE.html">HTTP:STC:DL:DS-ATOM-TABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADS-ATOM-TABLE1.html">HTTP:STC:DL:DS-ATOM-TABLE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEICAR.html">HTTP:STC:DL:EICAR</a></b></td>
   <td width="500" valign="top">
    HTTP: EICAR Antivirus Test File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEICAR-2.html">HTTP:STC:DL:EICAR-2</a></b></td>
   <td width="500" valign="top">
    HTTP: EICAR Antivirus Test File Download 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEICAR1.html">HTTP:STC:DL:EICAR1</a></b></td>
   <td width="500" valign="top">
    HTTP: EICAR Antivirus Test File Download1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEMF-EMR-INT.html">HTTP:STC:DL:EMF-EMR-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice EMF File EMR Record Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEMF-IMG-FILE-RCE.html">HTTP:STC:DL:EMF-IMG-FILE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphic Component EMF Image File Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEMF-OF.html">HTTP:STC:DL:EMF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: EMF GDIplus GpFont.SetData Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEOT-IO.html">HTTP:STC:DL:EOT-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Win32k EOT Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEPS-DSC-BOF.html">HTTP:STC:DL:EPS-DSC-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Illustrator EPS File DSC Comment Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AESIGNAL-MUL-FILE-OF.html">HTTP:STC:DL:ESIGNAL-MUL-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: eSignal Multiple files Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXCEL-FEAT11.html">HTTP:STC:DL:EXCEL-FEAT11</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Invalid Feature 11 Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXCEL-REC-TYPE.html">HTTP:STC:DL:EXCEL-REC-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Invalid Publisher Record Type Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXCEL-SERIES.html">HTTP:STC:DL:EXCEL-SERIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Series Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXCEL-SST.html">HTTP:STC:DL:EXCEL-SST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Invalid SST Record Length Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXCEL-UAF-RCE.html">HTTP:STC:DL:EXCEL-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEXESCOPE-FILE-BO.html">HTTP:STC:DL:EXESCOPE-FILE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: eXeScope Input File processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFAT-MEDIAPLAYER-RCE.html">HTTP:STC:DL:FAT-MEDIAPLAYER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Fat Player Media Player 0.6b0 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFAX-EDITOR-RCE.html">HTTP:STC:DL:FAX-EDITOR-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Fax Cover Page Editor Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFF-SAME-ORIG-SB.html">HTTP:STC:DL:FF-SAME-ORIG-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox PDF Viewer Same Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFFMPEG-READ-OF.html">HTTP:STC:DL:FFMPEG-READ-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: FFmpeg vmd_read_header Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFONT-HANDLING-CE.html">HTTP:STC:DL:FONT-HANDLING-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Handling Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFOXIT-READER-ESCAPE.html">HTTP:STC:DL:FOXIT-READER-ESCAPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Foxit Reader Escape From PDF Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFREETYPE-TYPE1.html">HTTP:STC:DL:FREETYPE-TYPE1</a></b></td>
   <td width="500" valign="top">
    HTTP: FreeType PostScript Type1 Font Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGALAN-BO.html">HTTP:STC:DL:GALAN-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Graphical Audio Language File Format Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGIF-AND-PHPFUNC.html">HTTP:STC:DL:GIF-AND-PHPFUNC</a></b></td>
   <td width="500" valign="top">
    HTTP: GIF Header With Obfuscated PHP Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGIMP-XWD-BO.html">HTTP:STC:DL:GIMP-XWD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: GIMP XWD File Handling Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGIMP-XWD-HEAP-BO.html">HTTP:STC:DL:GIMP-XWD-HEAP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: GIMP XWD File Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGNOME-RC4-BO.html">HTTP:STC:DL:GNOME-RC4-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: GNOME Project libxslt Library RC4 Key String Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGNU-TAR-PAX-BOF.html">HTTP:STC:DL:GNU-TAR-PAX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: GNU Tar PAX Extended Headers Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGOGLE-STGEFRIGHT-CE.html">HTTP:STC:DL:GOGLE-STGEFRIGHT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Stagefright Video File Parsing Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGOOGLE-PICASA-OVF.html">HTTP:STC:DL:GOOGLE-PICASA-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Picasa CR2 TIFF StripByteCounts Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGSTREAMER-QT-OF.html">HTTP:STC:DL:GSTREAMER-QT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: GStreamer QuickTime File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGZIP-LHZ.html">HTTP:STC:DL:GZIP-LHZ</a></b></td>
   <td width="500" valign="top">
    HTTP: gzip LZH Decompression Stack Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AHELP-IMG-HEAP.html">HTTP:STC:DL:HELP-IMG-HEAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows HLP File Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AIDEAL-SERVER-OF.html">HTTP:STC:DL:IDEAL-SERVER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IDEAL Migration and Administration Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AINFORMIX-NFX.html">HTTP:STC:DL:INFORMIX-NFX</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Informix Client NFX Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AIRFANVIEW-IMXCF-OF.html">HTTP:STC:DL:IRFANVIEW-IMXCF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: IrfanView IMXCF.dll XCF File Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AIRFANVIEW-MC.html">HTTP:STC:DL:IRFANVIEW-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: IrfanView FlashPix Plug-in Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AIRFANVIEW-RLE-DC-BO.html">HTTP:STC:DL:IRFANVIEW-RLE-DC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: IrfanView RLE Image Decompression Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AIRFANVIEW-TIF-DC-BO.html">HTTP:STC:DL:IRFANVIEW-TIF-DC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: IrfanView TIF Image Decompression Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AISPVM-SYS-XCF-BOF.html">HTTP:STC:DL:ISPVM-SYS-XCF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: ispVM System xcf File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJAVA-FILEDIALOG-BOF.html">HTTP:STC:DL:JAVA-FILEDIALOG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java FileDialog.Show Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJAVA-SB-RES.html">HTTP:STC:DL:JAVA-SB-RES</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Soundbank Resource Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJRE-APPLET2CLASS-LD.html">HTTP:STC:DL:JRE-APPLET2CLASS-LD</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Applet2ClassLoader Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJRE-ZIP-READCEN.html">HTTP:STC:DL:JRE-ZIP-READCEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java zip_util readCEN Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJS-VAR-OBFUS.html">HTTP:STC:DL:JS-VAR-OBFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Javascript Variable Obfuscation Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJVM-READMABCURVE.html">HTTP:STC:DL:JVM-READMABCURVE</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Virtual Machine CMM readMabCurveData Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AJVM-READMABCURVE1.html">HTTP:STC:DL:JVM-READMABCURVE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Virtual Machine CMM readMabCurveData Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AKINGSOFT-FONT-BO.html">HTTP:STC:DL:KINGSOFT-FONT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Kingsoft Writer Font Names Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AKINGVIEW-LOGFILE-BO.html">HTTP:STC:DL:KINGVIEW-LOGFILE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: WellinTech KingView KingMess Log File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBAV-LZO-IO.html">HTTP:STC:DL:LIBAV-LZO-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: libav LZO Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBFLAC-PIC-DESC.html">HTTP:STC:DL:LIBFLAC-PIC-DESC</a></b></td>
   <td width="500" valign="top">
    HTTP: FLAC Project libFLAC Picture Metadata Picture Description Size Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBFLAC-PIC-TYPE.html">HTTP:STC:DL:LIBFLAC-PIC-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: FLAC Project libFLAC Picture Metadata MIME-Type Size Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBFLAC-VORBIS-CMT.html">HTTP:STC:DL:LIBFLAC-VORBIS-CMT</a></b></td>
   <td width="500" valign="top">
    HTTP: FLAC Project libFLAC VORBIS Comment String Size Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBPNG-TRAN-CHLT-BO.html">HTTP:STC:DL:LIBPNG-TRAN-CHLT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: LibPNG Transparency Chunk Length Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBSNDFILE-PAF-OF.html">HTTP:STC:DL:LIBSNDFILE-PAF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: libsndfile PAF File Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBXML2-ENTRY-NAME.html">HTTP:STC:DL:LIBXML2-ENTRY-NAME</a></b></td>
   <td width="500" valign="top">
    HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALIBXML2-ENTRY-NAME1.html">HTTP:STC:DL:LIBXML2-ENTRY-NAME1</a></b></td>
   <td width="500" valign="top">
    HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALOTUS-DOC-VIEWER.html">HTTP:STC:DL:LOTUS-DOC-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Notes DOC Attachment Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALOTUS-LZH-BOF.html">HTTP:STC:DL:LOTUS-LZH-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Notes LZH Attachment Viewer Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALOTUS-URL-RCE.html">HTTP:STC:DL:LOTUS-URL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Notes URL Handler Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-AIFF.html">HTTP:STC:DL:MAL-AIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed AIFF File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-ASX-OF.html">HTTP:STC:DL:MAL-ASX-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: ASX Malformed File Remote Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-AVI-FILE.html">HTTP:STC:DL:MAL-AVI-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: AVI Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-HLP-CHM.html">HTTP:STC:DL:MAL-HLP-CHM</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft HLP/CHM File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-M3U.html">HTTP:STC:DL:MAL-M3U</a></b></td>
   <td width="500" valign="top">
    HTTP: M3U Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MDB.html">HTTP:STC:DL:MAL-MDB</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious .MDB File Access through HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MEDIA-RCE.html">HTTP:STC:DL:MAL-MEDIA-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Media Files Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MEDIA-RCE1.html">HTTP:STC:DL:MAL-MEDIA-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Media Files Processing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MIC-BICLRUSED.html">HTTP:STC:DL:MAL-MIC-BICLRUSED</a></b></td>
   <td width="500" valign="top">
    HTTP:  Windows Graphics Rendering Engine MIC File Malformed biClrUsed Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MOV1.html">HTTP:STC:DL:MAL-MOV1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed MOV File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MOVIEMAKER.html">HTTP:STC:DL:MAL-MOVIEMAKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Download of Malicious MovieMaker File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MPEG-4.html">HTTP:STC:DL:MAL-MPEG-4</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed MPEG-4 Video File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-MPEG-41.html">HTTP:STC:DL:MAL-MPEG-41</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed MPEG-4 Video File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-OGG-FILE.html">HTTP:STC:DL:MAL-OGG-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed ogg File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-PLF.html">HTTP:STC:DL:MAL-PLF</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Play List File (PLF)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-PLS.html">HTTP:STC:DL:MAL-PLS</a></b></td>
   <td width="500" valign="top">
    HTTP: PLS Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-PNG-FILE.html">HTTP:STC:DL:MAL-PNG-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-RMF-GM.html">HTTP:STC:DL:MAL-RMF-GM</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java XGetSamplePtrFromSnd Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-VBP.html">HTTP:STC:DL:MAL-VBP</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft Visual Basic Project File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-VISIO.html">HTTP:STC:DL:MAL-VISIO</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft Visio File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WAV-FILE.html">HTTP:STC:DL:MAL-WAV-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: WAV Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WEBEX-WRF.html">HTTP:STC:DL:MAL-WEBEX-WRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Player ATAS32.DLL Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WIN-BRIEFCASE-1.html">HTTP:STC:DL:MAL-WIN-BRIEFCASE-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Briefcase Integer Underflow Vulnerability (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WIN-BRIEFCASE-2.html">HTTP:STC:DL:MAL-WIN-BRIEFCASE-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Briefcase Integer Underflow Vulnerability (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WMV-MEDIA.html">HTTP:STC:DL:MAL-WMV-MEDIA</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Player Malformed Media Player File Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WOFF.html">HTTP:STC:DL:MAL-WOFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox WOFF Font Processing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-WRI.html">HTTP:STC:DL:MAL-WRI</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPad Malicious File 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMAL-XRL.html">HTTP:STC:DL:MAL-XRL</a></b></td>
   <td width="500" valign="top">
    HTTP: XRL Malformed File Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMCAF-LHA-OF.html">HTTP:STC:DL:MCAF-LHA-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee Multiple Products LHA File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMEDIA-CENTR-LINK-CE.html">HTTP:STC:DL:MEDIA-CENTR-LINK-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Center Link File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMFC-DOC-TITLE.html">HTTP:STC:DL:MFC-DOC-TITLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows MFC Document Title Updating Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMIDICONTROLEVENT.html">HTTP:STC:DL:MIDICONTROLEVENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player MIDIControlEvent Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMINI-STREAM-ASX-BOF.html">HTTP:STC:DL:MINI-STREAM-ASX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mini-stream Products ASX File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMINI-STREAM-PLS-OF.html">HTTP:STC:DL:MINI-STREAM-PLS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mini-Stream Ripper Playlist File Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMIXERSEQUENCER-RCE.html">HTTP:STC:DL:MIXERSEQUENCER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE and Java for Business &#39;MixerSequencer&#39; Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMOZILLA-WAV-BOF.html">HTTP:STC:DL:MOZILLA-WAV-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Product WAV Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMP3-WM-MEM.html">HTTP:STC:DL:MP3-WM-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: MP3 Windows Media Playback Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMP4-FILE-BOF.html">HTTP:STC:DL:MP4-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: MP4 File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPEG4-3IVX-FILE.html">HTTP:STC:DL:MPEG4-3IVX-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: 3ivx MPEG-4 MP4 File Handling Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPG123-HEAP-OF.html">HTTP:STC:DL:MPG123-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: MPG123 Streaming Audio Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPLAYER-CALLOC.html">HTTP:STC:DL:MPLAYER-CALLOC</a></b></td>
   <td width="500" valign="top">
    HTTP: MPlayer for Windows Calloc Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPLAYER-DEMUXER.html">HTTP:STC:DL:MPLAYER-DEMUXER</a></b></td>
   <td width="500" valign="top">
    HTTP: MPlayer Real Demuxer stream_read Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPLAYER-SAMI.html">HTTP:STC:DL:MPLAYER-SAMI</a></b></td>
   <td width="500" valign="top">
    HTTP: MPlayer SAMI Subtitle sub_read_line_sami Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPLAYER-TWINVQ-BO.html">HTTP:STC:DL:MPLAYER-TWINVQ-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMPP-MEM-VAL.html">HTTP:STC:DL:MPP-MEM-VAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Project Memory Validation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-ACCESS-MEM-CORR.html">HTTP:STC:DL:MS-ACCESS-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Access CVE-2013-3157 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CRFTD-RTF-DOC-MC.html">HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Crafted RTF Document Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2014-6356-CE.html">HTTP:STC:DL:MS-CVE-2014-6356-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6356 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-0096-CE.html">HTTP:STC:DL:MS-CVE-2015-0096-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0096 Remote Code Exectution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-0097-CE.html">HTTP:STC:DL:MS-CVE-2015-0097-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2015-0097 Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2549-CE.html">HTTP:STC:DL:MS-CVE-2015-2549-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2549 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2553-CE.html">HTTP:STC:DL:MS-CVE-2015-2553-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2553 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2558-CE.html">HTTP:STC:DL:MS-CVE-2015-2558-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2558 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-DIRECTSHOW-RCE.html">HTTP:STC:DL:MS-DIRECTSHOW-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DirectShow JPEG Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-DOC-STREAM-CE.html">HTTP:STC:DL:MS-DOC-STREAM-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Document Stream Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-DOC-STREAM-CE1.html">HTTP:STC:DL:MS-DOC-STREAM-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Document Stream Handling Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-EMF-PARSE.html">HTTP:STC:DL:MS-EMF-PARSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Rendering Engine EMF Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-EXCEL-OBJ-MC.html">HTTP:STC:DL:MS-EXCEL-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel File OBJ record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-EXCEL-TXOOBJ-MC.html">HTTP:STC:DL:MS-EXCEL-TXOOBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel TXO and OBJ Objects Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-EXPLORER-URL-OF.html">HTTP:STC:DL:MS-EXPLORER-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer Invalid url File Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-FON-FILE-RCE.html">HTTP:STC:DL:MS-FON-FILE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Bitmap Fonts Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-FONTMATRIX.html">HTTP:STC:DL:MS-FONTMATRIX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font Driver Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-FOREFRONT-CUP.html">HTTP:STC:DL:MS-FOREFRONT-CUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Poisoned Cup Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-GDI-EMF.html">HTTP:STC:DL:MS-GDI-EMF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft GDI+ EMF+ Integer Wrap Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-GDI-INT-OVF.html">HTTP:STC:DL:MS-GDI-INT-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft GDI BITMAPINFOHEADER Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-GDI-WMF-OF.html">HTTP:STC:DL:MS-GDI-WMF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDI WMF Handling Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-GDI32-POLYLINE.html">HTTP:STC:DL:MS-GDI32-POLYLINE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kernel GDI32 Polyline Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-HELP-CNT-BO.html">HTTP:STC:DL:MS-HELP-CNT-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Help Workshop CNT Help Contents Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-MEDIA-DECOMP.html">HTTP:STC:DL:MS-MEDIA-DECOMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Decompression Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-MEDIA-DVR.html">HTTP:STC:DL:MS-MEDIA-DVR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media DVR-MS File Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-MPEG-LAYER-3-DOS.html">HTTP:STC:DL:MS-MPEG-LAYER-3-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MPEG Layer-3 Audio Decoder Divide-By-Zero Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-NET-ASLR-BYPASS.html">HTTP:STC:DL:MS-NET-ASLR-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CVE-2015-6115 ASLR Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-NET-CLILOADER-MC.html">HTTP:STC:DL:MS-NET-CLILOADER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CLI Loader Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OBJ-PACKAGER-RC1.html">HTTP:STC:DL:MS-OBJ-PACKAGER-RC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OBJ-PACKAGER-RCE.html">HTTP:STC:DL:MS-OBJ-PACKAGER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-2007-MC.html">HTTP:STC:DL:MS-OFFICE-2007-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office 2007 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-2010-RCE.html">HTTP:STC:DL:MS-OFFICE-2010-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office 2010 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-BAD-INDE1.html">HTTP:STC:DL:MS-OFFICE-BAD-INDE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Bad Index Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-BAD-INDEX.html">HTTP:STC:DL:MS-OFFICE-BAD-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Bad Index Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-DOC-MC.html">HTTP:STC:DL:MS-OFFICE-DOC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Document Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-EXCEL-MC.html">HTTP:STC:DL:MS-OFFICE-EXCEL-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office 2010 Excel Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-EXCEL-RCE.html">HTTP:STC:DL:MS-OFFICE-EXCEL-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Record Pointer Overwrite Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-PICT-MC.html">HTTP:STC:DL:MS-OFFICE-PICT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PICT Filter Map Structure Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-PICT-MC1.html">HTTP:STC:DL:MS-OFFICE-PICT-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PICT Filter Map Structure Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-RCE.html">HTTP:STC:DL:MS-OFFICE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Publisher 2007 Pointer Dereference Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-STRING.html">HTTP:STC:DL:MS-OFFICE-STRING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malformed String Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-STRING1.html">HTTP:STC:DL:MS-OFFICE-STRING1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malformed String Parsing Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-WORD-BO.html">HTTP:STC:DL:MS-OFFICE-WORD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-XL-MC.html">HTTP:STC:DL:MS-OFFICE-XL-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Memory Corruption (CVE-2013-3158)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OPEN-FONT-FILE.html">HTTP:STC:DL:MS-OPEN-FONT-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PAINT-BMP-MC.html">HTTP:STC:DL:MS-PAINT-BMP-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Paint BMP File Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PAINT-DOS.html">HTTP:STC:DL:MS-PAINT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Paint Memory Corruption Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PICTURE-MGR-AV.html">HTTP:STC:DL:MS-PICTURE-MGR-AV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Picture Manager 2010 Write Access Violation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PNG-IMG-CE.html">HTTP:STC:DL:MS-PNG-IMG-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PNG Image Filter Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PP-PRESENT-RCE.html">HTTP:STC:DL:MS-PP-PRESENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PP-PRESENT-RCE1.html">HTTP:STC:DL:MS-PP-PRESENT-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PPT-2007-MC.html">HTTP:STC:DL:MS-PPT-2007-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint 2007 and Windows Media Player 11 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PUB-MC.html">HTTP:STC:DL:MS-PUB-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher PUB File Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PUB-RCE.html">HTTP:STC:DL:MS-PUB-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher Pubconv.dll Function Pointer Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PUB-RCE1.html">HTTP:STC:DL:MS-PUB-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher Pubconv.dll Function Pointer Overwrite1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PUBLISHER-MC.html">HTTP:STC:DL:MS-PUBLISHER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Publisher Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-PUBLISHER-RCE.html">HTTP:STC:DL:MS-PUBLISHER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher 2007 Conversion Library Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-READER-MC.html">HTTP:STC:DL:MS-READER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Reader Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-RICHEDIT-RCE.html">HTTP:STC:DL:MS-RICHEDIT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft RichEdit Allows Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-THEME-RCE.html">HTTP:STC:DL:MS-THEME-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Theme File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-TTF-PARSING.html">HTTP:STC:DL:MS-TTF-PARSING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Parsing Vulnerability 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-VB-VB6STKIT1.html">HTTP:STC:DL:MS-VB-VB6STKIT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Basic Enterprise Edition vb6stkit.dll Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-VISIO-DXF-BO.html">HTTP:STC:DL:MS-VISIO-DXF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio 2010 DXF File Format Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-VISIO-OBJ-MC.html">HTTP:STC:DL:MS-VISIO-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Packed Object Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-VISUAL-BASIC-BOF.html">HTTP:STC:DL:MS-VISUAL-BASIC-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Basic Project Multiple Fields Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WIN-DOTNET-RCE.html">HTTP:STC:DL:MS-WIN-DOTNET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows .NET Framework Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WIN-HLP-MC.html">HTTP:STC:DL:MS-WIN-HLP-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Help Program Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WIN-MOVIE-MKR-MC.html">HTTP:STC:DL:MS-WIN-MOVIE-MKR-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Movie Maker Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WIN-VERIFY-TRUST.html">HTTP:STC:DL:MS-WIN-VERIFY-TRUST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows WinVerifyTrust Signature Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WMF-DOS.html">HTTP:STC:DL:MS-WMF-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GRE WMF Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WMF-PARSE.html">HTTP:STC:DL:MS-WMF-PARSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Rendering Engine WMF Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORD-BULLET.html">HTTP:STC:DL:MS-WORD-BULLET</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Bulleted List Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORD-MEM-CORR.html">HTTP:STC:DL:MS-WORD-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2013-3852 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORD-XST-BOF.html">HTTP:STC:DL:MS-WORD-XST-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Wordpad Word Converter XST Structure Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORDPAD-DOS.html">HTTP:STC:DL:MS-WORDPAD-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPad &#39;.doc&#39; File Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORDPAD-DOS1.html">HTTP:STC:DL:MS-WORDPAD-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPad &#39;.doc&#39; File Remote Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORKS-BO.html">HTTP:STC:DL:MS-WORKS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Works File Converter WPS File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORKS9-RTF.html">HTTP:STC:DL:MS-WORKS9-RTF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Works 9 RTF Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-XL-ROW-REC-BO.html">HTTP:STC:DL:MS-XL-ROW-REC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Row Record Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSCOMCTL-ACTIVEX.html">HTTP:STC:DL:MSCOMCTL-ACTIVEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Common Controls MSCOMCTL.OCX Activex Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSDOTNET-FUNC-PTR.html">HTTP:STC:DL:MSDOTNET-FUNC-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Improper Execution of Function Pointer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSDOTNET-FUNC-PTR1.html">HTTP:STC:DL:MSDOTNET-FUNC-PTR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Improper Execution of Function Pointer1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSEXCEL-VBMACRO-RCE.html">HTTP:STC:DL:MSEXCEL-VBMACRO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel VBScript Macro Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSHTML-DBLFREE.html">HTTP:STC:DL:MSHTML-DBLFREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer MSHTML Double Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSHTML-HELP.html">HTTP:STC:DL:MSHTML-HELP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help &#39;.chm&#39; File Stack Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSHTML-HELP1.html">HTTP:STC:DL:MSHTML-HELP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help &#39;.chm&#39; File Stack Buffer Overflow Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSOFFICE-MSO-RCE.html">HTTP:STC:DL:MSOFFICE-MSO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office MSO.dll Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSOFFICE-MSODLL-MC.html">HTTP:STC:DL:MSOFFICE-MSODLL-MC</a></b></td>
   <td width="500" valign="top">
    HTTP:  Microsoft Office Word mso.dll LsCreateLine Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSPROJECT-MEM.html">HTTP:STC:DL:MSPROJECT-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Project Invalid Memory Pointer Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSPUBLISHER-OBJ.html">HTTP:STC:DL:MSPUBLISHER-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher Object Handler Validation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSSQL-BACKUP-MEM.html">HTTP:STC:DL:MSSQL-BACKUP-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server Backup Restoring Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSWMM-OF.html">HTTP:STC:DL:MSWMM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Movie Maker and Producer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMUL-FILES-WITH-PDF.html">HTTP:STC:DL:MUL-FILES-WITH-PDF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Files header followed by PDF header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMULTIMEDIA-JUKEBOX.html">HTTP:STC:DL:MULTIMEDIA-JUKEBOX</a></b></td>
   <td width="500" valign="top">
    HTTP: MultiMedia Jukebox Playlist File Handling Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMULTIPLE-MAL-FILE.html">HTTP:STC:DL:MULTIPLE-MAL-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Multiple Malformed File Format  
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANET-CVE-2015-1672.html">HTTP:STC:DL:NET-CVE-2015-1672</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows .NET CVE-2015-1672 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANETOP-DWS-BOF.html">HTTP:STC:DL:NETOP-DWS-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Netop Remote Control dws File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANETOP-DWS-BOF1.html">HTTP:STC:DL:NETOP-DWS-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Netop Remote Control dws File Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANODEJS-YAML-CE.html">HTTP:STC:DL:NODEJS-YAML-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: NodeJS JS YAML Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANUANCE-LAUNCH.html">HTTP:STC:DL:NUANCE-LAUNCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Nuance PDF Reader Launch Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOBF-PE-DL.html">HTTP:STC:DL:OBF-PE-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Portable Executable File Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFF-GDI-HOF.html">HTTP:STC:DL:OFF-GDI-HOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office GDI+ Heap Overflow Vulnerability 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFF-GDI-HOF1.html">HTTP:STC:DL:OFF-GDI-HOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office GDI+ Heap Overflow Vulnerability 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFF-GDI-RCD-TYPE.html">HTTP:STC:DL:OFF-GDI-RCD-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office GDI+ Record Type Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-BMP-HEADER.html">HTTP:STC:DL:OFFICE-BMP-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Image Filter Crafted BMP Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-BO-RCE.html">HTTP:STC:DL:OFFICE-BO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-CGM.html">HTTP:STC:DL:OFFICE-CGM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CGM Image Converter Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-MAL-PUB.html">HTTP:STC:DL:OFFICE-MAL-PUB</a></b></td>
   <td width="500" valign="top">
    HTTP:  Malformed Microsoft Office Publisher File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-MAL-PUB1.html">HTTP:STC:DL:OFFICE-MAL-PUB1</a></b></td>
   <td width="500" valign="top">
    HTTP:  Malformed Microsoft Office Publisher File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-MSO.html">HTTP:STC:DL:OFFICE-MSO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office MSO Shapes Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-PCT.html">HTTP:STC:DL:OFFICE-PCT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PICT Graphics Converter Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-PICT-MC.html">HTTP:STC:DL:OFFICE-PICT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PICT Filter Invalid Length Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-VBA-UAF.html">HTTP:STC:DL:OFFICE-VBA-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office VBA Module Stream Use after Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICEART-PROP.html">HTTP:STC:DL:OFFICEART-PROP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Art Property Table Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICEART-RCE.html">HTTP:STC:DL:OFFICEART-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Embedded Office Art Drawing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOLE-ART-INV.html">HTTP:STC:DL:OLE-ART-INV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Art Invalid Object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOLE-STRUCTURE-RCE.html">HTTP:STC:DL:OLE-STRUCTURE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft OLE Structure Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AONENOTE-INFO-DISC.html">HTTP:STC:DL:ONENOTE-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote 2010 Buffer Size Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AONENOTE-INFO-DISC1.html">HTTP:STC:DL:ONENOTE-INFO-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote 2010 Buffer Size Validation1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AONENOTE-INFO-DISC2.html">HTTP:STC:DL:ONENOTE-INFO-DISC2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote 2010 Buffer Size Validation2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-EMF.html">HTTP:STC:DL:OO-EMF</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice EMF File EMR_BITBLT Record Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-OLE.html">HTTP:STC:DL:OO-OLE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice OLE File Stream Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-RTF.html">HTTP:STC:DL:OO-RTF</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice RTF File Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-WORD-TABLE.html">HTTP:STC:DL:OO-WORD-TABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice Word Document Table Parsing Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-WORD-TABLE1.html">HTTP:STC:DL:OO-WORD-TABLE1</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice Word Document Table Parsing Integer Underflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOO-XPMREAD-OF.html">HTTP:STC:DL:OO-XPMREAD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice.org XPM File Processing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPEN-TYPE-RCE.html">HTTP:STC:DL:OPEN-TYPE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Open Type Font Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPEN-TYPE-RCE1.html">HTTP:STC:DL:OPEN-TYPE-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Open Type Font Parsing Remote Code Execution2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPEN-TYPE-RCE11.html">HTTP:STC:DL:OPEN-TYPE-RCE11</a></b></td>
   <td width="500" valign="top">
    HTTP: Open Type Font Parsing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENOFFICE-CSV-DOS1.html">HTTP:STC:DL:OPENOFFICE-CSV-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice csv File Remote Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENOFFICE-CSV-DOS2.html">HTTP:STC:DL:OPENOFFICE-CSV-DOS2</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice csv File Remote Denial of Service2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENOFFICE-CSV-DOS3.html">HTTP:STC:DL:OPENOFFICE-CSV-DOS3</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice csv File Remote Denial of Service3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENOFFICE-CSV-DOS4.html">HTTP:STC:DL:OPENOFFICE-CSV-DOS4</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice csv File Remote Denial of Service4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENOFFICE-TIFF-OF.html">HTTP:STC:DL:OPENOFFICE-TIFF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice TIFF File Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOPENSSL-CMS-FILE.html">HTTP:STC:DL:OPENSSL-CMS-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenSSL CMS Structure OriginatorInfo File Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AORACLE-JPEG-QCD-OF.html">HTTP:STC:DL:ORACLE-JPEG-QCD-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In JPEG 2000 QCD Segment Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AORACLE-LOTUS-123.html">HTTP:STC:DL:ORACLE-LOTUS-123</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Lotus 1-2-3 Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AORBIT-DOWNLOADER-OF.html">HTTP:STC:DL:ORBIT-DOWNLOADER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Orbit Downloader Download Failed Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOSX-GIF-BANDPROC.html">HTTP:STC:DL:OSX-GIF-BANDPROC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Mac OS X ImageIO gifGetBandProc GIF Image Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-2015-2462-CE.html">HTTP:STC:DL:OTF-2015-2462-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2462 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-BO.html">HTTP:STC:DL:OTF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Embedded OpenType Font Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-CFF-RCE.html">HTTP:STC:DL:OTF-CFF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Compact Font Format Driver Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-DOS.html">HTTP:STC:DL:OTF-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-DOS1.html">HTTP:STC:DL:OTF-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-FONT-INT.html">HTTP:STC:DL:OTF-FONT-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: Embedded Malformed OpenType Font Engine Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-FONT-SIZE.html">HTTP:STC:DL:OTF-FONT-SIZE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Font Size Table
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-GLYPH.html">HTTP:STC:DL:OTF-GLYPH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Glyph Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-INDEX-RCE.html">HTTP:STC:DL:OTF-INDEX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Index Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-INF-LOOP.html">HTTP:STC:DL:OTF-INF-LOOP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) Infinite Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-NULL-PTR.html">HTTP:STC:DL:OTF-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows OpenType Font (OTF) NULL Pointer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOUTLOOK-CE.html">HTTP:STC:DL:OUTLOOK-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook SMB ATTACH_BY_REFERENCE Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APAC-DESIGNER-BO.html">HTTP:STC:DL:PAC-DESIGNER-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Lattice PAC-Designer File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APAGEMAKER-OF.html">HTTP:STC:DL:PAGEMAKER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PageMaker Key Strings Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APANDA-ZOO-BO.html">HTTP:STC:DL:PANDA-ZOO-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Panda Antivirus ZOO Archive Decompression Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APDF-FILE.html">HTTP:STC:DL:PDF-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe PDF File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APDF-PRINTSEPS.html">HTTP:STC:DL:PDF-PRINTSEPS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader printSeps Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APDF-U3D-CLOD.html">HTTP:STC:DL:PDF-U3D-CLOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APDFXCHANGE-AX.html">HTTP:STC:DL:PDFXCHANGE-AX</a></b></td>
   <td width="500" valign="top">
    HTTP: PDF-XChange pdfSaver Unsafe ActiveX Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APEAZIP-CINJ.html">HTTP:STC:DL:PEAZIP-CINJ</a></b></td>
   <td width="500" valign="top">
    HTTP: PeaZip Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-2000-BOF.html">HTTP:STC:DL:PPT-2000-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint 2000 File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-EXTTIMENODE.html">HTTP:STC:DL:PPT-EXTTIMENODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint ExtTimeNodeContainer Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-FB1-ATOM-OF.html">HTTP:STC:DL:PPT-FB1-ATOM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-FB1-ATOM-OF3.html">HTTP:STC:DL:PPT-FB1-ATOM-OF3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-FF-BOF.html">HTTP:STC:DL:PPT-FF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: PowerPoint File Multiples Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-FF-BOF1.html">HTTP:STC:DL:PPT-FF-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: PowerPoint File Multiples Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-LEGACY-FMT-OF.html">HTTP:STC:DL:PPT-LEGACY-FMT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint Legacy Format Schemes Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-MS-OGRAPH.html">HTTP:STC:DL:PPT-MS-OGRAPH</a></b></td>
   <td width="500" valign="top">
    HTTP: PowerPoint MS-OGRAPH OfficeArtBlipDIB 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-NOTES-MC.html">HTTP:STC:DL:PPT-NOTES-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint Notes Container Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-OEP-ATOM-INV.html">HTTP:STC:DL:PPT-OEP-ATOM-INV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint OEPlaceholderAtom placementId Invalid Array Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-OFFART-ATOM-RCE.html">HTTP:STC:DL:PPT-OFFART-ATOM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint OfficeArt Atom Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-OFFICEART.html">HTTP:STC:DL:PPT-OFFICEART</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint OfficeArtClient Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-OFFICEART1.html">HTTP:STC:DL:PPT-OFFICEART1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint OfficeArtClient Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-PP7-MC.html">HTTP:STC:DL:PPT-PP7-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint PP7 File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-PP7-MC1.html">HTTP:STC:DL:PPT-PP7-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint PP7 File Handling Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-PRINTER-REC-OF.html">HTTP:STC:DL:PPT-PRINTER-REC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint Legacy Format Printer Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-SCRIPT.html">HTTP:STC:DL:PPT-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Powerpoint Containing Script Elements
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-SHAPES-MEM.html">HTTP:STC:DL:PPT-SHAPES-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Drawing Shapes Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-SLIDEATOM.html">HTTP:STC:DL:PPT-SLIDEATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint SlideAtom Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-SLIDEATOM1.html">HTTP:STC:DL:PPT-SLIDEATOM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint SlideAtom Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-SOUND-OBJ-OF.html">HTTP:STC:DL:PPT-SOUND-OBJ-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint 95 Format Sound Object Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-TEXTBYTESATM-BO.html">HTTP:STC:DL:PPT-TEXTBYTESATM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-TXMASTERSTYLE.html">HTTP:STC:DL:PPT-TXMASTERSTYLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint TxMasterStyle10Atom Processing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-TXMASTERSTYLE1.html">HTTP:STC:DL:PPT-TXMASTERSTYLE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint TxMasterStyle10Atom Processing Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-UNK-ANI.html">HTTP:STC:DL:PPT-UNK-ANI</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint Unknown Animation Node Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-VIEWER-MEMALLO1.html">HTTP:STC:DL:PPT-VIEWER-MEMALLO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Viewer Memory Allocation Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPT-VIEWER-MEMALLOC.html">HTTP:STC:DL:PPT-VIEWER-MEMALLOC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Viewer Memory Allocation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APPTVIEWER-DRAWSHAPE.html">HTTP:STC:DL:PPTVIEWER-DRAWSHAPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft PowerPoint Viewer Drawing Shape Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APROSHOW-PSH-FILE-OF.html">HTTP:STC:DL:PROSHOW-PSH-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: ProShow Gold PSH File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-INDEXLIMITS.html">HTTP:STC:DL:PUB-INDEXLIMITS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher Invalid Index Limits Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-OPY.html">HTTP:STC:DL:PUB-OPY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher OPY Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-PLC.html">HTTP:STC:DL:PUB-PLC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher PLC Objects Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-PLC3.html">HTTP:STC:DL:PUB-PLC3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Publisher PLC Objects Remote Code Execution 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-TEXTBOX.html">HTTP:STC:DL:PUB-TEXTBOX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3APUB-TEXTBOX1.html">HTTP:STC:DL:PUB-TEXTBOX1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQEMU-FLOPPY-DISK-OF.html">HTTP:STC:DL:QEMU-FLOPPY-DISK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: QEMU Floppy Disk Controller Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQP-S3M-OF.html">HTTP:STC:DL:QP-S3M-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: MJM QuickPlayer s3m Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-COLOR-ATOM.html">HTTP:STC:DL:QT-COLOR-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Color Table Atom Movie File Handling Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-COLOR-ATOM1.html">HTTP:STC:DL:QT-COLOR-ATOM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Color Table Atom Movie File Handling Heap Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-COLOR-TABLE.html">HTTP:STC:DL:QT-COLOR-TABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Color Table ID Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-CRGN-ATOM.html">HTTP:STC:DL:QT-CRGN-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime crgn Atom Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-EMBED-JS.html">HTTP:STC:DL:QT-EMBED-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: Quicktime Embeded JavaScript/Link
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-FLASHPIX-BOF.html">HTTP:STC:DL:QT-FLASHPIX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: QuickTime FlashPix File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-FLIPFILETYPE.html">HTTP:STC:DL:QT-FLIPFILETYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Crafted Media File FlipFileTypeAtom_BtoN Integer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-FPX-IO.html">HTTP:STC:DL:QT-FPX-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime FPX File Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-FPX-IO1.html">HTTP:STC:DL:QT-FPX-IO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime FPX File Integer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-JVTCOMPENCODE.html">HTTP:STC:DL:QT-JVTCOMPENCODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MOV File JVTCompEncodeFrame Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-JVTCOMPENCODE1.html">HTTP:STC:DL:QT-JVTCOMPENCODE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MOV File JVTCompEncodeFrame Heap Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PANORAMA-ATOM.html">HTTP:STC:DL:QT-PANORAMA-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Panorama Sample Atoms Movie File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PANORAMA-ATOM1.html">HTTP:STC:DL:QT-PANORAMA-ATOM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Panorama Sample Atoms Movie File Handling Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PDAT.html">HTTP:STC:DL:QT-PDAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PDAT1.html">HTTP:STC:DL:QT-PDAT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PICT-FILE-MC.html">HTTP:STC:DL:QT-PICT-FILE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT File Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PV-GIF.html">HTTP:STC:DL:QT-PV-GIF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PictureViewer GIF Rendering Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-PV-OF.html">HTTP:STC:DL:QT-PV-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PictureViewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-SMIL-FILEHAND.html">HTTP:STC:DL:QT-SMIL-FILEHAND</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime SMIL File Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-STSC-ATOM-MC.html">HTTP:STC:DL:QT-STSC-ATOM-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-STSC-ATOM-MC1.html">HTTP:STC:DL:QT-STSC-ATOM-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-STSD-ATOMS.html">HTTP:STC:DL:QT-STSD-ATOMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime STSD Atoms Handling Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-TEXML-BOF.html">HTTP:STC:DL:QT-TEXML-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime TeXML Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-TOQTPOINTER.html">HTTP:STC:DL:QT-TOQTPOINTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime for Java toQTPointer Function Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-UDTA-ATOM.html">HTTP:STC:DL:QT-UDTA-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime &#39;udta&#39; Atom Parsing Heap Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQT-UDTA-ATOM1.html">HTTP:STC:DL:QT-UDTA-ATOM1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime &#39;udta&#39; Atom Parsing Heap Overflow Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQTPICT-REC-BO.html">HTTP:STC:DL:QTPICT-REC-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT Multiple Records Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQUICKTIME-PAINTPOLY.html">HTTP:STC:DL:QUICKTIME-PAINTPOLY</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT Image paintPoly Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQUICKTIME-PNSIZE.html">HTTP:STC:DL:QUICKTIME-PNSIZE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT Image PnSize Opcode Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQUICKTIME-QTVR-BOF.html">HTTP:STC:DL:QUICKTIME-QTVR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime QTVR QTVRStringAtom Parsing Buffer Overflow (CVE-2012-0667)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQUO-ESIGNAL-BOF.html">HTTP:STC:DL:QUO-ESIGNAL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Interactive Data eSignal Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREAL-3G2-WRITEAV-MC.html">HTTP:STC:DL:REAL-3G2-WRITEAV-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer 3G2 File Write Access Violation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREAL-3GP-FILE-MC.html">HTTP:STC:DL:REAL-3GP-FILE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer 3GP File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREAL-SWF-BOF.html">HTTP:STC:DL:REAL-SWF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer SWF Flash File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREAL-SWF-BOF1.html">HTTP:STC:DL:REAL-SWF-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer SWF Flash File Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREALPLAYER-SWF-BO.html">HTTP:STC:DL:REALPLAYER-SWF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer SWF Frame Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREALPLY-URL-BOF.html">HTTP:STC:DL:REALPLY-URL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer URL Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREMOTE-DNS-CHANGE.html">HTTP:STC:DL:REMOTE-DNS-CHANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Unauthenticated Remote DNS Change Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ARTF-FPARSE-RCE.html">HTTP:STC:DL:RTF-FPARSE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office RTF File Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ARTF-LISTID-UAF.html">HTTP:STC:DL:RTF-LISTID-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Rich Text Format Parser listid Use-After-Free 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ARTF-MISMATCH.html">HTTP:STC:DL:RTF-MISMATCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF Mismatch Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ARTF-PARSE-RCE.html">HTTP:STC:DL:RTF-PARSE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word RTF file parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASANDWORM-RCE.html">HTTP:STC:DL:SANDWORM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office SandWorm Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASANDWORM-RCE1.html">HTTP:STC:DL:SANDWORM-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office SandWorm Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASEARCHMS-EXEC.html">HTTP:STC:DL:SEARCHMS-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer Search-ms File Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASHOCKWAVE-3D-RCE.html">HTTP:STC:DL:SHOCKWAVE-3D-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Player 3D Parsing Routine Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-CAB-FILE-OF.html">HTTP:STC:DL:SOPHOS-CAB-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus CAB Files Invalid typeCompress Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-MAL-VISIO.html">HTTP:STC:DL:SOPHOS-MAL-VISIO</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus Malicious Visio File Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-MAL-VISIO1.html">HTTP:STC:DL:SOPHOS-MAL-VISIO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus Malicious Visio File Attack1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-PDF-FILE-OF.html">HTTP:STC:DL:SOPHOS-PDF-FILE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus PDF Handling Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-RAR-FILTER.html">HTTP:STC:DL:SOPHOS-RAR-FILTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus RAR VMSF_DELTA Filter Signedness Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-RAR-VMSF-RGB.html">HTTP:STC:DL:SOPHOS-RAR-VMSF-RGB</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus RAR VMSF_RGB Filter Parsing Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-ZIPDOS.html">HTTP:STC:DL:SOPHOS-ZIPDOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus Zip File Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASOPHOS-ZIPDOS1.html">HTTP:STC:DL:SOPHOS-ZIPDOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sophos Anti-Virus Zip File Handling Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASUSPICIOUS-FILE.html">HTTP:STC:DL:SUSPICIOUS-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Malicious File Download Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASWF-ACTIONCONSTPOOL.html">HTTP:STC:DL:SWF-ACTIONCONSTPOOL</a></b></td>
   <td width="500" valign="top">
    HTTP:  Adobe Flash Player ActionScript ActionConstantPool Actions Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASWF-ACTIONPUSH.html">HTTP:STC:DL:SWF-ACTIONPUSH</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript ActionPush Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASWF-ACTIONPUSH1.html">HTTP:STC:DL:SWF-ACTIONPUSH1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ActionScript ActionPush Memory Corruption 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASYM-AV-RAR-BO.html">HTTP:STC:DL:SYM-AV-RAR-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec AntiVirus RAR Archive Decompression Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ATRUETYPE-PARSE.html">HTTP:STC:DL:TRUETYPE-PARSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2011-3402)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ATRUETYPE-PARSE2.html">HTTP:STC:DL:TRUETYPE-PARSE2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2012-0159)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE.html">HTTP:STC:DL:ULTRAISO-CUE</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE1.html">HTTP:STC:DL:ULTRAISO-CUE1</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE2.html">HTTP:STC:DL:ULTRAISO-CUE2</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE3.html">HTTP:STC:DL:ULTRAISO-CUE3</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE4.html">HTTP:STC:DL:ULTRAISO-CUE4</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AURSOFT-W32DASM-BOF.html">HTTP:STC:DL:URSOFT-W32DASM-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Ursoft W32Dasm Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVBA-MEM-CORRUPT.html">HTTP:STC:DL:VBA-MEM-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Basic for Applications Stack Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVCF-SHELLEXECUTE.html">HTTP:STC:DL:VCF-SHELLEXECUTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows ShellExecute and IE7 URL Handling Code Execution (.vcf)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVIDEOLAN-VLC-PNG-CE.html">HTTP:STC:DL:VIDEOLAN-VLC-PNG-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player PNG Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVIDEOLAN-VLC-SWF-CE.html">HTTP:STC:DL:VIDEOLAN-VLC-SWF-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player SWF Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVIDEOLAN-WAV-IO.html">HTTP:STC:DL:VIDEOLAN-WAV-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player WAV Processing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISILOGIC-VLP-BO.html">HTTP:STC:DL:VISILOGIC-VLP-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC IDE vlp File Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-BOF.html">HTTP:STC:DL:VISIO-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft Office Visio File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-COMPRESSION.html">HTTP:STC:DL:VISIO-COMPRESSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Data Compression Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-DXF-RCE.html">HTTP:STC:DL:VISIO-DXF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio DXF File Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-FREED.html">HTTP:STC:DL:VISIO-FREED</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Freed Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-INV-VERSION.html">HTTP:STC:DL:VISIO-INV-VERSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Version Number Handling Code Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-INVALID-ROW.html">HTTP:STC:DL:VISIO-INVALID-ROW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Invalid Row Objects Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-INVALID-ROW1.html">HTTP:STC:DL:VISIO-INVALID-ROW1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Invalid Row Objects Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-MAL-DXF.html">HTTP:STC:DL:VISIO-MAL-DXF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio DXF File Inserting Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-OBJ-CONFUSION.html">HTTP:STC:DL:VISIO-OBJ-CONFUSION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Object Type Confusion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-OBJ-HEADER.html">HTTP:STC:DL:VISIO-OBJ-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Object Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-OBJ-TAG.html">HTTP:STC:DL:VISIO-OBJ-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Objects Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-TYPE-CONF.html">HTTP:STC:DL:VISIO-TYPE-CONF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Visio Tree Object Type Confusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-UMLSTRING.html">HTTP:STC:DL:VISIO-UMLSTRING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio UMLString Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-VSD-ICON.html">HTTP:STC:DL:VISIO-VSD-ICON</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Visio VSD File Icon Bits Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-VSD-MEM.html">HTTP:STC:DL:VISIO-VSD-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio VSD File Format Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-VSD-MEMCP.html">HTTP:STC:DL:VISIO-VSD-MEMCP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visio 2010 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIWAVE-SITE-BOF.html">HTTP:STC:DL:VISIWAVE-SITE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: VisiWave Site Survey vwr File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-MATROSKA.html">HTTP:STC:DL:VLC-MATROSKA</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player Subtitle StripTags Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-MEDIA-PLY-BO.html">HTTP:STC:DL:VLC-MEDIA-PLY-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-MEDIA-PLY-BO1.html">HTTP:STC:DL:VLC-MEDIA-PLY-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player File Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-MEDIAPLAYER-RCE.html">HTTP:STC:DL:VLC-MEDIAPLAYER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-MP4-BOF.html">HTTP:STC:DL:VLC-MP4-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player MP4_BoxDumpStructure Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-SWF-RCE.html">HTTP:STC:DL:VLC-SWF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player SWF File Parsing Use-after-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-TY-BO.html">HTTP:STC:DL:VLC-TY-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player TY Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-TY-BO1.html">HTTP:STC:DL:VLC-TY-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player TY Processing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVLC-XSPF-MEM.html">HTTP:STC:DL:VLC-XSPF-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player XSPF Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVML-GRADIENT.html">HTTP:STC:DL:VML-GRADIENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Rendering Engine VML Gradient Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVS-XML-INFO.html">HTTP:STC:DL:VS-XML-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio XML Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWEBEX-ATAS.html">HTTP:STC:DL:WEBEX-ATAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Recording Format Player atas32.dll 0xBB Subrecords Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWEBEX-ATDL-BOF.html">HTTP:STC:DL:WEBEX-ATDL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWEBEX-ATDL-OF.html">HTTP:STC:DL:WEBEX-ATDL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWEBEX-RECORD-ATAS.html">HTTP:STC:DL:WEBEX-RECORD-ATAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Recording Format Player atas32.dll Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIN-CHM-DETECTION.html">HTTP:STC:DL:WIN-CHM-DETECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CHM File Magic Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIN-EXE-DOWNLOAD.html">HTTP:STC:DL:WIN-EXE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Executable Download 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIN-GDI-METAFILE.html">HTTP:STC:DL:WIN-GDI-METAFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDI Metafile Image Handling Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIN-MAL-COMP-FILE.html">HTTP:STC:DL:WIN-MAL-COMP-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Compressed Folder File Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIN-MEDIA-PLY-MC.html">HTTP:STC:DL:WIN-MEDIA-PLY-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player K-Lite Codec Pack Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWINAMP-MAL-PLS.html">HTTP:STC:DL:WINAMP-MAL-PLS</a></b></td>
   <td width="500" valign="top">
    HTTP: Nullsoft Winamp Malformed Playlist File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWINASM-STUDIO-BOF1.html">HTTP:STC:DL:WINASM-STUDIO-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAsm Studio wap Project File Heap-Based Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWINRAR-FILE.html">HTTP:STC:DL:WINRAR-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: WinRAR Compressed File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWINVERIFY-TRUST.html">HTTP:STC:DL:WINVERIFY-TRUST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows WinVerifyTrust Signature Validation Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIRELURKER-DOWNLOAD.html">HTTP:STC:DL:WIRELURKER-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WireLurker Suspicious File Download Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWJ-2015-1697-CE.html">HTTP:STC:DL:WJ-2015-1697-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1697 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWJ-CVE-2015-1696-CE.html">HTTP:STC:DL:WJ-CVE-2015-1696-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1696 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWMF-HEAPOF.html">HTTP:STC:DL:WMF-HEAPOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Metafile Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWMF-IO.html">HTTP:STC:DL:WMF-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDIplus WMF Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWMP-DVR-MS.html">HTTP:STC:DL:WMP-DVR-MS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player DVR-MS File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWMP-SKIN-DECOMP.html">HTTP:STC:DL:WMP-SKIN-DECOMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player Skin Decompression Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWMP-SKIN-PARSE.html">HTTP:STC:DL:WMP-SKIN-PARSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player Skin Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWNDPROC-INFO-DISC.html">HTTP:STC:DL:WNDPROC-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft wndproc Credentials Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWNDPROC-INFO-DISC1.html">HTTP:STC:DL:WNDPROC-INFO-DISC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft wndproc Credentials Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-ARRAY-DATA.html">HTTP:STC:DL:WORD-ARRAY-DATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Array Data Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-BOF.html">HTTP:STC:DL:WORD-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word Malformed File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-BOOKMARK-OF.html">HTTP:STC:DL:WORD-BOOKMARK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Word Document Bookmark Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-CLSID.html">HTTP:STC:DL:WORD-CLSID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Dangerous Embedded ClassID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-CMAJ.html">HTTP:STC:DL:WORD-CMAJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word sprmCMajority Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-CONV-INT-OF.html">HTTP:STC:DL:WORD-CONV-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPad and Office Text converter Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-DOC-BOF.html">HTTP:STC:DL:WORD-DOC-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Document Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-DPENDGROUP.html">HTTP:STC:DL:WORD-DPENDGROUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF Mismatched dpendgroup Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-DPPOLYCOUNT.html">HTTP:STC:DL:WORD-DPPOLYCOUNT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word dppolycount RTF Control Word Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-FILE-MEM.html">HTTP:STC:DL:WORD-FILE-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Multiple File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-FONT.html">HTTP:STC:DL:WORD-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Font Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-FONT1.html">HTTP:STC:DL:WORD-FONT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Font Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-GLOBAL-INDEX.html">HTTP:STC:DL:WORD-GLOBAL-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Global Array Index Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-IND.html">HTTP:STC:DL:WORD-IND</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Malformed Index Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-LINK-OBJ.html">HTTP:STC:DL:WORD-LINK-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word HTML Linked Objects Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-LISTOVERRIDE.html">HTTP:STC:DL:WORD-LISTOVERRIDE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF listoverridecount Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-MAL-DOC.html">HTTP:STC:DL:WORD-MAL-DOC</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed Microsoft Word File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-MAL-INDEX.html">HTTP:STC:DL:WORD-MAL-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Index Parsing Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-MEM-CORR.html">HTTP:STC:DL:WORD-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Documents Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-MEM-CORR1.html">HTTP:STC:DL:WORD-MEM-CORR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Documents Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-PPAX.html">HTTP:STC:DL:WORD-PPAX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word PAPX Section Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-REC-LEN-OF.html">HTTP:STC:DL:WORD-REC-LEN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Record Parsing Length Field Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-REC-LEN-OF1.html">HTTP:STC:DL:WORD-REC-LEN-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Record Parsing Length Field Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-RTF-CONTROL.html">HTTP:STC:DL:WORD-RTF-CONTROL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word dpcallout RTF Control Word Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-RTF-MEM.html">HTTP:STC:DL:WORD-RTF-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-RTF-RCE.html">HTTP:STC:DL:WORD-RTF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SECTION-OF.html">HTTP:STC:DL:WORD-SECTION-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Section Table Array Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SECTION-OF1.html">HTTP:STC:DL:WORD-SECTION-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Section Table Array Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SMART-TAGS.html">HTTP:STC:DL:WORD-SMART-TAGS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Smart Tags Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SMARTTAG.html">HTTP:STC:DL:WORD-SMARTTAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Crafted SmartTag Record Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SPRM-MEM.html">HTTP:STC:DL:WORD-SPRM-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Crafted Sprm Structure Stack Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SPRMDEFTABLE.html">HTTP:STC:DL:WORD-SPRMDEFTABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice.org Microsoft Word File Processing sprmTDefTable Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SPRMTDIAGLINE.html">HTTP:STC:DL:WORD-SPRMTDIAGLINE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word sprmTDiagLine80 Record Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-SPRMTSETBRC.html">HTTP:STC:DL:WORD-SPRMTSETBRC</a></b></td>
   <td width="500" valign="top">
    HTTP: OpenOffice.org Microsoft Word File sprmTSetBrc Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-STRING.html">HTTP:STC:DL:WORD-STRING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Malformed String Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-STSH-RCE.html">HTTP:STC:DL:WORD-STSH-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word STSH Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-STYLE-EXEC.html">HTTP:STC:DL:WORD-STYLE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word Cascading Style Sheet Processing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-STYLESHEET-MEM.html">HTTP:STC:DL:WORD-STYLESHEET-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF Stylesheet Control Word Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-TEXTBOX.html">HTTP:STC:DL:WORD-TEXTBOX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word TextBox Sub-document Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-WEBAPPS-RCE.html">HTTP:STC:DL:WORD-WEBAPPS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word and Office Web Apps Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORDPAD-BO.html">HTTP:STC:DL:WORDPAD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft WordPad Word 97 Text Converter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORDPAD-FONT-CONV.html">HTTP:STC:DL:WORDPAD-FONT-CONV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Wordpad Font Conversion Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORDPAD-PRL.html">HTTP:STC:DL:WORDPAD-PRL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Wordpad PRL Structures Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORKS-WPS-OF.html">HTTP:STC:DL:WORKS-WPS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Works File Converter WPS File Field Length Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWP5-FILE.html">HTTP:STC:DL:WP5-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPerfect 5.x Document Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWPD-BO.html">HTTP:STC:DL:WPD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word and WordPerfect Converter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWPD-WP3-TABLE-BO.html">HTTP:STC:DL:WPD-WP3-TABLE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendor libwpd WP3TablesGroup Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWPS-HEAP-OF.html">HTTP:STC:DL:WPS-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office WPS Converter Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXBM-BO.html">HTTP:STC:DL:XBM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox XBM Image Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXENORATE-XPL-BOF.html">HTTP:STC:DL:XENORATE-XPL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Xenorate Multimedia Player XPL FIle Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXL-CVE-2013-1315.html">HTTP:STC:DL:XL-CVE-2013-1315</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2013-1315 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-2015-2375-ID.html">HTTP:STC:DL:XLS-2015-2375-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-2375 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-ARR-INDEX.html">HTTP:STC:DL:XLS-ARR-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Array Indexing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-AXISPARENT.html">HTTP:STC:DL:XLS-AXISPARENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Axisparent Record Index Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-BIFF-MC.html">HTTP:STC:DL:XLS-BIFF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel File Format Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-BIFF-REC-RCE.html">HTTP:STC:DL:XLS-BIFF-REC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Formula Biff Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-BIN-OF.html">HTTP:STC:DL:XLS-BIN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Binary Format Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-BOUNDSHEET.html">HTTP:STC:DL:XLS-BOUNDSHEET</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed BoundSheet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-BUFF-OR.html">HTTP:STC:DL:XLS-BUFF-OR</a></b></td>
   <td width="500" valign="top">
    HTTP: Excel Buffer Overwrite Vulnerability 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-CF-BIFF.html">HTTP:STC:DL:XLS-CF-BIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed CF BIFF Record
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-CHART-OBJ.html">HTTP:STC:DL:XLS-CHART-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Chart Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-COLUMN-RECORD.html">HTTP:STC:DL:XLS-COLUMN-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Column Record Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-DATA-INIT.html">HTTP:STC:DL:XLS-DATA-INIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Excel Data Initialization Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-DATA-RECORD.html">HTTP:STC:DL:XLS-DATA-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Data Validation Record Processing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-DBORPARAMQRY.html">HTTP:STC:DL:XLS-DBORPARAMQRY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel DbOrParamQry Record Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-DRAWING-REC.html">HTTP:STC:DL:XLS-DRAWING-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Drawing Record msofbtOPT Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FEATHEADER.html">HTTP:STC:DL:XLS-FEATHEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Featheader Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FIELD-MC.html">HTTP:STC:DL:XLS-FIELD-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Unexpected Field Value Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FILE-HNDL.html">HTTP:STC:DL:XLS-FILE-HNDL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel File Handling Code Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FILE-IMPORT.html">HTTP:STC:DL:XLS-FILE-IMPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel File Importing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FILTER-REC.html">HTTP:STC:DL:XLS-FILTER-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Filter Records Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FNGROUPNAME.html">HTTP:STC:DL:XLS-FNGROUPNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel FNGROUPNAME Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FORMAT-ARRAY.html">HTTP:STC:DL:XLS-FORMAT-ARRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel FORMAT Record Array Index Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FORMULA-BIFF.html">HTTP:STC:DL:XLS-FORMULA-BIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Excel Formula Biff Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FRTWRAPPER.html">HTTP:STC:DL:XLS-FRTWRAPPER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel FRTWrapper Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-FRTWRAPPER1.html">HTTP:STC:DL:XLS-FRTWRAPPER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel FRTWrapper Record Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-HEAP-OF.html">HTTP:STC:DL:XLS-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Heap Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-HFPICT.html">HTTP:STC:DL:XLS-HFPICT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel HFPicture Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-HFPICTURE-REC.html">HTTP:STC:DL:XLS-HFPICTURE-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel 2002 Malformed HFPicture Record
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-IMDATA.html">HTTP:STC:DL:XLS-IMDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed IMDATA Record Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-INDEX.html">HTTP:STC:DL:XLS-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Index Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-INT-OR.html">HTTP:STC:DL:XLS-INT-OR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Integer Overrun Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-INT-OR1.html">HTTP:STC:DL:XLS-INT-OR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Integer Overrun Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-INV-DRAW.html">HTTP:STC:DL:XLS-INV-DRAW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Invalid Drawing Object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-LBL-RECORD.html">HTTP:STC:DL:XLS-LBL-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Lbl record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-LINKED-LIST.html">HTTP:STC:DL:XLS-LINKED-LIST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Linked List Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MAL-OBJ.html">HTTP:STC:DL:XLS-MAL-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Malformed Object Record Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MAL-REC-MC.html">HTTP:STC:DL:XLS-MAL-REC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Malformed Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MAL-RTD-REC.html">HTTP:STC:DL:XLS-MAL-RTD-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel RTD Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MBOF.html">HTTP:STC:DL:XLS-MBOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Multiple Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MDSXET-REC.html">HTTP:STC:DL:XLS-MDSXET-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel MDXSET Record Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MDXTUPLE-BIFF.html">HTTP:STC:DL:XLS-MDXTUPLE-BIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel MDXTUPLE Record Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MERGECELLS-OF.html">HTTP:STC:DL:XLS-MERGECELLS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel MergeCells Record Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MOD-BYTES.html">HTTP:STC:DL:XLS-MOD-BYTES</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Modified Bytes Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MS-OGRAPH.html">HTTP:STC:DL:XLS-MS-OGRAPH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed MS-OGRAPH Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-MSOFBTOPT.html">HTTP:STC:DL:XLS-MSOFBTOPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Drawing Object Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-NAMED-GRAPH.html">HTTP:STC:DL:XLS-NAMED-GRAPH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel BIFF File Format Named Graph Record Parsing Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-NULL-PTR.html">HTTP:STC:DL:XLS-NULL-PTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Null Pointer Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-NULL-PTR1.html">HTTP:STC:DL:XLS-NULL-PTR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Null Pointer Exploit1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-OBJ-BIFF.html">HTTP:STC:DL:XLS-OBJ-BIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Obj BIFF Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-OBJ-RECORD.html">HTTP:STC:DL:XLS-OBJ-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed OBJ Records Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-OBJECTLINK.html">HTTP:STC:DL:XLS-OBJECTLINK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel OBJECTLINK Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-OFFICE-DRAWING.html">HTTP:STC:DL:XLS-OFFICE-DRAWING</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Office Drawing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-PALETTE.html">HTTP:STC:DL:XLS-PALETTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Palette Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-PIC-REC-MC.html">HTTP:STC:DL:XLS-PIC-REC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Crafted Picture Record Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-PIVOT.html">HTTP:STC:DL:XLS-PIVOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Pivot Item Index Boundary Error Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-PUB-REC.html">HTTP:STC:DL:XLS-PUB-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Publisher Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-REPT.html">HTTP:STC:DL:XLS-REPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel REPT Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-RTWINDOW.html">HTTP:STC:DL:XLS-RTWINDOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-RTWINDOW1.html">HTTP:STC:DL:XLS-RTWINDOW1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SCENARIO.html">HTTP:STC:DL:XLS-SCENARIO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Scenario Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SELECTION.html">HTTP:STC:DL:XLS-SELECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Selection Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES.html">HTTP:STC:DL:XLS-SERIES</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES-TYPE-RC1.html">HTTP:STC:DL:XLS-SERIES-TYPE-RC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES-TYPE-RCE.html">HTTP:STC:DL:XLS-SERIES-TYPE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES1.html">HTTP:STC:DL:XLS-SERIES1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES2.html">HTTP:STC:DL:XLS-SERIES2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES3.html">HTTP:STC:DL:XLS-SERIES3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES4.html">HTTP:STC:DL:XLS-SERIES4</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES5.html">HTTP:STC:DL:XLS-SERIES5</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES6.html">HTTP:STC:DL:XLS-SERIES6</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES7.html">HTTP:STC:DL:XLS-SERIES7</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES8.html">HTTP:STC:DL:XLS-SERIES8</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SERIES9.html">HTTP:STC:DL:XLS-SERIES9</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed Series Record Remote Code Execution9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SET-FONT.html">HTTP:STC:DL:XLS-SET-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Set Font Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SHEET-NAME.html">HTTP:STC:DL:XLS-SHEET-NAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Sheet Name Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SHEET-OBJ.html">HTTP:STC:DL:XLS-SHEET-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Sheet Object Type Confusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SHRFMLA.html">HTTP:STC:DL:XLS-SHRFMLA</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Shrfmla Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SLK-PICTURE-RCE.html">HTTP:STC:DL:XLS-SLK-PICTURE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel SLK File Malformed Picture Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SST.html">HTTP:STC:DL:XLS-SST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel File SST Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SST-REC-MC.html">HTTP:STC:DL:XLS-SST-REC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Crafted SST Record Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-STYLE-RECORD.html">HTTP:STC:DL:XLS-STYLE-RECORD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Style Record Data Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXDB.html">HTTP:STC:DL:XLS-SXDB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel SXDB Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXLI-MC.html">HTTP:STC:DL:XLS-SXLI-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel SXLI Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXSTREAMID.html">HTTP:STC:DL:XLS-SXSTREAMID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel SxView SXStreamID Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXSTREAMID1.html">HTTP:STC:DL:XLS-SXSTREAMID1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel SxView SXStreamID Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXVIEW.html">HTTP:STC:DL:XLS-SXVIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel SxView Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-SXVIEW-REC.html">HTTP:STC:DL:XLS-SXVIEW-REC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel SxView Record Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-VBOBJ-RCE.html">HTTP:STC:DL:XLS-VBOBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel VisualBasic Object Validation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-VERSIONINFO.html">HTTP:STC:DL:XLS-VERSIONINFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Version Information Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-WINDOW2.html">HTTP:STC:DL:XLS-WINDOW2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Window2 Record Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-WOPT.html">HTTP:STC:DL:XLS-WOPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel WOPT Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-WORKSPACE-DES.html">HTTP:STC:DL:XLS-WORKSPACE-DES</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Workbook Workspace Designation Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-WORKSPACE-IDX.html">HTTP:STC:DL:XLS-WORKSPACE-IDX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Workspace Index Value Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-WRITEAV.html">HTTP:STC:DL:XLS-WRITEAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Record Parsing WriteAV Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-XF-BIFF.html">HTTP:STC:DL:XLS-XF-BIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Malformed XF BIFF Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-XISPARENT.html">HTTP:STC:DL:XLS-XISPARENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Xisparent Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-XML-ZIP.html">HTTP:STC:DL:XLS-XML-ZIP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel XLSX File XML Decompression Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLW-MEM-CORR.html">HTTP:STC:DL:XLW-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXNVIEW-PCT-FILE-BOF.html">HTTP:STC:DL:XNVIEW-PCT-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: XnView PCT File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXORG-PCF-BO.html">HTTP:STC:DL:XORG-PCF-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: X.Org X Server PCF Font Parser Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AZIP-FILE.html">HTTP:STC:DL:ZIP-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: ZIP Compressed File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AZIP-FOR-MEDIA.html">HTTP:STC:DL:ZIP-FOR-MEDIA</a></b></td>
   <td width="500" valign="top">
    HTTP: Compressed File Downloaded for Media File Requested
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOT-NET-ARRAY-RCE.html">HTTP:STC:DOT-NET-ARRAY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: .Net Array Access Violation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOT-NET-RCE.html">HTTP:STC:DOT-NET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOT-NET-REFLECTION.html">HTTP:STC:DOT-NET-REFLECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Reflection Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC.html">HTTP:STC:DOTNET-BUFF-ALLOC</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC1.html">HTTP:STC:DOTNET-BUFF-ALLOC1</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC2.html">HTTP:STC:DOTNET-BUFF-ALLOC2</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC3.html">HTTP:STC:DOTNET-BUFF-ALLOC3</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC4.html">HTTP:STC:DOTNET-BUFF-ALLOC4</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC5.html">HTTP:STC:DOTNET-BUFF-ALLOC5</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC6.html">HTTP:STC:DOTNET-BUFF-ALLOC6</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC7.html">HTTP:STC:DOTNET-BUFF-ALLOC7</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC8.html">HTTP:STC:DOTNET-BUFF-ALLOC8</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-BUFF-ALLOC9.html">HTTP:STC:DOTNET-BUFF-ALLOC9</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET Framework Buffer Allocation Vulnerability9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-FRAMEWORK-RCE.html">HTTP:STC:DOTNET-FRAMEWORK-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Serialization Vulnerablity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-SERIALIZATION.html">HTTP:STC:DOTNET-SERIALIZATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework Serialization Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-WINFORMS-RCE.html">HTTP:STC:DOTNET-WINFORMS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework WinForms Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOTNET-XML-SIG-SPOOF.html">HTTP:STC:DOTNET-XML-SIG-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: .NET XML Digital Signature Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AEMBED-SRC-OF.html">HTTP:STC:EMBED-SRC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Overlarge EMBED Tag Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFAX-COVER-MC.html">HTTP:STC:FAX-COVER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Fax Services Cover Page Editor Double Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFF-NAV-URI.html">HTTP:STC:FF-NAV-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox and Navigator URI Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFF-SRIALIZE-STREAM-UAF.html">HTTP:STC:FF-SRIALIZE-STREAM-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox SerializeStream Heap Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFILE-UPLOAD.html">HTTP:STC:FILE-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser File Upload Keystroke Hijack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFILE-UTF7.html">HTTP:STC:FILE-UTF7</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Client UTF-7 File Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AFIREPHP-COMMAND-EXEC.html">HTTP:STC:FIREPHP-COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: FirePHPArbitrary CreateInstance Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AGIT-CLIENT-CE.html">HTTP:STC:GIT-CLIENT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: GitHub Git Tree Handling Overwrite Arbitrary Command Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AGOOGLE-APP-MAILTO.html">HTTP:STC:GOOGLE-APP-MAILTO</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Apps URI Argument Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AGOOGLE-CHROME-UAF.html">HTTP:STC:GOOGLE-CHROME-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome StyleElement() Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AGOOGLE-SKETCHUP-PICT.html">HTTP:STC:GOOGLE-SKETCHUP-PICT</a></b></td>
   <td width="500" valign="top">
    HTTP: Google SketchUp PICT File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHEADER-UTF7.html">HTTP:STC:HEADER-UTF7</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Client UTF-7 Content-Type Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHHP-BINARY.html">HTTP:STC:HHP-BINARY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help Workshop File With Binary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHHP-PARA-OF.html">HTTP:STC:HHP-PARA-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft HTML Help Workshop Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHIDDEN-IFRAME.html">HTTP:STC:HIDDEN-IFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Hidden IFrame in HTML
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHIDDEN-IFRAME-2.html">HTTP:STC:HIDDEN-IFRAME-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Hidden IFrame Injection Javascript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHPJ-OPTIONS.html">HTTP:STC:HPJ-OPTIONS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Help Workshop HPJ OPTIONS Section Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHSC%3AHCP-QUOTE-SCRIPT.html">HTTP:STC:HSC:HCP-QUOTE-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: HSC HCP URL Quote Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AHSC%3AMS-HSC-URL-VLN.html">HTTP:STC:HSC:MS-HSC-URL-VLN</a></b></td>
   <td width="500" valign="top">
    HTTP: HSC DVDUpgrade Input Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIBM-IIM-URI-EXEC.html">HTTP:STC:IBM-IIM-URI-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Installation Manager iim URI Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE-INDEX.html">HTTP:STC:IE-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Index URL Parsing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE-STREAM-HDR.html">HTTP:STC:IE-STREAM-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Stream Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-CVE-2014-0275-MC.html">HTTP:STC:IE:10-CVE-2014-0275-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0275 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-CVE2014-2804-UAF.html">HTTP:STC:IE:10-CVE2014-2804-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 CVE-2014-2804 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-INT-OVF.html">HTTP:STC:IE:10-INT-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-MEM-CORRUPTION.html">HTTP:STC:IE:10-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJ-DEL-UAF.html">HTTP:STC:IE:10-OBJ-DEL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Deletion Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJDEL-UAF.html">HTTP:STC:IE:10-OBJDEL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Deletion Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJECT-MC.html">HTTP:STC:IE:10-OBJECT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJECT-RCE.html">HTTP:STC:IE:10-OBJECT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJHANDLING-UAF.html">HTTP:STC:IE:10-OBJHANDLING-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-UAF.html">HTTP:STC:IE:10-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-UAF-MC.html">HTTP:STC:IE:10-UAF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-UAF1.html">HTTP:STC:IE:10-UAF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Use After Free1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A11-CVE-2014-0304-MC.html">HTTP:STC:IE:11-CVE-2014-0304-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 CVE-2014-0304 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A2014-1751-MEM-CORR.html">HTTP:STC:IE:2014-1751-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1751 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A2014-6340-INFO-DIS.html">HTTP:STC:IE:2014-6340-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Info Disc CVE-2014-6340
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-10-MEM-CORRUPTION.html">HTTP:STC:IE:6-10-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-10-USE-AFTER-FREE.html">HTTP:STC:IE:6-10-USE-AFTER-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-11-UAF.html">HTTP:STC:IE:6-11-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6-11 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-7-UAF-RCE.html">HTTP:STC:IE:6-7-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6 and 7 Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6.0-FOR-LOOP-DOS.html">HTTP:STC:IE:6.0-FOR-LOOP-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed JavaScript for Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A7-10-MEM-CORRUPTION.html">HTTP:STC:IE:7-10-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A7-CVE-2014-1752-RCE.html">HTTP:STC:IE:7-CVE-2014-1752-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 CVE-2014-1752 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A7-LOC-DATA-URI-DOS.html">HTTP:STC:IE:7-LOC-DATA-URI-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer data URI Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-10-MEM-CORR.html">HTTP:STC:IE:8-10-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2013-3163)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-10-MEM-CORRUPTION.html">HTTP:STC:IE:8-10-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3144 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-CTREENODE-UAF.html">HTTP:STC:IE:8-CTREENODE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 CTreeNode Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-CVE-2014-0278-MC.html">HTTP:STC:IE:8-CVE-2014-0278-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 CVE-2014-0278 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-CVE-2014-0279-MC.html">HTTP:STC:IE:8-CVE-2014-0279-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 CVE-2014-0279 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-OBJ-MC.html">HTTP:STC:IE:8-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-OBJECT-MC.html">HTTP:STC:IE:8-OBJECT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Object Memory Corruption (CVE-2013-3139)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-UAF-RCE.html">HTTP:STC:IE:8-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Use After Free Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-MC.html">HTTP:STC:IE:9-10-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Internet Explorer Memory Corruption (CVE-2013-3191)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-MEM-CORRUPTION.html">HTTP:STC:IE:9-10-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-OBJERR-UAF.html">HTTP:STC:IE:9-10-OBJERR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 and 10 Improper Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MAL-HTML-DOS.html">HTTP:STC:IE:9-MAL-HTML-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malicious HTML Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MC-RCE.html">HTTP:STC:IE:9-MC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MEM-CORR.html">HTTP:STC:IE:9-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MEMCORRUPT-DOS.html">HTTP:STC:IE:9-MEMCORRUPT-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-NULL-BYTE-DISC.html">HTTP:STC:IE:9-NULL-BYTE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Null Byte Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-CE.html">HTTP:STC:IE:9-UAF-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-MEM-CORR.html">HTTP:STC:IE:9-UAF-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-RCE.html">HTTP:STC:IE:9-UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UNINITVARS-UAF.html">HTTP:STC:IE:9-UNINITVARS-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Uninitialized Variables Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-USE-AFTER-FREE.html">HTTP:STC:IE:9-USE-AFTER-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AACCESS-BYPASS-ID.html">HTTP:STC:IE:ACCESS-BYPASS-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Clipboard Access Restriction Bypass Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AADDRBAR-SPOOF-2.html">HTTP:STC:IE:ADDRBAR-SPOOF-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Address Bar Spoofing (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AADDRBOOK-OBJ-DOS.html">HTTP:STC:IE:ADDRBOOK-OBJ-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Address Book Object Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AANCHOR-URL-SPOOF.html">HTTP:STC:IE:ANCHOR-URL-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Nested Anchor Tag Confusion Status Bar Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AANIMATEMOTION.html">HTTP:STC:IE:ANIMATEMOTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer ANIMATEMOTION Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AANIMATION-RCE.html">HTTP:STC:IE:ANIMATION-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Animation Behavior Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AANTIXSS-INFO-DISC.html">HTTP:STC:IE:ANTIXSS-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Anti-XSS Library Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AAPPLYELEMENT-UAF.html">HTTP:STC:IE:APPLYELEMENT-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer applyElement Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AASLR-BYPASS-RCE.html">HTTP:STC:IE:ASLR-BYPASS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer ASLR Security Bypass Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AATTR-RM-RCE.html">HTTP:STC:IE:ATTR-RM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Attribute remove vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AAUTH-REFLECTION.html">HTTP:STC:IE:AUTH-REFLECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer and HTTP Services Authentication Reflection Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ABGSOUND-TAG.html">HTTP:STC:IE:BGSOUND-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &lt;BGSOUND&gt; Tag NetBIOS Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ABOUNDELEMENTS.html">HTTP:STC:IE:BOUNDELEMENTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer boundElements Uninitialized Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACACHE-CLIPDATA.html">HTTP:STC:IE:CACHE-CLIPDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cache clipboardData
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACACHE-CREATERANGE.html">HTTP:STC:IE:CACHE-CREATERANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cache createRange
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACACHE-EXTERNAL.html">HTTP:STC:IE:CACHE-EXTERNAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cache External
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACACHE-SMDIALOG.html">HTTP:STC:IE:CACHE-SMDIALOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cache showModalDialog
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACACHED-OBJ-RCE.html">HTTP:STC:IE:CACHED-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Cached Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACCARET-UAF.html">HTTP:STC:IE:CCARET-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CCaret Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACDISPNODE-UAF.html">HTTP:STC:IE:CDISPNODE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 CDispNode Use After Free Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACDO-IN-HEADER.html">HTTP:STC:IE:CDO-IN-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CDO Protocol URI in Web Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACELEMENT-RCE.html">HTTP:STC:IE:CELEMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CElement Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACENTER-ELE-RCE.html">HTTP:STC:IE:CENTER-ELE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Center Element Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACFLATMARKUPPOINTER.html">HTTP:STC:IE:CFLATMARKUPPOINTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE CFlatMarkupPointer Object Handling Use-after-free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACFORMELEMENT-RCE.html">HTTP:STC:IE:CFORMELEMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CFormElement Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACHAN-SCRIPT.html">HTTP:STC:IE:CHAN-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Script in CHANNEL Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACHTML-UAF.html">HTTP:STC:IE:CHTML-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CHTML Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACIR-REF.html">HTTP:STC:IE:CIR-REF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Circular Reference of Elements
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACLEMENT-UAF.html">HTTP:STC:IE:CLEMENT-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CElement User After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACLIP-MEM.html">HTTP:STC:IE:CLIP-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Clip Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACLONE-REF-CORRUPT.html">HTTP:STC:IE:CLONE-REF-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Clone Object Reference Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACLONENODE-RCE.html">HTTP:STC:IE:CLONENODE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer cloneNode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACMARKUP-UAF.html">HTTP:STC:IE:CMARKUP-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-0020 CMarkup Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACMARKUPBEHAVIOR-UAF.html">HTTP:STC:IE:CMARKUPBEHAVIOR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CMarkupBehaviorContext Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACMSHTMLED-UAF.html">HTTP:STC:IE:CMSHTMLED-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CMshtmlEd Use After Free Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOBJECT-ELE-UAF.html">HTTP:STC:IE:COBJECT-ELE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CObjectElement Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACODE-EXECUTION.html">HTTP:STC:IE:CODE-EXECUTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOL-SPAN.html">HTTP:STC:IE:COL-SPAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Col Span Double free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOL-TAG-CACHE.html">HTTP:STC:IE:COL-TAG-CACHE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Table Layout Col Tag Cache Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOLLECTGARBAGE-B64.html">HTTP:STC:IE:COLLECTGARBAGE-B64</a></b></td>
   <td width="500" valign="top">
    HTTP: CollectGarbage In Base64 String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOLORBALANCE.html">HTTP:STC:IE:COLORBALANCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Invalid ColorBalance
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOMPINST-OF.html">HTTP:STC:IE:COMPINST-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &quot;isComponentInstalled()&quot; Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOMPRESSED-URL.html">HTTP:STC:IE:COMPRESSED-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Compressed Content URL Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOMWINDOWPROXY-UAF.html">HTTP:STC:IE:COMWINDOWPROXY-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer COmWindowProxy Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACONT-LOC-ZON-BYPASS.html">HTTP:STC:IE:CONT-LOC-ZON-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Content Location Security Zone Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOPY-PASTE-INFODISC.html">HTTP:STC:IE:COPY-PASTE-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Copy And Paste Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACPASTECOMMAND.html">HTTP:STC:IE:CPASTECOMMAND</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CPasteCommand Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACQUOTES-OBJECT-CE.html">HTTP:STC:IE:CQUOTES-OBJECT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE CQuotes Object Handling Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACRAFTED-WEB-CE.html">HTTP:STC:IE:CRAFTED-WEB-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Crafted Web Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACREATETEXTRANGE.html">HTTP:STC:IE:CREATETEXTRANGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &quot;createTextRange()&quot; Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACREATETEXTRANGE-2.html">HTTP:STC:IE:CREATETEXTRANGE-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &quot;createTextRange()&quot; Code Execution (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACROSS-DOMAIN-INFO.html">HTTP:STC:IE:CROSS-DOMAIN-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cross Domain Information Disclosure (CVE-2006-3280)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACROSS-FRAME-SCRIPT.html">HTTP:STC:IE:CROSS-FRAME-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cross Frame Scripting Restriction Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSHADOW-RCE.html">HTTP:STC:IE:CSHADOW-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE CShadow Function Integer Overflow Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSRSS-HE-MSG.html">HTTP:STC:IE:CSRSS-HE-MSG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CSRSS HardError Message Box Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-HEAP.html">HTTP:STC:IE:CSS-HEAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Processor Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-IMPORT.html">HTTP:STC:IE:CSS-IMPORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Import Use-After-Free Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-MEMORY-CORRUPT.html">HTTP:STC:IE:CSS-MEMORY-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-OF.html">HTTP:STC:IE:CSS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-PROPERTY-METHOD.html">HTTP:STC:IE:CSS-PROPERTY-METHOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Property Method Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-PSEUDO-UAF.html">HTTP:STC:IE:CSS-PSEUDO-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Pseudo Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-RACE-CE.html">HTTP:STC:IE:CSS-RACE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CSS Race Condition Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-XDOM-DISC.html">HTTP:STC:IE:CSS-XDOM-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CSS Cross-Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSS-XSS.html">HTTP:STC:IE:CSS-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Cross-Site-Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACTABLE-RCE.html">HTTP:STC:IE:CTABLE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Ctable Access Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACTREENODE-UAF.html">HTTP:STC:IE:CTREENODE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTreeNode Use After Free 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACTREEPOS-RCE.html">HTTP:STC:IE:CTREEPOS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTreePos Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2008-2256-MC.html">HTTP:STC:IE:CVE-2008-2256-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Memory Corruption (CVE-2008-2256)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2008-4258-MC.html">HTTP:STC:IE:CVE-2008-4258-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2008-4258 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2012-1877-CE.html">HTTP:STC:IE:CVE-2012-1877-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2012-1877 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2012-6502-INFO.html">HTTP:STC:IE:CVE-2012-6502-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3115-MC.html">HTTP:STC:IE:CVE-2013-3115-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3115 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3153-MC.html">HTTP:STC:IE:CVE-2013-3153-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3153 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3188-MC.html">HTTP:STC:IE:CVE-2013-3188-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3188 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3189-MC.html">HTTP:STC:IE:CVE-2013-3189-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3189 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3194-UAF.html">HTTP:STC:IE:CVE-2013-3194-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3194 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3199-CE.html">HTTP:STC:IE:CVE-2013-3199-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3199 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3207-UAF.html">HTTP:STC:IE:CVE-2013-3207-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3207 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3208-UAF.html">HTTP:STC:IE:CVE-2013-3208-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3208 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3209-UAF.html">HTTP:STC:IE:CVE-2013-3209-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3209 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3845-UAF.html">HTTP:STC:IE:CVE-2013-3845-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3845 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3871-MC.html">HTTP:STC:IE:CVE-2013-3871-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Internet Explorer Memory Corruption (CVE-2013-3871)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3873-MC.html">HTTP:STC:IE:CVE-2013-3873-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3873 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3874-UAF.html">HTTP:STC:IE:CVE-2013-3874-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3874 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3875-MC.html">HTTP:STC:IE:CVE-2013-3875-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3875 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3885-UAF.html">HTTP:STC:IE:CVE-2013-3885-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 CVE-2013-3885 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3908-DISC.html">HTTP:STC:IE:CVE-2013-3908-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3908 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3910-UAF.html">HTTP:STC:IE:CVE-2013-3910-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3910 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3911-MC.html">HTTP:STC:IE:CVE-2013-3911-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3911 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3912-RCE.html">HTTP:STC:IE:CVE-2013-3912-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3912 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3914-MC.html">HTTP:STC:IE:CVE-2013-3914-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3914 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3916-RCE.html">HTTP:STC:IE:CVE-2013-3916-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3916 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3917-UAF.html">HTTP:STC:IE:CVE-2013-3917-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3917 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5047-UAF.html">HTTP:STC:IE:CVE-2013-5047-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5047 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5048-MC.html">HTTP:STC:IE:CVE-2013-5048-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5048 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5049-MC.html">HTTP:STC:IE:CVE-2013-5049-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5049 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5051-MC.html">HTTP:STC:IE:CVE-2013-5051-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5051 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5052-MC.html">HTTP:STC:IE:CVE-2013-5052-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object&#39;s Dangling Pointer Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5056-UAF.html">HTTP:STC:IE:CVE-2013-5056-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5056 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0263-MC.html">HTTP:STC:IE:CVE-2014-0263-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0263 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0267-MC.html">HTTP:STC:IE:CVE-2014-0267-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0267 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0267-MC1.html">HTTP:STC:IE:CVE-2014-0267-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0267 Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0269-MC.html">HTTP:STC:IE:CVE-2014-0269-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0269 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0270-UAF.html">HTTP:STC:IE:CVE-2014-0270-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0270 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0271-MC.html">HTTP:STC:IE:CVE-2014-0271-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0271 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0272-MC.html">HTTP:STC:IE:CVE-2014-0272-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0272 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0273-MC.html">HTTP:STC:IE:CVE-2014-0273-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0273 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0274-MC.html">HTTP:STC:IE:CVE-2014-0274-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0274 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0276-MC.html">HTTP:STC:IE:CVE-2014-0276-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-0276)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0277-MC.html">HTTP:STC:IE:CVE-2014-0277-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0277 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0281-MC.html">HTTP:STC:IE:CVE-2014-0281-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0281 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0282-UAF.html">HTTP:STC:IE:CVE-2014-0282-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0282 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0283-MC.html">HTTP:STC:IE:CVE-2014-0283-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0283 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0284-MC.html">HTTP:STC:IE:CVE-2014-0284-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0284 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0285-MC.html">HTTP:STC:IE:CVE-2014-0285-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0285 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0286-MC.html">HTTP:STC:IE:CVE-2014-0286-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-0286)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0287-MC.html">HTTP:STC:IE:CVE-2014-0287-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0287 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0288-MC.html">HTTP:STC:IE:CVE-2014-0288-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0288 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0289-MC.html">HTTP:STC:IE:CVE-2014-0289-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0289 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0290-MC.html">HTTP:STC:IE:CVE-2014-0290-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0290 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0297-MC.html">HTTP:STC:IE:CVE-2014-0297-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0297 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0298-UAF.html">HTTP:STC:IE:CVE-2014-0298-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0298 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0299-RCE.html">HTTP:STC:IE:CVE-2014-0299-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0299 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0302-MC.html">HTTP:STC:IE:CVE-2014-0302-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0302 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0303-MC.html">HTTP:STC:IE:CVE-2014-0303-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0303 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0305-MC.html">HTTP:STC:IE:CVE-2014-0305-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-030 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0306-RCE.html">HTTP:STC:IE:CVE-2014-0306-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0306 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0307-MC.html">HTTP:STC:IE:CVE-2014-0307-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0307 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0309-MC.html">HTTP:STC:IE:CVE-2014-0309-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0309 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0310-MC.html">HTTP:STC:IE:CVE-2014-0310-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0310 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0311-UAF.html">HTTP:STC:IE:CVE-2014-0311-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0311 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0312-RCE.html">HTTP:STC:IE:CVE-2014-0312-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0312 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0313-BOF.html">HTTP:STC:IE:CVE-2014-0313-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0314-MC.html">HTTP:STC:IE:CVE-2014-0314-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0314 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0322-UAF.html">HTTP:STC:IE:CVE-2014-0322-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0322 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0324-MC.html">HTTP:STC:IE:CVE-2014-0324-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0324 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1753-MC.html">HTTP:STC:IE:CVE-2014-1753-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1753 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1755-MC.html">HTTP:STC:IE:CVE-2014-1755-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1755 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1762-MC.html">HTTP:STC:IE:CVE-2014-1762-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1762 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1762-MC1.html">HTTP:STC:IE:CVE-2014-1762-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1762 Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1765-RCE.html">HTTP:STC:IE:CVE-2014-1765-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1765 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1766-UAF.html">HTTP:STC:IE:CVE-2014-1766-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1766 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1772-MC.html">HTTP:STC:IE:CVE-2014-1772-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer  CVE-2014-1772 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1775-UAF.html">HTTP:STC:IE:CVE-2014-1775-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer behavior Property CVE-2014-1775 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1785-UAF.html">HTTP:STC:IE:CVE-2014-1785-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1785 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1789-MC.html">HTTP:STC:IE:CVE-2014-1789-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1789 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1791-UAF.html">HTTP:STC:IE:CVE-2014-1791-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1791 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1795-UAF.html">HTTP:STC:IE:CVE-2014-1795-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1795 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1797-UAF.html">HTTP:STC:IE:CVE-2014-1797-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1797 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1800-UAF.html">HTTP:STC:IE:CVE-2014-1800-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1800 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1802-MC.html">HTTP:STC:IE:CVE-2014-1802-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1802 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1804-UAF.html">HTTP:STC:IE:CVE-2014-1804-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1804 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1805-MC.html">HTTP:STC:IE:CVE-2014-1805-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1805 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1815-UAF.html">HTTP:STC:IE:CVE-2014-1815-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1815 Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1815-UAF1.html">HTTP:STC:IE:CVE-2014-1815-UAF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1815 Use-after-Free1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2787-MC.html">HTTP:STC:IE:CVE-2014-2787-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2787 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2795-MC.html">HTTP:STC:IE:CVE-2014-2795-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2795 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2797-MC.html">HTTP:STC:IE:CVE-2014-2797-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2797 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2799-UAF.html">HTTP:STC:IE:CVE-2014-2799-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-2799)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2801-MC.html">HTTP:STC:IE:CVE-2014-2801-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2801 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2820-UAF.html">HTTP:STC:IE:CVE-2014-2820-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2820 Use After Free 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2823-UAF.html">HTTP:STC:IE:CVE-2014-2823-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2823 Use After Free 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2824-BO.html">HTTP:STC:IE:CVE-2014-2824-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2824 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4057-MC.html">HTTP:STC:IE:CVE-2014-4057-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4057 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4063-UAF.html">HTTP:STC:IE:CVE-2014-4063-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4063 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4065-UAF.html">HTTP:STC:IE:CVE-2014-4065-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4065)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4080-UAF.html">HTTP:STC:IE:CVE-2014-4080-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free (CVE-2014-4080)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4081-UAF.html">HTTP:STC:IE:CVE-2014-4081-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4081 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4082-MC.html">HTTP:STC:IE:CVE-2014-4082-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-4082)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4084-UAF.html">HTTP:STC:IE:CVE-2014-4084-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4084)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4086-UAF.html">HTTP:STC:IE:CVE-2014-4086-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4086)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4086-UAF1.html">HTTP:STC:IE:CVE-2014-4086-UAF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4086)1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4087-UAF.html">HTTP:STC:IE:CVE-2014-4087-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4087)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4088-UAF.html">HTTP:STC:IE:CVE-2014-4088-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4088)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4089-UAF.html">HTTP:STC:IE:CVE-2014-4089-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4089)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4092-UAF.html">HTTP:STC:IE:CVE-2014-4092-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4092)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4094-UAF.html">HTTP:STC:IE:CVE-2014-4094-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4094)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4095-UAF.html">HTTP:STC:IE:CVE-2014-4095-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4095)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4123-CE.html">HTTP:STC:IE:CVE-2014-4123-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4123 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4124-CE.html">HTTP:STC:IE:CVE-2014-4124-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4124 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4126-MC.html">HTTP:STC:IE:CVE-2014-4126-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4126 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4126-MC1.html">HTTP:STC:IE:CVE-2014-4126-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4126 Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4127-MC.html">HTTP:STC:IE:CVE-2014-4127-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4127 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4128-MC.html">HTTP:STC:IE:CVE-2014-4128-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4128 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4129-MC.html">HTTP:STC:IE:CVE-2014-4129-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4129 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4132-MC.html">HTTP:STC:IE:CVE-2014-4132-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4132 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4133-CE.html">HTTP:STC:IE:CVE-2014-4133-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4133 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4134-MC.html">HTTP:STC:IE:CVE-2014-4134-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4134 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4134-MC1.html">HTTP:STC:IE:CVE-2014-4134-MC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4134 Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4137-MC.html">HTTP:STC:IE:CVE-2014-4137-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4137 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4138-CE.html">HTTP:STC:IE:CVE-2014-4138-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4138 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4140-CE.html">HTTP:STC:IE:CVE-2014-4140-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4140 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4140-CE1.html">HTTP:STC:IE:CVE-2014-4140-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4140 Arbitrary Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4141-MC.html">HTTP:STC:IE:CVE-2014-4141-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4141 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4143-MC.html">HTTP:STC:IE:CVE-2014-4143-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4143 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6323-ID.html">HTTP:STC:IE:CVE-2014-6323-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6323 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6327-MC.html">HTTP:STC:IE:CVE-2014-6327-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6327 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6329-RCE.html">HTTP:STC:IE:CVE-2014-6329-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6329 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6330-MC.html">HTTP:STC:IE:CVE-2014-6330-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6330 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6332-HEX.html">HTTP:STC:IE:CVE-2014-6332-HEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6332 Common Construct HEX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6332-ID.html">HTTP:STC:IE:CVE-2014-6332-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6332 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6332-URLEN.html">HTTP:STC:IE:CVE-2014-6332-URLEN</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6332 Common Construct URLENCODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6337-UAF.html">HTTP:STC:IE:CVE-2014-6337-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6337 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6339-MC.html">HTTP:STC:IE:CVE-2014-6339-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6339 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6341-UAF.html">HTTP:STC:IE:CVE-2014-6341-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6341 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6342-MEMCP.html">HTTP:STC:IE:CVE-2014-6342-MEMCP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer MEMCP CVE-2014-6342
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6343-UAF.html">HTTP:STC:IE:CVE-2014-6343-UAF</a></b></td>
   <td width="500" valign="top">
    Microsoft Internet Explorer CVE-2014-6343 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6344-UAF.html">HTTP:STC:IE:CVE-2014-6344-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6344 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6345-INFO.html">HTTP:STC:IE:CVE-2014-6345-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6345 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6346-INFO.html">HTTP:STC:IE:CVE-2014-6346-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6346 Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6347-MC.html">HTTP:STC:IE:CVE-2014-6347-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6347 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6347-RCE.html">HTTP:STC:IE:CVE-2014-6347-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6347 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6348-UAF.html">HTTP:STC:IE:CVE-2014-6348-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6348 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6349-CE.html">HTTP:STC:IE:CVE-2014-6349-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6349 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6350-CE.html">HTTP:STC:IE:CVE-2014-6350-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6350 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6351-UAF.html">HTTP:STC:IE:CVE-2014-6351-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6351 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6353-UAF.html">HTTP:STC:IE:CVE-2014-6353-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer UAF CVE-2014-6353
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6355-IDISC.html">HTTP:STC:IE:CVE-2014-6355-IDISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6355 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6366-CE.html">HTTP:STC:IE:CVE-2014-6366-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6366 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6368-RCE.html">HTTP:STC:IE:CVE-2014-6368-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6368 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-MC.html">HTTP:STC:IE:CVE-2014-6369-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6369 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-RCE.html">HTTP:STC:IE:CVE-2014-6369-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6369 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-UAF.html">HTTP:STC:IE:CVE-2014-6369-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6369 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6373-UAF.html">HTTP:STC:IE:CVE-2014-6373-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6373 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6374-RCE.html">HTTP:STC:IE:CVE-2014-6374-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6374 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6375-RCE.html">HTTP:STC:IE:CVE-2014-6375-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6375 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6376-RCE.html">HTTP:STC:IE:CVE-2014-6376-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6376 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-8967-RCE.html">HTTP:STC:IE:CVE-2014-8967-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-8967 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0018-UAF.html">HTTP:STC:IE:CVE-2015-0018-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0018 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0019-RCE.html">HTTP:STC:IE:CVE-2015-0019-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0019 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0020-CE.html">HTTP:STC:IE:CVE-2015-0020-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0020 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0021-CE.html">HTTP:STC:IE:CVE-2015-0021-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0021 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0022-UAF.html">HTTP:STC:IE:CVE-2015-0022-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0022 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0025-RCE.html">HTTP:STC:IE:CVE-2015-0025-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0025 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0026-UAF.html">HTTP:STC:IE:CVE-2015-0026-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0026 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0029-UAF.html">HTTP:STC:IE:CVE-2015-0029-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0029 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0030-UAF.html">HTTP:STC:IE:CVE-2015-0030-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0030 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0032-RCE.html">HTTP:STC:IE:CVE-2015-0032-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0032 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0035-UAF.html">HTTP:STC:IE:CVE-2015-0035-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0035 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0037-CE.html">HTTP:STC:IE:CVE-2015-0037-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0037 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0038-RCE.html">HTTP:STC:IE:CVE-2015-0038-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0038 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0039-RCE.html">HTTP:STC:IE:CVE-2015-0039-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0039 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0040-RCE.html">HTTP:STC:IE:CVE-2015-0040-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0040 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0042-RCE.html">HTTP:STC:IE:CVE-2015-0042-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0043-RCE.html">HTTP:STC:IE:CVE-2015-0043-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0043 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0044-RCE.html">HTTP:STC:IE:CVE-2015-0044-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0044 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0045-RCE.html">HTTP:STC:IE:CVE-2015-0045-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0045 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0048-RCE.html">HTTP:STC:IE:CVE-2015-0048-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0049-RCE.html">HTTP:STC:IE:CVE-2015-0049-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0049 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0050-CE.html">HTTP:STC:IE:CVE-2015-0050-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0051-SB.html">HTTP:STC:IE:CVE-2015-0051-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0051 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0053-RCE.html">HTTP:STC:IE:CVE-2015-0053-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0053 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0054-RCE.html">HTTP:STC:IE:CVE-2015-0054-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0054 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0055-CE.html">HTTP:STC:IE:CVE-2015-0055-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0055 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0056-MC.html">HTTP:STC:IE:CVE-2015-0056-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0056 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0067-UAF.html">HTTP:STC:IE:CVE-2015-0067-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0067 User After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0068-UAF.html">HTTP:STC:IE:CVE-2015-0068-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0068 User After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0069-INFO.html">HTTP:STC:IE:CVE-2015-0069-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0069 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0081-RCE.html">HTTP:STC:IE:CVE-2015-0081-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer  CVE-2015-0081  Out-of-Bound Array
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0099-RCE.html">HTTP:STC:IE:CVE-2015-0099-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0099 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0100-UAF.html">HTTP:STC:IE:CVE-2015-0100-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0100 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0655-RCE.html">HTTP:STC:IE:CVE-2015-0655-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6155 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1622-RCE.html">HTTP:STC:IE:CVE-2015-1622-RCE</a></b></td>
   <td width="500" valign="top">
     HTTP: Microsoft Internet Explorer CVE-2015-1622 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1623-MC.html">HTTP:STC:IE:CVE-2015-1623-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1623 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1624-RCE.html">HTTP:STC:IE:CVE-2015-1624-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1624 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1625-RCE.html">HTTP:STC:IE:CVE-2015-1625-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1625 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1626-RCE.html">HTTP:STC:IE:CVE-2015-1626-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1626 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1627-PRIV.html">HTTP:STC:IE:CVE-2015-1627-PRIV</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1627 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1634-RCE.html">HTTP:STC:IE:CVE-2015-1634-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1634 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1652-RCE.html">HTTP:STC:IE:CVE-2015-1652-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1652 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1657-ID.html">HTTP:STC:IE:CVE-2015-1657-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1657 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1658-RCE.html">HTTP:STC:IE:CVE-2015-1658-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Micorsoft Internet Explorer CVE-2015-1658 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1659-RCE.html">HTTP:STC:IE:CVE-2015-1659-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1659 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1660-RCE.html">HTTP:STC:IE:CVE-2015-1660-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1660 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1661-ID.html">HTTP:STC:IE:CVE-2015-1661-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1661 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1662-RCE.html">HTTP:STC:IE:CVE-2015-1662-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1662 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1666-RCE.html">HTTP:STC:IE:CVE-2015-1666-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1666 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1668-RCE.html">HTTP:STC:IE:CVE-2015-1668-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1668 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1685-RCE.html">HTTP:STC:IE:CVE-2015-1685-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1685 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1686-ID.html">HTTP:STC:IE:CVE-2015-1686-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1686 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1687-RCE.html">HTTP:STC:IE:CVE-2015-1687-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1687 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1688-SB.html">HTTP:STC:IE:CVE-2015-1688-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1688 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1691-UAF.html">HTTP:STC:IE:CVE-2015-1691-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1691 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1705-UAF.html">HTTP:STC:IE:CVE-2015-1705-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1705 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1706-UAF.html">HTTP:STC:IE:CVE-2015-1706-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1706 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1708-UAF.html">HTTP:STC:IE:CVE-2015-1708-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1708 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1709-RCE.html">HTTP:STC:IE:CVE-2015-1709-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1709 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1710-CE.html">HTTP:STC:IE:CVE-2015-1710-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1710 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1711-UAF.html">HTTP:STC:IE:CVE-2015-1711-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1711 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1712-RCE.html">HTTP:STC:IE:CVE-2015-1712-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1712 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1713-SB.html">HTTP:STC:IE:CVE-2015-1713-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1713 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1714-UAF.html">HTTP:STC:IE:CVE-2015-1714-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1714 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1717-CE.html">HTTP:STC:IE:CVE-2015-1717-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1717 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1718-UAF.html">HTTP:STC:IE:CVE-2015-1718-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1718 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1729-UAF.html">HTTP:STC:IE:CVE-2015-1729-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1729 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1730-RCE.html">HTTP:STC:IE:CVE-2015-1730-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1730 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1731-CE.html">HTTP:STC:IE:CVE-2015-1731-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1731 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1732-UAF.html">HTTP:STC:IE:CVE-2015-1732-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1732 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1733-RCE.html">HTTP:STC:IE:CVE-2015-1733-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1733 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1735-UAF.html">HTTP:STC:IE:CVE-2015-1735-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1735 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1736-RCE.html">HTTP:STC:IE:CVE-2015-1736-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1736 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1737-UAF.html">HTTP:STC:IE:CVE-2015-1737-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1737 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1738-UAF.html">HTTP:STC:IE:CVE-2015-1738-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1738 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1740-UAF.html">HTTP:STC:IE:CVE-2015-1740-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1740 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1741-RCE.html">HTTP:STC:IE:CVE-2015-1741-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1741 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1742-RCE.html">HTTP:STC:IE:CVE-2015-1742-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1742 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1744-CE.html">HTTP:STC:IE:CVE-2015-1744-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1744 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1745-UAF.html">HTTP:STC:IE:CVE-2015-1745-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1745 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1748-RCE.html">HTTP:STC:IE:CVE-2015-1748-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1748 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1750-UAF.html">HTTP:STC:IE:CVE-2015-1750-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1750 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1751-RCE.html">HTTP:STC:IE:CVE-2015-1751-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1751 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1753-RCE.html">HTTP:STC:IE:CVE-2015-1753-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1753 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1755-UAF.html">HTTP:STC:IE:CVE-2015-1755-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1755 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1766-RCE.html">HTTP:STC:IE:CVE-2015-1766-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1766 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1767-UAF.html">HTTP:STC:IE:CVE-2015-1767-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1767 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2372-UAF.html">HTTP:STC:IE:CVE-2015-2372-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2372 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2383-UAF.html">HTTP:STC:IE:CVE-2015-2383-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2383 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2384-RCE.html">HTTP:STC:IE:CVE-2015-2384-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2384 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2388-UAF.html">HTTP:STC:IE:CVE-2015-2388-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2388 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2389-UAF.html">HTTP:STC:IE:CVE-2015-2389-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2389 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2390-UAF.html">HTTP:STC:IE:CVE-2015-2390-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2390 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2391-RCE.html">HTTP:STC:IE:CVE-2015-2391-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2391 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2397-UAF.html">HTTP:STC:IE:CVE-2015-2397-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2397 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2402-SB.html">HTTP:STC:IE:CVE-2015-2402-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2402 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2403-UAF.html">HTTP:STC:IE:CVE-2015-2403-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2403 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2404-RCE.html">HTTP:STC:IE:CVE-2015-2404-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2404 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2406-RCE.html">HTTP:STC:IE:CVE-2015-2406-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2406 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2408-UAF.html">HTTP:STC:IE:CVE-2015-2408-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2408 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2411-UAF.html">HTTP:STC:IE:CVE-2015-2411-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2411 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2412-SB.html">HTTP:STC:IE:CVE-2015-2412-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explore CVE-2015-2412 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2413.html">HTTP:STC:IE:CVE-2015-2413</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2413 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2414-RCE.html">HTTP:STC:IE:CVE-2015-2414-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2414 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2421-ID.html">HTTP:STC:IE:CVE-2015-2421-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2421 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2422-UAF.html">HTTP:STC:IE:CVE-2015-2422-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2422 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2425-CE.html">HTTP:STC:IE:CVE-2015-2425-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2425 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2441-RCE.html">HTTP:STC:IE:CVE-2015-2441-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2441 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2442-RCE.html">HTTP:STC:IE:CVE-2015-2442-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2442 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2443-RCE.html">HTTP:STC:IE:CVE-2015-2443-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2443 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2448-RCE.html">HTTP:STC:IE:CVE-2015-2448-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2450-UAF.html">HTTP:STC:IE:CVE-2015-2450-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2450 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2451-CE.html">HTTP:STC:IE:CVE-2015-2451-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2451 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2452-CE.html">HTTP:STC:IE:CVE-2015-2452-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2452 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2482-CE.html">HTTP:STC:IE:CVE-2015-2482-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2482 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2483-ID.html">HTTP:STC:IE:CVE-2015-2483-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2483 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2485-CE.html">HTTP:STC:IE:CVE-2015-2485-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2485 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2486-RCE.html">HTTP:STC:IE:CVE-2015-2486-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2486 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2487-CE.html">HTTP:STC:IE:CVE-2015-2487-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2487 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2490-CE.html">HTTP:STC:IE:CVE-2015-2490-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2490 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2491-RCE.html">HTTP:STC:IE:CVE-2015-2491-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2491 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2492-RCE.html">HTTP:STC:IE:CVE-2015-2492-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2492 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2493-UAF.html">HTTP:STC:IE:CVE-2015-2493-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2493 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2498-CE.html">HTTP:STC:IE:CVE-2015-2498-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2498 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2500-CE.html">HTTP:STC:IE:CVE-2015-2500-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2500 Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2501-CE.html">HTTP:STC:IE:CVE-2015-2501-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2501 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2502-CE.html">HTTP:STC:IE:CVE-2015-2502-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2502 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2515-UAF.html">HTTP:STC:IE:CVE-2015-2515-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2515 User After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2548-RCE.html">HTTP:STC:IE:CVE-2015-2548-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2548 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6042-UAF.html">HTTP:STC:IE:CVE-2015-6042-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6042 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6046-RCE.html">HTTP:STC:IE:CVE-2015-6046-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6046 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6047-CE.html">HTTP:STC:IE:CVE-2015-6047-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6047 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6048-UAF.html">HTTP:STC:IE:CVE-2015-6048-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6048 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6050-CE.html">HTTP:STC:IE:CVE-2015-6050-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6052-RCE.html">HTTP:STC:IE:CVE-2015-6052-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6053-UAF.html">HTTP:STC:IE:CVE-2015-6053-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6053 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6055-CE.html">HTTP:STC:IE:CVE-2015-6055-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6055 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6059-ID.html">HTTP:STC:IE:CVE-2015-6059-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6059 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6064-UAF.html">HTTP:STC:IE:CVE-2015-6064-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6064 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6065-RCE.html">HTTP:STC:IE:CVE-2015-6065-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6065 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6068-CE.html">HTTP:STC:IE:CVE-2015-6068-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6068 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6070-RCE.html">HTTP:STC:IE:CVE-2015-6070-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6070 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6071-CE.html">HTTP:STC:IE:CVE-2015-6071-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6071 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6072-RCE.html">HTTP:STC:IE:CVE-2015-6072-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6072 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6073-UAF.html">HTTP:STC:IE:CVE-2015-6073-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6073 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6075-CE.html">HTTP:STC:IE:CVE-2015-6075-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6075 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6076-RCE.html">HTTP:STC:IE:CVE-2015-6076-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6066 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6077-UAF.html">HTTP:STC:IE:CVE-2015-6077-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6077 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6078-UAF.html">HTTP:STC:IE:CVE-2015-6078-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6078 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6079-CE.html">HTTP:STC:IE:CVE-2015-6079-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6079 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6080-CE.html">HTTP:STC:IE:CVE-2015-6080-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6080 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6081-RCE.html">HTTP:STC:IE:CVE-2015-6081-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6081 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6082-RCE.html">HTTP:STC:IE:CVE-2015-6082-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6082 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6083-CE.html">HTTP:STC:IE:CVE-2015-6083-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6083 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6084-RCE.html">HTTP:STC:IE:CVE-2015-6084-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6084 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6085-UAF.html">HTTP:STC:IE:CVE-2015-6085-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6085 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6086-SB.html">HTTP:STC:IE:CVE-2015-6086-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6086 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6087-CE.html">HTTP:STC:IE:CVE-2015-6087-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6089-RCE.html">HTTP:STC:IE:CVE-2015-6089-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6134-RCE.html">HTTP:STC:IE:CVE-2015-6134-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6134 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6136-UAF.html">HTTP:STC:IE:CVE-2015-6136-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6136 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6141-RCE.html">HTTP:STC:IE:CVE-2015-6141-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6141 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6142-CE.html">HTTP:STC:IE:CVE-2015-6142-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6142 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6146-RCE.html">HTTP:STC:IE:CVE-2015-6146-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6146 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6147-CE.html">HTTP:STC:IE:CVE-2015-6147-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6147 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6148-UAF.html">HTTP:STC:IE:CVE-2015-6148-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6148 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6149-CE.html">HTTP:STC:IE:CVE-2015-6149-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6149 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6150-CE.html">HTTP:STC:IE:CVE-2015-6150-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6150 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6151-UAF.html">HTTP:STC:IE:CVE-2015-6151-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6151 Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6152-RCE.html">HTTP:STC:IE:CVE-2015-6152-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6152 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6153-CE.html">HTTP:STC:IE:CVE-2015-6153-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6153 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6154-CE.html">HTTP:STC:IE:CVE-2015-6154-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6154 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6156-RCE.html">HTTP:STC:IE:CVE-2015-6156-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6156 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6157-RCE.html">HTTP:STC:IE:CVE-2015-6157-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6157 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6158-CE.html">HTTP:STC:IE:CVE-2015-6158-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6158 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6159-RCE.html">HTTP:STC:IE:CVE-2015-6159-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6159 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0002-CE.html">HTTP:STC:IE:CVE-2016-0002-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0002 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0005-PB.html">HTTP:STC:IE:CVE-2016-0005-PB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0005 Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0034-RCE.html">HTTP:STC:IE:CVE-2016-0034-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0034 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADEL-OBJ-REF.html">HTTP:STC:IE:DEL-OBJ-REF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Deleted Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADEL-TABLE.html">HTTP:STC:IE:DEL-TABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Deleted Table Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADEREF-OBJ-ACCESS.html">HTTP:STC:IE:DEREF-OBJ-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Dereferenced Object Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADESIGNMODE-INFO.html">HTTP:STC:IE:DESIGNMODE-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DesignMode Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADESIGNMODE-INFO1.html">HTTP:STC:IE:DESIGNMODE-INFO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DesignMode Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADEV-TOOLBAR-RCE.html">HTTP:STC:IE:DEV-TOOLBAR-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Developer Toolbar Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADHTML-CCR-INV-OBJ.html">HTTP:STC:IE:DHTML-CCR-INV-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer createControlRange Invalid Object Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADHTML-HANDLER-RACE.html">HTTP:STC:IE:DHTML-HANDLER-RACE</a></b></td>
   <td width="500" valign="top">
    HTTP: DHTML Object Handling Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADHTML-HANDLER-RACE1.html">HTTP:STC:IE:DHTML-HANDLER-RACE1</a></b></td>
   <td width="500" valign="top">
    HTTP: DHTML Object Handling Race Condition1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADHTML-OBJ-CORRUPT.html">HTTP:STC:IE:DHTML-OBJ-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DHTML Objects Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADHTML-OBJ-MC.html">HTTP:STC:IE:DHTML-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DHTML Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADIALOG-MANIP.html">HTTP:STC:IE:DIALOG-MANIP</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Dialog Box Manipulation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADIRECTX-SAMI-BO.html">HTTP:STC:IE:DIRECTX-SAMI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX SAMI File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADND-IMG.html">HTTP:STC:IE:DND-IMG</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Drag-and-Drop Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADOC-MARKUP-RCE.html">HTTP:STC:IE:DOC-MARKUP-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Document Markup Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADOCUMENT-RCE.html">HTTP:STC:IE:DOCUMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Element Handler Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADOM-CACHE-CORRUPT.html">HTTP:STC:IE:DOM-CACHE-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DOM Object Cache Management Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADOM-OBJ-MC.html">HTTP:STC:IE:DOM-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DOM Object Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADRAG-DROP-MOD.html">HTTP:STC:IE:DRAG-DROP-MOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Drag-and-Drop Modified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEMBED-MC.html">HTTP:STC:IE:EMBED-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer EMBED Element Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEOT-WEBFONTS-DL.html">HTTP:STC:IE:EOT-WEBFONTS-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer WebFonts File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEOT-WEBFONTS-DL1.html">HTTP:STC:IE:EOT-WEBFONTS-DL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer WebFonts File Download1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEOTF-LZCOMP-OF.html">HTTP:STC:IE:EOTF-LZCOMP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Embedded OpenType Font Engine LZCOMP Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AERROR-HANDLER.html">HTTP:STC:IE:ERROR-HANDLER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Error Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEUC-JP-XSS.html">HTTP:STC:IE:EUC-JP-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer EUC-JP Character Encoding Universal Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEVENT-HANDLER-INFO.html">HTTP:STC:IE:EVENT-HANDLER-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Event Handlers Information Disclosure Vulnerability 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEVENT-HANDLER-MC.html">HTTP:STC:IE:EVENT-HANDLER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 Event Handler Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEVENT-HANDLER-RCE.html">HTTP:STC:IE:EVENT-HANDLER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Event Handler Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEVENT-INVOKE.html">HTTP:STC:IE:EVENT-INVOKE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Event Invoke Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEVENT-LISTENER-RCE.html">HTTP:STC:IE:EVENT-LISTENER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Event Listener Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEXEC-CMD-FILE-SPOOF.html">HTTP:STC:IE:EXEC-CMD-FILE-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer execCommand File-type Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AEXECCOMMAND-RCE.html">HTTP:STC:IE:EXECCOMMAND-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer execCommand Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFILE-EXT-SPOOF.html">HTTP:STC:IE:FILE-EXT-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE File Download Extension Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFLASH-UAF.html">HTTP:STC:IE:FLASH-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Flash Plugin Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFOLDER-COM-EXEC.html">HTTP:STC:IE:FOLDER-COM-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Shared Folder COM Object Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFRAME-FLOOD.html">HTTP:STC:IE:FRAME-FLOOD</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer FRAME Tag Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFRAME-INJ.html">HTTP:STC:IE:FRAME-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Frame Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFREED-OBJECT.html">HTTP:STC:IE:FREED-OBJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFULLMEM-RELOAD.html">HTTP:STC:IE:FULLMEM-RELOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Reload Memory Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFULLMEM-RELOAD2.html">HTTP:STC:IE:FULLMEM-RELOAD2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Reload Memory Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFULLMEM-RELOAD3.html">HTTP:STC:IE:FULLMEM-RELOAD3</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Reload Memory Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGETELEMENT-CACHE.html">HTTP:STC:IE:GETELEMENT-CACHE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cache GetElement
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGETMARKUPPTR-UAF.html">HTTP:STC:IE:GETMARKUPPTR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer GetMarkupPtr Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGOOGLEBAR-FILE.html">HTTP:STC:IE:GOOGLEBAR-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: GoogleBar Arbitrary Local File Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGOPHER-IMGTAG.html">HTTP:STC:IE:GOPHER-IMGTAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Gopher Link Embedded in &quot;IMG&quot; Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGRAPHICS-EOP-CE.html">HTTP:STC:IE:GRAPHICS-EOP-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer and Spartan Graphics Component EOP Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHDRLOC-MSITS.html">HTTP:STC:IE:HDRLOC-MSITS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHELPCTR-CODE-EX.html">HTTP:STC:IE:HELPCTR-CODE-EX</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Help Local Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHFS-CVE-2014-6332.html">HTTP:STC:IE:HFS-CVE-2014-6332</a></b></td>
   <td width="500" valign="top">
    HTTP: Possible EK HFS CVE-2014-6332 Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHISTORY-GO-MC.html">HTTP:STC:IE:HISTORY-GO-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer History.go Method Double Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHRALIGN-OF.html">HTTP:STC:IE:HRALIGN-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HR Tag Align Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTA-CONTENT-TYPE.html">HTTP:STC:IE:HTA-CONTENT-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Type - Application/hta Content-type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTA-CONTENT-TYPE1.html">HTTP:STC:IE:HTA-CONTENT-TYPE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Type - Application/hta Content-type1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-HELP-ZONE-BP.html">HTTP:STC:IE:HTML-HELP-ZONE-BP</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Help Zone Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-HELP-ZONE-BP1.html">HTTP:STC:IE:HTML-HELP-ZONE-BP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Help Zone Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-LAYOUT.html">HTTP:STC:IE:HTML-LAYOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Layout Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-LAYOUT-CE.html">HTTP:STC:IE:HTML-LAYOUT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Layout ColSpan Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-OB-MEM.html">HTTP:STC:IE:HTML-OB-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Objects Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-OBJ-MC.html">HTTP:STC:IE:HTML-OBJ-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Objects Memory Corruption (CVE-2009-1918)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-OBJ-MEM-CRPTN.html">HTTP:STC:IE:HTML-OBJ-MEM-CRPTN</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Objects Memory Corruption (CVE-2008-2257)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-OBJECTS.html">HTTP:STC:IE:HTML-OBJECTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Objects Memory Corruption (CVE-2008-1442)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-OBJECTS-MC.html">HTTP:STC:IE:HTML-OBJECTS-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Objects Variant Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-RELOAD-CORRUP1.html">HTTP:STC:IE:HTML-RELOAD-CORRUP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 HTML Object Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-RELOAD-CORRUPT.html">HTTP:STC:IE:HTML-RELOAD-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 HTML Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-SANITZ.html">HTTP:STC:IE:HTML-SANITZ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Sanitization Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-TAG-MC.html">HTTP:STC:IE:HTML-TAG-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Tag Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-TIME.html">HTTP:STC:IE:HTML-TIME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Time Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-XSS.html">HTTP:STC:IE:HTML-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Sanitization Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-8-DOM-UN-MEM.html">HTTP:STC:IE:IE-8-DOM-UN-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer 8 DOM Uninitialized Memory
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-ACTIVEX-DRCTANI1.html">HTTP:STC:IE:IE-ACTIVEX-DRCTANI1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ActiveX DirectAnimation1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-FTP-CMD.html">HTTP:STC:IE:IE-FTP-CMD</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer FTP Handler Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-FTP-SCRIPTING.html">HTTP:STC:IE:IE-FTP-SCRIPTING</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ftp:// Handler Insecure Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-HCP-DELETE.html">HTTP:STC:IE:IE-HCP-DELETE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Arbitrary File Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-HEADER-XDOM-INFO.html">HTTP:STC:IE:IE-HEADER-XDOM-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Request Header Cross Domain Information 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-IMG-INF-DOS.html">HTTP:STC:IE:IE-IMG-INF-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &lt;IMG&gt; Infinite Loop DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-LOCAL-FORMAT.html">HTTP:STC:IE:IE-LOCAL-FORMAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Format Local Drive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-MEM-CORR.html">HTTP:STC:IE:IE-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (MS12-010)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-MHT-REDIRECT.html">HTTP:STC:IE:IE-MHT-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHT Redirect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-MSHTML-OF.html">HTTP:STC:IE:IE-MSHTML-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer mshtml.dll Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-REFRESH-OF.html">HTTP:STC:IE:IE-REFRESH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Refresh URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-TGVAL-DOS.html">HTTP:STC:IE:IE-TGVAL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE TryGetValueAndRemove DOS Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE11-HEAPSPRAY-W81.html">HTTP:STC:IE:IE11-HEAPSPRAY-W81</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer 11 Heap Spraying Attack Windows 8.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIEFRAME.html">HTTP:STC:IE:IEFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer ieframe.dll Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIESTYLE-OBJ.html">HTTP:STC:IE:IESTYLE-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Style Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIEUNMEM.html">HTTP:STC:IE:IEUNMEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Uninitialized Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIEXDOM-INFO.html">HTTP:STC:IE:IEXDOM-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer X-DOM Information Disclosure Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIFRAME-FILE.html">HTTP:STC:IE:IFRAME-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &quot;IFRAME&quot; Tag Local File Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIFRAME-HTA.html">HTTP:STC:IE:IFRAME-HTA</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer .hta Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIFRAME-MEM-CORR.html">HTTP:STC:IE:IFRAME-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Iframe Uninitialized Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIFRAME-NAME-OF.html">HTTP:STC:IE:IFRAME-NAME-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Malformed IFRAME Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIFRAME-SMB.html">HTTP:STC:IE:IFRAME-SMB</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer &quot;IFRAME&quot; Tag SMB Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIMPROPER-REF.html">HTTP:STC:IE:IMPROPER-REF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Improper Ref Counting Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINCOMPLETE-EM.html">HTTP:STC:IE:INCOMPLETE-EM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Object Memory Corruption (CVE-2010-0490)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINFINITE-ARRAY.html">HTTP:STC:IE:INFINITE-ARRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Infinite Array Sort Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINFOBAR-DOWNLOAD.html">HTTP:STC:IE:INFOBAR-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Forced File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINP-ELNT-OBJCT-RCE.html">HTTP:STC:IE:INP-ELNT-OBJCT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft IE CInputElement Object Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINSECURE-OBJDEL-UAF.html">HTTP:STC:IE:INSECURE-OBJDEL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Insecure Object Deletion Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINSELM-UAF.html">HTTP:STC:IE:INSELM-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer InsertElement Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINSERT-ADJACENT-RCE.html">HTTP:STC:IE:INSERT-ADJACENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer InsertAdjacentText Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINSERTROW-RCE.html">HTTP:STC:IE:INSERTROW-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer insertRow Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINST-ENG-INT-OF.html">HTTP:STC:IE:INST-ENG-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Install Engine Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINV-CSSARR.html">HTTP:STC:IE:INV-CSSARR</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Invalid CStyleSheetArray Index
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINVALID-LAYOUT.html">HTTP:STC:IE:INVALID-LAYOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Invalid Layout Directive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJIS-CHAR-INFO-DISC.html">HTTP:STC:IE:JIS-CHAR-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Shift JIS Character Encoding Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-INFO-DISC.html">HTTP:STC:IE:JS-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Javascript Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-LOCATION-ASSIGN.html">HTTP:STC:IE:JS-LOCATION-ASSIGN</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer JavaScript Method Assignment Cross-Domain Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-MC.html">HTTP:STC:IE:JS-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer JavaScript Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-MEM-CORR.html">HTTP:STC:IE:JS-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer JavaScript Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-OOB-WINDOW1.html">HTTP:STC:IE:JS-OOB-WINDOW1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer JavaScript Out-of-Bounds Window1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJS-VBS-DECODE-OF.html">HTTP:STC:IE:JS-VBS-DECODE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer JScript/VBScript Decoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJSCRIPT9-CE.html">HTTP:STC:IE:JSCRIPT9-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Jscript9 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJSON-ARRAY-INFO-DIS.html">HTTP:STC:IE:JSON-ARRAY-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer JSON Array Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALAYOUT-GRID.html">HTTP:STC:IE:LAYOUT-GRID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Layout Grid Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALAYOUT-RCE.html">HTTP:STC:IE:LAYOUT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Layout Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALAYOUT-UAF.html">HTTP:STC:IE:LAYOUT-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 Layout Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALETTER-STYLE-UAF.html">HTTP:STC:IE:LETTER-STYLE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Letter Style UAF (CVE-2014-4050)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALOC-SPOOF.html">HTTP:STC:IE:LOC-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Location Field Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALOCAL-ACCESS-DAT.html">HTTP:STC:IE:LOCAL-ACCESS-DAT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cross Domain Information Disclosure (CVE-2009-1140)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALOCAL-CNT-INJ.html">HTTP:STC:IE:LOCAL-CNT-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Local File Content Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALOCAL-WEB-FOLDER.html">HTTP:STC:IE:LOCAL-WEB-FOLDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Local Web Folder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALOCATION-X-DOMAIN.html">HTTP:STC:IE:LOCATION-X-DOMAIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Location Property Cross Domain Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALSGETTRAILINFO-UAF.html">HTTP:STC:IE:LSGETTRAILINFO-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer  LsGetTrailInfo Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMAL-DATASTREAM.html">HTTP:STC:IE:MAL-DATASTREAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Malicous Data Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMAL-GIF-DOS.html">HTTP:STC:IE:MAL-GIF-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed GIF File Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMAL-JPEG.html">HTTP:STC:IE:MAL-JPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed JPEG File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMAL-JPEG1.html">HTTP:STC:IE:MAL-JPEG1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed JPEG File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMAL-VB-JSCRIPT.html">HTTP:STC:IE:MAL-VB-JSCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed VBScript/JScript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMALFORMED-URI-BO.html">HTTP:STC:IE:MALFORMED-URI-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Malformed URI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMARKUP-POINTER-RCE.html">HTTP:STC:IE:MARKUP-POINTER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Markup Pointer Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMARQUEE-STYLE.html">HTTP:STC:IE:MARQUEE-STYLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Marquee Memory corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMDAC-CACHESIZE-OF.html">HTTP:STC:IE:MDAC-CACHESIZE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Data Access Components Cachesize Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMDAO-RCE1.html">HTTP:STC:IE:MDAO-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Data Access Object Memory Corruption Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORR.html">HTTP:STC:IE:MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2013-3122)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORR-UAF.html">HTTP:STC:IE:MEM-CORR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3111)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORRUPT-RCE.html">HTTP:STC:IE:MEM-CORRUPT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-LEAK.html">HTTP:STC:IE:MEM-LEAK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Information disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEMCORRUPT2.html">HTTP:STC:IE:MEMCORRUPT2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Objects Memory Corruption (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMERGE-ATTRIB.html">HTTP:STC:IE:MERGE-ATTRIB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DOM mergeAttributes Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-HREF-OF1.html">HTTP:STC:IE:MHTML-HREF-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: MHTML HREF Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-INFO-DISC.html">HTTP:STC:IE:MHTML-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHTML Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-REDIR.html">HTTP:STC:IE:MHTML-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHTML Redirection Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-REDIR-INFO.html">HTTP:STC:IE:MHTML-REDIR-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer MHTML Redirect Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-REDIR-JS.html">HTTP:STC:IE:MHTML-REDIR-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Modified Internet Explorer MHTML Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-REDIR1.html">HTTP:STC:IE:MHTML-REDIR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHTML Redirection Information Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-REDIRECT.html">HTTP:STC:IE:MHTML-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHTML Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMHTML-XDOM.html">HTTP:STC:IE:MHTML-XDOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer MHTML Cross-Domain Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMMCN-EXEC.html">HTTP:STC:IE:MMCN-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Management Console Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMOUSE-MOVE-MEM.html">HTTP:STC:IE:MOUSE-MOVE-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Memory Corruption (CVE-2010-0267)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-IE-MEM-RCE.html">HTTP:STC:IE:MS-IE-MEM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unsafe Memory Operations Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-IE-MEM-RCE1.html">HTTP:STC:IE:MS-IE-MEM-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unsafe Memory Operations Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-IE-UAF.html">HTTP:STC:IE:MS-IE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Use After Free Vulnerability in Microsoft Internet Explorer.
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-TIME-DLL.html">HTTP:STC:IE:MS-TIME-DLL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer/mstime.dll Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-UAF-MC.html">HTTP:STC:IE:MS-UAF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3145)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSAPP-TASK.html">HTTP:STC:IE:MSAPP-TASK</a></b></td>
   <td width="500" valign="top">
    msapplication-task vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSIE-OBJ-UAF.html">HTTP:STC:IE:MSIE-OBJ-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Memory Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSRAT-NAME-OF.html">HTTP:STC:IE:MSRAT-NAME-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File &quot;Name&quot; Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSRAT-NAME-OF-SVR.html">HTTP:STC:IE:MSRAT-NAME-OF-SVR</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File &quot;Name&quot; Paramete Overflow (Server Push)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSRAT-NAME-OF-SVR2.html">HTTP:STC:IE:MSRAT-NAME-OF-SVR2</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File &quot;Name&quot; Parameter Overflow (Server Push) (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSRAT-NAME-OF2.html">HTTP:STC:IE:MSRAT-NAME-OF2</a></b></td>
   <td width="500" valign="top">
    HTTP: Content Advisor Ratings File &#39;Name&#39; Parameter Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSWEBDVD-NPA.html">HTTP:STC:IE:MSWEBDVD-NPA</a></b></td>
   <td width="500" valign="top">
    HTTP: MSWebDVD Null Pointer Assignment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMULTI-ACTION.html">HTTP:STC:IE:MULTI-ACTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple MSHTML Action Handlers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ANESTED-OBJECT-TAG.html">HTTP:STC:IE:NESTED-OBJECT-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Nested Object Tags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ANULL-OBJ-RCE.html">HTTP:STC:IE:NULL-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Asynchronous NULL Object Access Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJ-DEL-UAF.html">HTTP:STC:IE:OBJ-DEL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unsafe Object Deletion Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJ-MGMT-MC.html">HTTP:STC:IE:OBJ-MGMT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Object Management Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJ-PARSING-UAF.html">HTTP:STC:IE:OBJ-PARSING-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Improper Object Parsing Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJCT-PROCESSING-CE.html">HTTP:STC:IE:OBJCT-PROCESSING-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Processing Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-CODE-EXEC.html">HTTP:STC:IE:OBJECT-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-HANDLNG-RCE.html">HTTP:STC:IE:OBJECT-HANDLNG-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-MC.html">HTTP:STC:IE:OBJECT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-OF.html">HTTP:STC:IE:OBJECT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer OBJECT Tag Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-OF1.html">HTTP:STC:IE:OBJECT-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer OBJECT Tag Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-PROCESING-CE.html">HTTP:STC:IE:OBJECT-PROCESING-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Obeject Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-TAG-XML.html">HTTP:STC:IE:OBJECT-TAG-XML</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Tag XML RCE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-TAG-XML1.html">HTTP:STC:IE:OBJECT-TAG-XML1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Tag XML RCE1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECTS-MC.html">HTTP:STC:IE:OBJECTS-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Objects Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJERR-UAF.html">HTTP:STC:IE:OBJERR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Erroneous Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJHAN-ERR-UAF.html">HTTP:STC:IE:OBJHAN-ERR-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Handling Error Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOE-MSHTML-OF.html">HTTP:STC:IE:OE-MSHTML-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: MSHTML URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOLE-AUTO.html">HTTP:STC:IE:OLE-AUTO</a></b></td>
   <td width="500" valign="top">
    HTTP: OLE Automation Memory Corruption Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONBEFORE-DEACTIVATE.html">HTTP:STC:IE:ONBEFORE-DEACTIVATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnBeforeDeactivate Event Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONBEFORECOPY-UAF.html">HTTP:STC:IE:ONBEFORECOPY-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer onBeforeCopy Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONENOTE-URL.html">HTTP:STC:IE:ONENOTE-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Uniform Resources Locator Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONLOAD-EVT-RCE.html">HTTP:STC:IE:ONLOAD-EVT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnLoad Event Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONMOVE-RCE.html">HTTP:STC:IE:ONMOVE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnMove Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONREADYSTATE.html">HTTP:STC:IE:ONREADYSTATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer onreadystatechange Use After Free Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONRESIZE-UAF.html">HTTP:STC:IE:ONRESIZE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnResize Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONROWSINSERTED-RCE.html">HTTP:STC:IE:ONROWSINSERTED-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnRowsInserted Event Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONUNLOAD.html">HTTP:STC:IE:ONUNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: MS IE OnUnload Javascript Browser Entrapment Address Bar Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AONUNLOAD-MEM.html">HTTP:STC:IE:ONUNLOAD-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer onUnload Event Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOPTION-ELEMENT-RCE.html">HTTP:STC:IE:OPTION-ELEMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Option Element Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOVERLAP-TAGS.html">HTTP:STC:IE:OVERLAP-TAGS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Rendering Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APAGE-UPDATE-RACE.html">HTTP:STC:IE:PAGE-UPDATE-RACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Javascript Page Update Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APASTEHTML-RCE.html">HTTP:STC:IE:PASTEHTML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer pasteHTML Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APNG-IMAGE-BO.html">HTTP:STC:IE:PNG-IMAGE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer PNG Image Rendering Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APOINTER-AFTERFREE.html">HTTP:STC:IE:POINTER-AFTERFREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Pointer Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APRINT-PREVIEW-CE.html">HTTP:STC:IE:PRINT-PREVIEW-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Print Preview Handling Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3APRINT-PREVIEW-CE1.html">HTTP:STC:IE:PRINT-PREVIEW-CE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Print Preview Handling Command Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ARANGE-OBJ-HNDLNG-ID.html">HTTP:STC:IE:RANGE-OBJ-HNDLNG-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Range Object Handling Information Discloure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ARCDSET-UAF.html">HTTP:STC:IE:RCDSET-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Recordset UAF Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIM-PRESERVE-DOS.html">HTTP:STC:IE:REDIM-PRESERVE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 VBScript redim preserve Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIM-PRESERVE-DOS1.html">HTTP:STC:IE:REDIM-PRESERVE-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 VBScript redim preserve Denial of Service 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIM-PRESERVE-DOS2.html">HTTP:STC:IE:REDIM-PRESERVE-DOS2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 VBScript redim preserve Denial of Service 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIM-PRESERVE-DOS3.html">HTTP:STC:IE:REDIM-PRESERVE-DOS3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 VBScript redim preserve Denial of Service 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIM-PRESERVE-DOS4.html">HTTP:STC:IE:REDIM-PRESERVE-DOS4</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 VBScript redim preserve Denial of Service 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREDIRECT-MC.html">HTTP:STC:IE:REDIRECT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Redirect Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREMOVECHILD-UAF.html">HTTP:STC:IE:REMOVECHILD-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer removeChild Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ARES-URI-INFODISC.html">HTTP:STC:IE:RES-URI-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Resource URI Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAME-ORI-SEC-BYPASS.html">HTTP:STC:IE:SAME-ORI-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAMEID-RCE.html">HTTP:STC:IE:SAMEID-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same ID Property Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAMEID-RCE1.html">HTTP:STC:IE:SAMEID-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same ID Property Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAVE-HISTORY-UAF.html">HTTP:STC:IE:SAVE-HISTORY-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer saveHistory Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASCRIPT-STCK-EXH.html">HTTP:STC:IE:SCRIPT-STCK-EXH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Script Engine Stack Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASCROL-INTO-VIEW-UAF.html">HTTP:STC:IE:SCROL-INTO-VIEW-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Scroll Into View Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASCROLL-EVENT-RCE.html">HTTP:STC:IE:SCROLL-EVENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Scroll Event Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASELECT-ELEMENT.html">HTTP:STC:IE:SELECT-ELEMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Select Element Memory Corruption (CVE-2010-3345)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASELECT-ELEMENT-RCE.html">HTTP:STC:IE:SELECT-ELEMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Select Element Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASELECT-EMPTY.html">HTTP:STC:IE:SELECT-EMPTY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer selection.empty Use After Free (CVE-2011-1261)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASETCAPTURE-UAF.html">HTTP:STC:IE:SETCAPTURE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer SetCapture Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASETEXP-REFCOUNT.html">HTTP:STC:IE:SETEXP-REFCOUNT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Reference Counting Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASETSLICE-OF.html">HTTP:STC:IE:SETSLICE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer SetSlice Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASHELL-WEB-FOLDER.html">HTTP:STC:IE:SHELL-WEB-FOLDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Shell Web Folder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASHOWHELP.html">HTTP:STC:IE:SHOWHELP</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer showHelp() Arbitrary Program Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASLAYOUTRUN-UAF.html">HTTP:STC:IE:SLAYOUTRUN-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 SLayoutRun Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASMEORIGIN-BYPASS.html">HTTP:STC:IE:SMEORIGIN-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASPOF-STATUS-BAR-URL.html">HTTP:STC:IE:SPOF-STATUS-BAR-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HREF Status Bar Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASSL-PROXY-DIS.html">HTTP:STC:IE:SSL-PROXY-DIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer SSL Proxy Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASTYLEOBJ-MEM.html">HTTP:STC:IE:STYLEOBJ-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Style Object Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASTYLESHEET-MC.html">HTTP:STC:IE:STYLESHEET-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Stylesheet Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASTYLESHEET-OF.html">HTTP:STC:IE:STYLESHEET-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Style Sheet Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASYSMON-DOS.html">HTTP:STC:IE:SYSMON-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer sysmon Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLE-LAYOUT.html">HTTP:STC:IE:TABLE-LAYOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Table Layout Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLE-POSWIDTH-MC.html">HTTP:STC:IE:TABLE-POSWIDTH-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer RuntimeStyle Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLE-SPAN-CORRUPT.html">HTTP:STC:IE:TABLE-SPAN-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Table Column Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLECELL-INFO-DISC.html">HTTP:STC:IE:TABLECELL-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTableCell get_cellIndex Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLES-MEMCORRUPT.html">HTTP:STC:IE:TABLES-MEMCORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Tables Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATEXT-HELP-ZONE-BP.html">HTTP:STC:IE:TEXT-HELP-ZONE-BP</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Text Help Zone Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATEXTRANGE-OBJ.html">HTTP:STC:IE:TEXTRANGE-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer TextRange Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATIF-DND.html">HTTP:STC:IE:TIF-DND</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer TIF Drag and Drop Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATIF-DND1.html">HTTP:STC:IE:TIF-DND1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer TIF Drag and Drop Vulnerability1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATIME-ELEMENT.html">HTTP:STC:IE:TIME-ELEMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Time Element Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATIME-RCE.html">HTTP:STC:IE:TIME-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Time Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATITLE-BAR-URI.html">HTTP:STC:IE:TITLE-BAR-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: URI in Popup Title Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATITLE-ELM-CHG.html">HTTP:STC:IE:TITLE-ELM-CHG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Title Element Change Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATOSTATIC-DISC.html">HTTP:STC:IE:TOSTATIC-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer &#39;toStaticHTML&#39; Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATOSTATIC-XSS.html">HTTP:STC:IE:TOSTATIC-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer ToStatic Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATOSTATICHTML.html">HTTP:STC:IE:TOSTATICHTML</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer 8 toStaticHTML 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATREE-POS-OBJECT-RCE.html">HTTP:STC:IE:TREE-POS-OBJECT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTreePos Object Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATYPE-CONFUSION-RCE.html">HTTP:STC:IE:TYPE-CONFUSION-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-ARBITRARY-CE.html">HTTP:STC:IE:UAF-ARBITRARY-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MC.html">HTTP:STC:IE:UAF-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MC-RCE.html">HTTP:STC:IE:UAF-MC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free Remote Code Execution (CVE-2013-3116)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MEM-COR.html">HTTP:STC:IE:UAF-MEM-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3151)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MEM-CORR.html">HTTP:STC:IE:UAF-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-1309)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-RCE.html">HTTP:STC:IE:UAF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNCLOSED-DIV-UAF.html">HTTP:STC:IE:UNCLOSED-DIV-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unclosed Div Element Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNINIT-CORRUPT.html">HTTP:STC:IE:UNINIT-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Memory Corruption (CVE-2010-1259)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNINIT-DOM.html">HTTP:STC:IE:UNINIT-DOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized DOM Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNINIT-LAYOUT.html">HTTP:STC:IE:UNINIT-LAYOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Layout Memory Corruption (CVE-2008-3475)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNINIT-MEM-CORR.html">HTTP:STC:IE:UNINIT-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Memory Corruption (CVE-2010-2559)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNISCRIBE-FNPS-MC.html">HTTP:STC:IE:UNISCRIBE-FNPS-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Uniscribe Font Parsing Engine Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNSAFE-MEM-OPER-UAF.html">HTTP:STC:IE:UNSAFE-MEM-OPER-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unsafe Memory Operations Use-after-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AURI-INFODISC.html">HTTP:STC:IE:URI-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer URL Encoded Characters Parsing Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AURI-REDIRECTION.html">HTTP:STC:IE:URI-REDIRECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer URI Redirection Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AURL-FILE-BOF.html">HTTP:STC:IE:URL-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer Invalid URL File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AURL-FILE-BOF1.html">HTTP:STC:IE:URL-FILE-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer Invalid URL File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AURL-HIDING-ENC.html">HTTP:STC:IE:URL-HIDING-ENC</a></b></td>
   <td width="500" valign="top">
    HTTP: Page With Malicious URL Hiding Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUSE-AFTER-FREE.html">HTTP:STC:IE:USE-AFTER-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free Remote Code Execution (CVE-2010-0249)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUSE-AFTR-FREE.html">HTTP:STC:IE:USE-AFTR-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTitleElement Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUSERDATA.html">HTTP:STC:IE:USERDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer UserData Attribute Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUTF8-DECODE-OF.html">HTTP:STC:IE:UTF8-DECODE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Decoding Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUTF8-DECODE-OF1.html">HTTP:STC:IE:UTF8-DECODE-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer HTML Decoding Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVBS-BSTR-HEAP-SPRAY.html">HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vbscript BSTR Heap Spray
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-AFTERFREE.html">HTTP:STC:IE:VML-AFTERFREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer VML Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-FILL-BOF.html">HTTP:STC:IE:VML-FILL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer VML Fill Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-MEM-CORRUPTION.html">HTTP:STC:IE:VML-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vector Markup Language Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-NUM-BOF.html">HTTP:STC:IE:VML-NUM-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: VML Recolorinfo Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-RCE.html">HTTP:STC:IE:VML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vector Markup Language Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-VGX-BOF.html">HTTP:STC:IE:VML-VGX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vector Markup Language VGX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVTABLE-CODE-EXEC.html">HTTP:STC:IE:VTABLE-CODE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer vtable Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVTABLE-RCE.html">HTTP:STC:IE:VTABLE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Virtual Function Table Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWIN-ADO-EXEC.html">HTTP:STC:IE:WIN-ADO-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Data Access Components ADO Record Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWINCVE-2014-4113-PE.html">HTTP:STC:IE:WINCVE-2014-4113-PE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-4113 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWMP-BMP-OF-1.html">HTTP:STC:IE:WMP-BMP-OF-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Player BMP Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWMP-BMP-OF-3.html">HTTP:STC:IE:WMP-BMP-OF-3</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Player BMP Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWMP-SKIN-EXEC.html">HTTP:STC:IE:WMP-SKIN-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player Skin File Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWRITE-WAT-WHERE-UAF.html">HTTP:STC:IE:WRITE-WAT-WHERE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Handling DataView Object Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWSZ-EXEC.html">HTTP:STC:IE:WSZ-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer/WinAmp .WSZ Plugin Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AX-DOMAIN-INFO.html">HTTP:STC:IE:X-DOMAIN-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cross Domain Information Disclosure (CVE-2010-3330)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXFRAME-REST-BYPASS.html">HTTP:STC:IE:XFRAME-REST-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Cross Frame Scripting Restriction Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-DISCLOSE.html">HTTP:STC:IE:XML-DISCLOSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer XML Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-DISCLOSE1.html">HTTP:STC:IE:XML-DISCLOSE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer XML Disclosure1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-ELEMENT-RCE.html">HTTP:STC:IE:XML-ELEMENT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer XML Element Handler Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-HANDLE-EXEC.html">HTTP:STC:IE:XML-HANDLE-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer XML Handling Exploit Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-HANDLE-EXEC1.html">HTTP:STC:IE:XML-HANDLE-EXEC1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer XML Handling Exploit Attempt1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-HMAC-BYPASS.html">HTTP:STC:IE:XML-HMAC-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: XML Signature HMAC Truncation Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-MEM-COR.html">HTTP:STC:IE:XML-MEM-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services Integer Truncation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-MIME-CORRUPT.html">HTTP:STC:IE:XML-MIME-CORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services MIME Viewer Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-PARSER-RCE.html">HTTP:STC:IE:XML-PARSER-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Improper XML Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-RCE.html">HTTP:STC:IE:XML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer XML Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXMLDOM-INFODISC.html">HTTP:STC:IE:XMLDOM-INFODISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer XMLDOM ActiveX Control Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXSLT-MC.html">HTTP:STC:IE:XSLT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer XSLT Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXSS-FILTER-DISC.html">HTTP:STC:IE:XSS-FILTER-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Cross-Site Scripting Filter Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AZONE-BYPASS.html">HTTP:STC:IE:ZONE-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Popup Window Zone Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AZONE-SPOOF.html">HTTP:STC:IE:ZONE-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Zone Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AZONE-SPOOF-2.html">HTTP:STC:IE:ZONE-SPOOF-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Browser Zone Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AANI-BLOCK-STR2.html">HTTP:STC:IMG:ANI-BLOCK-STR2</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid ANI Block Size Parameter in Stream (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AANI-BLOCK-STR23.html">HTTP:STC:IMG:ANI-BLOCK-STR23</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid ANI Block Size Parameter in Stream (2)3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AANI-FILE-DOS.html">HTTP:STC:IMG:ANI-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows ANI File Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ABMP-BAD-PARAMETER.html">HTTP:STC:IMG:BMP-BAD-PARAMETER</a></b></td>
   <td width="500" valign="top">
    HTTP: BMP Bad Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ABMP-HDR-IO.html">HTTP:STC:IMG:BMP-HDR-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: BMP Header biClrUsed Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ABMP-HEADER-UF.html">HTTP:STC:IMG:BMP-HEADER-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: BMP Image Header Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ABMP-OVERFLOW.html">HTTP:STC:IMG:BMP-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: BMP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ABMP-WIDTH-OF.html">HTTP:STC:IMG:BMP-WIDTH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Overlarge BMP Width Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AEMF-DOWNLOAD.html">HTTP:STC:IMG:EMF-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: EMF File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AEXE-FOR-IMAGE.html">HTTP:STC:IMG:EXE-FOR-IMAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Executable Binary Returned for Image Requested
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AEXE-FOR-IMG-TYPE.html">HTTP:STC:IMG:EXE-FOR-IMG-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Executable Returned For Image File Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AEXE-IN-IMAGE.html">HTTP:STC:IMG:EXE-IN-IMAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Executable Binary Disguised as Image
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AGIF-BAD-PARAMETER.html">HTTP:STC:IMG:GIF-BAD-PARAMETER</a></b></td>
   <td width="500" valign="top">
    HTTP: Bad GIF Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AGOOGLE-SKETCH-BMP.html">HTTP:STC:IMG:GOOGLE-SKETCH-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3663)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AICO-SIZE-OF.html">HTTP:STC:IMG:ICO-SIZE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Overlarge ICO Size Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJAVA-GIF-MEM.html">HTTP:STC:IMG:JAVA-GIF-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment GIF Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJDK-ICC.html">HTTP:STC:IMG:JDK-ICC</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun JDK Image Parsing Library ICC Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-BAD-LENGTH.html">HTTP:STC:IMG:JPEG-BAD-LENGTH</a></b></td>
   <td width="500" valign="top">
    HTTP: JPEG Invalid Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-HEIGHT-OF.html">HTTP:STC:IMG:JPEG-HEIGHT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Overlarge JPEG (Height)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-MAL-MARKER.html">HTTP:STC:IMG:JPEG-MAL-MARKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Malformed JPEG Marker Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-SCRIPT.html">HTTP:STC:IMG:JPEG-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Cross Site Scripting Via JPEG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-UNDERRUN.html">HTTP:STC:IMG:JPEG-UNDERRUN</a></b></td>
   <td width="500" valign="top">
    HTTP: JPEG Underrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-WIDTH-OF.html">HTTP:STC:IMG:JPEG-WIDTH-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Overlarge JPEG (Width)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG-WIDTH-OF1.html">HTTP:STC:IMG:JPEG-WIDTH-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Internet Explorer Overlarge JPEG (Width)1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG%3AWIN-COLOR.html">HTTP:STC:IMG:JPEG:WIN-COLOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Color Management Module Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEG%3AWIN-COLOR1.html">HTTP:STC:IMG:JPEG:WIN-COLOR1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Color Management Module Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AJPEGDECODERAW-FUNC.html">HTTP:STC:IMG:JPEGDECODERAW-FUNC</a></b></td>
   <td width="500" valign="top">
    HTTP: LibTIFF JPEGDecodeRaw Function Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AKODAK-TIFF.html">HTTP:STC:IMG:KODAK-TIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kodak Image Viewer Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AKODAK-TIFF1.html">HTTP:STC:IMG:KODAK-TIFF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kodak Image Viewer Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ALIBPNG-CHUNK-OV.html">HTTP:STC:IMG:LIBPNG-CHUNK-OV</a></b></td>
   <td width="500" valign="top">
    HTTP: Libpng Chunk Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ALIBPNG-ROWS.html">HTTP:STC:IMG:LIBPNG-ROWS</a></b></td>
   <td width="500" valign="top">
    HTTP: libpng Image Rows Parsing Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMAL-EMF.html">HTTP:STC:IMG:MAL-EMF</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed EMF File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMAL-EMF-2.html">HTTP:STC:IMG:MAL-EMF-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed EMF File (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMAL-WMF-REC-OF.html">HTTP:STC:IMG:MAL-WMF-REC-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows MetaFile Record Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMALFORMED-BMP.html">HTTP:STC:IMG:MALFORMED-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed BMP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMALFORMED-EMF-TAG.html">HTTP:STC:IMG:MALFORMED-EMF-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed EMF Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMALFORMED-EMF-TAG1.html">HTTP:STC:IMG:MALFORMED-EMF-TAG1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed EMF Tag1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMALFORMED-JPEG.html">HTTP:STC:IMG:MALFORMED-JPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed JPEG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMS-BMP-OF.html">HTTP:STC:IMG:MS-BMP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Rendering Engine BMP File Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMS-GIFGDI-OF.html">HTTP:STC:IMG:MS-GIFGDI-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Rendering Engine GIF Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AMS-OFFICE-GIF.html">HTTP:STC:IMG:MS-OFFICE-GIF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malformed GIF File Parser Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANO-JPG-GIF-PNG-BMP.html">HTTP:STC:IMG:NO-JPG-GIF-PNG-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Response is not JPEG/GIF/PNG/BMP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANOT-BMP.html">HTTP:STC:IMG:NOT-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Data is Not BMP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANOT-GIF.html">HTTP:STC:IMG:NOT-GIF</a></b></td>
   <td width="500" valign="top">
    HTTP: Data is Not GIF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANOT-JPEG.html">HTTP:STC:IMG:NOT-JPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Data is Not JPEG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANOT-PNG.html">HTTP:STC:IMG:NOT-PNG</a></b></td>
   <td width="500" valign="top">
    HTTP: Not PNG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFEND-GG.html">HTTP:STC:IMG:OFFEND-GG</a></b></td>
   <td width="500" valign="top">
    HTTP: Common Offensive Picture (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFEND-TG.html">HTTP:STC:IMG:OFFEND-TG</a></b></td>
   <td width="500" valign="top">
    HTTP: Common Offensive Picture (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-FLASHPIX.html">HTTP:STC:IMG:OFFICE-FLASHPIX</a></b></td>
   <td width="500" valign="top">
    HTTP:  Microsoft Office Malicious FlashPix Graphics File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-FLASHPIX1.html">HTTP:STC:IMG:OFFICE-FLASHPIX1</a></b></td>
   <td width="500" valign="top">
    HTTP:  Microsoft Office Malicious FlashPix Graphics File1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-FLASHPIX2.html">HTTP:STC:IMG:OFFICE-FLASHPIX2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malicious FlashPix Image (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-FLASHPIX21.html">HTTP:STC:IMG:OFFICE-FLASHPIX21</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malicious FlashPix Image (2)1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-MAL-TIF.html">HTTP:STC:IMG:OFFICE-MAL-TIF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malicious TIF File (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOFFICE-MAL-TIFF3.html">HTTP:STC:IMG:OFFICE-MAL-TIFF3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Malicious TIFF Image (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AOVERLARGE-BMP.html">HTTP:STC:IMG:OVERLARGE-BMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Overlarge BMP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APAINT-JPEG-OF.html">HTTP:STC:IMG:PAINT-JPEG-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Paint JPEG Image Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APHP-AS-GIF.html">HTTP:STC:IMG:PHP-AS-GIF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Masquerading as GIF Image
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APICT-POLY-UF.html">HTTP:STC:IMG:PICT-POLY-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT Poly Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APICT-UNCOMP-UF.html">HTTP:STC:IMG:PICT-UNCOMP-UF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime PICT Uncompressedfile Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-CHUNK-OF.html">HTTP:STC:IMG:PNG-CHUNK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG Type Chunk Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-HEIGHT.html">HTTP:STC:IMG:PNG-HEIGHT</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid PNG Height
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-IHDR-BAD-PAR.html">HTTP:STC:IMG:PNG-IHDR-BAD-PAR</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG IHDR-chunk Bad Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-IO.html">HTTP:STC:IMG:PNG-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-NAME-ERROR.html">HTTP:STC:IMG:PNG-NAME-ERROR</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG Chunk Name Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-PLTE-ERROR.html">HTTP:STC:IMG:PNG-PLTE-ERROR</a></b></td>
   <td width="500" valign="top">
    HTTP: PLTE-chunk Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-TEXT.html">HTTP:STC:IMG:PNG-TEXT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDIplus PNG TEXT Chunk Processing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-TRNS-ERROR.html">HTTP:STC:IMG:PNG-TRNS-ERROR</a></b></td>
   <td width="500" valign="top">
    HTTP: Bad tRNS Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG-WIDTH.html">HTTP:STC:IMG:PNG-WIDTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Invalid PNG Width
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG_CHUNK_OVERFLOW.html">HTTP:STC:IMG:PNG_CHUNK_OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG-Chunk Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3APNG_IHDR_INVAL_LEN.html">HTTP:STC:IMG:PNG_IHDR_INVAL_LEN</a></b></td>
   <td width="500" valign="top">
    HTTP: PNG IHDR-chunk Invalid Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ASUN-JAVA-PNG-BOF.html">HTTP:STC:IMG:SUN-JAVA-PNG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Web Start Splashscreen PNG Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ATARGA-IMG-HEAP.html">HTTP:STC:IMG:TARGA-IMG-HEAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX RLE Compressed Targa Image File Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ATARGA-IMG-HEAP1.html">HTTP:STC:IMG:TARGA-IMG-HEAP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX RLE Compressed Targa Image File Heap Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ATFF-THUNDER.html">HTTP:STC:IMG:TFF-THUNDER</a></b></td>
   <td width="500" valign="top">
    HTTP: TIFF Thunder decoder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ATIFF-BOF.html">HTTP:STC:IMG:TIFF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDIplus TIFF parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-DOWNLOAD.html">HTTP:STC:IMG:WMF-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-MAL-HEADER.html">HTTP:STC:IMG:WMF-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF Malformed Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-MALFORMED.html">HTTP:STC:IMG:WMF-MALFORMED</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF Malformed File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-METASPLOIT.html">HTTP:STC:IMG:WMF-METASPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF Metasploit File (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-METASPLOIT-GZ.html">HTTP:STC:IMG:WMF-METASPLOIT-GZ</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF Metasploit File Gzip Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-METASPLOIT2.html">HTTP:STC:IMG:WMF-METASPLOIT2</a></b></td>
   <td width="500" valign="top">
    HTTP: WMF Metasploit File (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMF-SETPALETTE.html">HTTP:STC:IMG:WMF-SETPALETTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Metafile SetPalette Entries Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWMP-BMP-OF.html">HTTP:STC:IMG:WMP-BMP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Bitmap Image Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWPG-HEAP-OVF.html">HTTP:STC:IMG:WPG-HEAP-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office .wpg Image Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AXP-MAL-TIFF.html">HTTP:STC:IMG:XP-MAL-TIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office XP Malicious TIFF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AINTERWOVEN-WORKDOC-XSS.html">HTTP:STC:INTERWOVEN-WORKDOC-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: InterWoven WorkDocs XSS Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AITUNES-HANDLER-OF.html">HTTP:STC:ITUNES-HANDLER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple iTunes Handler Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AITUNES-PL.html">HTTP:STC:ITUNES-PL</a></b></td>
   <td width="500" valign="top">
    HTTP: Illegal iTunes Playlist URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-CLASS-FILE.html">HTTP:STC:JAVA:APPLET-CLASS-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Applet/Class File Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-RCE.html">HTTP:STC:JAVA:APPLET-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java 7 Applet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-RCE1.html">HTTP:STC:JAVA:APPLET-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java 7 Applet Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-REFLECTRCE.html">HTTP:STC:JAVA:APPLET-REFLECTRCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Applet Reflection Type Confusion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AATOMIC-SB-BREACH.html">HTTP:STC:JAVA:ATOMIC-SB-BREACH</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java AtomicReferenceArray Sandbox Breach
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ABASICSERVICEIMPL.html">HTTP:STC:JAVA:BASICSERVICEIMPL</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE BasicServiceImpl Sandbox Bypass 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ABEAST-WEBSOCKET.html">HTTP:STC:JAVA:BEAST-WEBSOCKET</a></b></td>
   <td width="500" valign="top">
    HTTP: Beast WebSocket Initialization
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ABYTCOMPNT-RSTR-MC.html">HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ByteComponentRaster Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ACLAS-VERIFY-ABORT.html">HTTP:STC:JAVA:CLAS-VERIFY-ABORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Class Verify Abort
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ACONCHASHMAP.html">HTTP:STC:JAVA:CONCHASHMAP</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ConcurrentHashMap Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ADOCBASE-BOF.html">HTTP:STC:JAVA:DOCBASE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java IE Browser Plugin docbase Parameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AFINAL-FIELD-OW.html">HTTP:STC:JAVA:FINAL-FIELD-OW</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Final Field Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AFONT-HANDLNG-BO.html">HTTP:STC:JAVA:FONT-HANDLNG-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Font Glyph Storage Handling Off-by-one Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AFONT-PARSING.html">HTTP:STC:JAVA:FONT-PARSING</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Font Parsing maxPoints Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AFONT-PROCESSING.html">HTTP:STC:JAVA:FONT-PROCESSING</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Font Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AGETSOUNDBANK-OF.html">HTTP:STC:JAVA:GETSOUNDBANK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java HsbParser.getSoundBank Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AGIF-MEMCORRUPT.html">HTTP:STC:JAVA:GIF-MEMCORRUPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java GIF File Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AGIF-MEMCORRUPT1.html">HTTP:STC:JAVA:GIF-MEMCORRUPT1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java GIF File Handling Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AGSUB-BOF.html">HTTP:STC:JAVA:GSUB-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE GSUB ReqFeatureIndex Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AGSUB-TABLE-BO.html">HTTP:STC:JAVA:GSUB-TABLE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE GSUB FeatureCount Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AHOTSPOT-BCODE-RCE.html">HTTP:STC:JAVA:HOTSPOT-BCODE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Hotspot Bytecode Verifier Type Confusion Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIBM-CLASS-LDR-RCE.html">HTTP:STC:JAVA:IBM-CLASS-LDR-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Java package java.lang.ClassLoader.defineClass Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIBM-CLASS-RCE.html">HTTP:STC:JAVA:IBM-CLASS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Java package java.lang.class Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIBM-RMI-PROXY-RCE.html">HTTP:STC:JAVA:IBM-RMI-PROXY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Java package com.ibm.rmi.util.ProxyUtil Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIMG-INTEGER-MC.html">HTTP:STC:JAVA:IMG-INTEGER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java java.awt.image.IntegerComponentRaster Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIMG-SETPIXELS-OF.html">HTTP:STC:JAVA:IMG-SETPIXELS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ImageRepresentation.setPixels Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AIMGLIB-LOOKUPBYTE.html">HTTP:STC:JAVA:IMGLIB-LOOKUPBYTE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ImagingLib LookupByteBI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAR-FILE-DOWNLOAD.html">HTTP:STC:JAVA:JAR-FILE-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Archive (JAR) File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAR-PROCESS-OF.html">HTTP:STC:JAVA:JAR-PROCESS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment JAR File Processing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAVA-VM-ARGS-OF.html">HTTP:STC:JAVA:JAVA-VM-ARGS-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java JNLP java-vm-args Attribute Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAVADEPLOY-RCE.html">HTTP:STC:JAVA:JAVADEPLOY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAVASE-LIBCALL-CE.html">HTTP:STC:JAVA:JAVASE-LIBCALL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE CVE-2015-2590 Library Calls Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAX-WS-RCE.html">HTTP:STC:JAVA:JAX-WS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Applet JAX-WS Class Handling Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJMX-FINDCLASS-RCE.html">HTTP:STC:JAVA:JMX-FINDCLASS-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java JMX findClass and elementFromComplex Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJMXMBEAN-RCE.html">HTTP:STC:JAVA:JMXMBEAN-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java JmxMBeanServer Package Sandbox Breach
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJNDI-BYPASS.html">HTTP:STC:JAVA:JNDI-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java JNDI Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJNLP-CHARSET-OF.html">HTTP:STC:JAVA:JNLP-CHARSET-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Web Start Charset Encoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJNLP-OF.html">HTTP:STC:JAVA:JNLP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Runtime Environment Web Start JNLP File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJPEGIMAGE-OF.html">HTTP:STC:JAVA:JPEGIMAGE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment JPEGImageReader Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJPEGIMGEWRITER-MC.html">HTTP:STC:JAVA:JPEGIMGEWRITER-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java JPEGImageWriter Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJRE-MEM-DISC.html">HTTP:STC:JAVA:JRE-MEM-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle JRE Memory Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJRE-PTR-CTRL-EXEC.html">HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle JRE Pointer Control Remote Code Execution Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ALOOKUPBYTEBI-MC.html">HTTP:STC:JAVA:LOOKUPBYTEBI-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java LookupByteBI Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AMAL-JNLP-FILE.html">HTTP:STC:JAVA:MAL-JNLP-FILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious Java JNLP File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AMETHODHANDLE.html">HTTP:STC:JAVA:METHODHANDLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Private MethodHandle Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AMIXERSEQ-OF.html">HTTP:STC:JAVA:MIXERSEQ-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java MixerSequencer.nAddControllerEventCallback Array Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AMORT-LIGATURE-BO.html">HTTP:STC:JAVA:MORT-LIGATURE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Font Parsing mort Table Ligature Subtable Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ANXT-UPDTE-RA.html">HTTP:STC:JAVA:NXT-UPDTE-RA</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java SE OCSP nextUpdate Replay Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AORA-BYTECODE-CE.html">HTTP:STC:JAVA:ORA-BYTECODE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Bytecode Verifier Cache Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AORACLE-IMGLIB-OVF.html">HTTP:STC:JAVA:ORACLE-IMGLIB-OVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java 2D ImagingLib Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3APACK200-INT.html">HTTP:STC:JAVA:PACK200-INT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment Pack200 Decompression Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3APHANTOM-OBJ-RCE.html">HTTP:STC:JAVA:PHANTOM-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Garbage Collector Phantom Object References Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3APRVDR-SKLTON-SB.html">HTTP:STC:JAVA:PRVDR-SKLTON-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ProviderSkeleton Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3APRVDR-SKLTON-SB1.html">HTTP:STC:JAVA:PRVDR-SKLTON-SB1</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java ProviderSkeleton Sandbox Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ARUNTIME-ENV-BO.html">HTTP:STC:JAVA:RUNTIME-ENV-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java RunTime Environment Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASANDBOX-BYPASS.html">HTTP:STC:JAVA:SANDBOX-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun JAVA Plug-in Sandbox Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASEC-SLIDER-BYPASS.html">HTTP:STC:JAVA:SEC-SLIDER-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Security Slider Feature Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASETDIFFICM-BOF.html">HTTP:STC:JAVA:SETDIFFICM-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime AWT setDifflCM Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASETPIXEL-INF-DISC.html">HTTP:STC:JAVA:SETPIXEL-INF-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java awt_setPixels Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASHORT-COMPONENT.html">HTTP:STC:JAVA:SHORT-COMPONENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Environment ShortComponentRaster.verify Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASIGNED-APPLET-CE.html">HTTP:STC:JAVA:SIGNED-APPLET-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Signed Applet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASIGVERIFY-BYPASS.html">HTTP:STC:JAVA:SIGVERIFY-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle JRE Signature Verification Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASQL-DRIVERMANAGER.html">HTTP:STC:JAVA:SQL-DRIVERMANAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java java.sql.DriverManager Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASTOREIMG-ARRAY-BO.html">HTTP:STC:JAVA:STOREIMG-ARRAY-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Environment storeImageArray Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ATRUE-TYPE-FONT-OF.html">HTTP:STC:JAVA:TRUE-TYPE-FONT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime True Type Font IDEF Opcode Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ATYPE1-FONT.html">HTTP:STC:JAVA:TYPE1-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Runtime Environment Type1 Font Parsing Integer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ATYPECONF.html">HTTP:STC:JAVA:TYPECONF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Java AtomicReferenceFieldUpdater Type Confusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AWEBSTART.html">HTTP:STC:JAVA:WEBSTART</a></b></td>
   <td width="500" valign="top">
    HTTP: Java Web Start Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJS-DATA-SCHEME.html">HTTP:STC:JS-DATA-SCHEME</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript &quot;data:&quot; URL Scheme Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AJSXX-OBFS-JS.html">HTTP:STC:JSXX-OBFS-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: JSXX JavaScript Obfuscator Tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ALOTUS-CAI-URI.html">HTTP:STC:LOTUS-CAI-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Expeditor cai URI Handler Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AM3U-VLC-SMB-LINK.html">HTTP:STC:M3U-VLC-SMB-LINK</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC Media Player SMB Link Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMALFORMED-RESPONSE1.html">HTTP:STC:MALFORMED-RESPONSE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed HTTP Server Response1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMCAFEE-FILE-NAME-OF.html">HTTP:STC:MCAFEE-FILE-NAME-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: McAfee VirusScan On-Access Scanner Long Unicode Filename Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMHTML-CDI.html">HTTP:STC:MHTML-CDI</a></b></td>
   <td width="500" valign="top">
    HTTP: MHTML Encoding Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMICROSOFT-GDI-TIFF-RCE.html">HTTP:STC:MICROSOFT-GDI-TIFF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Microsoft Products TIFF Image Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMIRC-URI-OF.html">HTTP:STC:MIRC-URI-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: mIRC IRC URI Handler Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AADDON-RCE.html">HTTP:STC:MOZILLA:ADDON-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Bootstrapped Addon Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AARGMNT-FUNC-CE.html">HTTP:STC:MOZILLA:ARGMNT-FUNC-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Browsers JavaScript Argument Passing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AARRAY-DANGLE.html">HTTP:STC:MOZILLA:ARRAY-DANGLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Plugin Parameter Array Dangling Pointer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACANVAS-BO.html">HTTP:STC:MOZILLA:CANVAS-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Canvas Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACHROME-PRIVESC.html">HTTP:STC:MOZILLA:CHROME-PRIVESC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CVE-2014-1510 WebIDL Implementation Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACLEARTEXTRUN.html">HTTP:STC:MOZILLA:CLEARTEXTRUN</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox ClearTextRun Function Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACONSTRUCTFRAME.html">HTTP:STC:MOZILLA:CONSTRUCTFRAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox ConstructFrame First-letter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACSSVALUE-MEM.html">HTTP:STC:MOZILLA:CSSVALUE-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products CSSValue Array Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADEFINESETTER.html">HTTP:STC:MOZILLA:DEFINESETTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla FireFox defineSetter Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADOC-WRITE-MC.html">HTTP:STC:MOZILLA:DOC-WRITE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Document.Write And DOM Insertions Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADOMNODEREMOVED.html">HTTP:STC:MOZILLA:DOMNODEREMOVED</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox DOMNodeRemoved Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADOMSVGLNGTH.html">HTTP:STC:MOZILLA:DOMSVGLNGTH</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox DOMSVGLength Object Use-After-Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADUP-LOC-HEADER.html">HTTP:STC:MOZILLA:DUP-LOC-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products Duplicate Location Headers Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AEVENT-DLOAD.html">HTTP:STC:MOZILLA:EVENT-DLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla FireFox Click Event File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-ADDR-SPOOF1.html">HTTP:STC:MOZILLA:FF-ADDR-SPOOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Address Bar URI Spoofing 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-ARRAY-SLICE.html">HTTP:STC:MOZILLA:FF-ARRAY-SLICE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox JavaScript Array.splice Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-COMPARTMENT.html">HTTP:STC:MOZILLA:FF-COMPARTMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser Compartment Mismatch Re-attaching XBL-backed Nodes
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-DEL-OBJ-REF.html">HTTP:STC:MOZILLA:FF-DEL-OBJ-REF</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Deleted Object Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-IMG-TAG-DO1.html">HTTP:STC:MOZILLA:FF-IMG-TAG-DO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox IMG Tag Parsing Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-IMG-TAG-DOS.html">HTTP:STC:MOZILLA:FF-IMG-TAG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox IMG Tag Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-INFO.html">HTTP:STC:MOZILLA:FF-INFO</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox JavaScript Engine Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-PLUGINSPAGE.html">HTTP:STC:MOZILLA:FF-PLUGINSPAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox PLUGINSPAGE Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-REMOTE-MC.html">HTTP:STC:MOZILLA:FF-REMOTE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Remote Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-SELECT-UAF.html">HTTP:STC:MOZILLA:FF-SELECT-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser Select Element Heap Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-TOSOURCE.html">HTTP:STC:MOZILLA:FF-TOSOURCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Javascript Engine tosource Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-WYCIWYG.html">HTTP:STC:MOZILLA:FF-WYCIWYG</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox WYCIWYG URI Cache Zone Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-XSL-TRANS.html">HTTP:STC:MOZILLA:FF-XSL-TRANS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XSL Transformation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF2-DIR-TRAV.html">HTTP:STC:MOZILLA:FF2-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox 2.0.0.4 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIRE-FAVICON.html">HTTP:STC:MOZILLA:FIRE-FAVICON</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Favicon JavaScript Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREBURN.html">HTTP:STC:MOZILLA:FIREBURN</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox FireBurn
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFLASH.html">HTTP:STC:MOZILLA:FIREFLASH</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla FireFox Hidden Frame Overlay
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-DOS.html">HTTP:STC:MOZILLA:FIREFOX-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-ENG-MC.html">HTTP:STC:MOZILLA:FIREFOX-ENG-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Browser Engine Memory Corruption (CVE-2009-1392)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-INPUT.html">HTTP:STC:MOZILLA:FIREFOX-INPUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox File Input Element Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-MC.html">HTTP:STC:MOZILLA:FIREFOX-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Browser Engine CVE-2009-3382 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-NSTREE.html">HTTP:STC:MOZILLA:FIREFOX-NSTREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox nsTreeRange Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREFOX-XPCOM.html">HTTP:STC:MOZILLA:FIREFOX-XPCOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XPCOM Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIRESEARCH.html">HTTP:STC:MOZILLA:FIRESEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox FireSearching
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFIREUNICODE.html">HTTP:STC:MOZILLA:FIREUNICODE</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Unicode Sequence handling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFRAME-COMMENT.html">HTTP:STC:MOZILLA:FRAME-COMMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Frame Comment Objects 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AGIF89A-EXT.html">HTTP:STC:MOZILLA:GIF89A-EXT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Gif89A:Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AHOST-MAL-IDN.html">HTTP:STC:MOZILLA:HOST-MAL-IDN</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Host IDN Illegal Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AHTML-JS-DOS.html">HTTP:STC:MOZILLA:HTML-JS-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox HTML Java Script Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AICONURL-JS.html">HTTP:STC:MOZILLA:ICONURL-JS</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox IconURL JavaScript Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AIFRAME-SRC.html">HTTP:STC:MOZILLA:IFRAME-SRC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Java Script in IFRAME Src
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AIFRAME-STYLE.html">HTTP:STC:MOZILLA:IFRAME-STYLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox IFRAME Style Change Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AINNER-HTML-DOS.html">HTTP:STC:MOZILLA:INNER-HTML-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla innerHTML Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AJIT-ESCAPE-MC.html">HTTP:STC:MOZILLA:JIT-ESCAPE-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox JIT escape Function Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AJS-EVAL.html">HTTP:STC:MOZILLA:JS-EVAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Javascript Eval Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AJSCRIPT-CLIP.html">HTTP:STC:MOZILLA:JSCRIPT-CLIP</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla JavaScript Clipboard Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALAYOUT-HEAP-OF.html">HTTP:STC:MOZILLA:LAYOUT-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox In The Wild Layout Rendering Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALAYOUT-MC.html">HTTP:STC:MOZILLA:LAYOUT-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products Layout Engine Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALOCATION-HOST.html">HTTP:STC:MOZILLA:LOCATION-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Dom Property Cookie Theft
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALOOKUP-MEM-CO1.html">HTTP:STC:MOZILLA:LOOKUP-MEM-CO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products LookupProperty Memory Corruption 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMAL-REG-EX.html">HTTP:STC:MOZILLA:MAL-REG-EX</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products Malformed Regular Expressions
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMAL-SVG-INDEX.html">HTTP:STC:MOZILLA:MAL-SVG-INDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Malformed SVG Index Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMCHANNEL-UAF.html">HTTP:STC:MOZILLA:MCHANNEL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox OBJECT mChannel Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMESA-TEXIMG2D.html">HTTP:STC:MOZILLA:MESA-TEXIMG2D</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Mesa TexImage2D Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMOZ-BINDING.html">HTTP:STC:MOZILLA:MOZ-BINDING</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Browsers CSS moz-binding Cross Domain Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMOZ-FLOAT-OF.html">HTTP:STC:MOZILLA:MOZ-FLOAT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Floating Point Number Conversion Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMOZ-GRID-DOS.html">HTTP:STC:MOZILLA:MOZ-GRID-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products Moz Grid DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMOZ-TAG-ORDER.html">HTTP:STC:MOZILLA:MOZ-TAG-ORDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Tag Order Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMOZ-TAG-ORDER1.html">HTTP:STC:MOZILLA:MOZ-TAG-ORDER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Tag Order Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ANAV-OBJ-EXEC.html">HTTP:STC:MOZILLA:NAV-OBJ-EXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Navigator Object Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ANNTP-URL.html">HTTP:STC:MOZILLA:NNTP-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla NNTP URL Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ANNTP-URL1.html">HTTP:STC:MOZILLA:NNTP-URL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla NNTP URL Handling Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ANONASCII-LINK.html">HTTP:STC:MOZILLA:NONASCII-LINK</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Non-ASCII Character Link Heap Overrun
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ANSCSSVALUE-OF.html">HTTP:STC:MOZILLA:NSCSSVALUE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products nsCSSValue Array Index Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOBJ-TYPE-CURR.html">HTTP:STC:MOZILLA:OBJ-TYPE-CURR</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Web Browser Object Prototype Type Confusion/Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOFFSET-MEM-COR.html">HTTP:STC:MOZILLA:OFFSET-MEM-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Object Offset Calculation Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOGG-VORBIS.html">HTTP:STC:MOZILLA:OGG-VORBIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Mozilla Products Ogg Vorbis Decoding Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOGG-VORBIS1.html">HTTP:STC:MOZILLA:OGG-VORBIS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Mozilla Products Ogg Vorbis Decoding Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AONKEYDOWN-FU.html">HTTP:STC:MOZILLA:ONKEYDOWN-FU</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox OnKeyDown Event File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AONUNLOAD-SSL.html">HTTP:STC:MOZILLA:ONUNLOAD-SSL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Onunload SSL Certificate Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOVERFLOW-EVENT.html">HTTP:STC:MOZILLA:OVERFLOW-EVENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products Overflow Event Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3APARAM-OF.html">HTTP:STC:MOZILLA:PARAM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products EnsureCachedAttrParamArrays Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3APKCS11-RCE.html">HTTP:STC:MOZILLA:PKCS11-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox PKCS11 Module Installation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3APLUGIN-ACL.html">HTTP:STC:MOZILLA:PLUGIN-ACL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Plugin Access Control Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3APROPTAB-MEM.html">HTTP:STC:MOZILLA:PROPTAB-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox nsPropertyTable PropertyList Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AQUERYINT-OF.html">HTTP:STC:MOZILLA:QUERYINT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Metasploit Firefox QueryInterface Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AREADYSTATE-UAF.html">HTTP:STC:MOZILLA:READYSTATE-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Onreadystatechange Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AREDUCE-RIGHT.html">HTTP:STC:MOZILLA:REDUCE-RIGHT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products Array.reduceRight Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASHAREDWORK-UAF.html">HTTP:STC:MOZILLA:SHAREDWORK-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox SharedWorker MessagePort Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASHELL.html">HTTP:STC:MOZILLA:SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Local File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASIDEBAR.html">HTTP:STC:MOZILLA:SIDEBAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Sidebar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASOAPPARAM-OF.html">HTTP:STC:MOZILLA:SOAPPARAM-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox SOAP Parameter Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASSL-ICON.html">HTTP:STC:MOZILLA:SSL-ICON</a></b></td>
   <td width="500" valign="top">
    HTTP: SSL Icon Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASTR-REPLACE.html">HTTP:STC:MOZILLA:STR-REPLACE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla JavaScript String Replace Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASTR-RPLACE-MEM.html">HTTP:STC:MOZILLA:STR-RPLACE-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser String Replacement Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-CLIPPATH.html">HTTP:STC:MOZILLA:SVG-CLIPPATH</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox svg clippath stroke width Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-CODE-INJ.html">HTTP:STC:MOZILLA:SVG-CODE-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Browser SVG Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-DATA.html">HTTP:STC:MOZILLA:SVG-DATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox SVG Data Processing 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-IN-XBL-UAF.html">HTTP:STC:MOZILLA:SVG-IN-XBL-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser SVG In XBL Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-RCE.html">HTTP:STC:MOZILLA:SVG-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla SVG getCharNumAtPosition Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-XML-INT-OF.html">HTTP:STC:MOZILLA:SVG-XML-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla SVG-XML Integer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATABLE-BG-UAF.html">HTTP:STC:MOZILLA:TABLE-BG-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser TableBackgroundData::Destroy Heap-Use-After-Free.
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATABLE-FRAMES.html">HTTP:STC:MOZILLA:TABLE-FRAMES</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Multiple Products Table Frames Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATITLE-OF.html">HTTP:STC:MOZILLA:TITLE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Page Title Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATYPE-OBJ-RCE.html">HTTP:STC:MOZILLA:TYPE-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP:  Mozilla TypeObject Handling Use-after-free Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATYPE-OBJ-RCE1.html">HTTP:STC:MOZILLA:TYPE-OBJ-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP:  Mozilla TypeObject Handling Use-after-free Arbitrary Code Execution 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AURL-SHRTCUT.html">HTTP:STC:MOZILLA:URL-SHRTCUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Shortcut Processing Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AURLBAR-RCE.html">HTTP:STC:MOZILLA:URLBAR-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox URLBar Null Byte File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AWGL-BUFFERDATA.html">HTTP:STC:MOZILLA:WGL-BUFFERDATA</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Webgl Bufferedata Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AWRAPPED-JAVA.html">HTTP:STC:MOZILLA:WRAPPED-JAVA</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Wrapped Javascript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXBL-METHD-EVAL.html">HTTP:STC:MOZILLA:XBL-METHD-EVAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Products XBL.method.eval Javascript Function Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXBL-TAG-RM.html">HTTP:STC:MOZILLA:XBL-TAG-RM</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XBL Event Handler Tags Removal Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXML-MEM-CORR.html">HTTP:STC:MOZILLA:XML-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XML Parser Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXRAYWRAPPER-SB.html">HTTP:STC:MOZILLA:XRAYWRAPPER-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CVE-2014-8636 XrayWrapper Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXSLT-FILE-DOS.html">HTTP:STC:MOZILLA:XSLT-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XSLT Stylesheets Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXUL-DLL-DOS.html">HTTP:STC:MOZILLA:XUL-DLL-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Xul Dll Null Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXUL-FRAMETREE.html">HTTP:STC:MOZILLA:XUL-FRAMETREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XUL Frame Tree Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXUL-NULL-MENU.html">HTTP:STC:MOZILLA:XUL-NULL-MENU</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XUL NULL Menu Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXUL-TREE.html">HTTP:STC:MOZILLA:XUL-TREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XUL Tree Element Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMPG123-STEREO-OF.html">HTTP:STC:MPG123-STEREO-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: mpg123 Remote Stereo Boundary Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2014-4121-RCE.html">HTTP:STC:MS-CVE-2014-4121-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CVE-2014-4121 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2435-CE.html">HTTP:STC:MS-CVE-2015-2435-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-2435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2460-CE.html">HTTP:STC:MS-CVE-2015-2460-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-2460 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2527-CE.html">HTTP:STC:MS-CVE-2015-2527-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2527 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-DIRECTSHOW-GIF-RCE.html">HTTP:STC:MS-DIRECTSHOW-GIF-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DirectShow Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-DOTNET-NAMESPACE-BO.html">HTTP:STC:MS-DOTNET-NAMESPACE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework S.DS.P Namespace Method Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-FOREFRONT-RCE.html">HTTP:STC:MS-FOREFRONT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Threat Management Gateway Client Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-FRONTPAGE-INFO-DISC.html">HTTP:STC:MS-FRONTPAGE-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage XML Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-JSCRIPT-ENGINE-RCE.html">HTTP:STC:MS-JSCRIPT-ENGINE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows JScript Scripting Engine Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OBJ-PACKAGER.html">HTTP:STC:MS-OBJ-PACKAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Object Packager Insecure Executable Launching
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-FILE-BOF.html">HTTP:STC:MS-OFFICE-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-WRITEAV-RCE.html">HTTP:STC:MS-OFFICE-WRITEAV-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote File Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-WRITEAV-RCE1.html">HTTP:STC:MS-OFFICE-WRITEAV-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote File Processing Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-XP-HTML-LINK.html">HTTP:STC:MS-OFFICE-XP-HTML-LINK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office XP HTML Link Processing Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-VISUALSTUD-BOF.html">HTTP:STC:MS-VISUALSTUD-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio Project File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WIN-JPEG-PARSE-IDIS.html">HTTP:STC:MS-WIN-JPEG-PARSE-IDIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component JPEG DHT Parsing Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WINDOWS-FILE-BOF.html">HTTP:STC:MS-WINDOWS-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Improper File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WINDOWS-FILE-RCE.html">HTTP:STC:MS-WINDOWS-FILE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows File Handling Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WORD-CVE-2013-1325.html">HTTP:STC:MS-WORD-CVE-2013-1325</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2013-1325 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WORD-INDEX-MC.html">HTTP:STC:MS-WORD-INDEX-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Bad Index Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-XML-RCE.html">HTTP:STC:MS-XML-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows XML Core Services (MSXML) XML Content Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMSA-SPOOF.html">HTTP:STC:MSA-SPOOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Agent Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMSXML-CVE-2015-1646-SB.html">HTTP:STC:MSXML-CVE-2015-1646-SB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MSXML3 CVE-2015-1646 Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AMSXML-XSLT-RCE.html">HTTP:STC:MSXML-XSLT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft MSXML XSLT Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANAV-REDIR.html">HTTP:STC:NAV-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: Navigation Page Spoof
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANDROID-BROW-SAME-ORIGN.html">HTTP:STC:NDROID-BROW-SAME-ORIGN</a></b></td>
   <td width="500" valign="top">
    HTTP: Android Browser URL Parser NULL-byte Handling Same Origin Policy Bypass 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANORTON%3ALAUNCHURL-HTTP.html">HTTP:STC:NORTON:LAUNCHURL-HTTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Norton Internet Security LaunchURL Exploit Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANORTON%3ANAV-AX-DOS.html">HTTP:STC:NORTON:NAV-AX-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Norton AntiVirus 2004 ActiveX Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANOTES-INI.html">HTTP:STC:NOTES-INI</a></b></td>
   <td width="500" valign="top">
    HTTP: Lotus Notes notes.ini Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ANOVEL-CLIENT-NMX-BOF.html">HTTP:STC:NOVEL-CLIENT-NMX-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Messenger Client Stack Based Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOBJ-FILE-BASE64.html">HTTP:STC:OBJ-FILE-BASE64</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Client Object Base64 File Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOFFCE-CVE-2015-1760-CE.html">HTTP:STC:OFFCE-CVE-2015-1760-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-1760 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOLE-AUTO-RCE.html">HTTP:STC:OLE-AUTO-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Object Linking and Embedding (OLE) Automation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOLE-SHELL.html">HTTP:STC:OLE-SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious OLE Object in Office Document
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOLE-SHELL1.html">HTTP:STC:OLE-SHELL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious OLE Object in Office Document1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AON-BEFORE-UNLOAD.html">HTTP:STC:ON-BEFORE-UNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer OnBeforeUnload JavaScript Address Bar Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AALERTBOX-BOVF.html">HTTP:STC:OPERA:ALERTBOX-BOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera Javascript Alert Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3ADOCUMENT-WRITE.html">HTTP:STC:OPERA:DOCUMENT-WRITE</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera Browser Document Writing Uninitialized Memory Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AFILE-URL-OF.html">HTTP:STC:OPERA:FILE-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera File URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AGETIMAGEDATA-MC.html">HTTP:STC:OPERA:GETIMAGEDATA-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera javascript getimagedata Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AGIF-PROC-MC.html">HTTP:STC:OPERA:GIF-PROC-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera Software Opera GIF Processing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AOPERA-CONFIG.html">HTTP:STC:OPERA:OPERA-CONFIG</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera &#39;opera:config&#39; Security Bypass Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3ASVG-ANIMATION.html">HTTP:STC:OPERA:SVG-ANIMATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera svg Animation Element Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3ASVG-CLIPPATH-MC.html">HTTP:STC:OPERA:SVG-CLIPPATH-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera SVG clipPath Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3ATELNET-URI.html">HTTP:STC:OPERA:TELNET-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Opera Telnet URI Handler File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AORACLE-ENDECA-CSRF.html">HTTP:STC:ORACLE-ENDECA-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Server CVE-2014-2399 Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AORBIT-DL-URL.html">HTTP:STC:ORBIT-DL-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: Orbit Downloader Long URL Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOSX-UPDATE.html">HTTP:STC:OSX-UPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple OS X Update Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AMAILTO-QUOT-CE.html">HTTP:STC:OUTLOOK:MAILTO-QUOT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook Mailto Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AOUTLOOK-PRF.html">HTTP:STC:OUTLOOK:OUTLOOK-PRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook PRF File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3ASHELL-PROFILE.html">HTTP:STC:OUTLOOK:SHELL-PROFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Outlook Local File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AWAB-BOF.html">HTTP:STC:OUTLOOK:WAB-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Outlook Express Address Book Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AWAB-BOF1.html">HTTP:STC:OUTLOOK:WAB-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Outlook Express Address Book Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AWABFILE.html">HTTP:STC:OUTLOOK:WABFILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Address Book File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AOUTLOOK%3AWABFILE-STC.html">HTTP:STC:OUTLOOK:WABFILE-STC</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Address Book File Transfer-2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APAJAX-RCE.html">HTTP:STC:PAJAX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PAJAX Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APHP-DATE-TIME-OBJ-RCE.html">HTTP:STC:PHP-DATE-TIME-OBJ-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP DateTimeZone Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APHP-DATE-TIME-OBJ-UAF.html">HTTP:STC:PHP-DATE-TIME-OBJ-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP Date Time Object Unserialize Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APIWIGO-LOCALFILES-CSRF.html">HTTP:STC:PIWIGO-LOCALFILES-CSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Piwigo LocalFiles Editor Plugin File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APPT-CRAFTED-PATH.html">HTTP:STC:PPT-CRAFTED-PATH</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office PowerPoint File Path Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3APPT-LONGNAME.html">HTTP:STC:PPT-LONGNAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Powerpoint Long Filename Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AQT-RTSP-LINK-OF.html">HTTP:STC:QT-RTSP-LINK-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Quicktime RTSP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AQTIME-TEXTBOX-MEMC.html">HTTP:STC:QTIME-TEXTBOX-MEMC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime TeXML textBox Element Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AREPRISE-PARAM-PARSE-BO.html">HTTP:STC:REPRISE-PARAM-PARSE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Reprise License Manager HTTP Parameter Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ARESIZE-DOS.html">HTTP:STC:RESIZE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Image Resize Video Driver Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ARHINO-HDR-OF.html">HTTP:STC:RHINO-HDR-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Rhino Software Serv-U Server HTTP Request Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ARPM-CPIO-HDR-BOF.html">HTTP:STC:RPM-CPIO-HDR-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Red Hat Package Manager RPM File CPIO Header Handling Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ARSS-FEED-CODE-INJ.html">HTTP:STC:RSS-FEED-CODE-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Vista Feed Headlines Gadgets RSS Feed Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI-IE-RCE.html">HTTP:STC:SAFARI-IE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari for Windows and Internet Explorer Combined Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI-MALFRMD-URI-DOS.html">HTTP:STC:SAFARI-MALFRMD-URI-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Malformed URI Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACHARSET-XFORM.html">HTTP:STC:SAFARI:CHARSET-XFORM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit CSS Charset Text Transformation Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACHILD-REMOVAL.html">HTTP:STC:SAFARI:CHILD-REMOVAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Attribute Child Removal Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACMD-INJECTION.html">HTTP:STC:SAFARI:CMD-INJECTION</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Windows Protocol Handler Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACONSOLE-LOG-FS.html">HTTP:STC:SAFARI:CONSOLE-LOG-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari window.console.log Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACONT-EDITABLE.html">HTTP:STC:SAFARI:CONT-EDITABLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Option Element ContentEditable Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ACSS-FORMAT-HINT.html">HTTP:STC:SAFARI:CSS-FORMAT-HINT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari CSS format Argument Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ADISK-URI.html">HTTP:STC:SAFARI:DISK-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Disk Image URI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AFILE-URI.html">HTTP:STC:SAFARI:FILE-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari File URI Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AFLOAT-BOF.html">HTTP:STC:SAFARI:FLOAT-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Safari Webkit Floating Point Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AHELP-RUNSCRPT.html">HTTP:STC:SAFARI:HELP-RUNSCRPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Help Runscript URI Arbitrary AppleScript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AIMG-USE-FREE.html">HTTP:STC:SAFARI:IMG-USE-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari HTML Image Element Handling Use After Free Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AINNERHTML-MC.html">HTTP:STC:SAFARI:INNERHTML-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit innerHTML Double Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AIOS-JS-ARY-RCE.html">HTTP:STC:SAFARI:IOS-JS-ARY-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Safari on Apple iOS 2.0 JavaScript Array RCE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AIPHONE-LIBTIFF.html">HTTP:STC:SAFARI:IPHONE-LIBTIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: iPhone Mobile Safari LibTIFF Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AJSARR-SORT-HOVF.html">HTTP:STC:SAFARI:JSARR-SORT-HOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Javascript Array Sort Function Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AMAL-REGEX.html">HTTP:STC:SAFARI:MAL-REGEX</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Regular Expression Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AMUL-FUNC-DOS.html">HTTP:STC:SAFARI:MUL-FUNC-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Multiple Functions Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3APARENT-CLOSE.html">HTTP:STC:SAFARI:PARENT-CLOSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari parent.close Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ARTL-USE-FREE.html">HTTP:STC:SAFARI:RTL-USE-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Right-to-Left Text Rendering Use After Free Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ARUNIN-UAF.html">HTTP:STC:SAFARI:RUNIN-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Chrome and Apple Safari Run-in Handling Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3ASSH-URI.html">HTTP:STC:SAFARI:SSH-URI</a></b></td>
   <td width="500" valign="top">
    HTTP: Safari SSH URI Handler Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-1ST-LTR.html">HTTP:STC:SAFARI:WEBKIT-1ST-LTR</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Button First-Letter Style Rendering Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-AFREE.html">HTTP:STC:SAFARI:WEBKIT-AFREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Selections Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-COLUMN.html">HTTP:STC:SAFARI:WEBKIT-COLUMN</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Button Column Blocks Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-ELEMENTS.html">HTTP:STC:SAFARI:WEBKIT-ELEMENTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Form Elements Pure Virtual Function Call Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-FREE-CE.html">HTTP:STC:SAFARI:WEBKIT-FREE-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Use-After-Free Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-LIBXSLT.html">HTTP:STC:SAFARI:WEBKIT-LIBXSLT</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit libxslt Arbitrary File Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-MENU-MEM.html">HTTP:STC:SAFARI:WEBKIT-MENU-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Menu Onchange Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-RANGEOBJ.html">HTTP:STC:SAFARI:WEBKIT-RANGEOBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Range Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-RENDER.html">HTTP:STC:SAFARI:WEBKIT-RENDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit Rendering Counter Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-SVG-MARK.html">HTTP:STC:SAFARI:WEBKIT-SVG-MARK</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit SVG Markers Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-SVG-MC.html">HTTP:STC:SAFARI:WEBKIT-SVG-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit SVG Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AWEBKIT-TITLE.html">HTTP:STC:SAFARI:WEBKIT-TITLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari WebKit CSS Title Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE1.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE2.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE2</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE3.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE3</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE4.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE4</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE5.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE5</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE6.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE6</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE7.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE7</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE8.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE8</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AX-MAN-PAGE-RCE9.html">HTTP:STC:SAFARI:X-MAN-PAGE-RCE9</a></b></td>
   <td width="500" valign="top">
    HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AXML-INFI-RECUR.html">HTTP:STC:SAFARI:XML-INFI-RECUR</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Safari XML Infinite Recursion DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAP-SQL-ALIAS-BOF.html">HTTP:STC:SAP-SQL-ALIAS-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: SAP SQL Anywhere Data Provider Column Alias Remote Stack Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASBS-TRAIN.html">HTTP:STC:SBS-TRAIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Step-by-Step Interactive Training Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCHNEIDER-CFG-FILE-BO.html">HTTP:STC:SCHNEIDER-CFG-FILE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric VAMPSET CFG File Handling Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCHNEIDER-CFG-FILE-BO1.html">HTTP:STC:SCHNEIDER-CFG-FILE-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Schneider Electric VAMPSET CFG File Handling Buffer Overflow 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AAPACHE-XML-DOS.html">HTTP:STC:SCRIPT:APACHE-XML-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Santuario XML Security for Java DTD Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AAV-MAGIC-EVADE1.html">HTTP:STC:SCRIPT:AV-MAGIC-EVADE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Magic Byte Detection Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ABASE64-ENCODED.html">HTTP:STC:SCRIPT:BASE64-ENCODED</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript base64-encoded Data Object Found
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ABROWSER-RECON.html">HTTP:STC:SCRIPT:BROWSER-RECON</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Fingerprint
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ABROWSER-RECON-1.html">HTTP:STC:SCRIPT:BROWSER-RECON-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Browser Recon (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ACHAR-ENCODING.html">HTTP:STC:SCRIPT:CHAR-ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Alternating Character Encodings Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ACNSTR-QUOTE-OBF.html">HTTP:STC:SCRIPT:CNSTR-QUOTE-OBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ACONSTRUCTOR-OBF.html">HTTP:STC:SCRIPT:CONSTRUCTOR-OBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Java Script Method Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ACOOKIE-BOMB.html">HTTP:STC:SCRIPT:COOKIE-BOMB</a></b></td>
   <td width="500" valign="top">
    HTTP: Malicious Javascript CookieBomb Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ADEFINATION-HEAP.html">HTTP:STC:SCRIPT:DEFINATION-HEAP</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Redefinition of a HeapLib Object Likely Malicious Heap Spray Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ADIV-N-FUNC-OBFU.html">HTTP:STC:SCRIPT:DIV-N-FUNC-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Javascript Div Funcname Obfuscation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ADOUBLE-BACKSLA1.html">HTTP:STC:SCRIPT:DOUBLE-BACKSLA1</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Double BackSlash Hex Obfuscated Heap Spray1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ADOUBLE-BACKSLAS.html">HTTP:STC:SCRIPT:DOUBLE-BACKSLAS</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Double BackSlash Hex Obfuscated Heap Spray
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AEDWARDS-PACKER.html">HTTP:STC:SCRIPT:EDWARDS-PACKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Dean Edwards Javascript Packer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AEVAL-GIF-JSOBF.html">HTTP:STC:SCRIPT:EVAL-GIF-JSOBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Eval GIF Javascript Obfuscation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AEVAL-JSOBFU.html">HTTP:STC:SCRIPT:EVAL-JSOBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Tag Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AEVAL-OBFUSC.html">HTTP:STC:SCRIPT:EVAL-OBFUSC</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript eval Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFF-NAV-URI1.html">HTTP:STC:SCRIPT:FF-NAV-URI1</a></b></td>
   <td width="500" valign="top">
    HTTP: Firefox Internet Explorer and Navigator URI Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFUNC-CNSTR-OBFU.html">HTTP:STC:SCRIPT:FUNC-CNSTR-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Col Tag Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFUNC-EVAL-OBFU.html">HTTP:STC:SCRIPT:FUNC-EVAL-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser Obfuscated Java Script Handling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFUNC-REASSIGN.html">HTTP:STC:SCRIPT:FUNC-REASSIGN</a></b></td>
   <td width="500" valign="top">
    HTTP: Script Evasion Function Reassignment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFUNC-RTN-OBFU.html">HTTP:STC:SCRIPT:FUNC-RTN-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Style Tag Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AGARBLE-JS-OBFUS.html">HTTP:STC:SCRIPT:GARBLE-JS-OBFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Garble Javascript Obfuscation Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AGRUNT-JJENCODER.html">HTTP:STC:SCRIPT:GRUNT-JJENCODER</a></b></td>
   <td width="500" valign="top">
    HTTP: Grunt-jjencoder Javascript Obfuscation 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AHEAPLIB-OBJ.html">HTTP:STC:SCRIPT:HEAPLIB-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Excessive Use of HeapLib Objects Likely Malicious Heap Spray Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AHEAPSPRAY.html">HTTP:STC:SCRIPT:HEAPSPRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Heap Spray Attempt Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AHTML-SCRIPT.html">HTTP:STC:SCRIPT:HTML-SCRIPT</a></b></td>
   <td width="500" valign="top">
    HTTP: Script Outside HTML Closing Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJAVA-EVASION.html">HTTP:STC:SCRIPT:JAVA-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Evasion Technique Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-ARRAY-POST.html">HTTP:STC:SCRIPT:JS-ARRAY-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: Heuristics PHP Array POST Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-EK-ENC-OBF.html">HTTP:STC:SCRIPT:JS-EK-ENC-OBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious JS Payload Encoding Obfuscation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-MYOBFUSCATE.html">HTTP:STC:SCRIPT:JS-MYOBFUSCATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation myobfuscate Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-OB-EXPLOIT.html">HTTP:STC:SCRIPT:JS-OB-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation Seen in Exploit Kits
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-OB-IFRAMER.html">HTTP:STC:SCRIPT:JS-OB-IFRAMER</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation IFRAMEr Tool Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-OB-ROUTIN-1.html">HTTP:STC:SCRIPT:JS-OB-ROUTIN-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation Routine (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-OBFUS-ROUTIN.html">HTTP:STC:SCRIPT:JS-OBFUS-ROUTIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation Routine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-PACKER.html">HTTP:STC:SCRIPT:JS-PACKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation Known Packer Routine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-RENAME.html">HTTP:STC:SCRIPT:JS-RENAME</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript indexOf and substr rename attempt Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJS-STRING-OBFS.html">HTTP:STC:SCRIPT:JS-STRING-OBFS</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Multiple String Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJSEVAL-GEN-TECH.html">HTTP:STC:SCRIPT:JSEVAL-GEN-TECH</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript Packed Function Eval Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJSOBF-PLUGINVER.html">HTTP:STC:SCRIPT:JSOBF-PLUGINVER</a></b></td>
   <td width="500" valign="top">
    HTTP: JavaScript PluginVersion Detect Obfuscation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMAL-FILE-HNDRCE.html">HTTP:STC:SCRIPT:MAL-FILE-HNDRCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed File Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMATH-LIB.html">HTTP:STC:SCRIPT:MATH-LIB</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Math Library Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMS-JS-OBFUS.html">HTTP:STC:SCRIPT:MS-JS-OBFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word Javascript Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMUL-BASE-OBFU.html">HTTP:STC:SCRIPT:MUL-BASE-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMUL-OBJECT-TAGS.html">HTTP:STC:SCRIPT:MUL-OBJECT-TAGS</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript ActiveX Multiple Adjacent Object Tags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMUL-TAG-RTF-OBJ.html">HTTP:STC:SCRIPT:MUL-TAG-RTF-OBJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript multiple comment and binary tags used in embedded RTF object
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AMULTI-CHAR.html">HTTP:STC:SCRIPT:MULTI-CHAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Multiple Character Encodings Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ANONALPHANUMERIC.html">HTTP:STC:SCRIPT:NONALPHANUMERIC</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Non Alphanumeric Obfuscation Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AOBFUSCATED.html">HTTP:STC:SCRIPT:OBFUSCATED</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscated Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3APAYLOAD-SETUP.html">HTTP:STC:SCRIPT:PAYLOAD-SETUP</a></b></td>
   <td width="500" valign="top">
    HTTP: Script Evasion Payload Setup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3APYTHON-RECVFROM.html">HTTP:STC:SCRIPT:PYTHON-RECVFROM</a></b></td>
   <td width="500" valign="top">
    HTTP: Python socket.recvfrom_into() Function Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AREBOTS-DOT-PHP.html">HTTP:STC:SCRIPT:REBOTS-DOT-PHP</a></b></td>
   <td width="500" valign="top">
    HTTP: Rebots.php Javascript Include
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AREPLACE-OBSF.html">HTTP:STC:SCRIPT:REPLACE-OBSF</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Replace Function Unicode Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ARTRN-FUNC-OBFU.html">HTTP:STC:SCRIPT:RTRN-FUNC-OBFU</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscation (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ASPLIT-REVERSE.html">HTTP:STC:SCRIPT:SPLIT-REVERSE</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Split Reverse Join Obfuscation Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ASTRFMCC-MUL-BAS.html">HTTP:STC:SCRIPT:STRFMCC-MUL-BAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Obfuscator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ASTUNNIX-PACKER.html">HTTP:STC:SCRIPT:STUNNIX-PACKER</a></b></td>
   <td width="500" valign="top">
    HTTP: Stunnix Javascript Packer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ASVL-DBL-FREE.html">HTTP:STC:SCRIPT:SVL-DBL-FREE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Double Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ATRNSFM-STR-OBF.html">HTTP:STC:SCRIPT:TRNSFM-STR-OBF</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript transform_string Obfuscator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AUNESCAPE-HEX-OB.html">HTTP:STC:SCRIPT:UNESCAPE-HEX-OB</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Unescape Hex Obfuscated Content Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AUNESCAPE-OBFUS.html">HTTP:STC:SCRIPT:UNESCAPE-OBFUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript unescape Obfuscation Attempt Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AUNICODE-SLED.html">HTTP:STC:SCRIPT:UNICODE-SLED</a></b></td>
   <td width="500" valign="top">
    HTTP: Obfuscated Unicoded JavaScript NOP Sled
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AUUENCODED-EVAL.html">HTTP:STC:SCRIPT:UUENCODED-EVAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript uuencoded Eval Statement attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AVAR-HEAP-SHELL.html">HTTP:STC:SCRIPT:VAR-HEAP-SHELL</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript var heapspray and shellcode Attempt Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AVB-REGX-ID.html">HTTP:STC:SCRIPT:VB-REGX-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows VBScript Regular Expression Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AWEBEX-WRF-BOF1.html">HTTP:STC:SCRIPT:WEBEX-WRF-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: WebEx Player Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASEARCH-LINK.html">HTTP:STC:SEARCH-LINK</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Search Link
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-CE.html">HTTP:STC:SILVERLIGHT-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Privilege Escalation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-INFO-DISC.html">HTTP:STC:SILVERLIGHT-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight WriteableBitmap SetSource Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-MEM-COR.html">HTTP:STC:SILVERLIGHT-MEM-COR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Pointer Dereference Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-MEM-CORR.html">HTTP:STC:SILVERLIGHT-MEM-CORR</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-RCE.html">HTTP:STC:SILVERLIGHT-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASKYPE-URI-HANDLER.html">HTTP:STC:SKYPE-URI-HANDLER</a></b></td>
   <td width="500" valign="top">
    HTTP: Skype URI Handler / Datapath Argument Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASKYPE4COM.html">HTTP:STC:SKYPE4COM</a></b></td>
   <td width="500" valign="top">
    HTTP: Skype URI Handler Heap Corruption Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASOAPUI-WSDL-WADL-CE.html">HTTP:STC:SOAPUI-WSDL-WADL-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: SoapUI WSDL/WADL Import Functionality Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASRVRSP%3A403-FORBID.html">HTTP:STC:SRVRSP:403-FORBID</a></b></td>
   <td width="500" valign="top">
    HTTP: Unauthorized Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASRVRSP%3A404-NOT-FOUND.html">HTTP:STC:SRVRSP:404-NOT-FOUND</a></b></td>
   <td width="500" valign="top">
    HTTP: Server Error 404: Object Not Found
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASRVRSP%3AAUTH-RESP-OF.html">HTTP:STC:SRVRSP:AUTH-RESP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Large Authentication Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASRVRSP%3ACOMPRESSED.html">HTTP:STC:SRVRSP:COMPRESSED</a></b></td>
   <td width="500" valign="top">
    HTTP: Compressed Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASRVRSP%3AIDC-PATH.html">HTTP:STC:SRVRSP:IDC-PATH</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS IDC Path Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASSL%3AMD5-SIGNATURE.html">HTTP:STC:SSL:MD5-SIGNATURE</a></b></td>
   <td width="500" valign="top">
    HTTP: SSL Certificate Signed With MD5 Hash
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AASF-BOF.html">HTTP:STC:STREAM:ASF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Format ASF Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AASF-WMP.html">HTTP:STC:STREAM:ASF-WMP</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Format ASF Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AAVI.html">HTTP:STC:STREAM:AVI</a></b></td>
   <td width="500" valign="top">
    HTTP: AVI Movie Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ACINEPAK-RCE.html">HTTP:STC:STREAM:CINEPAK-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Cinepak Codec Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ACONTENT-TYPE.html">HTTP:STC:STREAM:CONTENT-TYPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Streaming Audio/Video Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ADIRECTSHOW-MJPG.html">HTTP:STC:STREAM:DIRECTSHOW-MJPG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows MJPEG Media Decompression Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ADIRECTSHOW-MP3.html">HTTP:STC:STREAM:DIRECTSHOW-MP3</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow MPEG Layer-3 Audio Decoder Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ADIRECTX-MJPEG.html">HTTP:STC:STREAM:DIRECTX-MJPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectX Crafted MJPEG Stream Handling Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ADIRSHOW-MJPEG.html">HTTP:STC:STREAM:DIRSHOW-MJPEG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow MJPEG Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ADIRSHOW-MJPEG1.html">HTTP:STC:STREAM:DIRSHOW-MJPEG1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft DirectShow MJPEG Parsing Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AFFDSHOW-URL-OF.html">HTTP:STC:STREAM:FFDSHOW-URL-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: ffdshow Codec Media Stream URL Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AFLASH-MEMORY.html">HTTP:STC:STREAM:FLASH-MEMORY</a></b></td>
   <td width="500" valign="top">
    HTTP: Macromedia Flash Player Improper Memory Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AFLV.html">HTTP:STC:STREAM:FLV</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Video File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AGDI-WMF-HEADER.html">HTTP:STC:STREAM:GDI-WMF-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDI WMF File HeaderSize Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AMAL-AVI-RIFF.html">HTTP:STC:STREAM:MAL-AVI-RIFF</a></b></td>
   <td width="500" valign="top">
    HTTP: Malformed AVI/RIFF File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AMAL-MEDIA.html">HTTP:STC:STREAM:MAL-MEDIA</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Media Player Malformed Media File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-DESC-ATOM.html">HTTP:STC:STREAM:QT-DESC-ATOM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Image Descriptor Atom Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-FLASHPIX-OF.html">HTTP:STC:STREAM:QT-FLASHPIX-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime FlashPix Movie File Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-HREFTRACK.html">HTTP:STC:STREAM:QT-HREFTRACK</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Quicktime &#39;HREFTrack&#39; Cross-Zone Scripting 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-IT-MEM.html">HTTP:STC:STREAM:QT-IT-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime and iTunes Heap Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-M3U.html">HTTP:STC:STREAM:QT-M3U</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime &#39;.m3u&#39; File Remote Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-MAL-SMIL.html">HTTP:STC:STREAM:QT-MAL-SMIL</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Malformed SMIL File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-MOV-FILE-BO1.html">HTTP:STC:STREAM:QT-MOV-FILE-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Movie File Clipping Region Handling Heap Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-MOV-FILE-BOF.html">HTTP:STC:STREAM:QT-MOV-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Movie File Clipping Region Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-MOV-IO.html">HTTP:STC:STREAM:QT-MOV-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MOV File String Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-MPEG-PAD.html">HTTP:STC:STREAM:QT-MPEG-PAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MPEG Stream Padding Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQT-RESPONSE-BO.html">HTTP:STC:STREAM:QT-RESPONSE-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Crafted HTTP Error Response Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AQUICKTIME-BO.html">HTTP:STC:STREAM:QUICKTIME-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Apple Quicktime 7 Invalid Atom Length Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREAL-AVI.html">HTTP:STC:STREAM:REAL-AVI</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer AVI Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREAL-MP4-MEM.html">HTTP:STC:STREAM:REAL-MP4-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Real Networks RealPlayer &#39;.mp4&#39; File Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREALAUDIO-OF.html">HTTP:STC:STREAM:REALAUDIO-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer RealAudio File Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREALMEDIA-PROC.html">HTTP:STC:STREAM:REALMEDIA-PROC</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer RealMedia File Format Processing Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREALPLAYER-MP3.html">HTTP:STC:STREAM:REALPLAYER-MP3</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer MP3 Files Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AREALPLAYER-QCP.html">HTTP:STC:STREAM:REALPLAYER-QCP</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer QCP Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ASHOCKWAVE-IO.html">HTTP:STC:STREAM:SHOCKWAVE-IO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player and AIR String Concatenation Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3ASWF.html">HTTP:STC:STREAM:SWF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AVLC-REALINDEX.html">HTTP:STC:STREAM:VLC-REALINDEX</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AVLC-REALINDEX1.html">HTTP:STC:STREAM:VLC-REALINDEX1</a></b></td>
   <td width="500" valign="top">
    HTTP: VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AWINAMP-META-OF.html">HTTP:STC:STREAM:WINAMP-META-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Nullsoft Winamp Ultravox Streaming Metadata Parsing Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AWMV.html">HTTP:STC:STREAM:WMV</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Media Video File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-ALPHA.html">HTTP:STC:SUSPICIOUS-JS-ALPHA</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript with Alphabet Array
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-EVASION.html">HTTP:STC:SUSPICIOUS-JS-EVASION</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript with Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-FUNC.html">HTTP:STC:SUSPICIOUS-JS-FUNC</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript Function
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AACTIONTAG.html">HTTP:STC:SWF:ACTIONTAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Action Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AADOBE-FLASH-FILEBO.html">HTTP:STC:SWF:ADOBE-FLASH-FILEBO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Improper File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AAS-POOL.html">HTTP:STC:SWF:AS-POOL</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Action Script Pool Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ABYTEARRAY.html">HTTP:STC:SWF:BYTEARRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF ByteArray Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACOPYRAWDATATO.html">HTTP:STC:SWF:COPYRAWDATATO</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player copyRawDataTo Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACVE-2013-3362-MC.html">HTTP:STC:SWF:CVE-2013-3362-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe FlashPlayer CVE-2013-3362 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACVE-2014-0510-MC.html">HTTP:STC:SWF:CVE-2014-0510-MC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0510 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACVE-2014-0585-CE.html">HTTP:STC:SWF:CVE-2014-0585-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0585 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ADEFSCENE-OF.html">HTTP:STC:SWF:DEFSCENE-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Multimedia File DefineSceneAndFrameLabelData Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AFLASH-DEFINEFONT.html">HTTP:STC:SWF:FLASH-DEFINEFONT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player DefineFontX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AFLASH-MEM-CORRUPT.html">HTTP:STC:SWF:FLASH-MEM-CORRUPT</a></b></td>
   <td width="500" valign="top">
    Adobe Flash Player Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AFLASH-SALIGN.html">HTTP:STC:SWF:FLASH-SALIGN</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Browser Plugin salign Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AFLASHPLAYER-OF.html">HTTP:STC:SWF:FLASHPLAYER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave FlashFile Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AHEADER-MEM-RCE.html">HTTP:STC:SWF:HEADER-MEM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Header Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AHEAP-OF.html">HTTP:STC:SWF:HEAP-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Shockwave Flash Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AKEY-PRESS-EVENT.html">HTTP:STC:SWF:KEY-PRESS-EVENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Key-Press Event Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AMAL-SWF-OF.html">HTTP:STC:SWF:MAL-SWF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Macromedia Flash ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AMEM-DISC.html">HTTP:STC:SWF:MEM-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Flash Player Memory Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AOPENTYPE-FONT-OF.html">HTTP:STC:SWF:OPENTYPE-FONT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AOPENTYPE-FONT-OF1.html">HTTP:STC:SWF:OPENTYPE-FONT-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3APHPEXEC.html">HTTP:STC:SWF:PHPEXEC</a></b></td>
   <td width="500" valign="top">
    HTTP: Macromedia Flash ActiveX Invalid src Param
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3APLACEOBJX.html">HTTP:STC:SWF:PLACEOBJX</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF PlaceObjectX Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AREAL-FLV.html">HTTP:STC:SWF:REAL-FLV</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer FLV Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AREAL-FLV1.html">HTTP:STC:SWF:REAL-FLV1</a></b></td>
   <td width="500" valign="top">
    HTTP: RealPlayer FLV Memory Corruption1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AREC-S-OF.html">HTTP:STC:SWF:REC-S-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Record Size Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ARESOURCEMODULEURLS.html">HTTP:STC:SWF:RESOURCEMODULEURLS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player resourceModuleURLs Usage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ASHARED-OBJ-UAF.html">HTTP:STC:SWF:SHARED-OBJ-UAF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player SharedObject Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ASIZE-MIS.html">HTTP:STC:SWF:SIZE-MIS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Size Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ASTAGE3D.html">HTTP:STC:SWF:STAGE3D</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Stage3D
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ASWAVE-TSAC-CHUNK.html">HTTP:STC:SWF:SWAVE-TSAC-CHUNK</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ATEXT-IOF.html">HTTP:STC:SWF:TEXT-IOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Texture Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AUNDEF-NS.html">HTTP:STC:SWF:UNDEF-NS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe SWF Undefined Namespace
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AURL-SEC-DOM-RCE.html">HTTP:STC:SWF:URL-SEC-DOM-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave Flash URL Security Domain Checking Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ASYMANTEC-AV-STACK.html">HTTP:STC:SYMANTEC-AV-STACK</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Norton Antivirus Stack Exhaustion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ATELNET-URL-OPTS.html">HTTP:STC:TELNET-URL-OPTS</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML URL TELNET Command Line Options File Clobber
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ATOMCAT-CHUNKED-REQ-DOS.html">HTTP:STC:TOMCAT-CHUNKED-REQ-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Chunked Request Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3ATRIMBL-NAV-BMP-HOVF.html">HTTP:STC:TRIMBL-NAV-BMP-HOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: Trimble Navigation SketchUp BMP File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AUNZIP-EXTRA-FIELD-BO.html">HTTP:STC:UNZIP-EXTRA-FIELD-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: UnZip Extra Fields Compressed Blocks Size Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AURI-INJ.html">HTTP:STC:URI-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Browser URI Handlers Command Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVAR-EQUALS-REDIRECT.html">HTTP:STC:VAR-EQUALS-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Spam URL Variable Equals Redirect Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVLC-ABC-HOVF.html">HTTP:STC:VLC-ABC-HOVF</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player ABC File Instruction Field Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AAPACHE-1-3-26-31.html">HTTP:STC:VULN:APACHE-1-3-26-31</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable Apache Version ( 1.3.26 through 1.3.31)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AAPACHE-1-3-28.html">HTTP:STC:VULN:APACHE-1-3-28</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable Apache Version (&lt; 1.3.29)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AAPACHE-2-0-52.html">HTTP:STC:VULN:APACHE-2-0-52</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable Apache Version (2.0.1 through 2.0.52)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3ACHEROKEE-0-4-17-1.html">HTTP:STC:VULN:CHEROKEE-0-4-17-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable Cherokee version (&lt; 0.4.17.1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AIMAIL-8-13.html">HTTP:STC:VULN:IMAIL-8-13</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable Ipswitch IMail Version ( &lt; 8.13)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AOUTLOOK-XSRF.html">HTTP:STC:VULN:OUTLOOK-XSRF</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook Web Access Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3ATAG-BDO.html">HTTP:STC:VULN:TAG-BDO</a></b></td>
   <td width="500" valign="top">
    HTTP: Bi-Directional tag overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AVULN%3AWEBLOGIC-8-1.html">HTTP:STC:VULN:WEBLOGIC-8-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Vulnerable BEA Weblogic version ( &lt; 8.1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AW32-PARAM-HTTP.html">HTTP:STC:W32-PARAM-HTTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Win32 API Invalid Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWEBEX-WRF-BOF.html">HTTP:STC:WEBEX-WRF-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco WebEx Player .WRF Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWEBKIT-FLOAT-TYPE-RCE.html">HTTP:STC:WEBKIT-FLOAT-TYPE-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Webkit Floating Point Data Type Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWGET-REDIRECT.html">HTTP:STC:WGET-REDIRECT</a></b></td>
   <td width="500" valign="top">
    HTTP: Wget HTTP Redirect Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWHSC-RCE.html">HTTP:STC:WHSC-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Help and Support Center Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWIN-CCL-BOF.html">HTTP:STC:WIN-CCL-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP:Microsoft Windows Common Control Library Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWIN-SHELLHNDL.html">HTTP:STC:WIN-SHELLHNDL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Shell Handler URL Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWIN-SHELLHNDL1.html">HTTP:STC:WIN-SHELLHNDL1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Shell Handler URL Validation1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWIN32KSYS-MEM.html">HTTP:STC:WIN32KSYS-MEM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows win32k.sys Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AAU-OF1.html">HTTP:STC:WINAMP:AU-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp AutoUpdate Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3ACDDA-OF.html">HTTP:STC:WINAMP:CDDA-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp IN_CDDA.dll Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3ACDDA-OF3.html">HTTP:STC:WINAMP:CDDA-OF3</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp IN_CDDA.dll Buffer Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AID3V2-OVERFLOW.html">HTTP:STC:WINAMP:ID3V2-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Winamp ID3v2 Tag Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AM3U-BOF.html">HTTP:STC:WINAMP:M3U-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Nullsoft Winamp M3U Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AMAKI-SCRIPT-OF.html">HTTP:STC:WINAMP:MAKI-SCRIPT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Nullsoft Winamp MAKI Script Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AMOD-HDR-OF.html">HTTP:STC:WINAMP:MOD-HDR-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp MOD Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINAMP%3AULTRAVOX-MSG.html">HTTP:STC:WINAMP:ULTRAVOX-MSG</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp Ultravox ultravox-max-msg Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINDOWS-FAX-COVER.html">HTTP:STC:WINDOWS-FAX-COVER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Fax Services Cover Page Editor Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINHELP32-MSGBOX-RCE.html">HTTP:STC:WINHELP32-MSGBOX-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows winhlp32.exe MsgBox Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWINHELP32-OF2.html">HTTP:STC:WINHELP32-OF2</a></b></td>
   <td width="500" valign="top">
    HTTP: WinHelp32.exe Remote Buffer Overrun (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWIRESHARK-INSECUREPATH.html">HTTP:STC:WIRESHARK-INSECUREPATH</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark Insecure Search Path Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWLW-INFO-DISC.html">HTTP:STC:WLW-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Live Writer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWMF-FILE-DOS.html">HTTP:STC:WMF-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer WMF File Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWMF-FILE-DOS1.html">HTTP:STC:WMF-FILE-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Explorer WMF File Denial of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AWMP-AU-DOS.html">HTTP:STC:WMP-AU-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AX11-OVERSIZE-FONT.html">HTTP:STC:X11-OVERSIZE-FONT</a></b></td>
   <td width="500" valign="top">
    HTTP: X11 Oversize Font DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTC%3AXMPLAY-ASX.html">HTTP:STC:XMPLAY-ASX</a></b></td>
   <td width="500" valign="top">
    HTTP: XMPlay ASX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AAAJTAK-STREAM.html">HTTP:STREAM:AAJTAK-STREAM</a></b></td>
   <td width="500" valign="top">
    HTTP: aajtak.com Video Streaming
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AFLV.html">HTTP:STREAM:FLV</a></b></td>
   <td width="500" valign="top">
    HTTP: Shockwave Flash Video Streaming (.flv)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AGOOGLE-VIDEO.html">HTTP:STREAM:GOOGLE-VIDEO</a></b></td>
   <td width="500" valign="top">
    HTTP: Google Video Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AITUNES-USERAGENT.html">HTTP:STREAM:ITUNES-USERAGENT</a></b></td>
   <td width="500" valign="top">
    HTTP: iTunes User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AMAGIX-OF.html">HTTP:STREAM:MAGIX-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: MAGIX Music Maker File Processing Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AQUICKTIME-CLIENT.html">HTTP:STREAM:QUICKTIME-CLIENT</a></b></td>
   <td width="500" valign="top">
    HTTP: QuickTime Media Player Update
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3ASTARTV-STREAM.html">HTTP:STREAM:STARTV-STREAM</a></b></td>
   <td width="500" valign="top">
    HTTP: startv.com Video Streaming
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AVIDEO-CONTENT.html">HTTP:STREAM:VIDEO-CONTENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Video Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTREAM%3AYOUTUBE-REQ.html">HTTP:STREAM:YOUTUBE-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: YouTube Video Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTYX-EK-DL.html">HTTP:STYX-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Fonts Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTYX-EK-LP2.html">HTTP:STYX-EK-LP2</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Landing Page 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASTYX-EK-PE-DL.html">HTTP:STYX-EK-PE-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Styx Exploit Kit Portable Executable Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-DIGEST-OF.html">HTTP:SUN-DIGEST-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Web Digest Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-DIGEST-OF1.html">HTTP:SUN-DIGEST-OF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java Web Digest Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-GLASSFISH-AUTH-BP.html">HTTP:SUN-GLASSFISH-AUTH-BP</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Goldfish AUthentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-GLASSFISH-AUTH-BP1.html">HTTP:SUN-GLASSFISH-AUTH-BP1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Goldfish AUthentication Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-JAVA-SYSTEM-WEBDAV-OF.html">HTTP:SUN-JAVA-SYSTEM-WEBDAV-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System Web Server WEBDAV Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUN-WEBDAV-FD.html">HTTP:SUN-WEBDAV-FD</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java WebDav File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-41.html">HTTP:SUSP-HDR-REDRCT-EXP-41</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-41
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-44.html">HTTP:SUSP-HDR-REDRCT-EXP-44</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-44
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-47.html">HTTP:SUSP-HDR-REDRCT-EXP-47</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-47
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-50.html">HTTP:SUSP-HDR-REDRCT-EXP-50</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-50
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-53.html">HTTP:SUSP-HDR-REDRCT-EXP-53</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-53
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-56.html">HTTP:SUSP-HDR-REDRCT-EXP-56</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-56
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-59.html">HTTP:SUSP-HDR-REDRCT-EXP-59</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-59
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-62.html">HTTP:SUSP-HDR-REDRCT-EXP-62</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-62
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-65.html">HTTP:SUSP-HDR-REDRCT-EXP-65</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-65
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-68.html">HTTP:SUSP-HDR-REDRCT-EXP-68</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-68
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-71.html">HTTP:SUSP-HDR-REDRCT-EXP-71</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-71
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-74.html">HTTP:SUSP-HDR-REDRCT-EXP-74</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-74
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASUSP-HDR-REDRCT-EXP-77.html">HTTP:SUSP-HDR-REDRCT-EXP-77</a></b></td>
   <td width="500" valign="top">
    HTTP:SUSP-HDR-REDRCT Infection-77
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASWEETORANGE-EK-DL.html">HTTP:SWEETORANGE-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Sweet Orange Exploit Kit Java Compromise Payload Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASWF-CVE-2014-0503-RCE.html">HTTP:SWF-CVE-2014-0503-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0503 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASYBASE-AGSOAP-EXE-BOF.html">HTTP:SYBASE-AGSOAP-EXE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sybase M-Business Anywhere agSoap.exe Closing Tag Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASYMANTEC-EP-POLICY-BYPAS.html">HTTP:SYMANTEC-EP-POLICY-BYPAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Endpoint Protection Console Servlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASYMANTEC-EP-POLICY-BYPAS1.html">HTTP:SYMANTEC-EP-POLICY-BYPAS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Endpoint Protection Console Servlet Policy Bypass1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASYSAX-SERVER-BOF.html">HTTP:SYSAX-SERVER-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Sysax Multi Server Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ASYSAX-SERVER-BOF1.html">HTTP:SYSAX-SERVER-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Sysax Multi Server Function Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATDS-REDIR-EK.html">HTTP:TDS-REDIR-EK</a></b></td>
   <td width="500" valign="top">
    HTTP: TDS Redirection Exploit Kit Request Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL.html">HTTP:TELE-EK-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL10.html">HTTP:TELE-EK-DL10</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL3.html">HTTP:TELE-EK-DL3</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL4.html">HTTP:TELE-EK-DL4</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL5.html">HTTP:TELE-EK-DL5</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL6.html">HTTP:TELE-EK-DL6</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL7.html">HTTP:TELE-EK-DL7</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL8.html">HTTP:TELE-EK-DL8</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELE-EK-DL9.html">HTTP:TELE-EK-DL9</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELETUBBIES-EK-2.html">HTTP:TELETUBBIES-EK-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Exploit 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATELETUBBIES-EK2.html">HTTP:TELETUBBIES-EK2</a></b></td>
   <td width="500" valign="top">
    HTTP: Teletubbies Exploit Kit Payload Download 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AADMIN-SCAN.html">HTTP:TOMCAT:ADMIN-SCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Administration Page Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AAJP12-SHUTDOWN.html">HTTP:TOMCAT:AJP12-SHUTDOWN</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Server AJP12 Shutdown DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3ADIR-LIST-INFO-DISCL.html">HTTP:TOMCAT:DIR-LIST-INFO-DISCL</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Directory Listing Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3ADIR-TRAV.html">HTTP:TOMCAT:DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Server Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AJSP-AS-HTML.html">HTTP:TOMCAT:JSP-AS-HTML</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat .jsp Interpreted as HTML Source Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AJSP-BUFFER.html">HTTP:TOMCAT:JSP-BUFFER</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Samples Webroot Disclosure - Buffer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AJSP-COMMENTS.html">HTTP:TOMCAT:JSP-COMMENTS</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Samples Webroot Disclosure - Comments
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AJSP-DEC-INT-OF.html">HTTP:TOMCAT:JSP-DEC-INT-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Samples Webroot Disclosure - Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AJSP-PAGE.html">HTTP:TOMCAT:JSP-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Samples Webroot Disclosure - Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3APOLICY-BYPASS.html">HTTP:TOMCAT:POLICY-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendor Apache Tomcat Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AREAL-PATH-DISC.html">HTTP:TOMCAT:REAL-PATH-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat Real Path Disclosure by Default
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AREAL-PATH-REQ.html">HTTP:TOMCAT:REAL-PATH-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat realPath.jsp Malformed Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3ASERVLET-DEVICE-DOS.html">HTTP:TOMCAT:SERVLET-DEVICE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Device Servlet Request DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3ASERVLET-DEVICE-DOS1.html">HTTP:TOMCAT:SERVLET-DEVICE-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Device Servlet Request DoS1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3ASOURCE-MAL-REQ.html">HTTP:TOMCAT:SOURCE-MAL-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat &quot;Source.jsp&quot; Malicious Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AURL-ENC-DIRTRAV.html">HTTP:TOMCAT:URL-ENC-DIRTRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat allowLinking URIencoding Directory Traversal Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AXPL-FILE-DISC.html">HTTP:TOMCAT:XPL-FILE-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat XPL File Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATOO-MANY-PARAMETERS.html">HTTP:TOO-MANY-PARAMETERS</a></b></td>
   <td width="500" valign="top">
    HTTP: Too many parameters
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATRENDMICRO-CTRLMGR-SQLINJ.html">HTTP:TRENDMICRO-CTRLMGR-SQLINJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro Control Manager ad hoc query Module SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATRENDMICRO-CTRLMGR-SQLINJ1.html">HTTP:TRENDMICRO-CTRLMGR-SQLINJ1</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro Control Manager ad hoc query Module SQL Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATRENDMICRO-FMT-STR.html">HTTP:TRENDMICRO-FMT-STR</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan Atxconsole ActiveX Control Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3AALTNET-OVER-HTTP.html">HTTP:TUNNEL:ALTNET-OVER-HTTP</a></b></td>
   <td width="500" valign="top">
    HTTP: Tunneling Altnet over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3AANCHORFREE-CLIENT.html">HTTP:TUNNEL:ANCHORFREE-CLIENT</a></b></td>
   <td width="500" valign="top">
    HTTP: AnchorFree Hotspot Shield Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ACHAT-AOL-IM.html">HTTP:TUNNEL:CHAT-AOL-IM</a></b></td>
   <td width="500" valign="top">
    HTTP: Tunneling AIM Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ACHAT-MSN-IM.html">HTTP:TUNNEL:CHAT-MSN-IM</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Chat over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ACHAT-MSN-IM-SSL.html">HTTP:TUNNEL:CHAT-MSN-IM-SSL</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN Chat Over HTTPS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ACHAT-YIM.html">HTTP:TUNNEL:CHAT-YIM</a></b></td>
   <td width="500" valign="top">
    HTTP: Tunneling Yahoo Instant Messenger Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3AHTTPTUNNEL-URL.html">HTTP:TUNNEL:HTTPTUNNEL-URL</a></b></td>
   <td width="500" valign="top">
    HTTP: HTTPTunnel Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3APROXY.html">HTTP:TUNNEL:PROXY</a></b></td>
   <td width="500" valign="top">
    HTTP: Tunneling HTTP Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3AREDUH.html">HTTP:TUNNEL:REDUH</a></b></td>
   <td width="500" valign="top">
    HTTP: ReDuh Tunnel Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ASIP.html">HTTP:TUNNEL:SIP</a></b></td>
   <td width="500" valign="top">
    HTTP: SIP over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ASMTP.html">HTTP:TUNNEL:SMTP</a></b></td>
   <td width="500" valign="top">
    HTTP: SMTP Proxied Through HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ATELNET.html">HTTP:TUNNEL:TELNET</a></b></td>
   <td width="500" valign="top">
    HTTP: Tunneling Telnet Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AATOMIC-EMAIL-HUNTER.html">HTTP:UA:ATOMIC-EMAIL-HUNTER</a></b></td>
   <td width="500" valign="top">
    HTTP: Atomic Email Hunter Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AAUTO-EMAIL-PRO.html">HTTP:UA:AUTO-EMAIL-PRO</a></b></td>
   <td width="500" valign="top">
    HTTP: Auto Email Pro Email Harvester Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ACONTACTBOT-COLLECTOR.html">HTTP:UA:CONTACTBOT-COLLECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: ContactBot Email Collector Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ACRAZY-BROWSER.html">HTTP:UA:CRAZY-BROWSER</a></b></td>
   <td width="500" valign="top">
    HTTP: Crazy Browser Usage Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ACURL.html">HTTP:UA:CURL</a></b></td>
   <td width="500" valign="top">
    HTTP: cURL User Agent Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ADSURF.html">HTTP:UA:DSURF</a></b></td>
   <td width="500" valign="top">
    HTTP: DSurf Email Harvester Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AEMAILSIPHON-COLLECTOR.html">HTTP:UA:EMAILSIPHON-COLLECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: EmailSiphon Email Collector Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AEMAILSPIDER.html">HTTP:UA:EMAILSPIDER</a></b></td>
   <td width="500" valign="top">
    HTTP: EmailSpider Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AEMAILWOLF-COLLECTOR.html">HTTP:UA:EMAILWOLF-COLLECTOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Trellian EMailWolf Email Collector Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AEXTRACTOR-PRO.html">HTTP:UA:EXTRACTOR-PRO</a></b></td>
   <td width="500" valign="top">
    HTTP: ExtractorPro Email Harvester Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AGOOGLEBOT.html">HTTP:UA:GOOGLEBOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Googlebot Indexing Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AMOBILE.html">HTTP:UA:MOBILE</a></b></td>
   <td width="500" valign="top">
    HTTP: Mobile User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AMOREOVER.html">HTTP:UA:MOREOVER</a></b></td>
   <td width="500" valign="top">
    HTTP: Moreover Indexing Acitivity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AMSN-BINGBOT.html">HTTP:UA:MSN-BINGBOT</a></b></td>
   <td width="500" valign="top">
    HTTP: MSN/BingBot Indexing Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ANSAUDITOR.html">HTTP:UA:NSAUDITOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Network Security Auditor Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ANUTCH.html">HTTP:UA:NUTCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Nutch Indexing Acitivity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3APBROWSE.html">HTTP:UA:PBROWSE</a></b></td>
   <td width="500" valign="top">
    HTTP: PBrowse Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3APHP-BASE64-DECODE.html">HTTP:UA:PHP-BASE64-DECODE</a></b></td>
   <td width="500" valign="top">
    HTTP: User-Agent Contains PHP base64_decode Function
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3APHP-CODE-INJ.html">HTTP:UA:PHP-CODE-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: User-Agent Field PHP Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3ASKIPFISH.html">HTTP:UA:SKIPFISH</a></b></td>
   <td width="500" valign="top">
    HTTP: Skipfish User Agent Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUA%3AWGET.html">HTTP:UA:WGET</a></b></td>
   <td width="500" valign="top">
    HTTP: GNU Wget User Agent Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUBIQUITI-AIROS-CE.html">HTTP:UBIQUITI-AIROS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ubiquiti Networks AirOS Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AULTRAVNC-VNCLOG-BO.html">HTTP:ULTRAVNC-VNCLOG-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraVNC VNCLog Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AULTRAVNC-VNCLOG-BO1.html">HTTP:ULTRAVNC-VNCLOG-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: UltraVNC VNCLog Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNIX-CMD%3AUNIX-CMD-A-L.html">HTTP:UNIX-CMD:UNIX-CMD-A-L</a></b></td>
   <td width="500" valign="top">
    HTTP: UNIX Commands Sent Over HTTP A to L
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNIX-CMD%3AUNIX-CMD-M-Z.html">HTTP:UNIX-CMD:UNIX-CMD-M-Z</a></b></td>
   <td width="500" valign="top">
    HTTP: UNIX Commands Sent Over HTTP M to Z
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNIX-CMD%3AUNIX-GCC1.html">HTTP:UNIX-CMD:UNIX-GCC1</a></b></td>
   <td width="500" valign="top">
    HTTP Unix-Command: gcc1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNIX-FILE%3AETC-HOSTS-ALLOW.html">HTTP:UNIX-FILE:ETC-HOSTS-ALLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Unix File /etc/hosts.allow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNIX-FILE%3AETC-PASSWD.html">HTTP:UNIX-FILE:ETC-PASSWD</a></b></td>
   <td width="500" valign="top">
    HTTP: Unix File /etc/passwd Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNUSUAL-REFERER.html">HTTP:UNUSUAL-REFERER</a></b></td>
   <td width="500" valign="top">
    HTTP: Unusual Value In HTTP Referer Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AUNUSUAL-REFERER1.html">HTTP:UNUSUAL-REFERER1</a></b></td>
   <td width="500" valign="top">
    HTTP: Unusual Value In HTTP Referer Header1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVLC-ABC-FILE-BOF.html">HTTP:VLC-ABC-FILE-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC Media Player ABC File Parts Field Parsing Heap Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVLCFS.html">HTTP:VLCFS</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC HTTPD Connection Header Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVLCFS1.html">HTTP:VLCFS1</a></b></td>
   <td width="500" valign="top">
    HTTP: VLC HTTPD Connection Header Format String1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVMTURBO-OS-COMM-INJ.html">HTTP:VMTURBO-OS-COMM-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: VMTurbo OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVMWARE-VSPHERE-DOS.html">HTTP:VMWARE-VSPHERE-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Vmware Vsphere Host Daemon Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AVMWARE-VSPHERE-DOS1.html">HTTP:VMWARE-VSPHERE-DOS1</a></b></td>
   <td width="500" valign="top">
    HTTP: Vmware Vsphere Host Daemon Denial Of Service1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AW3C-AMAYA-BOF1.html">HTTP:W3C-AMAYA-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: W3C Amaya Stack Based Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWASD%3ACONF-ACCESS.html">HTTP:WASD:CONF-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: WASD http Server Configuation Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWASD%3ADIR-TRAV.html">HTTP:WASD:DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: WASD http Server Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBDAV-FS.html">HTTP:WEBDAV-FS</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System WebDAV Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3ABEA-CONN-BOF.html">HTTP:WEBLOGIC:BEA-CONN-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle BEA WebLogic Server Apache Connector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3ABEAPACHE.html">HTTP:WEBLOGIC:BEAPACHE</a></b></td>
   <td width="500" valign="top">
    HTTP: BEA Weblogic Apache Connector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3ACONSOLE-HELP-PORT.html">HTTP:WEBLOGIC:CONSOLE-HELP-PORT</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle BEA Weblogic Server console-help.portal Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3AENCODING.html">HTTP:WEBLOGIC:ENCODING</a></b></td>
   <td width="500" valign="top">
    HTTP: BEA Weblogic Encoding Value Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3AJSESSIONID.html">HTTP:WEBLOGIC:JSESSIONID</a></b></td>
   <td width="500" valign="top">
    HTTP: BEA Weblogic JSessionID Cookie Value Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3AURL-REVEAL-SRC.html">HTTP:WEBLOGIC:URL-REVEAL-SRC</a></b></td>
   <td width="500" valign="top">
    HTTP: Weblogic Malformed URL Reveal JSP Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3AWEBROOT.html">HTTP:WEBLOGIC:WEBROOT</a></b></td>
   <td width="500" valign="top">
    HTTP: Weblogic Reveals Web Root
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBSPHERE%3ASERVER-OF.html">HTTP:WEBSPHERE:SERVER-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: WebSphere Application Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBSPHERE%3AVER-DOS.html">HTTP:WEBSPHERE:VER-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM WebSphere Edge Server Caching Proxy DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBSRV-BO-4096.html">HTTP:WEBSRV-BO-4096</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Web Servers 4096 Byte Length URL Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBSTER%3ADIR-TRAVERSAL.html">HTTP:WEBSTER:DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    HTTP: Webster Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWEBSTER%3ALONG-GET-REQ.html">HTTP:WEBSTER:LONG-GET-REQ</a></b></td>
   <td width="500" valign="top">
    HTTP: Webster Long GET Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWHATSUP%3ADOS-DEV-DOS.html">HTTP:WHATSUP:DOS-DEV-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Ipswitch What&#39;s Up Gold DOS Device Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWHATSUP%3AINSTANCENAME-OF.html">HTTP:WHATSUP:INSTANCENAME-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Ipswitch What&#39;s Up Gold InstanceName Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWHATSUP%3AWEB-SQL-INJECT.html">HTTP:WHATSUP:WEB-SQL-INJECT</a></b></td>
   <td width="500" valign="top">
    HTTP: WhatsUp Web Interface SQL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWHITEHOLE-EK-JAVA-DL.html">HTTP:WHITEHOLE-EK-JAVA-DL</a></b></td>
   <td width="500" valign="top">
    HTTP: Whitehole Exploit Kit Java Exploit Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIN-CMD%3AROOT.EXE.html">HTTP:WIN-CMD:ROOT.EXE</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows Command Root.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWINAMP-SKIN-DOWNLOAD.html">HTTP:WINAMP-SKIN-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WinAmp Skin Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWINAMP-WLZ-BO1.html">HTTP:WINAMP-WLZ-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: Winamp wlz File Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIPER-SHAMOON-FILE-DWNLD.html">HTTP:WIPER-SHAMOON-FILE-DWNLD</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious WIPER/SHAMOON Infected File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIPER-SHAMOON-FILE-DWNLD1.html">HTTP:WIPER-SHAMOON-FILE-DWNLD1</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious WIPER/SHAMOON Infected File Download1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-SNUPLOAD.html">HTTP:WIRELURKER-SNUPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: WireLurker Serial Number Upload Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-SNUPLOAD1.html">HTTP:WIRELURKER-SNUPLOAD1</a></b></td>
   <td width="500" valign="top">
    HTTP: WireLurker Serial Number Upload Detected1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-VRUPDATE.html">HTTP:WIRELURKER-VRUPDATE</a></b></td>
   <td width="500" valign="top">
    HTTP: WireLurker Version Update Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-VRUPDATE1.html">HTTP:WIRELURKER-VRUPDATE1</a></b></td>
   <td width="500" valign="top">
    HTTP: WireLurker Version Update Detected1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRESHARK-MPEG-BOF.html">HTTP:WIRESHARK-MPEG-BOF</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark MPEG Dissector Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRESHARK-MPEG-BOF1.html">HTTP:WIRESHARK-MPEG-BOF1</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark MPEG Dissector Stack Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWIRESHARK-MPEG-BOF11.html">HTTP:WIRESHARK-MPEG-BOF11</a></b></td>
   <td width="500" valign="top">
    HTTP: Wireshark MPEG Dissector Stack Buffer Overflow11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWORDPRESS-W3PLUGIN-RCE.html">HTTP:WORDPRESS-W3PLUGIN-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress W3 Total Cache Plugin Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWORDPRESS-W3PLUGIN-RCE1.html">HTTP:WORDPRESS-W3PLUGIN-RCE1</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress W3 Total Cache Plugin Remote Code Execution1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWP-FGALLERY-MAL-FILE-HOST.html">HTTP:WP-FGALLERY-MAL-FILE-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress FGallery Plugin Malicious File Hosting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWP-FGALLERY-MAL-FILE-HOST1.html">HTTP:WP-FGALLERY-MAL-FILE-HOST1</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress FGallery Plugin Malicious File Hosting1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AWP-FGALLERY-MAL-FILE-POST.html">HTTP:WP-FGALLERY-MAL-FILE-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress FGallery Plugin Malicious File Posting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AX2O-EK-LAND-PG.html">HTTP:X2O-EK-LAND-PG</a></b></td>
   <td width="500" valign="top">
    HTTP: X2O Exploit Kit Landing Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AX2O-EK-LAND-PG3.html">HTTP:X2O-EK-LAND-PG3</a></b></td>
   <td width="500" valign="top">
    HTTP: X2O Exploit Kit Landing Page 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AX2O-EK-LN-PAGE.html">HTTP:X2O-EK-LN-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: X2O Exploit Kit Landing Page 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXAMPP-REQUEST-FORGERY1.html">HTTP:XAMPP-REQUEST-FORGERY1</a></b></td>
   <td width="500" valign="top">
    HTTP: XAMPP Request Forgery Attempt1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXDOMAINXML.html">HTTP:XDOMAINXML</a></b></td>
   <td width="500" valign="top">
    HTTP: Crossdomain.xml Unsafe Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXML-EXTERNAL-ENTITY-INJ.html">HTTP:XML-EXTERNAL-ENTITY-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP:Multiple Product XML External Entity Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXML-EXTERNAL-ENTITY-INJ1.html">HTTP:XML-EXTERNAL-ENTITY-INJ1</a></b></td>
   <td width="500" valign="top">
    HTTP:Multiple Product XML External Entity Injection1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXNVIEW-MBM-FILE-BO1.html">HTTP:XNVIEW-MBM-FILE-BO1</a></b></td>
   <td width="500" valign="top">
    HTTP: XnView mbm File Parsing Buffer Overflow1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AADOBE-COLDF-SEARCHLOG.html">HTTP:XSS:ADOBE-COLDF-SEARCHLOG</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion searchlog.cfm Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AANWIKI-XSS.html">HTTP:XSS:ANWIKI-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Anwiki Index.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAPACHE-MOD-NEGOTIATION.html">HTTP:XSS:APACHE-MOD-NEGOTIATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_negotiation Filename Handling Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAPACHE-SSI-XSS.html">HTTP:XSS:APACHE-SSI-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache SSI Cross-Side-Scripting in URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AARBORNETWORKS-PEAKFLOW.html">HTTP:XSS:ARBORNETWORKS-PEAKFLOW</a></b></td>
   <td width="500" valign="top">
    HTTP: Arbor Networks Peakflow Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AASP-REQ-VALIDATION.html">HTTP:XSS:ASP-REQ-VALIDATION</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP Request Validation Flaw Exploitation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AATUTOR-ACONTENT.html">HTTP:XSS:ATUTOR-ACONTENT</a></b></td>
   <td width="500" valign="top">
    HTTP: ATutor AContent Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAWAUCTIONSCRIPT-CMS.html">HTTP:XSS:AWAUCTIONSCRIPT-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: AWAuctionScript CMS Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAWAUCTIONSCRIPT-CMS1.html">HTTP:XSS:AWAUCTIONSCRIPT-CMS1</a></b></td>
   <td width="500" valign="top">
    HTTP: AWAuctionScript CMS Cross Site Scripting1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAWAUCTIONSCRIPT-CMS2.html">HTTP:XSS:AWAUCTIONSCRIPT-CMS2</a></b></td>
   <td width="500" valign="top">
    HTTP: AWAuctionScript CMS Cross Site Scripting2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAWAUCTIONSCRIPT-CMS3.html">HTTP:XSS:AWAUCTIONSCRIPT-CMS3</a></b></td>
   <td width="500" valign="top">
    HTTP: AWAuctionScript CMS Cross Site Scripting3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAXIS-M10-CAMERA.html">HTTP:XSS:AXIS-M10-CAMERA</a></b></td>
   <td width="500" valign="top">
    HTTP: Axis M10 Series Network Cameras Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AAXIS-M10-CAMERA1.html">HTTP:XSS:AXIS-M10-CAMERA1</a></b></td>
   <td width="500" valign="top">
    HTTP: Axis M10 Series Network Cameras Cross Site Scripting1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ABEA-ADMIN-CONSOLE.html">HTTP:XSS:BEA-ADMIN-CONSOLE</a></b></td>
   <td width="500" valign="top">
    HTTP: WebLogic Admin Console Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACA-SITEMINDER-OLUNICDE.html">HTTP:XSS:CA-SITEMINDER-OLUNICDE</a></b></td>
   <td width="500" valign="top">
    HTTP:XSS:CA SiteMinder J2EE Overlong Unicode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCO-CSDC.html">HTTP:XSS:CISCO-CSDC</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Common Services Devices Center Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCO-CSUSERCGIXSS.html">HTTP:XSS:CISCO-CSUSERCGIXSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco User-Changeable Password CSuserCGI.exe Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCO-SESM.html">HTTP:XSS:CISCO-SESM</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Subscriber Edge Services Manager Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCO-XSS.html">HTTP:XSS:CISCO-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco CallManager Search Form Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCOWORKS-CSFHS.html">HTTP:XSS:CISCOWORKS-CSFHS</a></b></td>
   <td width="500" valign="top">
    HTTP: CiscoWorks Common Services Framework Help Servlet Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACISCOWORKS-CSFHS-1.html">HTTP:XSS:CISCOWORKS-CSFHS-1</a></b></td>
   <td width="500" valign="top">
    HTTP: Cisco Common Services Framework Help Servlet Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACKEDITOR-POSTEDDATAPHP.html">HTTP:XSS:CKEDITOR-POSTEDDATAPHP</a></b></td>
   <td width="500" valign="top">
    HTTP: CKEditor posteddata.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACMSQLITE-ID.html">HTTP:XSS:CMSQLITE-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: CMSQLITE Id Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACOLDFUSION-MX7.html">HTTP:XSS:COLDFUSION-MX7</a></b></td>
   <td width="500" valign="top">
    HTTP: ColdFusion MX7 XSS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACPANEL-MODULES.html">HTTP:XSS:CPANEL-MODULES</a></b></td>
   <td width="500" valign="top">
    HTTP: cPanel Multiple Module Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ACROOGO-CMS.html">HTTP:XSS:CROOGO-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Croogo CMS Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ADRUPAL-CUMULAS.html">HTTP:XSS:DRUPAL-CUMULAS</a></b></td>
   <td width="500" valign="top">
    HTTP: Drupal Cumulus Module Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ADYNAMICAX-PORTAL-XSS.html">HTTP:XSS:DYNAMICAX-PORTAL-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Dynamic AX Enterprise Portal Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AE2-PHOTO-GALLERY.html">HTTP:XSS:E2-PHOTO-GALLERY</a></b></td>
   <td width="500" valign="top">
    HTTP: E2 Photo Gallery index.php  Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AFOREFRONT-SIGNURL.html">HTTP:XSS:FOREFRONT-SIGNURL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Signurl.asp Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AFRONTPAGE-EXT.html">HTTP:XSS:FRONTPAGE-EXT</a></b></td>
   <td width="500" valign="top">
    HTTP: FrontPage Server Extensions XSS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHDR-REFERRER.html">HTTP:XSS:HDR-REFERRER</a></b></td>
   <td width="500" valign="top">
    HTTP: Referrer Header Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHP-INSIGHT-ONLINE.html">HTTP:XSS:HP-INSIGHT-ONLINE</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Insight Diagnostics Online Edition Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHP-INTELLIGENT-MNGT.html">HTTP:XSS:HP-INTELLIGENT-MNGT</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Intelligent Management Center topoContent.jsf Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHP-SEARCH-XSS.html">HTTP:XSS:HP-SEARCH-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: HP Insight Diagnostics Online Edition &#39;search.php&#39; Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHP-SMH-REDIRCTURL.html">HTTP:XSS:HP-SMH-REDIRCTURL</a></b></td>
   <td width="500" valign="top">
    HTTP: HP System Management Homepage RedirectUrl Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-HTTP-HDR.html">HTTP:XSS:HTML-SCRIPT-HTTP-HDR</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in HTTP Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-AE.html">HTTP:XSS:HTML-SCRIPT-IN-AE</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Accept-Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-AL.html">HTTP:XSS:HTML-SCRIPT-IN-AL</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Accept-Language
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-COOKIE.html">HTTP:XSS:HTML-SCRIPT-IN-COOKIE</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Cookie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-HOST.html">HTTP:XSS:HTML-SCRIPT-IN-HOST</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Header Host
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-POST.html">HTTP:XSS:HTML-SCRIPT-IN-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Post Submission
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-UA.html">HTTP:XSS:HTML-SCRIPT-IN-UA</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in User-Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-URL-PTH.html">HTTP:XSS:HTML-SCRIPT-IN-URL-PTH</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in URL Path
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-URL-VAR.html">HTTP:XSS:HTML-SCRIPT-IN-URL-VAR</a></b></td>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in URL Variables
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTW-XSS.html">HTTP:XSS:HTW-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Indexing Services Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-LOTUS-DOMINO-XNSF.html">HTTP:XSS:IBM-LOTUS-DOMINO-XNSF</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Domino x.nsf Multiple Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-LOTUS-NOTES-TRAV.html">HTTP:XSS:IBM-LOTUS-NOTES-TRAV</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Notes Traveler Multiple Parameter Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-LOTUS-SIMPLESEARCH.html">HTTP:XSS:IBM-LOTUS-SIMPLESEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Lotus Connections simpleSearch.do Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-OPEN-ADMIN.html">HTTP:XSS:IBM-OPEN-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Open Admin Tool Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-RATIONAL-CLEARCASE.html">HTTP:XSS:IBM-RATIONAL-CLEARCASE</a></b></td>
   <td width="500" valign="top">
    HTTP: IBM Rational ClearCase Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIE-CVE-2015-0070.html">HTTP:XSS:IE-CVE-2015-0070</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0070 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIE7-XSS.html">HTTP:XSS:IE7-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 Navigation Canceled Page Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIIS-ASP.html">HTTP:XSS:IIS-ASP</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS ASP Cross Site Scripting Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AINMAGIC-DBTWPUB.html">HTTP:XSS:INMAGIC-DBTWPUB</a></b></td>
   <td width="500" valign="top">
    HTTP: Inmagic DB/Text Web Publisher PRO Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AIPLANET-ROOT.html">HTTP:XSS:IPLANET-ROOT</a></b></td>
   <td width="500" valign="top">
    HTTP: IPlanet Admin Server Tool XSS Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AISA-AUTH-XSS.html">HTTP:XSS:ISA-AUTH-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: ISA Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AJOOMLA-CITY.html">HTTP:XSS:JOOMLA-CITY</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla city parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AJOOMLA-COM-RESMAN.html">HTTP:XSS:JOOMLA-COM-RESMAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Joomla com_resman Component Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ALDAP-ACCOUNT-MGR.html">HTTP:XSS:LDAP-ACCOUNT-MGR</a></b></td>
   <td width="500" valign="top">
    HTTP: LDAP Account Manager selfserviceSaveOk Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMAILMAN-ADMIN.html">HTTP:XSS:MAILMAN-ADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Mailman Admin Interface Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMAILMAN-OPTIONS.html">HTTP:XSS:MAILMAN-OPTIONS</a></b></td>
   <td width="500" valign="top">
    HTTP: Mailman &quot;options.py&quot; Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMC-CONTENT-MANAGER.html">HTTP:XSS:MC-CONTENT-MANAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: MC Content Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMERCURY-BOARD.html">HTTP:XSS:MERCURY-BOARD</a></b></td>
   <td width="500" valign="top">
    HTTP: MercuryBoard PM Tile Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-CS.html">HTTP:XSS:MS-CS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Certification Service Cross Site Scripting (XSS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-CVE-2015-6170.html">HTTP:XSS:MS-CVE-2015-6170</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6170 Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-DEFAULT.html">HTTP:XSS:MS-FOREFRONT-DEFAULT</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Default Reflected Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-EXCEL-TBL.html">HTTP:XSS:MS-FOREFRONT-EXCEL-TBL</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway ExcelTable Reflected Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-INFO-DISC.html">HTTP:XSS:MS-FOREFRONT-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway ExcelTable Response Splitting Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-IE-CVE-2014-6328.html">HTTP:XSS:MS-IE-CVE-2014-6328</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6328 XSS Filter Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-IE-TOSTATICHTML.html">HTTP:XSS:MS-IE-TOSTATICHTML</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer toStaticHTML Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-IE-XSS-BYPASS.html">HTTP:XSS:MS-IE-XSS-BYPASS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6365 XSS Filter Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-LYNC-SERVER.html">HTTP:XSS:MS-LYNC-SERVER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Lync Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-MULT-APPLICATION.html">HTTP:XSS:MS-MULT-APPLICATION</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Multiple Application Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-OWA-MUTIPLE.html">HTTP:XSS:MS-OWA-MUTIPLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange OWA Multiple Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-REPORT-MANAGER.html">HTTP:XSS:MS-REPORT-MANAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server Report Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-REPORT-VIEWER.html">HTTP:XSS:MS-REPORT-VIEWER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Report Viewer Control Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SCCM-REFLECTED.html">HTTP:XSS:MS-SCCM-REFLECTED</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft System Center Configuration Manager Reflected XSS Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SCOM-WEB-CONSOLE.html">HTTP:XSS:MS-SCOM-WEB-CONSOLE</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SCOM Web Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SHAREPOINT-PARAM.html">HTTP:XSS:MS-SHAREPOINT-PARAM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Parameter Injection Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-VSTWAC-TFS.html">HTTP:XSS:MS-VSTWAC-TFS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio Team Web Access Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-W3WHO-XSS.html">HTTP:XSS:MS-W3WHO-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft w3who.dll Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMUL-RECORDPRESS.html">HTTP:XSS:MUL-RECORDPRESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple RecordPress Cross Site Scripting Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AMULTI-VENDOR.html">HTTP:XSS:MULTI-VENDOR</a></b></td>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ANAGIOS-XI-ALERT-CLOUD.html">HTTP:XSS:NAGIOS-XI-ALERT-CLOUD</a></b></td>
   <td width="500" valign="top">
    HTTP: Nagios XI Alert Cloud Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ANASA-TRACE.html">HTTP:XSS:NASA-TRACE</a></b></td>
   <td width="500" valign="top">
    HTTP: NASA Tri-Agency Climate Education Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ANOVELL-QUICKFINDER.html">HTTP:XSS:NOVELL-QUICKFINDER</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell QuickFinder Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ANOVELL-ZENWORKS-XSS.html">HTTP:XSS:NOVELL-ZENWORKS-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Mobile Management Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AOMNIHTTPD-REDIR.html">HTTP:XSS:OMNIHTTPD-REDIR</a></b></td>
   <td width="500" valign="top">
    HTTP: OmniHTTPD &quot;redir.exe&quot; Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AOPENFIRE-SEARCH.html">HTTP:XSS:OPENFIRE-SEARCH</a></b></td>
   <td width="500" valign="top">
    HTTP: Ignite Realtime Openfire group-summary.jsp Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AOPENFIRE-USER-CREATE.html">HTTP:XSS:OPENFIRE-USER-CREATE</a></b></td>
   <td width="500" valign="top">
    HTTP: Ignite Realtime Openfire user-create.jsp Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-BIEE-XSS.html">HTTP:XSS:ORACLE-BIEE-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Business Intelligence Enterprise Edition Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-GLASSFISH.html">HTTP:XSS:ORACLE-GLASSFISH</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle GlassFish Enterprise Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-ISQLPLUS.html">HTTP:XSS:ORACLE-ISQLPLUS</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle HTTP Server isqlplus Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-REPORT-SVR.html">HTTP:XSS:ORACLE-REPORT-SVR</a></b></td>
   <td width="500" valign="top">
    HTTP: Oracle Report Server Cross Site Script Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AOUTLOOK-WEB.html">HTTP:XSS:OUTLOOK-WEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange OWA XSS and Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AOUTLOOK-WEB-ACCESS.html">HTTP:XSS:OUTLOOK-WEB-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange Outlook Web Access Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APACER-EDITION-EMAIL.html">HTTP:XSS:PACER-EDITION-EMAIL</a></b></td>
   <td width="500" valign="top">
    HTTP: Pacer Edition CMS email Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPNUKE-BOOKMARKS.html">HTTP:XSS:PHPNUKE-BOOKMARKS</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Cross Site Script Attack via Bookmark
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPNUKE-BOOKMARKS1.html">HTTP:XSS:PHPNUKE-BOOKMARKS1</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Cross Site Script Attack via Bookmark1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPNUKE-BOOKMARKS2.html">HTTP:XSS:PHPNUKE-BOOKMARKS2</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Cross Site Script Attack via Bookmark2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPNUKE-BOOKMARKS3.html">HTTP:XSS:PHPNUKE-BOOKMARKS3</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Cross Site Script Attack via Bookmark3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPNUKE-BOOKMARKS4.html">HTTP:XSS:PHPNUKE-BOOKMARKS4</a></b></td>
   <td width="500" valign="top">
    HTTP: PHP-Nuke Cross Site Script Attack via Bookmark4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPWEBSITE-PAGE-ID.html">HTTP:XSS:PHPWEBSITE-PAGE-ID</a></b></td>
   <td width="500" valign="top">
    HTTP: phpWebSite page_id Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AREALPLAYER-SMIL.html">HTTP:XSS:REALPLAYER-SMIL</a></b></td>
   <td width="500" valign="top">
    HTTP: RealNetworks RealPlayer SMIL Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AROBOHELP-XSS.html">HTTP:XSS:ROBOHELP-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Adobe RoboHelp Server DOM Cross Site Scripting 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASERVICE-CGI.html">HTTP:XSS:SERVICE-CGI</a></b></td>
   <td width="500" valign="top">
    HTTP: Cobalt RAQ 4 Service.cgi Cross-site Script Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHARE-XSS.html">HTTP:XSS:SHARE-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-CALLBACK.html">HTTP:XSS:SHAREPOINT-CALLBACK</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Callback Function Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-COMMAND.html">HTTP:XSS:SHAREPOINT-COMMAND</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Command Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-EDITFORM.html">HTTP:XSS:SHAREPOINT-EDITFORM</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Editform Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-INPLVIEW.html">HTTP:XSS:SHAREPOINT-INPLVIEW</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server inplview.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-LIST-XSS.html">HTTP:XSS:SHAREPOINT-LIST-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Reflected List Parameter Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-THEMEWEB.html">HTTP:XSS:SHAREPOINT-THEMEWEB</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server themeweb.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-USER.html">HTTP:XSS:SHAREPOINT-USER</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Sharepoint User XSS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-WIZARDLIST.html">HTTP:XSS:SHAREPOINT-WIZARDLIST</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server wizardlist.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-XSS.html">HTTP:XSS:SHAREPOINT-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Sharepoint Services Cross-Site-Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-XSS-2.html">HTTP:XSS:SHAREPOINT-XSS-2</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Cross Site Scripting injection 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASUBRION-CMS.html">HTTP:XSS:SUBRION-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Subrion CMS Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASUN-JAVA-CALENDAR.html">HTTP:XSS:SUN-JAVA-CALENDAR</a></b></td>
   <td width="500" valign="top">
    HTTP: Sun Java System Calendar Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASUSPICIOUS-SCAN.html">HTTP:XSS:SUSPICIOUS-SCAN</a></b></td>
   <td width="500" valign="top">
    HTTP: Suspicious Cross Site Scripting Scan Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYM-GATEWAY-PHP-PAGE.html">HTTP:XSS:SYM-GATEWAY-PHP-PAGE</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Multiple PHP Pages Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYM-IM-MANAGER.html">HTTP:XSS:SYM-IM-MANAGER</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec IM Manager Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYMANTEC-EP-PARAM-XSS.html">HTTP:XSS:SYMANTEC-EP-PARAM-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Endpoint Protection URI Parameter Reflected Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYMANTEC-WG.html">HTTP:XSS:SYMANTEC-WG</a></b></td>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYNDEO-CMS-ADDONS.html">HTTP:XSS:SYNDEO-CMS-ADDONS</a></b></td>
   <td width="500" valign="top">
    HTTP: SyndeoCMS Addons Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ATM-REQUEST-FORGERY.html">HTTP:XSS:TM-REQUEST-FORGERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Trend Micro Control Manager CasLogDirectInsertHandler.cs Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ATOMCAT-JSP.html">HTTP:XSS:TOMCAT-JSP</a></b></td>
   <td width="500" valign="top">
    HTTP: Apache Tomcat JSP Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3ATYPO3-LOCALURL-CMS.html">HTTP:XSS:TYPO3-LOCALURL-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: Typo3 CMS SanitizeLocalUrl Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AURL-IMG-XSS.html">HTTP:XSS:URL-IMG-XSS</a></b></td>
   <td width="500" valign="top">
    HTTP: IMG tag in URL with Javascript Cross-Side Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AVBULLETIN-SORT.html">HTTP:XSS:VBULLETIN-SORT</a></b></td>
   <td width="500" valign="top">
    HTTP: vBulletin vBExperience sort Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AVBULLETIN-SORTORDER.html">HTTP:XSS:VBULLETIN-SORTORDER</a></b></td>
   <td width="500" valign="top">
    HTTP: vBulletin vBExperience sortorder Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWEB-VIEW-DOC-SCR-INJ.html">HTTP:XSS:WEB-VIEW-DOC-SCR-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: Windows WebView Word Doc Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWHITE-LABEL-CMS.html">HTTP:XSS:WHITE-LABEL-CMS</a></b></td>
   <td width="500" valign="top">
    HTTP: White Label CMS 1.5 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWORDPRESS-COMMENT.html">HTTP:XSS:WORDPRESS-COMMENT</a></b></td>
   <td width="500" valign="top">
    HTTP: Wordpress Comment Stored Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWORDPRESS-COMMENTS-CE.html">HTTP:XSS:WORDPRESS-COMMENTS-CE</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Comments Stored Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-CALENDAR.html">HTTP:XSS:WP-AJAX-CALENDAR</a></b></td>
   <td width="500" valign="top">
    HTTP: WP Ajax Calendar example.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-CATEGORY.html">HTTP:XSS:WP-AJAX-CATEGORY</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-RECENT-POSTS.html">HTTP:XSS:WP-AJAX-RECENT-POSTS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP Ajax Recent Posts Plugin number Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-COMICPRESS.html">HTTP:XSS:WP-COMICPRESS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress ComicPress Manager Plugin lang Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-DAILY-MAUI-PHOTO.html">HTTP:XSS:WP-DAILY-MAUI-PHOTO</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Daily Maui Photo Widget Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-ESHOP.html">HTTP:XSS:WP-ESHOP</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress eShop Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-FANCYBOX-PLUGIN.html">HTTP:XSS:WP-FANCYBOX-PLUGIN</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Fancybox Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-GAZETTE-THEME.html">HTTP:XSS:WP-GAZETTE-THEME</a></b></td>
   <td width="500" valign="top">
    HTTP: Gazette WordPress Theme Plugin src Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-IGIT-POSTS.html">HTTP:XSS:WP-IGIT-POSTS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress IGIT Posts Slider Widget Plugin &#39;src&#39; Parameter Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-INLINE-GALLERY.html">HTTP:XSS:WP-INLINE-GALLERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Inline Gallery WordPress Plugin do Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-LAZYEST-GALLERY.html">HTTP:XSS:WP-LAZYEST-GALLERY</a></b></td>
   <td width="500" valign="top">
    HTTP: Lazyest Gallery WordPress Plugin Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-LIVE-WIRE-THEME.html">HTTP:XSS:WP-LIVE-WIRE-THEME</a></b></td>
   <td width="500" valign="top">
    HTTP: Live Wire WordPress Theme Plugin src Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-LOCAL-MARKET-EXP.html">HTTP:XSS:WP-LOCAL-MARKET-EXP</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Local Market Explorer Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PHOTO-ALBUM.html">HTTP:XSS:WP-PHOTO-ALBUM</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP Photo Album Plugin id Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PHOTORACER.html">HTTP:XSS:WP-PHOTORACER</a></b></td>
   <td width="500" valign="top">
    HTTP: Photoracer WordPress Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PHOTOSMASH-GAL.html">HTTP:XSS:WP-PHOTOSMASH-GAL</a></b></td>
   <td width="500" valign="top">
    HTTP: PhotoSmash Galleries WordPress Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PLACESTER.html">HTTP:XSS:WP-PLACESTER</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Placester Plugin ajax_action Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-RATING-WIDGET.html">HTTP:XSS:WP-RATING-WIDGET</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Rating-Widget Plugin Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-SERMON-BROWSER.html">HTTP:XSS:WP-SERMON-BROWSER</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Sermon Browser Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-SOCIALGRID.html">HTTP:XSS:WP-SOCIALGRID</a></b></td>
   <td width="500" valign="top">
    HTTP: SocialGrid for WordPress default_services Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-STATS-DASHBOARD.html">HTTP:XSS:WP-STATS-DASHBOARD</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WP-Stats-Dashboard Plugin Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-UNIVERSAL-POST.html">HTTP:XSS:WP-UNIVERSAL-POST</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Universal Post Manager Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-WOOTHEMES.html">HTTP:XSS:WP-WOOTHEMES</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress WooThemes test.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-YT-AUDIO.html">HTTP:XSS:WP-YT-AUDIO</a></b></td>
   <td width="500" valign="top">
    HTTP:WordPress YT-Audio Plugin &#39;v&#39; Parameter Cross Site Scripting Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-ZOTPRESS.html">HTTP:XSS:WP-ZOTPRESS</a></b></td>
   <td width="500" valign="top">
    HTTP: WordPress Zotpress Plugin Citation Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AX-FORWARDED-FOR-INJ.html">HTTP:XSS:X-FORWARDED-FOR-INJ</a></b></td>
   <td width="500" valign="top">
    HTTP: X-Forwarded-For Cross-Site Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AXOOPS-MULT.html">HTTP:XSS:XOOPS-MULT</a></b></td>
   <td width="500" valign="top">
    HTTP: XOOPS Multiple Cross Site Scripting Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AXOOPS-VIEW-PHOTOS-PHP.html">HTTP:XSS:XOOPS-VIEW-PHOTOS-PHP</a></b></td>
   <td width="500" valign="top">
    HTTP: XOOPS View Photos PHP Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AYOAST-WP.html">HTTP:XSS:YOAST-WP</a></b></td>
   <td width="500" valign="top">
    HTTP: Yoast Google Analytics for WordPress Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AXSS%3AZEN-CART.html">HTTP:XSS:ZEN-CART</a></b></td>
   <td width="500" valign="top">
    HTTP: Zen Cart Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AYAHOO%3AACTIVITY.html">HTTP:YAHOO:ACTIVITY</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Mail User Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AYAHOO%3AATTACHMENT-DOWNLOAD.html">HTTP:YAHOO:ATTACHMENT-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Mail File Attachment Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AYAHOO%3AATTACHMENT-UPLOAD.html">HTTP:YAHOO:ATTACHMENT-UPLOAD</a></b></td>
   <td width="500" valign="top">
    HTTP: Yahoo Mail File Attachment Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AYOUNGZSOFT-MAILCOM-BO.html">HTTP:YOUNGZSOFT-MAILCOM-BO</a></b></td>
   <td width="500" valign="top">
    HTTP: Youngzsoft CMailServer CMailCOM ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="HTTP%3AZENOSS-VER-CHECK-RCE.html">HTTP:ZENOSS-VER-CHECK-RCE</a></b></td>
   <td width="500" valign="top">
    HTTP: Zenoss Core Version Check Remote Code Execution
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="ICMP"></a>ICMP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3AICMP-WITH-OPTIONS.html">ICMP:AUDIT:ICMP-WITH-OPTIONS</a></b></td>
   <td width="500" valign="top">
    ICMP: Packet Containing Options
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3AINVALID-CODE.html">ICMP:AUDIT:INVALID-CODE</a></b></td>
   <td width="500" valign="top">
    ICMP: Invalid ICMP Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3AINVALID-TYPE.html">ICMP:AUDIT:INVALID-TYPE</a></b></td>
   <td width="500" valign="top">
    ICMP: Invalid ICMP Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3AREQUEST-RESND.html">ICMP:AUDIT:REQUEST-RESND</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Request Resent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3ARESP-WITHOUT-REQ.html">ICMP:AUDIT:RESP-WITHOUT-REQ</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Reply Without Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3ARESPONSE-RESND.html">ICMP:AUDIT:RESPONSE-RESND</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Reply Resent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AAUDIT%3AWRONG-CHECKSUM.html">ICMP:AUDIT:WRONG-CHECKSUM</a></b></td>
   <td width="500" valign="top">
    ICMP: Invalid ICMP Checksum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ADIFF-CSUM-IN-RESND.html">ICMP:EXPLOIT:DIFF-CSUM-IN-RESND</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Request Resent w/Different Checksum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ADIFF-CSUM-IN-RESP.html">ICMP:EXPLOIT:DIFF-CSUM-IN-RESP</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Reply Resent w/Different Checksum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ADIFF-LEN-IN-RESND.html">ICMP:EXPLOIT:DIFF-LEN-IN-RESND</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Request Resent w/Different Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ADIFF-LEN-IN-RESP.html">ICMP:EXPLOIT:DIFF-LEN-IN-RESP</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Reply Resent w/Different Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3AECHOK.html">ICMP:EXPLOIT:ECHOK</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Choke (echok) Flood Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3AFLOOD.html">ICMP:EXPLOIT:FLOOD</a></b></td>
   <td width="500" valign="top">
    ICMP: Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ALAN-SMURF.html">ICMP:EXPLOIT:LAN-SMURF</a></b></td>
   <td width="500" valign="top">
    ICMP: Smurf DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3AMIP-ROUTE-OF.html">ICMP:EXPLOIT:MIP-ROUTE-OF</a></b></td>
   <td width="500" valign="top">
    ICMP: Mobile IP Route Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AEXPLOIT%3ANON-ZERO-DATA-LEN.html">ICMP:EXPLOIT:NON-ZERO-DATA-LEN</a></b></td>
   <td width="500" valign="top">
    ICMP: Data Where None Expected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AINFO%3AADDR-REQ.html">ICMP:INFO:ADDR-REQ</a></b></td>
   <td width="500" valign="top">
    ICMP: Address Mask Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AINFO%3AECHO-REPLY.html">ICMP:INFO:ECHO-REPLY</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AINFO%3AECHO-REQUEST.html">ICMP:INFO:ECHO-REQUEST</a></b></td>
   <td width="500" valign="top">
    ICMP: Echo Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AINFO%3AINFORMATION.html">ICMP:INFO:INFORMATION</a></b></td>
   <td width="500" valign="top">
    ICMP: Info Request/Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AINFO%3ATIMESTAMP.html">ICMP:INFO:TIMESTAMP</a></b></td>
   <td width="500" valign="top">
    ICMP: Timestamp Request/Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="ICMP%3AMODEMS-ATH-COMMAND-DOS.html">ICMP:MODEMS-ATH-COMMAND-DOS</a></b></td>
   <td width="500" valign="top">
    ICMP: Modems ATH Command Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="IDENT"></a>IDENT</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AAUDIT%3ANEST-REQ.html">IDENT:AUDIT:NEST-REQ</a></b></td>
   <td width="500" valign="top">
    IDENT: Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AAUDIT%3APORT-PAIR.html">IDENT:AUDIT:PORT-PAIR</a></b></td>
   <td width="500" valign="top">
    IDENT: Invalid Port Pair
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AAUDIT%3ARESPONSE.html">IDENT:AUDIT:RESPONSE</a></b></td>
   <td width="500" valign="top">
    IDENT: Unexpected Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AGEWSE-FLOOD.html">IDENT:GEWSE-FLOOD</a></b></td>
   <td width="500" valign="top">
    IDENT: gewse Flood Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AINVALID%3AEMPTY-LN.html">IDENT:INVALID:EMPTY-LN</a></b></td>
   <td width="500" valign="top">
    IDENT: Empty Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AINVALID%3AEOL.html">IDENT:INVALID:EOL</a></b></td>
   <td width="500" valign="top">
    IDENT: Invalid EOL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AINVALID%3ASENDMAIL-EXPL.html">IDENT:INVALID:SENDMAIL-EXPL</a></b></td>
   <td width="500" valign="top">
    IDENT: Sendmail Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AJIDENTD%3AIDENT-OF1.html">IDENT:JIDENTD:IDENT-OF1</a></b></td>
   <td width="500" valign="top">
    IDENT: JIdentd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AOVERFLOW%3AREPLY.html">IDENT:OVERFLOW:REPLY</a></b></td>
   <td width="500" valign="top">
    IDENT: Reply Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AOVERFLOW%3AREQUEST.html">IDENT:OVERFLOW:REQUEST</a></b></td>
   <td width="500" valign="top">
    IDENT: Request Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3AOVERFLOW%3AREQUEST-NUM.html">IDENT:OVERFLOW:REQUEST-NUM</a></b></td>
   <td width="500" valign="top">
    IDENT: Too Many Requests
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IDENT%3ATINYIDENT-OF.html">IDENT:TINYIDENT-OF</a></b></td>
   <td width="500" valign="top">
    IDENT: Tiny Identd Stack Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="IKE"></a>IKE</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3ACISCO-DOS.html">IKE:DOS:CISCO-DOS</a></b></td>
   <td width="500" valign="top">
    IKE: Cisco DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3AISAKMP-DOS.html">IKE:DOS:ISAKMP-DOS</a></b></td>
   <td width="500" valign="top">
    IKE: ISAKMP Invalid Negotiation Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3AISAKMP-DOS-IPSEC.html">IKE:DOS:ISAKMP-DOS-IPSEC</a></b></td>
   <td width="500" valign="top">
    IKE: IPsec-Tools Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3AOPENBSD-ISAKMPD.html">IKE:DOS:OPENBSD-ISAKMPD</a></b></td>
   <td width="500" valign="top">
    IKE: OpenBSD ISAKMPD Memory Leak Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3ATCP-HUMP.html">IKE:DOS:TCP-HUMP</a></b></td>
   <td width="500" valign="top">
    IKE: TCP Hump
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3ATCPDUMP-ID-UNDERFLOW.html">IKE:DOS:TCPDUMP-ID-UNDERFLOW</a></b></td>
   <td width="500" valign="top">
    IKE: Tcpdump Identification Payload Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3ATCPDUMP-SPI-OVERFLOW.html">IKE:DOS:TCPDUMP-SPI-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    IKE: ISAKMP Tcpdump Delete Payload Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ADOS%3AWIN2K-DOS.html">IKE:DOS:WIN2K-DOS</a></b></td>
   <td width="500" valign="top">
    IKE: Windows 2000 DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AFW1-OVERFLOW.html">IKE:FW1-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    IKE: CheckPoint VPN-1/SecureClient ISAKMP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AINV-DER-LEN.html">IKE:INV-DER-LEN</a></b></td>
   <td width="500" valign="top">
    IKE: CheckPoint VPN-1 ISAKMP Invalid DER Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AKAME-RACOON-X509-CERT-VERIF.html">IKE:KAME-RACOON-X509-CERT-VERIF</a></b></td>
   <td width="500" valign="top">
    IKE: KAME racoon X509 Certificate Verification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AMALFORMED%3A2MANY-PAYLOAD.html">IKE:MALFORMED:2MANY-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    IKE: Too Many Payloads
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AMALFORMED%3AINV-PAY-LEN.html">IKE:MALFORMED:INV-PAY-LEN</a></b></td>
   <td width="500" valign="top">
    IKE: Invalid Payload Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AMALFORMED%3AINV-PAYLOAD-TYPE.html">IKE:MALFORMED:INV-PAYLOAD-TYPE</a></b></td>
   <td width="500" valign="top">
    IKE: Invalid Payload Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AMALFORMED%3APACKET.html">IKE:MALFORMED:PACKET</a></b></td>
   <td width="500" valign="top">
    IKE: Malformed Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3AOPENSWAN-DPD-NULL-PTR-DOS.html">IKE:OPENSWAN-DPD-NULL-PTR-DOS</a></b></td>
   <td width="500" valign="top">
    IKE: Openswan and Strongswan Dead Peer Detection Null Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ASA-DELETE.html">IKE:SA-DELETE</a></b></td>
   <td width="500" valign="top">
    IKE: Malicious IKE Packets Delete IPsec SA or all SAs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ASTRONGSWAN-CERTIFICATE-BO.html">IKE:STRONGSWAN-CERTIFICATE-BO</a></b></td>
   <td width="500" valign="top">
    IKE: strongSwan Certificate and Identification Payload Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IKE%3ASYMANTEC-ISAKMPD-DOS.html">IKE:SYMANTEC-ISAKMPD-DOS</a></b></td>
   <td width="500" valign="top">
    IKE: Symantec ISAKMPd Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="IMAP"></a>IMAP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3ACOMMAND-FAILED.html">IMAP:AUDIT:COMMAND-FAILED</a></b></td>
   <td width="500" valign="top">
    IMAP: Command Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3AIMAPS-CLEAR.html">IMAP:AUDIT:IMAPS-CLEAR</a></b></td>
   <td width="500" valign="top">
    IMAP: Cleartext Login Over IMAPS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3ALOGIN-FAILED.html">IMAP:AUDIT:LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    IMAP: Login Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3AREQ-BINARY-DATA.html">IMAP:AUDIT:REQ-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    IMAP: Binary Data in Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3AREQ-INVALID-STATE.html">IMAP:AUDIT:REQ-INVALID-STATE</a></b></td>
   <td width="500" valign="top">
    IMAP: Invalid State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUDIT%3AREQ-UNKNOWN-CMD.html">IMAP:AUDIT:REQ-UNKNOWN-CMD</a></b></td>
   <td width="500" valign="top">
    IMAP: Unknown TAG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AAUTH-OF.html">IMAP:AUTH-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: Authentication Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ACYRUS%3AFETCH-CMD.html">IMAP:CYRUS:FETCH-CMD</a></b></td>
   <td width="500" valign="top">
    IMAP: Cyrus Fetch Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ACYRUS%3ALOGIN-OF.html">IMAP:CYRUS:LOGIN-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: Cyrus IMAP Server LOGIN Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ACYRUS%3APARTIAL-CMD.html">IMAP:CYRUS:PARTIAL-CMD</a></b></td>
   <td width="500" valign="top">
    IMAP: Cyrus Partial Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ACYRUS%3APRELOG.html">IMAP:CYRUS:PRELOG</a></b></td>
   <td width="500" valign="top">
    IMAP: Cyrus IMAP Server Pre-Login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AEXPLOIT%3ACMD-DIR-TRSVR.html">IMAP:EXPLOIT:CMD-DIR-TRSVR</a></b></td>
   <td width="500" valign="top">
    IMAP: Multiple Command Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AEXPLOIT%3ACMD-FORMAT-STRING.html">IMAP:EXPLOIT:CMD-FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    IMAP: Command Line Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AEXPLOIT%3ANETMAIL-APPEND.html">IMAP:EXPLOIT:NETMAIL-APPEND</a></b></td>
   <td width="500" valign="top">
    IMAP: Novell NetMail IMAP APPEND
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AEXPLOIT%3ASUSPICIOUS-COMM.html">IMAP:EXPLOIT:SUSPICIOUS-COMM</a></b></td>
   <td width="500" valign="top">
    IMAP: Suspicious IMAP Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AEXPLOIT%3ASUSPICIOUS-HEADER.html">IMAP:EXPLOIT:SUSPICIOUS-HEADER</a></b></td>
   <td width="500" valign="top">
    IMAP: Suspicious Randomized Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AFAILURE%3ABRUTE-FORCE.html">IMAP:FAILURE:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    IMAP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3ACHAR-OF.html">IMAP:IPSWITCH:CHAR-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: Ipswitch IMail LOGIN Special Character Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3ADELETE-OF.html">IMAP:IPSWITCH:DELETE-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: IPSwitch IMAP Server DELETE Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3AFETCH-OF.html">IMAP:IPSWITCH:FETCH-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: IPSwitch IMAP Server FETCH Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3AIMAIL-INFO.html">IMAP:IPSWITCH:IMAIL-INFO</a></b></td>
   <td width="500" valign="top">
    IMAP: Ipswitch iMail Arbitrary File Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3ASEARCH-DATE.html">IMAP:IPSWITCH:SEARCH-DATE</a></b></td>
   <td width="500" valign="top">
    IMAP: Ipswitch IMail Server IMAP SEARCH Command Date String Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AIPSWITCH%3ASTATUS-OF.html">IMAP:IPSWITCH:STATUS-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: IPSwitch IMAP Server STATUS Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ALOTUS-CRAM.html">IMAP:LOTUS-CRAM</a></b></td>
   <td width="500" valign="top">
    IMAP: IBM Lotus Domino IMAP Server CRAM-MD5 Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AMER-SUBSCRIBE.html">IMAP:MER-SUBSCRIBE</a></b></td>
   <td width="500" valign="top">
    IMAP: SUBSCRIBE Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ABIN-SH.html">IMAP:OVERFLOW:BIN-SH</a></b></td>
   <td width="500" valign="top">
    IMAP: Buffer Overflow - /bin/sh
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ACOMMAND.html">IMAP:OVERFLOW:COMMAND</a></b></td>
   <td width="500" valign="top">
    IMAP: Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ADOMINO-IMAP.html">IMAP:OVERFLOW:DOMINO-IMAP</a></b></td>
   <td width="500" valign="top">
    IMAP: IBM Lotus Domino IMAP Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AFLAG.html">IMAP:OVERFLOW:FLAG</a></b></td>
   <td width="500" valign="top">
    IMAP: Flag Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AIMAP-CONT-OF.html">IMAP:OVERFLOW:IMAP-CONT-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: IMAP Continuation Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AIMAP-LSUB-OF.html">IMAP:OVERFLOW:IMAP-LSUB-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: NetWin SurgeMail IMAPD LSUB Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AIMAP4-LSUB-OF.html">IMAP:OVERFLOW:IMAP4-LSUB-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: IMAP4 (Rev1) LSUB Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINE.html">IMAP:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    IMAP: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINUX-X86-1.html">IMAP:OVERFLOW:LINUX-X86-1</a></b></td>
   <td width="500" valign="top">
    IMAP: Linux x86 Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINUX-X86-2.html">IMAP:OVERFLOW:LINUX-X86-2</a></b></td>
   <td width="500" valign="top">
    IMAP: Linux x86 Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINUX-X86-3.html">IMAP:OVERFLOW:LINUX-X86-3</a></b></td>
   <td width="500" valign="top">
    IMAP: Linux x86 Buffer Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINUX-X86-4.html">IMAP:OVERFLOW:LINUX-X86-4</a></b></td>
   <td width="500" valign="top">
    IMAP: Linux x86 Buffer Overflow (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINUX-X86-5.html">IMAP:OVERFLOW:LINUX-X86-5</a></b></td>
   <td width="500" valign="top">
    IMAP: Linux x86 Buffer Overflow (5)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALIST-OF.html">IMAP:OVERFLOW:LIST-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: List Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALITERAL-TOKEN.html">IMAP:OVERFLOW:LITERAL-TOKEN</a></b></td>
   <td width="500" valign="top">
    IMAP: Qualcomm WorldMail IMAP Literal Token Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALIT_LENGTH_OFLOW.html">IMAP:OVERFLOW:LIT_LENGTH_OFLOW</a></b></td>
   <td width="500" valign="top">
    IMAP: Literal Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILBOX.html">IMAP:OVERFLOW:MAILBOX</a></b></td>
   <td width="500" valign="top">
    IMAP: Mailbox Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-APPEND.html">IMAP:OVERFLOW:MAILENABLE-APPEND</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable Append Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-ARG-OF.html">IMAP:OVERFLOW:MAILENABLE-ARG-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable Argument Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-BO.html">IMAP:OVERFLOW:MAILENABLE-BO</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable IMAP Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-OF.html">IMAP:OVERFLOW:MAILENABLE-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable Status Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-OF-2.html">IMAP:OVERFLOW:MAILENABLE-OF-2</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable Select Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILENABLE-OF-3.html">IMAP:OVERFLOW:MAILENABLE-OF-3</a></b></td>
   <td width="500" valign="top">
    IMAP: MailEnable IMAP Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMDAEMON-MD5.html">IMAP:OVERFLOW:MDAEMON-MD5</a></b></td>
   <td width="500" valign="top">
    IMAP: Mdaemon CRAM MD5 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMERCUR-NTLMSSP.html">IMAP:OVERFLOW:MERCUR-NTLMSSP</a></b></td>
   <td width="500" valign="top">
    IMAP:  Atrium Software MERCUR IMAPD NTLMSSP Command Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMERCURY-LOGIN.html">IMAP:OVERFLOW:MERCURY-LOGIN</a></b></td>
   <td width="500" valign="top">
    IMAP: Mercury Login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMERCURY-MAIL-BO.html">IMAP:OVERFLOW:MERCURY-MAIL-BO</a></b></td>
   <td width="500" valign="top">
    IMAP: Mercury Mail IMAP Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AOL-IFRAME-EXEC.html">IMAP:OVERFLOW:OL-IFRAME-EXEC</a></b></td>
   <td width="500" valign="top">
    IMAP: Outlook Frame Overflow Forced File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3APASS.html">IMAP:OVERFLOW:PASS</a></b></td>
   <td width="500" valign="top">
    IMAP: Password Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AREFERENCE.html">IMAP:OVERFLOW:REFERENCE</a></b></td>
   <td width="500" valign="top">
    IMAP: Reference Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ASCO-IMAPD-UNO-OF.html">IMAP:OVERFLOW:SCO-IMAPD-UNO-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: SCO Openserver imapd 9.0 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ATAG.html">IMAP:OVERFLOW:TAG</a></b></td>
   <td width="500" valign="top">
    IMAP: TAG Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AUSER.html">IMAP:OVERFLOW:USER</a></b></td>
   <td width="500" valign="top">
    IMAP: Username Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AWUIMAPD-MBOX-OF.html">IMAP:OVERFLOW:WUIMAPD-MBOX-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: Wu-IMAPd Mailbox Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AWUIMAPD-PART-OF.html">IMAP:OVERFLOW:WUIMAPD-PART-OF</a></b></td>
   <td width="500" valign="top">
    IMAP: Wu-IMAPd Partial Mailbox Attribute Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AREQERR%3AINVALID_LITERAL_LEN.html">IMAP:REQERR:INVALID_LITERAL_LEN</a></b></td>
   <td width="500" valign="top">
    IMAP: Invalid Literal Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AREQERR%3AREQ-DUPLICATE-TAG.html">IMAP:REQERR:REQ-DUPLICATE-TAG</a></b></td>
   <td width="500" valign="top">
    IMAP: Duplicate TAG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AREQERR%3AREQ-INVALID-TAG.html">IMAP:REQERR:REQ-INVALID-TAG</a></b></td>
   <td width="500" valign="top">
    IMAP: Invalid TAG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AREQERR%3AREQ-UNEXPECTED-ARG.html">IMAP:REQERR:REQ-UNEXPECTED-ARG</a></b></td>
   <td width="500" valign="top">
    IMAP: Unexpected Argument
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3ASET-QUOTA.html">IMAP:SET-QUOTA</a></b></td>
   <td width="500" valign="top">
    IMAP: Domino Set Quota
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IMAP%3AVULN%3ACYRUS-2-1-11.html">IMAP:VULN:CYRUS-2-1-11</a></b></td>
   <td width="500" valign="top">
    IMAP: Vulnerable Cyrus Version ( &lt; 2.2.11)
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="IP"></a>IP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AAUDIT%3AHAS-IP-OPTIONS.html">IP:AUDIT:HAS-IP-OPTIONS</a></b></td>
   <td width="500" valign="top">
    IP: Packet Carries IP Options
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AAUDIT%3AINVALID-TYPE.html">IP:AUDIT:INVALID-TYPE</a></b></td>
   <td width="500" valign="top">
    IP: Invalid Option Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AESP-RUNT.html">IP:ESP-RUNT</a></b></td>
   <td width="500" valign="top">
    IP: ESP Runt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AEXPLOIT%3AIP-TRACEROUTE.html">IP:EXPLOIT:IP-TRACEROUTE</a></b></td>
   <td width="500" valign="top">
    IP: Traceroute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AEXPLOIT%3ASAME-SRC-DST.html">IP:EXPLOIT:SAME-SRC-DST</a></b></td>
   <td width="500" valign="top">
    IP: Identical Source and Destination
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AIGMP-MS-DOS.html">IP:IGMP-MS-DOS</a></b></td>
   <td width="500" valign="top">
    IP: Microsoft IGMPv3 DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AINFO%3AINVALID-DESTINATION.html">IP:INFO:INVALID-DESTINATION</a></b></td>
   <td width="500" valign="top">
    IP: Invalid Destination Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AINFO%3AINVALID-SOURCE.html">IP:INFO:INVALID-SOURCE</a></b></td>
   <td width="500" valign="top">
    IP: Invalid Source Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AOPTERR%3ADUPLICATE.html">IP:OPTERR:DUPLICATE</a></b></td>
   <td width="500" valign="top">
    IP: Duplicate Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AOPTERR%3AINVALID-INFRAGMENT.html">IP:OPTERR:INVALID-INFRAGMENT</a></b></td>
   <td width="500" valign="top">
    IP: Option in Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AOPTERR%3AINVALID-LENGTH.html">IP:OPTERR:INVALID-LENGTH</a></b></td>
   <td width="500" valign="top">
    IP: Invalid Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3AOVERFLOW%3AOPTIONS.html">IP:OVERFLOW:OPTIONS</a></b></td>
   <td width="500" valign="top">
    IP: Options Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="IP%3ASRC-ROUTE-OF.html">IP:SRC-ROUTE-OF</a></b></td>
   <td width="500" valign="top">
    IGMP: Source Route Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="LDAP"></a>LDAP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AAD-AUTH-BYPASS.html">LDAP:AD-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Windows Active Directory LDAP Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AAD-CONVERT-ATT.html">LDAP:AD-CONVERT-ATT</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Windows Active Directory Crafted LDAP Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AAD-LDAP-DOS.html">LDAP:AD-LDAP-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Active Directory Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AAUDIT%3AANONYMOUS_BIND.html">LDAP:AUDIT:ANONYMOUS_BIND</a></b></td>
   <td width="500" valign="top">
    LDAP: Anonymous Bind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AAUDIT%3ABIND_RESULT_FAILED.html">LDAP:AUDIT:BIND_RESULT_FAILED</a></b></td>
   <td width="500" valign="top">
    LDAP: Bind Result Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ABER-DOS.html">LDAP:BER-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP ber_get_next BER Decoding Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ABERGET-NXT-DOS.html">LDAP:BERGET-NXT-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP ber_get_next Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ACOMMGATE-OF.html">LDAP:COMMGATE-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: CommuniGate Pro LDAP Message Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ACONTROLS-MISMATCH.html">LDAP:CONTROLS-MISMATCH</a></b></td>
   <td width="500" valign="top">
    LDAP: Controls Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEDIRECTORY-DOS.html">LDAP:EDIRECTORY-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Novell eDirectory Unchecked Length Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AADDREQ-ATTRIB-EMPTY.html">LDAP:EMPTY:ADDREQ-ATTRIB-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Attribute Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AASSERT_EMPTY.html">LDAP:EMPTY:ASSERT_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Compare Request Assertionval Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AATTRIBDESC_EMPTY.html">LDAP:EMPTY:ATTRIBDESC_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Compare Request Attributedesc Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AATTRIBLIST_EMPTY.html">LDAP:EMPTY:ATTRIBLIST_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Attributelist Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AATTRIBVALUE_EMPTY.html">LDAP:EMPTY:ATTRIBVALUE_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Attributevalue Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AATTRIBVAL_LIST_EMPTY.html">LDAP:EMPTY:ATTRIBVAL_LIST_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Attributevalue List Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AATTRIB_ASSERT_EMPTY.html">LDAP:EMPTY:ATTRIB_ASSERT_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Compare Request Attributevalassertion Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ADELREQ_EMPTY.html">LDAP:EMPTY:DELREQ_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Delete Request Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AEXTDREQ-REQNM-EMPTY.html">LDAP:EMPTY:EXTDREQ-REQNM-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Extended Request Reqname Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AEXTDREQ-REQVAL-EMPTY.html">LDAP:EMPTY:EXTDREQ-REQVAL-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Extended Request Reqval Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AEXTDRSP-RESP-EMPTY.html">LDAP:EMPTY:EXTDRSP-RESP-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Empty Extended Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AEXTDRSP-RSPNM-EMPTY.html">LDAP:EMPTY:EXTDRSP-RSPNM-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Extended Response: Rspname Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AMODIFYREQ_ADD_EMPTY.html">LDAP:EMPTY:MODIFYREQ_ADD_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Add Vals Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AMODIFYREQ_EMPTY.html">LDAP:EMPTY:MODIFYREQ_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AMODIFYREQ_PART_EMPTY.html">LDAP:EMPTY:MODIFYREQ_PART_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Part Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AMODREQ-ATTRIB-EMPTY.html">LDAP:EMPTY:MODREQ-ATTRIB-EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Attrib Value Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3AREFERRAL_EMPTY.html">LDAP:EMPTY:REFERRAL_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Referral: Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASCHREQ-FTR-SSTR-NONE.html">LDAP:EMPTY:SCHREQ-FTR-SSTR-NONE</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Substrg None
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASCHREQ_FILTER_EMPTY.html">LDAP:EMPTY:SCHREQ_FILTER_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCHREQ_FILTER_EMPTY.html">LDAP:EMPTY:SRCHREQ_FILTER_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Attribute Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCHREQ_FTR_NULL.html">LDAP:EMPTY:SRCHREQ_FTR_NULL</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Present Null
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCHREQ_FTR_SSTR.html">LDAP:EMPTY:SRCHREQ_FTR_SSTR</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Substrg Null
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCHREQ_LOGOP_NOARGS.html">LDAP:EMPTY:SRCHREQ_LOGOP_NOARGS</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Logicalop Noargs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCH_FILTER_EMPTY.html">LDAP:EMPTY:SRCH_FILTER_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Assertion Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCH_RESREF_NONE.html">LDAP:EMPTY:SRCH_RESREF_NONE</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Result Referral None
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASRCH_RES_OBJ_EMPTY.html">LDAP:EMPTY:SRCH_RES_OBJ_EMPTY</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Result Entry: Objname Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3AADD-RESULT-FAIL.html">LDAP:FAILED:ADD-RESULT-FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Result Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3ABRUTE-FORCE.html">LDAP:FAILED:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    LDAP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3ACOMPARE_RESULT_FAIL.html">LDAP:FAILED:COMPARE_RESULT_FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Compare Result Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3ADELETE-RESULT-FAIL.html">LDAP:FAILED:DELETE-RESULT-FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Delete Result Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3AMODDN-RESULT-FAIL.html">LDAP:FAILED:MODDN-RESULT-FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify DN Result: Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3AMODIFY-RESULT-FAIL.html">LDAP:FAILED:MODIFY-RESULT-FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Result: Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFAILED%3ASEARCH-RESULT-FAIL.html">LDAP:FAILED:SEARCH-RESULT-FAIL</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Result Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AATTRIB-DESC-FMTERR.html">LDAP:FORMAT:ATTRIB-DESC-FMTERR</a></b></td>
   <td width="500" valign="top">
    LDAP: Attribute Descriptor Format Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3ADN_FMTERR.html">LDAP:FORMAT:DN_FMTERR</a></b></td>
   <td width="500" valign="top">
    LDAP: Distinguished Name Format Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AENC-UNK-END-CHAR.html">LDAP:FORMAT:ENC-UNK-END-CHAR</a></b></td>
   <td width="500" valign="top">
    LDAP: Unknown Chars At End
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AENC_INCORRECT_TAG.html">LDAP:FORMAT:ENC_INCORRECT_TAG</a></b></td>
   <td width="500" valign="top">
    LDAP: Incorrect Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AENC_LEN_INDEFINITE.html">LDAP:FORMAT:ENC_LEN_INDEFINITE</a></b></td>
   <td width="500" valign="top">
    LDAP: Length Indefinite Form
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AENC_LEN_LEFT_ZEROS.html">LDAP:FORMAT:ENC_LEN_LEFT_ZEROS</a></b></td>
   <td width="500" valign="top">
    LDAP: Len Left Zeros
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AIMAIL-BOF.html">LDAP:IMAIL-BOF</a></b></td>
   <td width="500" valign="top">
    LDAP: Imail Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AADDREQ-ENTRY-INV.html">LDAP:INVALID:ADDREQ-ENTRY-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Entry Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AATTRIBTYPE_INVALID.html">LDAP:INVALID:ATTRIBTYPE_INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Add Request Attributetype Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AENC_BOOLEAN.html">LDAP:INVALID:ENC_BOOLEAN</a></b></td>
   <td width="500" valign="top">
    LDAP: Invalid Boolean Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AENC_INTEGER_LEN.html">LDAP:INVALID:ENC_INTEGER_LEN</a></b></td>
   <td width="500" valign="top">
    LDAP: Integer Length Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AENC_INVALID_LEN.html">LDAP:INVALID:ENC_INVALID_LEN</a></b></td>
   <td width="500" valign="top">
    LDAP: Invalid Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AENTRY_INVALID.html">LDAP:INVALID:ENTRY_INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Compare Request Entry Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AMESGID-INVALID.html">LDAP:INVALID:MESGID-INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Invalid MessageID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AMODDNREQ-ENTRY-INV.html">LDAP:INVALID:MODDNREQ-ENTRY-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify DN Request: Entry Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AMODDNREQ-NWRDN-INV.html">LDAP:INVALID:MODDNREQ-NWRDN-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify DN Request: Newrdn Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AMODRDN-NULL-RDN.html">LDAP:INVALID:MODRDN-NULL-RDN</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP Modrdn RDN NULL String Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AREFERRAL_INVALID.html">LDAP:INVALID:REFERRAL_INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Referral: Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AREQ-ATTRIBTYPE-INV.html">LDAP:INVALID:REQ-ATTRIBTYPE-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Attributetype Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AREQ-OPERATION-INV.html">LDAP:INVALID:REQ-OPERATION-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Operation Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AREQTYPE_INVALID.html">LDAP:INVALID:REQTYPE_INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Request Type: Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3AREQ_OBJECT_INVALID.html">LDAP:INVALID:REQ_OBJECT_INVALID</a></b></td>
   <td width="500" valign="top">
    LDAP: Modify Request: Object Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASEARCH-ATTRIB-INV.html">LDAP:INVALID:SEARCH-ATTRIB-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Attribute Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASEARCH-BASEOBJ-INV.html">LDAP:INVALID:SEARCH-BASEOBJ-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Base Object Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASEARCH-FILTER-INV.html">LDAP:INVALID:SEARCH-FILTER-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Matchrule Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASEARCH_SCOPE_INV.html">LDAP:INVALID:SEARCH_SCOPE_INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Scope Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCH-DEREF-AL-INV.html">LDAP:INVALID:SRCH-DEREF-AL-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Derefaliases Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCH-SIZELIMIT-INV.html">LDAP:INVALID:SRCH-SIZELIMIT-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: LDAP Search Request: Sizelimit Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCH-TIMELIMIT-INV.html">LDAP:INVALID:SRCH-TIMELIMIT-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Timelimit Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCH-TYPEONLY-INV.html">LDAP:INVALID:SRCH-TYPEONLY-INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Typesonly Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCHREQ_FLEN_INV.html">LDAP:INVALID:SRCHREQ_FLEN_INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Len Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AINVALID%3ASRCH_RES_ATTR_INV.html">LDAP:INVALID:SRCH_RES_ATTR_INV</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Result Entry: Attribute Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AKERIO-DOS.html">LDAP:KERIO-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Kerio MailServer Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ALOTUS-DN.html">LDAP:LOTUS-DN</a></b></td>
   <td width="500" valign="top">
    LDAP: IBM Lotus Domino LDAP Server Invalid DN Message Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ALOTUS-DOMINO.html">LDAP:LOTUS-DOMINO</a></b></td>
   <td width="500" valign="top">
    LDAP: Lotus Domino LDAP Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ALSASS-HEAP-OF.html">LDAP:LSASS-HEAP-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: LSASS Heap Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AMS-AD-QUERY-DOS.html">LDAP:MS-AD-QUERY-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Active Directory LDAP Query Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AMS-WINDOWS-AD-LDAP-DOS.html">LDAP:MS-WINDOWS-AD-LDAP-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Windows Active Directory LDAP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ANA-PGP-KEYSERVER-OF.html">LDAP:NA-PGP-KEYSERVER-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Network Associates PGP KeyServer 7 LDAP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOPENLDAP-2.2.23-DOS.html">LDAP:OPENLDAP-2.2.23-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP 2.2.23 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOPENLDAP-RWM-DOS.html">LDAP:OPENLDAP-RWM-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP rwm Overlay Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AORACLE-PREAUTH-DOS.html">LDAP:ORACLE-PREAUTH-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Oracle Internet Directory Pre-Authentication LDAP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AATTRIB-DESC-OF.html">LDAP:OVERFLOW:ATTRIB-DESC-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Attribute Desciptor Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3ADC-MEM-LEAK-DOS.html">LDAP:OVERFLOW:DC-MEM-LEAK-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Windows Active Directory Memory Leak Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3ADN_TOO_LONG.html">LDAP:OVERFLOW:DN_TOO_LONG</a></b></td>
   <td width="500" valign="top">
    LDAP: Distinguished Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AENC-TAG-VAL-OF.html">LDAP:OVERFLOW:ENC-TAG-VAL-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Tag Value Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AENCODING-INT-OF.html">LDAP:OVERFLOW:ENCODING-INT-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Integer Repr Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AENCODING-LEN-OF.html">LDAP:OVERFLOW:ENCODING-LEN-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Len Value Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AENCODING-TAG-OF.html">LDAP:OVERFLOW:ENCODING-TAG-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Tag Repr Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AENC_REPR_2LONG.html">LDAP:OVERFLOW:ENC_REPR_2LONG</a></b></td>
   <td width="500" valign="top">
    LDAP: Length Repr Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AIMAIL-ASN-1.html">LDAP:OVERFLOW:IMAIL-ASN-1</a></b></td>
   <td width="500" valign="top">
    LDAP: Ipswitch IMail LDAP Daemon Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AMESSAGE-TOO-LONG.html">LDAP:OVERFLOW:MESSAGE-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    LDAP: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AMODRDN-UTF8-EXEC.html">LDAP:OVERFLOW:MODRDN-UTF8-EXEC</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP Modrdn RDN UTF-8 String Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AMS-DIR-LEAK-MC.html">LDAP:OVERFLOW:MS-DIR-LEAK-MC</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Windows 2000 Active Directory LDAP Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AREQ-OF.html">LDAP:OVERFLOW:REQ-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Active Directory Request Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3ASEARCH-LEVELS-OF.html">LDAP:OVERFLOW:SEARCH-LEVELS-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Levels Exceeded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ARECURSIVE-DOS.html">LDAP:RECURSIVE-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: Microsoft Active Directory LSASS Recursive Stack Overflow Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ASAMBALDAP-LIBLDB.html">LDAP:SAMBALDAP-LIBLDB</a></b></td>
   <td width="500" valign="top">
    LDAP: Samba LDAP Server libldb Infinite Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ASIDVAULT-DOS.html">LDAP:SIDVAULT-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: SidVault Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ASLAPD-OVERLAY-DOS.html">LDAP:SLAPD-OVERLAY-DOS</a></b></td>
   <td width="500" valign="top">
    LDAP: OpenLDAP slapd Deref Overlay Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ASUN-DIR-OF.html">LDAP:SUN-DIR-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: Sun Directory Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ASUN-REQ-FS.html">LDAP:SUN-REQ-FS</a></b></td>
   <td width="500" valign="top">
    LDAP: Sun LDAP Format String in Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3ATIVOLI-OF.html">LDAP:TIVOLI-OF</a></b></td>
   <td width="500" valign="top">
    LDAP: IBM Tivoli Directory Server LDAP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LDAP%3AUNSUPPORTED_VERSION.html">LDAP:UNSUPPORTED_VERSION</a></b></td>
   <td width="500" valign="top">
    LDAP: Unsupported Version
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="LPD"></a>LPD</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPD%3AACTFAX-SERVER-BO.html">LPD:ACTFAX-SERVER-BO</a></b></td>
   <td width="500" valign="top">
    LPD: ActFax LPD Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPD%3AHUMMINGBIRD.html">LPD:HUMMINGBIRD</a></b></td>
   <td width="500" valign="top">
    LPD: Hummingbird LPD Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPD%3ALDP-CMD-INJ.html">LPD:LDP-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    LPD: Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPD%3AMSF-CASCADE-JOB-REQ.html">LPD:MSF-CASCADE-JOB-REQ</a></b></td>
   <td width="500" valign="top">
    LPD: Metasploit Cascade Job Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPD%3AOPT-OF.html">LPD:OPT-OF</a></b></td>
   <td width="500" valign="top">
    LPD: Option Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="LPR"></a>LPR</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AARB-FILE-UNLINK.html">LPR:ARB-FILE-UNLINK</a></b></td>
   <td width="500" valign="top">
    LPR: Sun Solaris Printd Daemon Arbitrary File Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AAUDIT%3AC-CMD.html">LPR:AUDIT:C-CMD</a></b></td>
   <td width="500" valign="top">
    LPR:Unknown CFile Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AAUDIT%3ACMD.html">LPR:AUDIT:CMD</a></b></td>
   <td width="500" valign="top">
    LPR:Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AAUDIT%3ACMD-FAILED.html">LPR:AUDIT:CMD-FAILED</a></b></td>
   <td width="500" valign="top">
    LPR:Command Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AAUDIT%3APORT.html">LPR:AUDIT:PORT</a></b></td>
   <td width="500" valign="top">
    LPR:Invalid Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AAUDIT%3ARESPONSE.html">LPR:AUDIT:RESPONSE</a></b></td>
   <td width="500" valign="top">
    LPR:Unexpected Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AC-EMPTY.html">LPR:INVALID:C-EMPTY</a></b></td>
   <td width="500" valign="top">
    LPR: CFile Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AC-NAME.html">LPR:INVALID:C-NAME</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Name Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3ACMD-TRUNC.html">LPR:INVALID:CMD-TRUNC</a></b></td>
   <td width="500" valign="top">
    LPR:Truncated Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AD-EMPTY.html">LPR:INVALID:D-EMPTY</a></b></td>
   <td width="500" valign="top">
    LPR:DFile Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AD-NAME.html">LPR:INVALID:D-NAME</a></b></td>
   <td width="500" valign="top">
    LPR:DFile Name Invalid
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AEOF.html">LPR:INVALID:EOF</a></b></td>
   <td width="500" valign="top">
    LPR:Invalid EOF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AEOL.html">LPR:INVALID:EOL</a></b></td>
   <td width="500" valign="top">
    LPR:Invalid EOL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3ALINE.html">LPR:INVALID:LINE</a></b></td>
   <td width="500" valign="top">
    LPR:Line Too Small
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AINVALID%3AREQUEST.html">LPR:INVALID:REQUEST</a></b></td>
   <td width="500" valign="top">
    LPR:Unexpected Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-BANNER.html">LPR:OVERFLOW:C-BANNER</a></b></td>
   <td width="500" valign="top">
    LPR: CFile Banner Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-CLASS.html">LPR:OVERFLOW:C-CLASS</a></b></td>
   <td width="500" valign="top">
    LPR: CFile Class Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-FONT.html">LPR:OVERFLOW:C-FONT</a></b></td>
   <td width="500" valign="top">
    LPR: CFile Font Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-FORMAT.html">LPR:OVERFLOW:C-FORMAT</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Format Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-HOST.html">LPR:OVERFLOW:C-HOST</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Host Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-INDENT.html">LPR:OVERFLOW:C-INDENT</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Indent Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-JOB.html">LPR:OVERFLOW:C-JOB</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Job Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-LENGTH.html">LPR:OVERFLOW:C-LENGTH</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Length Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-MAIL.html">LPR:OVERFLOW:C-MAIL</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Mail Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-NAME.html">LPR:OVERFLOW:C-NAME</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Name Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-SOURCE.html">LPR:OVERFLOW:C-SOURCE</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Source Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-SYMLINK.html">LPR:OVERFLOW:C-SYMLINK</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Symlink Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-TITLE.html">LPR:OVERFLOW:C-TITLE</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Title Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-USER.html">LPR:OVERFLOW:C-USER</a></b></td>
   <td width="500" valign="top">
    LPR:CFile User Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AC-WIDTH.html">LPR:OVERFLOW:C-WIDTH</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Width Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3ACFILE.html">LPR:OVERFLOW:CFILE</a></b></td>
   <td width="500" valign="top">
    LPR:CFile Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3ACFILE-LEN.html">LPR:OVERFLOW:CFILE-LEN</a></b></td>
   <td width="500" valign="top">
    LPR: CFile Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AD-LENGTH.html">LPR:OVERFLOW:D-LENGTH</a></b></td>
   <td width="500" valign="top">
    LPR:DFile Length Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3AD-NAME.html">LPR:OVERFLOW:D-NAME</a></b></td>
   <td width="500" valign="top">
    LPR:DFile Name Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3ADFILE.html">LPR:OVERFLOW:DFILE</a></b></td>
   <td width="500" valign="top">
    LPR: DFile Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3ALINE.html">LPR:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    LPR: Line Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AOVERFLOW%3ALPD-EXPLOIT.html">LPR:OVERFLOW:LPD-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    LPR: Solaris lpd Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="LPR%3AWINDOWS-LPR-DOS.html">LPR:WINDOWS-LPR-DOS</a></b></td>
   <td width="500" valign="top">
    LPR: Windows Services for Unix LPR Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="MISC"></a>MISC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3AHTRAN-PROXY-CONNECT-FAILED.html">MISC:HTRAN-PROXY-CONNECT-FAILED</a></b></td>
   <td width="500" valign="top">
    MISC: HTran Proxy Connection Failed Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3AKERIO-AUTH-OF.html">MISC:KERIO-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    MISC: Kerio Personal Firewall Authentication Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3ALIBREOFICE-IMPRESS-RSM-RCE.html">MISC:LIBREOFICE-IMPRESS-RSM-RCE</a></b></td>
   <td width="500" valign="top">
    MISC: LibreOffice Impress Remote Socket Manager Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3ALINUX-KERNEL-ISCSI-BO.html">MISC:LINUX-KERNEL-ISCSI-BO</a></b></td>
   <td width="500" valign="top">
    MISC: Linux Kernel iscsi_add_notunderstood_response Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3ALLMNR-REVERSE-LOOKUP.html">MISC:LLMNR-REVERSE-LOOKUP</a></b></td>
   <td width="500" valign="top">
    LLMNR: Reverse Lookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3AOPENAFS-RPC-BO.html">MISC:OPENAFS-RPC-BO</a></b></td>
   <td width="500" valign="top">
    MISC: OpenAFS GetStatistics64 RPC Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3APDF%3AINTEGER-OVERFLOW.html">MISC:PDF:INTEGER-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    PDF Deflate Parameter Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3ASHELLSHOCK.html">MISC:SHELLSHOCK</a></b></td>
   <td width="500" valign="top">
    MISC: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3AWINS-BOF.html">MISC:WINS-BOF</a></b></td>
   <td width="500" valign="top">
    MISC: WINS Service Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MISC%3AWINS-COMMENDLG.html">MISC:WINS-COMMENDLG</a></b></td>
   <td width="500" valign="top">
    MISC: Microsoft WINS Service Remote Code Execution
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="MS-RPC"></a>MS-RPC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AARNUDP-RPC-DOS.html">MS-RPC:ARNUDP-RPC-DOS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: ARNUDP RPC Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AATSVC-BIND.html">MS-RPC:ATSVC-BIND</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Remote &quot;atsvc&quot; Bind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AATSVC-RUNDLL.html">MS-RPC:ATSVC-RUNDLL</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Remote &quot;atsvc&quot; Rundll32.exe Job
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ABROADWIN-BOF.html">MS-RPC:BROADWIN-BOF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Advantech/BroadWin SCADA RPC Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCE-RPC-DNSSVR.html">MS-RPC:DCE-RPC-DNSSVR</a></b></td>
   <td width="500" valign="top">
    MS-RPC: RPC DNS Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCE-RPC-UUID-BIND.html">MS-RPC:DCE-RPC-UUID-BIND</a></b></td>
   <td width="500" valign="top">
    WINDOWS DCE-RPC: UUID Bind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCERPC-DOS3.html">MS-RPC:DCERPC-DOS3</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Windows 2000 RPC DCOM Interface DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AEXPLOIT.html">MS-RPC:DCOM:EXPLOIT</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AEXPLOIT-2.html">MS-RPC:DCOM:EXPLOIT-2</a></b></td>
   <td width="500" valign="top">
    MSRPC: DCOM Exploit (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AEXPLOIT-3.html">MS-RPC:DCOM:EXPLOIT-3</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM Exploit (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3ALONG-FILE-OF.html">MS-RPC:DCOM:LONG-FILE-OF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM RPC Long Filename Heap Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AREMACT.html">MS-RPC:DCOM:REMACT</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM Remote Activation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AREMACT-OBJNAME-OF.html">MS-RPC:DCOM:REMACT-OBJNAME-OF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Remote Activation Objectname Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3AREMACT-UDP.html">MS-RPC:DCOM:REMACT-UDP</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM Remote Activation Attempt (UDP Port 135-139)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3ASVRNAME-2LONG.html">MS-RPC:DCOM:SVRNAME-2LONG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCOM Server Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEPDUMP-SCAN.html">MS-RPC:EPDUMP-SCAN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Epdump Scan Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEPDUMP-SCAN-2.html">MS-RPC:EPDUMP-SCAN-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Epdump Scan Detected (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ACL-PAYLOAD-NOT-EMPTY.html">MS-RPC:ERR:CL-PAYLOAD-NOT-EMPTY</a></b></td>
   <td width="500" valign="top">
    MS-RPC: CL Payload Not Empty
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ACL-PTYPE-IN-CO-PDU.html">MS-RPC:ERR:CL-PTYPE-IN-CO-PDU</a></b></td>
   <td width="500" valign="top">
    MS-RPC: CL Ptype In CO PDU
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ACO-PTYPE-IN-CL-PDU.html">MS-RPC:ERR:CO-PTYPE-IN-CL-PDU</a></b></td>
   <td width="500" valign="top">
    MS-RPC: CO Ptype IN CL PDU
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ACOUNT-TOO-LARGE.html">MS-RPC:ERR:COUNT-TOO-LARGE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Actual Count Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-INV-LHS-LEN.html">MS-RPC:ERR:EPM-INV-LHS-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Invalid LHS Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-INV-NUM-ENTRIES.html">MS-RPC:ERR:EPM-INV-NUM-ENTRIES</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Invalid Number Entries
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-INV-OP-NUM.html">MS-RPC:ERR:EPM-INV-OP-NUM</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Invalid Option Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-INV-RHS-LEN.html">MS-RPC:ERR:EPM-INV-RHS-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Invalid RHS Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-INV-TOWER-LEN.html">MS-RPC:ERR:EPM-INV-TOWER-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Invalid Tower Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-WRONG-LHS-LEN.html">MS-RPC:ERR:EPM-WRONG-LHS-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Wrong LHS Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-WRONG-RHS-LEN.html">MS-RPC:ERR:EPM-WRONG-RHS-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Wrong RHS Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AEPM-WRONG-TOWER-LEN.html">MS-RPC:ERR:EPM-WRONG-TOWER-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: EPM Wrong Tower Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AFRAG-BIGGER-THAN-NEG.html">MS-RPC:ERR:FRAG-BIGGER-THAN-NEG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Frag Length Bigger Than Negotiated
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AFRAG-LEN-TOO-BIG.html">MS-RPC:ERR:FRAG-LEN-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Frag Length Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AFRAG-LEN-TOO-SMALL.html">MS-RPC:ERR:FRAG-LEN-TOO-SMALL</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Frag Length Too Small
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AINV-AUTH-LEN.html">MS-RPC:ERR:INV-AUTH-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Invalid Authentication Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AINV-AUTH-PAD-LEN.html">MS-RPC:ERR:INV-AUTH-PAD-LEN</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Invalid Authentication Pad Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AINV-PTYPE.html">MS-RPC:ERR:INV-PTYPE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Invalid Ptype
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ALEN-CONFLICT.html">MS-RPC:ERR:LEN-CONFLICT</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Length Conflict
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ARESPONSE-NO-REQ.html">MS-RPC:ERR:RESPONSE-NO-REQ</a></b></td>
   <td width="500" valign="top">
    MSRPC: Response Without A Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3ASHORT-MSG.html">MS-RPC:ERR:SHORT-MSG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AERR%3AWRONG-FRAG.html">MS-RPC:ERR:WRONG-FRAG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Wrong Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ABLIND-BIND-ACK-2.html">MS-RPC:EVASION:BLIND-BIND-ACK-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (6)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ABLIND-BIND-ACK2.html">MS-RPC:EVASION:BLIND-BIND-ACK2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (6a)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ABUFFERED-REQ.html">MS-RPC:EVASION:BUFFERED-REQ</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (8a)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ABUFFERED-REQUEST.html">MS-RPC:EVASION:BUFFERED-REQUEST</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (8)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ADCE-LARGE-FRAG-2.html">MS-RPC:EVASION:DCE-LARGE-FRAG-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (4a)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ADCERPC-SMALL-REQ.html">MS-RPC:EVASION:DCERPC-SMALL-REQ</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (7a)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3AFRAG2-SMALL.html">MS-RPC:EVASION:FRAG2-SMALL</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (5a)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ALARGE-FRAG-1.html">MS-RPC:EVASION:LARGE-FRAG-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ALARGE-FRAG-2.html">MS-RPC:EVASION:LARGE-FRAG-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3AMULTI-HEADER-1.html">MS-RPC:EVASION:MULTI-HEADER-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ASMALL-FRAG.html">MS-RPC:EVASION:SMALL-FRAG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ASMALL-REQ-FRAG.html">MS-RPC:EVASION:SMALL-REQ-FRAG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (7)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AEXCHANGE-MEM.html">MS-RPC:EXCHANGE-MEM</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Exchange Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AHOST-INTEGRATION-RCE.html">MS-RPC:HOST-INTEGRATION-RCE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Host Integration Server RPC access remote code execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINDX-SVC-ACTIVE.html">MS-RPC:INDX-SVC-ACTIVE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Content Indexing Service over RPC Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ADCOM-SVC.html">MS-RPC:INV:DCOM-SVC</a></b></td>
   <td width="500" valign="top">
    MSRPC: Microsoft Windows Invalid DCOM Service 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ADNS-SVC.html">MS-RPC:INV:DNS-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid DNS Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ALLSSRV-SVC.html">MS-RPC:INV:LLSSRV-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid LLSSRV Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3AMQ-SVC.html">MS-RPC:INV:MQ-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid Message Queue Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ANETDDE-SVC.html">MS-RPC:INV:NETDDE-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid NetDDE Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ANETWARE-SVC.html">MS-RPC:INV:NETWARE-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid Netware Workstation Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3APNP-SVC.html">MS-RPC:INV:PNP-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid Plug And Play Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3AREQUEST-FROM-SERVER.html">MS-RPC:INV:REQUEST-FROM-SERVER</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Request In Wrong Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ARESPONSE-FROM-CLIENT.html">MS-RPC:INV:RESPONSE-FROM-CLIENT</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Response In Wrong Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ARRAS-SVC.html">MS-RPC:INV:RRAS-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid RRAS Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ASPOOLSS-SVC.html">MS-RPC:INV:SPOOLSS-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid SPOOLSS Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3ASRV-SVC.html">MS-RPC:INV:SRV-SVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows Invalid Server Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AINV%3AWKSTA-SVC.html">MS-RPC:INV:WKSTA-SVC</a></b></td>
   <td width="500" valign="top">
    MSRPC: Microsoft Windows Invalid Workstation Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALAN-WORM-SPREAD.html">MS-RPC:LAN-WORM-SPREAD</a></b></td>
   <td width="500" valign="top">
    MS-RPC: LAN Worm Spread Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALLSSRV-RCE.html">MS-RPC:LLSSRV-RCE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: License Logging Server Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALSASS%3AMAL-OPCODE.html">MS-RPC:LSASS:MAL-OPCODE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: LSASS Malicious OpCode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALSASS%3AMAL-OPCODE-2.html">MS-RPC:LSASS:MAL-OPCODE-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Windows LSASS Malicious Opcode (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALSASS%3ANETWARE-CIFS-OF.html">MS-RPC:LSASS:NETWARE-CIFS-OF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Netware CIFS LSASS Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALSASS%3ANTLM-DOS.html">MS-RPC:LSASS:NTLM-DOS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Windows LSASS NTLM Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ALSASS%3AOVERSIZED-FRAG.html">MS-RPC:LSASS:OVERSIZED-FRAG</a></b></td>
   <td width="500" valign="top">
    MS-RPC: LSASS DCE-RPC Oversized Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMAL-DNS.html">MS-RPC:MAL-DNS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Malformed RPC DNS Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMESSENGER-POPUP.html">MS-RPC:MESSENGER-POPUP</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Windows Messenger Pop-Up
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMSDTC-DOS.html">MS-RPC:MSDTC-DOS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Distributed Transaction Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMSGQU-FRNAME.html">MS-RPC:MSGQU-FRNAME</a></b></td>
   <td width="500" valign="top">
    MS-RPC: MS Message Queue Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMSRPC-HIGRCE.html">MS-RPC:MSRPC-HIGRCE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Host Integration Server RPC Service Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AMSRPC-ISYSACTIVATE-RACE.html">MS-RPC:MSRPC-ISYSACTIVATE-RACE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: ISystemActivate Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ANETRLOGONGETDMNINF-NULL.html">MS-RPC:NETRLOGONGETDMNINF-NULL</a></b></td>
   <td width="500" valign="top">
    MS-RPC: NetrLogonGetDomainInfo NULL Pointer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ANETSRVRDSKENUM.html">MS-RPC:NETSRVRDSKENUM</a></b></td>
   <td width="500" valign="top">
    MS-RPC: NetBIOS Disk Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ANOOP-SLIDE-RPC-REQ.html">MS-RPC:NOOP-SLIDE-RPC-REQ</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Unicode NOOP Slide in RPC Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ANTLM-RPCSS-DOS.html">MS-RPC:NTLM-RPCSS-DOS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: NT LanMan RPCSS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ALOC-SVC-1.html">MS-RPC:OF:LOC-SVC-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Windows RPC Locator Service Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ALOC-SVC-2.html">MS-RPC:OF:LOC-SVC-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Windows RPC Locator Service Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMESSENGER-1.html">MS-RPC:OF:MESSENGER-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Windows Messenger Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMQSVC.html">MS-RPC:OF:MQSVC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: MQSVC Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMS-DNS-RPC.html">MS-RPC:OF:MS-DNS-RPC</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft DNS RPC Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMSDTC.html">MS-RPC:OF:MSDTC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Distributed Transaction Coordinator Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMSG-QUEUE-1.html">MS-RPC:OF:MSG-QUEUE-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Message Queue Manager Heap Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMSG-QUEUE-2.html">MS-RPC:OF:MSG-QUEUE-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Message Queue Manager Heap Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AMSG-QUEUE-3.html">MS-RPC:OF:MSG-QUEUE-3</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Message Queue Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ANETDDE-SHARE.html">MS-RPC:OF:NETDDE-SHARE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: NetDDE Long Share Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ANWSPOOL-OF.html">MS-RPC:OF:NWSPOOL-OF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Novell Print NWSPOOL.DLL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ARRAS.html">MS-RPC:OF:RRAS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: RRAS Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ASPOOLSS-1.html">MS-RPC:OF:SPOOLSS-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: SPOOLSS Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ASPOOLSS-3.html">MS-RPC:OF:SPOOLSS-3</a></b></td>
   <td width="500" valign="top">
    MS-RPC: SPOOLSS Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ASRV-SVC-1.html">MS-RPC:OF:SRV-SVC-1</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Server Service Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3ASRV-SVC-2.html">MS-RPC:OF:SRV-SVC-2</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Microsoft Server Service Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AWEBCLIENT.html">MS-RPC:OF:WEBCLIENT</a></b></td>
   <td width="500" valign="top">
    MS-RPC: WebClient Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AWKST-SVC-BO.html">MS-RPC:OF:WKST-SVC-BO</a></b></td>
   <td width="500" valign="top">
    MS-RPC: DCE-RPC Windows Workstation Service Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AOF%3AWKST-SVC-PIPE.html">MS-RPC:OF:WKST-SVC-PIPE</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Workstation Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3APGP-SRV-PTR.html">MS-RPC:PGP-SRV-PTR</a></b></td>
   <td width="500" valign="top">
    MS-RPC: PGP Desktop Pointer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ASAMR-ACCESS-DENIED.html">MS-RPC:SAMR-ACCESS-DENIED</a></b></td>
   <td width="500" valign="top">
    MS-RPC: SAMR Access Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ASAMR-ACCESS-REQUEST.html">MS-RPC:SAMR-ACCESS-REQUEST</a></b></td>
   <td width="500" valign="top">
    MS-RPC: SAMR Access Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ASNORT-EVAL-BOF.html">MS-RPC:SNORT-EVAL-BOF</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Sourcefire Snort rule20275eval Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ASPOOLER-DLL-LOAD.html">MS-RPC:SPOOLER-DLL-LOAD</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Spooler DLL Loader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ATREND-MICRO-RPC.html">MS-RPC:TREND-MICRO-RPC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Trend Micro ServerProtect Multiple Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3ATRND-MICRO-RPC.html">MS-RPC:TRND-MICRO-RPC</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Trend Micro ServerProtect Multiple Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="MS-RPC%3AWRKST-DOS.html">MS-RPC:WRKST-DOS</a></b></td>
   <td width="500" valign="top">
    MS-RPC: Workstation Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="NDMP"></a>NDMP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NDMP%3ASHORT-MSG.html">NDMP:SHORT-MSG</a></b></td>
   <td width="500" valign="top">
    NDMP: Short Message
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="NETBIOS"></a>NETBIOS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AACCESS%3AADMIN.html">NETBIOS:ACCESS:ADMIN</a></b></td>
   <td width="500" valign="top">
    NETBIOS: SMB ADMIN$ Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AACCESS%3AC-DRIVE.html">NETBIOS:ACCESS:C-DRIVE</a></b></td>
   <td width="500" valign="top">
    NETBIOS: SMB C$ Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AACCESS%3AD-DRIVE.html">NETBIOS:ACCESS:D-DRIVE</a></b></td>
   <td width="500" valign="top">
    NETBIOS: SMB D$ Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AACCESS%3AIPC-1.html">NETBIOS:ACCESS:IPC-1</a></b></td>
   <td width="500" valign="top">
    NETBIOS SMB IPC$ Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AACCESS%3ASAMBA-CLIENT.html">NETBIOS:ACCESS:SAMBA-CLIENT</a></b></td>
   <td width="500" valign="top">
    NETBIOS Unix Samba Client Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AAUDIT%3AACTIVE_ERR.html">NETBIOS:AUDIT:ACTIVE_ERR</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Name In Use
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AAUDIT%3AINV_HDR.html">NETBIOS:AUDIT:INV_HDR</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Header RCODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AAUDIT%3ANAME_ERROR.html">NETBIOS:AUDIT:NAME_ERROR</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Name Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AAUDIT%3ANBNAME-RES-ADDR.html">NETBIOS:AUDIT:NBNAME-RES-ADDR</a></b></td>
   <td width="500" valign="top">
    NETBIOS Resource Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ADIR%3ACD-DOTDOT.html">NETBIOS:DIR:CD-DOTDOT</a></b></td>
   <td width="500" valign="top">
    NETBIOS SMB CD..
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ADIR%3ACD-DOTDOTDOT.html">NETBIOS:DIR:CD-DOTDOTDOT</a></b></td>
   <td width="500" valign="top">
    NETBIOS SMB CD...
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ADOS%3ARFPARALYZE.html">NETBIOS:DOS:RFPARALYZE</a></b></td>
   <td width="500" valign="top">
    NETBIOS: RFParalyze NULL Session DOS Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ADOS%3ARFPOISON.html">NETBIOS:DOS:RFPOISON</a></b></td>
   <td width="500" valign="top">
    NETBIOS RFPoision DOS Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3ABAD_LABEL_FORMAT.html">NETBIOS:NBDS:BAD_LABEL_FORMAT</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Pointer in Label
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3ABE-SERVERNAME-OF.html">NETBIOS:NBDS:BE-SERVERNAME-OF</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Microsoft Windows 2003 Server Browser Election ServerName Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AEMPTY_UDP_MSG.html">NETBIOS:NBDS:EMPTY_UDP_MSG</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Empty UDP Message Contents
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AFRAG_TRANS_RESP.html">NETBIOS:NBDS:FRAG_TRANS_RESP</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Fragmented Transaction Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3A1STLVL_ENC.html">NETBIOS:NBDS:INVALID:1STLVL_ENC</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid First Level Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3ADGM_LEN.html">NETBIOS:NBDS:INVALID:DGM_LEN</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid Datagram Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3AHDR_FLGS.html">NETBIOS:NBDS:INVALID:HDR_FLGS</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid Header Flags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3ALABEL_LEN.html">NETBIOS:NBDS:INVALID:LABEL_LEN</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid Label Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3AMSG_TYPE.html">NETBIOS:NBDS:INVALID:MSG_TYPE</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid Header Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AINVALID%3APROTO.html">NETBIOS:NBDS:INVALID:PROTO</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Invalid Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AMS-BROWSER-ELECT.html">NETBIOS:NBDS:MS-BROWSER-ELECT</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows BROWSER ELECTION Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AMS-PRINT-SPOOL-FMT.html">NETBIOS:NBDS:MS-PRINT-SPOOL-FMT</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Microsoft Windows Print Spooler Service Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AOF%3AMSG.html">NETBIOS:NBDS:OF:MSG</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Oversized Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AOF%3ANAME.html">NETBIOS:NBDS:OF:NAME</a></b></td>
   <td width="500" valign="top">
    Netbios: Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3ASHORT_MSG.html">NETBIOS:NBDS:SHORT_MSG</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AC2S_AA_FLAG.html">NETBIOS:NBNS:C2S_AA_FLAG</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Authoritive Answer Flag in Query Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AC2S_RESPONSE.html">NETBIOS:NBNS:C2S_RESPONSE</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Response in Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ACLASS-UNKNOWN.html">NETBIOS:NBNS:CLASS-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Class Unknown
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AEMPTY-UDP-MSG.html">NETBIOS:NBNS:EMPTY-UDP-MSG</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Empty UDP Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3AFIRST-ENC.html">NETBIOS:NBNS:INVALID:FIRST-ENC</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid First Level Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3AHDR-CNT.html">NETBIOS:NBNS:INVALID:HDR-CNT</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Header Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3AHDR-OPCODE.html">NETBIOS:NBNS:INVALID:HDR-OPCODE</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Header OPCODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3AHDR-Z.html">NETBIOS:NBNS:INVALID:HDR-Z</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Header NM_FLAGS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3ALABEL-LEN.html">NETBIOS:NBNS:INVALID:LABEL-LEN</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Label Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3ANAME-FLGS.html">NETBIOS:NBNS:INVALID:NAME-FLGS</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Name Flags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3APTR.html">NETBIOS:NBNS:INVALID:PTR</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Pointer Outside of Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AINVALID%3ARRNB-FLG.html">NETBIOS:NBNS:INVALID:RRNB-FLG</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid NAME_FLAG in Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ANAME_TOO_LONG.html">NETBIOS:NBNS:NAME_TOO_LONG</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3APOINTER_LOOP.html">NETBIOS:NBNS:POINTER_LOOP</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Excessive Pointers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ARESCODE%3ACONFLICT.html">NETBIOS:NBNS:RESCODE:CONFLICT</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Name Conflict
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ARESCODE%3AFORMAT_ERR.html">NETBIOS:NBNS:RESCODE:FORMAT_ERR</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Invalid Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ARESCODE%3ANOT_IMPLTD.html">NETBIOS:NBNS:RESCODE:NOT_IMPLTD</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Request Unsupported
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ARESCODE%3AREFUSED.html">NETBIOS:NBNS:RESCODE:REFUSED</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Registration Refused
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ARESCODE%3ASVR_FAIL.html">NETBIOS:NBNS:RESCODE:SVR_FAIL</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: RCODE Server Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AS2C_QUERY.html">NETBIOS:NBNS:S2C_QUERY</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Invalid Response Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ASHORT_MSG.html">NETBIOS:NBNS:SHORT_MSG</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3ATYPE_UNKNOWN.html">NETBIOS:NBNS:TYPE_UNKNOWN</a></b></td>
   <td width="500" valign="top">
    NETBIOS NS: Type Unknown
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AOVERFLOW%3AASN-1-BER.html">NETBIOS:OVERFLOW:ASN-1-BER</a></b></td>
   <td width="500" valign="top">
    NETBIOS: ASN.1 Malformed BER Encoding Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AOVERFLOW%3AASN-1-DER-OF.html">NETBIOS:OVERFLOW:ASN-1-DER-OF</a></b></td>
   <td width="500" valign="top">
    NETBIOS: ASN.1 Overlong DER Authentication Token
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AOVERFLOW%3ALENGTH-OF.html">NETBIOS:OVERFLOW:LENGTH-OF</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AOVERFLOW%3AMAILSLOT.html">NETBIOS:OVERFLOW:MAILSLOT</a></b></td>
   <td width="500" valign="top">
    NETBIOS: Mailslot Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AISATAP-INFO-DIS.html">NETBIOS:WINS:ISATAP-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WPAD WINS Server Registration Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AREPLICATION-PTR.html">NETBIOS:WINS:REPLICATION-PTR</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WINS Server Replication PTR Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AREPLICATION-PTR-U.html">NETBIOS:WINS:REPLICATION-PTR-U</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WINS Server Replication PTR Attack (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3ASRV-NAME-OF.html">NETBIOS:WINS:SRV-NAME-OF</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WINS Server Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AUPDATE-OF.html">NETBIOS:WINS:UPDATE-OF</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WINS Update Record Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AWPADWINS.html">NETBIOS:WINS:WPADWINS</a></b></td>
   <td width="500" valign="top">
    NETBIOS: WPAD WINS Registration Query
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="NFS"></a>NFS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AAUDIT%3AINVALID-XID.html">NFS:AUDIT:INVALID-XID</a></b></td>
   <td width="500" valign="top">
    NFS Invalid XID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AAUDIT%3AMKNOD.html">NFS:AUDIT:MKNOD</a></b></td>
   <td width="500" valign="top">
    NFS MKNOD Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AAUDIT%3AREQ-DENIED.html">NFS:AUDIT:REQ-DENIED</a></b></td>
   <td width="500" valign="top">
    NFS Request Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AAUDIT%3AROOT-ACCESS.html">NFS:AUDIT:ROOT-ACCESS</a></b></td>
   <td width="500" valign="top">
    NFS Unix Root Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AAUDIT%3AUNKNOWN-VER.html">NFS:AUDIT:UNKNOWN-VER</a></b></td>
   <td width="500" valign="top">
    NFS Unknown Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3ABSD-MOUNT-DOS.html">NFS:BSD-MOUNT-DOS</a></b></td>
   <td width="500" valign="top">
    NFS: Mount Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3ACAP-MKNOD.html">NFS:CAP-MKNOD</a></b></td>
   <td width="500" valign="top">
    NFS: Linux CAP_MKNOD Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ALARGE-CRED.html">NFS:ERR:LARGE-CRED</a></b></td>
   <td width="500" valign="top">
    NFS Credential Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ALARGE-FH.html">NFS:ERR:LARGE-FH</a></b></td>
   <td width="500" valign="top">
    NFS Filehandle Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ALONG-FILENAME.html">NFS:ERR:LONG-FILENAME</a></b></td>
   <td width="500" valign="top">
    NFS Filename Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ALONG-NETNAME.html">NFS:ERR:LONG-NETNAME</a></b></td>
   <td width="500" valign="top">
    NFS Destination Netname Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ALONG-PATHNAME.html">NFS:ERR:LONG-PATHNAME</a></b></td>
   <td width="500" valign="top">
    NFS Pathname Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3ASHORT-READ.html">NFS:ERR:SHORT-READ</a></b></td>
   <td width="500" valign="top">
    NFS: Short Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3AVERSION-MISMATCH.html">NFS:ERR:VERSION-MISMATCH</a></b></td>
   <td width="500" valign="top">
    NFS Version Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AERR%3AWRONG-DIR.html">NFS:ERR:WRONG-DIR</a></b></td>
   <td width="500" valign="top">
    NFS Wrong Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AFREEBSD-REDDIR-MEM-COR.html">NFS:FREEBSD-REDDIR-MEM-COR</a></b></td>
   <td width="500" valign="top">
    NFS: FreeBSD NFS Server READDIR Request Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINFO%3AUNKNOWN-PROG.html">NFS:INFO:UNKNOWN-PROG</a></b></td>
   <td width="500" valign="top">
    NFS: Unknown Program
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3ABAD-CRED-LEN.html">NFS:INVALID:BAD-CRED-LEN</a></b></td>
   <td width="500" valign="top">
    NFS Incorrect Credential Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3ABAD-VERF-CRED.html">NFS:INVALID:BAD-VERF-CRED</a></b></td>
   <td width="500" valign="top">
    NFS Incorrect Verifier Credential
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-AMASK.html">NFS:INVALID:INVALID-AMASK</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Access Mask
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-CMODE.html">NFS:INVALID:INVALID-CMODE</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Create Mode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-DIR.html">NFS:INVALID:INVALID-DIR</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-EOF.html">NFS:INVALID:INVALID-EOF</a></b></td>
   <td width="500" valign="top">
    NFS Invalid EOF Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-FILETYPE.html">NFS:INVALID:INVALID-FILETYPE</a></b></td>
   <td width="500" valign="top">
    NFS Invalid File Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-HOW.html">NFS:INVALID:INVALID-HOW</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Stable How
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-PROC.html">NFS:INVALID:INVALID-PROC</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Procedure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AINVALID%3AINVALID-RSTAT.html">NFS:INVALID:INVALID-RSTAT</a></b></td>
   <td width="500" valign="top">
    NFS Invalid Reply Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AMS-WINDOWS-NFS-NULL-DOS.html">NFS:MS-WINDOWS-NFS-NULL-DOS</a></b></td>
   <td width="500" valign="top">
    NFS: Microsoft Windows NFS Server NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AOVERFLOW%3ABUF-OVERFLOW.html">NFS:OVERFLOW:BUF-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    NFS Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AOVERFLOW%3ALINUX-ACL-OF-DOS.html">NFS:OVERFLOW:LINUX-ACL-OF-DOS</a></b></td>
   <td width="500" valign="top">
    NFS: Linux Kernel NFS Access Control List Overflow DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AOVERFLOW%3AXLOG-1BYTE-OF.html">NFS:OVERFLOW:XLOG-1BYTE-OF</a></b></td>
   <td width="500" valign="top">
    NFS: NFS-UTILS XLOG Off-By-One
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3ATRIPWIRE-FORMAT-STRING.html">NFS:TRIPWIRE-FORMAT-STRING</a></b></td>
   <td width="500" valign="top">
    NFS: Tripwire Email Reporting Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NFS%3AUTILS-TCP-CONN-DOS.html">NFS:UTILS-TCP-CONN-DOS</a></b></td>
   <td width="500" valign="top">
    NFS: nfs-utils TCP Connection Termination Denial of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="NNTP"></a>NNTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AAUDIT%3ANESTED-REPLY.html">NNTP:AUDIT:NESTED-REPLY</a></b></td>
   <td width="500" valign="top">
    NNTP Nested Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AAUDIT%3ANESTED-REQ.html">NNTP:AUDIT:NESTED-REQ</a></b></td>
   <td width="500" valign="top">
    NNTP Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AAUDIT%3AUNKNOWN-CMD.html">NNTP:AUDIT:UNKNOWN-CMD</a></b></td>
   <td width="500" valign="top">
    NNTP Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AERR%3AINVALID-CMD.html">NNTP:ERR:INVALID-CMD</a></b></td>
   <td width="500" valign="top">
    NNTP: Invalid Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AINN%3AINND-OF1.html">NNTP:INN:INND-OF1</a></b></td>
   <td width="500" valign="top">
    NNTP: INND Remote Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AINN%3AINND-OF2.html">NNTP:INN:INND-OF2</a></b></td>
   <td width="500" valign="top">
    NNTP: INND Remote Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AINTERNETNEWS-NULL-PATH-DOS.html">NNTP:INTERNETNEWS-NULL-PATH-DOS</a></b></td>
   <td width="500" valign="top">
    NNTP: InterNetNews NULL Path Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3ANN%3ANN-FMTSTR1.html">NNTP:NN:NN-FMTSTR1</a></b></td>
   <td width="500" valign="top">
    NNTP: Nn_exitmsg() Format String (FreeBSD)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AOVERFLOW%3AINN-CONTROL-MSG.html">NNTP:OVERFLOW:INN-CONTROL-MSG</a></b></td>
   <td width="500" valign="top">
    NNTP: InterNetNews Control Message Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AOVERFLOW%3ALINE-OVERFLOW.html">NNTP:OVERFLOW:LINE-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    NNTP Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AOVERFLOW%3ANNTP-XHDR.html">NNTP:OVERFLOW:NNTP-XHDR</a></b></td>
   <td width="500" valign="top">
    NNTP: Outlook Express NNTP XHDR Response Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AOVERFLOW%3AOUTLOOK-NNTP-OF.html">NNTP:OVERFLOW:OUTLOOK-NNTP-OF</a></b></td>
   <td width="500" valign="top">
    NNTP: Outlook Express NNTP Response Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AOVERFLOW%3AXPAT-PATTERN.html">NNTP:OVERFLOW:XPAT-PATTERN</a></b></td>
   <td width="500" valign="top">
    NNTP: XPAT Pattern Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NNTP%3AVULN%3AISC-2-2-2.html">NNTP:VULN:ISC-2-2-2</a></b></td>
   <td width="500" valign="top">
    NNTP: Vulnerable ISC INN Version (&lt; 2.2.2)
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="NTP"></a>NTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3ACTL_ERR_RSP_SEEN.html">NTP:CTL_ERR_RSP_SEEN</a></b></td>
   <td width="500" valign="top">
    NTP: Control Message Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INVALID_CLK_SRC.html">NTP:ERROR:CTL_INVALID_CLK_SRC</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Clock Source
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INVALID_ERRCODE.html">NTP:ERROR:CTL_INVALID_ERRCODE</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Error Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INVALID_EVCODE.html">NTP:ERROR:CTL_INVALID_EVCODE</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Event Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INVALID_OPCODE.html">NTP:ERROR:CTL_INVALID_OPCODE</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid OpCode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INV_CLKSTATUS.html">NTP:ERROR:CTL_INV_CLKSTATUS</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Clock Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INV_PEER_EVCODE.html">NTP:ERROR:CTL_INV_PEER_EVCODE</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Peer Event Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INV_PEER_SELECT.html">NTP:ERROR:CTL_INV_PEER_SELECT</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Peer Status Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_INV_PEER_STATUS.html">NTP:ERROR:CTL_INV_PEER_STATUS</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Peer Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_NONSTD_VAR_NAME.html">NTP:ERROR:CTL_NONSTD_VAR_NAME</a></b></td>
   <td width="500" valign="top">
    NTP: Undefined Variable Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_VAR_NAME_2LONG.html">NTP:ERROR:CTL_VAR_NAME_2LONG</a></b></td>
   <td width="500" valign="top">
    NTP: Variable Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ACTL_VAR_VALUE_2LONG.html">NTP:ERROR:CTL_VAR_VALUE_2LONG</a></b></td>
   <td width="500" valign="top">
    NTP: Variable Value Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ADATA_FIELD_TOO_SHORT.html">NTP:ERROR:DATA_FIELD_TOO_SHORT</a></b></td>
   <td width="500" valign="top">
    NTP: Data Field Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AINVALID_DISPERSION.html">NTP:ERROR:INVALID_DISPERSION</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Dispersion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AINVALID_MODE.html">NTP:ERROR:INVALID_MODE</a></b></td>
   <td width="500" valign="top">
    NTP: Invalid Mode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AMAX_STRATUM_EXCEEDED.html">NTP:ERROR:MAX_STRATUM_EXCEEDED</a></b></td>
   <td width="500" valign="top">
    NTP: Maximum Stratum Exceeded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AMSG_TOO_LONG.html">NTP:ERROR:MSG_TOO_LONG</a></b></td>
   <td width="500" valign="top">
    NTP: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AMSG_TOO_SHORT.html">NTP:ERROR:MSG_TOO_SHORT</a></b></td>
   <td width="500" valign="top">
    NTP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3AMSG_WITHIN_POLL_INTVL.html">NTP:ERROR:MSG_WITHIN_POLL_INTVL</a></b></td>
   <td width="500" valign="top">
    NTP: Message Within Poll Interval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AERROR%3ASERVER_SYNCH_ALARM.html">NTP:ERROR:SERVER_SYNCH_ALARM</a></b></td>
   <td width="500" valign="top">
    NTP: Server Synch Alarm
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AEXCEEDED_REF_CLKAGE.html">NTP:EXCEEDED_REF_CLKAGE</a></b></td>
   <td width="500" valign="top">
    NTP: Server Timestamp Too Old
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AINVALID%3ACTL_CLKERR_RPRTED.html">NTP:INVALID:CTL_CLKERR_RPRTED</a></b></td>
   <td width="500" valign="top">
    NTP: Clock Status Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AINVALID%3ACTL_DATA_MULTI_PKT.html">NTP:INVALID:CTL_DATA_MULTI_PKT</a></b></td>
   <td width="500" valign="top">
    NTP: Data Spans Packets
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AINVALID%3ATIMESTMP_NOT_MATCH.html">NTP:INVALID:TIMESTMP_NOT_MATCH</a></b></td>
   <td width="500" valign="top">
    NTP: Timestamps do not Match
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMODE7-DOS.html">NTP:MODE7-DOS</a></b></td>
   <td width="500" valign="top">
    NTP: Multiple Vendors NTP Mode 7 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMODE_STRATUM_ALTERED.html">NTP:MODE_STRATUM_ALTERED</a></b></td>
   <td width="500" valign="top">
    NTP: Mode or Stratum Altered
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMONLIST-REQUEST.html">NTP:MONLIST-REQUEST</a></b></td>
   <td width="500" valign="top">
    NTP: Monitor List Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMONLIST-REQUEST-FLOOD.html">NTP:MONLIST-REQUEST-FLOOD</a></b></td>
   <td width="500" valign="top">
    NTP: Monitor List Command Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMUL-NTP-DAEMON-AUTOKEY-BOF.html">NTP:MUL-NTP-DAEMON-AUTOKEY-BOF</a></b></td>
   <td width="500" valign="top">
    NTP: Multiple Vendors NTP Daemon Autokey Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3AMULTIPLE-STACK-OVERFLOW.html">NTP:MULTIPLE-STACK-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    NTP: Multiple NTP Daemon Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3ANTP-READVAR.html">NTP:NTP-READVAR</a></b></td>
   <td width="500" valign="top">
    NTP: NTP Daemon Readvar Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3APASV_NOT_DISSOLVED.html">NTP:PASV_NOT_DISSOLVED</a></b></td>
   <td width="500" valign="top">
    NTP: Passive Association Not Dissolved
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3APEER_MODE_INCOMPAT.html">NTP:PEER_MODE_INCOMPAT</a></b></td>
   <td width="500" valign="top">
    NTP: Peer Mode Incompatible
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3APEER_STRATUM_INCOMPATI.html">NTP:PEER_STRATUM_INCOMPATI</a></b></td>
   <td width="500" valign="top">
    NTP: Peer Stratum Incompatible
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3APIDFILE-DRIFTFILE-OVERWRITE.html">NTP:PIDFILE-DRIFTFILE-OVERWRITE</a></b></td>
   <td width="500" valign="top">
    NTP: Pidfile Driftfile Arbitrary File Overwrite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3ARECVD_UNEXPECTED_PKT.html">NTP:RECVD_UNEXPECTED_PKT</a></b></td>
   <td width="500" valign="top">
    NTP: Unexpected Early Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="NTP%3ATRAFFIC.html">NTP:TRAFFIC</a></b></td>
   <td width="500" valign="top">
    NTP: NTP traffic
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="OS"></a>OS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3AAIX%3APDNSD-OF.html">OS:AIX:PDNSD-OF</a></b></td>
   <td width="500" valign="top">
    OS: AIX Source Code Browser pdnsd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3ABOOTP-OF.html">OS:LINUXX86:BOOTP-OF</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 BOOTP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3ALPRNG-OF.html">OS:LINUXX86:LPRNG-OF</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 LPRng Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3AMOUNTD-OF-1.html">OS:LINUXX86:MOUNTD-OF-1</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 mountd Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3AMOUNTD-OF-2.html">OS:LINUXX86:MOUNTD-OF-2</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 Mountd Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3AMOUNTD-OF-3.html">OS:LINUXX86:MOUNTD-OF-3</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 Mountd Buffer Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3ANTALKD-OF.html">OS:LINUXX86:NTALKD-OF</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 ntalkd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3ANTPDX-OF.html">OS:LINUXX86:NTPDX-OF</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 ntpdx Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3APOP2-OF-1.html">OS:LINUXX86:POP2-OF-1</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 Pop2 Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3APOP2-OF-2.html">OS:LINUXX86:POP2-OF-2</a></b></td>
   <td width="500" valign="top">
    OS: Linux x86 pop2 Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ALINUXX86%3ASCTP-CHUNKLESS.html">OS:LINUXX86:SCTP-CHUNKLESS</a></b></td>
   <td width="500" valign="top">
    OS: Linux Kernel SCTP Chunkless Packet Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ASCOX86%3ACALSERVER-OF.html">OS:SCOX86:CALSERVER-OF</a></b></td>
   <td width="500" valign="top">
    OS: SCO x86 calserver Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="OS%3ASOLARISX86%3ANLPS-OF.html">OS:SOLARISX86:NLPS-OF</a></b></td>
   <td width="500" valign="top">
    OS: Solaris x86 nlps_server Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="P2P"></a>P2P</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AARES%3APEER-CONNECT-TCP.html">P2P:ARES:PEER-CONNECT-TCP</a></b></td>
   <td width="500" valign="top">
    P2P: Ares Galaxy Peer Connection (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AARES%3APEER-CONNECT-UDP.html">P2P:ARES:PEER-CONNECT-UDP</a></b></td>
   <td width="500" valign="top">
    P2P: Ares Galaxy Peer Connection (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AARES%3AUDP-PEER-CHECK.html">P2P:ARES:UDP-PEER-CHECK</a></b></td>
   <td width="500" valign="top">
    P2P: Ares Galaxy UDP Peer Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-BYE-TTL.html">P2P:AUDIT:GNUTELLA-BYE-TTL</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid BYE TTL Hops
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-EOL.html">P2P:AUDIT:GNUTELLA-EOL</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid EOL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-HDR-ATRB.html">P2P:AUDIT:GNUTELLA-HDR-ATRB</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: No Header Attribute Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-HTTP-GET.html">P2P:AUDIT:GNUTELLA-HTTP-GET</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid HTTP Get Syntax
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-LINE.html">P2P:AUDIT:GNUTELLA-LINE</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-MESSAGE.html">P2P:AUDIT:GNUTELLA-MESSAGE</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Unknown Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-MSG.html">P2P:AUDIT:GNUTELLA-MSG</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Message Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-OK-RESP.html">P2P:AUDIT:GNUTELLA-OK-RESP</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid Connect OK Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-PING-LEN.html">P2P:AUDIT:GNUTELLA-PING-LEN</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid Ping Payload Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-PONG-LEN.html">P2P:AUDIT:GNUTELLA-PONG-LEN</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid Pong Payload Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-PUSH-LEN.html">P2P:AUDIT:GNUTELLA-PUSH-LEN</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid Push Payload Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-QUERY.html">P2P:AUDIT:GNUTELLA-QUERY</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Query Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-RTABLE-UPD.html">P2P:AUDIT:GNUTELLA-RTABLE-UPD</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid RTable Update Payload Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-SEARCH.html">P2P:AUDIT:GNUTELLA-SEARCH</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Missing Search Terminator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-SVR-RESP.html">P2P:AUDIT:GNUTELLA-SVR-RESP</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Invalid Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-TTL.html">P2P:AUDIT:GNUTELLA-TTL</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: TTL Hops Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3AGNUTELLA-UNSUP-VER.html">P2P:AUDIT:GNUTELLA-UNSUP-VER</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Unsupported Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3ASE-HUB-LOOK.html">P2P:AUDIT:SE-HUB-LOOK</a></b></td>
   <td width="500" valign="top">
    P2P: SoftEther Hub Lookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AAUDIT%3ASOFTETHER-SSH.html">P2P:AUDIT:SOFTETHER-SSH</a></b></td>
   <td width="500" valign="top">
    P2P: SoftEther SSH Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABEARSHARE%3ADJ-SERVICE.html">P2P:BEARSHARE:DJ-SERVICE</a></b></td>
   <td width="500" valign="top">
    P2P: BearShare Disc Jockey Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABEARSHARE%3AFILE-XFER.html">P2P:BEARSHARE:FILE-XFER</a></b></td>
   <td width="500" valign="top">
    P2P: Bearshare File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABEARSHARE%3ALOGIN.html">P2P:BEARSHARE:LOGIN</a></b></td>
   <td width="500" valign="top">
    P2P: BearShare Account Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABEARSHARE%3ASEARCH.html">P2P:BEARSHARE:SEARCH</a></b></td>
   <td width="500" valign="top">
    P2P: BearShare Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABEARSHARE%3AUA.html">P2P:BEARSHARE:UA</a></b></td>
   <td width="500" valign="top">
    P2P: BearShare User Agent Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ABITCOMET-CHUNK.html">P2P:BITTORRENT:BITCOMET-CHUNK</a></b></td>
   <td width="500" valign="top">
    P2P: BitComet HTTP Chunk Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ABT-ENCRYPTED.html">P2P:BITTORRENT:BT-ENCRYPTED</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Encrypted Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ABT-SEARCH.html">P2P:BITTORRENT:BT-SEARCH</a></b></td>
   <td width="500" valign="top">
    P2P: BT-SEARCH Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ABT-TRACKER-DOS.html">P2P:BITTORRENT:BT-TRACKER-DOS</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Tracker Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ABTCLIENT-UA.html">P2P:BITTORRENT:BTCLIENT-UA</a></b></td>
   <td width="500" valign="top">
    P2P: BTClient User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ACONTENT-TYPE.html">P2P:BITTORRENT:CONTENT-TYPE</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ADHT.html">P2P:BITTORRENT:DHT</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent File Share
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ADHT4.html">P2P:BITTORRENT:DHT4</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent DHT Version 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ADOT-TORRENT.html">P2P:BITTORRENT:DOT-TORRENT</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent .torrent File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3AHANDSHAKE.html">P2P:BITTORRENT:HANDSHAKE</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Handshake
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3AKICKASSTORRENTS.html">P2P:BITTORRENT:KICKASSTORRENTS</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Client KickAssTorrents.com Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ATRACKER-QUERY.html">P2P:BITTORRENT:TRACKER-QUERY</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Tracker Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ATRACKER-QUERY-2.html">P2P:BITTORRENT:TRACKER-QUERY-2</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Tracker Query (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ATRACKER-SCRAPE.html">P2P:BITTORRENT:TRACKER-SCRAPE</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Tracker Scrape
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3ATRACKER-UDP.html">P2P:BITTORRENT:TRACKER-UDP</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent Tracker Query (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ABITTORRENT%3AUTORRENT-UDP.html">P2P:BITTORRENT:UTORRENT-UDP</a></b></td>
   <td width="500" valign="top">
    P2P: BitTorrent uTorrent Transport Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ADC%3AACTIVE.html">P2P:DC:ACTIVE</a></b></td>
   <td width="500" valign="top">
    P2P: DC: Direct Connect Plus Plus Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ADC%3ADNS-QUERY.html">P2P:DC:DNS-QUERY</a></b></td>
   <td width="500" valign="top">
    P2P: Direct Connect DNS Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ADC%3AHUB-LOGIN.html">P2P:DC:HUB-LOGIN</a></b></td>
   <td width="500" valign="top">
    P2P: DC: Direct Connect Plus Plus Client Hub Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AC2S-PING-BEACON.html">P2P:EDONKEY:C2S-PING-BEACON</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Client to Server Search Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3ACLIENT-DOS-ATK.html">P2P:EDONKEY:CLIENT-DOS-ATK</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey2000 and Overnet DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3ACLIENT-HELLO.html">P2P:EDONKEY:CLIENT-HELLO</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Client Hello Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3ACLIENT-VER-CHECK.html">P2P:EDONKEY:CLIENT-VER-CHECK</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000: Client Version Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AFILE-DOWNLOAD-REQ.html">P2P:EDONKEY:FILE-DOWNLOAD-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Client Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AFILE-SEARCH-REQ.html">P2P:EDONKEY:FILE-SEARCH-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Client File Search Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AFILE-SHARES.html">P2P:EDONKEY:FILE-SHARES</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Client File Shares Announcement
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AOTHER-SVR-INFO-REQ.html">P2P:EDONKEY:OTHER-SVR-INFO-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Other Servers Info Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3APORT-53.html">P2P:EDONKEY:PORT-53</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey Client Traffic Over Port 53
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEDONKEY%3AS2C-PONG-RESPONSE.html">P2P:EDONKEY:S2C-PONG-RESPONSE</a></b></td>
   <td width="500" valign="top">
    P2P: eDonkey 2000 Server to Client Beacon Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEMULE%3ADECODE16-OVERFLOW.html">P2P:EMULE:DECODE16-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    P2P: eMule DecodeBase16 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEMULE%3AKADEMLIA-KAD.html">P2P:EMULE:KADEMLIA-KAD</a></b></td>
   <td width="500" valign="top">
    P2P: Kademlia Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEMULE%3APLUS-VER-CHECK.html">P2P:EMULE:PLUS-VER-CHECK</a></b></td>
   <td width="500" valign="top">
    P2P: eMule Plus Version Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AEMULE%3AVERYCD.html">P2P:EMULE:VERYCD</a></b></td>
   <td width="500" valign="top">
    P2P: VeryCD Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AFREENET%3ACONNECTION.html">P2P:FREENET:CONNECTION</a></b></td>
   <td width="500" valign="top">
    P2P: Freenet Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUCLEUSLAN%3ABROADCAST.html">P2P:GNUCLEUSLAN:BROADCAST</a></b></td>
   <td width="500" valign="top">
    P2P: GnucleusLAN Broadcast
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUCLEUSLAN%3ACONNECT.html">P2P:GNUCLEUSLAN:CONNECT</a></b></td>
   <td width="500" valign="top">
    P2P: GnucleusLAN Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3ACONNECT.html">P2P:GNUTELLA:CONNECT</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Connection Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3ACONNECTION-OK-V06.html">P2P:GNUTELLA:CONNECTION-OK-V06</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Connection OK Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3ADOWNLOAD.html">P2P:GNUTELLA:DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: Client Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3AFILE-XCH-TCP.html">P2P:GNUTELLA:FILE-XCH-TCP</a></b></td>
   <td width="500" valign="top">
    P2P: Gnutella File Exchange TCP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3ALIMEWIRE-DIR-TRANS.html">P2P:GNUTELLA:LIMEWIRE-DIR-TRANS</a></b></td>
   <td width="500" valign="top">
    P2P: LimeWire Directory Transversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3AUDP-TRAFFIC.html">P2P:GNUTELLA:UDP-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    GNUTELLA: UDP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3AURN-DOWNLOAD-REQ.html">P2P:GNUTELLA:URN-DOWNLOAD-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: Gnutella Uniform Resource Name Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGNUTELLA%3AX-GNUTELLA.html">P2P:GNUTELLA:X-GNUTELLA</a></b></td>
   <td width="500" valign="top">
    P2P: Gnutella Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AGROKSTER%3AGROKSTER.html">P2P:GROKSTER:GROKSTER</a></b></td>
   <td width="500" valign="top">
    P2P: Grokster
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3AFILE-HASH.html">P2P:KAZAA:FILE-HASH</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa File Hash Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3AFILE-REQ.html">P2P:KAZAA:FILE-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa File Reqest
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3AFILE-SEND.html">P2P:KAZAA:FILE-SEND</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa File Send
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3APEER-REQ.html">P2P:KAZAA:PEER-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa Peer Discovery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3AUDP-PROBE.html">P2P:KAZAA:UDP-PROBE</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa UDP Connect Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AKAZAA%3AWEB-CONN.html">P2P:KAZAA:WEB-CONN</a></b></td>
   <td width="500" valign="top">
    P2P: Kazaa Web Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ALIMEWIRE%3AFREEWIRE.html">P2P:LIMEWIRE:FREEWIRE</a></b></td>
   <td width="500" valign="top">
    P2P: Limewire FreeWire
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3A100BAO.html">P2P:MISC:100BAO</a></b></td>
   <td width="500" valign="top">
    P2P: 100BAO
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AAPPLEJUICE.html">P2P:MISC:APPLEJUICE</a></b></td>
   <td width="500" valign="top">
    P2P: AppleJuice
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AFREECAST.html">P2P:MISC:FREECAST</a></b></td>
   <td width="500" valign="top">
    P2P: Freecast
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AGLUZ.html">P2P:MISC:GLUZ</a></b></td>
   <td width="500" valign="top">
    P2P: Gluz
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AHOTLINE.html">P2P:MISC:HOTLINE</a></b></td>
   <td width="500" valign="top">
    P2P: Hotline
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AIMESH.html">P2P:MISC:IMESH</a></b></td>
   <td width="500" valign="top">
    P2P: iMesh Session
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AKUGOO.html">P2P:MISC:KUGOO</a></b></td>
   <td width="500" valign="top">
    P2P: Kugoo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AKUGOO-LOGIN.html">P2P:MISC:KUGOO-LOGIN</a></b></td>
   <td width="500" valign="top">
    P2P: Kugoo Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AMANOLITO.html">P2P:MISC:MANOLITO</a></b></td>
   <td width="500" valign="top">
    P2P: Manolito
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AMANOLITO-DOWNLOAD.html">P2P:MISC:MANOLITO-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    P2P: Manolito Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AMEDIASEEK-PL-CLIENT.html">P2P:MISC:MEDIASEEK-PL-CLIENT</a></b></td>
   <td width="500" valign="top">
    P2P: MediaSeek-pl Client
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AMUTE.html">P2P:MISC:MUTE</a></b></td>
   <td width="500" valign="top">
    P2P: Mute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AOPENFT.html">P2P:MISC:OPENFT</a></b></td>
   <td width="500" valign="top">
    P2P: OpenFT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AP2P-NETWORKING.html">P2P:MISC:P2P-NETWORKING</a></b></td>
   <td width="500" valign="top">
    P2P: P2P Networking
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APEERENABLE.html">P2P:MISC:PEERENABLE</a></b></td>
   <td width="500" valign="top">
    P2P: PeerEnable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APHEX.html">P2P:MISC:PHEX</a></b></td>
   <td width="500" valign="top">
    P2P: Phex
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APOCO-CONNECT.html">P2P:MISC:POCO-CONNECT</a></b></td>
   <td width="500" valign="top">
    P2P: Poco Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APOCO-UDP.html">P2P:MISC:POCO-UDP</a></b></td>
   <td width="500" valign="top">
    P2P: Poco
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APPLIVE-HTTP-CLIENT-REQ.html">P2P:MISC:PPLIVE-HTTP-CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: PPLive HTTP Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3APPLIVE-TRACKER-OFF-REQ.html">P2P:MISC:PPLIVE-TRACKER-OFF-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: PPLive Tracker Offset Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3ASOULSEEK.html">P2P:MISC:SOULSEEK</a></b></td>
   <td width="500" valign="top">
    P2P: SoulSeek
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMISC%3AXOLOX.html">P2P:MISC:XOLOX</a></b></td>
   <td width="500" valign="top">
    P2P: XoloX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMLDONKEY%3ACLIENT-ACTIVE.html">P2P:MLDONKEY:CLIENT-ACTIVE</a></b></td>
   <td width="500" valign="top">
    P2P: MLDonkey Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AMORPHEUS%3AMORPHEUS.html">P2P:MORPHEUS:MORPHEUS</a></b></td>
   <td width="500" valign="top">
    P2P: Morpheus Web Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-4444.html">P2P:NAPSTER:DATA-4444</a></b></td>
   <td width="500" valign="top">
    P2P: MP3 Napster .mp3 (TCP/4444)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-5555.html">P2P:NAPSTER:DATA-5555</a></b></td>
   <td width="500" valign="top">
    P2P: MP3 Napster .mp3 (TCP/5555)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-6666.html">P2P:NAPSTER:DATA-6666</a></b></td>
   <td width="500" valign="top">
    P2P: MP3 Napster .mp3 (TCP/6666)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-6699.html">P2P:NAPSTER:DATA-6699</a></b></td>
   <td width="500" valign="top">
    P2P: Napster .mp3 (TCP/6699)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-7777.html">P2P:NAPSTER:DATA-7777</a></b></td>
   <td width="500" valign="top">
    P2P: Napster .mp3 (TCP/7777)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADATA-8888.html">P2P:NAPSTER:DATA-8888</a></b></td>
   <td width="500" valign="top">
    P2P: Napster .mp3 (TCP/8888)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADOWNLOAD-7777.html">P2P:NAPSTER:DOWNLOAD-7777</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Download Attempt (TCP/7777)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ADOWNLOAD-8888.html">P2P:NAPSTER:DOWNLOAD-8888</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Download Attempt (TCP/8888)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ALOGIN-7777.html">P2P:NAPSTER:LOGIN-7777</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Login (TCP/7777)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ALOGIN-8888.html">P2P:NAPSTER:LOGIN-8888</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Login (TCP/8888)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3ASERVER-LOGIN.html">P2P:NAPSTER:SERVER-LOGIN</a></b></td>
   <td width="500" valign="top">
    P2P: MP3 Napster Master Server Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3AUPLOAD-REQ-7777.html">P2P:NAPSTER:UPLOAD-REQ-7777</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Upload Request (TCP/7777)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3AUPLOAD-REQ-8888.html">P2P:NAPSTER:UPLOAD-REQ-8888</a></b></td>
   <td width="500" valign="top">
    P2P: Napster Upload Request (TCP/8888)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3AUSER-LOGIN-7777.html">P2P:NAPSTER:USER-LOGIN-7777</a></b></td>
   <td width="500" valign="top">
    P2P: Napster New User Login (TCP/7777)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ANAPSTER%3AUSER-LOGIN-8888.html">P2P:NAPSTER:USER-LOGIN-8888</a></b></td>
   <td width="500" valign="top">
    P2P: Napster New User Login (TCP/8888)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3ACONNECT-REQ.html">P2P:OVERNET:CONNECT-REQ</a></b></td>
   <td width="500" valign="top">
    P2P: Overnet Client Connection Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3ACONNECTED.html">P2P:OVERNET:CONNECTED</a></b></td>
   <td width="500" valign="top">
    P2P: Overnet Connection Request Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3AFILE-SHARES.html">P2P:OVERNET:FILE-SHARES</a></b></td>
   <td width="500" valign="top">
    P2P: Overnet Client File Shares Announcement
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3AKADEMILIA-OVERNET.html">P2P:OVERNET:KADEMILIA-OVERNET</a></b></td>
   <td width="500" valign="top">
    P2P: Kademlia Overnet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3AKEEP-ALIVE.html">P2P:OVERNET:KEEP-ALIVE</a></b></td>
   <td width="500" valign="top">
    P2P: Overnet Connection Keep-Alive
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AOVERNET%3APEER-DISCOVERY.html">P2P:OVERNET:PEER-DISCOVERY</a></b></td>
   <td width="500" valign="top">
    P2P: Overnet Peer Discovery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3ASHAREAZA%3ACLIENT-ACTIVE.html">P2P:SHAREAZA:CLIENT-ACTIVE</a></b></td>
   <td width="500" valign="top">
    P2P: Shareaza Client Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AUNIFS.html">P2P:UNIFS</a></b></td>
   <td width="500" valign="top">
    P2P: UnisonPlay UniFS Video Streaming Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AVUZE%3ABIN-DHT.html">P2P:VUZE:BIN-DHT</a></b></td>
   <td width="500" valign="top">
    P2P: Vuze Binary Distributed Hash Table (DHT) Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AVUZE%3AHTTP-CLIENT-MODE.html">P2P:VUZE:HTTP-CLIENT-MODE</a></b></td>
   <td width="500" valign="top">
    P2P: Vuze HTTP Client Mode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AVUZE%3AHTTP-RPC-ACTIVITY.html">P2P:VUZE:HTTP-RPC-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    P2P: Vuze HTTP Remote Procedure Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AVUZE%3ATIVO-DISCO-BEACON.html">P2P:VUZE:TIVO-DISCO-BEACON</a></b></td>
   <td width="500" valign="top">
    P2P: Vuze Tivo Discovery Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AVUZE%3AUSER-AGENT.html">P2P:VUZE:USER-AGENT</a></b></td>
   <td width="500" valign="top">
    P2P: Vuze/Azureus HTTP User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ACLIENT-MATCHMAKE-DNS.html">P2P:WINMX:CLIENT-MATCHMAKE-DNS</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Client Matchmaker Server DNS Lookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ACLIENT-NET-PRB-DNS.html">P2P:WINMX:CLIENT-NET-PRB-DNS</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Client Installation Net-Probe DNS look-up
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ACLIENT-NET-PROBE.html">P2P:WINMX:CLIENT-NET-PROBE</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Client Installation Net-Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ACLIENT-VER-CHK.html">P2P:WINMX:CLIENT-VER-CHK</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Client Version Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ACLIENT-VER-CHK-DNS.html">P2P:WINMX:CLIENT-VER-CHK-DNS</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Version Check DNS Lookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ADOWNLOAD.html">P2P:WINMX:DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ASERVER-CONNECT-OK.html">P2P:WINMX:SERVER-CONNECT-OK</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Server Response Connect OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINMX%3ASERVER-SUPERNODE-LIST.html">P2P:WINMX:SERVER-SUPERNODE-LIST</a></b></td>
   <td width="500" valign="top">
    P2P: WinMX Server Supernode Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AWINNY%3APEER-CONNECT.html">P2P:WINNY:PEER-CONNECT</a></b></td>
   <td width="500" valign="top">
    P2P: WinNY Peer Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3ADOWNLOAD.html">P2P:XUNLEI:DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3AMESSSAGE.html">P2P:XUNLEI:MESSSAGE</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3AOVER-HTTP.html">P2P:XUNLEI:OVER-HTTP</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3AQUERY.html">P2P:XUNLEI:QUERY</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3ASTARTUP.html">P2P:XUNLEI:STARTUP</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei Client Start-up
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="P2P%3AXUNLEI%3AUDP.html">P2P:XUNLEI:UDP</a></b></td>
   <td width="500" valign="top">
    P2P: Xunlei UDP Traffic
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="POP3"></a>POP3</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3ACOMMAND-FAILED.html">POP3:AUDIT:COMMAND-FAILED</a></b></td>
   <td width="500" valign="top">
    POP3: Failure Command Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3ADUPLICATE-HEADER.html">POP3:AUDIT:DUPLICATE-HEADER</a></b></td>
   <td width="500" valign="top">
    POP3: Duplicate Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AEMPTY-BOUNDARY.html">POP3:AUDIT:EMPTY-BOUNDARY</a></b></td>
   <td width="500" valign="top">
    POP3: Empty Boundary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AILLEGAL-FILENAME.html">POP3:AUDIT:ILLEGAL-FILENAME</a></b></td>
   <td width="500" valign="top">
    POP3: Illegal Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AINVALID-FILENAME.html">POP3:AUDIT:INVALID-FILENAME</a></b></td>
   <td width="500" valign="top">
    POP3: Invalid Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3ALOGIN-FAILED.html">POP3:AUDIT:LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    POP3: Login Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AREQ-INVALID-STATE.html">POP3:AUDIT:REQ-INVALID-STATE</a></b></td>
   <td width="500" valign="top">
    POP3: Request Error Invalid State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AREQ-NESTED-REQUEST.html">POP3:AUDIT:REQ-NESTED-REQUEST</a></b></td>
   <td width="500" valign="top">
    POP3: Request Error Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AAUDIT%3AREQ-UNKNOWN-CMD.html">POP3:AUDIT:REQ-UNKNOWN-CMD</a></b></td>
   <td width="500" valign="top">
    POP3: Request Error Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3ADOS%3AINWEB-HELO-DOS.html">POP3:DOS:INWEB-HELO-DOS</a></b></td>
   <td width="500" valign="top">
    POP3: INweb Mail Server DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3ADOS%3AMDAEMON-POP-DOS.html">POP3:DOS:MDAEMON-POP-DOS</a></b></td>
   <td width="500" valign="top">
    POP3: MDaemon POP3 Server DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3ADOS%3AWINGATE.html">POP3:DOS:WINGATE</a></b></td>
   <td width="500" valign="top">
    POP3 DOS:Wingate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEMAIL-SCRIPT.html">POP3:EMAIL-SCRIPT</a></b></td>
   <td width="500" valign="top">
    POP3: Email Containing HTML SCRIPT Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3ABOUNDARY_MISSING.html">POP3:ERROR:BOUNDARY_MISSING</a></b></td>
   <td width="500" valign="top">
    POP3: Multipart Missing Boundary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3ADUPLICATE_BOUNDARY.html">POP3:ERROR:DUPLICATE_BOUNDARY</a></b></td>
   <td width="500" valign="top">
    POP3: Duplicate Boundary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3AILLEGAL_ENCODE.html">POP3:ERROR:ILLEGAL_ENCODE</a></b></td>
   <td width="500" valign="top">
    POP3: Binary Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3AILLEGAL_MIME_ENCODE.html">POP3:ERROR:ILLEGAL_MIME_ENCODE</a></b></td>
   <td width="500" valign="top">
    POP3: Illegal Mime-Type Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3AINVALID_BASE64_CHAR.html">POP3:ERROR:INVALID_BASE64_CHAR</a></b></td>
   <td width="500" valign="top">
    POP3: Invalid Base64 Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3APARTIAL_MESSAGE.html">POP3:ERROR:PARTIAL_MESSAGE</a></b></td>
   <td width="500" valign="top">
    POP3: Partial message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3ATOO_MANY_BOUNDARIES.html">POP3:ERROR:TOO_MANY_BOUNDARIES</a></b></td>
   <td width="500" valign="top">
    POP3: Too Many Boundaries
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AERROR%3AUNFINISHED_MULTIPART.html">POP3:ERROR:UNFINISHED_MULTIPART</a></b></td>
   <td width="500" valign="top">
    POP3: Unfinished Multipart Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEUDORA-MAIL-CLIENT.html">POP3:EUDORA-MAIL-CLIENT</a></b></td>
   <td width="500" valign="top">
    POP3: Eudora Mail Client Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT.html">POP3:EXT:DOT</a></b></td>
   <td width="500" valign="top">
    POP3: Attachment ending with dot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-386.html">POP3:EXT:DOT-386</a></b></td>
   <td width="500" valign="top">
    POP3: .386
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-ADE.html">POP3:EXT:DOT-ADE</a></b></td>
   <td width="500" valign="top">
    POP3: .ADE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-ADP.html">POP3:EXT:DOT-ADP</a></b></td>
   <td width="500" valign="top">
    POP3: .ADP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-BAS.html">POP3:EXT:DOT-BAS</a></b></td>
   <td width="500" valign="top">
    POP3:.BAS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-BAT.html">POP3:EXT:DOT-BAT</a></b></td>
   <td width="500" valign="top">
    POP3: .BAT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-CHM.html">POP3:EXT:DOT-CHM</a></b></td>
   <td width="500" valign="top">
    POP3: .CHM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-CMD.html">POP3:EXT:DOT-CMD</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .CMD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-COM.html">POP3:EXT:DOT-COM</a></b></td>
   <td width="500" valign="top">
    POP3: .COM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-CPL.html">POP3:EXT:DOT-CPL</a></b></td>
   <td width="500" valign="top">
    POP3: .CPL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-CRT.html">POP3:EXT:DOT-CRT</a></b></td>
   <td width="500" valign="top">
    POP3: .CRT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-EXE.html">POP3:EXT:DOT-EXE</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .EXE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-GRP.html">POP3:EXT:DOT-GRP</a></b></td>
   <td width="500" valign="top">
    POP3: .GRP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-HLP.html">POP3:EXT:DOT-HLP</a></b></td>
   <td width="500" valign="top">
    POP3: .HLP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-HT.html">POP3:EXT:DOT-HT</a></b></td>
   <td width="500" valign="top">
    POP3: Hyperterm (.HT) File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-HTA.html">POP3:EXT:DOT-HTA</a></b></td>
   <td width="500" valign="top">
    POP3: .HTA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-INF.html">POP3:EXT:DOT-INF</a></b></td>
   <td width="500" valign="top">
    POP3: .INF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-INS.html">POP3:EXT:DOT-INS</a></b></td>
   <td width="500" valign="top">
    POP3: .INS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-ISP.html">POP3:EXT:DOT-ISP</a></b></td>
   <td width="500" valign="top">
    POP3: .ISP File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-JS.html">POP3:EXT:DOT-JS</a></b></td>
   <td width="500" valign="top">
    POP3: .JS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-JSE.html">POP3:EXT:DOT-JSE</a></b></td>
   <td width="500" valign="top">
    POP3: .JSE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-LNK.html">POP3:EXT:DOT-LNK</a></b></td>
   <td width="500" valign="top">
    POP3: .LNK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-MDB.html">POP3:EXT:DOT-MDB</a></b></td>
   <td width="500" valign="top">
    POP3: .MDB
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-MDE.html">POP3:EXT:DOT-MDE</a></b></td>
   <td width="500" valign="top">
    POP3: .MDE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-MSC.html">POP3:EXT:DOT-MSC</a></b></td>
   <td width="500" valign="top">
    POP3: .MSC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-MSI.html">POP3:EXT:DOT-MSI</a></b></td>
   <td width="500" valign="top">
    POP3: .MSI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-MSP.html">POP3:EXT:DOT-MSP</a></b></td>
   <td width="500" valign="top">
    POP3: .MSP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-OCX.html">POP3:EXT:DOT-OCX</a></b></td>
   <td width="500" valign="top">
    POP3: .OCX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-PCD.html">POP3:EXT:DOT-PCD</a></b></td>
   <td width="500" valign="top">
    POP3: .PCD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-PIF.html">POP3:EXT:DOT-PIF</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .PIF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-REG.html">POP3:EXT:DOT-REG</a></b></td>
   <td width="500" valign="top">
    POP3: .REG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-SCR.html">POP3:EXT:DOT-SCR</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .SCR
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-SCT.html">POP3:EXT:DOT-SCT</a></b></td>
   <td width="500" valign="top">
    POP3: .SCT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-SHS.html">POP3:EXT:DOT-SHS</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .SHS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-URL.html">POP3:EXT:DOT-URL</a></b></td>
   <td width="500" valign="top">
    POP3: .URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-VB.html">POP3:EXT:DOT-VB</a></b></td>
   <td width="500" valign="top">
    POP3: .VB
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-VBE.html">POP3:EXT:DOT-VBE</a></b></td>
   <td width="500" valign="top">
    POP3: .VBE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-VBS.html">POP3:EXT:DOT-VBS</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 .VBS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-WMF.html">POP3:EXT:DOT-WMF</a></b></td>
   <td width="500" valign="top">
    POP3: .WMF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-WSC.html">POP3:EXT:DOT-WSC</a></b></td>
   <td width="500" valign="top">
    POP3: .WSC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-WSF.html">POP3:EXT:DOT-WSF</a></b></td>
   <td width="500" valign="top">
    POP3: .WSF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-WSH.html">POP3:EXT:DOT-WSH</a></b></td>
   <td width="500" valign="top">
    POP3:.WSH
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-WSZ-WAL.html">POP3:EXT:DOT-WSZ-WAL</a></b></td>
   <td width="500" valign="top">
    POP3: Winamp Skin File Attachment (WSZ/WAL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOT-ZIP.html">POP3:EXT:DOT-ZIP</a></b></td>
   <td width="500" valign="top">
    POP3:.ZIP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXT%3ADOUBLE-EXTENSION.html">POP3:EXT:DOUBLE-EXTENSION</a></b></td>
   <td width="500" valign="top">
    POP3: Double File Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AEXTERNAL_MESSAGE.html">POP3:EXTERNAL_MESSAGE</a></b></td>
   <td width="500" valign="top">
    POP3 External Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AFAILURE%3ABRUTE-FORCE.html">POP3:FAILURE:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    POP3 Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AIBM-NOTES-PNG-OVF.html">POP3:IBM-NOTES-PNG-OVF</a></b></td>
   <td width="500" valign="top">
    POP3: IBM Notes PNG Image Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AMS-OUTLOOK-2003-OBJ-SEC-BS.html">POP3:MS-OUTLOOK-2003-OBJ-SEC-BS</a></b></td>
   <td width="500" valign="top">
    POP3: Microsoft Outlook 2003 Object Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AMS-OUTLOOK-EXP-MHTML-CE.html">POP3:MS-OUTLOOK-EXP-MHTML-CE</a></b></td>
   <td width="500" valign="top">
    POP3: Microsoft Outlook Express MHTML URL Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK-OBJECT-TAG.html">POP3:OUTLOOK-OBJECT-TAG</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook/Word Object Tag Security Setting Compromise
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3ACRAFTED-RESP.html">POP3:OUTLOOK:CRAFTED-RESP</a></b></td>
   <td width="500" valign="top">
    POP3: Microsoft Outlook Express Crafted Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3AHRALIGN-OF.html">POP3:OUTLOOK:HRALIGN-OF</a></b></td>
   <td width="500" valign="top">
    POP3: Outlook Express HR Tag Align Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3ALOCAL-LINK.html">POP3:OUTLOOK:LOCAL-LINK</a></b></td>
   <td width="500" valign="top">
    POP3: Local Link in Hyperlink
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3AMHTML-CDI.html">POP3:OUTLOOK:MHTML-CDI</a></b></td>
   <td width="500" valign="top">
    POP3: MHTML Hyperlink Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3AMULTIPLE-FROM.html">POP3:OUTLOOK:MULTIPLE-FROM</a></b></td>
   <td width="500" valign="top">
    POP3: Outlook Address Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3AOL-IFRAME-EXEC.html">POP3:OUTLOOK:OL-IFRAME-EXEC</a></b></td>
   <td width="500" valign="top">
    POP3: Outlook Frame Overflow Forced File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOUTLOOK%3ATROUBLE-QUERY-OF.html">POP3:OUTLOOK:TROUBLE-QUERY-OF</a></b></td>
   <td width="500" valign="top">
    POP3: Outlook Preview Pane Local Troubleshooter Query Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AAPOP.html">POP3:OVERFLOW:APOP</a></b></td>
   <td width="500" valign="top">
    POP3: Buffer Overflow APOP Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AAXIGEN-FS.html">POP3:OVERFLOW:AXIGEN-FS</a></b></td>
   <td width="500" valign="top">
    POP3: Axigen Remote Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ABOUNDARY_OVERFLOW.html">POP3:OVERFLOW:BOUNDARY_OVERFLOW</a></b></td>
   <td width="500" valign="top">
    POP3: Multipart Too Many Boundaries
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ABSD-OFLOW-1.html">POP3:OVERFLOW:BSD-OFLOW-1</a></b></td>
   <td width="500" valign="top">
    POP3 Buffer Overflow - BSD x86 (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ABSD-OFLOW-2.html">POP3:OVERFLOW:BSD-OFLOW-2</a></b></td>
   <td width="500" valign="top">
    POP3 Buffer Overflow - BSD x86 (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ACOMMAND.html">POP3:OVERFLOW:COMMAND</a></b></td>
   <td width="500" valign="top">
    POP3: Buffer Overflow Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ACONTENT_NAME.html">POP3:OVERFLOW:CONTENT_NAME</a></b></td>
   <td width="500" valign="top">
    POP3: Content-type Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ACURL-LIBCURL-BO.html">POP3:OVERFLOW:CURL-LIBCURL-BO</a></b></td>
   <td width="500" valign="top">
    POP3: cURL and libcurl MD5 Digest Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AERR-RPLY-OF.html">POP3:OVERFLOW:ERR-RPLY-OF</a></b></td>
   <td width="500" valign="top">
    POP: Reply Error Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AEUDORA-URL-BOF.html">POP3:OVERFLOW:EUDORA-URL-BOF</a></b></td>
   <td width="500" valign="top">
    POP3: Qualcomm Eudora URL Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AFILENAME2LONG.html">POP3:OVERFLOW:FILENAME2LONG</a></b></td>
   <td width="500" valign="top">
    POP3: Attachment Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AHTTP-LINK-OF.html">POP3:OVERFLOW:HTTP-LINK-OF</a></b></td>
   <td width="500" valign="top">
    POP3: HTTP Link Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ALINE.html">POP3:OVERFLOW:LINE</a></b></td>
   <td width="500" valign="top">
    POP3: Buffer Overflow Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ALINUX-OFLOW.html">POP3:OVERFLOW:LINUX-OFLOW</a></b></td>
   <td width="500" valign="top">
    POP3 Buffer Overflow - Linux x86
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3APASS.html">POP3:OVERFLOW:PASS</a></b></td>
   <td width="500" valign="top">
    POP3: Buffer Overflow Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3APCCILLIN-POP-OF.html">POP3:OVERFLOW:PCCILLIN-POP-OF</a></b></td>
   <td width="500" valign="top">
    POP3: PC-Cillin pop3trap.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AQPOP-OF2.html">POP3:OVERFLOW:QPOP-OF2</a></b></td>
   <td width="500" valign="top">
    POP3: Qpopper LIST Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AQPOP-OF3.html">POP3:OVERFLOW:QPOP-OF3</a></b></td>
   <td width="500" valign="top">
    POP3: Qpopper XTND Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AQPOP-OF4.html">POP3:OVERFLOW:QPOP-OF4</a></b></td>
   <td width="500" valign="top">
    POP3: Qpopper AUTH Overflow (qpop3b.c)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ASCO-POP3-OVERFLOW.html">POP3:OVERFLOW:SCO-POP3-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    POP3 Buffer Overflow - SCO x86
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ATXTLINE_2LONG.html">POP3:OVERFLOW:TXTLINE_2LONG</a></b></td>
   <td width="500" valign="top">
    POP3: Data Line Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AUSER.html">POP3:OVERFLOW:USER</a></b></td>
   <td width="500" valign="top">
    POP3: Buffer Overflow Username
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3APOP-SCRIPT-TAG.html">POP3:POP-SCRIPT-TAG</a></b></td>
   <td width="500" valign="top">
    POP3: Script Tag Alert In Email Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AREQERR%3AREQ-BINARY-DATA.html">POP3:REQERR:REQ-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    POP3 Request Error: Binary Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AREQERR%3AREQ-MESSAGE-NUMBER.html">POP3:REQERR:REQ-MESSAGE-NUMBER</a></b></td>
   <td width="500" valign="top">
    POP3: Request Error High Message Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AREQERR%3AREQ-SYNTAX-ERROR.html">POP3:REQERR:REQ-SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    POP3: Request Error Syntax Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3ASUSPICIOUS-COMM.html">POP3:SUSPICIOUS-COMM</a></b></td>
   <td width="500" valign="top">
    POP3: Suspicious POP3 Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3ASUSPICIOUS-HEADER.html">POP3:SUSPICIOUS-HEADER</a></b></td>
   <td width="500" valign="top">
    POP3: Suspicious Mail Sender with Randomized Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="POP3%3AUSER%3AROOT.html">POP3:USER:ROOT</a></b></td>
   <td width="500" valign="top">
    POP3 User:root
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="PORTMAPPER"></a>PORTMAPPER</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AAUDIT%3AROOT-ACCESS.html">PORTMAPPER:AUDIT:ROOT-ACCESS</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Unix Root Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3ALARGE-CRED.html">PORTMAPPER:ERR:LARGE-CRED</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Credentials Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3ALONG-NETNAME.html">PORTMAPPER:ERR:LONG-NETNAME</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Destination Netname Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3ASHORT-READ.html">PORTMAPPER:ERR:SHORT-READ</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Short Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3AWRONG-DIR.html">PORTMAPPER:ERR:WRONG-DIR</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Wrong Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AGETADDR-RESP-MAL-UA.html">PORTMAPPER:GETADDR-RESP-MAL-UA</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: GETADDR Response Malformed Universal Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3ACALLIT-PROC.html">PORTMAPPER:INFO:CALLIT-PROC</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: Call It Proc
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3ADUMP_PROC.html">PORTMAPPER:INFO:DUMP_PROC</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: Dump Proc
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3ANULL-PROC.html">PORTMAPPER:INFO:NULL-PROC</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: Null Proc
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3APORTMAP-DUMP.html">PORTMAPPER:INFO:PORTMAP-DUMP</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: DUMP Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3ASET-PROC.html">PORTMAPPER:INFO:SET-PROC</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: Set Proc
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3AUNSET-PROC.html">PORTMAPPER:INFO:UNSET-PROC</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: Unset Proc
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINVALID%3ABAD-CRED-LEN.html">PORTMAPPER:INVALID:BAD-CRED-LEN</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Incorrect Credential Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PORTMAPPER%3AINVALID%3ABAD-VERF-CRD.html">PORTMAPPER:INVALID:BAD-VERF-CRD</a></b></td>
   <td width="500" valign="top">
    PORTMAPPER: RPC Incorrect Verifier Credential
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="PROTOCOLS"></a>PROTOCOLS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3AFTP.html">PROTOCOLS:PORT:FTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: FTP Traffic on Non-standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3AHTTP.html">PROTOCOLS:PORT:HTTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: HTTP on Non-Standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3APOP3.html">PROTOCOLS:PORT:POP3</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: POP3 Traffic on Non-standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3ASIP.html">PROTOCOLS:PORT:SIP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: SIP Traffic on Non-standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3ASSH.html">PROTOCOLS:PORT:SSH</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: SSH Traffic on Non-standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3APORT%3ATELNET.html">PROTOCOLS:PORT:TELNET</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Telnet Traffic on Non-standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-DHCP.html">PROTOCOLS:TRAFFIC:NOT-DHCP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-DHCP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-DNS-TCP.html">PROTOCOLS:TRAFFIC:NOT-DNS-TCP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-DNS Traffic (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-DNS-UDP.html">PROTOCOLS:TRAFFIC:NOT-DNS-UDP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-DNS Traffic (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-FTP.html">PROTOCOLS:TRAFFIC:NOT-FTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-FTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-HTTP.html">PROTOCOLS:TRAFFIC:NOT-HTTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-HTTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-IKE.html">PROTOCOLS:TRAFFIC:NOT-IKE</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-IKE Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-IMAP.html">PROTOCOLS:TRAFFIC:NOT-IMAP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-IMAP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-NTP.html">PROTOCOLS:TRAFFIC:NOT-NTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-NTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-POP3.html">PROTOCOLS:TRAFFIC:NOT-POP3</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-POP3 Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-SMTP.html">PROTOCOLS:TRAFFIC:NOT-SMTP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-SMTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-SNMP.html">PROTOCOLS:TRAFFIC:NOT-SNMP</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-SNMP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-SSH.html">PROTOCOLS:TRAFFIC:NOT-SSH</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-SSH Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-SYSLOG.html">PROTOCOLS:TRAFFIC:NOT-SYSLOG</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-SYSLOG Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="PROTOCOLS%3ATRAFFIC%3ANOT-TELNET.html">PROTOCOLS:TRAFFIC:NOT-TELNET</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: Non-Telnet Traffic
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RADIUS"></a>RADIUS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCCHAL_INV_NUM_ATTRS.html">RADIUS:ACCCHAL_INV_NUM_ATTRS</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Challenge Invalid Attribute Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCCHA_DISALLOWD_ATTR.html">RADIUS:ACCCHA_DISALLOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Chellenge Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREJ_DISALLOWD_ATTR.html">RADIUS:ACCREJ_DISALLOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Reject Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREJ_INV_NUM_ATTRS.html">RADIUS:ACCREJ_INV_NUM_ATTRS</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Reject Invalid Attribute Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREP_DISALLOWD_ATTR.html">RADIUS:ACCREP_DISALLOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Accounting-Response Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREQ_ATTR_MISSING.html">RADIUS:ACCREQ_ATTR_MISSING</a></b></td>
   <td width="500" valign="top">
    RADIUS: Accounting-Request Missing Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREQ_DISALLOWD_ATTR.html">RADIUS:ACCREQ_DISALLOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Accounting-Request Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACCREQ_INV_NUM_ATTRS.html">RADIUS:ACCREQ_INV_NUM_ATTRS</a></b></td>
   <td width="500" valign="top">
    RADIUS: Accounting-Request Invalid Attribute Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACC_ACCEPT_INV_NATTRS.html">RADIUS:ACC_ACCEPT_INV_NATTRS</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Accept Invalid Attribute Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACC_ACC_DISALOWD_ATTR.html">RADIUS:ACC_ACC_DISALOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Accept Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACSREQ_DISALLOWD_ATTR.html">RADIUS:ACSREQ_DISALLOWD_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Request Zero Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AACSREQ_INV_NUM_ATTRS.html">RADIUS:ACSREQ_INV_NUM_ATTRS</a></b></td>
   <td width="500" valign="top">
    RADIUS: Access-Request Invalid Attribute Count
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3ACLIENT-CERT-VERIF-BO.html">RADIUS:CLIENT-CERT-VERIF-BO</a></b></td>
   <td width="500" valign="top">
    RADIUS: FreeRADIUS Client Certificate Verification Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AFREERADIUS-DOS.html">RADIUS:FREERADIUS-DOS</a></b></td>
   <td width="500" valign="top">
    RADIUS: FreeRADIUS RADIUS Server Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AFS-INJ.html">RADIUS:FS-INJ</a></b></td>
   <td width="500" valign="top">
    RADIUS: Format String Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AINCONSISTANT_LENGTH.html">RADIUS:INCONSISTANT_LENGTH</a></b></td>
   <td width="500" valign="top">
    RADIUS: Inconsistent Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AINVALID_ATTR_LENGTH.html">RADIUS:INVALID_ATTR_LENGTH</a></b></td>
   <td width="500" valign="top">
    RADIUS: Invalid Attribute Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AINVALID_ATTR_TYPE.html">RADIUS:INVALID_ATTR_TYPE</a></b></td>
   <td width="500" valign="top">
    RADIUS: Invalid Attribute Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AINVALID_MSG_CODE.html">RADIUS:INVALID_MSG_CODE</a></b></td>
   <td width="500" valign="top">
    RADIUS: Invalid Message Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AINVALID_MSG_LENGTH.html">RADIUS:INVALID_MSG_LENGTH</a></b></td>
   <td width="500" valign="top">
    RADIUS: Invalid Message Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AMALFORMED_VENDOR_ATTR.html">RADIUS:MALFORMED_VENDOR_ATTR</a></b></td>
   <td width="500" valign="top">
    RADIUS: Malformed Vendor-Specific Attribute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AMSG_TOO_SHORT.html">RADIUS:MSG_TOO_SHORT</a></b></td>
   <td width="500" valign="top">
    RADIUS: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3ARADIUS-BRUTE-FORCE.html">RADIUS:RADIUS-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    RADIUS: Brute Force
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3ATYPE-DOS.html">RADIUS:TYPE-DOS</a></b></td>
   <td width="500" valign="top">
    RADIUS: FreeRADIUS Invalid Type Code DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AUSR-AUTHENTICATION.html">RADIUS:USR-AUTHENTICATION</a></b></td>
   <td width="500" valign="top">
    RADIUS: Username Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RADIUS%3AUSR-OF.html">RADIUS:USR-OF</a></b></td>
   <td width="500" valign="top">
    RADIUS: Username Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="REXEC"></a>REXEC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="REXEC%3AAUDIT%3AILL-ERR-PORT.html">REXEC:AUDIT:ILL-ERR-PORT</a></b></td>
   <td width="500" valign="top">
    REXEC: Illegal STDERR Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="REXEC%3AAUDIT%3APARAM-NOT-OK.html">REXEC:AUDIT:PARAM-NOT-OK</a></b></td>
   <td width="500" valign="top">
    REXEC: Supplied Parameters are Not OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="REXEC%3AOVERFLOW%3ACOMMAND.html">REXEC:OVERFLOW:COMMAND</a></b></td>
   <td width="500" valign="top">
    REXEC: Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="REXEC%3AOVERFLOW%3APASSWORD.html">REXEC:OVERFLOW:PASSWORD</a></b></td>
   <td width="500" valign="top">
    REXEC: Password Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="REXEC%3AOVERFLOW%3AUSERNAME.html">REXEC:OVERFLOW:USERNAME</a></b></td>
   <td width="500" valign="top">
    REXEC: Username Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RLOGIN"></a>RLOGIN</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AAUDIT%3APARAM-NOT-OK.html">RLOGIN:AUDIT:PARAM-NOT-OK</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Info Supplied Parameters are Not OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AAUDIT%3AREQ-ILLEGAL-PORT.html">RLOGIN:AUDIT:REQ-ILLEGAL-PORT</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Illegal Source Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AFAILURE%3ALOGIN-FAILURE.html">RLOGIN:FAILURE:LOGIN-FAILURE</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Login Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AINFO%3ARLOGIN-LOGIN.html">RLOGIN:INFO:RLOGIN-LOGIN</a></b></td>
   <td width="500" valign="top">
    RLOGIN: LOGIN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AOVERFLOW%3ALONG-ARGS.html">RLOGIN:OVERFLOW:LONG-ARGS</a></b></td>
   <td width="500" valign="top">
    RLOGIN: RLOGIN Long Argument Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AOVERFLOW%3ATERMINAL.html">RLOGIN:OVERFLOW:TERMINAL</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Terminal Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AOVERFLOW%3AUSERNAME.html">RLOGIN:OVERFLOW:USERNAME</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Username Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AREQERR%3ADATA-IN-1ST-LINE.html">RLOGIN:REQERR:DATA-IN-1ST-LINE</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Data in 1st Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AUSER%3AROOT-ACCESS.html">RLOGIN:USER:ROOT-ACCESS</a></b></td>
   <td width="500" valign="top">
    RLOGIN: Multiple User Root Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AUSER%3AUSER-BIN.html">RLOGIN:USER:USER-BIN</a></b></td>
   <td width="500" valign="top">
    RLOGIN: User &quot;bin&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AUSER%3AUSER-ECHO.html">RLOGIN:USER:USER-ECHO</a></b></td>
   <td width="500" valign="top">
    RLOGIN: User &quot;echo&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RLOGIN%3AUSER%3AUSER-ROOT.html">RLOGIN:USER:USER-ROOT</a></b></td>
   <td width="500" valign="top">
    RLOGIN: User &quot;root&quot;
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RPC"></a>RPC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AAUDIT%3AGETPORT-FAILED.html">RPC:AUDIT:GETPORT-FAILED</a></b></td>
   <td width="500" valign="top">
    RPC: GETPORT Operation Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AAUDIT%3AINVALID-DIR.html">RPC:AUDIT:INVALID-DIR</a></b></td>
   <td width="500" valign="top">
    RPC: Invalid Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AAUDIT%3AREQ-INVALID-XID.html">RPC:AUDIT:REQ-INVALID-XID</a></b></td>
   <td width="500" valign="top">
    RPC: Invalid XID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AAUDIT%3AREQUEST-DENIED.html">RPC:AUDIT:REQUEST-DENIED</a></b></td>
   <td width="500" valign="top">
    RPC: Request Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AAUTOMOUNTD-OF.html">RPC:AUTOMOUNTD-OF</a></b></td>
   <td width="500" valign="top">
    RPC: Automount Daemon Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ACALL-IT-OF.html">RPC:CALL-IT-OF</a></b></td>
   <td width="500" valign="top">
    RPC: Novell NetWare NFS Portmapper RPC Module Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AEMC-LEGATO-NW-OF.html">RPC:EMC-LEGATO-NW-OF</a></b></td>
   <td width="500" valign="top">
    RPC: EMC Legato NetWorker Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AFAILURE%3ACALLIT-FAILED.html">RPC:FAILURE:CALLIT-FAILED</a></b></td>
   <td width="500" valign="top">
    RPC: CALLIT Operation Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AFAILURE%3ASET-FAILED.html">RPC:FAILURE:SET-FAILED</a></b></td>
   <td width="500" valign="top">
    RPC: SET Operation Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AFAILURE%3AUNSET-FAILED.html">RPC:FAILURE:UNSET-FAILED</a></b></td>
   <td width="500" valign="top">
    RPC: UNSET Operation Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AKADMIND-KLOG.html">RPC:KADMIND-KLOG</a></b></td>
   <td width="500" valign="top">
    RPC: MIT Kerberos V5 KAdminD klog_vsyslog Server Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AKADMIND-OF.html">RPC:KADMIND-OF</a></b></td>
   <td width="500" valign="top">
    RPC: MIT Kerberos kadmind Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AKADMIND-RENAME.html">RPC:KADMIND-RENAME</a></b></td>
   <td width="500" valign="top">
    RPC: MIT Kerberos kadmind Rename Principal Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AKRB5-LIB-OF.html">RPC:KRB5-LIB-OF</a></b></td>
   <td width="500" valign="top">
    RPC: MIT Kerberos Kadmind Lib Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ANULL-TADDR2UADDR.html">RPC:NULL-TADDR2UADDR</a></b></td>
   <td width="500" valign="top">
    RPC: Null taddr2uaddr Portmap Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3APCNFSD-FS.html">RPC:PCNFSD-FS</a></b></td>
   <td width="500" valign="top">
    RPC: PCNFSD Format string 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AREQERR%3AREQ-INVALID-PROC.html">RPC:REQERR:REQ-INVALID-PROC</a></b></td>
   <td width="500" valign="top">
    RPC: Invalid Procedure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARLPR-FS.html">RPC:RLPR-FS</a></b></td>
   <td width="500" valign="top">
    RPC: RLPR Daemon Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.CMSD%3ARPC-CMSD-OVERFLOW.html">RPC:RPC.CMSD:RPC-CMSD-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RPC: Multiple Vendor CDE Calendar Manager Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ALINUX-MOUNTD-OBO.html">RPC:RPC.MOUNTD:LINUX-MOUNTD-OBO</a></b></td>
   <td width="500" valign="top">
    RPC: Linux nfs-utils RPC.mountd xlog Off-by-One
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT.html">RPC:RPC.MOUNTD:SHOWMOUNT</a></b></td>
   <td width="500" valign="top">
    RPC: Mountd Export Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT-TCP.html">RPC:RPC.MOUNTD:SHOWMOUNT-TCP</a></b></td>
   <td width="500" valign="top">
    RPC: Showmount Request (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT-UDP.html">RPC:RPC.MOUNTD:SHOWMOUNT-UDP</a></b></td>
   <td width="500" valign="top">
    RPC: Showmount Request (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3AXLINK-IOF.html">RPC:RPC.MOUNTD:XLINK-IOF</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.mountd Xlink Integer OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.SADMIND%3AADM-METHOD-TRAV.html">RPC:RPC.SADMIND:ADM-METHOD-TRAV</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.sadmind ADM_METHOD Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.SADMIND%3ASADMIND-OF.html">RPC:RPC.SADMIND:SADMIND-OF</a></b></td>
   <td width="500" valign="top">
    RPC: Solaris sadmind Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.SNMPXDMID%3AOVERFLOW.html">RPC:RPC.SNMPXDMID:OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RPC: Solaris snmpXdmid Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3AAUTOMOUNT-TLI.html">RPC:RPC.STATD:AUTOMOUNT-TLI</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.statd/automountd TLI Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3ARPC-STATD-OF.html">RPC:RPC.STATD:RPC-STATD-OF</a></b></td>
   <td width="500" valign="top">
    RPC: Buffer Overflow in rpc.statd
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3ASTATD-FMT-STR1.html">RPC:RPC.STATD:STATD-FMT-STR1</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.statd Linux Remote Format String Attack (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3ASTATD-FMT-STR2.html">RPC:RPC.STATD:STATD-FMT-STR2</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.statd Linux Remote Format String Attack (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3ASTATD-FMT-STR4.html">RPC:RPC.STATD:STATD-FMT-STR4</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.statd Linux Remote Format String Attack (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.STATD%3ASTATD-FMT-STR5.html">RPC:RPC.STATD:STATD-FMT-STR5</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.statd Linux Remote Format String Attack (5)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.TTDBSERVER%3ATT-MAL-FS.html">RPC:RPC.TTDBSERVER:TT-MAL-FS</a></b></td>
   <td width="500" valign="top">
    RPC: TT Malformed RPC Message Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.TTDBSERVER%3ATT-MAL-FS-2.html">RPC:RPC.TTDBSERVER:TT-MAL-FS-2</a></b></td>
   <td width="500" valign="top">
    RPC: TT Malformed RPC Message Format String (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.TTDBSERVER%3ATT-MAL-FS-3.html">RPC:RPC.TTDBSERVER:TT-MAL-FS-3</a></b></td>
   <td width="500" valign="top">
    RPC: TT Malformed RPC Message Format String (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.TTDBSERVER%3ATT-MAL-OF.html">RPC:RPC.TTDBSERVER:TT-MAL-OF</a></b></td>
   <td width="500" valign="top">
    RPC: TT Malformed RPC Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.TTDBSERVER%3ATT-REAL-PATH.html">RPC:RPC.TTDBSERVER:TT-REAL-PATH</a></b></td>
   <td width="500" valign="top">
    RPC: TT Real Path Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.WALLD%3ASYSLOG-FS.html">RPC:RPC.WALLD:SYSLOG-FS</a></b></td>
   <td width="500" valign="top">
    RPC: Sun Solaris RWall Daemon Syslog Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPC.WALLD%3AWALLD-ERR-FTSTR-2.html">RPC:RPC.WALLD:WALLD-ERR-FTSTR-2</a></b></td>
   <td width="500" valign="top">
    RPC: RPC.rwalld Error Message Format String Vulnerability (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARPCBIND-CALLIT-DOS.html">RPC:RPCBIND-CALLIT-DOS</a></b></td>
   <td width="500" valign="top">
    RPC: SunRPC Bind CALLIT Procedure Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ARWHOD%3ARWHOD-NULL-INJ.html">RPC:RWHOD:RWHOD-NULL-INJ</a></b></td>
   <td width="500" valign="top">
    RPC: IN.rwhod Hostname NULL Byte Code Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ASOL-CDE-CALENDAR-MGR.html">RPC:SOL-CDE-CALENDAR-MGR</a></b></td>
   <td width="500" valign="top">
    RPC: Oracle Solaris CDE Calendar Manager Service Daemon Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ASUN-SOLARIS-SADMIND-ADM.html">RPC:SUN-SOLARIS-SADMIND-ADM</a></b></td>
   <td width="500" valign="top">
    RPC: Sun Solstice AdminSuite sadmind service adm_build_path Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3ASUN-SOLARIS-SADMIND-BO.html">RPC:SUN-SOLARIS-SADMIND-BO</a></b></td>
   <td width="500" valign="top">
    RPC: Sun Solaris sadmind RPC Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AWDB-AGENT.html">RPC:WDB-AGENT</a></b></td>
   <td width="500" valign="top">
    RPC: VxWorks WDB Agent Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AXDR-INTEGER-OVERFLOW.html">RPC:XDR-INTEGER-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RPC: XDR Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RPC%3AYPUPDATED-CMD-INJ.html">RPC:YPUPDATED-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    RPC: Sun Solaris rpc.ypupdated Command Injection Vulnerability
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RSH"></a>RSH</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AAUDIT%3APARAM-NOT-OK.html">RSH:AUDIT:PARAM-NOT-OK</a></b></td>
   <td width="500" valign="top">
    RSH: Supplied Parameters are Not OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AAUDIT%3APARAM-OK.html">RSH:AUDIT:PARAM-OK</a></b></td>
   <td width="500" valign="top">
    RSH: Supplied Parameters are OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AAUDIT%3AREQ-ILLEGAL-ERR-PORT.html">RSH:AUDIT:REQ-ILLEGAL-ERR-PORT</a></b></td>
   <td width="500" valign="top">
    RSH: Illegal STDERR Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AAUDIT%3AREQ-ILLEGAL-PORT.html">RSH:AUDIT:REQ-ILLEGAL-PORT</a></b></td>
   <td width="500" valign="top">
    RSH: Illegal Source Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AFAILURE%3ALOGIN-FAILURE.html">RSH:FAILURE:LOGIN-FAILURE</a></b></td>
   <td width="500" valign="top">
    RSH: Permission Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AOVERFLOW%3ACOMMAND.html">RSH:OVERFLOW:COMMAND</a></b></td>
   <td width="500" valign="top">
    RSH: Buffer Overflow Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AOVERFLOW%3AUSERNAME.html">RSH:OVERFLOW:USERNAME</a></b></td>
   <td width="500" valign="top">
    RSH: Buffer Overflow Username
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AOVERFLOW%3AWINRSHD-OF.html">RSH:OVERFLOW:WINRSHD-OF</a></b></td>
   <td width="500" valign="top">
    RSH: Microsoft Windows RSH Daemon Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AUSER%3AUSER-BIN.html">RSH:USER:USER-BIN</a></b></td>
   <td width="500" valign="top">
    RSH: User &quot;bin&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AUSER%3AUSER-ECHO.html">RSH:USER:USER-ECHO</a></b></td>
   <td width="500" valign="top">
    RSH: User &quot;echo&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSH%3AUSER%3AUSER-ROOT.html">RSH:USER:USER-ROOT</a></b></td>
   <td width="500" valign="top">
    RSH: User &quot;root&quot;
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RSYNC"></a>RSYNC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSYNC%3ACHUNK-OF.html">RSYNC:CHUNK-OF</a></b></td>
   <td width="500" valign="top">
    RSYNC: Chunk-Checksum Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSYNC%3ADIR-TRAV.html">RSYNC:DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    RSYNC: File Overwrite and Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RSYNC%3AEXCLUDE-OF.html">RSYNC:EXCLUDE-OF</a></b></td>
   <td width="500" valign="top">
    RSYNC: Linux rsync recv_exclude_list() Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RTSP"></a>RTSP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ACVE-2013-2569-RCE.html">RTSP:CVE-2013-2569-RCE</a></b></td>
   <td width="500" valign="top">
    RTSP: CVE-2013-2569 Zavio IP Camera Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ADESCRIBE-BOF.html">RTSP:DESCRIBE-BOF</a></b></td>
   <td width="500" valign="top">
    RTSP: RealNetworks Helix Server RTSP DESCRIBE Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AEMPTY-HEADER.html">RTSP:EMPTY-HEADER</a></b></td>
   <td width="500" valign="top">
    RTSP: Empty Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AEXPLOIT%3AINVALID-PORT.html">RTSP:EXPLOIT:INVALID-PORT</a></b></td>
   <td width="500" valign="top">
    RTSP: Invalid Dynamic Port Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AHELIX-RN5AUTH.html">RTSP:HELIX-RN5AUTH</a></b></td>
   <td width="500" valign="top">
    RTSP: RealNetworks Helix Server rn5auth Credential Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AMAL-RTSP.html">RTSP:MAL-RTSP</a></b></td>
   <td width="500" valign="top">
    RTSP: Malformed RTSP Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AMS-MEDIA-PLAYER-MC.html">RTSP:MS-MEDIA-PLAYER-MC</a></b></td>
   <td width="500" valign="top">
    RTSP: Microsoft Media Player Audio Sampling Rate Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ADESCRIBE-OF.html">RTSP:OVERFLOW:DESCRIBE-OF</a></b></td>
   <td width="500" valign="top">
    RTSP: Real Server Describe Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ALINE-OF.html">RTSP:OVERFLOW:LINE-OF</a></b></td>
   <td width="500" valign="top">
    RTSP: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ALOADTEST-PW-OF.html">RTSP:OVERFLOW:LOADTEST-PW-OF</a></b></td>
   <td width="500" valign="top">
    RTSP: Helix LoadTestPassword Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ARTSP-CONTENT.html">RTSP:OVERFLOW:RTSP-CONTENT</a></b></td>
   <td width="500" valign="top">
    RTSP: Apple QuickTime RTSP Content-Type Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ASTREAMCOUNT.html">RTSP:OVERFLOW:STREAMCOUNT</a></b></td>
   <td width="500" valign="top">
    RTSP: MPlayer StreamCount RTSP Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ATRANSPORT-OF.html">RTSP:OVERFLOW:TRANSPORT-OF</a></b></td>
   <td width="500" valign="top">
    RTSP: Real Server Transport Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3APLAY.html">RTSP:PLAY</a></b></td>
   <td width="500" valign="top">
    RTSP: Streaming Video (PLAY)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALNETWORKS-HELIX-DOS.html">RTSP:REALNETWORKS-HELIX-DOS</a></b></td>
   <td width="500" valign="top">
    RTSP: Real Networks Helix Universal Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALSERVER%3AMAL-HEADER.html">RTSP:REALSERVER:MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    RTSP: RealServer Multiple &quot;Require&quot; Headers Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALSERVER%3AREAL-SETUP-OF1.html">RTSP:REALSERVER:REAL-SETUP-OF1</a></b></td>
   <td width="500" valign="top">
    RTSP: RealServer SETUP Command Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALSERVER%3AREAL-SETUP-OF2.html">RTSP:REALSERVER:REAL-SETUP-OF2</a></b></td>
   <td width="500" valign="top">
    RTSP: RealServer SETUP Command Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALSERVER%3AREAL-SETUP-OF3.html">RTSP:REALSERVER:REAL-SETUP-OF3</a></b></td>
   <td width="500" valign="top">
    RTSP: RealServer SETUP Command Buffer Overflow (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AREALSERVER%3AREAL-SETUP-OF4.html">RTSP:REALSERVER:REAL-SETUP-OF4</a></b></td>
   <td width="500" valign="top">
    RTSP: Realserver SETUP Command Buffer Overflow (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ASET-PARAMETER.html">RTSP:SET-PARAMETER</a></b></td>
   <td width="500" valign="top">
    RTSP: RealNetworks Helix SET_PARAMETER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ASETUP.html">RTSP:SETUP</a></b></td>
   <td width="500" valign="top">
    RTSP: Streaming Video (SETUP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ASETUP-EMPTY.html">RTSP:SETUP-EMPTY</a></b></td>
   <td width="500" valign="top">
    RTSP: Empty Setup String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3ASETUP-HDR.html">RTSP:SETUP-HDR</a></b></td>
   <td width="500" valign="top">
    RTSP: RealNetworks Helix Server SETUP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AUBIQUITI-AIRCAM-BOF.html">RTSP:UBIQUITI-AIRCAM-BOF</a></b></td>
   <td width="500" valign="top">
    RTSP: Ubiquiti AirCam Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AUBIQUITI-AIRCAM-BOF1.html">RTSP:UBIQUITI-AIRCAM-BOF1</a></b></td>
   <td width="500" valign="top">
    RTSP: Ubiquiti AirCam Remote Code Execution 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RTSP%3AVLC-BO.html">RTSP:VLC-BO</a></b></td>
   <td width="500" valign="top">
    RTSP: VLC Media Player RTSP Plugin Stack Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="RUSERS"></a>RUSERS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AAUDIT%3AINVALID-XID.html">RUSERS:AUDIT:INVALID-XID</a></b></td>
   <td width="500" valign="top">
    RUSERS Invalid XID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AAUDIT%3AREQ-DENIED.html">RUSERS:AUDIT:REQ-DENIED</a></b></td>
   <td width="500" valign="top">
    RUSERS Request Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AAUDIT%3AROOT-ACCESS.html">RUSERS:AUDIT:ROOT-ACCESS</a></b></td>
   <td width="500" valign="top">
    RUSERS Unix Root Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AAUDIT%3AUNKNOWN-VER.html">RUSERS:AUDIT:UNKNOWN-VER</a></b></td>
   <td width="500" valign="top">
    RUSERS Unknown Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AERR%3ALARGE-CRED.html">RUSERS:ERR:LARGE-CRED</a></b></td>
   <td width="500" valign="top">
    RUSERS Credential Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AERR%3ALONG-NETNAME.html">RUSERS:ERR:LONG-NETNAME</a></b></td>
   <td width="500" valign="top">
    RUSERS Destination Netname Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AERR%3ASHORT-READ.html">RUSERS:ERR:SHORT-READ</a></b></td>
   <td width="500" valign="top">
    RUSERS Short Read
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AERR%3AWRONG-DIR.html">RUSERS:ERR:WRONG-DIR</a></b></td>
   <td width="500" valign="top">
    RUSERS: Wrong Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AINFO%3AUNKNOWN-PROG.html">RUSERS:INFO:UNKNOWN-PROG</a></b></td>
   <td width="500" valign="top">
    RUSERS Unknown Program
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AINVALID%3ABAD-CRED-LEN.html">RUSERS:INVALID:BAD-CRED-LEN</a></b></td>
   <td width="500" valign="top">
    RUSERS Incorrect Credential Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AINVALID%3ABAD-VERF-CRED.html">RUSERS:INVALID:BAD-VERF-CRED</a></b></td>
   <td width="500" valign="top">
    RUSERS Incorrect Verifier Credential
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AINVALID%3AINVALID-DIR.html">RUSERS:INVALID:INVALID-DIR</a></b></td>
   <td width="500" valign="top">
    RUSERS Invalid Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AINVALID%3AINVALID-PROC.html">RUSERS:INVALID:INVALID-PROC</a></b></td>
   <td width="500" valign="top">
    RUSERS Invalid Procedure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AOVERFLOW%3ADEV-OVERFLOW.html">RUSERS:OVERFLOW:DEV-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RUSERS Device Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AOVERFLOW%3AHOST-OVERFLOW.html">RUSERS:OVERFLOW:HOST-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RUSERS Host Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="RUSERS%3AOVERFLOW%3AUSER-OVERFLOW.html">RUSERS:OVERFLOW:USER-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    RUSERS Username Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SCADA"></a>SCADA</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3A3S-CODESYS-DIR-TRAVERSAL.html">SCADA:3S-CODESYS-DIR-TRAVERSAL</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S CoDeSys No Authentication Directory Traversal Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3A3S-CODESYS-GWS-DIRTRVRSL.html">SCADA:3S-CODESYS-GWS-DIRTRVRSL</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S CoDeSys Gateway Server Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3A7T-INTERACTIVE-DC-OF.html">SCADA:7T-INTERACTIVE-DC-OF</a></b></td>
   <td width="500" valign="top">
    SCADA:  7T Interactive Graphical SCADA System dc.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3A7T-INTERACTIVE-IGSS-OF.html">SCADA:7T-INTERACTIVE-IGSS-OF</a></b></td>
   <td width="500" valign="top">
    SCADA:  7T Interactive Graphical SCADA System IGSSdataServer.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AABB-MICROSCADA-BOF.html">SCADA:ABB-MICROSCADA-BOF</a></b></td>
   <td width="500" valign="top">
    APP: ABB MicroSCADA Wserver Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AABB-WSERVER-CMD-EXEC.html">SCADA:ABB-WSERVER-CMD-EXEC</a></b></td>
   <td width="500" valign="top">
    SCADA: ABB MicroSCADA Wserver Component Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACIP-UNAUTH-CMDEXEC.html">SCADA:CIP-UNAUTH-CMDEXEC</a></b></td>
   <td width="500" valign="top">
    SCADA: EtherNet/IP CIP Unauthorized Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACITECT-OF.html">SCADA:CITECT-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: CitectSCADA Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-BO.html">SCADA:CODESYS-BO</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-CONTROL-SERVICE.html">SCADA:CODESYS-CONTROL-SERVICE</a></b></td>
   <td width="500" valign="top">
    SCADA: Smart Software Solutions CoDeSys ControlService Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-GATEWAY-DOS.html">SCADA:CODESYS-GATEWAY-DOS</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S Smart Software Solutions CoDeSys Gateway Server Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-GATEWAY-SERVICE.html">SCADA:CODESYS-GATEWAY-SERVICE</a></b></td>
   <td width="500" valign="top">
    SCADA: CoDeSys GatewayService Integer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-HEAP-OVF.html">SCADA:CODESYS-HEAP-OVF</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S Smart Software Solutions CoDeSys Gateway Server Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-MEM-ERR.html">SCADA:CODESYS-MEM-ERR</a></b></td>
   <td width="500" valign="top">
    SCADA: 3S Smart Software Solutions CoDeSys Gateway Server Memory Access Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ACODESYS-OPCODE03EF.html">SCADA:CODESYS-OPCODE03EF</a></b></td>
   <td width="500" valign="top">
    SCADA: CoDeSys Gateway Server Opcode 0x3ef Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADATAC-REALWIN-MULT-BOF.html">SCADA:DATAC-REALWIN-MULT-BOF</a></b></td>
   <td width="500" valign="top">
    SCADA: DATAC RealWin SCADA Server Multiple Buffer Overflow Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADATAC-REALWIN-OF.html">SCADA:DATAC-REALWIN-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: DATAC RealWIn Multiple Buffer Overflows
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ABROADCAST.html">SCADA:DNP3:BROADCAST</a></b></td>
   <td width="500" valign="top">
    DNP3: Broadcast Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ACOLD-RESTART.html">SCADA:DNP3:COLD-RESTART</a></b></td>
   <td width="500" valign="top">
    DNP3: Cold Restart
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ADISABLE-RESP.html">SCADA:DNP3:DISABLE-RESP</a></b></td>
   <td width="500" valign="top">
    DNP3: Disable Unsolicited Responses
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3AMISC-REQ.html">SCADA:DNP3:MISC-REQ</a></b></td>
   <td width="500" valign="top">
    DNP3: Miscellaneous Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ANON-DNP3.html">SCADA:DNP3:NON-DNP3</a></b></td>
   <td width="500" valign="top">
    DNP3: Non-DNP3 Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3AREAD.html">SCADA:DNP3:READ</a></b></td>
   <td width="500" valign="top">
    DNP3: Read Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ARESPONSE-DOS.html">SCADA:DNP3:RESPONSE-DOS</a></b></td>
   <td width="500" valign="top">
    DNP3: Unsolicited Response Storm
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3ASTOP.html">SCADA:DNP3:STOP</a></b></td>
   <td width="500" valign="top">
    DNP3: Stop Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3AWARM-RESTART.html">SCADA:DNP3:WARM-RESTART</a></b></td>
   <td width="500" valign="top">
    DNP3: Warm Restart
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ADNP3%3AWRITE.html">SCADA:DNP3:WRITE</a></b></td>
   <td width="500" valign="top">
    DNP3: Write Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AEKTRON-CMS-XSLT-RCE.html">SCADA:EKTRON-CMS-XSLT-RCE</a></b></td>
   <td width="500" valign="top">
    SCADA: Ektron CMS XslCompiledTransform Class Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3ABUFFER-SIZE.html">SCADA:ICCP:BUFFER-SIZE</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Buffer Size
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3ACN-INVALID.html">SCADA:ICCP:CN-INVALID</a></b></td>
   <td width="500" valign="top">
    ICCP: Invalid Transport Selector Size
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3ACN-INVALID-LENGTH.html">SCADA:ICCP:CN-INVALID-LENGTH</a></b></td>
   <td width="500" valign="top">
    ICCP: Session Connect Invalid Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3ADISCONNECT-CODE.html">SCADA:ICCP:DISCONNECT-CODE</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Session Disconnect Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AINVALID-TPDU.html">SCADA:ICCP:INVALID-TPDU</a></b></td>
   <td width="500" valign="top">
    ICCP: Invalid TPDU Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AINVALID-VERSION.html">SCADA:ICCP:INVALID-VERSION</a></b></td>
   <td width="500" valign="top">
    ICCP: Invalid Version Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AREASON-CODE-LENGTH.html">SCADA:ICCP:REASON-CODE-LENGTH</a></b></td>
   <td width="500" valign="top">
    ICCP: Session Refuse Invalid Reason Code Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AUNSUPPORTED-SERVICE.html">SCADA:ICCP:UNSUPPORTED-SERVICE</a></b></td>
   <td width="500" valign="top">
    ICCP: Unsupported Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AUNSUPPORTED-TPDU.html">SCADA:ICCP:UNSUPPORTED-TPDU</a></b></td>
   <td width="500" valign="top">
    ICCP: Unsupported TPDU Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AWRONG-AB-PARAMETER.html">SCADA:ICCP:WRONG-AB-PARAMETER</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Session Abort Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AWRONG-CN-PARA.html">SCADA:ICCP:WRONG-CN-PARA</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Session Connect Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AWRONG-DT-PARAMETER.html">SCADA:ICCP:WRONG-DT-PARAMETER</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Session Data Transfer Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICCP%3AWRONG-FN-PARAMETER.html">SCADA:ICCP:WRONG-FN-PARAMETER</a></b></td>
   <td width="500" valign="top">
    ICCP: Wrong Session Finish Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AICONICS-GENBROKER.html">SCADA:ICONICS-GENBROKER</a></b></td>
   <td width="500" valign="top">
    SCADA: ICONICS Genesis32 GenBroker Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3AINVALID-START-TAG.html">SCADA:IEC104:INVALID-START-TAG</a></b></td>
   <td width="500" valign="top">
    IEC104: Invalid Start Tag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3AINVALID-UDP-MSG.html">SCADA:IEC104:INVALID-UDP-MSG</a></b></td>
   <td width="500" valign="top">
    IEC-104: UDP-based Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3AMALFORMED-MESSAGE.html">SCADA:IEC104:MALFORMED-MESSAGE</a></b></td>
   <td width="500" valign="top">
    IEC104: Malformed Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3AMESSAGE-OVERFLOW.html">SCADA:IEC104:MESSAGE-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    IEC104: Message Oveflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3AMESSAGE-TYPEU-FN.html">SCADA:IEC104:MESSAGE-TYPEU-FN</a></b></td>
   <td width="500" valign="top">
    IEC104: Error in Control Functions of U-type Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ASESSION.html">SCADA:IEC104:SESSION</a></b></td>
   <td width="500" valign="top">
    IEC104: Session Start
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ASESSION-ALT-PORT.html">SCADA:IEC104:SESSION-ALT-PORT</a></b></td>
   <td width="500" valign="top">
    IEC104: Session Start on Alternative Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ASHORT-MSG.html">SCADA:IEC104:SHORT-MSG</a></b></td>
   <td width="500" valign="top">
    IEC-104: Short Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ATYPE-I.html">SCADA:IEC104:TYPE-I</a></b></td>
   <td width="500" valign="top">
    IEC-104: Type I Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ATYPE-S.html">SCADA:IEC104:TYPE-S</a></b></td>
   <td width="500" valign="top">
    IEC-104: Type S Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIEC104%3ATYPE-U.html">SCADA:IEC104:TYPE-U</a></b></td>
   <td width="500" valign="top">
    IEC-104: Type U Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AIOSERVER-INFO-DISCLSURE.html">SCADA:IOSERVER-INFO-DISCLSURE</a></b></td>
   <td width="500" valign="top">
    SCADA: IOServer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AKINGVIEW-BOF.html">SCADA:KINGVIEW-BOF</a></b></td>
   <td width="500" valign="top">
    SCADA: Kingview Network Based Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AKINGVIEW-HISTORYSRV-OC3.html">SCADA:KINGVIEW-HISTORYSRV-OC3</a></b></td>
   <td width="500" valign="top">
    SCADA: WellinTech Kingview SCADA HistoryServer.exe Opcode 3 Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMEASURESOFT-SCADAPRO-RCE.html">SCADA:MEASURESOFT-SCADAPRO-RCE</a></b></td>
   <td width="500" valign="top">
    SCADA: Measuresoft ScadaPro Service Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ABAD-PROTO-ID.html">SCADA:MODBUS:BAD-PROTO-ID</a></b></td>
   <td width="500" valign="top">
    MODBUS: Invalid Protocol ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ABUSY-EXCEPTION.html">SCADA:MODBUS:BUSY-EXCEPTION</a></b></td>
   <td width="500" valign="top">
    MODBUS: Slave Device Busy Exception Code Delay
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ACLEAR.html">SCADA:MODBUS:CLEAR</a></b></td>
   <td width="500" valign="top">
    MODBUS: Clear Counters and Diagnostic Registers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ADOS.html">SCADA:MODBUS:DOS</a></b></td>
   <td width="500" valign="top">
    MODBUS: Restart Communications
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AGALIL-MODBUS-DOS.html">SCADA:MODBUS:GALIL-MODBUS-DOS</a></b></td>
   <td width="500" valign="top">
    MODBUS: Galil RIO Pocket PLC Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AINPUT-INT-OF.html">SCADA:MODBUS:INPUT-INT-OF</a></b></td>
   <td width="500" valign="top">
    MODBUS: Inputs Register Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AINVALID-HEADER.html">SCADA:MODBUS:INVALID-HEADER</a></b></td>
   <td width="500" valign="top">
    MODBUS: Invalid Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AINVALID-UNI-ID.html">SCADA:MODBUS:INVALID-UNI-ID</a></b></td>
   <td width="500" valign="top">
    MODBUS: Invalid Unit ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ALENGTH.html">SCADA:MODBUS:LENGTH</a></b></td>
   <td width="500" valign="top">
    MODBUS: Illegal Packet Size
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ALISTEN-ONLY.html">SCADA:MODBUS:LISTEN-ONLY</a></b></td>
   <td width="500" valign="top">
    MODBUS: Force Listen Only Mode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ANOT-MODBUS.html">SCADA:MODBUS:NOT-MODBUS</a></b></td>
   <td width="500" valign="top">
    MODBUS: Not MODBUS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AOPC-SVR-HEAP-CORR.html">SCADA:MODBUS:OPC-SVR-HEAP-CORR</a></b></td>
   <td width="500" valign="top">
    SCADA: Automated Solutions Modbus/TCP OPC Server Remote Heap Corruption 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AOVERLONG-PDU.html">SCADA:MODBUS:OVERLONG-PDU</a></b></td>
   <td width="500" valign="top">
    MODBUS: Overlong Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AREAD.html">SCADA:MODBUS:READ</a></b></td>
   <td width="500" valign="top">
    MODBUS: Read Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AREAD-ID.html">SCADA:MODBUS:READ-ID</a></b></td>
   <td width="500" valign="top">
    MODBUS: Read Device Identification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ASHORT-PDU.html">SCADA:MODBUS:SHORT-PDU</a></b></td>
   <td width="500" valign="top">
    MODBUS: Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ASLAVE-ID.html">SCADA:MODBUS:SLAVE-ID</a></b></td>
   <td width="500" valign="top">
    MODBUS: Read Slave Identification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ATRAILING-DATA.html">SCADA:MODBUS:TRAILING-DATA</a></b></td>
   <td width="500" valign="top">
    MODBUS: Trailing Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3ATRI-COIL-DOS.html">SCADA:MODBUS:TRI-COIL-DOS</a></b></td>
   <td width="500" valign="top">
    SCADA: TRI Coil Quantity Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AUNDERFLOW.html">SCADA:MODBUS:UNDERFLOW</a></b></td>
   <td width="500" valign="top">
    MODBUS: Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AMODBUS%3AWRITE.html">SCADA:MODBUS:WRITE</a></b></td>
   <td width="500" valign="top">
    MODBUS: Write Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AREALWIN.html">SCADA:REALWIN</a></b></td>
   <td width="500" valign="top">
    SCADA: DATAC RealWin SCADA Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASCHNEIDER-ELE-INT-BO.html">SCADA:SCHNEIDER-ELE-INT-BO</a></b></td>
   <td width="500" valign="top">
    SCADA: Schneider Electric Interactive Graphical System Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASCHNEIDER-ELEC-INTER-BOF.html">SCADA:SCHNEIDER-ELEC-INTER-BOF</a></b></td>
   <td width="500" valign="top">
    SCADA: Schneider Electric Interactive Graphical SCADA System Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASCHNIDER-DB-INFO-DIS.html">SCADA:SCHNIDER-DB-INFO-DIS</a></b></td>
   <td width="500" valign="top">
    SCADA: Schneider Electric SCADA Expert ClearSCADA Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIELCO-SISTEMI-WINLOG-BO1.html">SCADA:SIELCO-SISTEMI-WINLOG-BO1</a></b></td>
   <td width="500" valign="top">
    SCADA: Sielco Sistemi Winlog Lite Buffer Overflow 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIELCO-SISTEMI-WINLOG-BOF.html">SCADA:SIELCO-SISTEMI-WINLOG-BOF</a></b></td>
   <td width="500" valign="top">
    SCADA: Sielco Sistemi Winlog Lite Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIELCO-SISTEMI-WINLOGPRO.html">SCADA:SIELCO-SISTEMI-WINLOGPRO</a></b></td>
   <td width="500" valign="top">
    SCADA: Sielco Sistemi Winlog Pro Multiple Security Vulnerabilities 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-CSSERVICE-BOF.html">SCADA:SIEMENS-CSSERVICE-BOF</a></b></td>
   <td width="500" valign="top">
    SCADA: Siemens FactoryLink 8 CSService Logging Path Param Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-SIMATIC-CPU-RCE.html">SCADA:SIEMENS-SIMATIC-CPU-RCE</a></b></td>
   <td width="500" valign="top">
    SCADA: Siemens Simatic S7-300/400/1200 CPU START/STOP Module Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-SIMATIC-HMILOAD.html">SCADA:SIEMENS-SIMATIC-HMILOAD</a></b></td>
   <td width="500" valign="top">
    APP: Siemens Simatic WinCC HmiLoad.exe Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-SIMATIC-S7-300.html">SCADA:SIEMENS-SIMATIC-S7-300</a></b></td>
   <td width="500" valign="top">
    SCADA: Siemens Simatic S7-300 PLC Remote Memory Viewer 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-SIMATIC-WINCC-BO.html">SCADA:SIEMENS-SIMATIC-WINCC-BO</a></b></td>
   <td width="500" valign="top">
    SCADA: Siemens SIMATIC WinCC Flexible Runtime Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASIEMENS-TECNO-VRN-OF.html">SCADA:SIEMENS-TECNO-VRN-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: Siemens Tecnomatix FactoryLink vrn.exe Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3ASUNWAY-FORCECONTROL-OF.html">SCADA:SUNWAY-FORCECONTROL-OF</a></b></td>
   <td width="500" valign="top">
    APP: Sunway Forcecontrol SNMP NetDBServer.exe Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AWELLINTECH-KING-OF.html">SCADA:WELLINTECH-KING-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: WellinTech KingSCADA kxNetDispose.dll Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AWINLOG-TCP-OF.html">SCADA:WINLOG-TCP-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: Winlog Pro TCP Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AWWSUITE.html">SCADA:WWSUITE</a></b></td>
   <td width="500" valign="top">
    SCADA: WonderWare SuiteLink slssvc.exe Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCADA%3AYOKOGAWA-STACK-OF.html">SCADA:YOKOGAWA-STACK-OF</a></b></td>
   <td width="500" valign="top">
    SCADA: Yokogawa BKFSim CVE-2014-3888 Stack Buffer Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SCAN"></a>SCAN</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AACUNETIX.html">SCAN:ACUNETIX</a></b></td>
   <td width="500" valign="top">
    SCAN: Acunetix Web Scanner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AADM%3AFTP-SCAN.html">SCAN:ADM:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: ADM FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3AAMAP-USER.html">SCAN:AMAP:AMAP-USER</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP User Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3AFTP-SCAN.html">SCAN:AMAP:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3ASAP-R3-ON-HTTP.html">SCAN:AMAP:SAP-R3-ON-HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP SAP-R3 on HTTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3ASAP-R3-ON-SMTP.html">SCAN:AMAP:SAP-R3-ON-SMTP</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP SAP-R3 on SMTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3ASAP-R3-ON-SSH.html">SCAN:AMAP:SAP-R3-ON-SSH</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP SAP-R3 on SSH Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAMAP%3ASSL-SCAN.html">SCAN:AMAP:SSL-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: THC-AMAP SSL Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAPPDETECTIVE%3AHTTPS.html">SCAN:APPDETECTIVE:HTTPS</a></b></td>
   <td width="500" valign="top">
    SCAN: AppDetective HTTPS Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAPPDETECTIVE%3AUSER-AGENT.html">SCAN:APPDETECTIVE:USER-AGENT</a></b></td>
   <td width="500" valign="top">
    SCAN: AppDetective Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAUDIT%3AARACHNI-WEB-SCANNER.html">SCAN:AUDIT:ARACHNI-WEB-SCANNER</a></b></td>
   <td width="500" valign="top">
    SCAN: Arachni Web Scanner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAUDIT%3AIKE-TOOL-SCAN.html">SCAN:AUDIT:IKE-TOOL-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: IKE-Tool Host Scan Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AAUDIT%3ANBSTAT-QUERY.html">SCAN:AUDIT:NBSTAT-QUERY</a></b></td>
   <td width="500" valign="top">
    SCAN: NBSTAT Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ABREAKINGPOINT-HTTP.html">SCAN:BREAKINGPOINT-HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: BreakingPoint Systems HTTP Test Traffic Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AESERV.html">SCAN:CANVAS:ESERV</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Eserver
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AFEDORA4.html">SCAN:CANVAS:FEDORA4</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Fedora4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AHELIUM-AGENT.html">SCAN:CANVAS:HELIUM-AGENT</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Helium Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AINGRESS.html">SCAN:CANVAS:INGRESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Ingress
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3ALINUXSNMP.html">SCAN:CANVAS:LINUXSNMP</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas LinuxSNMP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AMAILENABLE.html">SCAN:CANVAS:MAILENABLE</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas MailEnable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3ANETWORKER-3.html">SCAN:CANVAS:NETWORKER-3</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Networker (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3ANOVELL2.html">SCAN:CANVAS:NOVELL2</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Novell2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3ATIVOLI3.html">SCAN:CANVAS:TIVOLI3</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Tivoli3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACANVAS%3AWORDMAIL3.html">SCAN:CANVAS:WORDMAIL3</a></b></td>
   <td width="500" valign="top">
    SCAN: Canvas Wordmail
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACERBERUS%3AFTP.html">SCAN:CERBERUS:FTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Cerberus FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACERBERUS%3AHTTP.html">SCAN:CERBERUS:HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Cerberus HTTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACERBERUS%3ASMTP.html">SCAN:CERBERUS:SMTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Cerberus Email Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AAGENT-LOAD-WIN.html">SCAN:CORE:AGENT-LOAD-WIN</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact Agent Loading (win32)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ADNS-STD-QUERY.html">SCAN:CORE:DNS-STD-QUERY</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact DNS Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AEXPLOIT-UNPACK.html">SCAN:CORE:EXPLOIT-UNPACK</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact Exploit Unpacker
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AEXPLOIT-UNPACK-HTTP.html">SCAN:CORE:EXPLOIT-UNPACK-HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact Exploit Unpacker over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AIIS-ASP-CHUNKED.html">SCAN:CORE:IIS-ASP-CHUNKED</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact IIS ASP Chunked Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AJPEG-GDI-VGX-EXPLOIT.html">SCAN:CORE:JPEG-GDI-VGX-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact Internet Explorer JPEG GDI Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AMP-IE-ZONE-BYPASS.html">SCAN:CORE:MP-IE-ZONE-BYPASS</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact Media Player IE Zone Bypass Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AMSRPC-WKSSVC.html">SCAN:CORE:MSRPC-WKSSVC</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact MSRPC WKSSVC Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ANTPD-CTRL-MSG-OF.html">SCAN:CORE:NTPD-CTRL-MSG-OF</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact ntpd Control Message Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3AOPENSSH-CHANNEL.html">SCAN:CORE:OPENSSH-CHANNEL</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact OpenSSH Channel Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ASAMBA-NTTRANS.html">SCAN:CORE:SAMBA-NTTRANS</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact SAMBA nttrans Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ASAMBA-TRANS2.html">SCAN:CORE:SAMBA-TRANS2</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact SAMBA trans2 Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ASQL-SERVER-HELLO.html">SCAN:CORE:SQL-SERVER-HELLO</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact SQL Server HELLO Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACORE%3ATELNETD-LOGIN.html">SCAN:CORE:TELNETD-LOGIN</a></b></td>
   <td width="500" valign="top">
    SCAN: Core Impact telnetd-login Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3AFINGER-QUERY.html">SCAN:CYBERCOP:FINGER-QUERY</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop Finger Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3AFINGER-REDIR.html">SCAN:CYBERCOP:FINGER-REDIR</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop Finger Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3AOS-PROBE-1.html">SCAN:CYBERCOP:OS-PROBE-1</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop OS Probe (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3AOS-PROBE-2.html">SCAN:CYBERCOP:OS-PROBE-2</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop OS Probe (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3ASMTP-EHLO.html">SCAN:CYBERCOP:SMTP-EHLO</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop SMTP ehlo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3ASMTP-EXPN.html">SCAN:CYBERCOP:SMTP-EXPN</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop SMTP expn
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ACYBERCOP%3AUDP-BOMB.html">SCAN:CYBERCOP:UDP-BOMB</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop UDP Bomb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ADARKD0RK3R-LFI.html">SCAN:DARKD0RK3R-LFI</a></b></td>
   <td width="500" valign="top">
    SCAN: Darkd0rk3r and Smartd0rk3r Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ADARKD0RK3R-XSS.html">SCAN:DARKD0RK3R-XSS</a></b></td>
   <td width="500" valign="top">
    SCAN: Darkd0rk3r and Smartd0rk3r Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ADIRBUSTER-UA.html">SCAN:DIRBUSTER-UA</a></b></td>
   <td width="500" valign="top">
    SCAN: OWASP DirBuster User Agent Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AII%3AALLAIRE-CF-OF.html">SCAN:II:ALLAIRE-CF-OF</a></b></td>
   <td width="500" valign="top">
    HTTP: Allaire Cold Fusion Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AII%3AIIS-ISAPI-ENUM.html">SCAN:II:IIS-ISAPI-ENUM</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AII%3AISAKMP-FLOOD.html">SCAN:II:ISAKMP-FLOOD</a></b></td>
   <td width="500" valign="top">
    SCAN: ISAKMP Invalid Packet Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AII%3ATIQ-WMF-MAL-HEADER.html">SCAN:II:TIQ-WMF-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    HTTP: TrafficIQ WMF Malformed Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AISS%3AFTP-SCAN.html">SCAN:ISS:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: ISS FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMASSCAN-UA.html">SCAN:MASSCAN-UA</a></b></td>
   <td width="500" valign="top">
    SCAN: Masscan Scanner User Agent 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AAPACHE-CHUNK-OF.html">SCAN:METASPLOIT:APACHE-CHUNK-OF</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit Apache Chunked Overflow Win32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AEXECCOMMAND-UAF.html">SCAN:METASPLOIT:EXECCOMMAND-UAF</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit ie_execcommand_uaf Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AJAVA-APPLET.html">SCAN:METASPLOIT:JAVA-APPLET</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit Framework Java Applet In-Line Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AJS-HEAPLIB.html">SCAN:METASPLOIT:JS-HEAPLIB</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit JavaScript Heap Exploitation Library
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3ALSASS.html">SCAN:METASPLOIT:LSASS</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit LSASS Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AMETERPRETER-DLL.html">SCAN:METASPLOIT:METERPRETER-DLL</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit Meterpreter DLL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3ASMB-ACTIVE.html">SCAN:METASPLOIT:SMB-ACTIVE</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit SMB Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3ATWIKI-CONF-CMD.html">SCAN:METASPLOIT:TWIKI-CONF-CMD</a></b></td>
   <td width="500" valign="top">
    SCAN: Metapsloit TWiki Configuration Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AVICTIM-PROFILE.html">SCAN:METASPLOIT:VICTIM-PROFILE</a></b></td>
   <td width="500" valign="top">
    SCAN: Metasploit Victim Profiling Script
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMFS-PROBE.html">SCAN:MFS-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: MFS Scanner Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AADMROCKS-TCP.html">SCAN:MISC:ADMROCKS-TCP</a></b></td>
   <td width="500" valign="top">
    DNS: ADMROCKS Buffer Overflow (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AADMROCKS-UDP.html">SCAN:MISC:ADMROCKS-UDP</a></b></td>
   <td width="500" valign="top">
    DNS: ADMROCKS Buffer Overflow (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ACAT-ETC-PASSWD-UDP.html">SCAN:MISC:CAT-ETC-PASSWD-UDP</a></b></td>
   <td width="500" valign="top">
    DNS: Cat-etc-passwd Buffer Overflow (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3ABSD-FTPD-MKD-OF.html">SCAN:MISC:FTP:BSD-FTPD-MKD-OF</a></b></td>
   <td width="500" valign="top">
    SCAN: FreeBSD/OpenBSD FTPD mkd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AFREEBSD-FTPD-GLOB.html">SCAN:MISC:FTP:FREEBSD-FTPD-GLOB</a></b></td>
   <td width="500" valign="top">
    SCAN: FreeBSD FTP Daemon glob() Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AFTP-MKD.html">SCAN:MISC:FTP:FTP-MKD</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;MKD&quot; Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AFTP-MKD-DOT.html">SCAN:MISC:FTP:FTP-MKD-DOT</a></b></td>
   <td width="500" valign="top">
    FTP: &quot;MKD .&quot; Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3ALOGXFR-OF1.html">SCAN:MISC:FTP:LOGXFR-OF1</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD log_xfer() Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3ALOGXFR-OF2.html">SCAN:MISC:FTP:LOGXFR-OF2</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD log_xfer() Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AOPENBSD-X86.html">SCAN:MISC:FTP:OPENBSD-X86</a></b></td>
   <td width="500" valign="top">
    SCAN: BSD FTPd x86 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3APATH-LINUX-X86-1.html">SCAN:MISC:FTP:PATH-LINUX-X86-1</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTP/wuFTPd Linux x86 Long Pathname Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3APATH-LINUX-X86-2.html">SCAN:MISC:FTP:PATH-LINUX-X86-2</a></b></td>
   <td width="500" valign="top">
    SCAN: Linux x86 FTP Long Pathname Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3APPC-FS1.html">SCAN:MISC:FTP:PPC-FS1</a></b></td>
   <td width="500" valign="top">
    FTP: ProFTPD (Linux PPC) User Command Vulnerability (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AREALPATH-OF1.html">SCAN:MISC:FTP:REALPATH-OF1</a></b></td>
   <td width="500" valign="top">
    SCAN: WU-FTPD realpath() Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AFTP%3AREALPATH-OF2.html">SCAN:MISC:FTP:REALPATH-OF2</a></b></td>
   <td width="500" valign="top">
    SCAN: WU-FTPD realpath() Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AACHG-HTR-PROBE.html">SCAN:MISC:HTTP:ACHG-HTR-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Achg.htr Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMADM-EXE-PROBE.html">SCAN:MISC:HTTP:ADMADM-EXE-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Fpadmin.htm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMADM-HTM-PROBE.html">SCAN:MISC:HTTP:ADMADM-HTM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Fpremadm.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMCGI-EXE-PROBE.html">SCAN:MISC:HTTP:ADMCGI-EXE-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Fpadmcgi.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMIN.html">SCAN:MISC:HTTP:ADMIN</a></b></td>
   <td width="500" valign="top">
    SCAN: admin.pl
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMIN-FILES.html">SCAN:MISC:HTTP:ADMIN-FILES</a></b></td>
   <td width="500" valign="top">
    SCAN: Admin_files Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AADMIN-NSF-ACCESS.html">SCAN:MISC:HTTP:ADMIN-NSF-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Lotus Domino Administration .nsf Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AALIBABA.html">SCAN:MISC:HTTP:ALIBABA</a></b></td>
   <td width="500" valign="top">
    SCAN: alibaba.pl access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AANNEX-DOS.html">SCAN:MISC:HTTP:ANNEX-DOS</a></b></td>
   <td width="500" valign="top">
    SCAN: Annex Terminal DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AARCHITEXT-QUERY.html">SCAN:MISC:HTTP:ARCHITEXT-QUERY</a></b></td>
   <td width="500" valign="top">
    SCAN: Architext_query.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AAUTH-ACCESS.html">SCAN:MISC:HTTP:AUTH-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Phorum Auth Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AAX-ADMIN-ACCESS.html">SCAN:MISC:HTTP:AX-ADMIN-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Ax-admin.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AAXS-ACCESS.html">SCAN:MISC:HTTP:AXS-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Axs.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ABACKUP-REQ.html">SCAN:MISC:HTTP:BACKUP-REQ</a></b></td>
   <td width="500" valign="top">
    SCAN: /backup Directory Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ABIGCONF-ACCESS.html">SCAN:MISC:HTTP:BIGCONF-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Bigconf.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACACHEMGR-ACCESS.html">SCAN:MISC:HTTP:CACHEMGR-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Cachemgr.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACFAPPMAN-PROBE.html">SCAN:MISC:HTTP:CFAPPMAN-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion cfappman Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACFGWIZ-EXE-PROBE.html">SCAN:MISC:HTTP:CFGWIZ-EXE-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Cfgwiz.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACNF-PROBE.html">SCAN:MISC:HTTP:CNF-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS .cnf Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACODE-ACCESS.html">SCAN:MISC:HTTP:CODE-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Phorum Code Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACONT-HTM-PROBE.html">SCAN:MISC:HTTP:CONT-HTM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Contents.htm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACONTEXTADMIN.html">SCAN:MISC:HTTP:CONTEXTADMIN</a></b></td>
   <td width="500" valign="top">
    HTTP: Tomcat ContextAdmin Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACPSHOST-DLL.html">SCAN:MISC:HTTP:CPSHOST-DLL</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Cpshost.dll Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACSS-PROBE.html">SCAN:MISC:HTTP:CSS-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: CodeRed v2 Worm Cross Site Scripting Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ACYBERCOP-HTTP.html">SCAN:MISC:HTTP:CYBERCOP-HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Cybercop HTTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ADAY5DATA-PROBE.html">SCAN:MISC:HTTP:DAY5DATA-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Day5Datacopier Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ADCFORUM-ACCESS.html">SCAN:MISC:HTTP:DCFORUM-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: dcforum.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ADELETE-DOC.html">SCAN:MISC:HTTP:DELETE-DOC</a></b></td>
   <td width="500" valign="top">
    SCAN: Lotus Domino Delete Document Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ADIR-LISTING.html">SCAN:MISC:HTTP:DIR-LISTING</a></b></td>
   <td width="500" valign="top">
    HTTP: Directory Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AEDIT-ACCESS.html">SCAN:MISC:HTTP:EDIT-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Edit.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AEDIT-DOC-ATTEMPT.html">SCAN:MISC:HTTP:EDIT-DOC-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    SCAN: Lotus Domino Edit Document Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AENVIRON-CGI.html">SCAN:MISC:HTTP:ENVIRON-CGI</a></b></td>
   <td width="500" valign="top">
    SCAN: Environ.cgi Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AEXAMPLEAPP-PRB.html">SCAN:MISC:HTTP:EXAMPLEAPP-PRB</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion Exampleapp Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AFILEMAIL-ACCESS.html">SCAN:MISC:HTTP:FILEMAIL-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Filemail Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AFILES-ACCESS.html">SCAN:MISC:HTTP:FILES-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Files.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AFINGER-PROBE.html">SCAN:MISC:HTTP:FINGER-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Finger Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AFLEXFORM-PROBE.html">SCAN:MISC:HTTP:FLEXFORM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Flexform Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AFORMHANDLER.html">SCAN:MISC:HTTP:FORMHANDLER</a></b></td>
   <td width="500" valign="top">
    SCAN: FormHandler.cgi access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AHEAD.html">SCAN:MISC:HTTP:HEAD</a></b></td>
   <td width="500" valign="top">
    SCAN: Excessive HTTP/1.1 HEAD Requests
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AHTGREP-ACCESS.html">SCAN:MISC:HTTP:HTGREP-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: htgrep Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AHTGROUP-ACCESS.html">SCAN:MISC:HTTP:HTGROUP-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: HTTP .htgroup Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AHTW-ACCESS.html">SCAN:MISC:HTTP:HTW-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Webhits.dll .htw Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AIIS-NEWDSN.html">SCAN:MISC:HTTP:IIS-NEWDSN</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS newdsn.exe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AIIS-SAMPLES.html">SCAN:MISC:HTTP:IIS-SAMPLES</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Samples Scanning
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AINTRANET-REQ.html">SCAN:MISC:HTTP:INTRANET-REQ</a></b></td>
   <td width="500" valign="top">
    SCAN: /intranet Directory Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AIPLANET-GETPROP.html">SCAN:MISC:HTTP:IPLANET-GETPROP</a></b></td>
   <td width="500" valign="top">
    SCAN: Netscape iPlanet GETPROPERTIES Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ALWGATE-PROBE.html">SCAN:MISC:HTTP:LWGATE-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: LWGate probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMACHINEINFO.html">SCAN:MISC:HTTP:MACHINEINFO</a></b></td>
   <td width="500" valign="top">
    SCAN: IRIX MachineInfo Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMAILLIST-PROBE.html">SCAN:MISC:HTTP:MAILLIST-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Maillist.pl Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMAINFRMST-PROBE.html">SCAN:MISC:HTTP:MAINFRMST-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion Mainframeset Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMAN-SH-PROBE.html">SCAN:MISC:HTTP:MAN-SH-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Man.sh Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMEM-BIN-PROBE.html">SCAN:MISC:HTTP:MEM-BIN-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS _mem_bin Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMINISTATS-ADM.html">SCAN:MISC:HTTP:MINISTATS-ADM</a></b></td>
   <td width="500" valign="top">
    SCAN: Ministats Admin Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMMSTDOD-PROBE.html">SCAN:MISC:HTTP:MMSTDOD-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Mmstdod.cgi Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMSDAC-PROBE.html">SCAN:MISC:HTTP:MSDAC-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: MSDAC Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AMSPROXY-PROBE.html">SCAN:MISC:HTTP:MSPROXY-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS MSProxy Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ANESSUS-HTTP.html">SCAN:MISC:HTTP:NESSUS-HTTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus HTTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ANETCAT-CMD.html">SCAN:MISC:HTTP:NETCAT-CMD</a></b></td>
   <td width="500" valign="top">
    SCAN: NetCat Backdoor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ANPH-PUBLISH.html">SCAN:MISC:HTTP:NPH-PUBLISH</a></b></td>
   <td width="500" valign="top">
    SCAN: NCSA NPH-Publish Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3APERL-PROBE.html">SCAN:MISC:HTTP:PERL-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Perl Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3APERLSHOP-PROBE.html">SCAN:MISC:HTTP:PERLSHOP-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Perlshop.cgi Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3APOST-QUERY-PROBE.html">SCAN:MISC:HTTP:POST-QUERY-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Post Query Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3APOSTING-ATTEMPT.html">SCAN:MISC:HTTP:POSTING-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage Posting Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3APUT.html">SCAN:MISC:HTTP:PUT</a></b></td>
   <td width="500" valign="top">
    SCAN: PUT Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AQUERYHIT-ACCESS.html">SCAN:MISC:HTTP:QUERYHIT-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Queryhit.htm Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AQUID-PRO-QUO-LOG.html">SCAN:MISC:HTTP:QUID-PRO-QUO-LOG</a></b></td>
   <td width="500" valign="top">
    SCAN: Quid Pro Quo Log Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AREADME-EML.html">SCAN:MISC:HTTP:README-EML</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS readme.eml Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AREPOST-ACCESS.html">SCAN:MISC:HTTP:REPOST-ACCESS</a></b></td>
   <td width="500" valign="top">
    HTTP: IIS Repost.asp Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AREQ-HTTP-CONF.html">SCAN:MISC:HTTP:REQ-HTTP-CONF</a></b></td>
   <td width="500" valign="top">
    SCAN: Apache httpd.conf Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ARESPONDER-ACCESS.html">SCAN:MISC:HTTP:RESPONDER-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Responder.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ARWWWSH-ACCESS.html">SCAN:MISC:HTTP:RWWWSH-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Rwwwshell.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASCRIPTS-BROWSE.html">SCAN:MISC:HTTP:SCRIPTS-BROWSE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Scripts Browse Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASEARCH-VTS.html">SCAN:MISC:HTTP:SEARCH-VTS</a></b></td>
   <td width="500" valign="top">
    SCAN: Search.vts Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASEARCH97-VTS.html">SCAN:MISC:HTTP:SEARCH97-VTS</a></b></td>
   <td width="500" valign="top">
    SCAN: Verity Search97 Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASENDFORM-ACCESS.html">SCAN:MISC:HTTP:SENDFORM-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Sendform.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASENDMESSAGE.html">SCAN:MISC:HTTP:SENDMESSAGE</a></b></td>
   <td width="500" valign="top">
    SCAN: Sendmessage.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASERVER-INFO.html">SCAN:MISC:HTTP:SERVER-INFO</a></b></td>
   <td width="500" valign="top">
    SCAN: Apache mod_info/server-info Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASHELL-ACCESS.html">SCAN:MISC:HTTP:SHELL-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Shell Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASITE-IISAMPLES.html">SCAN:MISC:HTTP:SITE-IISAMPLES</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Site/iisamples Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASNIPPETS-PROBE.html">SCAN:MISC:HTTP:SNIPPETS-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion Snippets Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASNORK-ACCESS.html">SCAN:MISC:HTTP:SNORK-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Snork Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASRCADM-PROBE.html">SCAN:MISC:HTTP:SRCADM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Srcadm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASRCH-HTM-PROBE.html">SCAN:MISC:HTTP:SRCH-HTM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Srch.htm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASTART-STOP-DOS.html">SCAN:MISC:HTTP:START-STOP-DOS</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion Start/Stop DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASTORE-ACCESS.html">SCAN:MISC:HTTP:STORE-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Store.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASWEDITSERVLET.html">SCAN:MISC:HTTP:SWEDITSERVLET</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS SWEditServlet Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ASYNTXCHK-PROBE.html">SCAN:MISC:HTTP:SYNTXCHK-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Coldfusion cfmlsyntaxcheck.cfm Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATEST-CGI-INFO.html">SCAN:MISC:HTTP:TEST-CGI-INFO</a></b></td>
   <td width="500" valign="top">
    SCAN: test-cgi Probe Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATEST-DOT-CGI.html">SCAN:MISC:HTTP:TEST-DOT-CGI</a></b></td>
   <td width="500" valign="top">
    SCAN: test.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATEST-PROBE.html">SCAN:MISC:HTTP:TEST-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: test-cgi Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATESTCOUNTER.html">SCAN:MISC:HTTP:TESTCOUNTER</a></b></td>
   <td width="500" valign="top">
    SCAN: Testcounter Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATILDA-ROOT.html">SCAN:MISC:HTTP:TILDA-ROOT</a></b></td>
   <td width="500" valign="top">
    SCAN: Unix File /~root Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3ATRACE.html">SCAN:MISC:HTTP:TRACE</a></b></td>
   <td width="500" valign="top">
    SCAN: TRACE Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AUNIX-BIN-CSH.html">SCAN:MISC:HTTP:UNIX-BIN-CSH</a></b></td>
   <td width="500" valign="top">
    SCAN: Unix Command /bin/csh
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AUPLOAD-PROBE.html">SCAN:MISC:HTTP:UPLOAD-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Upload.pl Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AUPLOADER-EXE.html">SCAN:MISC:HTTP:UPLOADER-EXE</a></b></td>
   <td width="500" valign="top">
    SCAN: Uploader.exe Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AVIEWCODE-ASP.html">SCAN:MISC:HTTP:VIEWCODE-ASP</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Viewcode.asp Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AVIOLATION-ACCS.html">SCAN:MISC:HTTP:VIOLATION-ACCS</a></b></td>
   <td width="500" valign="top">
    SCAN: Phorum Violation Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AVOIDEYE.html">SCAN:MISC:HTTP:VOIDEYE</a></b></td>
   <td width="500" valign="top">
    SCAN: VoidEye CGI Scanner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AVTI-BIN-PROBE.html">SCAN:MISC:HTTP:VTI-BIN-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Frontpage /_vti_bin/ Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AW2TVARS-PM-PROBE.html">SCAN:MISC:HTTP:W2TVARS-PM-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: W2tvars.pm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWAIS-ACCESS.html">SCAN:MISC:HTTP:WAIS-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Wais.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEB-MAP-ACCESS.html">SCAN:MISC:HTTP:WEB-MAP-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Web-Map.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEBCOM-EXE.html">SCAN:MISC:HTTP:WEBCOM-EXE</a></b></td>
   <td width="500" valign="top">
    SCAN: Webcom CGI Guestbook Scripts
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEBDRIVER-ACCESS.html">SCAN:MISC:HTTP:WEBDRIVER-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Webdriver Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEBHITS-ACCESS.html">SCAN:MISC:HTTP:WEBHITS-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: IIS Webhits.exe Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEBSITEPRO.html">SCAN:MISC:HTTP:WEBSITEPRO</a></b></td>
   <td width="500" valign="top">
    SCAN: OReilly WebSite-Pro args.bat Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWEBTRENDS-PROBE.html">SCAN:MISC:HTTP:WEBTRENDS-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Webtrends HTTP Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-ARGS-BAT.html">SCAN:MISC:HTTP:WIN-ARGS-BAT</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command args.bat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-ARGS-CMD.html">SCAN:MISC:HTTP:WIN-ARGS-CMD</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command args.cmd
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-C-SAMPLE.html">SCAN:MISC:HTTP:WIN-C-SAMPLE</a></b></td>
   <td width="500" valign="top">
    SCAN: OReilly WebSite win-c-sample.exe Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-CD...html">SCAN:MISC:HTTP:WIN-CD..</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command cd..
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-NC.html">SCAN:MISC:HTTP:WIN-NC</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command nc.exe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-PERL.html">SCAN:MISC:HTTP:WIN-PERL</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command Perl.exe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-RCMD.html">SCAN:MISC:HTTP:WIN-RCMD</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command rcmd
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-TELNET-EXE.html">SCAN:MISC:HTTP:WIN-TELNET-EXE</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command telnet.exe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-TFTP-EXE.html">SCAN:MISC:HTTP:WIN-TFTP-EXE</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command tftp.exe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWIN-WSH.html">SCAN:MISC:HTTP:WIN-WSH</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command wsh
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWS-FTP-INI-ATMPT.html">SCAN:MISC:HTTP:WS-FTP-INI-ATMPT</a></b></td>
   <td width="500" valign="top">
    SCAN: Windows Command ws_ftp.ini Access Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWWW-SQL-PROBE.html">SCAN:MISC:HTTP:WWW-SQL-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: WWW-SQL Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AHTTP%3AWWWADM-ACCESS.html">SCAN:MISC:HTTP:WWWADM-ACCESS</a></b></td>
   <td width="500" valign="top">
    SCAN: Wwwadmin.pl Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AIDP-TEST.html">SCAN:MISC:IDP-TEST</a></b></td>
   <td width="500" valign="top">
    SCAN: IDP Testing Signature
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AMSTREAM-CLIENT-REQ.html">SCAN:MISC:MSTREAM-CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    DDOS: Mstream Client to Handler on TCP/12754
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AMSTREAM-REP-12754.html">SCAN:MISC:MSTREAM-REP-12754</a></b></td>
   <td width="500" valign="top">
    DDOS: Mstream Handler To Client on TCP/12754
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AMSTREAM-REP-15104.html">SCAN:MISC:MSTREAM-REP-15104</a></b></td>
   <td width="500" valign="top">
    DDOS: Mstream Handler To Client on TCP/15104
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ANETCAT-DOEXEC-BO.html">SCAN:MISC:NETCAT-DOEXEC-BO</a></b></td>
   <td width="500" valign="top">
    SCAN: Netcat 1.1 doexec.c Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ANULL.html">SCAN:MISC:NULL</a></b></td>
   <td width="500" valign="top">
    SCAN: Any NULL TCP Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AQUERY.html">SCAN:MISC:QUERY</a></b></td>
   <td width="500" valign="top">
    APP: XDMCP Query
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ASVR-RES-S1024.html">SCAN:MISC:SVR-RES-S1024</a></b></td>
   <td width="500" valign="top">
    TROJAN: Infector Server Response (Port 1024)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ASYN-FIN.html">SCAN:MISC:SYN-FIN</a></b></td>
   <td width="500" valign="top">
    SCAN: Any SYN-FIN Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AAPPEND-PASSWD.html">SCAN:MISC:TELNET:APPEND-PASSWD</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cat &gt;&gt;/etc/passwd&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AAPPEND-RHOSTS.html">SCAN:MISC:TELNET:APPEND-RHOSTS</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cat &gt;&gt;.rhosts&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACAT-ETC-INETD.html">SCAN:MISC:TELNET:CAT-ETC-INETD</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cat &gt;/etc/inetd.conf&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACAT-ETC-PASSWD.html">SCAN:MISC:TELNET:CAT-ETC-PASSWD</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cat &gt;/etc/passwd&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACD-BIN-HIDDEN.html">SCAN:MISC:TELNET:CD-BIN-HIDDEN</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cd /bin/.&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACD-DOT-DOT-DOT.html">SCAN:MISC:TELNET:CD-DOT-DOT-DOT</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cd ...&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACD-USR-HIDDEN.html">SCAN:MISC:TELNET:CD-USR-HIDDEN</a></b></td>
   <td width="500" valign="top">
    SCAN: Telenet Command &quot;cd /usr/.&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACD-VAR-HIDDEN.html">SCAN:MISC:TELNET:CD-VAR-HIDDEN</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cd /var/.&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ACISCO.html">SCAN:MISC:TELNET:CISCO</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet User: &quot;cisco&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AETC-GROUP.html">SCAN:MISC:TELNET:ETC-GROUP</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;cat &gt;/etc/group&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AID.html">SCAN:MISC:TELNET:ID</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;id&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AMKDIR.html">SCAN:MISC:TELNET:MKDIR</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;mkdir/ ...&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ANC.html">SCAN:MISC:TELNET:NC</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;nc&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ANMAP.html">SCAN:MISC:TELNET:NMAP</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;nmap&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AREBOOT.html">SCAN:MISC:TELNET:REBOOT</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;reboot&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ASHUTDOWN.html">SCAN:MISC:TELNET:SHUTDOWN</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;shutdown&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ASTROBE.html">SCAN:MISC:TELNET:STROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;strobe&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ASU-BIN.html">SCAN:MISC:TELNET:SU-BIN</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;su bin&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ASU-ROOT.html">SCAN:MISC:TELNET:SU-ROOT</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;su root&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ASU-WRNG-GRP.html">SCAN:MISC:TELNET:SU-WRNG-GRP</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Response: Attempt to SU From Wrong Group
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ATELNET-PORT-21.html">SCAN:MISC:TELNET:TELNET-PORT-21</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;telnet ... 21&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ATELNET-PORT-25.html">SCAN:MISC:TELNET:TELNET-PORT-25</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;telnet ... 25&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3ATELNET-PORT-80.html">SCAN:MISC:TELNET:TELNET-PORT-80</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;telnet ... 80&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AVI-ETC-GROUP.html">SCAN:MISC:TELNET:VI-ETC-GROUP</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;vi /etc/group&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AVI-ETC-PASSWD.html">SCAN:MISC:TELNET:VI-ETC-PASSWD</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;vi /etc/passwd&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AXHOST.html">SCAN:MISC:TELNET:XHOST</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;xhost&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3ATELNET%3AXHOST-PLUS.html">SCAN:MISC:TELNET:XHOST-PLUS</a></b></td>
   <td width="500" valign="top">
    SCAN: Telnet Command &quot;xhost +&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMISC%3AUSER-LIST.html">SCAN:MISC:USER-LIST</a></b></td>
   <td width="500" valign="top">
    SNMP: Get Windows/NT User List
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AMUIEBLACKCAT-TOOL.html">SCAN:MUIEBLACKCAT-TOOL</a></b></td>
   <td width="500" valign="top">
    SCAN: Muieblackcat Scanner Tool Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ACOUNT-CGI.html">SCAN:NESSUS:COUNT-CGI</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus Count.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ADNS-SCAN.html">SCAN:NESSUS:DNS-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus DNS Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3AGLOBAL-ASA.html">SCAN:NESSUS:GLOBAL-ASA</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus Global-asa Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3AHTTP-USER-AGENT.html">SCAN:NESSUS:HTTP-USER-AGENT</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus HTTP User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3AISS-DIR-LISTING.html">SCAN:NESSUS:ISS-DIR-LISTING</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus IIS Directory Listing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ANPH-PUBLISH-CGI.html">SCAN:NESSUS:NPH-PUBLISH-CGI</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus nph-publish.cgi Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ASMB-SCAN.html">SCAN:NESSUS:SMB-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus - SMB Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ASMTP-SCAN.html">SCAN:NESSUS:SMTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus SMTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ASSH.html">SCAN:NESSUS:SSH</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus SSH Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANESSUS%3ATFTP-SCAN.html">SCAN:NESSUS:TFTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Nessus TFTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANETECT%3ASMTP.html">SCAN:NETECT:SMTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Netect Email Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANEXPOSE%3ASNMP-PROBE.html">SCAN:NEXPOSE:SNMP-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: NeXpose Simple Network Management Protocol Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANEXPOSE%3ASQLD-PROBE.html">SCAN:NEXPOSE:SQLD-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: NeXpose SQLd Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANEXPOSE%3ATFTP-PROBE.html">SCAN:NEXPOSE:TFTP-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: NeXpose TFTP Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANIKTO%3AURL.html">SCAN:NIKTO:URL</a></b></td>
   <td width="500" valign="top">
    SCAN: Nikto URL test
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANIKTO%3AUSER-AGENT.html">SCAN:NIKTO:USER-AGENT</a></b></td>
   <td width="500" valign="top">
    SCAN: Nikto Scanner User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANMAP%3AFINGERPRINT.html">SCAN:NMAP:FINGERPRINT</a></b></td>
   <td width="500" valign="top">
    SCAN: NMAP Fingerprint Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANMAP%3ANMAP-UDP-1.html">SCAN:NMAP:NMAP-UDP-1</a></b></td>
   <td width="500" valign="top">
    SCAN: NMAP UDP Scan Initiate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANMAP%3ANSE-HTTP-UA.html">SCAN:NMAP:NSE-HTTP-UA</a></b></td>
   <td width="500" valign="top">
    SCAN: Nmap Scripting Engine HTTP User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ANMAP%3AXMAS.html">SCAN:NMAP:XMAS</a></b></td>
   <td width="500" valign="top">
    SCAN: NMAP XMAS TCP Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AOPENVAS-UA.html">SCAN:OPENVAS-UA</a></b></td>
   <td width="500" valign="top">
    SCAN: OpenVAS Scanner User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3APHP-CGI-RCE-ACTIVITY.html">SCAN:PHP-CGI-RCE-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    SCAN: PHP-CGI Remote Code Execution Scanner Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3APISS%3AFTP-SCAN.html">SCAN:PISS:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: pISS FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3APYSMBLIB.html">SCAN:PYSMBLIB</a></b></td>
   <td width="500" valign="top">
    SCAN: pysmb Library Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ARETINA%3AFTP.html">SCAN:RETINA:FTP</a></b></td>
   <td width="500" valign="top">
    SCAN: Retina FTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ARPVS%3AXSS-URL.html">SCAN:RPVS:XSS-URL</a></b></td>
   <td width="500" valign="top">
    SCAN: RVPS Code Injection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ARVSCAN%3AFTP.html">SCAN:RVSCAN:FTP</a></b></td>
   <td width="500" valign="top">
    SCAN: RVScan FTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ASAINT%3AFTP-SCAN.html">SCAN:SAINT:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Saint FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ASATAN%3AFTP-SCAN.html">SCAN:SATAN:FTP-SCAN</a></b></td>
   <td width="500" valign="top">
    SCAN: Satan FTP Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ASENTINEL%3ATELNET-SPOOF.html">SCAN:SENTINEL:TELNET-SPOOF</a></b></td>
   <td width="500" valign="top">
    SCAN: Sentinel Telnet Spoof
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3ASSH-RESEARCH%3AACTIVITY.html">SCAN:SSH-RESEARCH:ACTIVITY</a></b></td>
   <td width="500" valign="top">
    SCAN: SSH Version Mapper Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AW3AF.html">SCAN:W3AF</a></b></td>
   <td width="500" valign="top">
    SCAN: Web Application Attack and Audit Framework 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AWEBTRENDS%3AUDP-PROBE.html">SCAN:WEBTRENDS:UDP-PROBE</a></b></td>
   <td width="500" valign="top">
    SCAN: Webtrends UDP Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCAN%3AXPROBE%3AXPROBE-BADCODE.html">SCAN:XPROBE:XPROBE-BADCODE</a></b></td>
   <td width="500" valign="top">
    SCAN: Xprobe ICMP ECHO with Bad ICMP Code
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SCREENOS"></a>SCREENOS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3ACONNECT_CMS_PORT.html">SCREENOS:CONNECT_CMS_PORT</a></b></td>
   <td width="500" valign="top">
    IP: Attack Connect CMS Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3ACONNECT_SME_PORT.html">SCREENOS:CONNECT_SME_PORT</a></b></td>
   <td width="500" valign="top">
    IP: Attack Connect SME Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3ADENY_POLICY.html">SCREENOS:DENY_POLICY</a></b></td>
   <td width="500" valign="top">
    IP: Attack Deny Policy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_COMPONENT.html">SCREENOS:IDS_COMPONENT</a></b></td>
   <td width="500" valign="top">
    IP: IDS Component
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_ADDR_MSK_REP.html">SCREENOS:IDS_ICMP_ADDR_MSK_REP</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Address Mask Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_ADDR_MSK_REQ.html">SCREENOS:IDS_ICMP_ADDR_MSK_REQ</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Address Mask Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_ECHO_REPLY.html">SCREENOS:IDS_ICMP_ECHO_REPLY</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Echo Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_ECHO_REQUEST.html">SCREENOS:IDS_ICMP_ECHO_REQUEST</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Echo Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_FRAGMENT.html">SCREENOS:IDS_ICMP_FRAGMENT</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_HOST_UNREACH.html">SCREENOS:IDS_ICMP_HOST_UNREACH</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Host Unreachable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_INFO_REPLY.html">SCREENOS:IDS_ICMP_INFO_REPLY</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Information Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_INFO_REQUEST.html">SCREENOS:IDS_ICMP_INFO_REQUEST</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Information Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_PARA_PROB.html">SCREENOS:IDS_ICMP_PARA_PROB</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Parameter Problem
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_REDIRECT.html">SCREENOS:IDS_ICMP_REDIRECT</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Redirect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_SRC_QUENCH.html">SCREENOS:IDS_ICMP_SRC_QUENCH</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Source Quench
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_TIME_EXCEED.html">SCREENOS:IDS_ICMP_TIME_EXCEED</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Time Exceeded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_TS_REPLY.html">SCREENOS:IDS_ICMP_TS_REPLY</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Timestamp Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_ICMP_TS_REQUEST.html">SCREENOS:IDS_ICMP_TS_REQUEST</a></b></td>
   <td width="500" valign="top">
    IP:IDS ICMP Timestamp Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_BLOCK_FRAG.html">SCREENOS:IDS_IP_BLOCK_FRAG</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Block Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_LSR.html">SCREENOS:IDS_IP_OPT_LSR</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Loose Source Route
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_RECORD.html">SCREENOS:IDS_IP_OPT_RECORD</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Record Route
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_SCHT.html">SCREENOS:IDS_IP_OPT_SCHT</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Supplemental Channel Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_SSR.html">SCREENOS:IDS_IP_OPT_SSR</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Strict Source Route
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_STREAM.html">SCREENOS:IDS_IP_OPT_STREAM</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_OPT_TIMESTAMP.html">SCREENOS:IDS_IP_OPT_TIMESTAMP</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Option Timestamp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_IP_UNKNOWN_PROT.html">SCREENOS:IDS_IP_UNKNOWN_PROT</a></b></td>
   <td width="500" valign="top">
    IP:IDS IP Unknown Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_SYN_FRAG.html">SCREENOS:IDS_SYN_FRAG</a></b></td>
   <td width="500" valign="top">
    IP:IDS Syn Fragment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_TCP_FIN_NO_ACK.html">SCREENOS:IDS_TCP_FIN_NO_ACK</a></b></td>
   <td width="500" valign="top">
    IP:IDS TCP Fin No Ack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIDS_TCP_NO_FLAG.html">SCREENOS:IDS_TCP_NO_FLAG</a></b></td>
   <td width="500" valign="top">
    IP:IDS TCP No Flag
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AIP_SOURCE_ROUTE.html">SCREENOS:IP_SOURCE_ROUTE</a></b></td>
   <td width="500" valign="top">
    IP: Attack IP Source Route
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AMULTI_AUTH_FAIL.html">SCREENOS:MULTI_AUTH_FAIL</a></b></td>
   <td width="500" valign="top">
    IP: Attack Multi Authentication Fail
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SCREENOS%3AUDP_FLOOD.html">SCREENOS:UDP_FLOOD</a></b></td>
   <td width="500" valign="top">
    IP: Attack UDP Flood
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SHELLCODE"></a>SHELLCODE</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-HTTP-CL.html">SHELLCODE:ACTIVE:BIND-1-HTTP-CL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-HTTP-SR.html">SHELLCODE:ACTIVE:BIND-1-HTTP-SR</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-SMB-CTS.html">SHELLCODE:ACTIVE:BIND-1-SMB-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (SMB-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-SMB-STC.html">SHELLCODE:ACTIVE:BIND-1-SMB-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (SMB-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-TCP-CTS.html">SHELLCODE:ACTIVE:BIND-1-TCP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-TCP-STC.html">SHELLCODE:ACTIVE:BIND-1-TCP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-UDP-CTS.html">SHELLCODE:ACTIVE:BIND-1-UDP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-UDP-STC.html">SHELLCODE:ACTIVE:BIND-1-UDP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-TCP-CTS.html">SHELLCODE:ACTIVE:DCDR-1-TCP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-1-TCP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-1-UDP-CTS</a></b></td>
   <td width="500" valign="top">
    Shellcode: Decoder Loop 1 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-1-UDP-STC</a></b></td>
   <td width="500" valign="top">
    Shellcode: Decoder Loop 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-TCP-CTS.html">SHELLCODE:ACTIVE:DCDR-2-TCP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-2-TCP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-2-UDP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-2-UDP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-TCP-CTS.html">SHELLCODE:ACTIVE:DCDR-3-TCP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-3-TCP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-3-UDP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-3-UDP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER1-80-CL.html">SHELLCODE:ACTIVE:DECODER1-80-CL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER1-80-SV.html">SHELLCODE:ACTIVE:DECODER1-80-SV</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER2-80-CL.html">SHELLCODE:ACTIVE:DECODER2-80-CL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER2-80-SV.html">SHELLCODE:ACTIVE:DECODER2-80-SV</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER3-80-CL.html">SHELLCODE:ACTIVE:DECODER3-80-CL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER3-80-SV.html">SHELLCODE:ACTIVE:DECODER3-80-SV</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AJS-ESCAPE.html">SHELLCODE:ACTIVE:JS-ESCAPE</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Javascript Escaped Shell
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AJS-UNESCAPE.html">SHELLCODE:ACTIVE:JS-UNESCAPE</a></b></td>
   <td width="500" valign="top">
    Shellcode: Javascript &#39;Unescape&#39; Shellcode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-1-SMB.html">SHELLCODE:ACTIVE:REVERSE-1-SMB</a></b></td>
   <td width="500" valign="top">
    Shellcode: Reverse Shell 1 (SMB)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-1-TCP.html">SHELLCODE:ACTIVE:REVERSE-1-TCP</a></b></td>
   <td width="500" valign="top">
    Shellcode: Reverse Shell 1 (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-80-CTS.html">SHELLCODE:ACTIVE:REVERSE-80-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-80-STC.html">SHELLCODE:ACTIVE:REVERSE-80-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ARVRS-1-UDP-CLT.html">SHELLCODE:ACTIVE:RVRS-1-UDP-CLT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (UDP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ARVRS-1-UDP-STC.html">SHELLCODE:ACTIVE:RVRS-1-UDP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ABSDX86%3ASHELL-1-HTTP.html">SHELLCODE:BSDX86:SHELL-1-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OpenBSD Command Shell (Gobbles)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ABSDX86%3ASHELL-2-HTTP.html">SHELLCODE:BSDX86:SHELL-2-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: FreeBSD/OpenBSD/NetBSD Command Shell (Gobbles)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AHEX-ASCII-HEAPS-CHAR.html">SHELLCODE:HEX-ASCII-HEAPS-CHAR</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Hexadecimal encoding And Ascii Heapspray Characters Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AACTIVEX-OBFUS.html">SHELLCODE:JS:ACTIVEX-OBFUS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit JavaScript Obfuscation of ActiveX Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AALPHA-UPPER.html">SHELLCODE:JS:ALPHA-UPPER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE:  Malicious Javascript x86 OS agnostic alpha numeric upper case decoder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AASCII-HEX.html">SHELLCODE:JS:ASCII-HEX</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit JavaScript Obfuscation of Shell Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AAVOID-UTF8-TOLOWER.html">SHELLCODE:JS:AVOID-UTF8-TOLOWER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE:  Malicious Javascript  x86 OS agnostic avoid_utf8_tolower encoder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AFROMCHARCODE.html">SHELLCODE:JS:FROMCHARCODE</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: JavaScript Multiple FromCharCode Function Calls
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AHEX-ESCAPE.html">SHELLCODE:JS:HEX-ESCAPE</a></b></td>
   <td width="500" valign="top">
    HTTP: Javascript Hex Escaped Characters in Function Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AJSOBFU-NEW.html">SHELLCODE:JS:JSOBFU-NEW</a></b></td>
   <td width="500" valign="top">
    HTTP: Metasploit &quot;JSObfu.new&quot; JavaScript Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AMAL-ABOUT.html">SHELLCODE:JS:MAL-ABOUT</a></b></td>
   <td width="500" valign="top">
    HTTP: Metasploit Framework Malicious About JavaScript 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AMAL-UNESCAPE.html">SHELLCODE:JS:MAL-UNESCAPE</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Malicious Use of JavaScript Unescape
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AOBFUSCATION.html">SHELLCODE:JS:OBFUSCATION</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit JavaScript Obfuscation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AUNICODE-ENC.html">SHELLCODE:JS:UNICODE-ENC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Encoded Shellcode in Javascript
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STAGER.html">SHELLCODE:LINUX:ARMLE-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STGR-80C.html">SHELLCODE:LINUX:ARMLE-STGR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STGR-80S.html">SHELLCODE:LINUX:ARMLE-STGR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ACHMDSDW-HTTP.html">SHELLCODE:LINUX:CHMDSDW-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux/x86 Shadow File World Read/Write Enable over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ACHMOD-ROOT-RWX.html">SHELLCODE:LINUX:CHMOD-ROOT-RWX</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Generic x86 Root Directory RWX Enable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ACHMOD-SHADOW.html">SHELLCODE:LINUX:CHMOD-SHADOW</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux/x86 Shadow File World Read/Write Enable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AIPTABLES.html">SHELLCODE:LINUX:IPTABLES</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: IPTables Flush Security Bypass (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AIPTABLES-H.html">SHELLCODE:LINUX:IPTABLES-H</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: IPTables Flush Security Bypass (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AREBOOT.html">SHELLCODE:LINUX:REBOOT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Forced Reboot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ASSH-PORTFWD.html">SHELLCODE:LINUX:SSH-PORTFWD</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux/x86 SSH Port Forwarding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ASYSKILL.html">SHELLCODE:LINUX:SYSKILL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux sys_kill Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AUNLINK.html">SHELLCODE:LINUX:UNLINK</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux unlink autofsck Execute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AUNLINK-HTTP.html">SHELLCODE:LINUX:UNLINK-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux unlink autofsck Execute (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-80C.html">SHELLCODE:MIPS:BE-BYTEXORI-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-80S.html">SHELLCODE:MIPS:BE-BYTEXORI-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-CTS.html">SHELLCODE:MIPS:BE-BYTEXORI-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-STC.html">SHELLCODE:MIPS:BE-BYTEXORI-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-80C.html">SHELLCODE:MIPS:BE-LONGXOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-80S.html">SHELLCODE:MIPS:BE-LONGXOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-CTS.html">SHELLCODE:MIPS:BE-LONGXOR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-STC.html">SHELLCODE:MIPS:BE-LONGXOR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-80C.html">SHELLCODE:MIPS:LE-BYTEXORI-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-80S.html">SHELLCODE:MIPS:LE-BYTEXORI-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-CTS.html">SHELLCODE:MIPS:LE-BYTEXORI-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-STC.html">SHELLCODE:MIPS:LE-BYTEXORI-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-80C.html">SHELLCODE:MIPS:LE-LONGXOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-80S.html">SHELLCODE:MIPS:LE-LONGXOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-CTS.html">SHELLCODE:MIPS:LE-LONGXOR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-STC.html">SHELLCODE:MIPS:LE-LONGXOR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AALPHA2-GETEIP-CTS.html">SHELLCODE:MSF:ALPHA2-GETEIP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AALPHA2-GETEIP-STC.html">SHELLCODE:MSF:ALPHA2-GETEIP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-80C.html">SHELLCODE:MSF:DCX86-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-80S.html">SHELLCODE:MSF:DCX86-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-CTS.html">SHELLCODE:MSF:DCX86-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for x86 (TCP-CTS1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-STC.html">SHELLCODE:MSF:DCX86-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for x86 (TCP-STC2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-UDP1.html">SHELLCODE:MSF:DCX86-UDP1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 (UDP-CTS1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-UDP2.html">SHELLCODE:MSF:DCX86-UDP2</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 (UDP-STC2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AFTENV-SMB1.html">SHELLCODE:MSF:FTENV-SMB1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Execution (x86/fnstenv_mov) Shellcode (SMB-CTS1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AFTENV-SMB2.html">SHELLCODE:MSF:FTENV-SMB2</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Execution (x86/fnstenv_mov) Shellcode (SMB-STC2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AGEN-FTP.html">SHELLCODE:MSF:GEN-FTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: MetaSploit FTP Based Generic Attacks
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AGREENDAM.html">SHELLCODE:MSF:GREENDAM</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit GreenDam Overflow Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AJAVA-APP.html">SHELLCODE:MSF:JAVA-APP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Framework Java Applet Shellcode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AJAVA-JAR.html">SHELLCODE:MSF:JAVA-JAR</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Framework Java Archive Shellcode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-CTS.html">SHELLCODE:MSF:PEXALPHANUM-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-CTS-1.html">SHELLCODE:MSF:PEXALPHANUM-CTS-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-CTS-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-STC.html">SHELLCODE:MSF:PEXALPHANUM-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXCALL-CTS.html">SHELLCODE:MSF:PEXCALL-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXCALL-STC.html">SHELLCODE:MSF:PEXCALL-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APROPSPRAY.html">SHELLCODE:MSF:PROPSPRAY</a></b></td>
   <td width="500" valign="top">
    HTTP: Metasploit js_property_spray Heap Spraying Technique
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AOSX%3AARMLE-STAGER.html">SHELLCODE:OSX:ARMLE-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX ARMLE Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-80C.html">SHELLCODE:PHP:BASE64-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-80S.html">SHELLCODE:PHP:BASE64-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-CTS.html">SHELLCODE:PHP:BASE64-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-STC.html">SHELLCODE:PHP:BASE64-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3AREVERSE-SHELL.html">SHELLCODE:PHP:REVERSE-SHELL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: PHP Reverse Shell
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ASHELL-URI.html">SHELLCODE:PHP:SHELL-URI</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: PHPShell Haxplorer URI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3AAIX-STAGER.html">SHELLCODE:PPC:AIX-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: AIX PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALIN-GNRC-STGR-80C.html">SHELLCODE:PPC:LIN-GNRC-STGR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALIN-GNRC-STGR-80S.html">SHELLCODE:PPC:LIN-GNRC-STGR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALINUX-GNRC-STAGER.html">SHELLCODE:PPC:LINUX-GNRC-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-80C.html">SHELLCODE:PPC:LONGXOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-80S.html">SHELLCODE:PPC:LONGXOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-CTS.html">SHELLCODE:PPC:LONGXOR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-STC.html">SHELLCODE:PPC:LONGXOR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-80C.html">SHELLCODE:PPC:LONGXOR-TAG-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-80S.html">SHELLCODE:PPC:LONGXOR-TAG-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-CTS.html">SHELLCODE:PPC:LONGXOR-TAG-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-STC.html">SHELLCODE:PPC:LONGXOR-TAG-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APPC%3AOSX-STAGER.html">SHELLCODE:PPC:OSX-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-HTTP.html">SHELLCODE:PREPENDENCODER-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-HTTP-1.html">SHELLCODE:PREPENDENCODER-HTTP-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection Over HTTP (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-TCP.html">SHELLCODE:PREPENDENCODER-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABIN-KSH.html">SHELLCODE:SPARC:BIN-KSH</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Solaris /bin/ksh Execute
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABSD-BIND-TCP.html">SHELLCODE:SPARC:BSD-BIND-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABSD-REVERSE-TCP.html">SHELLCODE:SPARC:BSD-REVERSE-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-80C.html">SHELLCODE:SPARC:LONGXORTAG-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-80S.html">SHELLCODE:SPARC:LONGXORTAG-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-CTS.html">SHELLCODE:SPARC:LONGXORTAG-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-STC.html">SHELLCODE:SPARC:LONGXORTAG-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ASOLARIS-STAGER.html">SHELLCODE:SPARC:SOLARIS-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Solaris sparc Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3AWRITE-EXIT.html">SHELLCODE:SPARC:WRITE-EXIT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Solaris write and exit System Calls
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-EXPTERM.html">SHELLCODE:WIN:7-EXPTERM</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Explorer Termination
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-SHUTDOWN.html">SHELLCODE:WIN:7-SHUTDOWN</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Force Shutdown
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-TASKMGR.html">SHELLCODE:WIN:7-TASKMGR</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Disable Task Manager
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3APARTITION-FMT.html">SHELLCODE:WIN:PARTITION-FMT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Partitions Format Shellcode of Death
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHELL-PROMPT.html">SHELLCODE:WIN:SHELL-PROMPT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Microsoft Windows CMD.EXE Prompt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATA-GANAI-CTS.html">SHELLCODE:WIN:SHIKATA-GANAI-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATA-GANAI-STC.html">SHELLCODE:WIN:SHIKATA-GANAI-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-21C.html">SHELLCODE:WIN:SHIKATAGANAI-21C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over FTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-80C.html">SHELLCODE:WIN:SHIKATAGANAI-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-80S.html">SHELLCODE:WIN:SHIKATAGANAI-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-HTTP.html">SHELLCODE:WIN:SHIKATAGANAI-HTTP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASMB-REM-EXEC1.html">SHELLCODE:WIN:SMB-REM-EXEC1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Remote Execute Command (Little Endian)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASMB-REM-EXEC2.html">SHELLCODE:WIN:SMB-REM-EXEC2</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Remote Execute Command (Big Endian)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALIN-SHEL-BIND-80C.html">SHELLCODE:X64:LIN-SHEL-BIND-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALIN-SHEL-BIND-80S.html">SHELLCODE:X64:LIN-SHEL-BIND-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-FIND-PORT.html">SHELLCODE:X64:LINUX-FIND-PORT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-80C.html">SHELLCODE:X64:LINUX-REVERSE-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-80S.html">SHELLCODE:X64:LINUX-REVERSE-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-TCP.html">SHELLCODE:X64:LINUX-REVERSE-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-SHELL-BIND.html">SHELLCODE:X64:LINUX-SHELL-BIND</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AOSX-STAGER.html">SHELLCODE:X64:OSX-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX x64 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER.html">SHELLCODE:X64:WIN-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER-80C.html">SHELLCODE:X64:WIN-STAGER-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER-80S.html">SHELLCODE:X64:WIN-STAGER-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-80C.html">SHELLCODE:X64:XOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-80S.html">SHELLCODE:X64:XOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-CTS.html">SHELLCODE:X64:XOR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-STC.html">SHELLCODE:X64:XOR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-80C.html">SHELLCODE:X86:ADD-SUB-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-80S.html">SHELLCODE:X86:ADD-SUB-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-CTS.html">SHELLCODE:X86:ADD-SUB-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-STC.html">SHELLCODE:X86:ADD-SUB-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S1.html">SHELLCODE:X86:ALPHA-GETEIP-80S1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S2.html">SHELLCODE:X86:ALPHA-GETEIP-80S2</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S3.html">SHELLCODE:X86:ALPHA-GETEIP-80S3</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S4.html">SHELLCODE:X86:ALPHA-GETEIP-80S4</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S5.html">SHELLCODE:X86:ALPHA-GETEIP-80S5</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S6.html">SHELLCODE:X86:ALPHA-GETEIP-80S6</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-GETEIP-80S7.html">SHELLCODE:X86:ALPHA-GETEIP-80S7</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC-7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-80C.html">SHELLCODE:X86:ALPHA-MIXED-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-80S.html">SHELLCODE:X86:ALPHA-MIXED-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over HTTP STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-CTS.html">SHELLCODE:X86:ALPHA-MIXED-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-STC.html">SHELLCODE:X86:ALPHA-MIXED-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit X86 alpha_mixed Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-80C.html">SHELLCODE:X86:ALPHA-UPPER-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-80S.html">SHELLCODE:X86:ALPHA-UPPER-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-CTS.html">SHELLCODE:X86:ALPHA-UPPER-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-STC.html">SHELLCODE:X86:ALPHA-UPPER-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA2-GETEIP-80C.html">SHELLCODE:X86:ALPHA2-GETEIP-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA2-GETEIP-80S.html">SHELLCODE:X86:ALPHA2-GETEIP-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA2-GETEIP-ENC.html">SHELLCODE:X86:ALPHA2-GETEIP-ENC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8-LWR-80C.html">SHELLCODE:X86:AVD-UTF8-LWR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8-LWR-80S.html">SHELLCODE:X86:AVD-UTF8-LWR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8TLWR-CTS.html">SHELLCODE:X86:AVD-UTF8TLWR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8TLWR-STC.html">SHELLCODE:X86:AVD-UTF8TLWR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-80C.html">SHELLCODE:X86:BASE64-NOOP-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-80S.html">SHELLCODE:X86:BASE64-NOOP-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-CTS.html">SHELLCODE:X86:BASE64-NOOP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-STC.html">SHELLCODE:X86:BASE64-NOOP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABIN-SH-TRANSFER.html">SHELLCODE:X86:BIN-SH-TRANSFER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Possible /bin/sh Shellcode Transfer Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-80C.html">SHELLCODE:X86:BLOXOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-80S.html">SHELLCODE:X86:BLOXOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-TCP-CTS.html">SHELLCODE:X86:BLOXOR-TCP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-TCP-STC.html">SHELLCODE:X86:BLOXOR-TCP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-BIND-IPV6-TCP.html">SHELLCODE:X86:BSD-BIND-IPV6-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Bind IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-BIND-TCP.html">SHELLCODE:X86:BSD-BIND-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-EXEC.html">SHELLCODE:X86:BSD-EXEC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Exec Metasploit Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-FIND-PORT.html">SHELLCODE:X86:BSD-FIND-PORT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-FIND-TAG.html">SHELLCODE:X86:BSD-FIND-TAG</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-REV-IPV6.html">SHELLCODE:X86:BSD-REV-IPV6</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD Reverse IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-REVERSE-TCP.html">SHELLCODE:X86:BSD-REVERSE-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSD x86 Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSDI-STAGER.html">SHELLCODE:X86:BSDI-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: BSDI x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-80C.html">SHELLCODE:X86:CONTEXT-CPUID-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-80S.html">SHELLCODE:X86:CONTEXT-CPUID-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-CTS.html">SHELLCODE:X86:CONTEXT-CPUID-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-STC.html">SHELLCODE:X86:CONTEXT-CPUID-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-80C.html">SHELLCODE:X86:CONTEXT-STAT-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-80S.html">SHELLCODE:X86:CONTEXT-STAT-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-CTS.html">SHELLCODE:X86:CONTEXT-STAT-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-STC.html">SHELLCODE:X86:CONTEXT-STAT-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-80C.html">SHELLCODE:X86:CONTEXT-TIME-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-80S.html">SHELLCODE:X86:CONTEXT-TIME-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-CTS.html">SHELLCODE:X86:CONTEXT-TIME-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-STC.html">SHELLCODE:X86:CONTEXT-TIME-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-80C.html">SHELLCODE:X86:COUNTDOWN-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-80S.html">SHELLCODE:X86:COUNTDOWN-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-CTS.html">SHELLCODE:X86:COUNTDOWN-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-STC.html">SHELLCODE:X86:COUNTDOWN-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-80C.html">SHELLCODE:X86:DWORD-ADITIVE-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-80S.html">SHELLCODE:X86:DWORD-ADITIVE-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-CTS.html">SHELLCODE:X86:DWORD-ADITIVE-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-STC.html">SHELLCODE:X86:DWORD-ADITIVE-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-80C.html">SHELLCODE:X86:FLDZ-GET-EIP-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-80S.html">SHELLCODE:X86:FLDZ-GET-EIP-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-CTS.html">SHELLCODE:X86:FLDZ-GET-EIP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-STC.html">SHELLCODE:X86:FLDZ-GET-EIP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80C.html">SHELLCODE:X86:FNSTENV-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80C-1.html">SHELLCODE:X86:FNSTENV-80C-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-CTS(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80S.html">SHELLCODE:X86:FNSTENV-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80S-1.html">SHELLCODE:X86:FNSTENV-80S-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-STC(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-CTS.html">SHELLCODE:X86:FNSTENV-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-CTS-1.html">SHELLCODE:X86:FNSTENV-CTS-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-CTS(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-STC.html">SHELLCODE:X86:FNSTENV-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-STC-1.html">SHELLCODE:X86:FNSTENV-STC-1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-STC(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-80C.html">SHELLCODE:X86:GETEIP-XOR-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-80S.html">SHELLCODE:X86:GETEIP-XOR-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-CTS.html">SHELLCODE:X86:GETEIP-XOR-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-STC.html">SHELLCODE:X86:GETEIP-XOR-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-80C.html">SHELLCODE:X86:JMPCALLADTIVE-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-80S.html">SHELLCODE:X86:JMPCALLADTIVE-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-CTS.html">SHELLCODE:X86:JMPCALLADTIVE-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-STC.html">SHELLCODE:X86:JMPCALLADTIVE-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AKADMIND-BOF.html">SHELLCODE:X86:KADMIND-BOF</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Kadmind Buffer Overflow Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-IPV6-80C.html">SHELLCODE:X86:LIN-BIND-IPV6-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-IPV6-80S.html">SHELLCODE:X86:LIN-BIND-IPV6-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-NONX-80C.html">SHELLCODE:X86:LIN-BIND-NONX-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-NONX-80S.html">SHELLCODE:X86:LIN-BIND-NONX-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-IPV6-80C.html">SHELLCODE:X86:LIN-REV-IPV6-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-IPV6-80S.html">SHELLCODE:X86:LIN-REV-IPV6-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-NONX-80C.html">SHELLCODE:X86:LIN-REV-NONX-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-NONX-80S.html">SHELLCODE:X86:LIN-REV-NONX-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-SHELL-REV-80C.html">SHELLCODE:X86:LIN-SHELL-REV-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-SHELL-REV-80S.html">SHELLCODE:X86:LIN-SHELL-REV-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-80C.html">SHELLCODE:X86:LINUX-BIND-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-80S.html">SHELLCODE:X86:LINUX-BIND-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-IPV6.html">SHELLCODE:X86:LINUX-BIND-IPV6</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-MSF.html">SHELLCODE:X86:LINUX-BIND-MSF</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-NONX.html">SHELLCODE:X86:LINUX-BIND-NONX</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-TCP.html">SHELLCODE:X86:LINUX-BIND-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FIND-PORT.html">SHELLCODE:X86:LINUX-FIND-PORT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FIND-TAG.html">SHELLCODE:X86:LINUX-FIND-TAG</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-PRT-80C.html">SHELLCODE:X86:LINUX-FND-PRT-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-PRT-80S.html">SHELLCODE:X86:LINUX-FND-PRT-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-TAG-80C.html">SHELLCODE:X86:LINUX-FND-TAG-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-TAG-80S.html">SHELLCODE:X86:LINUX-FND-TAG-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REV-IPV6.html">SHELLCODE:X86:LINUX-REV-IPV6</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REV-NONX.html">SHELLCODE:X86:LINUX-REV-NONX</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REVERSE-TCP.html">SHELLCODE:X86:LINUX-REVERSE-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-SHELL-REV.html">SHELLCODE:X86:LINUX-SHELL-REV</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AMETASPLOIT-X86-EN.html">SHELLCODE:X86:METASPLOIT-X86-EN</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AMETERPRET-ESPIA1.html">SHELLCODE:X86:METERPRET-ESPIA1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Meterpreter Espia Attempt 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AMETERPRET-ESPIA2.html">SHELLCODE:X86:METERPRET-ESPIA2</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Meterpreter Espia Attempt 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AMETERPRETER-ESPIA.html">SHELLCODE:X86:METERPRETER-ESPIA</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Meterpreter Espia Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AMSF-X86-ADD-SUB.html">SHELLCODE:X86:MSF-X86-ADD-SUB</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-80C.html">SHELLCODE:X86:NONALPHAUPPER-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-80S.html">SHELLCODE:X86:NONALPHAUPPER-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-CTS.html">SHELLCODE:X86:NONALPHAUPPER-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-STC.html">SHELLCODE:X86:NONALPHAUPPER-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-BIND-TCP.html">SHELLCODE:X86:OSX-BIND-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-FIND-PORT.html">SHELLCODE:X86:OSX-FIND-PORT</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-REVERSE-TCP.html">SHELLCODE:X86:OSX-REVERSE-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXALPHANUM-80C.html">SHELLCODE:X86:PEXALPHANUM-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXALPHANUM-80S.html">SHELLCODE:X86:PEXALPHANUM-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXCALL-80C.html">SHELLCODE:X86:PEXCALL-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXCALL-80S.html">SHELLCODE:X86:PEXCALL-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APIECEMEAL.html">SHELLCODE:X86:PIECEMEAL</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Piecemeal Exploit Shellcode Construction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APIECEMEAL1.html">SHELLCODE:X86:PIECEMEAL1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Piecemeal Exploit Shellcode Construction 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-80C.html">SHELLCODE:X86:REVERS-CONECT-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-80S.html">SHELLCODE:X86:REVERS-CONECT-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-CTS.html">SHELLCODE:X86:REVERS-CONECT-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-STC.html">SHELLCODE:X86:REVERS-CONECT-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASGI-NOOP.html">SHELLCODE:X86:SGI-NOOP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: SGI NOOP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-80C.html">SHELLCODE:X86:SINGLSTATCBIT-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-80S.html">SHELLCODE:X86:SINGLSTATCBIT-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-STC.html">SHELLCODE:X86:SINGLSTATCBIT-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATICBT-CTS.html">SHELLCODE:X86:SINGLSTATICBT-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASOLARIS-STAGER.html">SHELLCODE:X86:SOLARIS-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Solaris x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASPARC-NOOP.html">SHELLCODE:X86:SPARC-NOOP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Sparc NOOP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUDP-ENCODER.html">SHELLCODE:X86:UDP-ENCODER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Multiple Encoder For UDP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNESCAPE-ENC.html">SHELLCODE:X86:UNESCAPE-ENC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Unescape Encoded Shellcode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNESCAPE-ENC1.html">SHELLCODE:X86:UNESCAPE-ENC1</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Unescape Encoded Shellcode 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-80C.html">SHELLCODE:X86:UNICODE-MIXED-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-80S.html">SHELLCODE:X86:UNICODE-MIXED-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-CTS.html">SHELLCODE:X86:UNICODE-MIXED-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-STC.html">SHELLCODE:X86:UNICODE-MIXED-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-80C.html">SHELLCODE:X86:UNICODE-UPPER-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-80S.html">SHELLCODE:X86:UNICODE-UPPER-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-CTS.html">SHELLCODE:X86:UNICODE-UPPER-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-STC.html">SHELLCODE:X86:UNICODE-UPPER-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-BIND-IPV6-80C.html">SHELLCODE:X86:WIN-BIND-IPV6-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Bind IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG.html">SHELLCODE:X86:WIN-FIND-TAG</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG-80C.html">SHELLCODE:X86:WIN-FIND-TAG-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG-80S.html">SHELLCODE:X86:WIN-FIND-TAG-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP.html">SHELLCODE:X86:WIN-NONX-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP-80C.html">SHELLCODE:X86:WIN-NONX-TCP-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP-80S.html">SHELLCODE:X86:WIN-NONX-TCP-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-80C.html">SHELLCODE:X86:WIN-REV-ORD-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-80S.html">SHELLCODE:X86:WIN-REV-ORD-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-TCP.html">SHELLCODE:X86:WIN-REV-ORD-TCP</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SHELL-XPFW.html">SHELLCODE:X86:WIN-SHELL-XPFW</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Disable Windows ICF Bind TCP Shell Metasploit Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SHLL-XPFW-80S.html">SHELLCODE:X86:WIN-SHLL-XPFW-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Disable Windows ICF Bind TCP Shell Metasploit Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWN-80C.html">SHELLCODE:X86:WIN-SPEAK-PWN-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned! Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWN-80S.html">SHELLCODE:X86:WIN-SPEAK-PWN-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned! Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWNED.html">SHELLCODE:X86:WIN-SPEAK-PWNED</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned!
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER.html">SHELLCODE:X86:WIN-STAGER</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER-80C.html">SHELLCODE:X86:WIN-STAGER-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER-80S.html">SHELLCODE:X86:WIN-STAGER-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN2K-2K3-CTS.html">SHELLCODE:X86:WIN2K-2K3-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 win2k-2k3 Decoder Base Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-80C.html">SHELLCODE:X86:WIN32-ENUM-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-80S.html">SHELLCODE:X86:WIN32-ENUM-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-CTS.html">SHELLCODE:X86:WIN32-ENUM-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-STC.html">SHELLCODE:X86:WIN32-ENUM-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-80C.html">SHELLCODE:X86:X86-NOOP1-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-80S.html">SHELLCODE:X86:X86-NOOP1-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-CTS.html">SHELLCODE:X86:X86-NOOP1-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-STC.html">SHELLCODE:X86:X86-NOOP1-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-CTS.html">SHELLCODE:X86:X90-NOOP-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-HTTP-HDR.html">SHELLCODE:X86:X90-NOOP-HTTP-HDR</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide In HTTP Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-HTTP-REQ.html">SHELLCODE:X86:X90-NOOP-HTTP-REQ</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (HTTP-Request)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-STC.html">SHELLCODE:X86:X90-NOOP-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-80C.html">SHELLCODE:X86:XOR-DWORD-80C</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-80S.html">SHELLCODE:X86:XOR-DWORD-80S</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-CTS.html">SHELLCODE:X86:XOR-DWORD-CTS</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-STC.html">SHELLCODE:X86:XOR-DWORD-STC</a></b></td>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SMB"></a>SMB</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ABRUTE-LOGIN.html">SMB:AUDIT:BRUTE-LOGIN</a></b></td>
   <td width="500" valign="top">
    SMB: Brute Force Login Attempt to enumerate SMB shares
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ADCERPC-UNEXPECTED-RSP.html">SMB:AUDIT:DCERPC-UNEXPECTED-RSP</a></b></td>
   <td width="500" valign="top">
    SMB: DCERPC Unexpected Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AEXP-NEG.html">SMB:AUDIT:EXP-NEG</a></b></td>
   <td width="500" valign="top">
    SMB: Expected Negotiate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AEXT-SEC-DISABLED.html">SMB:AUDIT:EXT-SEC-DISABLED</a></b></td>
   <td width="500" valign="top">
    SMB: Extended Security Disabled
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AINV-PROTOCOL.html">SMB:AUDIT:INV-PROTOCOL</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Protocol
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ALONG-ACCOUNT.html">SMB:AUDIT:LONG-ACCOUNT</a></b></td>
   <td width="500" valign="top">
    SMB: Overlong Account
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ANT-LM-0.12.html">SMB:AUDIT:NT-LM-0.12</a></b></td>
   <td width="500" valign="top">
    SMB: NT LM 0.12
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ANULL-ACCOUNT.html">SMB:AUDIT:NULL-ACCOUNT</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Account
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ANULL-DOMAIN.html">SMB:AUDIT:NULL-DOMAIN</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Domain
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ANULL-NVE-LM.html">SMB:AUDIT:NULL-NVE-LM</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Native LANMAN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3ANULL-NVE-OS.html">SMB:AUDIT:NULL-NVE-OS</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Native OS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AOLD-VERSION.html">SMB:AUDIT:OLD-VERSION</a></b></td>
   <td width="500" valign="top">
    SMB: Outdated SMB Dialect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AUNEXP-REP.html">SMB:AUDIT:UNEXP-REP</a></b></td>
   <td width="500" valign="top">
    SMB: Unexpected Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AUNEXP-REQ.html">SMB:AUDIT:UNEXP-REQ</a></b></td>
   <td width="500" valign="top">
    SMB: Unexpected Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AUNK-CMD.html">SMB:AUDIT:UNK-CMD</a></b></td>
   <td width="500" valign="top">
    SMB: Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AUNK-DIALECT.html">SMB:AUDIT:UNK-DIALECT</a></b></td>
   <td width="500" valign="top">
    SMB: Unknown Dialect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AAUDIT%3AUNK-SHDR-TYPE.html">SMB:AUDIT:UNK-SHDR-TYPE</a></b></td>
   <td width="500" valign="top">
    SMB: Unknown Session Header Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ACLIENT-MESSAGE-OF.html">SMB:CLIENT-MESSAGE-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB2 Client Message Size Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ACLIENT-POOL-CORR.html">SMB:CLIENT-POOL-CORR</a></b></td>
   <td width="500" valign="top">
    SMB: Client Pool Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ACONNECT-FROM-LOCALHOST.html">SMB:CONNECT-FROM-LOCALHOST</a></b></td>
   <td width="500" valign="top">
    SMB: Remote Connection from Localhost
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ACORE-DLL-REQ-VIA-SMB.html">SMB:CORE-DLL-REQ-VIA-SMB</a></b></td>
   <td width="500" valign="top">
    SMB: Corel Path Subversion Arbitrary DLL Injection Code Execution 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ADCE-RPC-FRAG-EXP-PAYLOAD.html">SMB:DCE-RPC-FRAG-EXP-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    SMB: DCE/RPC Fragmented Packets with Exploit Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ADCE-RPC-FRAG-MAL-PAYLOAD.html">SMB:DCE-RPC-FRAG-MAL-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    SMB: DCE/RPC Fragmented Packets with Malicious Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ADOUBLE-NEGO-RESP.html">SMB:DOUBLE-NEGO-RESP</a></b></td>
   <td width="500" valign="top">
    SMB: Redundant Negotiation Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ADUPLICATE-SESSION.html">SMB:DUPLICATE-SESSION</a></b></td>
   <td width="500" valign="top">
    SMB: Duplicate Session
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AENUM%3ANAME-LOOKUP.html">SMB:ENUM:NAME-LOOKUP</a></b></td>
   <td width="500" valign="top">
    SMB: Name Lookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AENUM%3ANETSESSION.html">SMB:ENUM:NETSESSION</a></b></td>
   <td width="500" valign="top">
    SMB: NetSession Enumeration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AERROR%3AGRIND.html">SMB:ERROR:GRIND</a></b></td>
   <td width="500" valign="top">
    SMB: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AERROR%3AINV-MSG-LEN.html">SMB:ERROR:INV-MSG-LEN</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Message Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AERROR%3AMAL-MSG.html">SMB:ERROR:MAL-MSG</a></b></td>
   <td width="500" valign="top">
    SMB: Malformed Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AERROR%3AMULTI-HEADERS.html">SMB:ERROR:MULTI-HEADERS</a></b></td>
   <td width="500" valign="top">
    SMB: Multiple SMB Headers Per Session
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ACVE-2015-0240-RCE.html">SMB:EXPLOIT:CVE-2015-0240-RCE</a></b></td>
   <td width="500" valign="top">
    SMB: Samba CVE-2015-0240 ServerPasswordSet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ADOT-JOB.html">SMB:EXPLOIT:DOT-JOB</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Task Scheduler (.job) File Copy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AFLASH-CHROME-BREAK.html">SMB:EXPLOIT:FLASH-CHROME-BREAK</a></b></td>
   <td width="500" valign="top">
    SMB: Adobe Flash Player Google Chrome Sandbox Breakout Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AFOLDER-COM-EXEC.html">SMB:EXPLOIT:FOLDER-COM-EXEC</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Explorer Shared Folder COM Object Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AGREENAPPLE.html">SMB:EXPLOIT:GREENAPPLE</a></b></td>
   <td width="500" valign="top">
    SMB: Windows SMB Client Transaction Response Handling Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AGREENAPPLE-2.html">SMB:EXPLOIT:GREENAPPLE-2</a></b></td>
   <td width="500" valign="top">
    SMB: Windows SMB Client Transaction Response Handling Vulnerability (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AISS-ACCOUNTNAME-OF.html">SMB:EXPLOIT:ISS-ACCOUNTNAME-OF</a></b></td>
   <td width="500" valign="top">
    SMB: ISS AccountName Overflow Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ALANMAN-NUKE.html">SMB:EXPLOIT:LANMAN-NUKE</a></b></td>
   <td width="500" valign="top">
    SMB: Lanman Nuke
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ALINUX-TRANS2-OF.html">SMB:EXPLOIT:LINUX-TRANS2-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Linux Kernel SMBFS trans2 Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ALLS-NAME.html">SMB:EXPLOIT:LLS-NAME</a></b></td>
   <td width="500" valign="top">
    SMB: License Logging Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AMAL-JPEG-DL.html">SMB:EXPLOIT:MAL-JPEG-DL</a></b></td>
   <td width="500" valign="top">
    SMB: Malformed JPEG Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AMPLAYER-SAMI.html">SMB:EXPLOIT:MPLAYER-SAMI</a></b></td>
   <td width="500" valign="top">
    SMB: MPlayer SAMI Subtitle sub_read_line_sami Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AMS-2015-0096-CE.html">SMB:EXPLOIT:MS-2015-0096-CE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows CVE-2015-0096 Remote Code Exectution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ANULL-FILENAME.html">SMB:EXPLOIT:NULL-FILENAME</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ANULL-PATH.html">SMB:EXPLOIT:NULL-PATH</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Path
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ANULL-SERVICE.html">SMB:EXPLOIT:NULL-SERVICE</a></b></td>
   <td width="500" valign="top">
    SMB: NULL Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3APRINT-SPOOL-BYPASS.html">SMB:EXPLOIT:PRINT-SPOOL-BYPASS</a></b></td>
   <td width="500" valign="top">
    SMB: Windows Print Spooler Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AREGISTRY-DOS.html">SMB:EXPLOIT:REGISTRY-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Remote Registry Request DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASAMBA-DIR-TRAV.html">SMB:EXPLOIT:SAMBA-DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB-MULTI-DOS.html">SMB:EXPLOIT:SMB-MULTI-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Multiple Remote Denial of Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB-SHRE-NAME-OFLOW.html">SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW</a></b></td>
   <td width="500" valign="top">
    SMB: Share Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB1-CHAINING-MC.html">SMB:EXPLOIT:SMB1-CHAINING-MC</a></b></td>
   <td width="500" valign="top">
    SMB: Samba SMB1 Packets Chaining Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB2-ZERO-LEN-WRT.html">SMB:EXPLOIT:SMB2-ZERO-LEN-WRT</a></b></td>
   <td width="500" valign="top">
    SMB: SMB2 Zero Length Write
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMBDIE.html">SMB:EXPLOIT:SMBDIE</a></b></td>
   <td width="500" valign="top">
    SMB: SMBdie Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASRV-RENAME-CE.html">SMB:EXPLOIT:SRV-RENAME-CE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Server Service SMB Rename Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ATRANS2-MDL-CHUNK.html">SMB:EXPLOIT:TRANS2-MDL-CHUNK</a></b></td>
   <td width="500" valign="top">
    SMB: Trans2 Response Chunk mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AWILD-FILE-DOS.html">SMB:EXPLOIT:WILD-FILE-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Wildcard Filename DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AWINBLAST-DOS.html">SMB:EXPLOIT:WINBLAST-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Winblast DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AEXT%3ADOT-ZIP.html">SMB:EXT:DOT-ZIP</a></b></td>
   <td width="500" valign="top">
    SMB: ZIP File Connection Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AAUTORUN.INF-COPY.html">SMB:FILE:AUTORUN.INF-COPY</a></b></td>
   <td width="500" valign="top">
    SMB: autorun.inf File Copy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3ACRAFTED-NAME-RCE.html">SMB:FILE:CRAFTED-NAME-RCE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Crafted File Name Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3ADLL-TRANSFER.html">SMB:FILE:DLL-TRANSFER</a></b></td>
   <td width="500" valign="top">
    SMB: DLL File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AEICAR-COPY.html">SMB:FILE:EICAR-COPY</a></b></td>
   <td width="500" valign="top">
    SMB: EICAR Antivirus Test File Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AMS-INSECUR-LIB-LOAD.html">SMB:FILE:MS-INSECUR-LIB-LOAD</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows CVE-2016-0018 Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AMS-OBJ-PACKAGER.html">SMB:FILE:MS-OBJ-PACKAGER</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Object Packager Insecure Executable Launching
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3ANAME-INV-CHARS.html">SMB:FILE:NAME-INV-CHARS</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Characters in Windows File Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3ASANDWORM-RCE.html">SMB:FILE:SANDWORM-RCE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Office SandWorm Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AWEB-VIEW-DOC-SCR-INJ.html">SMB:FILE:WEB-VIEW-DOC-SCR-INJ</a></b></td>
   <td width="500" valign="top">
    SMB: Windows WebView Word Doc Script Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFILE%3AWIRESHARK-INSECUREPATH.html">SMB:FILE:WIRESHARK-INSECUREPATH</a></b></td>
   <td width="500" valign="top">
    SMB: Wireshark Insecure Search Path Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFRAG-EXP-CODE.html">SMB:FRAG-EXP-CODE</a></b></td>
   <td width="500" valign="top">
    SMB: Fragmented Packets with Exploit Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AFRAG-MALICIOUS-PAYLOAD.html">SMB:FRAG-MALICIOUS-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    SMB: Fragmented Packets with Malicious Payload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AHTTP-PAYLOAD.html">SMB:HTTP-PAYLOAD</a></b></td>
   <td width="500" valign="top">
    SMB: HTTP Payload Inside SMB Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ADOT-EXE-FILE-XFER.html">SMB:INFO:DOT-EXE-FILE-XFER</a></b></td>
   <td width="500" valign="top">
    SMB: .exe File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ALANMAN-1.0.html">SMB:INFO:LANMAN-1.0</a></b></td>
   <td width="500" valign="top">
    SMB: LANMAN 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ALANMAN-1.2X002.html">SMB:INFO:LANMAN-1.2X002</a></b></td>
   <td width="500" valign="top">
    SMB: LANMAN 1.2x002
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ALANMAN-2.1.html">SMB:INFO:LANMAN-2.1</a></b></td>
   <td width="500" valign="top">
    SMB: LANMAN 2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3AMSNET-1.03.html">SMB:INFO:MSNET-1.03</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Networks 1.03
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ANEG-FAILED.html">SMB:INFO:NEG-FAILED</a></b></td>
   <td width="500" valign="top">
    SMB: Negotiate Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3ANULL-GSS-TOKEN.html">SMB:INFO:NULL-GSS-TOKEN</a></b></td>
   <td width="500" valign="top">
    SMB: null GSS token
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3APCLAN-1.0.html">SMB:INFO:PCLAN-1.0</a></b></td>
   <td width="500" valign="top">
    SMB: PC LAN 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3AWFWGRP-3.1A.html">SMB:INFO:WFWGRP-3.1A</a></b></td>
   <td width="500" valign="top">
    SMB: Windows for Workgroups 3.1a
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINFO%3AXENIX-CORE.html">SMB:INFO:XENIX-CORE</a></b></td>
   <td width="500" valign="top">
    SMB: XENIX CORE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AINTERNET-PRINT-SVC-INT-OF.html">SMB:INTERNET-PRINT-SVC-INT-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Internet Printing Service Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMAILSLOT-OF.html">SMB:MAILSLOT-OF</a></b></td>
   <td width="500" valign="top">
    SMB: MAILSLOT Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMAL-WIN-BRIEFCASE.html">SMB:MAL-WIN-BRIEFCASE</a></b></td>
   <td width="500" valign="top">
    SMB: Windows Briefcase Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMICROSOFT-LIB-LOADING-CE.html">SMB:MICROSOFT-LIB-LOADING-CE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Media Device Manager Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-ELS-LIB-LOAD.html">SMB:MS-ELS-LIB-LOAD</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Els.dll Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-IE-IESHIMS-DLL-CE.html">SMB:MS-IE-IESHIMS-DLL-CE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Internet Explorer 8 IESHIMS.DLL Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-RAP-DOS.html">SMB:MS-RAP-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Remote Administration Protocol Denial of Service 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-RAP-HEAP-OV.html">SMB:MS-RAP-HEAP-OV</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Remote Administration Protocol Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-RAP-STACK-OV.html">SMB:MS-RAP-STACK-OV</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Remote Administration Protocol Stack Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-TELNET-INSECURE-LOADING.html">SMB:MS-TELNET-INSECURE-LOADING</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Telnet Protocol Handler Insecure Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-WIN-2000-LANMAN-DOS.html">SMB:MS-WIN-2000-LANMAN-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows 2000 Lanman Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-WIN-2000-LANMAN-UDP-DOS.html">SMB:MS-WIN-2000-LANMAN-UDP-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows 2000 Lanman UDP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-WIN-VISTA-SP0-SMB-DOS.html">SMB:MS-WIN-VISTA-SP0-SMB-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Vista SP0 SMB Negotiate Protocol Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMS-WINDOWS-FILE-RCE.html">SMB:MS-WINDOWS-FILE-RCE</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows File Handling Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AMSSQL-DECLARE-EXEC.html">SMB:MSSQL-DECLARE-EXEC</a></b></td>
   <td width="500" valign="top">
    SMB: MS-SQL Declare Exec Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AGETPRINTERDATA-DOS.html">SMB:NETBIOS:GETPRINTERDATA-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Print Spooler GetPrinterData Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-CDNAME-ENC.html">SMB:NETBIOS:INV-CDNAME-ENC</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Called Name Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-CDNAME-LEN.html">SMB:NETBIOS:INV-CDNAME-LEN</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Called Name Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-CGNAME-ENC.html">SMB:NETBIOS:INV-CGNAME-ENC</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Calling Name Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-CGNAME-LEN.html">SMB:NETBIOS:INV-CGNAME-LEN</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Calling Name Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-SHDR-LEN.html">SMB:NETBIOS:INV-SHDR-LEN</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Session Header Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AINV-SNAME-LEN.html">SMB:NETBIOS:INV-SNAME-LEN</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Session Name Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3ANOVELL-TRAN-REQ-DOS.html">SMB:NETBIOS:NOVELL-TRAN-REQ-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Novell NetWare SMB Transaction Secondary Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3ARMT-REG-ACCESS.html">SMB:NETBIOS:RMT-REG-ACCESS</a></b></td>
   <td width="500" valign="top">
    SMB: Remote Registry Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3ARRAS-MEM-CORRUPTION.html">SMB:NETBIOS:RRAS-MEM-CORRUPTION</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows RRAS Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3ASHARE-LVL-SEC.html">SMB:NETBIOS:SHARE-LVL-SEC</a></b></td>
   <td width="500" valign="top">
    SMB: Share Level Security Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AUNK-SHDR-FLAGS.html">SMB:NETBIOS:UNK-SHDR-FLAGS</a></b></td>
   <td width="500" valign="top">
    SMB: Unknown Session Header Flags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AWIN-RPC-UPNP-DOS.html">SMB:NETBIOS:WIN-RPC-UPNP-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows RPC UPnP Memory Allocation Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETBIOS%3AWIN7-KERNEL-DOS.html">SMB:NETBIOS:WIN7-KERNEL-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Windows 7 / Server 2008R2 Remote Kernel Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANETDDE-SHARE-OF.html">SMB:NETDDE-SHARE-OF</a></b></td>
   <td width="500" valign="top">
    SMB: NetDDE Long Share Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANTLM-LOGIN-FAILED.html">SMB:NTLM-LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows NTLM Login Authorization Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ANTLM-LOW-ENTROPY.html">SMB:NTLM-LOW-ENTROPY</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB NTLM Authentication Low Entropy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AACCOUNT-NAME-OVERFLOW.html">SMB:OF:ACCOUNT-NAME-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SMB:Account Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ACREATE-NEG-EOF.html">SMB:OF:CREATE-NEG-EOF</a></b></td>
   <td width="500" valign="top">
    SMB: Create Negative End Of File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ACVE-2009-3676-DOS.html">SMB:OF:CVE-2009-3676-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB CVE-2009-3676 Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ADFS-RESP.html">SMB:OF:DFS-RESP</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Distributed File System (DFS) Deferral Response Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ADIALECT-INDEX-OVERFLOW.html">SMB:OF:DIALECT-INDEX-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SMB: Dialect Index Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AINVALID-DATACOUNT.html">SMB:OF:INVALID-DATACOUNT</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid DataCount
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ALINUX-KERNEL-INT-OF.html">SMB:OF:LINUX-KERNEL-INT-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Linux Kernel Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AMAL-QFILEPATHINFO.html">SMB:OF:MAL-QFILEPATHINFO</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Malformed QFILEPATHINFO Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AMANGLING-FILE-OF.html">SMB:OF:MANGLING-FILE-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Mangling File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AMS-SMB2-RES-DOS.html">SMB:OF:MS-SMB2-RES-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB2 Response Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ANETCONMGR-DOS.html">SMB:OF:NETCONMGR-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Network Connection Manager Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ANETWARE-CLIENT-RPC.html">SMB:OF:NETWARE-CLIENT-RPC</a></b></td>
   <td width="500" valign="top">
    SMB: Netware Client Service Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ANWCW-INV-CALL.html">SMB:OF:NWCW-INV-CALL</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Netware Workstation Service Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3APNP-OF.html">SMB:OF:PNP-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Plug and Play Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ARECV-RAW.html">SMB:OF:RECV-RAW</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Receive Raw
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ARECV-RAW-BO.html">SMB:OF:RECV-RAW-BO</a></b></td>
   <td width="500" valign="top">
    SMB: Samba receive_smb_raw SMB Packets Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ARPC-PNP-OF.html">SMB:OF:RPC-PNP-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Plug and Play Registry Key Access Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASECUR-TOKEN-OVERFLOW.html">SMB:OF:SECUR-TOKEN-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SMB: Security Token Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASMB-INVALID-BUFFER.html">SMB:OF:SMB-INVALID-BUFFER</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Buffer Size
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASMB-IPC-OF.html">SMB:OF:SMB-IPC-OF</a></b></td>
   <td width="500" valign="top">
    SMB: IPC Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASMB2-DOS-2.html">SMB:OF:SMB2-DOS-2</a></b></td>
   <td width="500" valign="top">
    SMB: SMB2 Denial Of Service (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASMB2-WRITE-OFFSET.html">SMB:OF:SMB2-WRITE-OFFSET</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB Transaction Parsing Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ASPOOL-SVC-OF.html">SMB:OF:SPOOL-SVC-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Printer Spooler Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3ATAPI-SVC-OF.html">SMB:OF:TAPI-SVC-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft TAPI Service Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOF%3AWKSSVC-CALL.html">SMB:OF:WKSSVC-CALL</a></b></td>
   <td width="500" valign="top">
    SMB: Invalid Workstation Service Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AOLEAUT32-WMF.html">SMB:OLEAUT32-WMF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows &#39;OLEAUT32.DLL&#39; OLE Automation WMF Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AORACLE-JRE-INSECURE-LOAD.html">SMB:ORACLE-JRE-INSECURE-LOAD</a></b></td>
   <td width="500" valign="top">
    SMB: Oracle Java Runtime Environment Insecure File Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3APNG-CHUNK-OF.html">SMB:PNG-CHUNK-OF</a></b></td>
   <td width="500" valign="top">
    SMB: PNG Type Chunk Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AREFLECTION.html">SMB:REFLECTION</a></b></td>
   <td width="500" valign="top">
    SMB: Reflection Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AREPLY-ENCRYPTION-KEYS.html">SMB:REPLY-ENCRYPTION-KEYS</a></b></td>
   <td width="500" valign="top">
    SMB: Replay Overlapping Encryption Keys Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA-UNICODE-FLAGS2-DOS.html">SMB:SAMBA-UNICODE-FLAGS2-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Samba smbd Flags2 Header Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ADFSENUM-OF.html">SMB:SAMBA:DFSENUM-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Samba NDR RPC Request DFSEnum Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3AIDL-PARSE-OOB.html">SMB:SAMBA:IDL-PARSE-OOB</a></b></td>
   <td width="500" valign="top">
    SMB: Samba DCE RPC IDL Parser Out-of-bounds Array Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ALSALOOKUPSIDS.html">SMB:SAMBA:LSALOOKUPSIDS</a></b></td>
   <td width="500" valign="top">
    SMB: Samba LSA RPC lsa_io_trans_names Request Handling Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ANETDFS-OF.html">SMB:SAMBA:NETDFS-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Samba NetDFS Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ANMBD-BO.html">SMB:SAMBA:NMBD-BO</a></b></td>
   <td width="500" valign="top">
    SMB: Samba nmbd Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ANTRANS-RPLY.html">SMB:SAMBA:NTRANS-RPLY</a></b></td>
   <td width="500" valign="top">
    SMB: Samba NT Trans Reply Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3AREAD-NTTRANS-EA-LIST.html">SMB:SAMBA:READ-NTTRANS-EA-LIST</a></b></td>
   <td width="500" valign="top">
    SMB: Samba smbd read_nttrans_ea_list Infinite Allocation Loop DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3AROOT-SYS.html">SMB:SAMBA:ROOT-SYS</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Root File System Access Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASETINFOPOLICY-HEAP.html">SMB:SAMBA:SETINFOPOLICY-HEAP</a></b></td>
   <td width="500" valign="top">
    SMB: Samba SetInformationPolicy AuditEventsInfo Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASID-QUOTA.html">SMB:SAMBA:SID-QUOTA</a></b></td>
   <td width="500" valign="top">
    SMB: Samba SID Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASMBD-ANDX-INFINITE.html">SMB:SAMBA:SMBD-ANDX-INFINITE</a></b></td>
   <td width="500" valign="top">
    SMB: Samba smbd Packets Chaining AndX Offset Infinite Loop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASPOOLSS-NOTIFY.html">SMB:SAMBA:SPOOLSS-NOTIFY</a></b></td>
   <td width="500" valign="top">
    SMB: Samba SPOOLSS RPC smb_io_notify_option_type_data Request Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASWAT-AUTH-DOS.html">SMB:SAMBA:SWAT-AUTH-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Samba Web Admin Tool Authorization Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASYMLINK-INFODISC.html">SMB:SAMBA:SYMLINK-INFODISC</a></b></td>
   <td width="500" valign="top">
    SMB: Samba smbd Daemon Symlink Verification Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASEARCH-OF.html">SMB:SEARCH-OF</a></b></td>
   <td width="500" valign="top">
    SMB: SMB Search Context Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASERVER-SVC-OF.html">SMB:SERVER-SVC-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Server Service Crafted RPC Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASMB-COPY-OF.html">SMB:SMB-COPY-OF</a></b></td>
   <td width="500" valign="top">
    SMB: SMB Server Copy Operation Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASMB-SRV-NAME-DOS.html">SMB:SMB-SRV-NAME-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: SMB Server Name DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ASMB20-NEG-DOS.html">SMB:SMB20-NEG-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: SMB 2.0 Negotiate Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ATIMBUKTU-PLUGHNT-COMMAND.html">SMB:TIMBUKTU-PLUGHNT-COMMAND</a></b></td>
   <td width="500" valign="top">
    SMB: TImbuktu PlughNTCommand
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ATOOLS%3APSEXEC.html">SMB:TOOLS:PSEXEC</a></b></td>
   <td width="500" valign="top">
    SMB: PSEXEC Tool Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ATRANS2ROOT-OF.html">SMB:TRANS2ROOT-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Trans2Root Buffer Overflow (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ATRANS2ROOT-OF-2.html">SMB:TRANS2ROOT-OF-2</a></b></td>
   <td width="500" valign="top">
    SMB: Trans2Root Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3ATRANSACTION-RESPONSE-OF.html">SMB:TRANSACTION-RESPONSE-OF</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows SMB Client Transaction Response Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AUSER-CMD-INJ.html">SMB:USER-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    SMB: User Credential Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AVISIO-MFC71XXX-DLL-HIJACK.html">SMB:VISIO-MFC71XXX-DLL-HIJACK</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Visio Insecure MFC71xxx.DLL Library Loading
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AWIN-BRIEFCASE-RCE.html">SMB:WIN-BRIEFCASE-RCE</a></b></td>
   <td width="500" valign="top">
    SMB: Windows Briefcase Integer Underflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AWIN-BROWSER-SERVICE-DOS.html">SMB:WIN-BROWSER-SERVICE-DOS</a></b></td>
   <td width="500" valign="top">
    SMB: Microsoft Windows Browser Service RequestElection, AnnouncementRequest and GetbackupList Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AWINS-SNAME-REG.html">SMB:WINS-SNAME-REG</a></b></td>
   <td width="500" valign="top">
    SMB: Samba WINS Server Name Registration Handling Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMB%3AXTIERRPCPIPE.html">SMB:XTIERRPCPIPE</a></b></td>
   <td width="500" valign="top">
    SMB: Novell NetIdentity Named Pipe Query
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SMTP"></a>SMTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3ACOMMAND-FAILED.html">SMTP:AUDIT:COMMAND-FAILED</a></b></td>
   <td width="500" valign="top">
    SMTP: Command Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3ADUPLICATE-HEADER.html">SMTP:AUDIT:DUPLICATE-HEADER</a></b></td>
   <td width="500" valign="top">
    SMTP: Duplicate Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AEMPTY-BOUNDARY.html">SMTP:AUDIT:EMPTY-BOUNDARY</a></b></td>
   <td width="500" valign="top">
    SMTP: Empty Boundary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AENCODE.html">SMTP:AUDIT:ENCODE</a></b></td>
   <td width="500" valign="top">
    SMTP: Illegal Encode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AENCODE-MIME-TYPE.html">SMTP:AUDIT:ENCODE-MIME-TYPE</a></b></td>
   <td width="500" valign="top">
    SMTP: Illegal MIME Type Encode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AEXTERNAL-MESG.html">SMTP:AUDIT:EXTERNAL-MESG</a></b></td>
   <td width="500" valign="top">
    SMTP: External Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AHIGH-VOLUME.html">SMTP:AUDIT:HIGH-VOLUME</a></b></td>
   <td width="500" valign="top">
    SMTP: High Volume Mail Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AINVALID-FILENAME.html">SMTP:AUDIT:INVALID-FILENAME</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AMISSING-MAIL-FROM.html">SMTP:AUDIT:MISSING-MAIL-FROM</a></b></td>
   <td width="500" valign="top">
    SMTP: Missing &quot;MAIL FROM&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREP-INVALID-REPLY.html">SMTP:AUDIT:REP-INVALID-REPLY</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREP-NESTED-REPLY.html">SMTP:AUDIT:REP-NESTED-REPLY</a></b></td>
   <td width="500" valign="top">
    SMTP: Nested Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-BIN-DATA-2.html">SMTP:AUDIT:REQ-BIN-DATA-2</a></b></td>
   <td width="500" valign="top">
    SMTP: Binary Data Smtp-From
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-BIN-DATA-3.html">SMTP:AUDIT:REQ-BIN-DATA-3</a></b></td>
   <td width="500" valign="top">
    SMTP: Binary Data in Rcpt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-BINARY-DATA.html">SMTP:AUDIT:REQ-BINARY-DATA</a></b></td>
   <td width="500" valign="top">
    SMTP: Binary Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-HDR-FLD-UNKNOWN.html">SMTP:AUDIT:REQ-HDR-FLD-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    SMTP: Request ErrorUnknown Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-INVALID-CMD-SEQ.html">SMTP:AUDIT:REQ-INVALID-CMD-SEQ</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid Command Sequence
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-MISSING-HELLO.html">SMTP:AUDIT:REQ-MISSING-HELLO</a></b></td>
   <td width="500" valign="top">
    SMTP: Missing &quot;HELO&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-MISSING-RCPT-TO.html">SMTP:AUDIT:REQ-MISSING-RCPT-TO</a></b></td>
   <td width="500" valign="top">
    SMTP: Missing &quot;RCPT TO&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-NESTED-REQUEST.html">SMTP:AUDIT:REQ-NESTED-REQUEST</a></b></td>
   <td width="500" valign="top">
    SMTP: Request Error Nested Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUDIT%3AREQ-UNKNOWN-CMD.html">SMTP:AUDIT:REQ-UNKNOWN-CMD</a></b></td>
   <td width="500" valign="top">
    SMTP: Request Error Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AAUTO-SPAM.html">SMTP:AUTO-SPAM</a></b></td>
   <td width="500" valign="top">
    SMTP: Automated Spam MTA Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ABANNER-CAPTURE.html">SMTP:BANNER-CAPTURE</a></b></td>
   <td width="500" valign="top">
    SMTP: Banner Capture Scan Information Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AAV-INETSERV-DOS.html">SMTP:COMMAND:AV-INETSERV-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: A-V Tronics InetServ SMTP DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3ABDAT.html">SMTP:COMMAND:BDAT</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft BDAT DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3ADEBUG.html">SMTP:COMMAND:DEBUG</a></b></td>
   <td width="500" valign="top">
    SMTP: Debug Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AETRN.html">SMTP:COMMAND:ETRN</a></b></td>
   <td width="500" valign="top">
    SMTP: &quot;ETRN&quot; Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AEXPN.html">SMTP:COMMAND:EXPN</a></b></td>
   <td width="500" valign="top">
    SMTP: EXPN Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AHELP.html">SMTP:COMMAND:HELP</a></b></td>
   <td width="500" valign="top">
    SMTP: &quot;Help&quot; Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3ASTARTTLS-CMD.html">SMTP:COMMAND:STARTTLS-CMD</a></b></td>
   <td width="500" valign="top">
    SMTP: Multiple Products STARTTLS Plaintext Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3ATURN.html">SMTP:COMMAND:TURN</a></b></td>
   <td width="500" valign="top">
    SMTP: TURN Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AVRFY.html">SMTP:COMMAND:VRFY</a></b></td>
   <td width="500" valign="top">
    SMTP: VRFY Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ACOMMAND%3AWIZ.html">SMTP:COMMAND:WIZ</a></b></td>
   <td width="500" valign="top">
    SMTP: &quot;wiz&quot; Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3ACLAM-TNEF-DOS.html">SMTP:DOS:CLAM-TNEF-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Clam AntiVirus TNEF Processor Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AEUDORA-MIME-DOS.html">SMTP:DOS:EUDORA-MIME-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora Malformed MIME Attachment DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AGNU-MAILMAN-DATE-DOS.html">SMTP:DOS:GNU-MAILMAN-DATE-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: GNU Mailman Large Date Data Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AGNU-SCRUBBER-UTF8-DOS.html">SMTP:DOS:GNU-SCRUBBER-UTF8-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: GNU Mailman Attachment Scrubber UTF8 Filename Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AMS-MALWARE-ENGINE.html">SMTP:DOS:MS-MALWARE-ENGINE</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Malware Protection Engine File Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AMS-XL-2003-NULL-DOS.html">SMTP:DOS:MS-XL-2003-NULL-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Excel 2003 NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3AOPENSSL-TLSRECORD.html">SMTP:DOS:OPENSSL-TLSRECORD</a></b></td>
   <td width="500" valign="top">
    SMTP: OpenSSL TLS Record Tampering Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3ASENDMAIL-HEADERS-DOS.html">SMTP:DOS:SENDMAIL-HEADERS-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail Headers Prescan Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ADOS%3ASMARTMAIL-DOS.html">SMTP:DOS:SMARTMAIL-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: SmartMail Malformed Command DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AEUDORA-LONG-MSG-URL.html">SMTP:EMAIL:EUDORA-LONG-MSG-URL</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora Long URL Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AEUDORA-SPOOF1.html">SMTP:EMAIL:EUDORA-SPOOF1</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora Spoofed Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AEUDORA-SPOOF3.html">SMTP:EMAIL:EUDORA-SPOOF3</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora Spoofed Attachment in Message Body
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AEUDORA-SPOOF4.html">SMTP:EMAIL:EUDORA-SPOOF4</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora Spoofed Attachment in HTML Message Body
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AHEADER-FROM-PIPE.html">SMTP:EMAIL:HEADER-FROM-PIPE</a></b></td>
   <td width="500" valign="top">
    SMTP: FROM PIPE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AHEADER-TO-PIPE.html">SMTP:EMAIL:HEADER-TO-PIPE</a></b></td>
   <td width="500" valign="top">
    SMTP: TO PIPE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AIBM-LOTUS-NTS-WPD-BO.html">SMTP:EMAIL:IBM-LOTUS-NTS-WPD-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes WPD Attachment Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3ALOTUS-COLPALETTE-BO.html">SMTP:EMAIL:LOTUS-COLPALETTE-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Domino BMP Color Palette Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AMAIL-FROM-PIPE.html">SMTP:EMAIL:MAIL-FROM-PIPE</a></b></td>
   <td width="500" valign="top">
    SMTP: MAIL FROM &quot;|&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3ARCPT-TO-DECODE.html">SMTP:EMAIL:RCPT-TO-DECODE</a></b></td>
   <td width="500" valign="top">
    SMTP: RCPT TO &quot;decode&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3ARCPT-TO-PIPE.html">SMTP:EMAIL:RCPT-TO-PIPE</a></b></td>
   <td width="500" valign="top">
    SMTP: RCPT TO PIPE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3ARELAY-ADDR-OF.html">SMTP:EMAIL:RELAY-ADDR-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Relay E-Mail Address Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEMAIL%3AREPLY-TO-PIPE.html">SMTP:EMAIL:REPLY-TO-PIPE</a></b></td>
   <td width="500" valign="top">
    SMTP: REPLY TO PIPE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AAUTH-GUEST.html">SMTP:EXCHANGE:AUTH-GUEST</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange Guest Account Auth
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3ACALENDAR-HEAP.html">SMTP:EXCHANGE:CALENDAR-HEAP</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange Calendar Request Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3ACMD_XEXCH50_2LONG.html">SMTP:EXCHANGE:CMD_XEXCH50_2LONG</a></b></td>
   <td width="500" valign="top">
    SMTP: COMMAND XEXCH50 TOO LONG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AEXCH-TNEF-BO.html">SMTP:EXCHANGE:EXCH-TNEF-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange TNEF Attachment Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AICAL-DOS.html">SMTP:EXCHANGE:ICAL-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange Malformed iCal Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AIMAP-DOS.html">SMTP:EXCHANGE:IMAP-DOS</a></b></td>
   <td width="500" valign="top">
    IMAP: Microsoft Exchange Server IMAP Daemon Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AINVLD_XEXCH50_CMD.html">SMTP:EXCHANGE:INVLD_XEXCH50_CMD</a></b></td>
   <td width="500" valign="top">
    MS Exchange Server command XEXCH50 wrong format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AINV_BDAT_CMD.html">SMTP:EXCHANGE:INV_BDAT_CMD</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid BDAT Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AINV_BDAT_SEC_LEN.html">SMTP:EXCHANGE:INV_BDAT_SEC_LEN</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid BDAT Section Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AMAILROUTE-OF.html">SMTP:EXCHANGE:MAILROUTE-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange Mail Route Command Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AMAL-VERB-XEXCH50.html">SMTP:EXCHANGE:MAL-VERB-XEXCH50</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange Malformed Intra-Exchange Verb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AMIME-MALF-ATTACH.html">SMTP:EXCHANGE:MIME-MALF-ATTACH</a></b></td>
   <td width="500" valign="top">
    SMTP: MS Exchange Malformed MIME Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AMULTI-LONG-MAILRT.html">SMTP:EXCHANGE:MULTI-LONG-MAILRT</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange Multiple Long Mail Route Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AMULTI-MAILROUTE.html">SMTP:EXCHANGE:MULTI-MAILROUTE</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange Multiple Mail Route Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AOWA-CSS.html">SMTP:EXCHANGE:OWA-CSS</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange Server Outlook Web Access Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AOWA-JSCRIPT.html">SMTP:EXCHANGE:OWA-JSCRIPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook Web Access JavaScript Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3ASCT_XEXCH50_2LONG.html">SMTP:EXCHANGE:SCT_XEXCH50_2LONG</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange XEXCH50 Data Section Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXCHANGE%3AXLINK2_TOO_LONG.html">SMTP:EXCHANGE:XLINK2_TOO_LONG</a></b></td>
   <td width="500" valign="top">
    SMTP: Exchange Invalid X_LINK2 Section Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AAUTH-BRUTE-FORCE.html">SMTP:EXPLOIT:AUTH-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    SMTP: SMTP Authentication Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AAVI-RIGHT-CLICK.html">SMTP:EXPLOIT:AVI-RIGHT-CLICK</a></b></td>
   <td width="500" valign="top">
    SMTP: Windows AVI Right Click DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ABITDEF-LOG.html">SMTP:EXPLOIT:BITDEF-LOG</a></b></td>
   <td width="500" valign="top">
    SMTP: BitDefender Antivirus Logging Function Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ADMAIL-FS.html">SMTP:EXPLOIT:DMAIL-FS</a></b></td>
   <td width="500" valign="top">
    SMTP: NetWin DMail DSMTP Remote Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AEMAIL-ADDR-FS.html">SMTP:EXPLOIT:EMAIL-ADDR-FS</a></b></td>
   <td width="500" valign="top">
    SMTP: QwikMail Email Address Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AEUDORA-URL-SPOOF.html">SMTP:EXPLOIT:EUDORA-URL-SPOOF</a></b></td>
   <td width="500" valign="top">
    SMTP: Eudora URL Spoofing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AEXIM-DOVECOT-RCE.html">SMTP:EXPLOIT:EXIM-DOVECOT-RCE</a></b></td>
   <td width="500" valign="top">
    SMTP: Exim with Dovecot LDA sender_address Parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AGNUPG-INT-OF.html">SMTP:EXPLOIT:GNUPG-INT-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: GnuPG Message Packet Length Handling Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AHCP-QUOTE-SCRIPT.html">SMTP:EXPLOIT:HCP-QUOTE-SCRIPT</a></b></td>
   <td width="500" valign="top">
    SMTP: HSC HCP URL Quote Script Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AJPXDECODE-RCE.html">SMTP:EXPLOIT:JPXDECODE-RCE</a></b></td>
   <td width="500" valign="top">
    SMTP: Adobe PDF JPXDecode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AKERIO-MS-FS.html">SMTP:EXPLOIT:KERIO-MS-FS</a></b></td>
   <td width="500" valign="top">
    SMTP: Kerio MailServer 6.1.3 Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AMAL-AU-DOS.html">SMTP:EXPLOIT:MAL-AU-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Media Player Malformed .au Divide by Zero DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AMIME-TOOLS-EVADE.html">SMTP:EXPLOIT:MIME-TOOLS-EVADE</a></b></td>
   <td width="500" valign="top">
    SMTP: MIME Tools Virus Evasion Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3APINE-BOUNDARY.html">SMTP:EXPLOIT:PINE-BOUNDARY</a></b></td>
   <td width="500" valign="top">
    SMTP: Pine Blank MIME Boundary Exception
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3APINE-CHARSET-OF-1.html">SMTP:EXPLOIT:PINE-CHARSET-OF-1</a></b></td>
   <td width="500" valign="top">
    SMTP: Remote Pine Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3APINE-SLASHQUOTE.html">SMTP:EXPLOIT:PINE-SLASHQUOTE</a></b></td>
   <td width="500" valign="top">
    SMTP: Pine From-Header Remote DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3APOSTFIX-AUTH-REUSE.html">SMTP:EXPLOIT:POSTFIX-AUTH-REUSE</a></b></td>
   <td width="500" valign="top">
    SMTP: Postfix SMTP Server SASL AUTH Handle Reuse Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ARELAY-ATTEMPT.html">SMTP:EXPLOIT:RELAY-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Relay Attempt (@...@ in Email Address)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ARELAY-ATTEMPT-VAR.html">SMTP:EXPLOIT:RELAY-ATTEMPT-VAR</a></b></td>
   <td width="500" valign="top">
    SMTP Exploit: Relay Attempt (@...@ in Email Address) variant
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ASENDMAIL-IDENTEXEC.html">SMTP:EXPLOIT:SENDMAIL-IDENTEXEC</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail IDENT Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ASUSPICIOUS-COMM.html">SMTP:EXPLOIT:SUSPICIOUS-COMM</a></b></td>
   <td width="500" valign="top">
    SMTP: Suspicious SMTP Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ASUSPICIOUS-FROM.html">SMTP:EXPLOIT:SUSPICIOUS-FROM</a></b></td>
   <td width="500" valign="top">
    SMTP: Suspicious Mail Sender with Randomized Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3ASUSPICIOUS-TO.html">SMTP:EXPLOIT:SUSPICIOUS-TO</a></b></td>
   <td width="500" valign="top">
    SMTP: Suspicious Mail Receiver with Randomized Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADIR-TRAV.html">SMTP:EXT:DIR-TRAV</a></b></td>
   <td width="500" valign="top">
    SMTP: MIME Filename Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT.html">SMTP:EXT:DOT</a></b></td>
   <td width="500" valign="top">
    SMTP: Attachment ending with dot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-386.html">SMTP:EXT:DOT-386</a></b></td>
   <td width="500" valign="top">
    SMTP: .386
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-ADE.html">SMTP:EXT:DOT-ADE</a></b></td>
   <td width="500" valign="top">
    SMTP: .ADE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-ADP.html">SMTP:EXT:DOT-ADP</a></b></td>
   <td width="500" valign="top">
    SMTP: .ADP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-ANI.html">SMTP:EXT:DOT-ANI</a></b></td>
   <td width="500" valign="top">
    SMTP: .ANI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-BAS.html">SMTP:EXT:DOT-BAS</a></b></td>
   <td width="500" valign="top">
    SMTP: .BAS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-BAT.html">SMTP:EXT:DOT-BAT</a></b></td>
   <td width="500" valign="top">
    SMTP: .BAT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-CHM.html">SMTP:EXT:DOT-CHM</a></b></td>
   <td width="500" valign="top">
    SMTP: .CHM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-CMD.html">SMTP:EXT:DOT-CMD</a></b></td>
   <td width="500" valign="top">
    SMTP: .CMD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-COM.html">SMTP:EXT:DOT-COM</a></b></td>
   <td width="500" valign="top">
    SMTP: .COM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-CPL.html">SMTP:EXT:DOT-CPL</a></b></td>
   <td width="500" valign="top">
    SMTP: .CPL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-CRT.html">SMTP:EXT:DOT-CRT</a></b></td>
   <td width="500" valign="top">
    SMTP: .CRT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-EXE.html">SMTP:EXT:DOT-EXE</a></b></td>
   <td width="500" valign="top">
    SMTP: .EXE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-GRP.html">SMTP:EXT:DOT-GRP</a></b></td>
   <td width="500" valign="top">
    SMTP: .GRP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-HLP.html">SMTP:EXT:DOT-HLP</a></b></td>
   <td width="500" valign="top">
    SMTP: .HLP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-HT.html">SMTP:EXT:DOT-HT</a></b></td>
   <td width="500" valign="top">
    SMTP: Hyperterm Configuration File (.HT)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-HTA.html">SMTP:EXT:DOT-HTA</a></b></td>
   <td width="500" valign="top">
    SMTP: .HTA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-INF.html">SMTP:EXT:DOT-INF</a></b></td>
   <td width="500" valign="top">
    SMTP: .INF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-INS.html">SMTP:EXT:DOT-INS</a></b></td>
   <td width="500" valign="top">
    SMTP: .INS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-ISP.html">SMTP:EXT:DOT-ISP</a></b></td>
   <td width="500" valign="top">
    SMTP: .ISP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-JOB.html">SMTP:EXT:DOT-JOB</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Task Scheduler (.job) File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-JS.html">SMTP:EXT:DOT-JS</a></b></td>
   <td width="500" valign="top">
    SMTP: .JS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-JSE.html">SMTP:EXT:DOT-JSE</a></b></td>
   <td width="500" valign="top">
    SMTP: .JSE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-LNK.html">SMTP:EXT:DOT-LNK</a></b></td>
   <td width="500" valign="top">
    SMTP: .LNK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-MDB.html">SMTP:EXT:DOT-MDB</a></b></td>
   <td width="500" valign="top">
    SMTP: .MDB
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-MDE.html">SMTP:EXT:DOT-MDE</a></b></td>
   <td width="500" valign="top">
    SMTP: .MDE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-MSC.html">SMTP:EXT:DOT-MSC</a></b></td>
   <td width="500" valign="top">
    SMTP: .MSC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-MSI.html">SMTP:EXT:DOT-MSI</a></b></td>
   <td width="500" valign="top">
    SMTP: .MSI
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-MSP.html">SMTP:EXT:DOT-MSP</a></b></td>
   <td width="500" valign="top">
    SMTP: .MSP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-OCX.html">SMTP:EXT:DOT-OCX</a></b></td>
   <td width="500" valign="top">
    SMTP: .OCX
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-PCD.html">SMTP:EXT:DOT-PCD</a></b></td>
   <td width="500" valign="top">
    SMTP: .PCD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-PIF.html">SMTP:EXT:DOT-PIF</a></b></td>
   <td width="500" valign="top">
    SMTP: .PIF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-PPT.html">SMTP:EXT:DOT-PPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft PowerPoint Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-REG.html">SMTP:EXT:DOT-REG</a></b></td>
   <td width="500" valign="top">
    SMTP: .REG
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-SCR.html">SMTP:EXT:DOT-SCR</a></b></td>
   <td width="500" valign="top">
    SMTP: .SCR
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-SCT.html">SMTP:EXT:DOT-SCT</a></b></td>
   <td width="500" valign="top">
    SMTP: .SCT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-SHS.html">SMTP:EXT:DOT-SHS</a></b></td>
   <td width="500" valign="top">
    SMTP: .SHS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-URL.html">SMTP:EXT:DOT-URL</a></b></td>
   <td width="500" valign="top">
    SMTP: .URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-VB.html">SMTP:EXT:DOT-VB</a></b></td>
   <td width="500" valign="top">
    SMTP: .VB
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-VBS.html">SMTP:EXT:DOT-VBS</a></b></td>
   <td width="500" valign="top">
    SMTP: .VBS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-WMF.html">SMTP:EXT:DOT-WMF</a></b></td>
   <td width="500" valign="top">
    SMTP:  DOT WMF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-WSC.html">SMTP:EXT:DOT-WSC</a></b></td>
   <td width="500" valign="top">
    SMTP: .WSC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-WSF.html">SMTP:EXT:DOT-WSF</a></b></td>
   <td width="500" valign="top">
    SMTP: .WSF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-WSH.html">SMTP:EXT:DOT-WSH</a></b></td>
   <td width="500" valign="top">
    SMTP: .WSH
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-WSZ.html">SMTP:EXT:DOT-WSZ</a></b></td>
   <td width="500" valign="top">
    SMTP: Winamp Skin File Extension (.WSZ/WAL)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOT-ZIP.html">SMTP:EXT:DOT-ZIP</a></b></td>
   <td width="500" valign="top">
    SMTP: .ZIP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOUBLE-EXTENSION.html">SMTP:EXT:DOUBLE-EXTENSION</a></b></td>
   <td width="500" valign="top">
    SMTP: Double Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOUBLE-EXTENSION-MIME.html">SMTP:EXT:DOUBLE-EXTENSION-MIME</a></b></td>
   <td width="500" valign="top">
    SMTP: Double MIME Filename Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AEXT%3AFILE-AVI.html">SMTP:EXT:FILE-AVI</a></b></td>
   <td width="500" valign="top">
    SMTP: AVI File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AFFSMOUNTFS-BOF.html">SMTP:FFSMOUNTFS-BOF</a></b></td>
   <td width="500" valign="top">
    SMTP: Mac OS X and FreeBSD ffs_mountfs Routine Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AFROM-FIELD-FS.html">SMTP:FROM-FIELD-FS</a></b></td>
   <td width="500" valign="top">
    SMTP: From Field Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AHTML-VAL-XSS.html">SMTP:HTML-VAL-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP:  Microsoft Outlook Web Access for Exchange Server HTML Validating Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIBM-LOTUS-INT-OVERFLOW.html">SMTP:IBM-LOTUS-INT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Domino BMP Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIBM-LOTUS-NOTES-XSS.html">SMTP:IBM-LOTUS-NOTES-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIIS%3ACDO-OF.html">SMTP:IIS:CDO-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Collaboration Data Objects Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIIS%3AIIS-ENCAPS-RELAY.html">SMTP:IIS:IIS-ENCAPS-RELAY</a></b></td>
   <td width="500" valign="top">
    SMTP: IIS Encapsulated SMTP Address Relay
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIIS%3ASSL-PCT-OF.html">SMTP:IIS:SSL-PCT-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Windows Private Communications Transport Protocol Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID-HELO.html">SMTP:INVALID-HELO</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid HELO Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3A2MANY-BOUNDARY.html">SMTP:INVALID:2MANY-BOUNDARY</a></b></td>
   <td width="500" valign="top">
    SMTP: Too Many Boundaries
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3ABASE64-CHAR.html">SMTP:INVALID:BASE64-CHAR</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid Base64 Char
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3ABOUNDARY-MISS.html">SMTP:INVALID:BOUNDARY-MISS</a></b></td>
   <td width="500" valign="top">
    SMTP Boundry Missing
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3ADUP-AUTH.html">SMTP:INVALID:DUP-AUTH</a></b></td>
   <td width="500" valign="top">
    SMTP: Duplicate Authentication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3ADUP-BOUNDARY.html">SMTP:INVALID:DUP-BOUNDARY</a></b></td>
   <td width="500" valign="top">
    SMTP: Duplicate Boundary
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3APARTIAL-MESG.html">SMTP:INVALID:PARTIAL-MESG</a></b></td>
   <td width="500" valign="top">
    SMTP: Partial Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AINVALID%3AUNFIN-MULTIPART.html">SMTP:INVALID:UNFIN-MULTIPART</a></b></td>
   <td width="500" valign="top">
    SMTP: Unfinished Multipart Msg
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AIPSWITCH-REPLY-TO-OF.html">SMTP:IPSWITCH-REPLY-TO-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Ipswitch IMail Server List Mailer Reply-To Address Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAILMAN%3APASSWD-DISCLOSURE.html">SMTP:MAILMAN:PASSWD-DISCLOSURE</a></b></td>
   <td width="500" valign="top">
    SMTP: Mailman Password Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAJORDOMO%3ACOMMAND-EXEC.html">SMTP:MAJORDOMO:COMMAND-EXEC</a></b></td>
   <td width="500" valign="top">
    SMTP: Majordomo Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AACROBAT-UUEXEC.html">SMTP:MAL:ACROBAT-UUEXEC</a></b></td>
   <td width="500" valign="top">
    SMTP: Adobe Acrobat &quot;uudecode()&quot; File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AAIM-BO-URL.html">SMTP:MAL:AIM-BO-URL</a></b></td>
   <td width="500" valign="top">
    SMTP: AOL Instant Messenger &quot;GoAway&quot; URL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AANI-ATTACH.html">SMTP:MAL:ANI-ATTACH</a></b></td>
   <td width="500" valign="top">
    SMTP: ANI Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AANI-MAL-HEADER.html">SMTP:MAL:ANI-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    SMTP: ANI Malformed Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ABMP-MAL-HEADER.html">SMTP:MAL:BMP-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    SMTP: BMP Malformed Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ADATA-SCHEME.html">SMTP:MAL:DATA-SCHEME</a></b></td>
   <td width="500" valign="top">
    SMTP: HTML &quot;data:&quot; URL Scheme
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ADOMINO-INOTES-XSS.html">SMTP:MAL:DOMINO-INOTES-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Domino iNotes XSS Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AEMAIL-URL-HIDING-ENC.html">SMTP:MAL:EMAIL-URL-HIDING-ENC</a></b></td>
   <td width="500" valign="top">
    SMTP: Email With Malicious URL Hiding Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AEXIM4-HEADER.html">SMTP:MAL:EXIM4-HEADER</a></b></td>
   <td width="500" valign="top">
    SMTP: Exim4 Malformed Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AFIREFOX-HTML-URL-INJ.html">SMTP:MAL:FIREFOX-HTML-URL-INJ</a></b></td>
   <td width="500" valign="top">
    SMTP: Firefox HTML URL Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AIBM-ATTACHMENT-VIEWER.html">SMTP:MAL:IBM-ATTACHMENT-VIEWER</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes Attachment Viewer UUE File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AJPEG-ATTACH-COMMENT-OF.html">SMTP:MAL:JPEG-ATTACH-COMMENT-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Malformed JPEG Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-APPLIX.html">SMTP:MAL:LOTUS-APPLIX</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes Applix Graphics Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-DOC-VIEWER.html">SMTP:MAL:LOTUS-DOC-VIEWER</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes DOC Attachment Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-LZH-BOF.html">SMTP:MAL:LOTUS-LZH-BOF</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes LZH Attachment Viewer Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-MAILTO.html">SMTP:MAL:LOTUS-MAILTO</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Domino nrouter.exe iCalendar MAILTO Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-MIF-VIEWER.html">SMTP:MAL:LOTUS-MIF-VIEWER</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes MIF Attachment Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-VIEWER.html">SMTP:MAL:LOTUS-VIEWER</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ALOTUS-WPD.html">SMTP:MAL:LOTUS-WPD</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Lotus Notes WPD Attachment Viewer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AMAL-ZIP-HDR.html">SMTP:MAL:MAL-ZIP-HDR</a></b></td>
   <td width="500" valign="top">
    SMTP: Invalid ZIP Header in Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AMALFORMED-WMF.html">SMTP:MAL:MALFORMED-WMF</a></b></td>
   <td width="500" valign="top">
    SMTP: WMF Malformed File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AMS-HSC-DVD-VLN.html">SMTP:MAL:MS-HSC-DVD-VLN</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Help Center Input Validation Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ANAV-ZIP-BOMB.html">SMTP:MAL:NAV-ZIP-BOMB</a></b></td>
   <td width="500" valign="top">
    SMTP: Norton Antivirus Compressed File Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ANOTES-BIGMAIL-DOS.html">SMTP:MAL:NOTES-BIGMAIL-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: Lotus Notes Domino Web Access Message Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ANOTES-INI-SMTP.html">SMTP:MAL:NOTES-INI-SMTP</a></b></td>
   <td width="500" valign="top">
    SMTP: Lotus Notes notes.ini Redirection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AOUTLOOK-MAILTO-QUOT.html">SMTP:MAL:OUTLOOK-MAILTO-QUOT</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook Mailto Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AOUTLOOK-SHELL.html">SMTP:MAL:OUTLOOK-SHELL</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook &quot;User Profile&quot; Local File Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ASQM-CONTENT-XSS.html">SMTP:MAL:SQM-CONTENT-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP: SquirrelMail Content Type Cross-Side Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3ATBIRD-JAVASCRIPT.html">SMTP:MAL:TBIRD-JAVASCRIPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Mozilla Thunderbird IFRAME JavaScript Remote JavaScript Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AWMF-MAL-HEADER.html">SMTP:MAL:WMF-MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    SMTP: WMF Malformed Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMAL%3AXSS-URL-IN-EMAIL.html">SMTP:MAL:XSS-URL-IN-EMAIL</a></b></td>
   <td width="500" valign="top">
    SMTP: Cross Site Script Attack URL in Email
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMERCMAIL-AUTH-OF.html">SMTP:MERCMAIL-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Mercury Mail Transport System AUTH Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMS-XLS-BIFF-REC-RCE.html">SMTP:MS-XLS-BIFF-REC-RCE</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Excel Formula Biff Record Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMSSQL-WORM-EMAIL.html">SMTP:MSSQL-WORM-EMAIL</a></b></td>
   <td width="500" valign="top">
    SMTP: MS-SQL Worm Email
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AMULTIPLE-HYD-BOF.html">SMTP:MULTIPLE-HYD-BOF</a></b></td>
   <td width="500" valign="top">
    APP: Multiple SMTP Header Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ANOVELL-GROUPWISE-BO.html">SMTP:NOVELL-GROUPWISE-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: Novell GroupWise Internet Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3ADHTML-HANDLER-RACE.html">SMTP:OUTLOOK:DHTML-HANDLER-RACE</a></b></td>
   <td width="500" valign="top">
    SMTP: DHTML Object Handling Race Condition
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AHTML-NAME-OF.html">SMTP:OUTLOOK:HTML-NAME-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Internet Explorer Malformed Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3ALOCAL-LINK.html">SMTP:OUTLOOK:LOCAL-LINK</a></b></td>
   <td width="500" valign="top">
    SMTP: Local Link in Hyperlink
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AMHTML-CDI.html">SMTP:OUTLOOK:MHTML-CDI</a></b></td>
   <td width="500" valign="top">
    SMTP: MHTML Hyperlink Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AMIME-PARSE-UAF.html">SMTP:OUTLOOK:MIME-PARSE-UAF</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook MIME Email Message Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AMMCN-EXEC.html">SMTP:OUTLOOK:MMCN-EXEC</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook Express Management Console Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AOBJECT-TAG.html">SMTP:OUTLOOK:OBJECT-TAG</a></b></td>
   <td width="500" valign="top">
    SMTP: MS-Outlook: Object Tag in HTML Email
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AOBJECT-TAG-XML.html">SMTP:OUTLOOK:OBJECT-TAG-XML</a></b></td>
   <td width="500" valign="top">
    SMTP: MS-Outlook: Object Tag with XML Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AOSS-FILE.html">SMTP:OUTLOOK:OSS-FILE</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook Saved Search File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AOWA-XSS.html">SMTP:OUTLOOK:OWA-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Exchange OWA Cross-Site-Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3ARTF-PARSE.html">SMTP:OUTLOOK:RTF-PARSE</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook Email Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3ATNEF-INT-OF.html">SMTP:OUTLOOK:TNEF-INT-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: TNEF Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3ATZID-OF.html">SMTP:OUTLOOK:TZID-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook TZID Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AVEVENT-MEMCORRUPT.html">SMTP:OUTLOOK:VEVENT-MEMCORRUPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook iCal Meeting Request VEVENT Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AVML-BOF.html">SMTP:OUTLOOK:VML-BOF</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook VML Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AW32-PARAM.html">SMTP:OUTLOOK:W32-PARAM</a></b></td>
   <td width="500" valign="top">
    SMTP: Win32 API Invalid Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AAPPLE-PICT-MC.html">SMTP:OVERFLOW:APPLE-PICT-MC</a></b></td>
   <td width="500" valign="top">
    SMTP: Apple QuickDraw PICT Images ARGB Records Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ABOUNDARY.html">SMTP:OVERFLOW:BOUNDARY</a></b></td>
   <td width="500" valign="top">
    SMTP Boundary Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ACOMMAND-LINE.html">SMTP:OVERFLOW:COMMAND-LINE</a></b></td>
   <td width="500" valign="top">
    SMTP: Command Line Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ACONTENT-NAME.html">SMTP:OVERFLOW:CONTENT-NAME</a></b></td>
   <td width="500" valign="top">
    SMTP: Attachment Content Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AEMAIL-ADDRESS.html">SMTP:OVERFLOW:EMAIL-ADDRESS</a></b></td>
   <td width="500" valign="top">
    SMTP: Email Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AEMAIL-DOMAIN.html">SMTP:OVERFLOW:EMAIL-DOMAIN</a></b></td>
   <td width="500" valign="top">
    SMTP: Email Domain Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AEMAIL-USERNAME.html">SMTP:OVERFLOW:EMAIL-USERNAME</a></b></td>
   <td width="500" valign="top">
    SMTP: Email Username
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AFILENAME.html">SMTP:OVERFLOW:FILENAME</a></b></td>
   <td width="500" valign="top">
    SMTP: Attachment Filename Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AHEADER-LINE-OF.html">SMTP:OVERFLOW:HEADER-LINE-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Header Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMAILENABLE-BO.html">SMTP:OVERFLOW:MAILENABLE-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: MailEnable SMTP Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMETAMAIL-HDR-FS2.html">SMTP:OVERFLOW:METAMAIL-HDR-FS2</a></b></td>
   <td width="500" valign="top">
    SMTP: Metamail Header Format String 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMETAMAIL-HDR-OF2.html">SMTP:OVERFLOW:METAMAIL-HDR-OF2</a></b></td>
   <td width="500" valign="top">
    SMTP: Metamail Header Overflow 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMHTML-OF.html">SMTP:OVERFLOW:MHTML-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Outlook Express MHTML Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMS-WMF-OF.html">SMTP:OVERFLOW:MS-WMF-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Windows MetaFile AttemptWrite Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ANTLM-AUTH-OF.html">SMTP:OVERFLOW:NTLM-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: MailEnable NTLM Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AOUTLOOK-CERT-OF.html">SMTP:OVERFLOW:OUTLOOK-CERT-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook Express Certificate Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AREPLY-LINE.html">SMTP:OVERFLOW:REPLY-LINE</a></b></td>
   <td width="500" valign="top">
    SMTP: Reply Line
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ASENDMAIL-CMT-OF1.html">SMTP:OVERFLOW:SENDMAIL-CMT-OF1</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail Oversized Address Comment (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ASENDMAIL-CMT-OF2.html">SMTP:OVERFLOW:SENDMAIL-CMT-OF2</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail Oversized Address Comment (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ASENDMAIL-MIME-OF.html">SMTP:OVERFLOW:SENDMAIL-MIME-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail MIME Conversion Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ATABS-EHLO-OF.html">SMTP:OVERFLOW:TABS-EHLO-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: TABS Mailcarrier EHLO Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ATEXT-LINE-OF.html">SMTP:OVERFLOW:TEXT-LINE-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Text Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ATOO-MANY-RCPT.html">SMTP:OVERFLOW:TOO-MANY-RCPT</a></b></td>
   <td width="500" valign="top">
    SMTP: Too Many &quot;RCPT TO&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARCPT-CMD-INJ.html">SMTP:RCPT-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    SMTP: RCPT Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AREALPLAYER-WAV-BO.html">SMTP:REALPLAYER-WAV-BO</a></b></td>
   <td width="500" valign="top">
    SMTP: RealNetworks RealPlayer WAV File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AREQERR%3AREQ-DUPLICATE-HELLO.html">SMTP:REQERR:REQ-DUPLICATE-HELLO</a></b></td>
   <td width="500" valign="top">
    SMTP: Duplicate &quot;HELO&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AREQERR%3AREQ-SYNTAX-ERROR.html">SMTP:REQERR:REQ-SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    SMTP: Request Error Syntax Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARESPONSE%3ABAD-RESPONSE.html">SMTP:RESPONSE:BAD-RESPONSE</a></b></td>
   <td width="500" valign="top">
    SMTP Response Error: Bad Response Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARESPONSE%3APIPE-FAILED.html">SMTP:RESPONSE:PIPE-FAILED</a></b></td>
   <td width="500" valign="top">
    SMTP: Response &#39;|&#39; Attempt Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARESPONSE%3ARLY-ACC-DENIED.html">SMTP:RESPONSE:RLY-ACC-DENIED</a></b></td>
   <td width="500" valign="top">
    SMTP: Response Relay Access Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARESPONSE%3ARLY-PBTED.html">SMTP:RESPONSE:RLY-PBTED</a></b></td>
   <td width="500" valign="top">
    SMTP: Response Relaying Is Prohibited (Exchange)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ARESPONSE%3AUSER-UNKNOWN.html">SMTP:RESPONSE:USER-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    SMTP: Response User Unknown
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASAGTUBE-DOS.html">SMTP:SAGTUBE-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: SpamAssassin AutoWhitelist DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASENDMAIL%3AADDR-PRESCAN-ATK.html">SMTP:SENDMAIL:ADDR-PRESCAN-ATK</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail: Address Prescan Memory Corruption Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASENDMAIL%3ADEBIAN-SASL-AUTH.html">SMTP:SENDMAIL:DEBIAN-SASL-AUTH</a></b></td>
   <td width="500" valign="top">
    SMTP: Debian Sendmail Default SASL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASENDMAIL%3ASENDMAIL-FF-OF.html">SMTP:SENDMAIL:SENDMAIL-FF-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Sendmail 0xff Address Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASERVER%3AOVERFLOW-WIN-X86.html">SMTP:SERVER:OVERFLOW-WIN-X86</a></b></td>
   <td width="500" valign="top">
    SMTP: MailMax Buffer Overflow - Windows x86
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASHELLSHOCK.html">SMTP:SHELLSHOCK</a></b></td>
   <td width="500" valign="top">
    SMTP:  Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASMTP-URI-INJ.html">SMTP:SMTP-URI-INJ</a></b></td>
   <td width="500" valign="top">
    SMTP: Multiple Browser URI Handlers Command Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASPAM-ADDRESS-EVASION.html">SMTP:SPAM-ADDRESS-EVASION</a></b></td>
   <td width="500" valign="top">
    SMTP: Address Evasion Spam
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASPAM-ASSN-INJ.html">SMTP:SPAM-ASSN-INJ</a></b></td>
   <td width="500" valign="top">
    SMTP: SpamAssassin Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASPAMASS-DOS.html">SMTP:SPAMASS-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: SpamAssassin Content-Type Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASPAMASSASS-LM-DOS.html">SMTP:SPAMASSASS-LM-DOS</a></b></td>
   <td width="500" valign="top">
    SMTP: SpamAssassin Long Message Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASQWEBMAIL-EMAIL-HEADER-INJ.html">SMTP:SQWEBMAIL-EMAIL-HEADER-INJ</a></b></td>
   <td width="500" valign="top">
    SMTP: SqWebMail Email Header HTML Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3ASYM-NESTED-ZIP.html">SMTP:SYM-NESTED-ZIP</a></b></td>
   <td width="500" valign="top">
    SMTP: Symantec Brightmail AntiSpam Nested Zip Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AURL-LOC.html">SMTP:URL-LOC</a></b></td>
   <td width="500" valign="top">
    SMTP: URL With Local Reference
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3ACMAILSERVER.html">SMTP:VULN:CMAILSERVER</a></b></td>
   <td width="500" valign="top">
    SMTP: Vulnerable CMailServer Version (&lt; 5.2.1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AEXIM-4-20.html">SMTP:VULN:EXIM-4-20</a></b></td>
   <td width="500" valign="top">
    SMTP: Vulnerable Exim Version (3.0 through 4.20)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AGROUPWISE-IMG-OF.html">SMTP:VULN:GROUPWISE-IMG-OF</a></b></td>
   <td width="500" valign="top">
    SMTP: Novell GroupWise Client IMG Tag SRC Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AIBM-LOTUS-GIF-PARS-CE.html">SMTP:VULN:IBM-LOTUS-GIF-PARS-CE</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Domino GIF Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AIMG-PARSE-BOF.html">SMTP:VULN:IMG-PARSE-BOF</a></b></td>
   <td width="500" valign="top">
    SMTP: IBM Domino Image File Parsing CVE-2015-5040 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AMAILENABLE-FS.html">SMTP:VULN:MAILENABLE-FS</a></b></td>
   <td width="500" valign="top">
    SMTP: MailEnable Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AMERCUR-3-3.html">SMTP:VULN:MERCUR-3-3</a></b></td>
   <td width="500" valign="top">
    SMTP: Vulnerable Mercur Mailserver version (&lt; 3.3x)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3AMERCUR-4-2.html">SMTP:VULN:MERCUR-4-2</a></b></td>
   <td width="500" valign="top">
    SMTP: Vulnerable Mercur Mailserver version (3.3 through 4.2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AVULN%3ANOVELL-GROUPWISE-XSS.html">SMTP:VULN:NOVELL-GROUPWISE-XSS</a></b></td>
   <td width="500" valign="top">
    SMTP: Novell GroupWise WebAccess Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SMTP%3AWP5-EMAIL.html">SMTP:WP5-EMAIL</a></b></td>
   <td width="500" valign="top">
    SMTP: WordPerfect 5.x Document Download
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SNMP"></a>SNMP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3ABAD-VALUE.html">SNMP:AUDIT:BAD-VALUE</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Bad Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3ANO-SUCH-NAME.html">SNMP:AUDIT:NO-SUCH-NAME</a></b></td>
   <td width="500" valign="top">
    SNMP: Response No Such Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3AOTHER-ERROR.html">SNMP:AUDIT:OTHER-ERROR</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Other Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3APRIVATE.html">SNMP:AUDIT:PRIVATE</a></b></td>
   <td width="500" valign="top">
    SNMP: Community Private
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3APUBLIC.html">SNMP:AUDIT:PUBLIC</a></b></td>
   <td width="500" valign="top">
    SNMP: Community Public
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3ASET-REQUEST.html">SNMP:AUDIT:SET-REQUEST</a></b></td>
   <td width="500" valign="top">
    SNMP: Set Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AAUDIT%3AUNKNOWN-VERSION.html">SNMP:AUDIT:UNKNOWN-VERSION</a></b></td>
   <td width="500" valign="top">
    SNMP: Unknown Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AAVAYA-DEFCOM1.html">SNMP:COMMUNITY:AVAYA-DEFCOM1</a></b></td>
   <td width="500" valign="top">
    SNMP: Avaya Cajun Default Community String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AFORMAT-CHAR.html">SNMP:COMMUNITY:FORMAT-CHAR</a></b></td>
   <td width="500" valign="top">
    SNMP: Community FORMAT Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AILMI.html">SNMP:COMMUNITY:ILMI</a></b></td>
   <td width="500" valign="top">
    SNMP: Interim Local Management Interface (ILMI)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AINTERNAL.html">SNMP:COMMUNITY:INTERNAL</a></b></td>
   <td width="500" valign="top">
    SNMP: Community Name Internal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3ANULL-CHAR.html">SNMP:COMMUNITY:NULL-CHAR</a></b></td>
   <td width="500" valign="top">
    SNMP: Community NULL Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AOVERFLOW-1K.html">SNMP:COMMUNITY:OVERFLOW-1K</a></b></td>
   <td width="500" valign="top">
    SNMP: Community Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3ASURECOM-RTR.html">SNMP:COMMUNITY:SURECOM-RTR</a></b></td>
   <td width="500" valign="top">
    SNMP: Surecom Broadband Router Default Community String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ACOMMUNITY%3AZERO-LEN.html">SNMP:COMMUNITY:ZERO-LEN</a></b></td>
   <td width="500" valign="top">
    SNMP: Community Zero Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADANGEROUS%3AJETDIRECT-PASS.html">SNMP:DANGEROUS:JETDIRECT-PASS</a></b></td>
   <td width="500" valign="top">
    SNMP: JetDirect Password Leak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADANGEROUS%3ALINKSYS-WAP55AG.html">SNMP:DANGEROUS:LINKSYS-WAP55AG</a></b></td>
   <td width="500" valign="top">
    SNMP: Linksys WAP55AG Community String Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADANGEROUS%3ASAMSUNG-PRINTERS.html">SNMP:DANGEROUS:SAMSUNG-PRINTERS</a></b></td>
   <td width="500" valign="top">
    SNMP: Samsung Printers All-Access Read-Write Community String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADOS%3ACISCO-DOS.html">SNMP:DOS:CISCO-DOS</a></b></td>
   <td width="500" valign="top">
    SNMP: Cisco SNMP Message Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADOS%3AGETBULK.html">SNMP:DOS:GETBULK</a></b></td>
   <td width="500" valign="top">
    SNMP: Net-SNMP GETBULK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ADOS%3AWIN-DEL.html">SNMP:DOS:WIN-DEL</a></b></td>
   <td width="500" valign="top">
    SNMP: WINS-Deletion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3ACOUNTER-TOO-BIG.html">SNMP:ENCODING:COUNTER-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid Counter Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AEI-TOO-BIG.html">SNMP:ENCODING:EI-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid Error Index Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AES-TOO-BIG.html">SNMP:ENCODING:ES-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid Error Status Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AGAUGE-TOO-BIG.html">SNMP:ENCODING:GAUGE-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid Gauge Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AGET-BULK-REQ.html">SNMP:ENCODING:GET-BULK-REQ</a></b></td>
   <td width="500" valign="top">
    SNMP: Microsoft Windows SNMP Service Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AINT-TOO-BIG.html">SNMP:ENCODING:INT-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Integer Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AINVALID-MIBROOT.html">SNMP:ENCODING:INVALID-MIBROOT</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid MIB Root
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AIP-TOO-BIG.html">SNMP:ENCODING:IP-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid IP Address Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AMALFORMED-OID.html">SNMP:ENCODING:MALFORMED-OID</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Malformed Object ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3ANZLEN-FOR-NULL.html">SNMP:ENCODING:NZLEN-FOR-NULL</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Non-zero Length For NULL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AOID-TOO-LONG.html">SNMP:ENCODING:OID-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Object ID Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AOIDVAL-TOO-BIG.html">SNMP:ENCODING:OIDVAL-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding OID Value Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3ATLEN-TOO-BIG.html">SNMP:ENCODING:TLEN-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Tag Length Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3ATT-TOO-BIG.html">SNMP:ENCODING:TT-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Invalid Timeticks Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AVALUE-MISSING.html">SNMP:ENCODING:VALUE-MISSING</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Value Missing For Set
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AZLEN-FOR-OID.html">SNMP:ENCODING:ZLEN-FOR-OID</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Zero Length For OID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENCODING%3AZLEN-FOR-VALUE.html">SNMP:ENCODING:ZLEN-FOR-VALUE</a></b></td>
   <td width="500" valign="top">
    SNMP: Encoding Zero Length For Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENUM%3ALM2-ACCESS.html">SNMP:ENUM:LM2-ACCESS</a></b></td>
   <td width="500" valign="top">
    SNMP: Lan Manager MIB-2 Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AENUM%3AORINOCO-INFO1.html">SNMP:ENUM:ORINOCO-INFO1</a></b></td>
   <td width="500" valign="top">
    SNMP: Orinoco SNMP Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3ACLIENT-RESPONSE.html">SNMP:ERROR:CLIENT-RESPONSE</a></b></td>
   <td width="500" valign="top">
    SNMP: Error Client Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID-MSG-FORMAT.html">SNMP:ERROR:INVALID-MSG-FORMAT</a></b></td>
   <td width="500" valign="top">
    SNMP: Invalid Message Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID-REQUEST.html">SNMP:ERROR:INVALID-REQUEST</a></b></td>
   <td width="500" valign="top">
    SNMP: Invalid Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID-RESPONSE.html">SNMP:ERROR:INVALID-RESPONSE</a></b></td>
   <td width="500" valign="top">
    SNMP: Invalid Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID_ESTATUS.html">SNMP:ERROR:INVALID_ESTATUS</a></b></td>
   <td width="500" valign="top">
    SNMP: Error Invalid Error Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID_GAUGE_VALUE.html">SNMP:ERROR:INVALID_GAUGE_VALUE</a></b></td>
   <td width="500" valign="top">
    SNMP Encoding: Invalid Gauge Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID_MAX_REPS.html">SNMP:ERROR:INVALID_MAX_REPS</a></b></td>
   <td width="500" valign="top">
    SNMP Encoding: Invalid Max Repetitions
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINVALID_TIMETICKS.html">SNMP:ERROR:INVALID_TIMETICKS</a></b></td>
   <td width="500" valign="top">
    SNMP Encoding: Invalid Timeticks Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AINV_NON_REPEATERS.html">SNMP:ERROR:INV_NON_REPEATERS</a></b></td>
   <td width="500" valign="top">
    SNMP Encoding: Invalid Non Repeaters
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3AMSG-TOO-SHORT.html">SNMP:ERROR:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    SNMP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AERROR%3ASERVER-REQUEST.html">SNMP:ERROR:SERVER-REQUEST</a></b></td>
   <td width="500" valign="top">
    SNMP: Server Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AFMT-STR-TCP.html">SNMP:FMT-STR-TCP</a></b></td>
   <td width="500" valign="top">
    SNMP: Format String Exploit (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AFREEBSD-GETBULKRQST-BO.html">SNMP:FREEBSD-GETBULKRQST-BO</a></b></td>
   <td width="500" valign="top">
    SNMP: FreeBSD bsnmpd GETBULK PDU Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AHMAC-AUTH-BYPASS.html">SNMP:HMAC-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    SNMP: HMAC Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AHMAC-AUTH-BYPASS-EXPLOIT.html">SNMP:HMAC-AUTH-BYPASS-EXPLOIT</a></b></td>
   <td width="500" valign="top">
    SNMP: HMAC Handling Authentication Bypass Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERROR_STATUS_GEN_ERR.html">SNMP:INFO:ERROR_STATUS_GEN_ERR</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Gen Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STATUS_WRG_LEN.html">SNMP:INFO:ERR_STATUS_WRG_LEN</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Wrong Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STATUS_WRG_TYPE.html">SNMP:INFO:ERR_STATUS_WRG_TYPE</a></b></td>
   <td width="500" valign="top">
    SNMP Response: Wrong Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_AUTH_ERROR.html">SNMP:INFO:ERR_STAT_AUTH_ERROR</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Authorization Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_COMMIT_FAILD.html">SNMP:INFO:ERR_STAT_COMMIT_FAILD</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Commit Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_INCON_NAME.html">SNMP:INFO:ERR_STAT_INCON_NAME</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Inconsistent Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_INCON_VAL.html">SNMP:INFO:ERR_STAT_INCON_VAL</a></b></td>
   <td width="500" valign="top">
    SNMP Response: Inconsistent Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_NOT_WRITABLE.html">SNMP:INFO:ERR_STAT_NOT_WRITABLE</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Not Writable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_NO_ACCESS.html">SNMP:INFO:ERR_STAT_NO_ACCESS</a></b></td>
   <td width="500" valign="top">
    SNMP: Response No Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_NO_CREAT.html">SNMP:INFO:ERR_STAT_NO_CREAT</a></b></td>
   <td width="500" valign="top">
    SNMP: Response No Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_RES_UNAVAIL.html">SNMP:INFO:ERR_STAT_RES_UNAVAIL</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Resource Unavailable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_UNDO_FAILD.html">SNMP:INFO:ERR_STAT_UNDO_FAILD</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Undo Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_WRG_ENC.html">SNMP:INFO:ERR_STAT_WRG_ENC</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Wrong Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3AINFO%3AERR_STAT_WRONG_VAL.html">SNMP:INFO:ERR_STAT_WRONG_VAL</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Wrong Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ARESPONSE%3AREAD-ONLY.html">SNMP:RESPONSE:READ-ONLY</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Read Only
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ARESPONSE%3ATOO-BIG.html">SNMP:RESPONSE:TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMP: Response Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ASNMPV1.html">SNMP:SNMPV1</a></b></td>
   <td width="500" valign="top">
    SNMPv1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ASNMPV2C.html">SNMP:SNMPV2C</a></b></td>
   <td width="500" valign="top">
    SNMPv2c
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ASNMPV2U.html">SNMP:SNMPV2U</a></b></td>
   <td width="500" valign="top">
    SNMPv2u
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ASNMPV3.html">SNMP:SNMPV3</a></b></td>
   <td width="500" valign="top">
    SNMPv3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ASQUID-PROXY-ASN1-OF.html">SNMP:SQUID-PROXY-ASN1-OF</a></b></td>
   <td width="500" valign="top">
    SNMP: Squid SNMP Proxy ASN.1 Parser Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMP%3ATRAP-DECODE-DOS.html">SNMP:TRAP-DECODE-DOS</a></b></td>
   <td width="500" valign="top">
    SNMP: SNMP_TRAP_DECODE Denial Of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SNMPTRAP"></a>SNMPTRAP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AAUDIT%3APRIVATE.html">SNMPTRAP:AUDIT:PRIVATE</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community Private
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AAUDIT%3APROXY-AGENT.html">SNMPTRAP:AUDIT:PROXY-AGENT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Proxy Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AAUDIT%3APUBLIC.html">SNMPTRAP:AUDIT:PUBLIC</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community Public
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AAUDIT%3AUNKNOWN-VERSION.html">SNMPTRAP:AUDIT:UNKNOWN-VERSION</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Unknown Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3ACOMMUNITY%3AFORMAT-CHAR.html">SNMPTRAP:COMMUNITY:FORMAT-CHAR</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community FORMAT Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3ACOMMUNITY%3ANULL-CHAR.html">SNMPTRAP:COMMUNITY:NULL-CHAR</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community NULL Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3ACOMMUNITY%3AOVERFLOW-1K.html">SNMPTRAP:COMMUNITY:OVERFLOW-1K</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community Overflow in SNMP Trap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3ACOMMUNITY%3AZERO-LEN.html">SNMPTRAP:COMMUNITY:ZERO-LEN</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Community Zero Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3ACNTR-TOO-BIG.html">SNMPTRAP:ENCODING:CNTR-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Counter Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AGAUGE-TOO-BIG.html">SNMPTRAP:ENCODING:GAUGE-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Gauge Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AINT-TOO-BIG.html">SNMPTRAP:ENCODING:INT-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Integer Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AINVALID-MROOT.html">SNMPTRAP:ENCODING:INVALID-MROOT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid MIB Root
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AIP-TOO-BIG.html">SNMPTRAP:ENCODING:IP-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid IP Address Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AMALFORMED-OID.html">SNMPTRAP:ENCODING:MALFORMED-OID</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Malformed Object ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3ANZLEN-NULL.html">SNMPTRAP:ENCODING:NZLEN-NULL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Non-zero Length For NULL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AOID-TOO-LONG.html">SNMPTRAP:ENCODING:OID-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Object ID Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AOVAL-TOO-BIG.html">SNMPTRAP:ENCODING:OVAL-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: OID Value Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3ATLEN-TOO-BIG.html">SNMPTRAP:ENCODING:TLEN-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Tag Length Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3ATT-TOO-BIG.html">SNMPTRAP:ENCODING:TT-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Timeticks Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AZLEN-FOR-OID.html">SNMPTRAP:ENCODING:ZLEN-FOR-OID</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Zero Length For OID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AZLEN-VALUE.html">SNMPTRAP:ENCODING:ZLEN-VALUE</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Zero Length For Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AINVALID-MSG-FMT.html">SNMPTRAP:ERROR:INVALID-MSG-FMT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Message Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AINV_ERRSTAT_LEN.html">SNMPTRAP:ERROR:INV_ERRSTAT_LEN</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Error Status Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AINV_ERR_STAT.html">SNMPTRAP:ERROR:INV_ERR_STAT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Error Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AINV_GAUGE_VAL.html">SNMPTRAP:ERROR:INV_GAUGE_VAL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Gauge Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AINV_TIMETICKS.html">SNMPTRAP:ERROR:INV_TIMETICKS</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Invalid Timeticks Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AMSG-TOO-SHORT.html">SNMPTRAP:ERROR:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AUNEXPECTED-REPLY.html">SNMPTRAP:ERROR:UNEXPECTED-REPLY</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Unexpected Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_2BIG.html">SNMPTRAP:INFO:ERR_STAT_2BIG</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Too big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_AUTH_ERR.html">SNMPTRAP:INFO:ERR_STAT_AUTH_ERR</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Authorization Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_BAD_VAL.html">SNMPTRAP:INFO:ERR_STAT_BAD_VAL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Bad Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_COM_FAIL.html">SNMPTRAP:INFO:ERR_STAT_COM_FAIL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Commit Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_GEN_ERR.html">SNMPTRAP:INFO:ERR_STAT_GEN_ERR</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Generic Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_NOT_WRIT.html">SNMPTRAP:INFO:ERR_STAT_NOT_WRIT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Not Writable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_NO_ACC.html">SNMPTRAP:INFO:ERR_STAT_NO_ACC</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status No Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_NO_CREAT.html">SNMPTRAP:INFO:ERR_STAT_NO_CREAT</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status No Creation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_NO_NAME.html">SNMPTRAP:INFO:ERR_STAT_NO_NAME</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status No Such Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_RD_ONLY.html">SNMPTRAP:INFO:ERR_STAT_RD_ONLY</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Read Only
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_WRNG_ENC.html">SNMPTRAP:INFO:ERR_STAT_WRNG_ENC</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Wrong Encoding
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3AERR_STAT_WRNG_LEN.html">SNMPTRAP:INFO:ERR_STAT_WRNG_LEN</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Wrong Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_INCON_NAME.html">SNMPTRAP:INFO:STAT_INCON_NAME</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Inconsistent Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_INCON_VAL.html">SNMPTRAP:INFO:STAT_INCON_VAL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Inconsistent Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_OTHER_ERR.html">SNMPTRAP:INFO:STAT_OTHER_ERR</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Other Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_RSUNAVAIL.html">SNMPTRAP:INFO:STAT_RSUNAVAIL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Resource Unavailable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_UNDO_FAIL.html">SNMPTRAP:INFO:STAT_UNDO_FAIL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Undo Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_WRNG_TYPE.html">SNMPTRAP:INFO:STAT_WRNG_TYPE</a></b></td>
   <td width="500" valign="top">
    SNMP Trap: Error Status Wrong Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SNMPTRAP%3AINFO%3ASTAT_WRNG_VAL.html">SNMPTRAP:INFO:STAT_WRNG_VAL</a></b></td>
   <td width="500" valign="top">
    SNMPTRAP: Error Status Wrong Value
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SPYWARE"></a>SPYWARE</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3A2005SEARCHLOADER.html">SPYWARE:AD:2005SEARCHLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 2005-search Loader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3A2MFREEGAMES.html">SPYWARE:AD:2MFREEGAMES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 2M Free Games
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3A3WPLAYER_1_7.html">SPYWARE:AD:3WPLAYER_1_7</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 3wPlayer 1.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3A4ARCADEPBAR.html">SPYWARE:AD:4ARCADEPBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 4ArcadePBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3A7FASST.html">SPYWARE:AD:7FASST</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 7FaSST
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AA9TOOLBAR.html">SPYWARE:AD:A9TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: A9 Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AACCESSIBILITYTOOLBAR.html">SPYWARE:AD:ACCESSIBILITYTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AccessibilityToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AACTIVESEARCH.html">SPYWARE:AD:ACTIVESEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Active Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADBARS.html">SPYWARE:AD:ADBARS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Adbars
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADCLICKER-EJ.html">SPYWARE:AD:ADCLICKER-EJ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AdClicker-EJ
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADSTART.html">SPYWARE:AD:ADSTART</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Adstart
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADTOOLS.html">SPYWARE:AD:ADTOOLS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AdTools
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADULTLINKS.html">SPYWARE:AD:ADULTLINKS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AdultLinks
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AADULTP2P_1_5.html">SPYWARE:AD:ADULTP2P_1_5</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Adult P2P 1.5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AALLSUM.html">SPYWARE:AD:ALLSUM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AllSum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AALTAVISTATOOLBAR.html">SPYWARE:AD:ALTAVISTATOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AltaVistaToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AAORNUM.html">SPYWARE:AD:AORNUM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Aornum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AAPROPOSMEDIA.html">SPYWARE:AD:APROPOSMEDIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AproposMedia
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AARESPREMIUM.html">SPYWARE:AD:ARESPREMIUM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AresPremium
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AASIAFINESTTOOLBAR.html">SPYWARE:AD:ASIAFINESTTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Asia Finest Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AASKJEEVESTOOLBAR.html">SPYWARE:AD:ASKJEEVESTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AskJeevesToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AATGAMES.html">SPYWARE:AD:ATGAMES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ATGames
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AATLAS.html">SPYWARE:AD:ATLAS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Atlas
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AAURORA.html">SPYWARE:AD:AURORA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Aurora
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AAVSYSTEMCARE.html">SPYWARE:AD:AVSYSTEMCARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AVSystemCare
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABARGAINBUDDY.html">SPYWARE:AD:BARGAINBUDDY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BargainBuddy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABESTOFFERS.html">SPYWARE:AD:BESTOFFERS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BestOffers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABLOWSEARCH.html">SPYWARE:AD:BLOWSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Blowsearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABLUBSTER-2X.html">SPYWARE:AD:BLUBSTER-2X</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Blubster 2.0 and 2.5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABONZIBUD.html">SPYWARE:AD:BONZIBUD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bonzi Buddy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABORLAN.html">SPYWARE:AD:BORLAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Borlan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABROADCASTPC.html">SPYWARE:AD:BROADCASTPC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BroadcastPC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABROADCASTURBANTUNER.html">SPYWARE:AD:BROADCASTURBANTUNER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BroadcastURBAN-Tuner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABROWSERACCELERATOR.html">SPYWARE:AD:BROWSERACCELERATOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BrowserAccelerator Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABTGRAB.html">SPYWARE:AD:BTGRAB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BTGrab
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ABUNDLEWARE.html">SPYWARE:AD:BUNDLEWARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BundleWare
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACALLINGHOME-BIZ.html">SPYWARE:AD:CALLINGHOME-BIZ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Callinghome-biz
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACASALEMEDIA.html">SPYWARE:AD:CASALEMEDIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Casalemedia
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACASHBACK.html">SPYWARE:AD:CASHBACK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CashBack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACASINOONNET.html">SPYWARE:AD:CASINOONNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CasinoOnNet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACINMUS.html">SPYWARE:AD:CINMUS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Cinmus
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACLIPGENIE.html">SPYWARE:AD:CLIPGENIE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Clipgenie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACOMEDYPLANET.html">SPYWARE:AD:COMEDYPLANET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ComedyPlanet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACOMODOTOOLBAR.html">SPYWARE:AD:COMODOTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Comodo Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACOMTRYMUSICDL.html">SPYWARE:AD:COMTRYMUSICDL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ComTry Music Downloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACONTRA_VIRUS.html">SPYWARE:AD:CONTRA_VIRUS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ContraVirus
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACOOPEN.html">SPYWARE:AD:COOPEN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Coopen 3.6.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACRACKSPIDER.html">SPYWARE:AD:CRACKSPIDER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CrackSpider
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACRAZYWINNINGS.html">SPYWARE:AD:CRAZYWINNINGS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Crazywinnings
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ACUSTOMTOOLBAR.html">SPYWARE:AD:CUSTOMTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Custom Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADELFINMEDIAVIEWER.html">SPYWARE:AD:DELFINMEDIAVIEWER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Delfin Media Viewer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADESKTOPMEDIA.html">SPYWARE:AD:DESKTOPMEDIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DesktopMedia
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADIVXPRO.html">SPYWARE:AD:DIVXPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DivXPro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADIYBAR.html">SPYWARE:AD:DIYBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DiyBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADOGPILETOOLBAR.html">SPYWARE:AD:DOGPILETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dogpile Search Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADOWNLOAD-ACCEL.html">SPYWARE:AD:DOWNLOAD-ACCEL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Download Accelerator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADOWNLOADER-G.html">SPYWARE:AD:DOWNLOADER-G</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Generic Downloader.g
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADOWNLOADRECEIVER.html">SPYWARE:AD:DOWNLOADRECEIVER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EAcceleration-DownloadReceiver
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADOWNLOADWARE.html">SPYWARE:AD:DOWNLOADWARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DownloadWare
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ADRIVECLEANER10111.html">SPYWARE:AD:DRIVECLEANER10111</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Drive Cleaner 1.0.111
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEARTHLINKTOOLBAR.html">SPYWARE:AD:EARTHLINKTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Earthlink Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AELITEBAR.html">SPYWARE:AD:ELITEBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchMiracle-EliteBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AELITE_PROTECTOR.html">SPYWARE:AD:ELITE_PROTECTOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Elite Protector
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEMPIREPOKER.html">SPYWARE:AD:EMPIREPOKER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EmpirePoker
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEQISO.html">SPYWARE:AD:EQISO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Eqiso
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AESYNDICATE.html">SPYWARE:AD:ESYNDICATE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: eSyndicate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEXACTNAVISEARCH.html">SPYWARE:AD:EXACTNAVISEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Exact-NaviSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEXACTSEARCH.html">SPYWARE:AD:EXACTSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ExactSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEZSEARCHBAR.html">SPYWARE:AD:EZSEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EzSearchBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEZTRACKS.html">SPYWARE:AD:EZTRACKS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EZTracks
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AEZULA-TOPTEXT.html">SPYWARE:AD:EZULA-TOPTEXT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EZula-TopText
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AFAVSEARCH.html">SPYWARE:AD:FAVSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Favsearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AFREEDOWNLOADMANAGER.html">SPYWARE:AD:FREEDOWNLOADMANAGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Free Download Manager
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AFREESCRATCHANDWIN.html">SPYWARE:AD:FREESCRATCHANDWIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FreeScratchAndWin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AFREEWAREFILEBAR.html">SPYWARE:AD:FREEWAREFILEBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Freeware FileBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AFUNBUDDYICONS.html">SPYWARE:AD:FUNBUDDYICONS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FunBuddyIcons
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGABESTMEDIAPLAYER.html">SPYWARE:AD:GABESTMEDIAPLAYER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Gabest Media Player Classic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGAMEBAR.html">SPYWARE:AD:GAMEBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GameBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGAMESPY-ARCADE.html">SPYWARE:AD:GAMESPY-ARCADE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GameSpy Arcade
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGEOMUNDOSTOOLBAR.html">SPYWARE:AD:GEOMUNDOSTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GeomundosToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGIRAFATOOLBAR.html">SPYWARE:AD:GIRAFATOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Girafa Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGOLDENPALACECASINO.html">SPYWARE:AD:GOLDENPALACECASINO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Golden Palace Casino
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGOLDRIVIERACASINO.html">SPYWARE:AD:GOLDRIVIERACASINO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GoldRiviera Casino
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGOPHORIA010B.html">SPYWARE:AD:GOPHORIA010B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GoPhoria Toolbar 0.1.0b
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AGROOWESEARCHBAR.html">SPYWARE:AD:GROOWESEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Groowe Search Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHANSONELLISTOOLBAR.html">SPYWARE:AD:HANSONELLISTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hanson Ellis Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHENBANG.html">SPYWARE:AD:HENBANG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Henbang
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHOTBAR.html">SPYWARE:AD:HOTBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hotbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHOTBOTDESKBAR.html">SPYWARE:AD:HOTBOTDESKBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HotBot Quick Search Deskbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHOTOFFERS.html">SPYWARE:AD:HOTOFFERS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HotOffers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHSADVISORTOOLBAR.html">SPYWARE:AD:HSADVISORTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HSAdvisor Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AHXDL.html">SPYWARE:AD:HXDL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HXDL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AICOOLOADER25.html">SPYWARE:AD:ICOOLOADER25</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ICOO Loader 2.5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIEDEFENDER.html">SPYWARE:AD:IEDEFENDER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IEDefender
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIGETNET.html">SPYWARE:AD:IGETNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IGetNet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIMNAMES.html">SPYWARE:AD:IMNAMES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IMNames
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AINEXPLORERTOOLBAR.html">SPYWARE:AD:INEXPLORERTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: inExplorer Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AINSTANTBUZZ.html">SPYWARE:AD:INSTANTBUZZ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Instant Buzz
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AISEARCH.html">SPYWARE:AD:ISEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ISearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIST-ISTBAR.html">SPYWARE:AD:IST-ISTBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IST.ISTbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIST-POWERSCAN.html">SPYWARE:AD:IST-POWERSCAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IST.PowerScan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AIZITOTOOLBAR.html">SPYWARE:AD:IZITOTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: iZito Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AJILYIETOOLBAR.html">SPYWARE:AD:JILYIETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Jily IE Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AKAZOOM.html">SPYWARE:AD:KAZOOM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Kazoom
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AKEENVALUE.html">SPYWARE:AD:KEENVALUE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: KeenValue
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AKOOLBAR.html">SPYWARE:AD:KOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: KoolBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ALINKSPIDERSEARCHBAR.html">SPYWARE:AD:LINKSPIDERSEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LinkSpider SearchBar2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ALIVEPROTECTION.html">SPYWARE:AD:LIVEPROTECTION</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Live Protection 2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ALORDOFSEARCH.html">SPYWARE:AD:LORDOFSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lordofsearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMALWARE-ALARM.html">SPYWARE:AD:MALWARE-ALARM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Malware Alarm
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMALWARE_CRUSH_3_7.html">SPYWARE:AD:MALWARE_CRUSH_3_7</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Malware Crush 3.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMAPQUEST-TOOLBAR.html">SPYWARE:AD:MAPQUEST-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MapQuest Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMEDIATICKETS.html">SPYWARE:AD:MEDIATICKETS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mediatickets
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMETAEUREKA.html">SPYWARE:AD:METAEUREKA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MetaEureka
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMIDADDLE.html">SPYWARE:AD:MIDADDLE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MidAddle
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMINIBUG.html">SPYWARE:AD:MINIBUG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MiniBug
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMIRAGOSEARCHBAR.html">SPYWARE:AD:MIRAGOSEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mirago Search Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMOKEAD.html">SPYWARE:AD:MOKEAD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MokeAd
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMONEYBAR.html">SPYWARE:AD:MONEYBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MoneyBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMYDAILYHOROSCOPE.html">SPYWARE:AD:MYDAILYHOROSCOPE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyDailyHoroscope
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMYSEARCHADROTATOR.html">SPYWARE:AD:MYSEARCHADROTATOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MySearch-Adrotator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMYWAYSEARCHBAR.html">SPYWARE:AD:MYWAYSEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyWay Search Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AMYWEBSEARCHTOOLBAR.html">SPYWARE:AD:MYWEBSEARCHTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyWebSearch Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANABAZATOOLBAR.html">SPYWARE:AD:NABAZATOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nabaza ToolBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANETGUARDERWEBCLEANER.html">SPYWARE:AD:NETGUARDERWEBCLEANER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Netguarder Web Cleaner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANETPUMPER126.html">SPYWARE:AD:NETPUMPER126</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetPumper 1.26
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANETSTER.html">SPYWARE:AD:NETSTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Netster
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANETWORDAGENT.html">SPYWARE:AD:NETWORDAGENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Netword Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANETWORKESSENTIALS.html">SPYWARE:AD:NETWORKESSENTIALS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Network Essentials
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANEW-DOT-NET.html">SPYWARE:AD:NEW-DOT-NET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: New.net
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANEWWEB.html">SPYWARE:AD:NEWWEB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NewWeb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ANICTECH-BM2.html">SPYWARE:AD:NICTECH-BM2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NicTech.BM2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AOFFEROPTIMIZER.html">SPYWARE:AD:OFFEROPTIMIZER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: OfferOptimizer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APACIMEDIA.html">SPYWARE:AD:PACIMEDIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Pacimedia
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APALTALK.html">SPYWARE:AD:PALTALK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PalTalk
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APARTYPOKER07.html">SPYWARE:AD:PARTYPOKER07</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PartyPoker_07
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APEOPLEONPAGE.html">SPYWARE:AD:PEOPLEONPAGE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PeopleOnPage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APESTBOT.html">SPYWARE:AD:PESTBOT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PestBot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APOWERSTRIP.html">SPYWARE:AD:POWERSTRIP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PowerStrip
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APOWERZONE.html">SPYWARE:AD:POWERZONE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Powerzone
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APPRICH.html">SPYWARE:AD:PPRICH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PPRich
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APRAIZETOOLBAR.html">SPYWARE:AD:PRAIZETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PraizeToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APRICE-FOUNTAIN.html">SPYWARE:AD:PRICE-FOUNTAIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Price Fountain adware
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3APURITYSCAN.html">SPYWARE:AD:PURITYSCAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PurityScan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AROOGOO.html">SPYWARE:AD:ROOGOO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Roogoo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASC-SEARCH-O-MATIC.html">SPYWARE:AD:SC-SEARCH-O-MATIC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchCentrix-Search-O-Matic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASEARCHHIPPOTOOLBAR.html">SPYWARE:AD:SEARCHHIPPOTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchHippo Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASEARCHITBAR.html">SPYWARE:AD:SEARCHITBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchitBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASEEQTOOLBAR.html">SPYWARE:AD:SEEQTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SeeqToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASEPRO.html">SPYWARE:AD:SEPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sepro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASHOPATHOMESELECT.html">SPYWARE:AD:SHOPATHOMESELECT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ShopAtHomeSelect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASHOPNAV.html">SPYWARE:AD:SHOPNAV</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Shopnav
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASIDEFIND.html">SPYWARE:AD:SIDEFIND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SideFind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASIMBAR.html">SPYWARE:AD:SIMBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Simbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASMARTPOPS.html">SPYWARE:AD:SMARTPOPS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SmartPops
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASNAPULTRASEARCH136.html">SPYWARE:AD:SNAPULTRASEARCH136</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Snap Ultrasearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASPEDIABAR.html">SPYWARE:AD:SPEDIABAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpediaBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASPYWARENUKER.html">SPYWARE:AD:SPYWARENUKER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpyWareNuker
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASPY_SHREDDER_2_1.html">SPYWARE:AD:SPY_SHREDDER_2_1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spy Shredder 2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASSSPIDER.html">SPYWARE:AD:SSSPIDER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SSSpider
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASTARWARETOOLBAR.html">SPYWARE:AD:STARWARETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Starware Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASTATIONRIPPER.html">SPYWARE:AD:STATIONRIPPER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StationRipper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUNSHINESPY_1_0.html">SPYWARE:AD:SUNSHINESPY_1_0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sunshine Spy 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUPERFASTMP3SEARCH.html">SPYWARE:AD:SUPERFASTMP3SEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Super Fast MP3 Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUPERFISH.html">SPYWARE:AD:SUPERFISH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Superfish
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUPERFISH-INSTALL.html">SPYWARE:AD:SUPERFISH-INSTALL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Superfish(1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASYSTEM-DOCTOR.html">SPYWARE:AD:SYSTEM-DOCTOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: System Doctor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATARGETSAVER.html">SPYWARE:AD:TARGETSAVER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Target Saver
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATEOMA.html">SPYWARE:AD:TEOMA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Teoma
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATOOLBARBROWSER.html">SPYWARE:AD:TOOLBARBROWSER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Trellian-ToolbarBrowser
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATOPICKS.html">SPYWARE:AD:TOPICKS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TOPicks
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATRANSPONDERSTUB.html">SPYWARE:AD:TRANSPONDERSTUB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Transponder-Stub
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATRELLIANTOOLBAR.html">SPYWARE:AD:TRELLIANTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TrellianToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3ATVZSEARCH.html">SPYWARE:AD:TVZSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TotalVelocity Zsearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AU88.html">SPYWARE:AD:U88</a></b></td>
   <td width="500" valign="top">
    SPYWARE: U88
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AULTRABAR.html">SPYWARE:AD:ULTRABAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: UltraBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AURLBLAZE.html">SPYWARE:AD:URLBLAZE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: URLBlaze
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVEGASPALMSCASINO.html">SPYWARE:AD:VEGASPALMSCASINO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VegasPalmsCasino
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVIEWPOINTMEDIA.html">SPYWARE:AD:VIEWPOINTMEDIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Viewpoint Media Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVIRTUMONDE.html">SPYWARE:AD:VIRTUMONDE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Virtumonde
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVIRUSPROTECTPRO37.html">SPYWARE:AD:VIRUSPROTECTPRO37</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VirusProtectPro 3.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVROOMSEARCH.html">SPYWARE:AD:VROOMSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VroomSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AVX2-LOCALNRD.html">SPYWARE:AD:VX2-LOCALNRD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VX2-LocalNRD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWAREZP2P.html">SPYWARE:AD:WAREZP2P</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WarezP2P
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWEBCPR.html">SPYWARE:AD:WEBCPR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WebCpr
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWEBREDIR.html">SPYWARE:AD:WEBREDIR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Webredir
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWEBSEARCH.html">SPYWARE:AD:WEBSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Websearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWHENU-CLOCKSYNC.html">SPYWARE:AD:WHENU-CLOCKSYNC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Whenu.clocksync
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWHENUSAVENOW.html">SPYWARE:AD:WHENUSAVENOW</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WhenU-SaveNow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWHENUSEARCH.html">SPYWARE:AD:WHENUSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WhenU-WhenUSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWHENUWEATHERCAST.html">SPYWARE:AD:WHENUWEATHERCAST</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WhenU-Weathercast
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINADISCOUNT.html">SPYWARE:AD:WINADISCOUNT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinADiscount Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINANTIVIRUSPRO2007.html">SPYWARE:AD:WINANTIVIRUSPRO2007</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinAntiVirus Pro 2007
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINFIXER2005.html">SPYWARE:AD:WINFIXER2005</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinFixer 2005
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINPUP.html">SPYWARE:AD:WINPUP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Winpup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINSYSBA.html">SPYWARE:AD:WINSYSBA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Winsysba
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWINZIX-2-2-0.html">SPYWARE:AD:WINZIX-2-2-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinZix 2.2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWORDIQTOOLBAR.html">SPYWARE:AD:WORDIQTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WordIQ Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AWUPD-MEDIAACCESS.html">SPYWARE:AD:WUPD-MEDIAACCESS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WindUpdate-MediaAccess
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AX-CON3.2.8.html">SPYWARE:AD:X-CON3.2.8</a></b></td>
   <td width="500" valign="top">
    SPYWARE: X-Con Destroyer EH 3.2.8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AYAYAD.html">SPYWARE:AD:YAYAD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Yayad
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AYELLOWBRIDGETOOLBAR.html">SPYWARE:AD:YELLOWBRIDGETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YellowBridge Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AYOURPRIVACYGUARD.html">SPYWARE:AD:YOURPRIVACYGUARD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YourPrivacyGuard
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZAMINGO.html">SPYWARE:AD:ZAMINGO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zamingo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZANGOTOOLBAR.html">SPYWARE:AD:ZANGOTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zango Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZAPSPOT.html">SPYWARE:AD:ZAPSPOT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZapSpot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZENOSEARCH.html">SPYWARE:AD:ZENOSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZenoSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZIPITFAST.html">SPYWARE:AD:ZIPITFAST</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZipItFast!
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZTOOLBAR.html">SPYWARE:AD:ZTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AAD%3AZUVIO.html">SPYWARE:AD:ZUVIO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zuvio
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3A123MANIA.html">SPYWARE:BH:123MANIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 123Mania
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3A2ND-THOUGHT.html">SPYWARE:BH:2ND-THOUGHT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 2nd Thought
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3A3SEARCH.html">SPYWARE:BH:3SEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 3Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3A411WEBTOOLBAR.html">SPYWARE:BH:411WEBTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 411Web Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3A8848.html">SPYWARE:BH:8848</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 8848
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AABCSEARCH.html">SPYWARE:BH:ABCSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: abcSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AABLE2KNOWTOOLBAR.html">SPYWARE:BH:ABLE2KNOWTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Able2Know Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AABOUTBLANK.html">SPYWARE:BH:ABOUTBLANK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CoolWebSearch AboutBlank Variant
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AADTRAFFIC.html">SPYWARE:BH:ADTRAFFIC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Adtraffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ABAIDU_TOOLBAR_4_9_4.html">SPYWARE:BH:BAIDU_TOOLBAR_4_9_4</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Baidu Toolbar 4.9.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ABAZOOKABAR.html">SPYWARE:BH:BAZOOKABAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BazookaBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ABLAZEFIND.html">SPYWARE:BH:BLAZEFIND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BlazeFind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ABLUEWAVEADULTLINK-TB.html">SPYWARE:BH:BLUEWAVEADULTLINK-TB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Blue Wave Adult Links Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACNNICUPDATE.html">SPYWARE:BH:CNNICUPDATE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CNNIC Update
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACNSMIN-3721.html">SPYWARE:BH:CNSMIN-3721</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CnsMin-3721
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACOOLSEARCH.html">SPYWARE:BH:COOLSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Coolsearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACOUPONBAR.html">SPYWARE:BH:COUPONBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CouponBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACWS-CAMEUP.html">SPYWARE:BH:CWS-CAMEUP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CoolWebSearch-CameUp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACWS-GONNASEARCH.html">SPYWARE:BH:CWS-GONNASEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CoolWebSearch-GonnaSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ACWSSTARTPAGE-2.html">SPYWARE:BH:CWSSTARTPAGE-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CoolWebSearch-StartPage (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ADAOSEARCH.html">SPYWARE:BH:DAOSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DaoSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ADEALIO_TOOLBAR.html">SPYWARE:BH:DEALIO_TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dealio Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ADEEPDO_TOOLBAR.html">SPYWARE:BH:DEEPDO_TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Deepdo Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ADIGITALNAMES.html">SPYWARE:BH:DIGITALNAMES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Digital Names
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ADREAMBAR.html">SPYWARE:BH:DREAMBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dreambar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEXACTSEEK.html">SPYWARE:BH:EXACTSEEK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ExactSeek
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEXCITESEARCHBAR.html">SPYWARE:BH:EXCITESEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Excite Search Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEXTRATOOLBAR10.html">SPYWARE:BH:EXTRATOOLBAR10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Extra Toolbar 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEXTREME-BIZ.html">SPYWARE:BH:EXTREME-BIZ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Extreme Biz
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEZGREETS-TOOLBAR.html">SPYWARE:BH:EZGREETS-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ez-Greets Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AEZ_TRACKS_TOOLBAR.html">SPYWARE:BH:EZ_TRACKS_TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ez-Tracks Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AFFINDER.html">SPYWARE:BH:FFINDER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FFinder
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AFLASHBAR.html">SPYWARE:BH:FLASHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Flashbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AFREECRUISE-TB.html">SPYWARE:BH:FREECRUISE-TB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Freecruise Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AFREEZE-COM.html">SPYWARE:BH:FREEZE-COM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Freeze.com
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AFUNWEBPRODUCTS.html">SPYWARE:BH:FUNWEBPRODUCTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FunWebProducts
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AGETMIRAR.html">SPYWARE:BH:GETMIRAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GetMirar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AGRALICWRAP.html">SPYWARE:BH:GRALICWRAP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GralicWrap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AHDT_BAR.html">SPYWARE:BH:HDT_BAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HDTBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AHITHOPPER.html">SPYWARE:BH:HITHOPPER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HitHopper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AHOTBAR100368.html">SPYWARE:BH:HOTBAR100368</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hotbar 10.0.368
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AILOOKUP.html">SPYWARE:BH:ILOOKUP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ILookup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AIMESHBAR.html">SPYWARE:BH:IMESHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: iMeshbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AIMESHMEDIABAR.html">SPYWARE:BH:IMESHMEDIABAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: iMesh Mediabar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AINTERNETOPTIMIZER.html">SPYWARE:BH:INTERNETOPTIMIZER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Internet Optimizer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AISTSLOTCHBAR.html">SPYWARE:BH:ISTSLOTCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IST-Slotchbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AKOMPASS-TOOLBAR.html">SPYWARE:BH:KOMPASS-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Kompass Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AKWORD-INTERKEY.html">SPYWARE:BH:KWORD-INTERKEY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Kword Interkey
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ALOCATORSTOOLBAR.html">SPYWARE:BH:LOCATORSTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LocatorsToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ALOOKQUICK.html">SPYWARE:BH:LOOKQUICK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LookQuick
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ALOOKSTER.html">SPYWARE:BH:LOOKSTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lookster
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ALOOKTHRUBAR.html">SPYWARE:BH:LOOKTHRUBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LookThru Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ALYCOSSIDESEARCH.html">SPYWARE:BH:LYCOSSIDESEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lycos Sidesearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AMAPSTANTOOLBAR.html">SPYWARE:BH:MAPSTANTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mapstan ToolBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AMICROGRAMING.html">SPYWARE:BH:MICROGRAMING</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Microgaming
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AMORPHEUS-TOOLBAR.html">SPYWARE:BH:MORPHEUS-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Morpheus Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AMUSICSTARWARETOOL.html">SPYWARE:BH:MUSICSTARWARETOOL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Music Starware Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AMYFUNCARDS.html">SPYWARE:BH:MYFUNCARDS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyFunCards
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ANAVEXCEL.html">SPYWARE:BH:NAVEXCEL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Navexcel
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ANAVEXCEL-HELPER.html">SPYWARE:BH:NAVEXCEL-HELPER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Navexcel-Helper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ANEED2FIND.html">SPYWARE:BH:NEED2FIND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Need2Find
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ANEWDOTNETQUICKSEARCH.html">SPYWARE:BH:NEWDOTNETQUICKSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NewDotNet Quick! Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AOEMJIBAR.html">SPYWARE:BH:OEMJIBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Oemji Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AONESTEPSEARCH10118.html">SPYWARE:BH:ONESTEPSEARCH10118</a></b></td>
   <td width="500" valign="top">
    SPYWARE: OneStepSearch 1.0.118
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3APEOPLE_PAL_6_6.html">SPYWARE:BH:PEOPLE_PAL_6_6</a></b></td>
   <td width="500" valign="top">
    SPYWARE: People Pal 6.6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3APERSONALWEB.html">SPYWARE:BH:PERSONALWEB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PersonalWeb
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3APHAZEBAR.html">SPYWARE:BH:PHAZEBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PhazeBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3APROVENTACTICS35.html">SPYWARE:BH:PROVENTACTICS35</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ProvenTactics 3.5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3APUSHTOOLBAR.html">SPYWARE:BH:PUSHTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Push Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AQCBAR.html">SPYWARE:BH:QCBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Qcbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AQMTOOLBAR.html">SPYWARE:BH:QMTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: QM Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ARABIO42.html">SPYWARE:BH:RABIO42</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Rabio 4.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ARICERCADOPPIA.html">SPYWARE:BH:RICERCADOPPIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ricercadoppia
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ARX-TOOLBAR.html">SPYWARE:BH:RX-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: RX Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASBUHOTBAR484.html">SPYWARE:BH:SBUHOTBAR484</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SBU hotbar 4.8.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASCNTOOLBAR.html">SPYWARE:BH:SCNTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SCN Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEARCH4TOP.html">SPYWARE:BH:SEARCH4TOP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Search4top
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEARCHESSISTANT.html">SPYWARE:BH:SEARCHESSISTANT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchEssistant
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEARCHFORIT.html">SPYWARE:BH:SEARCHFORIT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchForIt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEARCHNUGGET.html">SPYWARE:BH:SEARCHNUGGET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchNugget
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEARCHSQUIRE.html">SPYWARE:BH:SEARCHSQUIRE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchSquire
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASEXYVIDEOSCREENSAVER.html">SPYWARE:BH:SEXYVIDEOSCREENSAVER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SexyVideoScreenSaver
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASIDEFIND-1-0.html">SPYWARE:BH:SIDEFIND-1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Side Find 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASIDESTEP.html">SPYWARE:BH:SIDESTEP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SideStep
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASNAPTOOLBAR.html">SPYWARE:BH:SNAPTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Snap Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASOFA_TOOLBAR.html">SPYWARE:BH:SOFA_TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sofa Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASOGOU.html">SPYWARE:BH:SOGOU</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sogou
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASOSOTOOLBAR.html">SPYWARE:BH:SOSOTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SOSO Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASPOTON.html">SPYWARE:BH:SPOTON</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpotOn
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASPYNOVA.html">SPYWARE:BH:SPYNOVA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spynova
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASTARTNOW.html">SPYWARE:BH:STARTNOW</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Startnow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASTUMBLEUPON.html">SPYWARE:BH:STUMBLEUPON</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StumbleUpon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ASWBAR-ADROAD-CPR.html">SPYWARE:BH:SWBAR-ADROAD-CPR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SWBar AdRoad.Cpr
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3ATHECOOLBAR.html">SPYWARE:BH:THECOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TheCoolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AVIPNETLINK.html">SPYWARE:BH:VIPNETLINK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VIP NetLink
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AWISHBONE.html">SPYWARE:BH:WISHBONE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Wishbone
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AWOWOK-MP3.html">SPYWARE:BH:WOWOK-MP3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Wowok Mp3 Bar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AYELLOWPAGES.html">SPYWARE:BH:YELLOWPAGES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YellowPages
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AYOKSUPERSEARCH.html">SPYWARE:BH:YOKSUPERSEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YOK SuperSearch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AYOURSITEBAR.html">SPYWARE:BH:YOURSITEBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YourSiteBar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABH%3AZEROPOPUP.html">SPYWARE:BH:ZEROPOPUP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zeropopup
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ABAIGOO.html">SPYWARE:BP:BAIGOO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Baigoo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ABROWSERACCELERATOR30.html">SPYWARE:BP:BROWSERACCELERATOR30</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Browser Accelerator 3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ABYDOU.html">SPYWARE:BP:BYDOU</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bydou
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ABYSOO.html">SPYWARE:BP:BYSOO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bysoo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ACOMETCURSOR.html">SPYWARE:BP:COMETCURSOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Comet Cursor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ADITTO_TOOLBAR.html">SPYWARE:BP:DITTO_TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ditto Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AETCETERASEARCH.html">SPYWARE:BP:ETCETERASEARCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Etcetera Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AHAPPYTOFIND.html">SPYWARE:BP:HAPPYTOFIND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HappyToFind
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AIECODEC.html">SPYWARE:BP:IECODEC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IECodec
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AIEPLUGIN.html">SPYWARE:BP:IEPLUGIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IEplugin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AINTERNETMARKETINGBAR.html">SPYWARE:BP:INTERNETMARKETINGBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Internet Marketing Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AMACHERSTOOLBAR.html">SPYWARE:BP:MACHERSTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Machers Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AMIRARTOOLBAR.html">SPYWARE:BP:MIRARTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mirar Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ANEWNET.html">SPYWARE:BP:NEWNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: New Net
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ARUSSIAN-SEARCHBAR.html">SPYWARE:BP:RUSSIAN-SEARCHBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Russian Searchbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3ASMILEYCENTRAL.html">SPYWARE:BP:SMILEYCENTRAL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Smiley Central
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AUPLINK.html">SPYWARE:BP:UPLINK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Uplink
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AWILDTANGENT.html">SPYWARE:BP:WILDTANGENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WildTangent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ABP%3AZQUEST-COOKIE.html">SPYWARE:BP:ZQUEST-COOKIE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZQuest Cookie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3AEASYDATES.html">SPYWARE:DIALER:EASYDATES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EasyDates
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3AIEACCESS.html">SPYWARE:DIALER:IEACCESS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: IEAccess
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3APLUGINACCESS.html">SPYWARE:DIALER:PLUGINACCESS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PluginAccess
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3ASTRIPPLAYER.html">SPYWARE:DIALER:STRIPPLAYER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StripPlayer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3ATIB-PORN-DIALER.html">SPYWARE:DIALER:TIB-PORN-DIALER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TIB_Porn_Dialer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADIALER%3AYEAKNET.html">SPYWARE:DIALER:YEAKNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YeakNet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3AALEXA-TOOLBAR.html">SPYWARE:DM:ALEXA-TOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Alexa Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3AALTNET-VAR1.html">SPYWARE:DM:ALTNET-VAR1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Altnet variant 1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3ABRIDALBASICS.html">SPYWARE:DM:BRIDALBASICS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bridal Basics
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3ADWN-ARL.html">SPYWARE:DM:DWN-ARL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Downloader ARL 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3AKONTIKI.html">SPYWARE:DM:KONTIKI</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Kontiki
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3AMYNAPSTER.html">SPYWARE:DM:MYNAPSTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyNapster
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3APOPULARSCREENSAVERS.html">SPYWARE:DM:POPULARSCREENSAVERS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PopularScreensavers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3ASLINKYSLATETOOLBAR.html">SPYWARE:DM:SLINKYSLATETOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Slinkyslate Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3ATRUSTYFILES.html">SPYWARE:DM:TRUSTYFILES</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TrustyFiles
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ADM%3AWEBHANCER.html">SPYWARE:DM:WEBHANCER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Webhancer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AALBUMGALAXY.html">SPYWARE:GM:ALBUMGALAXY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Album Galaxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ACHILDWEBGUARDIAN.html">SPYWARE:GM:CHILDWEBGUARDIAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ChildWebGuardian
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ADOTCOMTOOLBAR.html">SPYWARE:GM:DOTCOMTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dotcomtoolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AEDONKEY2000.html">SPYWARE:GM:EDONKEY2000</a></b></td>
   <td width="500" valign="top">
    SPYWARE: eDonkey2000
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AERRORSAFE.html">SPYWARE:GM:ERRORSAFE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ErrorSafe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AEXPERTANTIVIRUS41.html">SPYWARE:GM:EXPERTANTIVIRUS41</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ExpertAntivirus 4.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AIOWAWEBDOWNLOADER.html">SPYWARE:GM:IOWAWEBDOWNLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Iowa WebDownloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AMYSPACEBARIE.html">SPYWARE:GM:MYSPACEBARIE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MySpaceBar IE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ANETCRAFTTOOLBAR.html">SPYWARE:GM:NETCRAFTTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Netcraft Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3APCAST.html">SPYWARE:GM:PCAST</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Pcast
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ARELEVANTKNOWLEDGE.html">SPYWARE:GM:RELEVANTKNOWLEDGE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: RelevantKnowledge
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASAH-CASHBACK.html">SPYWARE:GM:SAH-CASHBACK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Shopathomeselect-Cashback
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASEARCHBOSS.html">SPYWARE:GM:SEARCHBOSS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SearchBoss Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASONGOOG.html">SPYWARE:GM:SONGOOG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Songoog
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASONYROOTKIT.html">SPYWARE:GM:SONYROOTKIT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sony Rootkit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASPYDAWN.html">SPYWARE:GM:SPYDAWN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpyDawn
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASPYSHERIFF.html">SPYWARE:GM:SPYSHERIFF</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpySheriff
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASPYWARELOCKED33.html">SPYWARE:GM:SPYWARELOCKED33</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpywareLocked 3.3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASPYWAREQUAKE.html">SPYWARE:GM:SPYWAREQUAKE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpywareQuake
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ASPYWARESTORMER.html">SPYWARE:GM:SPYWARESTORMER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpywareStormer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ATROJ-SPYWAD-X.html">SPYWARE:GM:TROJ-SPYWAD-X</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Troj_spywad_x
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3ATWISTER.html">SPYWARE:GM:TWISTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Twister
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AUFIXER2007.html">SPYWARE:GM:UFIXER2007</a></b></td>
   <td width="500" valign="top">
    SPYWARE: UFixer 2007
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AVIRTUALBOUNCER.html">SPYWARE:GM:VIRTUALBOUNCER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VirtualBouncer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AVMNTOOLBAR16.html">SPYWARE:GM:VMNTOOLBAR16</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VMNToolbar 1.6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AWEBSITELOGGER34.html">SPYWARE:GM:WEBSITELOGGER34</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Stealth Website Logger 3.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AGM%3AZANGO-EASY-MESSENGER.html">SPYWARE:GM:ZANGO-EASY-MESSENGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zango EasyMessenger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3A007SPYSOFTWARE-FTP.html">SPYWARE:KL:007SPYSOFTWARE-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 007 Spy Software (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3A007SPYSOFTWARE-SMTP.html">SPYWARE:KL:007SPYSOFTWARE-SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 007 Spy Software (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACESPY.html">SPYWARE:KL:ACESPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AceSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVEKEYLOGGER.html">SPYWARE:KL:ACTIVEKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ActiveKeylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVEKEYLOGGERHOME.html">SPYWARE:KL:ACTIVEKEYLOGGERHOME</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Active Keylogger Home
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVEKEYLOGGER_392.html">SPYWARE:KL:ACTIVEKEYLOGGER_392</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Active Keylogger 3.9.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVITY-LOGGER.html">SPYWARE:KL:ACTIVITY-LOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Activity Logger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVITYKEYLOGGER.html">SPYWARE:KL:ACTIVITYKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Activity Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTIVITYMONITOR.html">SPYWARE:KL:ACTIVITYMONITOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Activity Monitor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AACTUALSPY.html">SPYWARE:KL:ACTUALSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Actual Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AADVANCEDKEYLOGGER.html">SPYWARE:KL:ADVANCEDKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Advanced Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AADVANCEDSPY_4.html">SPYWARE:KL:ADVANCEDSPY_4</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Advanced Spy 4.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AADVCMPMONITOR.html">SPYWARE:KL:ADVCMPMONITOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Advanced Computer Monitor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AALLINONEKEYLOGGER.html">SPYWARE:KL:ALLINONEKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: All In One Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AAPLUSKEYLOGGER.html">SPYWARE:KL:APLUSKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: APlus Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AAPOPHISSPY10.html">SPYWARE:KL:APOPHISSPY10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Apophis Spy 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AARDAMAXKEYLOGGER.html">SPYWARE:KL:ARDAMAXKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ArdamaxKeylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AARDAMAXKLOGGER28.html">SPYWARE:KL:ARDAMAXKLOGGER28</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ardamax Keylogger 2.8
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ABASP-PRO-4.html">SPYWARE:KL:BASP-PRO-4</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Basp Pro 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ABEEE.html">SPYWARE:KL:BEEE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BEEE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ABEYOND-KEYLOGGER-FTP.html">SPYWARE:KL:BEYOND-KEYLOGGER-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Beyond Keylogger (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ABEYONDKEYLOGGER_SMTP.html">SPYWARE:KL:BEYONDKEYLOGGER_SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Beyond Keylogger (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ABOSSEVERYWARE.html">SPYWARE:KL:BOSSEVERYWARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Boss Everyware
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACAM2FTP.html">SPYWARE:KL:CAM2FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Cam2ftp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACODENAMEALVIN.html">SPYWARE:KL:CODENAMEALVIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Codename Alvin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACOMPUTERKEYLOGGER.html">SPYWARE:KL:COMPUTERKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Computer Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACOMPUTERMONITORKL.html">SPYWARE:KL:COMPUTERMONITORKL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Computer Monitor Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACOMPUTERMONITOR_1_1.html">SPYWARE:KL:COMPUTERMONITOR_1_1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Computer Monitor 1.1 by Lastcomfort
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ACOMPUTERSPY.html">SPYWARE:KL:COMPUTERSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Computerspy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ADESKTOPDETECTIVE.html">SPYWARE:KL:DESKTOPDETECTIVE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DesktopDetective
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ADESKTOPSCOUT.html">SPYWARE:KL:DESKTOPSCOUT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Desktop Scout
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ADREAMSCAPEKEYLOGGER.html">SPYWARE:KL:DREAMSCAPEKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dreamscape Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AELGOLF.html">SPYWARE:KL:ELGOLF</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ElGolf
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AELITEKEYLOGGER.html">SPYWARE:KL:ELITEKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EliteKeylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AEMAILSPYMONITOR_6_9.html">SPYWARE:KL:EMAILSPYMONITOR_6_9</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Email Spy Monitor 6.9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AEMAILSPYPRO.html">SPYWARE:KL:EMAILSPYPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EmailSpyPro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AESURVEILLER.html">SPYWARE:KL:ESURVEILLER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Esurveiller
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AEYESPYPRO.html">SPYWARE:KL:EYESPYPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Eye Spy Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AFARSIGHTER.html">SPYWARE:KL:FARSIGHTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Farsighter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AFEARLESSKEYSPY.html">SPYWARE:KL:FEARLESSKEYSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fearless Key Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AFINDNOT_GUARDOG.html">SPYWARE:KL:FINDNOT_GUARDOG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FindNot GuardDog 4.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AFKWP-KEYLOGGER.html">SPYWARE:KL:FKWP-KEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FKWP-Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AGHOSTKEYLOGGER.html">SPYWARE:KL:GHOSTKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ghost Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AGURLWATCH.html">SPYWARE:KL:GURLWATCH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GURL Watcher
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AHACKERWACKER.html">SPYWARE:KL:HACKERWACKER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HackerWacker
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AINWEBSITELOG24.html">SPYWARE:KL:INWEBSITELOG24</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Inside Website Logger 2.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AKEYLOGGERKINGHOME32.html">SPYWARE:KL:KEYLOGGERKINGHOME32</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Keylogger King Home 2.3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AKEYLOGGERPRO.html">SPYWARE:KL:KEYLOGGERPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Keylogger Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AKEYSPY.html">SPYWARE:KL:KEYSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: KeySpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AKEYSPYWARE.html">SPYWARE:KL:KEYSPYWARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Key Spyware
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AKGBKEYLOGGER.html">SPYWARE:KL:KGBKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: KGB Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ALANTERNKEYLOGGER_6.html">SPYWARE:KL:LANTERNKEYLOGGER_6</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spy Lantern Keylogger Pro 6.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ALITTLEWITCHKEYLOGGER.html">SPYWARE:KL:LITTLEWITCHKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LittleWitch-Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ALOGIT10.html">SPYWARE:KL:LOGIT10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LogIT v1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ALTTLOGGER.html">SPYWARE:KL:LTTLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lttlogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AMASSCONNECT.html">SPYWARE:KL:MASSCONNECT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: maSs coNNect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AMG-SHADOW20.html">SPYWARE:KL:MG-SHADOW20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MG-Shadow 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AMSN-SPY-MONITOR.html">SPYWARE:KL:MSN-SPY-MONITOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MSN Spy Monitor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AMYBRKEYLOGGER.html">SPYWARE:KL:MYBRKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mybr Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ANETOBSERVE.html">SPYWARE:KL:NETOBSERVE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NETObserve
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ANETTRACK-SPY.html">SPYWARE:KL:NETTRACK-SPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nettrack-Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ANETVIZOR52.html">SPYWARE:KL:NETVIZOR52</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Net Vizor 5.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ANICESPY.html">SPYWARE:KL:NICESPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NiceSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AOVERSPY.html">SPYWARE:KL:OVERSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: OverSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APAGKEYLOG.html">SPYWARE:KL:PAGKEYLOG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Pag Keylog
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APC-BLACK-BOX.html">SPYWARE:KL:PC-BLACK-BOX</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PC Black Box
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APC-PARENT.html">SPYWARE:KL:PC-PARENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PC-Parent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APCACTMONPRO.html">SPYWARE:KL:PCACTMONPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PC ActMon Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APCSENTINELSOFTWAREKL.html">SPYWARE:KL:PCSENTINELSOFTWAREKL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PCSentinelsoftware Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APERFECTKEYLOGGER-FTP.html">SPYWARE:KL:PERFECTKEYLOGGER-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PerfectKeylogger (ftp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APERFECTKEYLOGGER168.html">SPYWARE:KL:PERFECTKEYLOGGER168</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Perfect Keylogger 1.68
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APOWEREDKEYLOGGER-2-2.html">SPYWARE:KL:POWEREDKEYLOGGER-2-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Powered Keylogger 2.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APOWERSPY.html">SPYWARE:KL:POWERSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Power Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3APROAGENT.html">SPYWARE:KL:PROAGENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ProAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ARADARSPY-10.html">SPYWARE:KL:RADARSPY-10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Radar Spy 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASC-KEYLOG.html">SPYWARE:KL:SC-KEYLOG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SC-Keylog
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASMART_PC_KEYLOGGER.html">SPYWARE:KL:SMART_PC_KEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Smart PC Keylogger 3.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYBUDDY372.html">SPYWARE:KL:SPYBUDDY372</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpyBuddy 3.72
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYGRAPHICAPRO.html">SPYWARE:KL:SPYGRAPHICAPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpyGraphica Professional
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYLANTERNKEYLOGGER.html">SPYWARE:KL:SPYLANTERNKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spy Lantern Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYOUTSIDE-FTP.html">SPYWARE:KL:SPYOUTSIDE-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyoutside (ftp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYOUTSIDE-SMTP.html">SPYWARE:KL:SPYOUTSIDE-SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyoutside (smtp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASPYTECTOR131.html">SPYWARE:KL:SPYTECTOR131</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spytector 1.3.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASSKC20.html">SPYWARE:KL:SSKC20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SSKC 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASTARLOGGER.html">SPYWARE:KL:STARLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Starlogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASTARR.html">SPYWARE:KL:STARR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: STARR
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASTEALTHACTREPORTER.html">SPYWARE:KL:STEALTHACTREPORTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StealthActivityReporter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASUPREMESPY.html">SPYWARE:KL:SUPREMESPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Supreme Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASYS-KEYLOG-1-3.html">SPYWARE:KL:SYS-KEYLOG-1-3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sys Keylog 1.3 Advanced
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASYSTEMSLEUTH.html">SPYWARE:KL:SYSTEMSLEUTH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SystemSleuth
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3ASYSTEMSURVEILLANCE.html">SPYWARE:KL:SYSTEMSURVEILLANCE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: System Surveillance Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWATCHDOG.html">SPYWARE:KL:WATCHDOG</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WatchDog
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWEBMAILSPY.html">SPYWARE:KL:WEBMAILSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WebMail Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWIN32.REMOTEKEYLOG.B.html">SPYWARE:KL:WIN32.REMOTEKEYLOG.B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Win32.RemoteKeylog.b
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWINFAMILYSAFETY.html">SPYWARE:KL:WINFAMILYSAFETY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Windows Family Safety 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWINSPY.html">SPYWARE:KL:WINSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWINTECTIVE.html">SPYWARE:KL:WINTECTIVE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Wintective Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AWINVESTIGATOR.html">SPYWARE:KL:WINVESTIGATOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Winvestigator
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AXP-ADVANCEDKEYLOGGER.html">SPYWARE:KL:XP-ADVANCEDKEYLOGGER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: XP Advanced Keylogger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AKL%3AXPCSPY-FTP.html">SPYWARE:KL:XPCSPY-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: XPCSpy (ftp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ALIGATS.html">SPYWARE:LIGATS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Ligats
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3A96MM.html">SPYWARE:RAT:96MM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 96mm
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AA-311DEATH.html">SPYWARE:RAT:A-311DEATH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: A-311 Death
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AABACAB-HTTP.html">SPYWARE:RAT:ABACAB-HTTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Abacab (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AACIDDROP.html">SPYWARE:RAT:ACIDDROP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Acid Drop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AACIDHEAD.html">SPYWARE:RAT:ACIDHEAD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Acid Head
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AACTMONMONITORING.html">SPYWARE:RAT:ACTMONMONITORING</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ActMon Computer Monitoring
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AAIR.html">SPYWARE:RAT:AIR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Air
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AALEXMESSOMALEX-CTS.html">SPYWARE:RAT:ALEXMESSOMALEX-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AlexMessoMalex Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AALEXMESSOMALEX-STC.html">SPYWARE:RAT:ALEXMESSOMALEX-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AlexMessoMalex Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AAMITIS.html">SPYWARE:RAT:AMITIS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Amitis
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AAMREMOTECLIENT1-1.html">SPYWARE:RAT:AMREMOTECLIENT1-1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AM Remote Client 1-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AANALFTP.html">SPYWARE:RAT:ANALFTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AnalFTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AANALRAPE-ICQ-NOTIFY.html">SPYWARE:RAT:ANALRAPE-ICQ-NOTIFY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Anal Rape 1.0 ICQ Notification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AANTILAMER.html">SPYWARE:RAT:ANTILAMER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AntiLAMER Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AANTIPC.html">SPYWARE:RAT:ANTIPC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AntiPC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AAQUA-0-2.html">SPYWARE:RAT:AQUA-0-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Aqua 0.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AARCANUM-0-1-1.html">SPYWARE:RAT:ARCANUM-0-1-1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Arcanum-0-1-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AASSASSIN-1-1STC.html">SPYWARE:RAT:ASSASSIN-1-1STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Assassin1.1 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AASSASSIN1-1-CTS.html">SPYWARE:RAT:ASSASSIN1-1-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Assassin1.1 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AASSASSIN1-1-HTTP.html">SPYWARE:RAT:ASSASSIN1-1-HTTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Assassin1-1 (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AAUTOCRAT.html">SPYWARE:RAT:AUTOCRAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Autocrat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABACKATTACK.html">SPYWARE:RAT:BACKATTACK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Back Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABADRAT1-1.html">SPYWARE:RAT:BADRAT1-1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BadRat 1.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABEAST202-ICQ.html">SPYWARE:RAT:BEAST202-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Beast2.02 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABEAST202-STC.html">SPYWARE:RAT:BEAST202-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Beast2.02 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABEAST20X-CTS.html">SPYWARE:RAT:BEAST20X-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Beast2.0X Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIFROSE.html">SPYWARE:RAT:BIFROSE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bifrose
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIONET.html">SPYWARE:RAT:BIONET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bionet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIONET-FTP.html">SPYWARE:RAT:BIONET-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bionet (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIONET-TCP.html">SPYWARE:RAT:BIONET-TCP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bionet (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIONET405-CTS.html">SPYWARE:RAT:BIONET405-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BioNet4.0.5 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABIONET405-STC.html">SPYWARE:RAT:BIONET405-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BioNet4.0.5 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABLUEFIRE.html">SPYWARE:RAT:BLUEFIRE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bluefire
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABLUEFIRE-FTP.html">SPYWARE:RAT:BLUEFIRE-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bluefire (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABOBO.html">SPYWARE:RAT:BOBO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bobo
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABOSSWATCHER.html">SPYWARE:RAT:BOSSWATCHER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Boss Watcher
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABSETROJAN.html">SPYWARE:RAT:BSETROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BSE Trojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ABUSCHTROMMEL1-22.html">SPYWARE:RAT:BUSCHTROMMEL1-22</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Buschtrommel 1-22
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACD-ROMTROJAN.html">SPYWARE:RAT:CD-ROMTROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CD-Rom Trojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACHARON-1-0-3.html">SPYWARE:RAT:CHARON-1-0-3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Charon 1.0.3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-22.html">SPYWARE:RAT:CIA1-22</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA 1.22
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-22-FTP.html">SPYWARE:RAT:CIA1-22-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA1-22 (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-22-HTTP.html">SPYWARE:RAT:CIA1-22-HTTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA1-22 (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-22-ICQ.html">SPYWARE:RAT:CIA1-22-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA1-22 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-22-SMTP.html">SPYWARE:RAT:CIA1-22-SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA1-22 (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACIA1-3.html">SPYWARE:RAT:CIA1-3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CIA 1.3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACOMA-CTS.html">SPYWARE:RAT:COMA-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Coma Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACOMA-STC.html">SPYWARE:RAT:COMA-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Coma Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACOOLCAT.html">SPYWARE:RAT:COOLCAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CoolCat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACOOLREMOTECONTROL.html">SPYWARE:RAT:COOLREMOTECONTROL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Cool Remote Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ACYBERNETIC1-62.html">SPYWARE:RAT:CYBERNETIC1-62</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CyberNetic 1.62
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADATARAPE10F-GETPWD.html">SPYWARE:RAT:DATARAPE10F-GETPWD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DataRape 1-0F GetPassword
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADIEMSMUTTER.html">SPYWARE:RAT:DIEMSMUTTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Diems Mutter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADIGITALUPLOAD.html">SPYWARE:RAT:DIGITALUPLOAD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Digital Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADIGIWATCHER-2-32.html">SPYWARE:RAT:DIGIWATCHER-2-32</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Digi Watcher 2.32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADSKLITE1-0.html">SPYWARE:RAT:DSKLITE1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DSK Lite 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADSKLITE1-0-ICQ.html">SPYWARE:RAT:DSKLITE1-0-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DSK Lite 1.0 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ADWMREMOTECONTROL.html">SPYWARE:RAT:DWMREMOTECONTROL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DameWare Mini Remote Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AERAZER-ICQ.html">SPYWARE:RAT:ERAZER-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Erazer (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AEVILFTP.html">SPYWARE:RAT:EVILFTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: EvilFTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AEXCEPTION1-0.html">SPYWARE:RAT:EXCEPTION1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Exception1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AEXCEPTION1-0-HTTP.html">SPYWARE:RAT:EXCEPTION1-0-HTTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Exception1-0 (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFADE1-0-HTTP.html">SPYWARE:RAT:FADE1-0-HTTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fade1-0 (http)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFADE1-0-TCP.html">SPYWARE:RAT:FADE1-0-TCP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fade1-0 (tcp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFAKE0-2.html">SPYWARE:RAT:FAKE0-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fake0-2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFATALWOUND.html">SPYWARE:RAT:FATALWOUND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fatal Wound
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFEAR2-0.html">SPYWARE:RAT:FEAR2-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fear2-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFERAT1-00-CTS.html">SPYWARE:RAT:FERAT1-00-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FeRAT 1-00 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFERAT1-00-STC.html">SPYWARE:RAT:FERAT1-00-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FeRAT 1.00 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFF-RAT-BIN-BEACON.html">SPYWARE:RAT:FF-RAT-BIN-BEACON</a></b></td>
   <td width="500" valign="top">
    SPYWARE:  FF-RAT Malware Binary Beacon Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFF-RAT-SRV-RSP.html">SPYWARE:RAT:FF-RAT-SRV-RSP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FF-RAT Malware Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFLUX.html">SPYWARE:RAT:FLUX</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Flux
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFORCE1-61.html">SPYWARE:RAT:FORCE1-61</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Force 1.61
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFORCEDCONTROL.html">SPYWARE:RAT:FORCEDCONTROL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ForcedControl Uploader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFRAG-ROCK-2-0.html">SPYWARE:RAT:FRAG-ROCK-2-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fraggle Rock 2.0 Lite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFREAK.html">SPYWARE:RAT:FREAK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Freak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFREAK88DAS.html">SPYWARE:RAT:FREAK88DAS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Freak 88 DAS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AGH0ST.html">SPYWARE:RAT:GH0ST</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Gh0st Network
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AGREEKHACKERS1-1-CTS.html">SPYWARE:RAT:GREEKHACKERS1-1-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Greek Hackers Rat 1-0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AGREEKHACKERS1-1-STC.html">SPYWARE:RAT:GREEKHACKERS1-1-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Greek Hackers Rat 1-0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHANKYPANKY.html">SPYWARE:RAT:HANKYPANKY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hanky Panky
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHANUMAN.html">SPYWARE:RAT:HANUMAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hanuman
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHATREDFRIEND-TCP.html">SPYWARE:RAT:HATREDFRIEND-TCP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HatredFriend (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHERMANUPLOADER-CTS.html">SPYWARE:RAT:HERMANUPLOADER-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Herman Uploader 1-0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHERMANUPLOADER-STC.html">SPYWARE:RAT:HERMANUPLOADER-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Herman Uploader 1-0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHIDDENCAMERA.html">SPYWARE:RAT:HIDDENCAMERA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HiddenCamera
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHORNET.html">SPYWARE:RAT:HORNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hornet1.0 Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHUNTERGOP.html">SPYWARE:RAT:HUNTERGOP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HunterGop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHVLRAT-530-CTS.html">SPYWARE:RAT:HVLRAT-530-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HVL RAT 5-3-0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AHVLRAT-530-STC.html">SPYWARE:RAT:HVLRAT-530-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HVL RAT 5-3-0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AINCOMMAND.html">SPYWARE:RAT:INCOMMAND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Incommand 1.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AJOKERSFTP.html">SPYWARE:RAT:JOKERSFTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Jokers FTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AKATUX2-0-SERVER.html">SPYWARE:RAT:KATUX2-0-SERVER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Katux2-0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ALAMESPY.html">SPYWARE:RAT:LAMESPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lamespy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ALANFILTRATOR-SIN.html">SPYWARE:RAT:LANFILTRATOR-SIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LANfiltrator-SIN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ALANFILTRATOR1-1-CTS.html">SPYWARE:RAT:LANFILTRATOR1-1-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LANfiltrator1-1 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ALANFILTRATOR1-1-STC.html">SPYWARE:RAT:LANFILTRATOR1-1-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LANfiltrator1-1 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ALITTLEWITCHEXPLORER.html">SPYWARE:RAT:LITTLEWITCHEXPLORER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LittleWitch-Explorer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMASTER.html">SPYWARE:RAT:MASTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Master
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMINICOMMAND203-CTS.html">SPYWARE:RAT:MINICOMMAND203-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mini Command 2.0.3 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMINICOMMAND203-ICQ.html">SPYWARE:RAT:MINICOMMAND203-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mini Command 2.0.3 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMINICOMMAND203-STC.html">SPYWARE:RAT:MINICOMMAND203-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mini Command 2.0.3 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMINIMO.html">SPYWARE:RAT:MINIMO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Minimo v0.6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMINIOBLIVION.html">SPYWARE:RAT:MINIOBLIVION</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MiniOblivion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AMITHRIL-1-45.html">SPYWARE:RAT:MITHRIL-1-45</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mithril 1.45
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANCPH.html">SPYWARE:RAT:NCPH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NCPH
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANETANGEL1-0-SIN.html">SPYWARE:RAT:NETANGEL1-0-SIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetAngel1-0 (Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANETCONTROLE3-0.html">SPYWARE:RAT:NETCONTROLE3-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetControle 3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANETCONTROLTAKEOVER.html">SPYWARE:RAT:NETCONTROLTAKEOVER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Netcontrol Takeover
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANETDEMON1-0.html">SPYWARE:RAT:NETDEMON1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetDemon1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANETOPREMOTECONTROL.html">SPYWARE:RAT:NETOPREMOTECONTROL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetOp Remote Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANEUROTICKAT1-3-CTS.html">SPYWARE:RAT:NEUROTICKAT1-3-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Neurotickat1.3 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANEUROTICKAT1-3-ICQ.html">SPYWARE:RAT:NEUROTICKAT1-3-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Neurotickat1.3 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANEUROTICKAT1-3-STC.html">SPYWARE:RAT:NEUROTICKAT1-3-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Neurotickat1.3 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANEUROTICKITTEN.html">SPYWARE:RAT:NEUROTICKITTEN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NeuroticKitten
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANIGHTCREATURE.html">SPYWARE:RAT:NIGHTCREATURE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NightCreature beta 0.01
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANTRC2000.html">SPYWARE:RAT:NTRC2000</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NT Remote Controller 2000
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ANUCLEAR-RAT-6-21.html">SPYWARE:RAT:NUCLEAR-RAT-6-21</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nuclear RAT 6.21
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AOMERTA-V13.html">SPYWARE:RAT:OMERTA-V13</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Omerta 1.3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AOMNIQUARD-IRC.html">SPYWARE:RAT:OMNIQUARD-IRC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Omniquad Instant Remote Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3APCACMEPRO.html">SPYWARE:RAT:PCACMEPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PC Acme Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3APCSHARE.html">SPYWARE:RAT:PCSHARE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PCShare
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3APHOENIX2-1-28.html">SPYWARE:RAT:PHOENIX2-1-28</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Phoenix2-1-28
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3APRORAT1-9.html">SPYWARE:RAT:PRORAT1-9</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ProRat1.9
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3APRORAT1-9-ICQ.html">SPYWARE:RAT:PRORAT1-9-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ProRat1-9 (ICQ Notification)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTE-ANYTHING.html">SPYWARE:RAT:REMOTE-ANYTHING</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remote Anything
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTECONTROL-17.html">SPYWARE:RAT:REMOTECONTROL-17</a></b></td>
   <td width="500" valign="top">
    SPYWARE: RemoteControl-17
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTEHAVOC.html">SPYWARE:RAT:REMOTEHAVOC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remote HAVOC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTER.html">SPYWARE:RAT:REMOTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remoter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTESTORM1-2-CTS.html">SPYWARE:RAT:REMOTESTORM1-2-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remote Storm 1.2 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AREMOTESTORM1-2STC.html">SPYWARE:RAT:REMOTESTORM1-2STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remote Storm 1.2 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ARIX310.html">SPYWARE:RAT:RIX310</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Rix3 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AROACH1-0-CTS.html">SPYWARE:RAT:ROACH1-0-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Roach1-0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AROACH1-0-STC.html">SPYWARE:RAT:ROACH1-0-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Roach1-0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AROACH10-INITIALRESP.html">SPYWARE:RAT:ROACH10-INITIALRESP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Roach1-0 Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AROBO-HACK1-2.html">SPYWARE:RAT:ROBO-HACK1-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Robo-Hack1-2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ARTB666.html">SPYWARE:RAT:RTB666</a></b></td>
   <td width="500" valign="top">
    SPYWARE: RTB666
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASCHWINDLER1-82-CTS.html">SPYWARE:RAT:SCHWINDLER1-82-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Schwindler 1-82 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASCHWINDLER1-82-STC.html">SPYWARE:RAT:SCHWINDLER1-82-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Schwindler 1.82 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASCREENCONTROL10-CTS.html">SPYWARE:RAT:SCREENCONTROL10-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Screen Control 1.0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASCREENCONTROL10-STC.html">SPYWARE:RAT:SCREENCONTROL10-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Screen Control 1.0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASERVEME.html">SPYWARE:RAT:SERVEME</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Serveme
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASHITHEEP.html">SPYWARE:RAT:SHITHEEP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Shit Heep
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASHNAPPZHTTPRAT.html">SPYWARE:RAT:SHNAPPZHTTPRAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Shnappz HTTP RAT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASHNAPPZHTTPRAT-SMTP.html">SPYWARE:RAT:SHNAPPZHTTPRAT-SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Shnappz HTTP RAT (SMTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASKYRATSHOW.html">SPYWARE:RAT:SKYRATSHOW</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SkyRat Show
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASMALLUPLOADER.html">SPYWARE:RAT:SMALLUPLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Small Uploader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASMARTHACKUPLOADER.html">SPYWARE:RAT:SMARTHACKUPLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Smart-Hack Uploader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASNID-X2-1-2C-CTS.html">SPYWARE:RAT:SNID-X2-1-2C-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Snid X2 1.2c Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASNID-X2-1-2C-STC.html">SPYWARE:RAT:SNID-X2-1-2C-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Snid X2 1.2c Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASNIPERNET.html">SPYWARE:RAT:SNIPERNET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SniperNet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASOFTWARSHADOW-CTS.html">SPYWARE:RAT:SOFTWARSHADOW-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SoftWAR ShadowThief Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASOFTWARSHADOW-STC.html">SPYWARE:RAT:SOFTWARSHADOW-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SoftWAR ShadowThief Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPECREM6-2-CTS.html">SPYWARE:RAT:SPECREM6-2-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Specrem6-2 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPECREM6-2-STC.html">SPYWARE:RAT:SPECREM6-2-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Specrem6-2 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPYAGENT.html">SPYWARE:RAT:SPYAGENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyagent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPYAGENT-ALERT.html">SPYWARE:RAT:SPYAGENT-ALERT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyagent alert
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPYAGENT-FTP.html">SPYWARE:RAT:SPYAGENT-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyagent-ftp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPYAGENT-SMTP.html">SPYWARE:RAT:SPYAGENT-SMTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyagent SMTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASPYONE-1-0.html">SPYWARE:RAT:SPYONE-1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyone 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASTATWIN.html">SPYWARE:RAT:STATWIN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StatWin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASTEALTHREDIR-FTP.html">SPYWARE:RAT:STEALTHREDIR-FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StealthRedirector (FTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASTEALTHREDIR-TCP.html">SPYWARE:RAT:STEALTHREDIR-TCP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: StealthRedirector (TCP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASTRIKER1-0.html">SPYWARE:RAT:STRIKER1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Striker1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASUPERRA.html">SPYWARE:RAT:SUPERRA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SuperRA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASUPERSPY.html">SPYWARE:RAT:SUPERSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SuperSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ASUPERVISORPLUS.html">SPYWARE:RAT:SUPERVISORPLUS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Supervisor Plus
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ATHEEF-2-0-ICQ.html">SPYWARE:RAT:THEEF-2-0-ICQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Theef-2-0 ICQ Notification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ATHEEF-2.0-CGI.html">SPYWARE:RAT:THEEF-2.0-CGI</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Theef 2.0 CGI Notification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3ATRAITOR21.html">SPYWARE:RAT:TRAITOR21</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Traitor21
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AWEBCAMTROJAN.html">SPYWARE:RAT:WEBCAMTROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Webcam Trojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AWINSHELL.html">SPYWARE:RAT:WINSHELL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinShell
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AX2A.html">SPYWARE:RAT:X2A</a></b></td>
   <td width="500" valign="top">
    SPYWARE: X2a
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AXHX1-6.html">SPYWARE:RAT:XHX1-6</a></b></td>
   <td width="500" valign="top">
    SPYWARE: XHX1-6
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AYAT1-3.html">SPYWARE:RAT:YAT1-3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YAT1-3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3A3XBACKDOOR.html">SPYWARE:TROJAN:3XBACKDOOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 3xBackdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3A51D1B.html">SPYWARE:TROJAN:51D1B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: 51D 1b
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AABACAB.html">SPYWARE:TROJAN:ABACAB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Abacab
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AABREMOTEPRO31.html">SPYWARE:TROJAN:ABREMOTEPRO31</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AbRemote Pro 3.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AABWIZ-C.html">SPYWARE:TROJAN:ABWIZ-C</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Abwiz-C
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AACCESSREMOTEPC.html">SPYWARE:TROJAN:ACCESSREMOTEPC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Access Remote PC
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AACESSOR20.html">SPYWARE:TROJAN:ACESSOR20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Acessor 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AACIDSHIVERS.html">SPYWARE:TROJAN:ACIDSHIVERS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Acid Shivers
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AACROPOLIS.html">SPYWARE:TROJAN:ACROPOLIS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Acropolis
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AAGENTWD.html">SPYWARE:TROJAN:AGENTWD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Agent WD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AAPOFIS1.0.html">SPYWARE:TROJAN:APOFIS1.0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Apofis 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AAUTOSPY-CTS.html">SPYWARE:TROJAN:AUTOSPY-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AutoSpy Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AAUTOSPY-STC.html">SPYWARE:TROJAN:AUTOSPY-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: AutoSpy Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABAC-GEN-E.html">SPYWARE:TROJAN:BAC-GEN-E</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Backdoor-BAC.Gen.e
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABACKLASH.html">SPYWARE:TROJAN:BACKLASH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BackLash
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABACKORIFICE2006.html">SPYWARE:TROJAN:BACKORIFICE2006</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Back Orifice 2006
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABANDOOK-1-35.html">SPYWARE:TROJAN:BANDOOK-1-35</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bandook 1.35
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABANDOOK-V1-0.html">SPYWARE:TROJAN:BANDOOK-V1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bandook v1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABAROK.html">SPYWARE:TROJAN:BAROK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Barok Trojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABERSEK1.0.html">SPYWARE:TROJAN:BERSEK1.0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bersek 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABIFROST121.html">SPYWARE:TROJAN:BIFROST121</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bifrost 1.2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABLACKCURSE4.html">SPYWARE:TROJAN:BLACKCURSE4</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Black Curse 4.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABLHOUSE.html">SPYWARE:TROJAN:BLHOUSE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Blhouse
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABLUEEYE10B.html">SPYWARE:TROJAN:BLUEEYE10B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Blue Eye 1.0b
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABOER.html">SPYWARE:TROJAN:BOER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Boer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ABRAINWIPER.html">SPYWARE:TROJAN:BRAINWIPER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: BrAin Wiper
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACLANDESTINE.html">SPYWARE:TROJAN:CLANDESTINE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Clandestine
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACOBRAUPLOADER.html">SPYWARE:TROJAN:COBRAUPLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Cobra Uploader 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACOMANDO.html">SPYWARE:TROJAN:COMANDO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Comando
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACRASHCOOL-1-1.html">SPYWARE:TROJAN:CRASHCOOL-1-1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CrashCool 1-1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACROSSBOW.html">SPYWARE:TROJAN:CROSSBOW</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Crossbow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACROSSFIRESTROJAN.html">SPYWARE:TROJAN:CROSSFIRESTROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Crossfires Trojan 3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ACYN21.html">SPYWARE:TROJAN:CYN21</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Cyn 2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADACRYPTIC.html">SPYWARE:TROJAN:DACRYPTIC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DaCryptic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADARKMOON-4-11.html">SPYWARE:TROJAN:DARKMOON-4-11</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Dark Moon 4.11
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADIMBUS.html">SPYWARE:TROJAN:DIMBUS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: DimBus
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADLOADERAGENT-TL.html">SPYWARE:TROJAN:DLOADERAGENT-TL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Trojan-Downloader-Agent-TL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADOWNLOADER-ARM.html">SPYWARE:TROJAN:DOWNLOADER-ARM</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Downloader-ARM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADOWNLOADER-YD.html">SPYWARE:TROJAN:DOWNLOADER-YD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Downloader-YD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADOWNLOADER.AB.html">SPYWARE:TROJAN:DOWNLOADER.AB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Generic Downloader.ab
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADOWNLOADERDELF.html">SPYWARE:TROJAN:DOWNLOADERDELF</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Trojan Downloader Delf.AMB
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ADWNLDR-ARQ.html">SPYWARE:TROJAN:DWNLDR-ARQ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Downloader-ARQ
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AELFRAT.html">SPYWARE:TROJAN:ELFRAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: elfRat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AERASER.html">SPYWARE:TROJAN:ERASER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Eraser
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AERAZER.html">SPYWARE:TROJAN:ERAZER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Erazer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AEVADE1-1B.html">SPYWARE:TROJAN:EVADE1-1B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Evade1-1B
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AEVILGOAT.html">SPYWARE:TROJAN:EVILGOAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Evilgoat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AEXPLOIT_1_4_5.html">SPYWARE:TROJAN:EXPLOIT_1_4_5</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Exploit 1.4.5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AFALLINGSTAR.html">SPYWARE:TROJAN:FALLINGSTAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Falling Star
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AFKWP-WDOWNLOADER.html">SPYWARE:TROJAN:FKWP-WDOWNLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FKWP-WebDownloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AFUCKTROJAN.html">SPYWARE:TROJAN:FUCKTROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: FuckTrojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AFUNFACTORY-STC.html">SPYWARE:TROJAN:FUNFACTORY-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Fun Factory Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AFURAX10B3.html">SPYWARE:TROJAN:FURAX10B3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Furax 1.0 b3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AG-SPOT.html">SPYWARE:TROJAN:G-SPOT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: G-Spot
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AGENIE17.html">SPYWARE:TROJAN:GENIE17</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Genie 1.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AGLOBALKILLER-STC.html">SPYWARE:TROJAN:GLOBALKILLER-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GlobalKiller1.0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AGWBOY.html">SPYWARE:TROJAN:GWBOY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: GwBoy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHALFLIFEJACKER.html">SPYWARE:TROJAN:HALFLIFEJACKER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Half Life Jacker
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHATREDFIEND.html">SPYWARE:TROJAN:HATREDFIEND</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HatredFiend
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHAVRAT1.1.html">SPYWARE:TROJAN:HAVRAT1.1</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HavRat 1.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHELIOS-3-1-STC.html">SPYWARE:TROJAN:HELIOS-3-1-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HelioS3.1 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHELIOS-ICQNOTIFY.html">SPYWARE:TROJAN:HELIOS-ICQNOTIFY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HelioS3.1 ICQ Notification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHGZ.html">SPYWARE:TROJAN:HGZ</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HGZ
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHOTMAILHACKER5.html">SPYWARE:TROJAN:HOTMAILHACKER5</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hotmail Hacker Log Edition 5.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHRAT.html">SPYWARE:TROJAN:HRAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HRat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHTTPRAT.html">SPYWARE:TROJAN:HTTPRAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HTTPRat
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AHUE1-0.html">SPYWARE:TROJAN:HUE1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Hue1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AIEVA1.0.html">SPYWARE:TROJAN:IEVA1.0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ieva 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AINIKILLER.html">SPYWARE:TROJAN:INIKILLER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: iNi-Killer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AKMSNRAT100.html">SPYWARE:TROJAN:KMSNRAT100</a></b></td>
   <td width="500" valign="top">
    SPYWARE: K-MsnRat 1.0.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALAMERAT10.html">SPYWARE:TROJAN:LAMERAT10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LaMe RAT 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALETMERULE20-CTS.html">SPYWARE:TROJAN:LETMERULE20-CTS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Let Me Rule2.0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALETMERULE20-STC.html">SPYWARE:TROJAN:LETMERULE20-STC</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Let Me Rule2.0 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALITHIUM102.html">SPYWARE:TROJAN:LITHIUM102</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lithium 1.02
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALITTLEWITCH-CMD.html">SPYWARE:TROJAN:LITTLEWITCH-CMD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LittleWitch-Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALOKITECH.html">SPYWARE:TROJAN:LOKITECH</a></b></td>
   <td width="500" valign="top">
    SPYWARE: LokiTech
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ALURKER11.html">SPYWARE:TROJAN:LURKER11</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Lurker 1.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AMESSIAH2-0.html">SPYWARE:TROJAN:MESSIAH2-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Messiah2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AMOSUCKER3-0.html">SPYWARE:TROJAN:MOSUCKER3-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Mosucker3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AMYDEMISE.html">SPYWARE:TROJAN:MYDEMISE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: MyDemise
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ANETANGEL1-0.html">SPYWARE:TROJAN:NETANGEL1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetAngel1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ANETSHADOW.html">SPYWARE:TROJAN:NETSHADOW</a></b></td>
   <td width="500" valign="top">
    SPYWARE: NetShadow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ANIRVANA-2.0.html">SPYWARE:TROJAN:NIRVANA-2.0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nirvana 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ANUCLEARUP.html">SPYWARE:TROJAN:NUCLEARUP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nuclear Uploader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AONE.html">SPYWARE:TROJAN:ONE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: One
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AONLY1RAT.html">SPYWARE:TROJAN:ONLY1RAT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Only 1 RAT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AOPTIXLITE.html">SPYWARE:TROJAN:OPTIXLITE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: OptixLite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AOPTIXPRO132.html">SPYWARE:TROJAN:OPTIXPRO132</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Optix PRO 1.32
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AOUTBREAK.html">SPYWARE:TROJAN:OUTBREAK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Outbreak
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3APHANTOMFTP.html">SPYWARE:TROJAN:PHANTOMFTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: PhantomFTP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3APOISONIVY212.html">SPYWARE:TROJAN:POISONIVY212</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Poison Ivy 2.1.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3APSEUDORAT01B.html">SPYWARE:TROJAN:PSEUDORAT01B</a></b></td>
   <td width="500" valign="top">
    SPYWARE: pseudoRAT 0.1b
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ARAD1-2-3.html">SPYWARE:TROJAN:RAD1-2-3</a></b></td>
   <td width="500" valign="top">
    SPYWARE: RAD1-2-3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ARADMIN30.html">SPYWARE:TROJAN:RADMIN30</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Radmin 3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AREMOTEHACK.html">SPYWARE:TROJAN:REMOTEHACK</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Remote Hack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AREVERSABLE.html">SPYWARE:TROJAN:REVERSABLE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ReVerSaBle
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AREVOPA.html">SPYWARE:TROJAN:REVOPA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Revop.a
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASANDESA-ICQNOTIF.html">SPYWARE:TROJAN:SANDESA-ICQNOTIF</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sandesa
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASEED1-0.html">SPYWARE:TROJAN:SEED1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Seed1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASHARK232.html">SPYWARE:TROJAN:SHARK232</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SharK 2.3.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASILENTSPY.html">SPYWARE:TROJAN:SILENTSPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Silent Spy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASINIQUE1-0.html">SPYWARE:TROJAN:SINIQUE1-0</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sinique1-0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASINSTERLER.html">SPYWARE:TROJAN:SINSTERLER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SIN Stealer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASNAKETROJAN.html">SPYWARE:TROJAN:SNAKETROJAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SnakeTrojan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASNOWDOOR.html">SPYWARE:TROJAN:SNOWDOOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Snowdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASPAM-MAXY.html">SPYWARE:TROJAN:SPAM-MAXY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spam-Maxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASPYLPLY.A.html">SPYWARE:TROJAN:SPYLPLY.A</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpyLPLY.a
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ASUNSHADOW-1-70.html">SPYWARE:TROJAN:SUNSHADOW-1-70</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Sun Shadow 1.70
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATEQUILABANDITA.html">SPYWARE:TROJAN:TEQUILABANDITA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Tequila Bandita
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATHEEF210.html">SPYWARE:TROJAN:THEEF210</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Theef 2.10
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATHEEF210FTP.html">SPYWARE:TROJAN:THEEF210FTP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Theef 2.10 (ftp)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATHEX-12.html">SPYWARE:TROJAN:THEX-12</a></b></td>
   <td width="500" valign="top">
    SPYWARE: TheX 1.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATHUZEROTOLERANCE.html">SPYWARE:TROJAN:THUZEROTOLERANCE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: THU Zero Tolerance
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATRAILOFDESTRUC20.html">SPYWARE:TROJAN:TRAILOFDESTRUC20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Trail Of Destruction 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATROLLA.html">SPYWARE:TROJAN:TROLLA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Troll.a
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3ATROYA_1_4.html">SPYWARE:TROJAN:TROYA_1_4</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Troya 1.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AUNNAMED-BD.html">SPYWARE:TROJAN:UNNAMED-BD</a></b></td>
   <td width="500" valign="top">
    SPYWARE: UnNamed Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AUPNRUN-V10.html">SPYWARE:TROJAN:UPNRUN-V10</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Up&amp;Run v1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AVOICESPY.html">SPYWARE:TROJAN:VOICESPY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: VoiceSpy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWEBCENTER.html">SPYWARE:TROJAN:WEBCENTER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WebCenter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWEBDOWNLOADER.html">SPYWARE:TROJAN:WEBDOWNLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WebDownloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWINEGGDROPSPRO.html">SPYWARE:TROJAN:WINEGGDROPSPRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinEggDropShell Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWINICABRAS11.html">SPYWARE:TROJAN:WINICABRAS11</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Winicabras 1.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWINSHADOW30.html">SPYWARE:TROJAN:WINSHADOW30</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinShadow 3.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWINTERLOVE.html">SPYWARE:TROJAN:WINTERLOVE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WinterLove
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AWOLLF.html">SPYWARE:TROJAN:WOLLF</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Wollf
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AX-BKDR.html">SPYWARE:TROJAN:X-BKDR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: X-BkDr
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AX-DOOR.html">SPYWARE:TROJAN:X-DOOR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: X-door
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AY3K2K5.html">SPYWARE:TROJAN:Y3K2K5</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Y3K 2k5
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AYKW375.html">SPYWARE:TROJAN:YKW375</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YKW v375
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AYURI-1-2.html">SPYWARE:TROJAN:YURI-1-2</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Yuri 1.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AYXNETSCREEN20.html">SPYWARE:TROJAN:YXNETSCREEN20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: YXNetScreen 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AZALIVATOR142PRO.html">SPYWARE:TROJAN:ZALIVATOR142PRO</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Zalivator 1.4.2 Pro
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AZSPYII0.99.html">SPYWARE:TROJAN:ZSPYII0.99</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZSpyII 0.99
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AZXSHELL.html">SPYWARE:TROJAN:ZXSHELL</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZXShell
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3ATROJAN%3AZZMM20.html">SPYWARE:TROJAN:ZZMM20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: ZZMM 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3AAMPLIFYTOOLBAR.html">SPYWARE:UTIL:AMPLIFYTOOLBAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Amplify Toolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ABOHAJER-DOWNLOADER.html">SPYWARE:UTIL:BOHAJER-DOWNLOADER</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Bohajer Web Downloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ACOPERNICAGENT.html">SPYWARE:UTIL:COPERNICAGENT</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Copernic Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ACOPERNICMETABAR.html">SPYWARE:UTIL:COPERNICMETABAR</a></b></td>
   <td width="500" valign="top">
    SPYWARE: CopernicMetaToolbar
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3AHIPPYNOTIFY20.html">SPYWARE:UTIL:HIPPYNOTIFY20</a></b></td>
   <td width="500" valign="top">
    SPYWARE: HippyNotify 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3AI2HUB.html">SPYWARE:UTIL:I2HUB</a></b></td>
   <td width="500" valign="top">
    SPYWARE: i2Hub
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ANUCLEARSCAN.html">SPYWARE:UTIL:NUCLEARSCAN</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Nuclear Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ASARIA.html">SPYWARE:UTIL:SARIA</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Saria
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ASMARTBARXP.html">SPYWARE:UTIL:SMARTBARXP</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SmartBarXP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ASPAMBLOCKERUTILITY.html">SPYWARE:UTIL:SPAMBLOCKERUTILITY</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpamBlockerUtility
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ASPYBLOCS-EBLOCS.html">SPYWARE:UTIL:SPYBLOCS-EBLOCS</a></b></td>
   <td width="500" valign="top">
    SPYWARE: Spyblocs-Eblocs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3ASPYWARESTRIKE.html">SPYWARE:UTIL:SPYWARESTRIKE</a></b></td>
   <td width="500" valign="top">
    SPYWARE: SpywareStrike
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SPYWARE%3AUTIL%3AWEBFERRET.html">SPYWARE:UTIL:WEBFERRET</a></b></td>
   <td width="500" valign="top">
    SPYWARE: WebFerret
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SSH"></a>SSH</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AAUDIT%3ASSH-V1.html">SSH:AUDIT:SSH-V1</a></b></td>
   <td width="500" valign="top">
    SSH: SSH Version 1 Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AAUDIT%3AUNEXPECTED-HEADER.html">SSH:AUDIT:UNEXPECTED-HEADER</a></b></td>
   <td width="500" valign="top">
    SSH: Unexpected Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3ABRUTE-LOGIN.html">SSH:BRUTE-LOGIN</a></b></td>
   <td width="500" valign="top">
    SSH: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AERROR%3ACOOKIE-MISMATCH.html">SSH:ERROR:COOKIE-MISMATCH</a></b></td>
   <td width="500" valign="top">
    SSH: Cookie Mismatch
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AERROR%3AINVALID-HEADER.html">SSH:ERROR:INVALID-HEADER</a></b></td>
   <td width="500" valign="top">
    SSH: Invalid Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AERROR%3AINVALID-PKT-TYPE.html">SSH:ERROR:INVALID-PKT-TYPE</a></b></td>
   <td width="500" valign="top">
    SSH: Invalid Packet Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AERROR%3AMSG-TOO-LONG.html">SSH:ERROR:MSG-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SSH: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AERROR%3AMSG-TOO-SHORT.html">SSH:ERROR:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    SSH: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AMISC%3AEXPLOIT-CMDS-UNIX.html">SSH:MISC:EXPLOIT-CMDS-UNIX</a></b></td>
   <td width="500" valign="top">
    SSH: UNIX Post-Exploit Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AMISC%3AMAL-VERSION.html">SSH:MISC:MAL-VERSION</a></b></td>
   <td width="500" valign="top">
    SSH: Malicious SSH Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AMISC%3AUNIX-ID-RESP.html">SSH:MISC:UNIX-ID-RESP</a></b></td>
   <td width="500" valign="top">
    SSH: UNIX id Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3ANON-STD-PORT.html">SSH:NON-STD-PORT</a></b></td>
   <td width="500" valign="top">
    PROTOCOLS: SSH Connection Over Non-Standard Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOPENSSH-MAXSTARTUP-DOS.html">SSH:OPENSSH-MAXSTARTUP-DOS</a></b></td>
   <td width="500" valign="top">
    SSH: OpenSSH maxstartup Threshold Connection Exhaustion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOPENSSH%3ABLOCK-DOS.html">SSH:OPENSSH:BLOCK-DOS</a></b></td>
   <td width="500" valign="top">
    SSH: OpenSSH sshd Identical Blocks Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOPENSSH%3AGOODTECH-SFTP-BOF.html">SSH:OPENSSH:GOODTECH-SFTP-BOF</a></b></td>
   <td width="500" valign="top">
    SSH: GoodTech SSH Server SFTP Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOPENSSH%3ANOVEL-NETWARE.html">SSH:OPENSSH:NOVEL-NETWARE</a></b></td>
   <td width="500" valign="top">
    SSH: Novell NetWare OpenSSH Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOVERFLOW%3AFREESSHD-KEY-OF.html">SSH:OVERFLOW:FREESSHD-KEY-OF</a></b></td>
   <td width="500" valign="top">
    SSH: FreeSSHd Key Exchange Algorithm String Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOVERFLOW%3APUTTY-VER.html">SSH:OVERFLOW:PUTTY-VER</a></b></td>
   <td width="500" valign="top">
    SSH: PuTTY Vulnerable Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3AOVERFLOW%3ASECURECRT-BOF.html">SSH:OVERFLOW:SECURECRT-BOF</a></b></td>
   <td width="500" valign="top">
    SSH: SecureCRT Client Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3APACKET-WRITE-WAIT-BO.html">SSH:PACKET-WRITE-WAIT-BO</a></b></td>
   <td width="500" valign="top">
    SSH: Resume Packet Write Wait Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3APRAGMAFORT-KEY-OF.html">SSH:PRAGMAFORT-KEY-OF</a></b></td>
   <td width="500" valign="top">
    SSH: Pragma Fortress Key OverFlow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3ASYSAX-MULTI-SERVER-DOS.html">SSH:SYSAX-MULTI-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    SSH: Sysax Multi Server SSH Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSH%3ASYSAX-SERVER-DOS.html">SSH:SYSAX-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    SSH: Sysax Multi Server SSH Component Denial Of Service
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SSL"></a>SSL</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-OSSIM-SOAP-CE.html">SSL:ALIEN-VAULT-OSSIM-SOAP-CE</a></b></td>
   <td width="500" valign="top">
    SSL:AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-SOAP-CE.html">SSL:ALIEN-VAULT-SOAP-CE</a></b></td>
   <td width="500" valign="top">
    SSL: AlienVault OSSIM av-centerd SOAP Requests Multiple Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-SOAP-REQUEST-CE.html">SSL:ALIEN-VAULT-SOAP-REQUEST-CE</a></b></td>
   <td width="500" valign="top">
    SSL: AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAPACHE-MOD-SSL.html">SSL:APACHE-MOD-SSL</a></b></td>
   <td width="500" valign="top">
    SSL: Apache mod_ssl ssl_util_uuencode_binary Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAPACHE-NIO-CONNECTOR-DOS.html">SSL:APACHE-NIO-CONNECTOR-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: Apache Tomcat NIO Connector Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAPPLE-SSL-BYPASS.html">SSL:APPLE-SSL-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: Apple Products SSL Security Feature Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAPPLE-SSL-BYPASS-PROXY.html">SSL:APPLE-SSL-BYPASS-PROXY</a></b></td>
   <td width="500" valign="top">
    SSL:Apple Products SSL Security Feature Bypass Via Proxy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ACERT-BIT-LT-2048.html">SSL:AUDIT:CERT-BIT-LT-2048</a></b></td>
   <td width="500" valign="top">
    SSL: Certificate Bits Less Than 2048 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ACERT-EXPIRED.html">SSL:AUDIT:CERT-EXPIRED</a></b></td>
   <td width="500" valign="top">
    SSL: Expired Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ADHEEXP-512CPHR-LOGJAM.html">SSL:AUDIT:DHEEXP-512CPHR-LOGJAM</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Logjam 512-Bit DHE_EXPORT Cipher Suite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ADTLS-CLT-HELLO-FRAG.html">SSL:AUDIT:DTLS-CLT-HELLO-FRAG</a></b></td>
   <td width="500" valign="top">
    SSL: DTLS Client Hello Fragmentation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3AHTTP-OVER-SSL.html">SSL:AUDIT:HTTP-OVER-SSL</a></b></td>
   <td width="500" valign="top">
    SSL: Unencrypted HTTP Traffic over SSL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3AKEY-RENEGOTIATION.html">SSL:AUDIT:KEY-RENEGOTIATION</a></b></td>
   <td width="500" valign="top">
    SSL: Key Renegotiation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ANOT-SSL.html">SSL:AUDIT:NOT-SSL</a></b></td>
   <td width="500" valign="top">
    SSL: Non-SSL Traffic on SSL Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ARSA-EXPORT-CIPHER.html">SSL:AUDIT:RSA-EXPORT-CIPHER</a></b></td>
   <td width="500" valign="top">
    SSL: RSA Export Grade Cipher Suite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ASESSION-KEY-REUSE.html">SSL:AUDIT:SESSION-KEY-REUSE</a></b></td>
   <td width="500" valign="top">
    SSL: Session key reuse
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ASSL-V2-TRAFFIC.html">SSL:AUDIT:SSL-V2-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    SSL: SSLv2 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ASSL-V3-TRAFFIC.html">SSL:AUDIT:SSL-V3-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    SSL: SSLv3 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ATLS-V10-TRAFFIC.html">SSL:AUDIT:TLS-V10-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    SSL: TLSv1.0 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ATLS-V11-TRAFFIC.html">SSL:AUDIT:TLS-V11-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    SSL: TLSv1.1 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AAUDIT%3ATLS-V12-TRAFFIC.html">SSL:AUDIT:TLS-V12-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    SSL: TLSv1.2 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ABEA-WEBLOGIC-DOS.html">SSL:BEA-WEBLOGIC-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: BEA WebLogic SSL Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ACIPHER-SUITE-OVERFLOW.html">SSL:CIPHER-SUITE-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SSL: Cipher Suite Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ACLNT-MSTR-KEY-OVERFLOW.html">SSL:CLNT-MSTR-KEY-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SSL: Client Master Key Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ACOMPROMISEDCERT-DECTECTION.html">SSL:COMPROMISEDCERT-DECTECTION</a></b></td>
   <td width="500" valign="top">
    SSL: CompromisedCert Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ACPHR-DOS.html">SSL:CPHR-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: IIS SSL Malformed Cipher DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ADEFAULT-PW.html">SSL:DEFAULT-PW</a></b></td>
   <td width="500" valign="top">
    SSL: Groupwise Default Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ADIGINOTAR-CERT-KEY-NEGO.html">SSL:DIGINOTAR-CERT-KEY-NEGO</a></b></td>
   <td width="500" valign="top">
    SSL: DigiNotar Certificate Key Negotiation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ADTLS-DOS.html">SSL:DTLS-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: DTLS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AEGO-GOV-FRAUD-CERTIFICATE.html">SSL:EGO-GOV-FRAUD-CERTIFICATE</a></b></td>
   <td width="500" valign="top">
    SSL: EGO.GOV.TR Fraudulent Digital Certificate Content Spoofing Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AENC-LEN-VALUE-TOO-BIG.html">SSL:ENC-LEN-VALUE-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SSL: Length Value Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AENC-TAG-VALUE-TOO-BIG.html">SSL:ENC-TAG-VALUE-TOO-BIG</a></b></td>
   <td width="500" valign="top">
    SSL: Tag Value Too Large
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AEPO-XMLNTITY-INJ.html">SSL:EPO-XMLNTITY-INJ</a></b></td>
   <td width="500" valign="top">
    SSL: McAfee ePolicy CVE-2015-0921 XML Entity Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNU-DER-PARSING-DOS.html">SSL:GNU-DER-PARSING-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: Gnu DER Certificate Parsing Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-ASN1-LENGTH-OF.html">SSL:GNUTLS-ASN1-LENGTH-OF</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS libtasn1 ASN1 Length DER Decoding Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-CERT-BYPASS.html">SSL:GNUTLS-CERT-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS Certificate Verification Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-CERT-POLICY-BYPASS.html">SSL:GNUTLS-CERT-POLICY-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS X.509 Version 1 Intermediate Certificate Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-EXTRACT-DER-DOS.html">SSL:GNUTLS-EXTRACT-DER-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS DER Certificate Format Decoding Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-HELLO-SESSION-ID-OF.html">SSL:GNUTLS-HELLO-SESSION-ID-OF</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS Server Hello Session ID Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AGNUTLS-TLS-RECORD-MC.html">SSL:GNUTLS-TLS-RECORD-MC</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS TLS Record Decoding Out-of-bounds Memory Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AHP-DIAGNOSTICS-OF.html">SSL:HP-DIAGNOSTICS-OF</a></b></td>
   <td width="500" valign="top">
    SSL: HP Diagnostics magentservice.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AHTTPS-UNIX-CMDS.html">SSL:HTTPS-UNIX-CMDS</a></b></td>
   <td width="500" valign="top">
    SSL: UNIX Post-Exploit Commands
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AHTTPS-UNIX-ID-RESP.html">SSL:HTTPS-UNIX-ID-RESP</a></b></td>
   <td width="500" valign="top">
    SSL: UNIX id Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AIIS%3ACERT-DOS.html">SSL:IIS:CERT-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: Microsoft IIS SChannel Process Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACERT-CHAIN.html">SSL:INVALID:CERT-CHAIN</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid CERT Chain Path Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACERT-FORMAT.html">SSL:INVALID:CERT-FORMAT</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid CERT Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACERT-VERSION.html">SSL:INVALID:CERT-VERSION</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid CERT Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACHALLENGE-LEN.html">SSL:INVALID:CHALLENGE-LEN</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Challenge Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACIPHER-LEN.html">SSL:INVALID:CIPHER-LEN</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Change Cipher Spec Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACIPHER-SPEC.html">SSL:INVALID:CIPHER-SPEC</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Cipher Spec Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACIPHER-SUITE.html">SSL:INVALID:CIPHER-SUITE</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Cipher Suite Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACLIENT-HELLO.html">SSL:INVALID:CLIENT-HELLO</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Client Helo Message Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACOMP-METH-LEN.html">SSL:INVALID:COMP-METH-LEN</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Compression Method Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACOMP-METHOD.html">SSL:INVALID:COMP-METHOD</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Compression Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ACONTENT-TYPE.html">SSL:INVALID:CONTENT-TYPE</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3AGNUTLS-RECORD-BO.html">SSL:INVALID:GNUTLS-RECORD-BO</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS TLS Record Application GenericBlockCipher Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3AGNUTLS-RECORD-OF.html">SSL:INVALID:GNUTLS-RECORD-OF</a></b></td>
   <td width="500" valign="top">
    SSL: GnuTLS TLS Record Application GenericBlockCipher Parsing Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3AMESSAGE-FMT.html">SSL:INVALID:MESSAGE-FMT</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Total Message Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ANULL-CERT.html">SSL:INVALID:NULL-CERT</a></b></td>
   <td width="500" valign="top">
    SSL: Null Byte in Common Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ASESSION-ID-LEN.html">SSL:INVALID:SESSION-ID-LEN</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Session ID Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ASSL-INV-VER.html">SSL:INVALID:SSL-INV-VER</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ASVR-HELLO-DATA.html">SSL:INVALID:SVR-HELLO-DATA</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Server Hello Message Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3ASVR-HELLO-FMT.html">SSL:INVALID:SVR-HELLO-FMT</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Server Hello Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AINVALID%3AVALIDITY-FMT.html">SSL:INVALID:VALIDITY-FMT</a></b></td>
   <td width="500" valign="top">
    SSL: Invalid Validity Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMALFORMED-SCHANNEL-NEGO.html">SSL:MALFORMED-SCHANNEL-NEGO</a></b></td>
   <td width="500" valign="top">
    SSL: Microsoft Internet Explorer SChannel Exploit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMCAFEE-EPOLICY-XML.html">SSL:MCAFEE-EPOLICY-XML</a></b></td>
   <td width="500" valign="top">
    SSL: McAfee ePolicy Orchestrator XML External Entity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMGM-CONSOLE-XSS.html">SSL:MGM-CONSOLE-XSS</a></b></td>
   <td width="500" valign="top">
    SSL: Symantec MGM Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMOZ-SSLV2-CL.html">SSL:MOZ-SSLV2-CL</a></b></td>
   <td width="500" valign="top">
    SSL: Mozilla SSLv2 Client
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMOZILLA-NSS-RSA-SIG-FORGERY.html">SSL:MOZILLA-NSS-RSA-SIG-FORGERY</a></b></td>
   <td width="500" valign="top">
    SSL: Mozilla Network Security Services RSA Signature Forgery
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMS-SCHANNEL-RCE.html">SSL:MS-SCHANNEL-RCE</a></b></td>
   <td width="500" valign="top">
    SSL: Microsoft Schannel Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMS-WINDOWS-TLS-BYPASS.html">SSL:MS-WINDOWS-TLS-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: Microsoft Windows SSL and TLS Security Feature Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AMSG-IN-WRONG-DIR.html">SSL:MSG-IN-WRONG-DIR</a></b></td>
   <td width="500" valign="top">
    SSL: Message with Incorrect Direction
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ANAGIOS-NRPE-CHKUSRS-CI.html">SSL:NAGIOS-NRPE-CHKUSRS-CI</a></b></td>
   <td width="500" valign="top">
    SSL: Nagios Remote Plugin Executor Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ANOVELL-GROUPWISE-DIR-TRA.html">SSL:NOVELL-GROUPWISE-DIR-TRA</a></b></td>
   <td width="500" valign="top">
    SSL: Novell GroupWise Service FileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ANOVELL-ZENWORKS-UL.html">SSL:NOVELL-ZENWORKS-UL</a></b></td>
   <td width="500" valign="top">
    SSL: Novell ZENworks Configuration Management File Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-AES-NI-INTUDF.html">SSL:OPENSSL-AES-NI-INTUDF</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL AES-NI Integer Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-ALT-CHAINS-CERT-FRG.html">SSL:OPENSSL-ALT-CHAINS-CERT-FRG</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Alternative Chains Certificate Forgery Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-CHAINS-CERT-FORG.html">SSL:OPENSSL-CHAINS-CERT-FORG</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Alternative Chains Certificate Forgery Policy Bypass (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DHE-DOS.html">SSL:OPENSSL-DHE-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DHE Client Key Exchange Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DO-SSL3-WRITE-DOS.html">SSL:OPENSSL-DO-SSL3-WRITE-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL do_ssl3_write Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-DOS.html">SSL:OPENSSL-DTLS-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Retransmission Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-MEMEXHTN_DOS.html">SSL:OPENSSL-DTLS-MEMEXHTN_DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS dtls1_buffer_record Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-REC-DOS.html">SSL:OPENSSL-DTLS-REC-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Recursion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-SRTP-DOS.html">SSL:OPENSSL-DTLS-SRTP-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS SRTP Extension Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS1-BOF.html">SSL:OPENSSL-DTLS1-BOF</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL dtls1_reassemble_fragment Invalid Fragment Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS1-DOS.html">SSL:OPENSSL-DTLS1-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Handshake Memory Exhaustion Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLSCLIENTHELLO-DOS.html">SSL:OPENSSL-DTLSCLIENTHELLO-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL dtls1 Client Hello Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-ECDH-DOS.html">SSL:OPENSSL-ECDH-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Anonymous ECDH Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-ECDH-UAF.html">SSL:OPENSSL-ECDH-UAF</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ECDH Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-FLOOD.html">SSL:OPENSSL-FLOOD</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Client Connection Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-GET-KEY-EXCH-UAF.html">SSL:OPENSSL-GET-KEY-EXCH-UAF</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ssl3_get_key_exchange Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-HEARTBEAT-ALTERNATE.html">SSL:OPENSSL-HEARTBEAT-ALTERNATE</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL TLS DTLS Heartbeat Information Disclosure (Server, Client, and STARTTLS Support)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-MEMLEAK-DOS.html">SSL:OPENSSL-MEMLEAK-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid Session Ticket Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-MITM-SEC-BYPASS.html">SSL:OPENSSL-MITM-SEC-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ChangeCipherSpec MITM Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-REC-HANDLING-DOS.html">SSL:OPENSSL-REC-HANDLING-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL TLS Connection Record Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-SRP-BO.html">SSL:OPENSSL-SRP-BO</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid SRP Parameters g and B Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLS-DOS.html">SSL:OPENSSL-TLS-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ssl_get_algorithm2 TLS Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLS-DTLS-HEARTBEAT.html">SSL:OPENSSL-TLS-DTLS-HEARTBEAT</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL TLS DTLS Heartbeat Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLS-HEARTBEAT.html">SSL:OPENSSL-TLS-HEARTBEAT</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL TLS Heartbeat Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLSRECORD-DOS.html">SSL:OPENSSL-TLSRECORD-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL TLS Record Tampering Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3ABEA-PLUGINS-CERT.html">SSL:OVERFLOW:BEA-PLUGINS-CERT</a></b></td>
   <td width="500" valign="top">
    SSL: Oracle BEA WebLogic Server Plug-ins Certificate Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3ACIPHERS-OBO.html">SSL:OVERFLOW:CIPHERS-OBO</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL SSL_get_shared_ciphers Function Off-by-one Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3ACIPHERS-OF.html">SSL:OVERFLOW:CIPHERS-OF</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL SSL_get_shared_ciphers Function Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AELLIPTIC-POLY-DOS.html">SSL:OVERFLOW:ELLIPTIC-POLY-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Elliptic Polynomial Denial-Of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AKEY-ARG-NO-ENTROPY.html">SSL:OVERFLOW:KEY-ARG-NO-ENTROPY</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL KEY_ARG No Entropy
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AMSCRSFT-SCHANNL-CE.html">SSL:OVERFLOW:MSCRSFT-SCHANNL-CE</a></b></td>
   <td width="500" valign="top">
    SSL: Microsoft Windows SChannel Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AOPENSSL-SRP-CSUITE.html">SSL:OVERFLOW:OPENSSL-SRP-CSUITE</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid SRP Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3ASSL-KEY_ARG1.html">SSL:OVERFLOW:SSL-KEY_ARG1</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL KEY_ARG Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3ASSL-KEY_ARG2.html">SSL:OVERFLOW:SSL-KEY_ARG2</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL KEY_ARG Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASERIAL-NUM-TOO-LONG.html">SSL:SERIAL-NUM-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SSL: Serial Number Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASERVER-HELLO-SESSION-ID-OF.html">SSL:SERVER-HELLO-SESSION-ID-OF</a></b></td>
   <td width="500" valign="top">
    SSL: Server Hello Session ID Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASERVR-CERT-FAILS-VALIDATION.html">SSL:SERVR-CERT-FAILS-VALIDATION</a></b></td>
   <td width="500" valign="top">
    SSL: Server Certificate Fails Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASESSION-ID-LEN-2BIG.html">SSL:SESSION-ID-LEN-2BIG</a></b></td>
   <td width="500" valign="top">
    SSL: Session ID Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASESSION-KEY-REUSE-UNAVAIL.html">SSL:SESSION-KEY-REUSE-UNAVAIL</a></b></td>
   <td width="500" valign="top">
    SSL: Session key reuse key unavailable
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASLAPPER-WORM-PROBE.html">SSL:SLAPPER-WORM-PROBE</a></b></td>
   <td width="500" valign="top">
    SSL: Apache Slapper (bugtraq) Worm Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASSL-V3-BRUTE-FORCE.html">SSL:SSL-V3-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    SSL: SSLv3 Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASSL-V3-TRAFFC.html">SSL:SSL-V3-TRAFFC</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ssl23_get_client_hello Function Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASSLSCAN-ACTIVITY.html">SSL:SSLSCAN-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    SSL: SSLSCAN Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASYMANTEC-EP-POLICY-BYPASS.html">SSL:SYMANTEC-EP-POLICY-BYPASS</a></b></td>
   <td width="500" valign="top">
    SSL: Symantec Endpoint Protection Console Servlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASYMC-WEB-CMD-INJ.html">SSL:SYMC-WEB-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    SSL: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ASYS-MGMT-HOMEP-CMD-INJ.html">SSL:SYS-MGMT-HOMEP-CMD-INJ</a></b></td>
   <td width="500" valign="top">
    SSL: HP System Management Homepage Command Injection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ATHC-SSL-DOS.html">SSL:THC-SSL-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: The Hacker&#39;s Choice SSL Denial of Service (DoS) Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ATLS-BRUTE-FORCE.html">SSL:TLS-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    SSL: TLS Multiple Versions Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3ATURKTRUST-FRAUD-CERTIFICATE.html">SSL:TURKTRUST-FRAUD-CERTIFICATE</a></b></td>
   <td width="500" valign="top">
    SSL: TURKTRUST Fraudulent Digital Certificate Content Spoofing Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AUNK-CHG-CPHR-SPEC-MSG.html">SSL:UNK-CHG-CPHR-SPEC-MSG</a></b></td>
   <td width="500" valign="top">
    SSL: Unknown Change Cipher Spec Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AUNK-HANDSHAKE-TYPE.html">SSL:UNK-HANDSHAKE-TYPE</a></b></td>
   <td width="500" valign="top">
    SSL: Unknown Handshake Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AUNKNOWN-CIPHER-SUITE.html">SSL:UNKNOWN-CIPHER-SUITE</a></b></td>
   <td width="500" valign="top">
    ssl_unknown_cipher_suite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AUTN-USERFIRST-HARDWARE.html">SSL:UTN-USERFIRST-HARDWARE</a></b></td>
   <td width="500" valign="top">
    SSL: Untrusted Certificate (UTN-USERFirst-Hardware)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AASN1-TYPE-CMP-DOS.html">SSL:VULN:ASN1-TYPE-CMP-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL ASN1_TYPE_cmp Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3ACVE-2015-0208-DOS.html">SSL:VULN:CVE-2015-0208-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid PSS Parameters Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3ACVE-2015-0291-DOS.html">SSL:VULN:CVE-2015-0291-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Signature Algorithm CVE-2015-0291 DOS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3ADTLS-DOUBLE-FREE-DOS.html">SSL:VULN:DTLS-DOUBLE-FREE-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Handshake Double Free Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AF5-ICONTROL-SOAP-CE.html">SSL:VULN:F5-ICONTROL-SOAP-CE</a></b></td>
   <td width="500" valign="top">
    SSL: F5 Multiple Products iControl API hostname Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AKS-SSL-CERTVALIDATION.html">SSL:VULN:KS-SSL-CERTVALIDATION</a></b></td>
   <td width="500" valign="top">
    SSL: Kaspersky Internet Security HTTPS Inspection Insecure Certificate Validation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AMOZILLA-NSS-REG.html">SSL:VULN:MOZILLA-NSS-REG</a></b></td>
   <td width="500" valign="top">
    SSL: Mozilla Network Security Services Regexp Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AOPENSSL-HS-DOS.html">SSL:VULN:OPENSSL-HS-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL Handshake Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AOPENSSL-PSS-PARAM.html">SSL:VULN:OPENSSL-PSS-PARAM</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL RSA PSS Absent Mask Generation Parameter Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3AOPENSSL-X509-DOS.html">SSL:VULN:OPENSSL-X509-DOS</a></b></td>
   <td width="500" valign="top">
    SSL: OpenSSL X509_cmp_time Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AVULN%3ASYMANTEC-EP-PARAM-XSS.html">SSL:VULN:SYMANTEC-EP-PARAM-XSS</a></b></td>
   <td width="500" valign="top">
    SSL: Symantec Endpoint Protection URI Parameter Reflected Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SSL%3AX509-CN-NULL-BYTE.html">SSL:X509-CN-NULL-BYTE</a></b></td>
   <td width="500" valign="top">
    SSL: X.509 Common Name(CN) Null Byte Truncation
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="SYSLOG"></a>SYSLOG</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AEMPTY-PRI.html">SYSLOG:AUDIT:EMPTY-PRI</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Empty Priority
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AINVALID-DAY.html">SYSLOG:AUDIT:INVALID-DAY</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Invalid Day
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AINVALID-MONTH.html">SYSLOG:AUDIT:INVALID-MONTH</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Invalid Month
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AINVALID-PRIORITY.html">SYSLOG:AUDIT:INVALID-PRIORITY</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Invalid Priority
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AMISSING-PRI.html">SYSLOG:AUDIT:MISSING-PRI</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Missing Priority
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3AMISSING-TS.html">SYSLOG:AUDIT:MISSING-TS</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Missing Timestamp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3APACKET.html">SYSLOG:AUDIT:PACKET</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Malformed Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AAUDIT%3ATIMESTAMP.html">SYSLOG:AUDIT:TIMESTAMP</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Malformed Timestamp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3ACP-SYSLOGD-ESC.html">SYSLOG:CP-SYSLOGD-ESC</a></b></td>
   <td width="500" valign="top">
    SYSLOG: CheckPoint Syslogd Escape Characters
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFAILURES%3AEMPTY-MSG.html">SYSLOG:FAILURES:EMPTY-MSG</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Empty Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFAILURES%3AMSG-TOO-LONG.html">SYSLOG:FAILURES:MSG-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFAILURES%3AMSG-TOO-SHORT.html">SYSLOG:FAILURES:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFAILURES%3AUNEXP-REPLY.html">SYSLOG:FAILURES:UNEXP-REPLY</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Unexpected Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFORMAT%3APRI-TOO-LONG.html">SYSLOG:FORMAT:PRI-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Priority Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AFORMAT%3APRIORITY.html">SYSLOG:FORMAT:PRIORITY</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Malformed Priority
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AHP-MGMT-IMCSYSLOGDM-UAF.html">SYSLOG:HP-MGMT-IMCSYSLOGDM-UAF</a></b></td>
   <td width="500" valign="top">
    SYSLOG: HP Intelligent Management Center imcsyslogdm Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3APRI-PARSING-DOS.html">SYSLOG:PRI-PARSING-DOS</a></b></td>
   <td width="500" valign="top">
    SYSLOG: RSYSLOG PRI Parsing Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3APRI-PARSING-TCP-DOS.html">SYSLOG:PRI-PARSING-TCP-DOS</a></b></td>
   <td width="500" valign="top">
    SYSLOG: RSYSLOG PRI Value Parsing Integer Overflow Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3ASYSLOG-CRAFTED-PKT.html">SYSLOG:SYSLOG-CRAFTED-PKT</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Crafted passlogd Buffer Overflow Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="SYSLOG%3AWATCHER-PRO-DATE-XSS.html">SYSLOG:WATCHER-PRO-DATE-XSS</a></b></td>
   <td width="500" valign="top">
    SYSLOG: Syslog Watcher Pro &#39;Date&#39; Parameter Cross Site Scripting
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="TCP"></a>TCP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAMBIGUOUS%3AWSF-TOOBIG.html">TCP:AMBIGUOUS:WSF-TOOBIG</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error WSF Too Big
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ABAD-SYN-NONSYN.html">TCP:AUDIT:BAD-SYN-NONSYN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Bad 3WH Non-SYN Packet in Response to SYN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-CLOSED-ACK.html">TCP:AUDIT:C2S-CLOSED-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Ack in Closed State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-FINRETR-BADSEQ.html">TCP:AUDIT:C2S-FINRETR-BADSEQ</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching Seq Num in FIN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-FUTURE-ACK.html">TCP:AUDIT:C2S-FUTURE-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Exploit ACK for Data Not Yet Seen
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-LASTACK-ACK.html">TCP:AUDIT:C2S-LASTACK-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info ACK in LASTACK State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-OLD-ESTB.html">TCP:AUDIT:C2S-OLD-ESTB</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Old Packet Old Timestamp in ESTABLISHED
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-PART-OUT-OF-WIN.html">TCP:AUDIT:C2S-PART-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info Segment Partially Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-RST-DATA.html">TCP:AUDIT:C2S-RST-DATA</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Data in RST Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-SEG-OUT-OF-WIN.html">TCP:AUDIT:C2S-SEG-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info Segment Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-TIMEWAIT-ACK.html">TCP:AUDIT:C2S-TIMEWAIT-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info ACK in TIMEWAIT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-TIMEWAIT-FIN.html">TCP:AUDIT:C2S-TIMEWAIT-FIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info FIN in TIMEWAIT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AC2S-URG-DATA.html">TCP:AUDIT:C2S-URG-DATA</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info Urgent Data Present
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ANONSYN-SACKPERM.html">TCP:AUDIT:NONSYN-SACKPERM</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error SACKPERM In Non-SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOLD-3WH-ACK.html">TCP:AUDIT:OLD-3WH-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Old Packet Old Timestamp in 3WH ACK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOLD-SYNACK.html">TCP:AUDIT:OLD-SYNACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Old Packet Old Timestamp in 3WH SYNACK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOPT-UNSOL-TS.html">TCP:AUDIT:OPT-UNSOL-TS</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info Unsolicited Timestamp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOPT-UNSUP.html">TCP:AUDIT:OPT-UNSUP</a></b></td>
   <td width="500" valign="top">
    TCP: Ambiguity Unsupported TCP Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOPTIONS-UNNEGOT-SACK.html">TCP:AUDIT:OPTIONS-UNNEGOT-SACK</a></b></td>
   <td width="500" valign="top">
    TCP: Info Unegotiated SACK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AOPTIONS-UNNEGOT-TS.html">TCP:AUDIT:OPTIONS-UNNEGOT-TS</a></b></td>
   <td width="500" valign="top">
    TCP: Info Unegotiated Timestamp
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-FIN-OUT-OF-WIN.html">TCP:AUDIT:S2C-FIN-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info FIN Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-FINRETR-BADSEQ.html">TCP:AUDIT:S2C-FINRETR-BADSEQ</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Mismatching Seq Num in FIN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-FINWAIT2-FIN.html">TCP:AUDIT:S2C-FINWAIT2-FIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info FIN in FINWAIT2 State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-FUTURE-ACK.html">TCP:AUDIT:S2C-FUTURE-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Exploit ACK for Data Not Yet Seen
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-LASTACK-ACK.html">TCP:AUDIT:S2C-LASTACK-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info ACK in LASTACK State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-OLD-ESTB.html">TCP:AUDIT:S2C-OLD-ESTB</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Old Packet Old Timestamp in ESTABLISHED
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-PART-OUT-OF-WIN.html">TCP:AUDIT:S2C-PART-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info Segment Partially Out Of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-RST-DATA.html">TCP:AUDIT:S2C-RST-DATA</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Data in RST Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-SEG-OUT-OF-WIN.html">TCP:AUDIT:S2C-SEG-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info Segment Out Of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-SIMUL-SYN.html">TCP:AUDIT:S2C-SIMUL-SYN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Simultaneous SYN
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-SYN-RST.html">TCP:AUDIT:S2C-SYN-RST</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Connection Refused (RST for SYN)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-TIMEWAIT-ACK.html">TCP:AUDIT:S2C-TIMEWAIT-ACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info ACK in TIMEWAIT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-TIMEWAIT-FIN.html">TCP:AUDIT:S2C-TIMEWAIT-FIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info FIN in TIMEWAIT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYN-RTNS--BADWSF.html">TCP:AUDIT:SYN-RTNS--BADWSF</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching WSF Opt in SYN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYN-RTNS-BADISS.html">TCP:AUDIT:SYN-RTNS-BADISS</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching Seq Num in SYN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYN-RTNS-BADTS.html">TCP:AUDIT:SYN-RTNS-BADTS</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching TS Opt in SYN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYN-RTNS-BADWIN.html">TCP:AUDIT:SYN-RTNS-BADWIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching Window in SYN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYNRCVD-SYNACK.html">TCP:AUDIT:SYNRCVD-SYNACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Bad 3WH SYN-ACK Retrans in SYNSENT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYNSENT-NONSYN.html">TCP:AUDIT:SYNSENT-NONSYN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Bad 3WH Non-SYN Retrans in SYNSENT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3ASYNSENT-RST.html">TCP:AUDIT:SYNSENT-RST</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Bad 3WH RST Packet in SYNSENT State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AUNKNOWN.html">TCP:AUDIT:UNKNOWN</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Unknown Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AUNSOL-SACKPERM.html">TCP:AUDIT:UNSOL-SACKPERM</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Unsolicited SACKPERM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AUNSOL-WSF.html">TCP:AUDIT:UNSOL-WSF</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Unsolicited WSF
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AAUDIT%3AWRONG-CHECKSUM.html">TCP:AUDIT:WRONG-CHECKSUM</a></b></td>
   <td width="500" valign="top">
    TCP: Info Wrong TCP Checksum
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AAMBIG%3AC2S-SYN-DATA.html">TCP:C2S:AMBIG:C2S-SYN-DATA</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Data in SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AAMBIG%3AOLAP-MISMATCH.html">TCP:C2S:AMBIG:OLAP-MISMATCH</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching Overlapping Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AAMBIG%3ASYN-RTNS--BADSACK.html">TCP:C2S:AMBIG:SYN-RTNS--BADSACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Ambiguity Mismatching SACK Opt in SYN Retrans
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AERROR%3AREASS-LOST-TRACK.html">TCP:C2S:ERROR:REASS-LOST-TRACK</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Error Reassembler Lost Track of Flow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEVASION%3AC2S-ESTB-SYN.html">TCP:C2S:EVASION:C2S-ESTB-SYN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Evasion SYN in ESTABLISHED State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEVASION%3AC2S-URG-OUT-WIN.html">TCP:C2S:EVASION:C2S-URG-OUT-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Evasion Urgent Data Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEXPLOIT%3AC2S-URG-OVERLAP.html">TCP:C2S:EXPLOIT:C2S-URG-OVERLAP</a></b></td>
   <td width="500" valign="top">
    TCP: Overlapping Urgent Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEXPLOIT%3ARST-BRUTE-FORCE.html">TCP:C2S:EXPLOIT:RST-BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    TCP: RST Brute Force
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEXPLOIT%3ATCP-ZERO-PORT.html">TCP:C2S:EXPLOIT:TCP-ZERO-PORT</a></b></td>
   <td width="500" valign="top">
    TCP: Zero Port Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AEXPLOIT%3AURG-WO-FLG.html">TCP:C2S:EXPLOIT:URG-WO-FLG</a></b></td>
   <td width="500" valign="top">
    TCP: Urgent Data Without Flags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AFLAGSERROR%3ADIRTY-SYN.html">TCP:C2S:FLAGSERROR:DIRTY-SYN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Flags Error Additional Flags in SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AC2S%3AINFO%3AC2S-FIN-OUT-OF-WIN.html">TCP:C2S:INFO:C2S-FIN-OUT-OF-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: C2S Info FIN Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AERROR%3AFLOW-MEMORY-EXCEEDED.html">TCP:ERROR:FLOW-MEMORY-EXCEEDED</a></b></td>
   <td width="500" valign="top">
    TCP: Error Too Many Packets Pending on Flow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AERROR%3AREASS-MEMORY-OVERFLOW.html">TCP:ERROR:REASS-MEMORY-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    TCP: Error Reassembler Packet Memory Exhausted
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AEXPLOIT%3ASOCKSTRESS.html">TCP:EXPLOIT:SOCKSTRESS</a></b></td>
   <td width="500" valign="top">
    TCP: Sockstress Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ABAD-LENGTH.html">TCP:OPTERR:BAD-LENGTH</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Bad Option Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ABAD-OPTION.html">TCP:OPTERR:BAD-OPTION</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Dangerous Option
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3AMS-ORPHAN-CONNECTION.html">TCP:OPTERR:MS-ORPHAN-CONNECTION</a></b></td>
   <td width="500" valign="top">
    TCP: Microsoft Windows TCP Orphaned Connections Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3AMS-ZERO-WINDOW-SIZE.html">TCP:OPTERR:MS-ZERO-WINDOW-SIZE</a></b></td>
   <td width="500" valign="top">
    TCP: Microsoft Windows TCP Stack Zero Window Size Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ANONSYN-MSS.html">TCP:OPTERR:NONSYN-MSS</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error MSS In Non-SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ANONSYN-WSF.html">TCP:OPTERR:NONSYN-WSF</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error WSF In Non-SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ASHORT-READ.html">TCP:OPTERR:SHORT-READ</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Option Not Fully Supplied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ASYN-SACK.html">TCP:OPTERR:SYN-SACK</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error SACK in SYN Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3ATOO-LONG.html">TCP:OPTERR:TOO-LONG</a></b></td>
   <td width="500" valign="top">
    TCP: Options Error Option Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AOPTERR%3AZERO-LENGTH.html">TCP:OPTERR:ZERO-LENGTH</a></b></td>
   <td width="500" valign="top">
    TCP: Zero Option Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AAMBIG%3AOLAP-MISMATCH.html">TCP:S2C:AMBIG:OLAP-MISMATCH</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Mismatching Overlapping Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AERROR%3AREASS-LOST-TRACK.html">TCP:S2C:ERROR:REASS-LOST-TRACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Error Reassembler Lost Track of Flow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AEVASION%3AS2C-ESTB-SYN.html">TCP:S2C:EVASION:S2C-ESTB-SYN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Evasion SYN in ESTABLISHED State
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AEVASION%3AS2C-URG-OUT-WIN.html">TCP:S2C:EVASION:S2C-URG-OUT-WIN</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Evasion Urgent Data Out of Window
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AEXPLOIT%3AS2C-URG-OVERLAP.html">TCP:S2C:EXPLOIT:S2C-URG-OVERLAP</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Exploit Overlapping Urgent Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AEXPLOIT%3AURG-WO-FLAGS.html">TCP:S2C:EXPLOIT:URG-WO-FLAGS</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Exploit Urgent Data Without Flags
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AFLAGSERROR%3ADIR-SYNACK.html">TCP:S2C:FLAGSERROR:DIR-SYNACK</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Flags Error Additional Flags in SYNACK Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TCP%3AS2C%3AINFO%3AS2C-URG-DATA.html">TCP:S2C:INFO:S2C-URG-DATA</a></b></td>
   <td width="500" valign="top">
    TCP: S2C Info Urgent Data Present
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="TELNET"></a>TELNET</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AAUDIT%3AREQ-SUBNEG-UNKNOWN.html">TELNET:AUDIT:REQ-SUBNEG-UNKNOWN</a></b></td>
   <td width="500" valign="top">
    TELNET: Negotiation Error - Unknown Sub-negotiation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AAUDIT%3AUSER.html">TELNET:AUDIT:USER</a></b></td>
   <td width="500" valign="top">
    TELNET: User Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ACMD%3AALLIED-TELESIS-PRIV.html">TELNET:CMD:ALLIED-TELESIS-PRIV</a></b></td>
   <td width="500" valign="top">
    TELNET: Allied Telesis AT-MCF2000M 3.0.2 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ACMD%3ACAT-ETC-PASSWD.html">TELNET:CMD:CAT-ETC-PASSWD</a></b></td>
   <td width="500" valign="top">
    TELNET: Command &quot;cat /etc/passwd&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ACMD%3AHALT.html">TELNET:CMD:HALT</a></b></td>
   <td width="500" valign="top">
    TELNET: Command &quot;halt&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ACMD%3ARAPIDHAMSTER-R2-TRAV.html">TELNET:CMD:RAPIDHAMSTER-R2-TRAV</a></b></td>
   <td width="500" valign="top">
    TELNET: RabidHamster R2 Extreme Telnet Server File Command Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ACMD%3ASCRIPT-TAGS-STREAM.html">TELNET:CMD:SCRIPT-TAGS-STREAM</a></b></td>
   <td width="500" valign="top">
    TELNET: HTML Script Tags Embedded in Telnet Stream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ADOS%3AGAMSOFT.html">TELNET:DOS:GAMSOFT</a></b></td>
   <td width="500" valign="top">
    Telnet: GAMSoft Telsrv DoS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ADOS%3ATLNTSVR-EXE-DOS.html">TELNET:DOS:TLNTSVR-EXE-DOS</a></b></td>
   <td width="500" valign="top">
    TELNET: Telnet service tlntsvr.exe Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ALD-LIBRARY-PATH.html">TELNET:EXPLOIT:LD-LIBRARY-PATH</a></b></td>
   <td width="500" valign="top">
    TELNET Exploit: LD_LIBRARY_PATH
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ALD-PRELOAD.html">TELNET:EXPLOIT:LD-PRELOAD</a></b></td>
   <td width="500" valign="top">
    TELNET: Exploit LD_PRELOAD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3AMIT-KERB-DASH-E.html">TELNET:EXPLOIT:MIT-KERB-DASH-E</a></b></td>
   <td width="500" valign="top">
    TELNET: MIT Kerberos 5 Telnet Daemon Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3AMS-CREDENTIAL.html">TELNET:EXPLOIT:MS-CREDENTIAL</a></b></td>
   <td width="500" valign="top">
    TELNET: Microsoft Windows Telnet Credential Reflection Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ARESOLV-HOST-CONF.html">TELNET:EXPLOIT:RESOLV-HOST-CONF</a></b></td>
   <td width="500" valign="top">
    TELNET: Exploit resolv_host_conf
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ASGI-RLD.html">TELNET:EXPLOIT:SGI-RLD</a></b></td>
   <td width="500" valign="top">
    TELNET: Exploit SGI _RLD
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ASOL-AUTH-BYPASS.html">TELNET:EXPLOIT:SOL-AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    TELNET: Sun Solaris Telnet Remote Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ASOLARIS-LOGIN-OF.html">TELNET:EXPLOIT:SOLARIS-LOGIN-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: Solaris /bin/login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AEXPLOIT%3ASUN-TELNETD-OF.html">TELNET:EXPLOIT:SUN-TELNETD-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: Solaris Telnetd &quot;TTYPROMPT&quot; Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3ABRUTE-FORCE.html">TELNET:FAILURE:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    TELNET: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3AEMP-CISCO-PWD.html">TELNET:FAILURE:EMP-CISCO-PWD</a></b></td>
   <td width="500" valign="top">
    TELNET: Reponse Empty Cisco Password
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3AGUEST.html">TELNET:FAILURE:GUEST</a></b></td>
   <td width="500" valign="top">
    TELNET: Failure Guest Account
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3ALOGIN-FAILED.html">TELNET:FAILURE:LOGIN-FAILED</a></b></td>
   <td width="500" valign="top">
    TELNET: Login failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3ALOGIN-INCORRECT.html">TELNET:FAILURE:LOGIN-INCORRECT</a></b></td>
   <td width="500" valign="top">
    TELNET: Failure &quot;login incorrect&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3ANON-NTLM.html">TELNET:FAILURE:NON-NTLM</a></b></td>
   <td width="500" valign="top">
    TELNET: Failure Windows Non-NTLM
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3ANOT-ON-CONSOLE.html">TELNET:FAILURE:NOT-ON-CONSOLE</a></b></td>
   <td width="500" valign="top">
    TELNET: Failure &quot;not on console&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3APERM-DENIED.html">TELNET:FAILURE:PERM-DENIED</a></b></td>
   <td width="500" valign="top">
    TELNET Response:Permission Denied
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AFAILURE%3AWINDOWS.html">TELNET:FAILURE:WINDOWS</a></b></td>
   <td width="500" valign="top">
    TELNET: Windows Login Failure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ANEGOT%3AREQ-SUBNEG-FORMAT.html">TELNET:NEGOT:REQ-SUBNEG-FORMAT</a></b></td>
   <td width="500" valign="top">
    TELNET Negotiation Error: Invalid Sup-negotiation Format
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3AABSOLUTE-UK2-OF.html">TELNET:OVERFLOW:ABSOLUTE-UK2-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: Absolute Telnet Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ABSD-ENCRY-KEYID.html">TELNET:OVERFLOW:BSD-ENCRY-KEYID</a></b></td>
   <td width="500" valign="top">
    TELNET: Multiple Vendors BSD telnetd Encryption Key Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ACCPROXY-HOST-OF.html">TELNET:OVERFLOW:CCPROXY-HOST-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: CCProxy Telnet Hostname Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ALINEMODE-OF.html">TELNET:OVERFLOW:LINEMODE-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: Buffer Overflow: LINEMODE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ALOGIN-OF.html">TELNET:OVERFLOW:LOGIN-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: Login Command Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ANEW-ENVIRON-OF.html">TELNET:OVERFLOW:NEW-ENVIRON-OF</a></b></td>
   <td width="500" valign="top">
    TELNET: NEW-ENVIRON Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3AOPTION.html">TELNET:OVERFLOW:OPTION</a></b></td>
   <td width="500" valign="top">
    TELNET: Option Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3AOPTIONS-REPLY.html">TELNET:OVERFLOW:OPTIONS-REPLY</a></b></td>
   <td width="500" valign="top">
    TELNET Options Overflow (Response)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ASGI.html">TELNET:OVERFLOW:SGI</a></b></td>
   <td width="500" valign="top">
    TELNET SGI Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ASUBOPTION.html">TELNET:OVERFLOW:SUBOPTION</a></b></td>
   <td width="500" valign="top">
    TELNET: Sub-Option Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3AYBSD-OF-CHECK.html">TELNET:OVERFLOW:YBSD-OF-CHECK</a></b></td>
   <td width="500" valign="top">
    TELNET: FreeBSD telnetd Buffer Overflow Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3ASVRRESP%3AMS-CLIENT-INFO.html">TELNET:SVRRESP:MS-CLIENT-INFO</a></b></td>
   <td width="500" valign="top">
    TELNET: Microsoft Telnet Client Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3A4DGIFTS.html">TELNET:USER:4DGIFTS</a></b></td>
   <td width="500" valign="top">
    TELNET User: &quot;4Dgifts&quot; SGI Account
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3AAPC-BACKDOOR.html">TELNET:USER:APC-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TELNET: APC Backdoor Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3AAXIS-COPYRIGHT.html">TELNET:USER:AXIS-COPYRIGHT</a></b></td>
   <td width="500" valign="top">
    TELNET: Axis StorPoint CD E100 Default Telnet Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW.html">TELNET:USER:DEFAULT-PW</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password Network Device
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW-2.html">TELNET:USER:DEFAULT-PW-2</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password Network Device 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW-3.html">TELNET:USER:DEFAULT-PW-3</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password Network Device 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW-3COM.html">TELNET:USER:DEFAULT-PW-3COM</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password 3com Devices
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW-4.html">TELNET:USER:DEFAULT-PW-4</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password Network Device 4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADEFAULT-PW-NORTEL.html">TELNET:USER:DEFAULT-PW-NORTEL</a></b></td>
   <td width="500" valign="top">
    TELNET: Default Password Nortel Devices
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3ADYNALINK-BACKDOOR.html">TELNET:USER:DYNALINK-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TELNET: Dynalink Router Default Account Access
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3AEZSETUP.html">TELNET:USER:EZSETUP</a></b></td>
   <td width="500" valign="top">
    TELNET User: &quot;EZsetup&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3AOUTOFBOX.html">TELNET:USER:OUTOFBOX</a></b></td>
   <td width="500" valign="top">
    TELNET User: &quot;OutOfBox&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TELNET%3AUSER%3AROOT.html">TELNET:USER:ROOT</a></b></td>
   <td width="500" valign="top">
    TELNET: User &#39;root&#39;
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="TFTP"></a>TFTP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AC2S-INVALID-OPCODE.html">TFTP:AUDIT:C2S-INVALID-OPCODE</a></b></td>
   <td width="500" valign="top">
    TFTP: REQUEST:Invalid Opcode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AC2S-UNEXP-ACK.html">TFTP:AUDIT:C2S-UNEXP-ACK</a></b></td>
   <td width="500" valign="top">
    TFTP: REQUEST: Unexpected ACK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AC2S-UNEXP-DATA.html">TFTP:AUDIT:C2S-UNEXP-DATA</a></b></td>
   <td width="500" valign="top">
    TFTP: REQUEST: Unexpected DATA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AREAD-FAILED.html">TFTP:AUDIT:READ-FAILED</a></b></td>
   <td width="500" valign="top">
    TFTP: Read Request Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AS2C-INVALID-OPCODE.html">TFTP:AUDIT:S2C-INVALID-OPCODE</a></b></td>
   <td width="500" valign="top">
    TFTP: REPLY: Invalid Opcode
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AS2C-UNEXP-ACK.html">TFTP:AUDIT:S2C-UNEXP-ACK</a></b></td>
   <td width="500" valign="top">
    TFTP: REPLY: Unexpected ACK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AS2C-UNEXP-DATA.html">TFTP:AUDIT:S2C-UNEXP-DATA</a></b></td>
   <td width="500" valign="top">
    TFTP: REPLY: Unexpected Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AAUDIT%3AWRITE-FAILED.html">TFTP:AUDIT:WRITE-FAILED</a></b></td>
   <td width="500" valign="top">
    TFTP: Write Request Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ADIRECTORY%3ADOT-DOT.html">TFTP:DIRECTORY:DOT-DOT</a></b></td>
   <td width="500" valign="top">
    TFTP: Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ADIRECTORY%3AREQ-FILE-DIR-TRV.html">TFTP:DIRECTORY:REQ-FILE-DIR-TRV</a></b></td>
   <td width="500" valign="top">
    TFTP: Directory Traversal Detected on TFTP Request File Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ADIRECTORY%3AROOT.html">TFTP:DIRECTORY:ROOT</a></b></td>
   <td width="500" valign="top">
    TFTP Directory:/
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ADIRECTORY%3ASOLAR-TFTP-TRVRS.html">TFTP:DIRECTORY:SOLAR-TFTP-TRVRS</a></b></td>
   <td width="500" valign="top">
    TFTP: SolarWinds Directory Traversal
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ADOS%3ALINUX-KERNEL.html">TFTP:DOS:LINUX-KERNEL</a></b></td>
   <td width="500" valign="top">
    TFTP: Linux Kernel Crafted UDP Packet Handling Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AEMPTY-FILENAME.html">TFTP:EMPTY-FILENAME</a></b></td>
   <td width="500" valign="top">
    TFTP: Empty Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AFILE%3AADMIN-DLL.html">TFTP:FILE:ADMIN-DLL</a></b></td>
   <td width="500" valign="top">
    TFTP: GET Admin.dll File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AFILE%3APASSWD-MAKREC.html">TFTP:FILE:PASSWD-MAKREC</a></b></td>
   <td width="500" valign="top">
    TFTP: HP Ignite-UX Password File Retrieval
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AFILENAME-TOO-LONG.html">TFTP:FILENAME-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    TFTP: Filename Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AFNAME-NOT-T2.html">TFTP:FNAME-NOT-T2</a></b></td>
   <td width="500" valign="top">
    TFTP: Filename Not NULL Terminated
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AFS-FILE.html">TFTP:FS-FILE</a></b></td>
   <td width="500" valign="top">
    TFTP: Format String In Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMISSING-FILENAME.html">TFTP:MISSING-FILENAME</a></b></td>
   <td width="500" valign="top">
    TFTP: Missing Filename
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMISSING-MODE.html">TFTP:MISSING-MODE</a></b></td>
   <td width="500" valign="top">
    TFTP: Missing Mode String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMRIS-ACCESS-VIOLATE.html">TFTP:MRIS-ACCESS-VIOLATE</a></b></td>
   <td width="500" valign="top">
    TFTP: Microsoft Remote Installation Service Access Violation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMSG-TOO-LONG.html">TFTP:MSG-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    TFTP: Message Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMSG-TOO-SHORT.html">TFTP:MSG-TOO-SHORT</a></b></td>
   <td width="500" valign="top">
    TFTP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AMULT-SERVER-DOS.html">TFTP:MULT-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    TFTP: Multiple TFTP Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ANOVELL-ZENWORKS-DESK-CE.html">TFTP:NOVELL-ZENWORKS-DESK-CE</a></b></td>
   <td width="500" valign="top">
    TFTP: Novell ZENworks Desktop Management Code Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AOPERATION%3AFS-TFTP-OF.html">TFTP:OPERATION:FS-TFTP-OF</a></b></td>
   <td width="500" valign="top">
    TFTP: FutureSoft TFTP Server 2000 Transfer-Mode Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AOPERATION%3AGET.html">TFTP:OPERATION:GET</a></b></td>
   <td width="500" valign="top">
    TFTP Get
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AOPERATION%3AWRITE.html">TFTP:OPERATION:WRITE</a></b></td>
   <td width="500" valign="top">
    TFTP: Write
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AOVERFLOW%3AMODE-TOO-LONG.html">TFTP:OVERFLOW:MODE-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    TFTP: mode too long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AOVERFLOW%3ASERVA-READ-REQ-BO.html">TFTP:OVERFLOW:SERVA-READ-REQ-BO</a></b></td>
   <td width="500" valign="top">
    TFTP: Serva TFTPD Service Read Request Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AREQUEST%3ANULL-PTR.html">TFTP:REQUEST:NULL-PTR</a></b></td>
   <td width="500" valign="top">
    TFTP: Dnsmasq Service Remote NULL-Pointer Dereference Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ASERVER-ERROR-BO.html">TFTP:SERVER-ERROR-BO</a></b></td>
   <td width="500" valign="top">
    TFTP: TFTP Server Error Packet Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3ATRANSPORT-BOF.html">TFTP:TRANSPORT-BOF</a></b></td>
   <td width="500" valign="top">
    TFTP: Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TFTP%3AWVFTP-OPTION-OF.html">TFTP:WVFTP-OPTION-OF</a></b></td>
   <td width="500" valign="top">
    TFTP: WVtftp Option Value Heap Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="TIP"></a>TIP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TIP%3AINV-IDENTIFY-RESP.html">TIP:INV-IDENTIFY-RESP</a></b></td>
   <td width="500" valign="top">
    TIP: Invalid Identify Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TIP%3ARECONNECT.html">TIP:RECONNECT</a></b></td>
   <td width="500" valign="top">
    TIP: Identify/Reconnect Vulnerability Exploit Attempt
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="TROJAN"></a>TROJAN</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AADMW0RM%3AUSER-LOGIN.html">TROJAN:ADMW0RM:USER-LOGIN</a></b></td>
   <td width="500" valign="top">
    TROJAN: ADMW0RM FTP User Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AALDIBOT-DETECTION.html">TROJAN:ALDIBOT-DETECTION</a></b></td>
   <td width="500" valign="top">
    TROJAN: Aldi Bot Detection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AANDROID-SPAMSOLDIER-BOT.html">TROJAN:ANDROID-SPAMSOLDIER-BOT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Android Spam Soldier SMS Botnet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPACHE-DARKLEECH.html">TROJAN:APACHE-DARKLEECH</a></b></td>
   <td width="500" valign="top">
    TROJAN: Apache Web Servers Darkleech Malware Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-ALPHA.html">TROJAN:APT1-SSL-ALPHA</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 alpha C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-AOL.html">TROJAN:APT1-SSL-AOL</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 aol C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-EMAIL.html">TROJAN:APT1-SSL-EMAIL</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 email C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-IBM.html">TROJAN:APT1-SSL-IBM</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 ibm C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-LAME.html">TROJAN:APT1-SSL-LAME</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 lame C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-MOON-NIGHT.html">TROJAN:APT1-SSL-MOON-NIGHT</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 moon-night C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-NO-NAME.html">TROJAN:APT1-SSL-NO-NAME</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 no-name C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-NS.html">TROJAN:APT1-SSL-NS</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 ns C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-SERVER.html">TROJAN:APT1-SSL-SERVER</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 server C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-SUR.html">TROJAN:APT1-SSL-SUR</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 sur C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-VIRTUALLYTHERE.html">TROJAN:APT1-SSL-VIRTUALLYTHERE</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 virtuallythere C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-WEBMAIL.html">TROJAN:APT1-SSL-WEBMAIL</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 webmail C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-SSL-YAHOO.html">TROJAN:APT1-SSL-YAHOO</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 yahoo C&amp;C SSL Certificate
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2-CLOVER-UA.html">TROJAN:APT1-WEBC2-CLOVER-UA</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-CLOVER UserAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2-DIV-UA.html">TROJAN:APT1-WEBC2-DIV-UA</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-DIV HTTP UserAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2-UGX-UA.html">TROJAN:APT1-WEBC2-UGX-UA</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-UGX UserAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2RAVE-TOSCTB-UA.html">TROJAN:APT1-WEBC2RAVE-TOSCTB-UA</a></b></td>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-RAVE and Win32/Tosct.B UserAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AASPXSPY-ACTIVITY.html">TROJAN:ASPXSPY-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: Possible ASPXSpy Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AASPXSPY-CONNECT.html">TROJAN:ASPXSPY-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Possible ASPXSpy Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AAUTOPROXY%3AINFECTED-HOST.html">TROJAN:AUTOPROXY:INFECTED-HOST</a></b></td>
   <td width="500" valign="top">
    TROJAN: AutoProxy Trojan Infected Host Registration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKCONSTR%3ACONNECTION.html">TROJAN:BACKCONSTR:CONNECTION</a></b></td>
   <td width="500" valign="top">
    TROJAN BackConstruction Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKCONSTR%3AFTP-ON.html">TROJAN:BACKCONSTR:FTP-ON</a></b></td>
   <td width="500" valign="top">
    TROJAN BackConstruction FTP On
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKCONSTR%3AFTP-PORT-OPEN.html">TROJAN:BACKCONSTR:FTP-PORT-OPEN</a></b></td>
   <td width="500" valign="top">
    TROJAN BackConstruction FTP Port-Open Reply
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR-BY-ZOMBIE.html">TROJAN:BACKDOOR-BY-ZOMBIE</a></b></td>
   <td width="500" valign="top">
    TROJAN: FuzzDB PHP Backdoor By Zombie
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR-LEOUNCIA.html">TROJAN:BACKDOOR-LEOUNCIA</a></b></td>
   <td width="500" valign="top">
    TROJAN: Backdoor.Leouncia Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ABANNER.html">TROJAN:BACKDOOR:BANNER</a></b></td>
   <td width="500" valign="top">
    TROJAN: BackDoor Server Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ACHINACHOPPERCNC.html">TROJAN:BACKDOOR:CHINACHOPPERCNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: China Chopper Webshell Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ADRIDEX-FEODO.html">TROJAN:BACKDOOR:DRIDEX-FEODO</a></b></td>
   <td width="500" valign="top">
    HTTP: Backdoor Dridex Feodo Cidrex
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3AGHOSTNET-CNC.html">TROJAN:BACKDOOR:GHOSTNET-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Backdoor.GhostNet Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3AMURCY-CNC.html">TROJAN:BACKDOOR:MURCY-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Backdoor.Murcy Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3APANDORA-DOS-CNC.html">TROJAN:BACKDOOR:PANDORA-DOS-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Pandora DDoS Toolkit Command and Control Communication 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3APERL-SHELLBOT-S.html">TROJAN:BACKDOOR:PERL-SHELLBOT-S</a></b></td>
   <td width="500" valign="top">
    TROJAN: Perl/Shellbot.S Backdoor Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ASCREENOS-PWD.html">TROJAN:BACKDOOR:SCREENOS-PWD</a></b></td>
   <td width="500" valign="top">
    TROJAN: Juniper ScreenOS Telnet Backdoor Password Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ASCREENOS-SSH.html">TROJAN:BACKDOOR:SCREENOS-SSH</a></b></td>
   <td width="500" valign="top">
    TROJAN: Juniper ScreenOS SSH Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKOFF-ACTIVITY.html">TROJAN:BACKOFF-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: BackOff Point-of-Sale Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKORIFICE%3ABO2K-CONNECT.html">TROJAN:BACKORIFICE:BO2K-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Back Orifice 2000 Client Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKORIFICE%3ABOPING.html">TROJAN:BACKORIFICE:BOPING</a></b></td>
   <td width="500" valign="top">
    TROJAN: Boping Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKORIFICE%3ACONN-REQ.html">TROJAN:BACKORIFICE:CONN-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: BackOrifice Connection Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKORIFICE%3AEXECUTION.html">TROJAN:BACKORIFICE:EXECUTION</a></b></td>
   <td width="500" valign="top">
    TROJAN: EuroCalculator: Execution
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABACKORIFICE%3AWEB-SERVER.html">TROJAN:BACKORIFICE:WEB-SERVER</a></b></td>
   <td width="500" valign="top">
    TROJAN: BackOrifice Web Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABEACON-C2-CNC.html">TROJAN:BEACON-C2-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Beacon C2 Healthcare Trojan Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABLACKHOLE-KIT-URL-REQ.html">TROJAN:BLACKHOLE-KIT-URL-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Possible Blackhole Exploit Kit URL Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABLEEDING-LIFE-EK.html">TROJAN:BLEEDING-LIFE-EK</a></b></td>
   <td width="500" valign="top">
    TROJAN: Bleeding Life Exploit Kit URL Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABOT-FEODO-ACTIVITY.html">TROJAN:BOT-FEODO-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: bot.feodo Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ABYTE-VERIFY-HTML.html">TROJAN:BYTE-VERIFY-HTML</a></b></td>
   <td width="500" valign="top">
    TROJAN: Byte-Verify in Webpage
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACAPFIRE4-CNC.html">TROJAN:CAPFIRE4-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Capfire4 Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACDK%3APORT15858.html">TROJAN:CDK:PORT15858</a></b></td>
   <td width="500" valign="top">
    TROJAN: CDK Access on High Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACDK%3APORT79.html">TROJAN:CDK:PORT79</a></b></td>
   <td width="500" valign="top">
    TROJAN: CDK Access on Low Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACDORKED-BACKDOOR.html">TROJAN:CDORKED-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: Linux/Cdorked HTTP Backdoor Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACDORKED-INFECTED-SERVER.html">TROJAN:CDORKED-INFECTED-SERVER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Linux/Cdorked Infected Web Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACFM-UFO.html">TROJAN:CFM-UFO</a></b></td>
   <td width="500" valign="top">
    TROJAN: UFO Backdoor Submission
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACITADEL-BEACON.html">TROJAN:CITADEL-BEACON</a></b></td>
   <td width="500" valign="top">
    TROJAN: Citadel Command and Control Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACOREFLOOD%3AC-AND-C.html">TROJAN:COREFLOOD:C-AND-C</a></b></td>
   <td width="500" valign="top">
    TROJAN: Coreflood Command And Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACOREFLOOD%3ATRACKER-REQ.html">TROJAN:COREFLOOD:TRACKER-REQ</a></b></td>
   <td width="500" valign="top">
    Trojan: Coreflood Tracker GET Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACRYPTOWALL.html">TROJAN:CRYPTOWALL</a></b></td>
   <td width="500" valign="top">
    CRYPTOWALL
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ACVE-2013-3893-CNC.html">TROJAN:CVE-2013-3893-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Microsoft Internet Explorer CVE-2013-3893 Command and Control Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADAGGER%3ACLIENT-CONNECT.html">TROJAN:DAGGER:CLIENT-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Dagger Client Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADAGGER%3ASERVER-RES.html">TROJAN:DAGGER:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: Dagger Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADEADBEEF-CNC.html">TROJAN:DEADBEEF-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: DEADBEEF Banking Trojan Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADLINK-BACKDOOR.html">TROJAN:DLINK-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: D-Link Device Unauthorized Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADOLY%3ACOMMAND-V1.html">TROJAN:DOLY:COMMAND-V1</a></b></td>
   <td width="500" valign="top">
    TROJAN: Doly Client Command v1.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADOLY%3ASERVER-RES-V1.html">TROJAN:DOLY:SERVER-RES-V1</a></b></td>
   <td width="500" valign="top">
    TROJAN: Doly Initial Server Response 1.7
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADOLY%3ASERVER-RES-V2.html">TROJAN:DOLY:SERVER-RES-V2</a></b></td>
   <td width="500" valign="top">
    TROJAN: Doly Initial Server Response 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADONALDDICK%3ASERVER-RES.html">TROJAN:DONALDDICK:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: DonaldDick Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADROIDDREAM.html">TROJAN:DROIDDREAM</a></b></td>
   <td width="500" valign="top">
    TROJAN: DroidDream
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADUO-USB.html">TROJAN:DUO-USB</a></b></td>
   <td width="500" valign="top">
    TROJAN: Energizer DUO USB Battery Charger
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ADYRE.html">TROJAN:DYRE</a></b></td>
   <td width="500" valign="top">
    TROJAN: Dyre Remote Access Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEAGHOUSE.html">TROJAN:EAGHOUSE</a></b></td>
   <td width="500" valign="top">
    TROJAN: EagHouse
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEBURY-DNS-EXFILTRATION.html">TROJAN:EBURY-DNS-EXFILTRATION</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ebury Trojaned SSH Daemon DNS Data Exfiltration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEBURY-SSH-BACKDOOR.html">TROJAN:EBURY-SSH-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: Linux/Ebury SSH Backdoor Connection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AENFAL-LURID-CNC.html">TROJAN:ENFAL-LURID-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Enfal/Lurid Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-CRYPTOLIB.html">TROJAN:EQUATIONGRP-CRYPTOLIB</a></b></td>
   <td width="500" valign="top">
    TROJAN: Equation Group Malware Crypto Library Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-EQUATIONLASR.html">TROJAN:EQUATIONGRP-EQUATIONLASR</a></b></td>
   <td width="500" valign="top">
    TROJAN: Equation Group EQUATIONLASER Malware Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-PRIVLIB.html">TROJAN:EQUATIONGRP-PRIVLIB</a></b></td>
   <td width="500" valign="top">
    TROJAN: Equation Group PrivLib Exploitation Library Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AFAKE-AV-CO-CC.html">TROJAN:FAKE-AV-CO-CC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Fake Antivirus (*.co.cc)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AFAKE-MSIE-6.0-UA.html">TROJAN:FAKE-MSIE-6.0-UA</a></b></td>
   <td width="500" valign="top">
    Trojan: Fake MSIE 6.0 User Agent String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AFISP-A-BOOTKIT.html">TROJAN:FISP-A-BOOTKIT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Trojan.Win32.Fisp.A Bootkit Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AGATECRASHER%3AGC-PROBE.html">TROJAN:GATECRASHER:GC-PROBE</a></b></td>
   <td width="500" valign="top">
    TROJAN: GateCrasher Server Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AGATECRASHER%3ASERVER-RES.html">TROJAN:GATECRASHER:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: GateCrasher Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AGIRLFRIEND%3ASERVER-RES.html">TROJAN:GIRLFRIEND:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: GirlFriend Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AGOZI-REG.html">TROJAN:GOZI-REG</a></b></td>
   <td width="500" valign="top">
    TROJAN: Gozi Trojan Registration
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AGUPTACHAR-2.0.html">TROJAN:GUPTACHAR-2.0</a></b></td>
   <td width="500" valign="top">
    TROJAN: Guptachar v 2.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AHTRAN-UA.html">TROJAN:HTRAN-UA</a></b></td>
   <td width="500" valign="top">
    TROJAN: HTRAN HTTP UserAgent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AHTTP-ZEROACCESS-BOTNET.html">TROJAN:HTTP-ZEROACCESS-BOTNET</a></b></td>
   <td width="500" valign="top">
    Trojan: HTTP ZeroAccess BotNet P2P Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AHXDEF1.00.html">TROJAN:HXDEF1.00</a></b></td>
   <td width="500" valign="top">
    TROJAN: HackerDefender:1.00
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AINFECTOR%3ACLIENT-REQ.html">TROJAN:INFECTOR:CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Infector Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AINFECTOR%3ASVR-RES.html">TROJAN:INFECTOR:SVR-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: Infector Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AITSOKNOPROBLEMBRO-CNC.html">TROJAN:ITSOKNOPROBLEMBRO-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: itsoknoproblembro Command and Control
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AJECT.A.html">TROJAN:JECT.A</a></b></td>
   <td width="500" valign="top">
    TROJAN: JECT Trojan in HTTP Session
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AKAZY-BEACON.html">TROJAN:KAZY-BEACON</a></b></td>
   <td width="500" valign="top">
    TROJAN: Kazy &quot;Phone Home&quot; Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AKRONOS-CNC-COMM.html">TROJAN:KRONOS-CNC-COMM</a></b></td>
   <td width="500" valign="top">
    TROJAN: KRONOS Banking Trojan Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMALVERTISING-CO-CC.html">TROJAN:MALVERTISING-CO-CC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Malicious Advertising (*.co.cc)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AAMANDA-SRV-RESP.html">TROJAN:MISC:AMANDA-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Amanda Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AAOLADMIN-SRV-RESP.html">TROJAN:MISC:AOLADMIN-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: AOL Admin Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AASYLUM-COMMAND.html">TROJAN:MISC:ASYLUM-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Asylum Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABACKAGE-COMMAND.html">TROJAN:MISC:BACKAGE-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Backage Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABASICHELL-SRV-RESP.html">TROJAN:MISC:BASICHELL-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Basic Hell Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABDDT-SRV-OK.html">TROJAN:MISC:BDDT-SRV-OK</a></b></td>
   <td width="500" valign="top">
    TROJAN: BDDT Server OK
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABF-EVOLUTION-BANNER.html">TROJAN:MISC:BF-EVOLUTION-BANNER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Blood Fest Evolution Server Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABLACKANGEL-SRV-RESP.html">TROJAN:MISC:BLACKANGEL-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Black Angel Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABLADERUNNER-RESP.html">TROJAN:MISC:BLADERUNNER-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Blade Runner Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABLAZER-SERV-RESP.html">TROJAN:MISC:BLAZER-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Blazer5/Socket De Troie Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABREACH-SRV-RESP.html">TROJAN:MISC:BREACH-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Breach Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ABREACHPRO-CAP-REQ.html">TROJAN:MISC:BREACHPRO-CAP-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Breach Pro Client ScreenShot Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACAFEINI-SERV-RESP.html">TROJAN:MISC:CAFEINI-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Cafeini Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACELINE-SRV-RESP.html">TROJAN:MISC:CELINE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Celine Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACGI-BUINET-SRV-RESP.html">TROJAN:MISC:CGI-BUINET-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: CGI Buinet Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACHUPA-COMMAND.html">TROJAN:MISC:CHUPA-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Chupacabra Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACONNECTION-RESP.html">TROJAN:MISC:CONNECTION-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Connection Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACRACKDOWN-SRV-RESP.html">TROJAN:MISC:CRACKDOWN-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Crackdown Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACRAZZYNET-SRV-RESP.html">TROJAN:MISC:CRAZZYNET-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Crazzynet Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACYN-CLIENT-CONN.html">TROJAN:MISC:CYN-CLIENT-CONN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Cyn Client Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ACYN-CLIENT-REQ.html">TROJAN:MISC:CYN-CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Cyn Initial Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ADANTON-SVR-RESP.html">TROJAN:MISC:DANTON-SVR-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Danton Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ADCONNECT.html">TROJAN:MISC:DCONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Dark Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ADRAT-SRV-VERSION.html">TROJAN:MISC:DRAT-SRV-VERSION</a></b></td>
   <td width="500" valign="top">
    TROJAN: DRaT Server Version Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ADTR-BANNER.html">TROJAN:MISC:DTR-BANNER</a></b></td>
   <td width="500" valign="top">
    TROJAN: DTr Server Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AECLYPSE-SRV-RESP.html">TROJAN:MISC:ECLYPSE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Eclypse Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AEXECUTOR-CMD.html">TROJAN:MISC:EXECUTOR-CMD</a></b></td>
   <td width="500" valign="top">
    TROJAN: Executor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFBACKDOOR-SRV-RESP.html">TROJAN:MISC:FBACKDOOR-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: F-Backdoor Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFE-SERV-RESP.html">TROJAN:MISC:FE-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Forced Entry Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFILENAIL-REQUEST.html">TROJAN:MISC:FILENAIL-REQUEST</a></b></td>
   <td width="500" valign="top">
    TROJAN: File Nail Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFLU-COMMAND.html">TROJAN:MISC:FLU-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: The Flu Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFORE-SRV-RESP.html">TROJAN:MISC:FORE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Fore Server Login Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AFRENZY-SRV-RESP.html">TROJAN:MISC:FRENZY-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Frenzy Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AGHOST-SRV-RESP.html">TROJAN:MISC:GHOST-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ghost Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AGIFT-COMMAND.html">TROJAN:MISC:GIFT-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Gift Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AGIRLFRIEND-SRV-RESP.html">TROJAN:MISC:GIRLFRIEND-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Girlfriend Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AGLACIER.html">TROJAN:MISC:GLACIER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Glacier Backdoor Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AGSPOT-COMMAND.html">TROJAN:MISC:GSPOT-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: G-Spot Tight Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AHACKWORLD-CMD.html">TROJAN:MISC:HACKWORLD-CMD</a></b></td>
   <td width="500" valign="top">
    TROJAN: HackWorld Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AHELLZ-SRV-RESP.html">TROJAN:MISC:HELLZ-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: HellzAddiction Server Version Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AHOSTCONTROL-RESP.html">TROJAN:MISC:HOSTCONTROL-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Host Control Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AILLUSION-1-0.html">TROJAN:MISC:ILLUSION-1-0</a></b></td>
   <td width="500" valign="top">
    TROJAN: Illusion 1.0
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AINCOMMAND-SVR-VER.html">TROJAN:MISC:INCOMMAND-SVR-VER</a></b></td>
   <td width="500" valign="top">
    TROJAN: InCommand Server Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AINSANE-SRV-RESP.html">TROJAN:MISC:INSANE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Insane Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AINTRUDER-RESPONSE.html">TROJAN:MISC:INTRUDER-RESPONSE</a></b></td>
   <td width="500" valign="top">
    TROJAN: Intruder Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AKIDTERROR-SRV-RESP.html">TROJAN:MISC:KIDTERROR-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Kid Terror Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AKONIK-CLIENT-REQ.html">TROJAN:MISC:KONIK-CLIENT-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Konik Client Folder Listing Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ALAST2K-CONN.html">TROJAN:MISC:LAST2K-CONN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Last2000 Backdoor Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ALEGUARDIEN.html">TROJAN:MISC:LEGUARDIEN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Le Guardien Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ALESZCZ-SRV-RESP.html">TROJAN:MISC:LESZCZ-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Leszcz Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ALITHIUM-SRV-RESP.html">TROJAN:MISC:LITHIUM-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Lithium Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMASSAKER-SRV-RESP.html">TROJAN:MISC:MASSAKER-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Massaker Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMAVERICKS-SRV-RESP.html">TROJAN:MISC:MAVERICKS-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mavericks Matrix Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMEETLAMER-COMMAND.html">TROJAN:MISC:MEETLAMER-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Meet The Lamer Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMICHAL-SRV-RESP.html">TROJAN:MISC:MICHAL-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Michal Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMILLENIUM-SERV-RESP.html">TROJAN:MISC:MILLENIUM-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Millenium Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMNEAH-SERV-RESP.html">TROJAN:MISC:MNEAH-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mneah Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMOBLIVION-SERV-RESP.html">TROJAN:MISC:MOBLIVION-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mini Oblivion Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMOONPIE-FTP-RESP.html">TROJAN:MISC:MOONPIE-FTP-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: MoonPie Embedded FTP Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMOONPIE-SERV-RESP.html">TROJAN:MISC:MOONPIE-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: MoonPie Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMOONPIE3-FTP-RESP.html">TROJAN:MISC:MOONPIE3-FTP-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: MoonPie 3 Embedded FTP Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMOSUCKER-SERV-RESP.html">TROJAN:MISC:MOSUCKER-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: MoSucker Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMWI-DOC-EXPKIT.html">TROJAN:MISC:MWI-DOC-EXPKIT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Microsoft Word Intruder Exploit Kit
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANETRAIDER-SRV-RESP.html">TROJAN:MISC:NETRAIDER-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetRaider Server Verification Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANETSILENCE-SRV-RESP.html">TROJAN:MISC:NETSILENCE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: New Silencer Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANETSPY-SRV-RESP.html">TROJAN:MISC:NETSPY-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetSpy Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANETTAXI-SRV-RESP.html">TROJAN:MISC:NETTAXI-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetTaxi Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANETTERROR-SRV-RESP.html">TROJAN:MISC:NETTERROR-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Network Terrorist Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANIRVANA-COMMAND.html">TROJAN:MISC:NIRVANA-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Nirvana Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ANOKNOK-COMMAND.html">TROJAN:MISC:NOKNOK-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: NokNok Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AOBLIVION-SRV-RESP.html">TROJAN:MISC:OBLIVION-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Oblivion Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AONE-CLIENTID.html">TROJAN:MISC:ONE-CLIENTID</a></b></td>
   <td width="500" valign="top">
    TROJAN: One Client Identification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AOPTIX-PRO-CONN.html">TROJAN:MISC:OPTIX-PRO-CONN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Optix Pro Backdoor Connection Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AOSIRIS-SERV-RESP.html">TROJAN:MISC:OSIRIS-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Osiris Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AOXON-COMMAND.html">TROJAN:MISC:OXON-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Oxon Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APCINVADER-COMMAND.html">TROJAN:MISC:PCINVADER-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: PC Invader Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APCINVADER-FTP-BANR.html">TROJAN:MISC:PCINVADER-FTP-BANR</a></b></td>
   <td width="500" valign="top">
    TROJAN: PC Invader Embedded FTP Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APHASE-ZERO-SRV-RESP.html">TROJAN:MISC:PHASE-ZERO-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Phase Zero Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APHOENIX-SERV-RESP.html">TROJAN:MISC:PHOENIX-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Phoenix Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APITFALL-SERV-RESP.html">TROJAN:MISC:PITFALL-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Pitfall Suprise Attack Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APITFALL-TELNET-ID.html">TROJAN:MISC:PITFALL-TELNET-ID</a></b></td>
   <td width="500" valign="top">
    TROJAN: Pitfall Telnet Server Identification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APPORT-INFO-REQ.html">TROJAN:MISC:PPORT-INFO-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Private Port Information Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APRAYER-SERV-RESP.html">TROJAN:MISC:PRAYER-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Prayer Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APROJNEXT-SERV-RESP.html">TROJAN:MISC:PROJNEXT-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Project Next Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APROSIAK-SERV-RESP.html">TROJAN:MISC:PROSIAK-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Prosiak Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3APSYCHWARD-SRV-RESP.html">TROJAN:MISC:PSYCHWARD-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: PsychWard Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AR0XR4T-COMMAND.html">TROJAN:MISC:R0XR4T-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: R0xR4t Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AR3C-SERV-RESP.html">TROJAN:MISC:R3C-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: R3c Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ARADMIN-CMD.html">TROJAN:MISC:RADMIN-CMD</a></b></td>
   <td width="500" valign="top">
    TROJAN: RADMIN Backdoor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ARATHEAD-SRV-RESP.html">TROJAN:MISC:RATHEAD-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: RaTHeaD Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AREMOTEHACK-CLIENTID.html">TROJAN:MISC:REMOTEHACK-CLIENTID</a></b></td>
   <td width="500" valign="top">
    TROJAN: Remote Hack Client Identification
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AREMOTEHACK-SVR-RESP.html">TROJAN:MISC:REMOTEHACK-SVR-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Remote Hack Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AROOTBEER-CLIENT.html">TROJAN:MISC:ROOTBEER-CLIENT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Digital Rootbeer Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ARPM-COMMAND.html">TROJAN:MISC:RPM-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Remote Process Monitor Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ARULER-SERV-RESP.html">TROJAN:MISC:RULER-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ruler Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ARUX-COMMAND.html">TROJAN:MISC:RUX-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Rux-the-Tick Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ASCARAB-CONNECT.html">TROJAN:MISC:SCARAB-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Scarab Client Connect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ASCHNECK-SERV-RESP.html">TROJAN:MISC:SCHNECK-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Schneckenkorn Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ASCHOOLBUS-JOYBD.html">TROJAN:MISC:SCHOOLBUS-JOYBD</a></b></td>
   <td width="500" valign="top">
    TROJAN: School Bus Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ASONOFPW-SERV-RESP.html">TROJAN:MISC:SONOFPW-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Son-of-PsychWard Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ATHING-SERV-RESP.html">TROJAN:MISC:THING-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: The tHing Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ATRANSSCOUT-CLIENTID.html">TROJAN:MISC:TRANSSCOUT-CLIENTID</a></b></td>
   <td width="500" valign="top">
    TROJAN: Transmission Scout Client Identification Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ATROJAN-CIA.html">TROJAN:MISC:TROJAN-CIA</a></b></td>
   <td width="500" valign="top">
    TROJAN: CIA Backdoor v1.1-2.2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ATRON-COMMAND.html">TROJAN:MISC:TRON-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: Tron Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3ATRUVA-SERV-RESP.html">TROJAN:MISC:TRUVA-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Truva Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AULLYSSE.html">TROJAN:MISC:ULLYSSE</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ullysse
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AULTIMATE-RAT21.html">TROJAN:MISC:ULTIMATE-RAT21</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ultimate RAT 2.1
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AULTIMATERAT.html">TROJAN:MISC:ULTIMATERAT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ultimate RAT
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AULTORS-SERV-RESP.html">TROJAN:MISC:ULTORS-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ultor Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AUNDETECTED-SRV-RESP.html">TROJAN:MISC:UNDETECTED-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Undetected Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AUPLOADER-LOGIN-REQ.html">TROJAN:MISC:UPLOADER-LOGIN-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Uploader Client Login Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AVAGNCKER-SERV-RESP.html">TROJAN:MISC:VAGNCKER-SERV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Vagr Nocker Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AVAMPIRE-SRV-RESP.html">TROJAN:MISC:VAMPIRE-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Vampire Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AVOODOO-COMMAND.html">TROJAN:MISC:VOODOO-COMMAND</a></b></td>
   <td width="500" valign="top">
    TROJAN: VooDoo Doll Client Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWANREMOTE-ADMIN.html">TROJAN:MISC:WANREMOTE-ADMIN</a></b></td>
   <td width="500" valign="top">
    TROJAN: WanRemote Administration Page
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWEBSERVCT10.html">TROJAN:MISC:WEBSERVCT10</a></b></td>
   <td width="500" valign="top">
    TROJAN: Webserv CT Server
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWINCRASH.html">TROJAN:MISC:WINCRASH</a></b></td>
   <td width="500" valign="top">
    TROJAN: WinCrash
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWINCRASH10-SRV-RDY.html">TROJAN:MISC:WINCRASH10-SRV-RDY</a></b></td>
   <td width="500" valign="top">
    TROJAN: WinCrash 1.0 Server Ready
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWINMITE-SRV-RDY.html">TROJAN:MISC:WINMITE-SRV-RDY</a></b></td>
   <td width="500" valign="top">
    TROJAN: Windows Mite Server Ready
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWINRAT10-TCP.html">TROJAN:MISC:WINRAT10-TCP</a></b></td>
   <td width="500" valign="top">
    TROJAN: WinRat 1.0 TCP Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWINRAT12-TCP.html">TROJAN:MISC:WINRAT12-TCP</a></b></td>
   <td width="500" valign="top">
    TROJAN: WinRat 1.2 TCP Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AWOW23-TCP.html">TROJAN:MISC:WOW23-TCP</a></b></td>
   <td width="500" valign="top">
    TROJAN: WOW23 TCP Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMISC%3AXANADU111-CON.html">TROJAN:MISC:XANADU111-CON</a></b></td>
   <td width="500" valign="top">
    TROJAN: Xanadu 1.11 Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMITGLEIDER.html">TROJAN:MITGLEIDER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mitgleider
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMS-04-028%3ABACKDOOR-LOGIN.html">TROJAN:MS-04-028:BACKDOOR-LOGIN</a></b></td>
   <td width="500" valign="top">
    TROJAN: MS04-028-Vector Backdoor FTP Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMS-04-028%3AR-ADMIN-START.html">TROJAN:MS-04-028:R-ADMIN-START</a></b></td>
   <td width="500" valign="top">
    TROJAN: MS04-028-Vector r_admin Server Remote Start
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMS-04-028%3ATOOL-DOWNLOAD.html">TROJAN:MS-04-028:TOOL-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    TROJAN: MS04-028-Vector Trojaned Files Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMYDOOM%3AAH-HTTP-INFECT.html">TROJAN:MYDOOM:AH-HTTP-INFECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: MyDoom.AH HTTP Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMYDOOM%3AMYDOOM-TROJAN.html">TROJAN:MYDOOM:MYDOOM-TROJAN</a></b></td>
   <td width="500" valign="top">
    TROJAN: MyDoom Backdoor Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AMYDOOM%3AS-IRC-BACKDOOR.html">TROJAN:MYDOOM:S-IRC-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mydoom.S Backdoor IRC Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETBUS%3ACLT-GETINFO-12345.html">TROJAN:NETBUS:CLT-GETINFO-12345</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetBus Client GetInfo Request on TCP/12345
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETBUS%3ACLT-GETINFO-12346.html">TROJAN:NETBUS:CLT-GETINFO-12346</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetBus Client GetInfo Request on TCP/12346
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETBUS%3APRO-SERVER-RES.html">TROJAN:NETBUS:PRO-SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetBus Pro Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETBUS%3ASERVER-RES-12345.html">TROJAN:NETBUS:SERVER-RES-12345</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetBus Server Response on TCP/12345
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETBUS%3ASERVER-RES-12346.html">TROJAN:NETBUS:SERVER-RES-12346</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetBus Server Response on TCP/12346
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETDEVIL%3ANETDEVIL.html">TROJAN:NETDEVIL:NETDEVIL</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetDevil
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETDEVIL%3ANETDEVIL-STC.html">TROJAN:NETDEVIL:NETDEVIL-STC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Net Devil Initial Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETDEVIL%3ANETDEVIL1-4.html">TROJAN:NETDEVIL:NETDEVIL1-4</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetDevil 1.4
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETMTROPOL%3ACLI-REQ-5301.html">TROJAN:NETMTROPOL:CLI-REQ-5301</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetMetropolitan 1.0 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETMTROPOL%3ACLI-REQ-5302.html">TROJAN:NETMTROPOL:CLI-REQ-5302</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetMetropolitan 1.04 Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETSPHERE%3ASVR-RES.html">TROJAN:NETSPHERE:SVR-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetSphere Server Response (TCP/30100)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANETSPHERE%3ASVR-RES-HIGH.html">TROJAN:NETSPHERE:SVR-RES-HIGH</a></b></td>
   <td width="500" valign="top">
    TROJAN: NetSphere Server Response (TCP/30101-30103)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANGRBOT-ACTIVITY.html">TROJAN:NGRBOT-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: ngrBot IRC Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ANIGHT-DRAGON-CC.html">TROJAN:NIGHT-DRAGON-CC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Night Dragon Botnet Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AOLDBAIT-CHOSTICK-CHECKIN.html">TROJAN:OLDBAIT-CHOSTICK-CHECKIN</a></b></td>
   <td width="500" valign="top">
    TROJAN: OLDBAIT And Chopstick Checkin
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AOPHIARU-BOTNET.html">TROJAN:OPHIARU-BOTNET</a></b></td>
   <td width="500" valign="top">
    TROJAN: Ophia.ru C&amp;C Botnet Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AOSX-DNS-CHANGER.html">TROJAN:OSX-DNS-CHANGER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Mac OSX DNSChanger Trojan Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APEACOMM-TROJAN.html">TROJAN:PEACOMM-TROJAN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Peacomm Trojan C&amp;C
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APHASEZERO%3ASERVER-RES.html">TROJAN:PHASEZERO:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: PhaseZero Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APHATBOT%3ACMD-CONNECT.html">TROJAN:PHATBOT:CMD-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Phatbot Control Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APHATBOT%3AFTP-CONNECT.html">TROJAN:PHATBOT:FTP-CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Phatbot FTP Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APITTY-TIGER-ACTIVITY.html">TROJAN:PITTY-TIGER-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: Pitty Tiger Trojan C&amp;C Activity Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APOISONIVY-CNC.html">TROJAN:POISONIVY-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Poison Ivy C&amp;C Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APROFTPD-BACKDOOR.html">TROJAN:PROFTPD-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: ProFTPD Backdoor Activation Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APROFTPD-BACKDOOR-BEACON.html">TROJAN:PROFTPD-BACKDOOR-BEACON</a></b></td>
   <td width="500" valign="top">
    TROJAN: ProFTPD Backdoor Phone Home Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APUSHDO-ACTIVITY.html">TROJAN:PUSHDO-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: PushDo Trojan Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3APUSHDO-POST-CNC.html">TROJAN:PUSHDO-POST-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: PushDo POST C&amp;C Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AQAZ%3ACLIENT-LOGIN.html">TROJAN:QAZ:CLIENT-LOGIN</a></b></td>
   <td width="500" valign="top">
    TROJAN: QAZ Client Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AQAZ%3ATCP139-SCAN.html">TROJAN:QAZ:TCP139-SCAN</a></b></td>
   <td width="500" valign="top">
    TROJAN: QAZ TCP/139 Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AQAZ%3ATCP25-CALLING-HOME.html">TROJAN:QAZ:TCP25-CALLING-HOME</a></b></td>
   <td width="500" valign="top">
    TROJAN: QAZ Calling Home on TCP/25
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AR2D2.html">TROJAN:R2D2</a></b></td>
   <td width="500" valign="top">
    TROJAN: R2D2 - Bundestrojaner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AREMOTE-EXPLORER%3ACONNECT.html">TROJAN:REMOTE-EXPLORER:CONNECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Remote Explorer Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AROOTKIT-DL.html">TROJAN:ROOTKIT-DL</a></b></td>
   <td width="500" valign="top">
    TROJAN: Rootkit Downloader
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ARUN-FOREST-RUN.html">TROJAN:RUN-FOREST-RUN</a></b></td>
   <td width="500" valign="top">
    TROJAN: RunForestRun Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAFEPACK-PLUGIN-DETECT.html">TROJAN:SAFEPACK-PLUGIN-DETECT</a></b></td>
   <td width="500" valign="top">
    TROJAN: FlashPack/SafePack/Critx PluginDetect
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAKURA-1.1-ARCH-REQ.html">TROJAN:SAKURA-1.1-ARCH-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Version 1.1 Archive Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAKURA-BIN-DOWNLOAD.html">TROJAN:SAKURA-BIN-DOWNLOAD</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Binary Download Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAKURA-BIN-LOAD-REQ.html">TROJAN:SAKURA-BIN-LOAD-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Binary Load Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAKURA-LANDING-OBFUS.html">TROJAN:SAKURA-LANDING-OBFUS</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Landing Page with Obfuscated URLs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASAKURA-LANDING-REQ.html">TROJAN:SAKURA-LANDING-REQ</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Landing Page Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASATANS-BD%3ASERVER-RES.html">TROJAN:SATANS-BD:SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: Satan&#39;s Backdoor Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASIMPLE-PHP-BACKDOOR.html">TROJAN:SIMPLE-PHP-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: FuzzDB Simple PHP Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASOFACY-CNC.html">TROJAN:SOFACY-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sofacy Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASOFACY-MALICIOUS-REQUEST.html">TROJAN:SOFACY-MALICIOUS-REQUEST</a></b></td>
   <td width="500" valign="top">
    TROJAN: Sofacy Malicious HTTP Request 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASPYEYE-BEACON.html">TROJAN:SPYEYE-BEACON</a></b></td>
   <td width="500" valign="top">
    TROJAN: SpyEye Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASUBSEVEN%3A2.1.A-SRVR-RES.html">TROJAN:SUBSEVEN:2.1.A-SRVR-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: SubSeven 2.1A Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASUBSEVEN%3A2.2-SERVER-RES.html">TROJAN:SUBSEVEN:2.2-SERVER-RES</a></b></td>
   <td width="500" valign="top">
    TROJAN: SubSeven 2.2 Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASUBSEVEN%3ASCAN.html">TROJAN:SUBSEVEN:SCAN</a></b></td>
   <td width="500" valign="top">
    TROJAN: SubSeven Scan Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASUBSEVEN%3ASUBSEVEN.html">TROJAN:SUBSEVEN:SUBSEVEN</a></b></td>
   <td width="500" valign="top">
    TROJAN: Subseven
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASUBSEVEN%3ASUBSEVEN-HTTP.html">TROJAN:SUBSEVEN:SUBSEVEN-HTTP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Subseven (HTTP)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASYNFUL-KNOCK-CNC.html">TROJAN:SYNFUL-KNOCK-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Cisco SYNful Knock Attack Malware C&amp;C Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ASYNOLOCKER-ACTIVITY.html">TROJAN:SYNOLOCKER-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: SynoLocker Ransomware Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATAIDOOR-CNC.html">TROJAN:TAIDOOR-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: Taidoor Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-BACKDOOR.html">TROJAN:TELNET:USER-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;backdoor&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-D13HH.html">TROJAN:TELNET:USER-D13HH</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;d13hh[&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-FRIDAY.html">TROJAN:TELNET:USER-FRIDAY</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;friday&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-HAX0R.html">TROJAN:TELNET:USER-HAX0R</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;hax0r&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-HIDEPAK.html">TROJAN:TELNET:USER-HIDEPAK</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;StoogR&quot; (HidePak)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-HIDESOURCE.html">TROJAN:TELNET:USER-HIDESOURCE</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;wank&quot; (HideSource)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-LRKR0X.html">TROJAN:TELNET:USER-LRKR0X</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;rkr0x&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-R00T.html">TROJAN:TELNET:USER-R00T</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;r00t&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-REWT.html">TROJAN:TELNET:USER-REWT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;rewt&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-SATORI.html">TROJAN:TELNET:USER-SATORI</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;satori&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-W00W00.html">TROJAN:TELNET:USER-W00W00</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;w00w00&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATELNET%3AUSER-WH00T.html">TROJAN:TELNET:USER-WH00T</a></b></td>
   <td width="500" valign="top">
    TROJAN: Telnet User &quot;wh00t&quot;
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATESLACRYPT-CNC.html">TROJAN:TESLACRYPT-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: TeslaCrypt C&amp;C Communication Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATHE-RAT.html">TROJAN:THE-RAT</a></b></td>
   <td width="500" valign="top">
    Trojan: The Rat Update Protocol Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3ATINBA-CHECKIN-RQST.html">TROJAN:TINBA-CHECKIN-RQST</a></b></td>
   <td width="500" valign="top">
    TROJAN: TINBA Tiny Banker Checkin Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AUNKNOWN-BACKDOOR-KNOCK.html">TROJAN:UNKNOWN-BACKDOOR-KNOCK</a></b></td>
   <td width="500" valign="top">
    TROJAN: Unidentified Backdoor Knock Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AW32-PARITE-CNC.html">TROJAN:W32-PARITE-CNC</a></b></td>
   <td width="500" valign="top">
    TROJAN: W32/Parite Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AWALDEC-ACTIVITY.html">TROJAN:WALDEC-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    TROJAN: Waldec Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AWIPER-BACKDOOR-ACT.html">TROJAN:WIPER-BACKDOOR-ACT</a></b></td>
   <td width="500" valign="top">
    TROJAN: Wiper Backdoor C&amp;C Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AWIPER-FLAME-POST-EXFIL.html">TROJAN:WIPER-FLAME-POST-EXFIL</a></b></td>
   <td width="500" valign="top">
    Trojan: Wiper/Flame HTTP POST Data Exfiltration Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AWIPER-FLAME-UPDATE.html">TROJAN:WIPER-FLAME-UPDATE</a></b></td>
   <td width="500" valign="top">
    Trojan: Wiper/Flame HTTP Software Update Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AY3K-RAT%3AY3K14-RAT-TCP.html">TROJAN:Y3K-RAT:Y3K14-RAT-TCP</a></b></td>
   <td width="500" valign="top">
    TROJAN: Y3k Rat 1.4 TCP Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AY3K-RAT%3AY3K16-RAT-BANNER.html">TROJAN:Y3K-RAT:Y3K16-RAT-BANNER</a></b></td>
   <td width="500" valign="top">
    TROJAN: Y3k Rat 1.6 Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AYAT%3AYAT-BANNER.html">TROJAN:YAT:YAT-BANNER</a></b></td>
   <td width="500" valign="top">
    TROJAN: YAT 3.01 Banner
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AZEROACCESS-BOTNET-P2P.html">TROJAN:ZEROACCESS-BOTNET-P2P</a></b></td>
   <td width="500" valign="top">
    Trojan: ZeroAccess BotNet P2P Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="TROJAN%3AZMEU-BOT-SCAN.html">TROJAN:ZMEU-BOT-SCAN</a></b></td>
   <td width="500" valign="top">
    TROJAN: ZmEu Bot Scan
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="UDP"></a>UDP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="UDP%3AMS-WINDOWS-TCP-IP-CNTR.html">UDP:MS-WINDOWS-TCP-IP-CNTR</a></b></td>
   <td width="500" valign="top">
    UDP: Microsoft Windows TCP-IP Reference Counter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="UDP%3APORT-ZERO.html">UDP:PORT-ZERO</a></b></td>
   <td width="500" valign="top">
    UDP: Port Zero
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="UDP%3ASNORT-FRAG3-DETECTION.html">UDP:SNORT-FRAG3-DETECTION</a></b></td>
   <td width="500" valign="top">
    UDP: Snort frag3 Preprocessor Fragmented IP Packet Detection Evasion
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="UDP%3AXTACACSD-BO.html">UDP:XTACACSD-BO</a></b></td>
   <td width="500" valign="top">
    UDP: XTACACS Protocol Long Username Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="UDP%3AZERO-DATA.html">UDP:ZERO-DATA</a></b></td>
   <td width="500" valign="top">
    UDP: Zero Data
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="VIRUS"></a>VIRUS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ABITCOIN-MINER-BOTNET.html">VIRUS:BITCOIN-MINER-BOTNET</a></b></td>
   <td width="500" valign="top">
    VIRUS: BitCoin Miner BotNet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3AHERE-YOU-HAVE.html">VIRUS:HERE-YOU-HAVE</a></b></td>
   <td width="500" valign="top">
    VIRUS: &quot;Here you have&quot; Virus Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3APOP3%3AEICAR-ATTACHMENT.html">VIRUS:POP3:EICAR-ATTACHMENT</a></b></td>
   <td width="500" valign="top">
    POP3: EICAR Antivirus Test File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3APOP3%3ANIMDA.html">VIRUS:POP3:NIMDA</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 NIMDA (readme.exe)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3APOP3%3ASOBER-K.html">VIRUS:POP3:SOBER-K</a></b></td>
   <td width="500" valign="top">
    VIRUS: Sober.K in POP3 Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3APOP3%3AUUENCODED-DOT-VBS.html">VIRUS:POP3:UUENCODED-DOT-VBS</a></b></td>
   <td width="500" valign="top">
    VIRUS: POP3 Uuencoded .vbs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AASPROX.html">VIRUS:SMTP:ASPROX</a></b></td>
   <td width="500" valign="top">
    VIRUS: Possible ASProx Botnet Email Content
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3ADOUBLE-EXTENSION.html">VIRUS:SMTP:DOUBLE-EXTENSION</a></b></td>
   <td width="500" valign="top">
    VIRUS: Double File Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AEICAR-ATTACHMENT.html">VIRUS:SMTP:EICAR-ATTACHMENT</a></b></td>
   <td width="500" valign="top">
    VIRUS: EICAR Antivirus Test File Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AEXE-ATTACH-1.html">VIRUS:SMTP:EXE-ATTACH-1</a></b></td>
   <td width="500" valign="top">
    VIRUS: Win32 Executable Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AEXE-IN-ZIP.html">VIRUS:SMTP:EXE-IN-ZIP</a></b></td>
   <td width="500" valign="top">
    VIRUS: Win32 Executable Attachment in Zip File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3ALOCALHOST-HELO.html">VIRUS:SMTP:LOCALHOST-HELO</a></b></td>
   <td width="500" valign="top">
    VIRUS: Localhost Used in SMTP HELO
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3ANIMDA.html">VIRUS:SMTP:NIMDA</a></b></td>
   <td width="500" valign="top">
    VIRUS: SMTP NIMDA (readme.exe)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AUUENCODED-DOT-VBS.html">VIRUS:SMTP:UUENCODED-DOT-VBS</a></b></td>
   <td width="500" valign="top">
    VIRUS: SMTP Uuencoded .vbs
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AZONEALARM-EXE.html">VIRUS:SMTP:ZONEALARM-EXE</a></b></td>
   <td width="500" valign="top">
    VIRUS: ZoneAlarm .exe Attachment Evasion
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="VNC"></a>VNC</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AAUTH-FAILED.html">VNC:AUDIT:AUTH-FAILED</a></b></td>
   <td width="500" valign="top">
    VNC: Authorization Failed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AAUTH-SCHEME.html">VNC:AUDIT:AUTH-SCHEME</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Auth Scheme
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AAUTH-STATUS.html">VNC:AUDIT:AUTH-STATUS</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Auth Status
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3ACLIENT-BITPERPIXEL.html">VNC:AUDIT:CLIENT-BITPERPIXEL</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Client Bit per Pixel
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3ACONNECT-FAIL.html">VNC:AUDIT:CONNECT-FAIL</a></b></td>
   <td width="500" valign="top">
    VNC: Connection Fail
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AENCODING-TYPE.html">VNC:AUDIT:ENCODING-TYPE</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Encoding Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3ASERVER-BITPERPIXEL.html">VNC:AUDIT:SERVER-BITPERPIXEL</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Server Bit Per Pixel
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AUNKNOWN-CLIENT-MSG.html">VNC:AUDIT:UNKNOWN-CLIENT-MSG</a></b></td>
   <td width="500" valign="top">
    VNC: Unknown Client Msg
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUDIT%3AUNKNOWN-SERVER-MSG.html">VNC:AUDIT:UNKNOWN-SERVER-MSG</a></b></td>
   <td width="500" valign="top">
    VNC: Unknown Server Msg
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AAUTH-BYPASS.html">VNC:AUTH-BYPASS</a></b></td>
   <td width="500" valign="top">
    VNC: Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3ACHICKEN-VNC-DOS.html">VNC:CHICKEN-VNC-DOS</a></b></td>
   <td width="500" valign="top">
    VNC: Chicken of the VNC Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ABRUTE-FORCE.html">VNC:ERR:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    VNC: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ACLNT-CUT.html">VNC:ERR:CLNT-CUT</a></b></td>
   <td width="500" valign="top">
    VNC: Client Cut Text Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ACONFLICT-HEXTILE-MASK.html">VNC:ERR:CONFLICT-HEXTILE-MASK</a></b></td>
   <td width="500" valign="top">
    VNC: Conflicting Hextile Mask
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ANO-AUTH-SCHEME.html">VNC:ERR:NO-AUTH-SCHEME</a></b></td>
   <td width="500" valign="top">
    VNC: No Auth Scheme
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ASVR-CUT-OVERFLOW.html">VNC:ERR:SVR-CUT-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    VNC: Server Cut Text Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ASVR-CUT-TOO-LONG.html">VNC:ERR:SVR-CUT-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    VNC: Server Cut Text Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AERR%3ATOO-MANY-AUTH-FAIL.html">VNC:ERR:TOO-MANY-AUTH-FAIL</a></b></td>
   <td width="500" valign="top">
    VNC: Too Many Auth Fail
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AGNOME-VINO-VNC-SERVER-DOS.html">VNC:GNOME-VINO-VNC-SERVER-DOS</a></b></td>
   <td width="500" valign="top">
    VNC: GNOME Vino VNC Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AINVALID%3ACLIENT-REQUEST.html">VNC:INVALID:CLIENT-REQUEST</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Client Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AINVALID%3ACLIENT-VERSION.html">VNC:INVALID:CLIENT-VERSION</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Client Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AINVALID%3ANAME-TOO-LONG.html">VNC:INVALID:NAME-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    VNC: Name Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AINVALID%3ASERVER-RESPONSE.html">VNC:INVALID:SERVER-RESPONSE</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Server Response
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AINVALID%3ASERVER-VERSION.html">VNC:INVALID:SERVER-VERSION</a></b></td>
   <td width="500" valign="top">
    VNC: Invalid Server Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3ALIBVNCSERVER-DIVBYZERO-DOS.html">VNC:LIBVNCSERVER-DIVBYZERO-DOS</a></b></td>
   <td width="500" valign="top">
    VNC: LibVNCServer rfbProcessClientNormalMessage Divide by Zero Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3AAUTH-CHALLENGE.html">VNC:OVERFLOW:AUTH-CHALLENGE</a></b></td>
   <td width="500" valign="top">
    VNC: Authorization Challenge Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3AAUTH-RESPONSE.html">VNC:OVERFLOW:AUTH-RESPONSE</a></b></td>
   <td width="500" valign="top">
    VNC: Auth Response Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3AAUTH-STATUS.html">VNC:OVERFLOW:AUTH-STATUS</a></b></td>
   <td width="500" valign="top">
    VNC: Auth Status Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ACLIENT-CUT-TEXT.html">VNC:OVERFLOW:CLIENT-CUT-TEXT</a></b></td>
   <td width="500" valign="top">
    VNC: Client Cut Text Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ACLIENT-INIT.html">VNC:OVERFLOW:CLIENT-INIT</a></b></td>
   <td width="500" valign="top">
    VNC: Client Init Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ANAME.html">VNC:OVERFLOW:NAME</a></b></td>
   <td width="500" valign="top">
    VNC: Name Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3AREALVNC-MSG-BO.html">VNC:OVERFLOW:REALVNC-MSG-BO</a></b></td>
   <td width="500" valign="top">
    VNC: RealVNC VNC Server ClientCutText Message Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3AREASON.html">VNC:OVERFLOW:REASON</a></b></td>
   <td width="500" valign="top">
    VNC: Reason Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ARSN-TOO-LONG.html">VNC:OVERFLOW:RSN-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    VNC: Reason Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ASER-WRT-SCALNG-RCE.html">VNC:OVERFLOW:SER-WRT-SCALNG-RCE</a></b></td>
   <td width="500" valign="top">
    VNC: LibVNCServer Scaling Use After Free
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ASET-ENCODINGS.html">VNC:OVERFLOW:SET-ENCODINGS</a></b></td>
   <td width="500" valign="top">
    VNC: Set Encodings Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AQEMU-KVM-DOS.html">VNC:QEMU-KVM-DOS</a></b></td>
   <td width="500" valign="top">
    VNC: Qemu/KVM VNC Server Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3ASESSION.html">VNC:SESSION</a></b></td>
   <td width="500" valign="top">
    VNC: Session
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AULTRA-CLIENT-OF.html">VNC:ULTRA-CLIENT-OF</a></b></td>
   <td width="500" valign="top">
    VNC: UltraVNC VNCViewer &#39;ClientConnection.cpp&#39; Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VNC%3AULTRAVNC-CLIENT-AUTH-OF.html">VNC:ULTRAVNC-CLIENT-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    VNC: UltraVNC Client Authentication Overflow
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="VOIP"></a>VOIP</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AAPPLE-FACETIME-REQ.html">VOIP:APPLE-FACETIME-REQ</a></b></td>
   <td width="500" valign="top">
    VOIP: Apple FaceTime Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AASTERISK-CS-OVERFLOW.html">VOIP:ASTERISK-CS-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    VOIP: Asterisk Chan_Skinny Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AASTERISK-IAX2-DOS.html">VOIP:ASTERISK-IAX2-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk Multiple Products IAX2 Handshake Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ACISCO-UCM-OF.html">VOIP:CISCO-UCM-OF</a></b></td>
   <td width="500" valign="top">
    VOIP: Cisco Unified Communications Manager CTL Provider Heap Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ADIGIUM-ASTERISK-SECBYPASS.html">VOIP:DIGIUM-ASTERISK-SECBYPASS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk NULL Certificate Security Bypass
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3AAUDIT%3AUNKN-MESSAGE.html">VOIP:H225RAS:AUDIT:UNKN-MESSAGE</a></b></td>
   <td width="500" valign="top">
    H225RAS: Unknown Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3ADOS%3AARQ.html">VOIP:H225RAS:DOS:ARQ</a></b></td>
   <td width="500" valign="top">
    H225RAS: Too Many ARQ Messages
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3ADOS%3ALRQ.html">VOIP:H225RAS:DOS:LRQ</a></b></td>
   <td width="500" valign="top">
    H225RAS: Too Many LRQ Messages
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3ADOS%3ARRQ.html">VOIP:H225RAS:DOS:RRQ</a></b></td>
   <td width="500" valign="top">
    H225RAS: Too Many RRQ Messages
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3AREG-BAD-ID-CHAR.html">VOIP:H225RAS:REG-BAD-ID-CHAR</a></b></td>
   <td width="500" valign="top">
    H225RAS: Invalid Endpoint Identifier Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225RAS%3AURQ-DOS.html">VOIP:H225RAS:URQ-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: TANDBERG MXP URQ Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225SGN%3APROTO.html">VOIP:H225SGN:PROTO</a></b></td>
   <td width="500" valign="top">
    H225SGN: Protocol Implementation Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225SGN%3ARELEASE-COMPLETE.html">VOIP:H225SGN:RELEASE-COMPLETE</a></b></td>
   <td width="500" valign="top">
    H225SGN: Release Complete Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225SGN%3ASETUP.html">VOIP:H225SGN:SETUP</a></b></td>
   <td width="500" valign="top">
    H225SGN: SETUP Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225SGN%3ASETUP-NOGRANT-PORT.html">VOIP:H225SGN:SETUP-NOGRANT-PORT</a></b></td>
   <td width="500" valign="top">
    H225SGN: Not Granted Setup Destination Port
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AH225SGN%3ASETUP-NOTGRANT-IP.html">VOIP:H225SGN:SETUP-NOTGRANT-IP</a></b></td>
   <td width="500" valign="top">
    H225SGN: Not Granted Setup Destination IP
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AIAX-INT-OF.html">VOIP:IAX-INT-OF</a></b></td>
   <td width="500" valign="top">
    APP: IAXclient Truncated Frames
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-CALL-ID.html">VOIP:MGCP:AUDIT:INV-CALL-ID</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Call ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-CMD-HDR.html">VOIP:MGCP:AUDIT:INV-CMD-HDR</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Command Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-CONN-ID.html">VOIP:MGCP:AUDIT:INV-CONN-ID</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Connection ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-EP-NAME.html">VOIP:MGCP:AUDIT:INV-EP-NAME</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Endpoint Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-IP-DOMAIN.html">VOIP:MGCP:AUDIT:INV-IP-DOMAIN</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Domain Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-PARM-NAME.html">VOIP:MGCP:AUDIT:INV-PARM-NAME</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Parameter Name
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-PARM-RD.html">VOIP:MGCP:AUDIT:INV-PARM-RD</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Restart Delay Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-PARM-RM.html">VOIP:MGCP:AUDIT:INV-PARM-RM</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Restart Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-RSP-HDR.html">VOIP:MGCP:AUDIT:INV-RSP-HDR</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Response Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AINV-TRANS-ID.html">VOIP:MGCP:AUDIT:INV-TRANS-ID</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid Transaction ID
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AAUDIT%3AUNKNOWN-METHOD.html">VOIP:MGCP:AUDIT:UNKNOWN-METHOD</a></b></td>
   <td width="500" valign="top">
    MGCP: Unknown Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ADOUBLE-ENCODING.html">VOIP:MGCP:DOUBLE-ENCODING</a></b></td>
   <td width="500" valign="top">
    MGCP: Double-Encoded Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AINV-CHAR-HIGH.html">VOIP:MGCP:INV-CHAR-HIGH</a></b></td>
   <td width="500" valign="top">
    MGCP: Wrong Character (Above ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AINV-CHAR-LOW.html">VOIP:MGCP:INV-CHAR-LOW</a></b></td>
   <td width="500" valign="top">
    MGCP: Wrong Character (Below ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AINVALID-HEX-HIGH.html">VOIP:MGCP:INVALID-HEX-HIGH</a></b></td>
   <td width="500" valign="top">
    MGCP: Bad Hex-Coded Character (Above ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AINVALID-HEX-LOW.html">VOIP:MGCP:INVALID-HEX-LOW</a></b></td>
   <td width="500" valign="top">
    MGCP: Bad Hex-Coded Character (Below ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ALINE-OVERFLOW.html">VOIP:MGCP:LINE-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    MGCP: Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AOVERLONG-UTF8.html">VOIP:MGCP:OVERLONG-UTF8</a></b></td>
   <td width="500" valign="top">
    MGCP: Too Long UTF8 Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AHEADER-ORD-ERR.html">VOIP:MGCP:SDP:HEADER-ORD-ERR</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Headers Order Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AHEADER-RPT-ERR.html">VOIP:MGCP:SDP:HEADER-RPT-ERR</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Header Repetition Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AHEADER-UNK-ERR.html">VOIP:MGCP:SDP:HEADER-UNK-ERR</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Unknown Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AINV-CI.html">VOIP:MGCP:SDP:INV-CI</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid SDP Connection Information Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AINV-ORIGIN.html">VOIP:MGCP:SDP:INV-ORIGIN</a></b></td>
   <td width="500" valign="top">
    MGCP: Invalid SDP Origin Information Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AMAL-HEADER.html">VOIP:MGCP:SDP:MAL-HEADER</a></b></td>
   <td width="500" valign="top">
    MGCP: Malformed SDP Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AMEDIA-PORT-OF.html">VOIP:MGCP:SDP:MEDIA-PORT-OF</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Media Port Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3ASYNTAX-ERROR.html">VOIP:MGCP:SDP:SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Syntax Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3ATIME-OF.html">VOIP:MGCP:SDP:TIME-OF</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Time Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3ASDP%3AVERSION-OF.html">VOIP:MGCP:SDP:VERSION-OF</a></b></td>
   <td width="500" valign="top">
    MGCP: SDP Version Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGCP%3AUTF8-ERROR.html">VOIP:MGCP:UTF8-ERROR</a></b></td>
   <td width="500" valign="top">
    MGCP: UTF-8 Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGMT%3AVICIDIAL-INFO-DISC.html">VOIP:MGMT:VICIDIAL-INFO-DISC</a></b></td>
   <td width="500" valign="top">
    VOIP: Vicidial Open Source Call Center Suite Information Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3AMGMT%3AXPRESSA-HTTP-DOS.html">VOIP:MGMT:XPRESSA-HTTP-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Pingtel Xpressa Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ARTP%3AFLOW-START.html">VOIP:RTP:FLOW-START</a></b></td>
   <td width="500" valign="top">
    RTP-Audio: Flow Start
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ARTP%3AFLOW-START-VIDEO.html">VOIP:RTP:FLOW-START-VIDEO</a></b></td>
   <td width="500" valign="top">
    RTP-Video: Flow Start
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ARTP%3AIAXFLOOD-DOS.html">VOIP:RTP:IAXFLOOD-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Iaxflood Denial Of Service Attack Tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ARTP%3ARTPFLOOD-DOS.html">VOIP:RTP:RTPFLOOD-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Backtrack VOIP Rtpflood Denial Of Service Tool 
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-CHANNEL-DOS.html">VOIP:SIP:ASTERISK-CHANNEL-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Channel Driver Denial Of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-RES-DOS.html">VOIP:SIP:ASTERISK-RES-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Invalid Response Code Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-RTP-TYPE.html">VOIP:SIP:ASTERISK-RTP-TYPE</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk Invalid RTP Payload Type Number Memory Corruption
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-SDP-MEDIA-DOS.html">VOIP:SIP:ASTERISK-SDP-MEDIA-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Invalid SDP Media Descriptions Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-UDPTL-BO.html">VOIP:SIP:ASTERISK-UDPTL-BO</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk UDPTL Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ABAD-IPV4.html">VOIP:SIP:AUDIT:BAD-IPV4</a></b></td>
   <td width="500" valign="top">
    SIP: Malformed IPv4 Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ABAD-IPV6.html">VOIP:SIP:AUDIT:BAD-IPV6</a></b></td>
   <td width="500" valign="top">
    SIP: Malformed IPv6 Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ACONTENT-LENGTH.html">VOIP:SIP:AUDIT:CONTENT-LENGTH</a></b></td>
   <td width="500" valign="top">
    SIP: Wrong Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ADUPLICATE-HEADER.html">VOIP:SIP:AUDIT:DUPLICATE-HEADER</a></b></td>
   <td width="500" valign="top">
    SIP: Duplicate Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ADUPLICATE-INVITE.html">VOIP:SIP:AUDIT:DUPLICATE-INVITE</a></b></td>
   <td width="500" valign="top">
    SIP: Duplicate INVITE
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AEMPTY-HEADER-VAL.html">VOIP:SIP:AUDIT:EMPTY-HEADER-VAL</a></b></td>
   <td width="500" valign="top">
    SIP: Empty Header Field
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CALL-ID.html">VOIP:SIP:AUDIT:INV-CALL-ID</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Call ID Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CHAR-HIGH.html">VOIP:SIP:AUDIT:INV-CHAR-HIGH</a></b></td>
   <td width="500" valign="top">
    SIP: Wrong Character (Above ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CHAR-LOW.html">VOIP:SIP:AUDIT:INV-CHAR-LOW</a></b></td>
   <td width="500" valign="top">
    SIP: Wrong Character (Below ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CHARACTER.html">VOIP:SIP:AUDIT:INV-CHARACTER</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CONT-TYPE.html">VOIP:SIP:AUDIT:INV-CONT-TYPE</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Character in Content Type
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CONTACT.html">VOIP:SIP:AUDIT:INV-CONTACT</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Contact Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-CSEQ.html">VOIP:SIP:AUDIT:INV-CSEQ</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Call Sequence Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-FROM.html">VOIP:SIP:AUDIT:INV-FROM</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid From Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-INVITE-SRC.html">VOIP:SIP:AUDIT:INV-INVITE-SRC</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid INVITE Source Address
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-PARA-VIA.html">VOIP:SIP:AUDIT:INV-PARA-VIA</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Parameter in VIA
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-REP-HEADER.html">VOIP:SIP:AUDIT:INV-REP-HEADER</a></b></td>
   <td width="500" valign="top">
    SIP: Unexpected Response Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-REQ-HEADER.html">VOIP:SIP:AUDIT:INV-REQ-HEADER</a></b></td>
   <td width="500" valign="top">
    SIP: Unexpected Request Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-TERMINATION.html">VOIP:SIP:AUDIT:INV-TERMINATION</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Line Termination
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-URI.html">VOIP:SIP:AUDIT:INV-URI</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Universal Resource Identifier
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINV-VIA-PROT-ID.html">VOIP:SIP:AUDIT:INV-VIA-PROT-ID</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Via Protocol Identifier
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINVALID-HEX-HIGH.html">VOIP:SIP:AUDIT:INVALID-HEX-HIGH</a></b></td>
   <td width="500" valign="top">
    SIP: Bad Hex-Coded Character (Above ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINVALID-HEX-LOW.html">VOIP:SIP:AUDIT:INVALID-HEX-LOW</a></b></td>
   <td width="500" valign="top">
    SIP: Bad Hex-Coded Character (Below ASCII Printable Range)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AINVALID-RCODE.html">VOIP:SIP:AUDIT:INVALID-RCODE</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid Response Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AMISSING-VERSION.html">VOIP:SIP:AUDIT:MISSING-VERSION</a></b></td>
   <td width="500" valign="top">
    SIP: Bad or Missing Version
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ANO-COLON.html">VOIP:SIP:AUDIT:NO-COLON</a></b></td>
   <td width="500" valign="top">
    SIP: Missing Colon Character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ANOT-SIP.html">VOIP:SIP:AUDIT:NOT-SIP</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid SIP Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ASESSION-HIJACK.html">VOIP:SIP:AUDIT:SESSION-HIJACK</a></b></td>
   <td width="500" valign="top">
    SIP: Session Hijacking
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ASYNTAX-ERROR.html">VOIP:SIP:AUDIT:SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    SIP: Syntax Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3ATELEPRESENCE.html">VOIP:SIP:AUDIT:TELEPRESENCE</a></b></td>
   <td width="500" valign="top">
    SIP: Cisco TelePresence Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AUNK-HEADER.html">VOIP:SIP:AUDIT:UNK-HEADER</a></b></td>
   <td width="500" valign="top">
    SIP: Unknown Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AUNK-METHOD.html">VOIP:SIP:AUDIT:UNK-METHOD</a></b></td>
   <td width="500" valign="top">
    SIP: Unknown Request Method
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AURI-ERROR.html">VOIP:SIP:AUDIT:URI-ERROR</a></b></td>
   <td width="500" valign="top">
    SIP: URI Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AAUDIT%3AUTF8-ERROR.html">VOIP:SIP:AUDIT:UTF8-ERROR</a></b></td>
   <td width="500" valign="top">
    SIP: UTF-8 Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABIN-IN-AUTH-RESP.html">VOIP:SIP:BIN-IN-AUTH-RESP</a></b></td>
   <td width="500" valign="top">
    SIP: Binary in Authorization Response Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABRUTE-FORCE.html">VOIP:SIP:BRUTE-FORCE</a></b></td>
   <td width="500" valign="top">
    SIP: Brute Force Login
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABRUTE-INV.html">VOIP:SIP:BRUTE-INV</a></b></td>
   <td width="500" valign="top">
    SIP: Brute Force Invite
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-ENUMIAX.html">VOIP:SIP:BT-RECON-ENUMIAX</a></b></td>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Enumiax
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SIPSCAN.html">VOIP:SIP:BT-RECON-SIPSCAN</a></b></td>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Sip-scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SMAP.html">VOIP:SIP:BT-RECON-SMAP</a></b></td>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Smap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SVMAP.html">VOIP:SIP:BT-RECON-SVMAP</a></b></td>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Svmap
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ABYE-AUTH.html">VOIP:SIP:BYE-AUTH</a></b></td>
   <td width="500" valign="top">
    SIP: BYE-AUTH Hash Disclosure
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ACISCO-PHNE-MSG-SEQ-DOS.html">VOIP:SIP:CISCO-PHNE-MSG-SEQ-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Cisco IP Phone Message Sequence Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ACSCO-INVITE-DOS.html">VOIP:SIP:CSCO-INVITE-DOS</a></b></td>
   <td width="500" valign="top">
    SIP: Cisco 7940/7960 Phone SIP Invite Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ADIGIUM-ASTERISK-DOS.html">VOIP:SIP:DIGIUM-ASTERISK-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Terminated Channel ACK with SDP Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ADOUBLE-ENCODING.html">VOIP:SIP:DOUBLE-ENCODING</a></b></td>
   <td width="500" valign="top">
    SIP: Double-Encoded Parameter
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AEMERGENCY-NUMBER.html">VOIP:SIP:EMERGENCY-NUMBER</a></b></td>
   <td width="500" valign="top">
    SIP: Emergency Number Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AEMERGENCY-PRIORITY.html">VOIP:SIP:EMERGENCY-PRIORITY</a></b></td>
   <td width="500" valign="top">
    SIP: Emergency Priority Call
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AFMT-STR.html">VOIP:SIP:FMT-STR</a></b></td>
   <td width="500" valign="top">
    SIP: Header Format String
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AGS-EAVESDROP.html">VOIP:SIP:GS-EAVESDROP</a></b></td>
   <td width="500" valign="top">
    VOIP: Grandstream SIP Phone eavesdrop
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AHAMMER.html">VOIP:SIP:HAMMER</a></b></td>
   <td width="500" valign="top">
    SIP: Hammer Attack
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AHEADER-UFLOW.html">VOIP:SIP:HEADER-UFLOW</a></b></td>
   <td width="500" valign="top">
    SIP: Header Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AINVITE-MSG-DOS.html">VOIP:SIP:INVITE-MSG-DOS</a></b></td>
   <td width="500" valign="top">
    HTTP: Microsoft Communicator SIP INVITE Message Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AINVITEFLOOD-DOS.html">VOIP:SIP:INVITEFLOOD-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Backtrack Tool Inviteflood SIP Denial Of Service Tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AKEEP-ALIVE.html">VOIP:SIP:KEEP-ALIVE</a></b></td>
   <td width="500" valign="top">
    SIP: Keep Alive Packet
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AKEEP-ALIVE-2.html">VOIP:SIP:KEEP-ALIVE-2</a></b></td>
   <td width="500" valign="top">
    SIP: Keep Alive Packet (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AKEEP-ALIVE-3.html">VOIP:SIP:KEEP-ALIVE-3</a></b></td>
   <td width="500" valign="top">
    SIP: Keep Alive Packet (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AACC-CONTACT-OF.html">VOIP:SIP:LIMITS:ACC-CONTACT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ACCEPT-CONTACT Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AACC-ENC-OF.html">VOIP:SIP:LIMITS:ACC-ENC-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ACCEPT-ENCODING Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AACC-LAN-OF.html">VOIP:SIP:LIMITS:ACC-LAN-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ACCEPT-LANGUAGE Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AACC-OF.html">VOIP:SIP:LIMITS:ACC-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ACCEPT Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AALLOW-OF.html">VOIP:SIP:LIMITS:ALLOW-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ALLOW Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AAUTH-INFO-OF.html">VOIP:SIP:LIMITS:AUTH-INFO-OF</a></b></td>
   <td width="500" valign="top">
    SIP: AUTHENTICATION-INFO Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AAUTHORIZ-OF.html">VOIP:SIP:LIMITS:AUTHORIZ-OF</a></b></td>
   <td width="500" valign="top">
    SIP: AUTHORIZATION Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACALL-ID-OF.html">VOIP:SIP:LIMITS:CALL-ID-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CALL-ID Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACALL-INFO-OF.html">VOIP:SIP:LIMITS:CALL-INFO-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CALL-INFO Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACONT-ENC-OF.html">VOIP:SIP:LIMITS:CONT-ENC-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CONTENT-ENCODING Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACONTACT-OF.html">VOIP:SIP:LIMITS:CONTACT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CONTACT Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACONTENT-LEN-OF.html">VOIP:SIP:LIMITS:CONTENT-LEN-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CONTENT-LENGTH Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACONTENT-TYPE-OF.html">VOIP:SIP:LIMITS:CONTENT-TYPE-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Content-Type Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ACSEQ-OF.html">VOIP:SIP:LIMITS:CSEQ-OF</a></b></td>
   <td width="500" valign="top">
    SIP: CSEQ Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AEXPIRES-OF.html">VOIP:SIP:LIMITS:EXPIRES-OF</a></b></td>
   <td width="500" valign="top">
    SIP: EXPIRES Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AFROM-OF.html">VOIP:SIP:LIMITS:FROM-OF</a></b></td>
   <td width="500" valign="top">
    SIP: FROM Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AIN-REPLY-TO-OF.html">VOIP:SIP:LIMITS:IN-REPLY-TO-OF</a></b></td>
   <td width="500" valign="top">
    SIP: IN-REPLY-TO Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AMAX-FWRDS-OF.html">VOIP:SIP:LIMITS:MAX-FWRDS-OF</a></b></td>
   <td width="500" valign="top">
    SIP: MAX-FORWARDS Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AMIN-EXPIRES-OF.html">VOIP:SIP:LIMITS:MIN-EXPIRES-OF</a></b></td>
   <td width="500" valign="top">
    SIP: MIN-EXPIRES Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AORGANIZATION-OF.html">VOIP:SIP:LIMITS:ORGANIZATION-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ORGANIZATION Header Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3APRIORITY-OF.html">VOIP:SIP:LIMITS:PRIORITY-OF</a></b></td>
   <td width="500" valign="top">
    SIP: PRIORITY Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3APROX-AUTH-OF.html">VOIP:SIP:LIMITS:PROX-AUTH-OF</a></b></td>
   <td width="500" valign="top">
    SIP: PROXY-AUTHENTICATE Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3APROX-AUTHRIZ-OF.html">VOIP:SIP:LIMITS:PROX-AUTHRIZ-OF</a></b></td>
   <td width="500" valign="top">
    SIP: PROXY-AUTHORIZATION Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3APROX-REQ-OF.html">VOIP:SIP:LIMITS:PROX-REQ-OF</a></b></td>
   <td width="500" valign="top">
    SIP: PROXY-REQUIRE Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AREC-ROUTE-OF.html">VOIP:SIP:LIMITS:REC-ROUTE-OF</a></b></td>
   <td width="500" valign="top">
    SIP: RECORD-ROUTE Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AREJ-CONTACT-OF.html">VOIP:SIP:LIMITS:REJ-CONTACT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: REJECT-CONTACT Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AREQ-DISPO-OF.html">VOIP:SIP:LIMITS:REQ-DISPO-OF</a></b></td>
   <td width="500" valign="top">
    SIP: REQUEST-DISPOSITION Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ARETRY-AFTER-OF.html">VOIP:SIP:LIMITS:RETRY-AFTER-OF</a></b></td>
   <td width="500" valign="top">
    SIP: RETRY-AFTER Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3AROUTE-OF.html">VOIP:SIP:LIMITS:ROUTE-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ROUTE Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ALIMITS%3ASIP-NEG-CNT-LEN.html">VOIP:SIP:LIMITS:SIP-NEG-CNT-LEN</a></b></td>
   <td width="500" valign="top">
    VOIP: SIP Negative Content Length
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AMALFORMED-PORT.html">VOIP:SIP:MALFORMED-PORT</a></b></td>
   <td width="500" valign="top">
    SIP: Malformed Port Number
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AMULTI-TECH-INVITE-OF.html">VOIP:SIP:MULTI-TECH-INVITE-OF</a></b></td>
   <td width="500" valign="top">
    SIP: MultiTech VoIP Gateway Invite Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3ACHUNK-OF.html">VOIP:SIP:OVERFLOW:CHUNK-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Chunk Length Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AFROM-OF.html">VOIP:SIP:OVERFLOW:FROM-OF</a></b></td>
   <td width="500" valign="top">
    SIP: From Field Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AHDR-EXP-OF.html">VOIP:SIP:OVERFLOW:HDR-EXP-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Header Expire Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AHDR-URI-OF.html">VOIP:SIP:OVERFLOW:HDR-URI-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Header Value URI Type Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AHEADER-OF.html">VOIP:SIP:OVERFLOW:HEADER-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3ALINE-OF.html">VOIP:SIP:OVERFLOW:LINE-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Line length exceeded
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3ALINE-OVERFLOW.html">VOIP:SIP:OVERFLOW:LINE-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    SIP: Line Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AMAX-FORWARD.html">VOIP:SIP:OVERFLOW:MAX-FORWARD</a></b></td>
   <td width="500" valign="top">
    SIP: Max-Forwards Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AMETHOD.html">VOIP:SIP:OVERFLOW:METHOD</a></b></td>
   <td width="500" valign="top">
    SIP: Method Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AOVERLONG-UTF8.html">VOIP:SIP:OVERFLOW:OVERLONG-UTF8</a></b></td>
   <td width="500" valign="top">
    SIP: Too Long UTF8 Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3APORT-OF.html">VOIP:SIP:OVERFLOW:PORT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Port Number Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AQPOP-OF.html">VOIP:SIP:OVERFLOW:QPOP-OF</a></b></td>
   <td width="500" valign="top">
    SIP: WWW-Authenticate Header &quot;qop&quot; Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3ASECURITY-PAR.html">VOIP:SIP:OVERFLOW:SECURITY-PAR</a></b></td>
   <td width="500" valign="top">
    SIP: Security Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3ASIPXTAPI-OF.html">VOIP:SIP:OVERFLOW:SIPXTAPI-OF</a></b></td>
   <td width="500" valign="top">
    SIP: SIP Foundry sipXtapi Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AT-38-SDP-OF.html">VOIP:SIP:OVERFLOW:T-38-SDP-OF</a></b></td>
   <td width="500" valign="top">
    VOIP: SIP T.38 SDP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AUSERNAME.html">VOIP:SIP:OVERFLOW:USERNAME</a></b></td>
   <td width="500" valign="top">
    SIP: Username Is Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERFLOW%3AVIA-HOST-OF.html">VOIP:SIP:OVERFLOW:VIA-HOST-OF</a></b></td>
   <td width="500" valign="top">
    SIP: Via Header HostName Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AOVERSIZED-UDP-MSG.html">VOIP:SIP:OVERSIZED-UDP-MSG</a></b></td>
   <td width="500" valign="top">
    SIP: Oversized UDP Message
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ARESPR-INV-OPT-OF.html">VOIP:SIP:RESPR-INV-OPT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: ReSIProcate VoIP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AHDR-BOF.html">VOIP:SIP:SDP:HDR-BOF</a></b></td>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP SDP Header Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AHEADER-ORD-ERR.html">VOIP:SIP:SDP:HEADER-ORD-ERR</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Headers Order Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AHEADER-RPT-ERR.html">VOIP:SIP:SDP:HEADER-RPT-ERR</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Header Repetition Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AHEADER-UNK-ERR.html">VOIP:SIP:SDP:HEADER-UNK-ERR</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Unknown Header
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AINV-CI.html">VOIP:SIP:SDP:INV-CI</a></b></td>
   <td width="500" valign="top">
    SIP: Invalid SDP Connection Information Value
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AMAL-HEADER-CLT.html">VOIP:SIP:SDP:MAL-HEADER-CLT</a></b></td>
   <td width="500" valign="top">
    SIP: Malformed SDP Header (Client)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AMAL-HEADER-STC.html">VOIP:SIP:SDP:MAL-HEADER-STC</a></b></td>
   <td width="500" valign="top">
    SIP: Malformed SDP Header (STC)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AMEDIA-PORT-OF.html">VOIP:SIP:SDP:MEDIA-PORT-OF</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Media Port Header Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3ASYNTAX-ERROR.html">VOIP:SIP:SDP:SYNTAX-ERROR</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Syntax Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3ATIME-OF.html">VOIP:SIP:SDP:TIME-OF</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Time Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AVERSION-OF.html">VOIP:SIP:SDP:VERSION-OF</a></b></td>
   <td width="500" valign="top">
    SIP: SDP Version Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASECURITY-BAD-SCHEMA.html">VOIP:SIP:SECURITY-BAD-SCHEMA</a></b></td>
   <td width="500" valign="top">
    SIP: Bad Security Schema
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASECURITY-PAR-ERR.html">VOIP:SIP:SECURITY-PAR-ERR</a></b></td>
   <td width="500" valign="top">
    SIP: Security Parameter Error
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASECURITY-PAR-UFLOW.html">VOIP:SIP:SECURITY-PAR-UFLOW</a></b></td>
   <td width="500" valign="top">
    SIP: Security Parameter Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASESSION-REQ.html">VOIP:SIP:SESSION-REQ</a></b></td>
   <td width="500" valign="top">
    SIP: Session Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASHORT-REQUEST.html">VOIP:SIP:SHORT-REQUEST</a></b></td>
   <td width="500" valign="top">
    SIP: Request Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASHORT-RESPONSE.html">VOIP:SIP:SHORT-RESPONSE</a></b></td>
   <td width="500" valign="top">
    SIP: Response Underflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASIPSAK-OPTION-FLOOD.html">VOIP:SIP:SIPSAK-OPTION-FLOOD</a></b></td>
   <td width="500" valign="top">
    VOIP: SIPSAK SIP Option Flood
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASQL-CMD-1.html">VOIP:SIP:SQL-CMD-1</a></b></td>
   <td width="500" valign="top">
    SIP: SQL Command Chain in SIP Request (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASQL-CMD-2.html">VOIP:SIP:SQL-CMD-2</a></b></td>
   <td width="500" valign="top">
    SIP: SQL Command Chain in SIP Request (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASQL-INJ.html">VOIP:SIP:SQL-INJ</a></b></td>
   <td width="500" valign="top">
    SIP: SQL Injection in SIP Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASRV-RESP-400.html">VOIP:SIP:SRV-RESP-400</a></b></td>
   <td width="500" valign="top">
    SIP: Server Response - Bad Request (400)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ASRV-RESP-401.html">VOIP:SIP:SRV-RESP-401</a></b></td>
   <td width="500" valign="top">
    SIP: Server Response - Unauthorized (401)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3ATEARDOWN-BYE-DOS.html">VOIP:SIP:TEARDOWN-BYE-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Teardown VOIP Denial Service Tool
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AUNK-SRV-RESP.html">VOIP:SIP:UNK-SRV-RESP</a></b></td>
   <td width="500" valign="top">
    SIP: Unknown Server Response Code
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AUNKNOWN-DATA.html">VOIP:SIP:UNKNOWN-DATA</a></b></td>
   <td width="500" valign="top">
    SIP: Unknown Data
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASIP%3AWENGO-PHONE-DOS.html">VOIP:SIP:WENGO-PHONE-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP:  WengoPhone Product Soft Phone Remote Deinal of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKINNY-DRV-DOS.html">VOIP:SKINNY-DRV-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Asterisk Skinny Channel Driver Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3ACONNECTION.html">VOIP:SKYPE:CONNECTION</a></b></td>
   <td width="500" valign="top">
    VOIP: Skype Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3AINSTALL.html">VOIP:SKYPE:INSTALL</a></b></td>
   <td width="500" valign="top">
    P2P: New Skype Client Installed
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3ALOGIN.html">VOIP:SKYPE:LOGIN</a></b></td>
   <td width="500" valign="top">
    SKYPE: Login Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3APROBE-1.html">VOIP:SKYPE:PROBE-1</a></b></td>
   <td width="500" valign="top">
    SKYPE: UDP Probe (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3ASKYPE-ENCRYPTED.html">VOIP:SKYPE:SKYPE-ENCRYPTED</a></b></td>
   <td width="500" valign="top">
    Encrypted Traffic: Skype (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASKYPE%3AVERSION-CHECK.html">VOIP:SKYPE:VERSION-CHECK</a></b></td>
   <td width="500" valign="top">
    SKYPE: Client Version Check
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="VOIP%3ASMPP%3ANOKIA-SMS-MMS-DOS.html">VOIP:SMPP:NOKIA-SMS-MMS-DOS</a></b></td>
   <td width="500" valign="top">
    VOIP: Nokia SMS/MMS Denial of Service (SMPP)
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="WHOIS"></a>WHOIS</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WHOIS%3AINVALID_EOL.html">WHOIS:INVALID_EOL</a></b></td>
   <td width="500" valign="top">
    WHOIS: Invalid EOL character
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WHOIS%3AREQUEST-TOO-LONG.html">WHOIS:REQUEST-TOO-LONG</a></b></td>
   <td width="500" valign="top">
    WHOIS: Request Too Long
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WHOIS%3ATUNNEL.html">WHOIS:TUNNEL</a></b></td>
   <td width="500" valign="top">
    WHOIS: Data Tunneling
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WHOIS%3AUNEXPECTED-REPLY.html">WHOIS:UNEXPECTED-REPLY</a></b></td>
   <td width="500" valign="top">
    WHOIS: Unexpected Reply
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="WORM"></a>WORM</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AAGOBOT%3APY-HTTP-PROP.html">WORM:AGOBOT:PY-HTTP-PROP</a></b></td>
   <td width="500" valign="top">
    WORM: Agobot.PY HTTP Propagation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AAGOBOT%3ASASSER-FTP-OF.html">WORM:AGOBOT:SASSER-FTP-OF</a></b></td>
   <td width="500" valign="top">
    WORM: Agobot Sasser FTP Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AAKAK-TRAFFIC.html">WORM:AKAK-TRAFFIC</a></b></td>
   <td width="500" valign="top">
    WORM: Akak Backdoor Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABAGLE%3AAF-HTTP.html">WORM:BAGLE:AF-HTTP</a></b></td>
   <td width="500" valign="top">
    WORM: Bagle.AF HTTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABAGLE%3AHTTP-BACKDOOR.html">WORM:BAGLE:HTTP-BACKDOOR</a></b></td>
   <td width="500" valign="top">
    WORM: HTTP Bagle Backdoor
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABAGLE%3AQ-HTTP.html">WORM:BAGLE:Q-HTTP</a></b></td>
   <td width="500" valign="top">
    WORM: Bagle.Q HTTP Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABERBEW%3AKEYLOGGER-UPLOAD.html">WORM:BERBEW:KEYLOGGER-UPLOAD</a></b></td>
   <td width="500" valign="top">
    WORM: Berbew Keylogger Upload
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABLACKHOLE-ACTIVITY.html">WORM:BLACKHOLE-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    WORM: Blackhole Malware Toolkit Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ABLASTER%3ABACKDOOR-CMD.html">WORM:BLASTER:BACKDOOR-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: MS-Blast Backdoor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACHOD.B.html">WORM:CHOD.B</a></b></td>
   <td width="500" valign="top">
    WORM: MSN Chod.B
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACHUNKED-WORM.html">WORM:CHUNKED-WORM</a></b></td>
   <td width="500" valign="top">
    WORM: Apache &quot;Transfer-Encoding: chunked&quot; Worm Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACODERED-2%3AINFECT-ATTEMPT.html">WORM:CODERED-2:INFECT-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: CodeRed v2 Worm Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACODERED%3AINFECTION-ATTEMPT.html">WORM:CODERED:INFECTION-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: Code-Red Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACOMMWARRIORB.html">WORM:COMMWARRIORB</a></b></td>
   <td width="500" valign="top">
    WORM: Commwarrior.b!sis
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACONFICKER%3AC-ACTIVITY.html">WORM:CONFICKER:C-ACTIVITY</a></b></td>
   <td width="500" valign="top">
    WORM: Conficker.C Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACONFICKER%3AC-ACTIVITY-2.html">WORM:CONFICKER:C-ACTIVITY-2</a></b></td>
   <td width="500" valign="top">
    WORM: Conficker.C Activity (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACRYPTO-RANSOM-CNC2.html">WORM:CRYPTO-RANSOM-CNC2</a></b></td>
   <td width="500" valign="top">
    WORM: Cryptolocker Ransomware Download Attempt 2
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACRYPTO-RANSOM-CNC3.html">WORM:CRYPTO-RANSOM-CNC3</a></b></td>
   <td width="500" valign="top">
    WORM: Cryptolocker Ransomware Download Attempt 3
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ACRYPTOLOCKER-RACKETEER.html">WORM:CRYPTOLOCKER-RACKETEER</a></b></td>
   <td width="500" valign="top">
    WORM: Cryptolocker 2.0 Racketeer Ransomware Download
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADABBER%3AB-BACKDOOR-CMD.html">WORM:DABBER:B-BACKDOOR-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: Dabber.B Backdoor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADABBER%3ASASSER-PROBE.html">WORM:DABBER:SASSER-PROBE</a></b></td>
   <td width="500" valign="top">
    WORM: Dabber Sasser Probe
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADABBER%3ATFTP-TRANSFER.html">WORM:DABBER:TFTP-TRANSFER</a></b></td>
   <td width="500" valign="top">
    WORM: Dabber TFTP File Transfer
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADISTTRACK-CNC.html">WORM:DISTTRACK-CNC</a></b></td>
   <td width="500" valign="top">
    WORM: DistTrack Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADISTTRACK-PROPAGATION.html">WORM:DISTTRACK-PROPAGATION</a></b></td>
   <td width="500" valign="top">
    WORM: DistTrack Propagation Execution of Dropped File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ADISTTRACK-USER-AGENT.html">WORM:DISTTRACK-USER-AGENT</a></b></td>
   <td width="500" valign="top">
    WORM: DistTrack Malware Known Malicious User Agent
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AEMAIL%3ASOBIG-DL-REQUEST.html">WORM:EMAIL:SOBIG-DL-REQUEST</a></b></td>
   <td width="500" valign="top">
    WORM: W32.Sobig.E Worm External Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AFIZZER%3AIRC-CHAN-1.html">WORM:FIZZER:IRC-CHAN-1</a></b></td>
   <td width="500" valign="top">
    WORM: Fizzer IRC BackDoor Infection (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AFIZZER%3AIRC-CHAN-2.html">WORM:FIZZER:IRC-CHAN-2</a></b></td>
   <td width="500" valign="top">
    WORM: Fizzer IRC BackDoor Infection (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ALOVEGATE-INFECTED.html">WORM:LOVEGATE-INFECTED</a></b></td>
   <td width="500" valign="top">
    WORM: Lovegate Infected Host
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ALOVGATE%3ABACKDOOR-LOGIN.html">WORM:LOVGATE:BACKDOOR-LOGIN</a></b></td>
   <td width="500" valign="top">
    WORM: Lovgate Backdoor Login Detected
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ALOVGATE%3AP-NET-SHARE-SPREAD.html">WORM:LOVGATE:P-NET-SHARE-SPREAD</a></b></td>
   <td width="500" valign="top">
    WORM: Lovgate.P File Propagation Over SMB/CIFS
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMARE-D-SCAN.html">WORM:MARE-D-SCAN</a></b></td>
   <td width="500" valign="top">
    WORM: Mare.D Scan
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMASLAN%3AIRC-BACKDOOR-CON.html">WORM:MASLAN:IRC-BACKDOOR-CON</a></b></td>
   <td width="500" valign="top">
    WORM: Maslan IRC Backdoor Connection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMIMAIL%3AMIMAIL.A.html">WORM:MIMAIL:MIMAIL.A</a></b></td>
   <td width="500" valign="top">
    WORM: Mimail.A Attachment
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMINIFLAME-CNC.html">WORM:MINIFLAME-CNC</a></b></td>
   <td width="500" valign="top">
    WORM: Miniflame Command and Conrol Communication
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMOFEI%3AMOFEI-B-PROPAGATION.html">WORM:MOFEI:MOFEI-B-PROPAGATION</a></b></td>
   <td width="500" valign="top">
    WORM: MoFei Worm NetBIOS Propagation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMOFEI%3AMOFEI-BACKDOOR2.html">WORM:MOFEI:MOFEI-BACKDOOR2</a></b></td>
   <td width="500" valign="top">
    WORM: Mofei Backdoor Attempt (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMOFEI%3AMOFEI-BACKDOOR3.html">WORM:MOFEI:MOFEI-BACKDOOR3</a></b></td>
   <td width="500" valign="top">
    WORM: Mofei Backdoor Attempt (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AMYTOB%3AED-IRC.html">WORM:MYTOB:ED-IRC</a></b></td>
   <td width="500" valign="top">
    WORM: Mytob.ED IRC Activity
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANACHI%3AB-C-D-INFECT-ATTEMPT.html">WORM:NACHI:B-C-D-INFECT-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: NACHI.B\C\D Locator Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANACHI%3AD-WEBDAV-ATK.html">WORM:NACHI:D-WEBDAV-ATK</a></b></td>
   <td width="500" valign="top">
    WORM: NACHI.D WebDAV Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANETSKY%3AV-SMTP-PROP.html">WORM:NETSKY:V-SMTP-PROP</a></b></td>
   <td width="500" valign="top">
    WORM: NetSky.V SMTP Propagation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ABIN-255-CMD.html">WORM:NIMDA:BIN-255-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Infection Attempt (4)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3AEMAIL-PROP.html">WORM:NIMDA:EMAIL-PROP</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Email Propagation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3AMSADC-ROOT.html">WORM:NIMDA:MSADC-ROOT</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Infection Attempt (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ANIMDA-EML.html">WORM:NIMDA:NIMDA-EML</a></b></td>
   <td width="500" valign="top">
    WORM: .eml NIMDA Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ANIMDA-NWS.html">WORM:NIMDA:NIMDA-NWS</a></b></td>
   <td width="500" valign="top">
    WORM: .nws NIMDA Extension
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ANIMDA-RICHED20.html">WORM:NIMDA:NIMDA-RICHED20</a></b></td>
   <td width="500" valign="top">
    WORM: RICHED20.DLL NIMDA File
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ASCRIPTS-C11C-CMD.html">WORM:NIMDA:SCRIPTS-C11C-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Infection Attempt (5)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ASCRIPTS-CMD.html">WORM:NIMDA:SCRIPTS-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Infection Attempt (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ANIMDA%3ASCRIPTS-ROOT.html">WORM:NIMDA:SCRIPTS-ROOT</a></b></td>
   <td width="500" valign="top">
    WORM: Nimda Infection Attempt (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3APHPINCLUDE%3AEXPLOIT.html">WORM:PHPINCLUDE:EXPLOIT</a></b></td>
   <td width="500" valign="top">
    WORM: PHPInclude.Worm Remote Exploitation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3APHPINCLUDE%3ASEARCH-REQ.html">WORM:PHPINCLUDE:SEARCH-REQ</a></b></td>
   <td width="500" valign="top">
    WORM: PHPInclude.Worm Search Engine Request
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASANTY%3AGOOGLE-SEARCH.html">WORM:SANTY:GOOGLE-SEARCH</a></b></td>
   <td width="500" valign="top">
    WORM: Santy Google Search
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASANTY%3AINFECT-ATTEMPT.html">WORM:SANTY:INFECT-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: Santy Infect Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASASSER%3AA-D-F-FTP-DL-5554.html">WORM:SASSER:A-D-F-FTP-DL-5554</a></b></td>
   <td width="500" valign="top">
    WORM: Sasser A/B/C/D/F FTP Download (5554)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASASSER%3AA-D-F-SHELL-CMD.html">WORM:SASSER:A-D-F-SHELL-CMD</a></b></td>
   <td width="500" valign="top">
    WORM: Sasser A/B/C/D/F Backdoor Command (9995/6)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASASSER%3AFTP-SRV-OVERFLOW.html">WORM:SASSER:FTP-SRV-OVERFLOW</a></b></td>
   <td width="500" valign="top">
    WORM: Sasser FTP Server Buffer Overflow Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASDBOT%3ADX-IRC-BEACON.html">WORM:SDBOT:DX-IRC-BEACON</a></b></td>
   <td width="500" valign="top">
    WORM: SDBot.DX Infected Host IRC Beacon
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASDBOT%3AOH-BACKDOOR-COMMAND.html">WORM:SDBOT:OH-BACKDOOR-COMMAND</a></b></td>
   <td width="500" valign="top">
    WORM: SDBot.OH Backdoor Command
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAMMER%3AINFECT-ATTEMPT.html">WORM:SLAMMER:INFECT-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: SQLSlammer Worm Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3AAION-INFECT.html">WORM:SLAPPER:AION-INFECT</a></b></td>
   <td width="500" valign="top">
    WORM: Apache Slapper (AION) Worm Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3AB-INFECT.html">WORM:SLAPPER:B-INFECT</a></b></td>
   <td width="500" valign="top">
    WORM: Apache Slapper (B) Worm Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3AC-INFECT.html">WORM:SLAPPER:C-INFECT</a></b></td>
   <td width="500" valign="top">
    WORM: Apache Slapper (C) Worm Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3AC2-INFEC.html">WORM:SLAPPER:C2-INFEC</a></b></td>
   <td width="500" valign="top">
    WORM: Apache Slapper (C2) Worm Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3ACINIK-SRC.html">WORM:SLAPPER:CINIK-SRC</a></b></td>
   <td width="500" valign="top">
    WORM: Slapper (Cinik Version) Update Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASLAPPER%3AWORM-INFECT.html">WORM:SLAPPER:WORM-INFECT</a></b></td>
   <td width="500" valign="top">
    WORM: Apache Slapper (bugtraq) Worm Infection
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASMB%3ABUGBEAR-B.html">WORM:SMB:BUGBEAR-B</a></b></td>
   <td width="500" valign="top">
    WORM: Bugbear B Worm Propagation
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASMB%3ADELODER.html">WORM:SMB:DELODER</a></b></td>
   <td width="500" valign="top">
    WORM: Deloder Worm SMB Propagation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASMB%3ADELODER-2.html">WORM:SMB:DELODER-2</a></b></td>
   <td width="500" valign="top">
    WORM: Deloder Worm Propagation Attempt (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASMB%3AW32-SLACKOR.html">WORM:SMB:W32-SLACKOR</a></b></td>
   <td width="500" valign="top">
    WORM: W32/Slackor Worm Propagation Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASQL-SNAKE%3AMSSQL-REG-1.html">WORM:SQL-SNAKE:MSSQL-REG-1</a></b></td>
   <td width="500" valign="top">
    WORM: MS-SQL Registry Key Modification (1)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASQL-SNAKE%3AMSSQL-REG-2.html">WORM:SQL-SNAKE:MSSQL-REG-2</a></b></td>
   <td width="500" valign="top">
    WORM: MS-SQL Registry Key Modification (2)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASQL-SNAKE%3AMSSQL-REG-3.html">WORM:SQL-SNAKE:MSSQL-REG-3</a></b></td>
   <td width="500" valign="top">
    WORM: MS-SQL Registry Key Modification (3)
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ASTATS-PHP-IFRAME.html">WORM:STATS-PHP-IFRAME</a></b></td>
   <td width="500" valign="top">
    WORM: HTTP IFRAME Containing Possible Malicious Stats.php
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3ATHE-MOON-LINKSYS.html">WORM:THE-MOON-LINKSYS</a></b></td>
   <td width="500" valign="top">
    WORM: Linksys The Moon Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AWITTY%3AINFECT-ATTEMPT.html">WORM:WITTY:INFECT-ATTEMPT</a></b></td>
   <td width="500" valign="top">
    WORM: Witty Infection Attempt
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AWORM-BROPIA-F.html">WORM:WORM-BROPIA-F</a></b></td>
   <td width="500" valign="top">
    WORM: Bropia-F
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="WORM%3AZAFI%3AD-BACKDOOR-UPL.html">WORM:ZAFI:D-BACKDOOR-UPL</a></b></td>
   <td width="500" valign="top">
    WORM: Zafi.D Backdoor File Upload
   </td>
  </tr>
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="X11"></a>X11</h3></th>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="X11%3AX11-XC-QUERY-SECURITY.html">X11:X11-XC-QUERY-SECURITY</a></b></td>
   <td width="500" valign="top">
    X11: DoS using XC-QUERY-SECURITY
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="X11%3AXFS-QUERYX.html">X11:XFS-QUERYX</a></b></td>
   <td width="500" valign="top">
    X11: X.Org X Font Server QueryXBitmaps and QueryXExtents Handlers Integer Overflow
   </td>
  </tr>
  
  <tr>
   <td width="300" valign="top"><b><a href="X11%3AXFS-SWAP-CHAR.html">X11:XFS-SWAP-CHAR</a></b></td>
   <td width="500" valign="top">
    X11: X Font Server Character Swap
   </td>
  </tr>
  
  
  
  <tr>
   <th width="800" valign="top" class="rowHead" colspan="2"><h3><a name="recommended"></a>Recommended</h3></th>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AADOBE-COLDFUSION-WEBSOCKET.html">APP:ADOBE-COLDFUSION-WEBSOCKET</a></b></th>
   <td width="500" valign="top">
    APP: Adobe ColdFusion Unauthorized ColdFusion Components (CFC) Invokation via Web Socket
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AADOBE-FLASH-RTMP-RCE.html">APP:ADOBE-FLASH-RTMP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP Message Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AAMANDA%3AAMANDA-ROOT-OF2.html">APP:AMANDA:AMANDA-ROOT-OF2</a></b></th>
   <td width="500" valign="top">
    APP: Amanda Amindexd Remote Overflow (2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AAPPLE-MACOSX-ODP-RCE.html">APP:APPLE-MACOSX-ODP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Apple Mac OS X ODProxy Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AASTERISK-PJSIP-MODULE-DOS.html">APP:ASTERISK-PJSIP-MODULE-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Asterisk PJSIP Module Event Package SIP SUBSCRIBE Request Handling Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AASUS-WRT-INFOSVR-COMND-EXEC.html">APP:ASUS-WRT-INFOSVR-COMND-EXEC</a></b></th>
   <td width="500" valign="top">
    APP: Asus Write Infosvr Service Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AAVAYA-CCRWEBCLIENT-RCE.html">APP:AVAYA-CCRWEBCLIENT-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCK-MESSAGE.html">APP:CA:ARCSRV:BCK-MESSAGE</a></b></th>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Mssage Engine Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ABCKUP-AUTHSRV-DOS.html">APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</a></b></th>
   <td width="500" valign="top">
    APP: CA ARCserve Backup Authentication Service Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3AMETHD-EXPOSURE.html">APP:CA:ARCSRV:METHD-EXPOSURE</a></b></th>
   <td width="500" valign="top">
    APP: Computer Associates BrightStor ARCserve Backup Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ARPC-MEMRCORRUPT.html">APP:CA:ARCSRV:RPC-MEMRCORRUPT</a></b></th>
   <td width="500" valign="top">
    APP: CA BrightStor ARCserve Backup Tape RPC Procedure Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3AARCSRV%3ATAPE-ENGNE-DOS.html">APP:CA:ARCSRV:TAPE-ENGNE-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Backup Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3ADBA-SVR-POINT.html">APP:CA:DBA-SVR-POINT</a></b></th>
   <td width="500" valign="top">
         APP: CA Multiple Products DBASVR RPC Server Pointer Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACA%3ARPC-MSG-BO.html">APP:CA:RPC-MSG-BO</a></b></th>
   <td width="500" valign="top">
    APP: Computer Associates Products Message Engine RPC Server Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACISCO%3AVIDEO-SURVEILANCE-LFI.html">APP:CISCO:VIDEO-SURVEILANCE-LFI</a></b></th>
   <td width="500" valign="top">
    APP: Video Surveillance Operations Manager Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACISCO%3AVIDEO-SURVEILANCE-XSS.html">APP:CISCO:VIDEO-SURVEILANCE-XSS</a></b></th>
   <td width="500" valign="top">
    APP: Video Surveillance Operations Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACITRIX%3APROVISIONING-OPCODE.html">APP:CITRIX:PROVISIONING-OPCODE</a></b></th>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services Opcode Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACITRIX%3APROVISIONINGSERV-UF.html">APP:CITRIX:PROVISIONINGSERV-UF</a></b></th>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services streamprocess.exe Integer Underflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ACITRIX%3ASTREAMPROCESS-BOF.html">APP:CITRIX:STREAMPROCESS-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Citrix Provisioning Services streamprocess.exe Component Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-COOKIE-OF.html">APP:DIGIUM-ASTERISK-COOKIE-OF</a></b></th>
   <td width="500" valign="top">
    APP: Digium Asterisk Cookie Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ADIGIUM-ASTERISK-OF.html">APP:DIGIUM-ASTERISK-OF</a></b></th>
   <td width="500" valign="top">
    APP: Digium Asterisk HTTP Management Interface Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTOR-BOF.html">APP:EMC-ALPHASTOR-BOF</a></b></th>
   <td width="500" valign="top">
    APP: EMC AlphaStor Device Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTOR-LIB-BOF.html">APP:EMC-ALPHASTOR-LIB-BOF</a></b></th>
   <td width="500" valign="top">
    APP: EMC AlphaStor Library Control Program Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-ALPHASTORE-CMDEXEC.html">APP:EMC-ALPHASTORE-CMDEXEC</a></b></th>
   <td width="500" valign="top">
    APP: EMC AlphaStore Mutiple Parameter Parsing Command Injecton
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-APLHASTORE-FMTSTR.html">APP:EMC-APLHASTORE-FMTSTR</a></b></th>
   <td width="500" valign="top">
    APP: EMC AlphaStore Multiple Parameter Parsing Format String
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-CMCNE-INFO-DISC.html">APP:EMC-CMCNE-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    APP: EMC CMCNE FileUploadController Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-NETWORKER-NSRD-BO.html">APP:EMC-NETWORKER-NSRD-BO</a></b></th>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrd.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-NETWORKER-NSRINDEXD-OF.html">APP:EMC-NETWORKER-NSRINDEXD-OF</a></b></th>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrindexd.exe Procedure 0x01 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-NSRINDEXD-BO.html">APP:EMC-NSRINDEXD-BO</a></b></th>
   <td width="500" valign="top">
    APP: EMC NetWorker nsrindexd RPC Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-PACKT-INJ-COM-EXEC.html">APP:EMC-PACKT-INJ-COM-EXEC</a></b></th>
   <td width="500" valign="top">
    APP: EMC AutoStart Packet Injection Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AEMC-REPLICATION-MGR-CMD-EXE.html">APP:EMC-REPLICATION-MGR-CMD-EXE</a></b></th>
   <td width="500" valign="top">
    APP: EMC Replication Manager Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AESIGNAL%3AOVERFLOW-EXPLOIT.html">APP:ESIGNAL:OVERFLOW-EXPLOIT</a></b></th>
   <td width="500" valign="top">
    APP: eSignal Buffer Overflow Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHORDE-WEBMAIL-CSRF.html">APP:HORDE-WEBMAIL-CSRF</a></b></th>
   <td width="500" valign="top">
    APP: Horde Groupware Webmail Edition Ingo Filter Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-ACMSERVLETDOWNLOAD.html">APP:HP-ACMSERVLETDOWNLOAD</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center UAM acmServletDownload Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-AIO-BO.html">APP:HP-AIO-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP AIO Archive Query Server oasoa.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PROTECTOR-OP-DOS.html">APP:HP-DATA-PROTECTOR-OP-DOS</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Media Operations Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-EXEC-BAR-CE.html">APP:HP-DATA-PRTCTR-EXEC-BAR-CE</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector EXEC_BAR Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP-27.html">APP:HP-DATA-PRTCTR-OP-27</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 27 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP211-264.html">APP:HP-DATA-PRTCTR-OP211-264</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcodes 211 And 264 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP215-263.html">APP:HP-DATA-PRTCTR-OP215-263</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcodes 215 And 263 Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP227-BO.html">APP:HP-DATA-PRTCTR-OP227-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 227 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP234-BO.html">APP:HP-DATA-PRTCTR-OP234-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 234 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP235-BO.html">APP:HP-DATA-PRTCTR-OP235-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 235 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP259-BO.html">APP:HP-DATA-PRTCTR-OP259-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 259 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP260-BO.html">APP:HP-DATA-PRTCTR-OP260-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Opcode 260 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP28-11.html">APP:HP-DATA-PRTCTR-OP28-11</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 28 and 11 Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP42-DIR-TRV.html">APP:HP-DATA-PRTCTR-OP42-DIR-TRV</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 42 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OP45-46.html">APP:HP-DATA-PRTCTR-OP45-46</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Opcode 45 and 46 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OPCODE.html">APP:HP-DATA-PRTCTR-OPCODE</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Multiple Opcode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-OPCODES.html">APP:HP-DATA-PRTCTR-OPCODES</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector CRS Multiple Opcode Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-DATA-PRTCTR-RDS-DOS.html">APP:HP-DATA-PRTCTR-RDS-DOS</a></b></th>
   <td width="500" valign="top">
    APP: HP Data Protector Manager RDS Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-FAULTDOWNLOADSERVLET.html">APP:HP-FAULTDOWNLOADSERVLET</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center FaultDownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-ICTDOWNLOADSERVLET.html">APP:HP-ICTDOWNLOADSERVLET</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center IctDownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-HYDRA-DIAG-OF.html">APP:HP-LEFTHAND-HYDRA-DIAG-OF</a></b></th>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance hydra Diag Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LEFTHAND-HYDRA-PING-OF.html">APP:HP-LEFTHAND-HYDRA-PING-OF</a></b></th>
   <td width="500" valign="top">
    APP: HP LeftHand Virtual SAN Appliance hydra Ping Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-BO.html">APP:HP-LOADRUNNER-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP LoadRunner Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-RCE.html">APP:HP-LOADRUNNER-RCE</a></b></th>
   <td width="500" valign="top">
    APP: HP LoadRunner magentproc.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LOADRUNNER-SSL.html">APP:HP-LOADRUNNER-SSL</a></b></th>
   <td width="500" valign="top">
    APP: HP LoadRunner magentproc.exe Stack Buffer Overflow (SSL)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-LOGIN-BOF.html">APP:HP-LOGIN-BOF</a></b></th>
   <td width="500" valign="top">
    APP: HP StorageWorks P4000 Virtual SAN Appliance Login Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-MGMT-BIMS-FILE-UPLOAD.html">APP:HP-MGMT-BIMS-FILE-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center BIMS UploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-MGMT-SOM-SDFILE.html">APP:HP-MGMT-SOM-SDFILE</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center SOM sdFileDownload Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-MGMT-UAM-BO.html">APP:HP-MGMT-UAM-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center uam Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-NNM-HLEN-BOF.html">APP:HP-NNM-HLEN-BOF</a></b></th>
   <td width="500" valign="top">
    APP: HP Network Node Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-OPENVIEW-DTPRTCTR-BO.html">APP:HP-OPENVIEW-DTPRTCTR-BO</a></b></th>
   <td width="500" valign="top">
    APP:HP Open View Storage Data Protector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-OPNVIEWSTORAGE-BOF.html">APP:HP-OPNVIEWSTORAGE-BOF</a></b></th>
   <td width="500" valign="top">
    APP: HP Open View Storage Data Protector Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-OPNVW-STORAGE-DATA-BO.html">APP:HP-OPNVW-STORAGE-DATA-BO</a></b></th>
   <td width="500" valign="top">
    APP:HP Open Storage Data Protector Buffer Overflow 0137
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCRVE-MANAGER-CE.html">APP:HP-PROCRVE-MANAGER-CE</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager EJBInvokerServlet or JMXInvokerServlet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCRVE-SNAC-FILE-UPLD.html">APP:HP-PROCRVE-SNAC-FILE-UPLD</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution (HTTP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-BYPASS.html">APP:HP-PROCURVE-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC GetDomainControllerServlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FILE-UPLD-SSL.html">APP:HP-PROCURVE-FILE-UPLD-SSL</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FILE-UPLOAD.html">APP:HP-PROCURVE-FILE-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (HTTP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROCURVE-FUPLOAD-SSL.html">APP:HP-PROCURVE-FUPLOAD-SSL</a></b></th>
   <td width="500" valign="top">
    APP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-PROTECTOR-DIR-TRAV.html">APP:HP-PROTECTOR-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    APP: HP DataProtector Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-REPORTIMGSERVLET.html">APP:HP-REPORTIMGSERVLET</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center ReportImgServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-SAN-IQ-CMD-INJ.html">APP:HP-SAN-IQ-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    APP: HP SAN iQ Multiple Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-SITESCOPE-CMD-INJ.html">APP:HP-SITESCOPE-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope runOMAgentCommand Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-STORAGEWORKS-OPC22-BO.html">APP:HP-STORAGEWORKS-OPC22-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP StorageWorks Opcode 0x22 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-SYS-IPRANGE-OF.html">APP:HP-SYS-IPRANGE-OF</a></b></th>
   <td width="500" valign="top">
    APP: HP System Management Homepage iprange Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-SYS-RCE.html">APP:HP-SYS-RCE</a></b></th>
   <td width="500" valign="top">
    APP: HP System Management Homepage iprange Parameter Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHP-VIRTUAL-SAN.html">APP:HP-VIRTUAL-SAN</a></b></th>
   <td width="500" valign="top">
    APP: Hewlett-Packard Virtual SAN Appliance Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHPIM-SOM-EUACCNT-BYPASS.html">APP:HPIM-SOM-EUACCNT-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: HP Intelligent Management Center SOM euAccountSerivce Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHPLOADRUNNER-XDR-BO.html">APP:HPLOADRUNNER-XDR-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP LoadRunner XDR Data Handling Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHPOV%3ACMD-INJ.html">APP:HPOV:CMD-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Hewlett Packard OpenView Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AHPOV%3ANNMI-BO.html">APP:HPOV:NNMI-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Network Node Manager(NNMi) ovopi.dll Options Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ADOMINO-BYPASS.html">APP:IBM:DOMINO-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: IBM Lotus Domino Remote Console Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ADOMINO-BYPASS-1.html">APP:IBM:DOMINO-BYPASS-1</a></b></th>
   <td width="500" valign="top">
    APP: IBM Lotus Domino Remote Console Auth Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3AFORMVIEWER-XFDL-BOF.html">APP:IBM:FORMVIEWER-XFDL-BOF</a></b></th>
   <td width="500" valign="top">
    APP: IBM Forms Viewer XFDL Form Fontname Tag Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3AFXCLI-EXECBO.html">APP:IBM:FXCLI-EXECBO</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server FXCLI_OraBR_Exec_Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ALDAP-MODIFYREQUEST-BO.html">APP:IBM:LDAP-MODIFYREQUEST-BO</a></b></th>
   <td width="500" valign="top">
    APP: IBM Domino LDAP Server ModifyRequest Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ASYMPHONY-SOAP-BOF.html">APP:IBM:SYMPHONY-SOAP-BOF</a></b></th>
   <td width="500" valign="top">
    APP: IBM Platform Symphony SOAP Requests Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATEALEAF-PCA-CMDEXEC.html">APP:IBM:TEALEAF-PCA-CMDEXEC</a></b></th>
   <td width="500" valign="top">
    APP: IBM TeaLeaf Passive Capture Application Module Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1329-BOF.html">APP:IBM:TIV-OP1329-BOF</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1329 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1331-CMDINJ.html">APP:IBM:TIV-OP1331-CMDINJ</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Opcode 1331 Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-OP1339-CMDINJ.html">APP:IBM:TIV-OP1339-CMDINJ</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Opcode 1339 Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIV-SCHEDULEPARAM-XSS.html">APP:IBM:TIV-SCHEDULEPARAM-XSS</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Endpoint Manager Web Reports ScheduleParam Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-OF.html">APP:IBM:TIVOLI-FASTBACK-OF</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Mount Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-FASTBACK-OP-BO.html">APP:IBM:TIVOLI-FASTBACK-OP-BO</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1332 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-OF.html">APP:IBM:TIVOLI-OF</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Management Framework Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-OP4115-BO.html">APP:IBM:TIVOLI-OP4115-BO</a></b></th>
   <td width="500" valign="top">
    APP: Tivoli Storage Manager FastBack Server Opcode 4115 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-SRV-OP1301.html">APP:IBM:TIVOLI-SRV-OP1301</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1301 Format String
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATIVOLI-SRV-OP1335.html">APP:IBM:TIVOLI-SRV-OP1335</a></b></th>
   <td width="500" valign="top">
    APP: IBM Tivoli Storage Manager FastBack Server Opcode 1335 Format String
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3ATSM-CVE-2015-0119-BO.html">APP:IBM:TSM-CVE-2015-0119-BO</a></b></th>
   <td width="500" valign="top">
    APP: IBM TSM FastBack Opcode 0x09 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3AWS-APPSRV-RCE.html">APP:IBM:WS-APPSRV-RCE</a></b></th>
   <td width="500" valign="top">
    APP: IBM WebSphere Application Server Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIBM%3AWS-APPSRV-RCE2.html">APP:IBM:WS-APPSRV-RCE2</a></b></th>
   <td width="500" valign="top">
     APP: IBM WebSphere Application Server Remote Code Execution 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AINTERSYSTEMS-CACHE-OF.html">APP:INTERSYSTEMS-CACHE-OF</a></b></th>
   <td width="500" valign="top">
    APP: InterSystems Cache &#39;UtilConfigHome.csp&#39; Remote Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AIPMI-CIPHER-ZERO.html">APP:IPMI-CIPHER-ZERO</a></b></th>
   <td width="500" valign="top">
    APP: IPMI Cipher Zero Authentication Bypass And Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3ABLDPRINCIPAL-VA1.html">APP:KERBEROS:BLDPRINCIPAL-VA1</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 build_principal_va Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3ABLDPRINCIPAL-VA2.html">APP:KERBEROS:BLDPRINCIPAL-VA2</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 build_principal_va Denial of Service 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3ACHKSUM-PRIV-ESC.html">APP:KERBEROS:CHKSUM-PRIV-ESC</a></b></th>
   <td width="500" valign="top">
    APP: Kerberos Checksum Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AINV-TOKEN-DOS-TCP.html">APP:KERBEROS:INV-TOKEN-DOS-TCP</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service (TCP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AINV-TOKEN-DOS-UDP.html">APP:KERBEROS:INV-TOKEN-DOS-UDP</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service (UDP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AKRB5-DOS.html">APP:KERBEROS:KRB5-DOS</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AMULTI-REALM-DOS.html">APP:KERBEROS:MULTI-REALM-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Kerberos Multi-realm KDC NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AREAD-MSG-DOS.html">APP:KERBEROS:READ-MSG-DOS</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 Read Message Data Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3ASPNEGO-5-DOS.html">APP:KERBEROS:SPNEGO-5-DOS</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos 5 SPNEGO Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKERBEROS%3AXREALM-KDC-DOS.html">APP:KERBEROS:XREALM-KDC-DOS</a></b></th>
   <td width="500" valign="top">
    APP: MIT Kerberos Cross-Realm Referrals KDC Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AKINDLE-BROWSER-NPAPI-RCE.html">APP:KINDLE-BROWSER-NPAPI-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Kindle Touch Browser Plugin libkindleplugin.so Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ALENOVO-RCE-UPLOAD.html">APP:LENOVO-RCE-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP: Lenovo ThinkManagement Console Arbitrary File Upload Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-AM-INPUT.html">APP:MCAFEE-AM-INPUT</a></b></th>
   <td width="500" valign="top">
    APP: McAfee Asset Manager ReportsAudit.jsp Input Validation Error (HTTP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-AM-INPUT-SSL.html">APP:MCAFEE-AM-INPUT-SSL</a></b></th>
   <td width="500" valign="top">
    APP: McAfee Asset Manager ReportsAudit.jsp Input Validation Error (SSL)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-SQLI.html">APP:MCAFEE-EPOLICY-SQLI</a></b></th>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator UID Multiple SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-XML.html">APP:MCAFEE-EPOLICY-XML</a></b></th>
   <td width="500" valign="top">
    APP: McAfee ePolicy Orchestrator XML External Entity Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-EPOLICY-XSS.html">APP:MCAFEE-EPOLICY-XSS</a></b></th>
   <td width="500" valign="top">
    APP: McAfee Epolicy Orchestrator Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-FIREWALL-RCE.html">APP:MCAFEE-FIREWALL-RCE</a></b></th>
   <td width="500" valign="top">
    APP: McAfee Firewall Reporter isValidClient Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMCAFEE-WR-JBOSS-RCE.html">APP:MCAFEE-WR-JBOSS-RCE</a></b></th>
   <td width="500" valign="top">
    APP: McAfee Web Reporter JBoss EJBInvokerServlet Marshalled Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMEDIAWIKI-RCE.html">APP:MEDIAWIKI-RCE</a></b></th>
   <td width="500" valign="top">
    APP: MediaWiki Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AACTMQ-SHUTDN-CMD.html">APP:MISC:ACTMQ-SHUTDN-CMD</a></b></th>
   <td width="500" valign="top">
    APP: Apache ActiveMQ Shutdown Command Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AADOBE-RTMP-UAF.html">APP:MISC:ADOBE-RTMP-UAF</a></b></th>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP Use-After-Free (CVE-2014-0551)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AALIENVALT-BAKUP-COM-RE.html">APP:MISC:ALIENVALT-BAKUP-COM-RE</a></b></th>
   <td width="500" valign="top">
    AlienVault OSSIM Backup Command Unspecified Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-QPID-SEQSET-DOS.html">APP:MISC:APACHE-QPID-SEQSET-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Apache Qpid Sequence Set Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-QPID-SESS-DOS.html">APP:MISC:APACHE-QPID-SESS-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Apache Qpid Session Gap Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AAPACHE-SVN-IO.html">APP:MISC:APACHE-SVN-IO</a></b></th>
   <td width="500" valign="top">
    APP: Apache Subversion SVN Protocol Parser Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AARCSERVE-BKUP.html">APP:MISC:ARCSERVE-BKUP</a></b></th>
   <td width="500" valign="top">
    APP: Computer Associates ARCserve Backup Memory Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AARCSERVE-GETBACKUP.html">APP:MISC:ARCSERVE-GETBACKUP</a></b></th>
   <td width="500" valign="top">
    APP: Arcserve GetBackupPolicy Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AAV-USM-DESER-RCE.html">APP:MISC:AV-USM-DESER-RCE</a></b></th>
   <td width="500" valign="top">
    APP: AlientVault USM Deserialization Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ABIGANT-DDNF-BO.html">APP:MISC:BIGANT-DDNF-BO</a></b></th>
   <td width="500" valign="top">
    APP: BigAnt Server DDNF Request Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ACLEARSCADA-OPF-PARSE.html">APP:MISC:CLEARSCADA-OPF-PARSE</a></b></th>
   <td width="500" valign="top">
    APP: Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ACVE-2014-0549-RTMP-MC.html">APP:MISC:CVE-2014-0549-RTMP-MC</a></b></th>
   <td width="500" valign="top">
    APP: Adobe Flash Player RTMP CVE-2014-0549 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ADOGFOOD-RCE.html">APP:MISC:DOGFOOD-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Dogfood CRM Mail spell.php Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AENTERASYS-NETSIGHT-BOF.html">APP:MISC:ENTERASYS-NETSIGHT-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Enterasys NetSight nssyslogd.exe Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AEZHOMETECH-EZSERVER-BO.html">APP:MISC:EZHOMETECH-EZSERVER-BO</a></b></th>
   <td width="500" valign="top">
    APP: EZHome Tech EZServer Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AGITORIOUS-RCE.html">APP:MISC:GITORIOUS-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Gitorious Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-INODE-BO.html">APP:MISC:HP-INODE-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP iNode Management Center iNodeMngChecker.exe Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-OA-HEALTH-BO.html">APP:MISC:HP-OA-HEALTH-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Operations Agent for NonStop Server HEALTH Packet Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-CE.html">APP:MISC:HP-SITESCOPE-CE</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope issueSiebelCmd SOAP Request Handling
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-DIR-TRAV.html">APP:MISC:HP-SITESCOPE-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-LOADFILE.html">APP:MISC:HP-SITESCOPE-LOADFILE</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope loadFileContent SOAP Request Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SITESCOPE-SOAP.html">APP:MISC:HP-SITESCOPE-SOAP</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope SOAP Call APIPreferenceImpl Multiple Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AHP-SSC-APIMONITORIMPL.html">APP:MISC:HP-SSC-APIMONITORIMPL</a></b></th>
   <td width="500" valign="top">
    APP: HP SiteScope SOAP Call APIMonitorImpl Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-MEMCP-1.html">APP:MISC:MUL-MEMCP-1</a></b></th>
   <td width="500" valign="top">
    APP: Multiple Vendors Memory Corruption 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AMUL-MEMCP-2.html">APP:MISC:MUL-MEMCP-2</a></b></th>
   <td width="500" valign="top">
    APP: Multiple Vendors Memory Corruption 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ANAGIOS-NRPE-CE.html">APP:MISC:NAGIOS-NRPE-CE</a></b></th>
   <td width="500" valign="top">
    APP: Nagios Remote Plugin Executor 2.13 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ANAGIOS-NRPE-CHKUSRS-CI.html">APP:MISC:NAGIOS-NRPE-CHKUSRS-CI</a></b></th>
   <td width="500" valign="top">
    APP: Nagios Remote Plugin Executor Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ANEC-EXPCLU-BO.html">APP:MISC:NEC-EXPCLU-BO</a></b></th>
   <td width="500" valign="top">
    APP: NEC EXPCLUSTER Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AOBJ-OBJDB-BO.html">APP:MISC:OBJ-OBJDB-BO</a></b></th>
   <td width="500" valign="top">
    APP: OBJECTIVE DB Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AOP5-APP-PASSWORD.html">APP:MISC:OP5-APP-PASSWORD</a></b></th>
   <td width="500" valign="top">
    APP: op5 Appliance Password Parameter Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AOP5-APP-TIMESTAMP.html">APP:MISC:OP5-APP-TIMESTAMP</a></b></th>
   <td width="500" valign="top">
    APP: op5 Appliance Timestamp Parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ASAM-ACTQ-MULTI.html">APP:MISC:SAM-ACTQ-MULTI</a></b></th>
   <td width="500" valign="top">
    APP: Samsung Security Manager ActiveMQ Broker Service Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ASAP-NETWEAVER-SOAP-RCE.html">APP:MISC:SAP-NETWEAVER-SOAP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver Unsafe SOAP Requests
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ASCHNEIDER-INDUSOFT-RCE.html">APP:MISC:SCHNEIDER-INDUSOFT-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Schneider Electric InduSoft Web Studio Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ASOPHOS-WEBAPP-RCE.html">APP:MISC:SOPHOS-WEBAPP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Sophos Web Protection Appliance Sblistpack Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3ASPREE-SEARCH-CMD-EXE.html">APP:MISC:SPREE-SEARCH-CMD-EXE</a></b></th>
   <td width="500" valign="top">
    APP: Spree Search ProductScope Class search send Parameter Command Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AWSHARK-ENTTEC-BO.html">APP:MISC:WSHARK-ENTTEC-BO</a></b></th>
   <td width="500" valign="top">
    App: Wireshark ENTTEC DMX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AZABBIC-NODE-PROCESS-CE.html">APP:MISC:ZABBIC-NODE-PROCESS-CE</a></b></th>
   <td width="500" valign="top">
    APP: Zabbix NodeProcess Command Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMISC%3AZABBIX-SQLI.html">APP:MISC:ZABBIX-SQLI</a></b></th>
   <td width="500" valign="top">
    APP: Zabbix 2.0.8 SQL Injection And Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMS-SNABASE-EXE-DOS.html">APP:MS-SNABASE-EXE-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Microsoft Host Integration Server snabase.exe Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AMSDOTNET-CVE-2014-1806.html">APP:MSDOTNET-CVE-2014-1806</a></b></th>
   <td width="500" valign="top">
    APP: Microsoft .NET Framework CVE-2014-1806 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL-SECURITY-BYPASS.html">APP:NOVELL-SECURITY-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: Novell Sentinel Log Manager Retention Policy Security Restriction Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-ARB-UPLOAD.html">APP:NOVELL:IMANAGER-ARB-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP: Novell iManager getMultiPartParameters Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-CREATE-BO.html">APP:NOVELL:IMANAGER-CREATE-BO</a></b></th>
   <td width="500" valign="top">
    APP: Novell iManager Create Attribute EnteredAttrName Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AIMANAGER-FILE-UPLOAD.html">APP:NOVELL:IMANAGER-FILE-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP: Novell iManager getMultiPartParameters Unauthorized File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AINTERNET-AGENT-BOF.html">APP:NOVELL:INTERNET-AGENT-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Novell GroupWise Internet Agent Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-BOF.html">APP:NOVELL:MESSENGER-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Novell Messenger Client Filename Parameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AMESSENGER-LOGIN.html">APP:NOVELL:MESSENGER-LOGIN</a></b></th>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger nmma.exe Login Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AMSNGR-CREATESEARCH.html">APP:NOVELL:MSNGR-CREATESEARCH</a></b></th>
   <td width="500" valign="top">
    APP: Novell GroupWise Messenger createsearch Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3APREBOOT-POLICY-BO.html">APP:NOVELL:PREBOOT-POLICY-BO</a></b></th>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management Preboot Policy Service Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AXNFS-NLM.html">APP:NOVELL:XNFS-NLM</a></b></th>
   <td width="500" valign="top">
    APP: Novell Netware Network Lock Manager Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-DIR-TRAV.html">APP:NOVELL:ZENWORKS-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management PreBoot Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-LG-DIR-TRAV.html">APP:NOVELL:ZENWORKS-LG-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    APP: Novell ZENworks Management Language Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MGT-UPLOAD.html">APP:NOVELL:ZENWORKS-MGT-UPLOAD</a></b></th>
   <td width="500" valign="top">
    APP:ZENworks Handheld Management File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKS-MOBILE-LFI.html">APP:NOVELL:ZENWORKS-MOBILE-LFI</a></b></th>
   <td width="500" valign="top">
    APP: Novell Zenworks Mobile Device Managment Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ANOVELL%3AZENWORKSCM-DIRTRVRSL.html">APP:NOVELL:ZENWORKSCM-DIRTRVRSL</a></b></th>
   <td width="500" valign="top">
    APP: Novell ZENworks Configuration Management newDocumentWizard Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AOPENVIEW-STORAGE-BO.html">APP:OPENVIEW-STORAGE-BO</a></b></th>
   <td width="500" valign="top">
    APP: HP Open View Strage Data Protector Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3AMEMCACHED-PLUGIN.html">APP:ORACLE:MEMCACHED-PLUGIN</a></b></th>
   <td width="500" valign="top">
    APP: Oracle MySQL Server InnoDB Memcached Plugin Resource Exhaustion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3AOUTSIDE-JPEG2-CODCOC.html">APP:ORACLE:OUTSIDE-JPEG2-CODCOC</a></b></th>
   <td width="500" valign="top">
    APP: Oracle Outside In JPEG 2000 COD and COC Parameter Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3AREPORT-CMD-INJ.html">APP:ORACLE:REPORT-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Oracle Report Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3ASECURE-BACKUP-INJ.html">APP:ORACLE:SECURE-BACKUP-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Oracle Secure Backup Administration Server Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3AVIRTUAL-AGENT-CMDINJ.html">APP:ORACLE:VIRTUAL-AGENT-CMDINJ</a></b></th>
   <td width="500" valign="top">
    APP: Oracle Virtual Server Agent Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AORACLE%3AWEBLOGIC-SRV-RCE.html">APP:ORACLE:WEBLOGIC-SRV-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Oracle WebLogic Server Commons-Collections Library Insecure Deserialization
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AOSSIM-COMMAND-EXEC.html">APP:OSSIM-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    APP: AlienVault OSSIM Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3APERSISTENT-COMMAND-EXEC.html">APP:PERSISTENT-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    APP: Persistent Systems Radia Client Automation Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-HOST-HDR-BYPASS.html">APP:PROXY:SQUID-HOST-HDR-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: Squid Proxy Host Header Bypass Technique
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3APROXY%3ASQUID-SSLBUMP-CERT.html">APP:PROXY:SQUID-SSLBUMP-CERT</a></b></th>
   <td width="500" valign="top">
    APP: Squid Proxy SSL-Bump Certificate Validation Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AQEMU-VNC-SETPIXEL-PTR-DEREF.html">APP:QEMU-VNC-SETPIXEL-PTR-DEREF</a></b></th>
   <td width="500" valign="top">
    APP: QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AQUEST-BIG-BRO-FD.html">APP:QUEST-BIG-BRO-FD</a></b></th>
   <td width="500" valign="top">
    APP: Quest Software Big Brother Arbitrary File Deletion and Overwriting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ARDP-BRUTE-FORCE.html">APP:RDP-BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    APP: Windows Remote Desktop Protocol (RDP) Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREAL%3AREAL-MPG-WIDTH.html">APP:REAL:REAL-MPG-WIDTH</a></b></th>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer MPG Width Integer Underflow Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREAL%3ARMP-FILE-OF.html">APP:REAL:RMP-FILE-OF</a></b></th>
   <td width="500" valign="top">
    APP: RealNetworks RealPlayer RMP File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREDIS-GETNUM-IO.html">APP:REDIS-GETNUM-IO</a></b></th>
   <td width="500" valign="top">
    APP: Redis Lua Scripting Component getnum Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3ACVE-2015-2373-RCE.html">APP:REMOTE:CVE-2015-2373-RCE</a></b></th>
   <td width="500" valign="top">
    APP: CVE-2015-2373 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3AMS-RDP-ACTIVEX-RCE.html">APP:REMOTE:MS-RDP-ACTIVEX-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Remote Desktop Client Unsafe ActiveX Control Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3AMS-WIN-RDP-RCE.html">APP:REMOTE:MS-WIN-RDP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Microsoft Windows Remote Desktop Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3ANETTRANSPORT-DM.html">APP:REMOTE:NETTRANSPORT-DM</a></b></th>
   <td width="500" valign="top">
    APP: NetTransport Download Manager Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-HEAP-BO.html">APP:REMOTE:RDP-HEAP-BO</a></b></th>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Client Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-MEM-OBJ.html">APP:REMOTE:RDP-MEM-OBJ</a></b></th>
   <td width="500" valign="top">
    APP: Microsoft Remote Desktop Protocol Memory Object Reference Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AREMOTE%3ARDP-RCE.html">APP:REMOTE:RDP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Remote Desktop Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AROCKET-SERVERGRAPH-CE.html">APP:ROCKET-SERVERGRAPH-CE</a></b></th>
   <td width="500" valign="top">
    APP: Rocket Servergraph Admin Center userRequest and tsmRequest Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAFENET-VPN-OF.html">APP:SAFENET-VPN-OF</a></b></th>
   <td width="500" valign="top">
    APP: SafeNet VPN Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3A3DVIS-FLIC-BO.html">APP:SAP:3DVIS-FLIC-BO</a></b></th>
   <td width="500" valign="top">
    APP: SAP 3D Visual Enterprise Viewer Flic Animation Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ACONFIGSERVLET-CMD-EXEC.html">APP:SAP:CONFIGSERVLET-CMD-EXEC</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver Portal ConfigServlet Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3AINT-GRAPHICS-PARAMS-XSS.html">APP:SAP:INT-GRAPHICS-PARAMS-XSS</a></b></th>
   <td width="500" valign="top">
    APP: SAP Internet Graphics Server PARAMS Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-BO.html">APP:SAP:NETWEAVER-BO</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver Dispatcher Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-DIAGI-DOS.html">APP:SAP:NETWEAVER-DIAGI-DOS</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver DiagiEventSource Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-DOS.html">APP:SAP:NETWEAVER-DOS</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver DiagTraceHex Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ANETWEAVER-SOAP-RCE.html">APP:SAP:NETWEAVER-SOAP-RCE</a></b></th>
   <td width="500" valign="top">
    APP: SAP NetWeaver SOAP Interface Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASAP%3ASYBASE-ESPPARSE-DOS.html">APP:SAP:SYBASE-ESPPARSE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: SAP Sybase esp_parse Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASNORT%3ABACKORIFICE-DOS.html">APP:SNORT:BACKORIFICE-DOS</a></b></th>
   <td width="500" valign="top">
    APP: Snort BackOrifice Preprocessor Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASOPHOS-WEBAPP-CMDEXEC-SSL.html">APP:SOPHOS-WEBAPP-CMDEXEC-SSL</a></b></th>
   <td width="500" valign="top">
    APP: Sophos Web Appliance SophosConfig Arbitrary Command Execution (SSL)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASPREECOMMERCE-RCE.html">APP:SPREECOMMERCE-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Spreecommerce orders.json script Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AALTIRIS-DS-SQL-INJ.html">APP:SYMC:ALTIRIS-DS-SQL-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Altiris DS SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AENCRYPTED-CMD-EXEC.html">APP:SYMC:ENCRYPTED-CMD-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Encryption Management Server Local Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-ADM-INJ.html">APP:SYMC:IM-MGR-ADM-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Symantec IM Manager Administrator Interface SQL injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-INJ.html">APP:SYMC:IM-MGR-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Symantec IM Manager Administrator Console Code Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AIM-MGR-WEB-UI-INJ.html">APP:SYMC:IM-MGR-WEB-UI-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Symantec IM Manager Web Interface ProcessAction Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3ALIVE-UPDATE-SEC-BYPASS.html">APP:SYMC:LIVE-UPDATE-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: Symantec LiveUpdate Administrator Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AMESSAGING-DIR-TRAV.html">APP:SYMC:MESSAGING-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AMGM-CONSOLE-XSS.html">APP:SYMC:MGM-CONSOLE-XSS</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Messaging Gateway Management Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AWEB-GATEWAY-CSRF.html">APP:SYMC:WEB-GATEWAY-CSRF</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Web Gateway Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AWEB-GATEWAY-OS-CMD-INJ.html">APP:SYMC:WEB-GATEWAY-OS-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AWG-PBCONTROL.html">APP:SYMC:WG-PBCONTROL</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway pbcontrol.php Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ASYMC%3AWORKSPACE-RCE.html">APP:SYMC:WORKSPACE-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Symantec Workspace Streaming 7.5.0.493 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-CREATE-BIND-OF.html">APP:TMIC:SP-CREATE-BIND-OF</a></b></th>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect Create Binding DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3ATMIC%3ASP-EARTH-AGENT-OF.html">APP:TMIC:SP-EARTH-AGENT-OF</a></b></th>
   <td width="500" valign="top">
    APP: Trend Micro ServerProtect Earth Agent DCE-RPC Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AUNIVERSAL-CMDB-AXIS2-RCE.html">APP:UNIVERSAL-CMDB-AXIS2-RCE</a></b></th>
   <td width="500" valign="top">
    APP: HP Universal CMDB Server Axis2 Default Credentials Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-DSN-BOF.html">APP:UPNP:LIBUPNP-DSN-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp Device Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-ROOT-DSN-BOF.html">APP:UPNP:LIBUPNP-ROOT-DSN-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp Root Device Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AUPNP%3ALIBUPNP-UUID-BOF.html">APP:UPNP:LIBUPNP-UUID-BOF</a></b></th>
   <td width="500" valign="top">
    APP: Portable SDK for UPnP Devices libupnp UUID Service Name Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AUPNP%3AMINIUPNPD-DOS.html">APP:UPNP:MINIUPNPD-DOS</a></b></th>
   <td width="500" valign="top">
    APP: MiniUPnPd Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVCENTER-JMX-RCE.html">APP:VCENTER-JMX-RCE</a></b></th>
   <td width="500" valign="top">
    APP: VMware vCenter Server JMX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVCENTER-JMX-RCE2.html">APP:VCENTER-JMX-RCE2</a></b></th>
   <td width="500" valign="top">
     APP: VMware vCenter Server JMX Remote Code Execution 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVIDEOSPIRIT-OF.html">APP:VIDEOSPIRIT-OF</a></b></th>
   <td width="500" valign="top">
    APP: VideoSpirit valitem Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVINZANT-ARCHTCTR-AUTHWKNESS.html">APP:VINZANT-ARCHTCTR-AUTHWKNESS</a></b></th>
   <td width="500" valign="top">
    APP: Vinzant Global ECS Architectural Authentication Weakness
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVMAUTH-FS.html">APP:VMAUTH-FS</a></b></th>
   <td width="500" valign="top">
    APP: VMware Authorization Service User Credential Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVMWARE-OVF-FMTSTR.html">APP:VMWARE-OVF-FMTSTR</a></b></th>
   <td width="500" valign="top">
    APP: VMware OVF Tools Format String
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AVMWARE-VCENTER-CHARGEBACK.html">APP:VMWARE-VCENTER-CHARGEBACK</a></b></th>
   <td width="500" valign="top">
    APP: VMWare VCenter Chargeback Manager ImageUploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AWEBSENSE-FAV-BYPASS.html">APP:WEBSENSE-FAV-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: Multiple Websense Products &#39;favorites.exe&#39; Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AWEBSENSE-PROXY-BYPASS.html">APP:WEBSENSE-PROXY-BYPASS</a></b></th>
   <td width="500" valign="top">
    APP: Websense Proxy Filter Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="APP%3AWEBSENSE-TRITON-RCE.html">APP:WEBSENSE-TRITON-RCE</a></b></th>
   <td width="500" valign="top">
    APP: Websense Triton &#39;ws_irpt.exe&#39; Remote Command Execution Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="CHAT%3AIRC%3ABOTNET%3ARA1NX-BOT-CE.html">CHAT:IRC:BOTNET:RA1NX-BOT-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Ra1NX PHP Bot PubCall Authentication Bypass Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AIBM-SOLIDBD-WHERE-DOS.html">DB:IBM-SOLIDBD-WHERE-DOS</a></b></th>
   <td width="500" valign="top">
    DB: IBM solidDB Redundant WHERE Clause Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AIBM-SOLIDDB-ROWNUM.html">DB:IBM-SOLIDDB-ROWNUM</a></b></th>
   <td width="500" valign="top">
    DB: IBM solidDB ROWNUM Subquery Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMONGODB-NATIVEHELPER-RCE.html">DB:MONGODB-NATIVEHELPER-RCE</a></b></th>
   <td width="500" valign="top">
    DB: MongoDB nativeHelper.apply Feature Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMS-SQL%3ACOMMAND-BO.html">DB:MS-SQL:COMMAND-BO</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Multiple Commands Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMS-SQL%3ASQLMON-STACK-OFLOW.html">DB:MS-SQL:SQLMON-STACK-OFLOW</a></b></th>
   <td width="500" valign="top">
    DB: MS-SQL SQLMON Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3ABENCHMARK-DOS.html">DB:MYSQL:BENCHMARK-DOS</a></b></th>
   <td width="500" valign="top">
    DB: MySQL Excessive Benchmark Commands
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3ABRUTE-FORCE.html">DB:MYSQL:BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    DB: MySQL &quot;Brute-Force&quot; Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3ACLIENT-BOF.html">DB:MYSQL:CLIENT-BOF</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Client Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AGEOMETRY-INT-OVF.html">DB:MYSQL:GEOMETRY-INT-OVF</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Server Geometry Query Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AGRANT-FILE-BO.html">DB:MYSQL:GRANT-FILE-BO</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Grant File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AMOF-EXEC.html">DB:MYSQL:MOF-EXEC</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL MOF Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AORACLE-XPATH-DOS.html">DB:MYSQL:ORACLE-XPATH-DOS</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Server XPath Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AUPDATEXML-DOS.html">DB:MYSQL:UPDATEXML-DOS</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL UpdateXML Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AUSER-ENUMERATION.html">DB:MYSQL:USER-ENUMERATION</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL User Enumeration Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AWIN-RCE.html">DB:MYSQL:WIN-RCE</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Windows Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AMYSQL%3AWINDOWS-REMOTE-ROOT.html">DB:MYSQL:WINDOWS-REMOTE-ROOT</a></b></th>
   <td width="500" valign="top">
    DB: Oracle MySQL Windows Remote Root Exploitation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AJVM-EXP-PERMS.html">DB:ORACLE:DBMS:JVM-EXP-PERMS</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_JVM_EXP_PERMS Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3ADBMS%3AOUTPUT-TO-JAVA.html">DB:ORACLE:DBMS:OUTPUT-TO-JAVA</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Database DBMS_JAVA.SET_OUTPUT_TO_JAVA Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3ADECLARE-EXEC.html">DB:ORACLE:DECLARE-EXEC</a></b></th>
   <td width="500" valign="top">
    DB: TNS Declare/Exec SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3AEVTDUMP.html">DB:ORACLE:EVTDUMP</a></b></th>
   <td width="500" valign="top">
    DB: Oracle TimesTen In-Memory Database evtdump
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3AMETAFILE-PARSER-DOS.html">DB:ORACLE:METAFILE-PARSER-DOS</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Outside In OS 2 Metafile Parser Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3AOUTSIDE-IN-XPM-IMG-BO.html">DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Outside In XPM Image Processing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3ASYS%3ALPXFSMSAX-NAME-BO.html">DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Database Server LpxFSMSax QName Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3AORACLE%3ATNS%3ASERVICE-AUTH.html">DB:ORACLE:TNS:SERVICE-AUTH</a></b></th>
   <td width="500" valign="top">
    DB: Oracle Database TNS Listener Service Registration Lack of Authentication
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3ADBNAME-CLIFLAGINJ.html">DB:POSTGRESQL:DBNAME-CLIFLAGINJ</a></b></th>
   <td width="500" valign="top">
    DB: PostgreSQL Database Name Command-line Flag Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3AGEO-OPS-PATH-IN.html">DB:POSTGRESQL:GEO-OPS-PATH-IN</a></b></th>
   <td width="500" valign="top">
    DB: PostgreSQL Database geo_ops path_in Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DB%3APOSTGRESQL%3APOSTGRE-DBSEC-BP.html">DB:POSTGRESQL:POSTGRE-DBSEC-BP</a></b></th>
   <td width="500" valign="top">
    DB: PostgreSQL Database Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DDOS%3ADIRTJUMPER.html">DDOS:DIRTJUMPER</a></b></th>
   <td width="500" valign="top">
    DDOS: Dirt Jumper C&amp;C Communication
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DDOS%3ALOIC-ANONYMOUS-HTTP.html">DDOS:LOIC-ANONYMOUS-HTTP</a></b></th>
   <td width="500" valign="top">
    DDOS: LOIC Anonymous HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DDOS%3ALOIC-WEB.html">DDOS:LOIC-WEB</a></b></th>
   <td width="500" valign="top">
    DDOS: Low Orbit Ion Cannon Webpage Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DHCP%3AEXPLOIT%3AMSG-TOO-SHORT.html">DHCP:EXPLOIT:MSG-TOO-SHORT</a></b></th>
   <td width="500" valign="top">
    DHCP: Message Too Short
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DHCP%3ASERVER%3AGNU-BASH-CMD-EXE.html">DHCP:SERVER:GNU-BASH-CMD-EXE</a></b></th>
   <td width="500" valign="top">
    DHCP: GNU Bash Environment Variable Handling Command Execution DHCP Vector
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DHCP%3ASERVER%3AISC-MAL-CLID.html">DHCP:SERVER:ISC-MAL-CLID</a></b></th>
   <td width="500" valign="top">
    DHCP: ISC DHCP Server Malformed Client Identifier Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AAUDIT%3AMISMATCHING-AN-CNAME.html">DNS:AUDIT:MISMATCHING-AN-CNAME</a></b></th>
   <td width="500" valign="top">
    DNS: Mismatching Reply AN in CNAME
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AAUDIT%3AUNASSIGNED-OPCODE.html">DNS:AUDIT:UNASSIGNED-OPCODE</a></b></th>
   <td width="500" valign="top">
    DNS: Unassigned Opcode
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AAUDIT%3AZ-RESERVED-OPT.html">DNS:AUDIT:Z-RESERVED-OPT</a></b></th>
   <td width="500" valign="top">
    DNS: Z Option Set
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ABIND-DBC-ASSERT-DOS.html">DNS:BIND-DBC-ASSERT-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND db.c Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ABIND9-ASSERT-DOS.html">DNS:BIND9-ASSERT-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: Bind9 Assertion Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-KEYPARSE-DOS.html">DNS:EXPLOIT:BIND-KEYPARSE-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND DNSSEC Key Parsing Buffer Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3ABIND-OPENPGPKEY-DOS.html">DNS:EXPLOIT:BIND-OPENPGPKEY-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND openpgpkey Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AEXPLOIT%3AISC-BIND-RDATA-DOS.html">DNS:EXPLOIT:ISC-BIND-RDATA-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND RDATA Records Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AGNUTLS-DANE-BOF.html">DNS:GNUTLS-DANE-BOF</a></b></th>
   <td width="500" valign="top">
    DNS: GnuTLS DANE dane.c Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AISC-BIND-DNSSEC-DOS.html">DNS:ISC-BIND-DNSSEC-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND DNSSEC Validation Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AISC-BIND-EDNS-OPT-DOS.html">DNS:ISC-BIND-EDNS-OPT-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND EDNS Option Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AISC-BIND-TKEY-DOS.html">DNS:ISC-BIND-TKEY-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND  TKEY Queries Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AISC-INSIST-DOS.html">DNS:ISC-INSIST-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND apl_42.c INSIST Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AMS-FOREFRONT-RCE.html">DNS:MS-FOREFRONT-RCE</a></b></th>
   <td width="500" valign="top">
    DNS: Microsoft Forefront Threat Management Gateway Client Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AMS-ISA-CE.html">DNS:MS-ISA-CE</a></b></th>
   <td width="500" valign="top">
    DNS: Microsoft Internet Security Acceleration Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3AGNU-C-GLIBC.html">DNS:OVERFLOW:GNU-C-GLIBC</a></b></th>
   <td width="500" valign="top">
    DNS: GNU C Library glibc getanswer_r Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AOVERFLOW%3ATFTPD32.html">DNS:OVERFLOW:TFTPD32</a></b></th>
   <td width="500" valign="top">
    DNS: Tftpd32 DNS Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3APDNS-AUTHSERV-DOS.html">DNS:PDNS-AUTHSERV-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: PowerDNS Authoritative Server DNS Packet Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3APOWERDNS-NAMESRVR-UDP-DOS.html">DNS:POWERDNS-NAMESRVR-UDP-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: PowerDNS Nameserver Label Decompression Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3APOWERDNS-NAMSRVR-TCP-DOS.html">DNS:POWERDNS-NAMSRVR-TCP-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: PowerDNS Nameserver Label Decompression DOS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AQUERY%3AISC-BIND-NSEC3-DOS.html">DNS:QUERY:ISC-BIND-NSEC3-DOS</a></b></th>
   <td width="500" valign="top">
    DNS: ISC BIND NSEC3-Signed Zones Queries Processing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AQUERY%3ANULL-QUERY.html">DNS:QUERY:NULL-QUERY</a></b></th>
   <td width="500" valign="top">
    DNS: Null Query
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AREPERR%3ANAPRT-IOF.html">DNS:REPERR:NAPRT-IOF</a></b></th>
   <td width="500" valign="top">
    DNS: Name Authority Pointer Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AREPERR%3ANULL-RDATA-LEN.html">DNS:REPERR:NULL-RDATA-LEN</a></b></th>
   <td width="500" valign="top">
    DNS: Null RDATA Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ARRSIG-QUERY.html">DNS:RRSIG-QUERY</a></b></th>
   <td width="500" valign="top">
    DNS: RRSIG Query
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ATUNNEL%3AI2P-DNS-QUERY.html">DNS:TUNNEL:I2P-DNS-QUERY</a></b></th>
   <td width="500" valign="top">
    DNS: I2P Address Query
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ATUNNEL%3ANULL-RECORD.html">DNS:TUNNEL:NULL-RECORD</a></b></th>
   <td width="500" valign="top">
    DNS: NULL Record Type
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3ATUNNEL%3ASHORT-TTL.html">DNS:TUNNEL:SHORT-TTL</a></b></th>
   <td width="500" valign="top">
    DNS: Short Time To Live Response
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DNS%3AWORDPRESS-SOAK-SOAK-MALWARE.html">DNS:WORDPRESS-SOAK-SOAK-MALWARE</a></b></th>
   <td width="500" valign="top">
    DNS: Wordpress Soak Soak Malware Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3ADELL-NETVAULT-DOS.html">DOS:DELL-NETVAULT-DOS</a></b></th>
   <td width="500" valign="top">
    DOS: Dell NetVault Backup Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3AFREEBSD-ROUTED-DAEMON.html">DOS:FREEBSD-ROUTED-DAEMON</a></b></th>
   <td width="500" valign="top">
    DOS: FreeBSD Routed Daemon Routing Information Protocol Assertion Failure Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3ANETDEV%3AD-LINK-DNS-320.html">DOS:NETDEV:D-LINK-DNS-320</a></b></th>
   <td width="500" valign="top">
    DOS: D-Link DNS-320 ShareCenter Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3ASLOWHTTPTEST-TOOL.html">DOS:SLOWHTTPTEST-TOOL</a></b></th>
   <td width="500" valign="top">
    DOS: SlowHTTPTest HTTP Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AHTTP-SYS.html">DOS:WINDOWS:HTTP-SYS</a></b></th>
   <td width="500" valign="top">
    DOS: Windows Server HTTP.sys Denial of Service 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="DOS%3AWINDOWS%3AISCSI-TARGET.html">DOS:WINDOWS:ISCSI-TARGET</a></b></th>
   <td width="500" valign="top">
    DOS: Microsoft Windows iSCSI Target CVE-2014-0255
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AGET-CMD-DIR-TRAV-2.html">FTP:COMMAND:GET-CMD-DIR-TRAV-2</a></b></th>
   <td width="500" valign="top">
    FTP: Multiple FTP Server GET Command Directory Traversal 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ACOMMAND%3AMALICIOUS-CHARS.html">FTP:COMMAND:MALICIOUS-CHARS</a></b></th>
   <td width="500" valign="top">
    FTP: Malicious Characters In FTP Commands
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ACOMMAND%3ASTOR-RHOSTS.html">FTP:COMMAND:STOR-RHOSTS</a></b></th>
   <td width="500" valign="top">
    FTP: STOR RHOSTS File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AEXPLOIT%3ALEAPFTP-CLI-BO.html">FTP:EXPLOIT:LEAPFTP-CLI-BO</a></b></th>
   <td width="500" valign="top">
    FTP: LeapWare LeapFTP PASV Reply Client Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AFILE%3AFREEFLOAT-AUTH-BYPASS.html">FTP:FILE:FREEFLOAT-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    FTP: FreeFloat FTP Server Authorization Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AFORMAT-STRING-IN-CMD.html">FTP:FORMAT-STRING-IN-CMD</a></b></th>
   <td width="500" valign="top">
    FTP: Format String in FTP Command
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AMS-FTP%3AIIS-BOF.html">FTP:MS-FTP:IIS-BOF</a></b></th>
   <td width="500" valign="top">
    FTP: IIS Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ACMD-NOOP-SLED.html">FTP:OVERFLOW:CMD-NOOP-SLED</a></b></th>
   <td width="500" valign="top">
    FTP: Command NOOP Sled Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ACMD-OF.html">FTP:OVERFLOW:CMD-OF</a></b></th>
   <td width="500" valign="top">
    FTP: Command Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AFREE-FTPD-PASS.html">FTP:OVERFLOW:FREE-FTPD-PASS</a></b></th>
   <td width="500" valign="top">
    FTP: freeFTPd PASS Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3ALINE-TOO-LONG.html">FTP:OVERFLOW:LINE-TOO-LONG</a></b></th>
   <td width="500" valign="top">
    FTP: Line Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APASS-TOO-LONG.html">FTP:OVERFLOW:PASS-TOO-LONG</a></b></th>
   <td width="500" valign="top">
    FTP: Password Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APATH-TOO-LONG.html">FTP:OVERFLOW:PATH-TOO-LONG</a></b></th>
   <td width="500" valign="top">
    FTP: Pathname Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3APCMAN-STOR-BOF.html">FTP:OVERFLOW:PCMAN-STOR-BOF</a></b></th>
   <td width="500" valign="top">
    FTP: PCMan&#39;s FTP Server STOR Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AREST-INT-OF.html">FTP:OVERFLOW:REST-INT-OF</a></b></th>
   <td width="500" valign="top">
    FTP: REST Command Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AOVERFLOW%3AUSERNAME-2-LONG.html">FTP:OVERFLOW:USERNAME-2-LONG</a></b></th>
   <td width="500" valign="top">
    FTP: Username Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3APASSWORD%3ABRUTE-FORCE.html">FTP:PASSWORD:BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    FTP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ASERVU%3ACHMOD-OVERFLOW.html">FTP:SERVU:CHMOD-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    FTP: ServU CHMOD Filename Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ASHELLSHOCK.html">FTP:SHELLSHOCK</a></b></th>
   <td width="500" valign="top">
    FTP: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3ASYMLINKS-WGET-INPT-VALID.html">FTP:SYMLINKS-WGET-INPT-VALID</a></b></th>
   <td width="500" valign="top">
    FTP: GNU wget FTP Remote File Creation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="FTP%3AVSFTPD-BACKDOOR.html">FTP:VSFTPD-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    FTP: VSFTPd Backdoor Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AADOBE-FLASH-PLAYER-BO.html">HTTP:ADOBE-FLASH-PLAYER-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AADOBE-FLASHPLYR-PRIV-ESC.html">HTTP:ADOBE-FLASHPLYR-PRIV-ESC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AADOBE-INDESIGN-SOAP-RCE.html">HTTP:ADOBE-INDESIGN-SOAP-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe IndesignServer SOAP Server Arbitrary Script Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AALLATORI-JAVA-OBFUSCATOR.html">HTTP:ALLATORI-JAVA-OBFUSCATOR</a></b></th>
   <td width="500" valign="top">
    HTTP: Allatori Obfuscated Java .jar File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPACHE-CHUNKREQ-DOS.html">HTTP:APACHE:APACHE-CHUNKREQ-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Malformed Chunk Request Handling Remote Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAPR-UTIL-LIB-DOS.html">HTTP:APACHE:APR-UTIL-LIB-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache apr-util IPv6 URI Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AAXIS-SOAP-DOS.html">HTTP:APACHE:AXIS-SOAP-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Axis Multiple Vendor SOAP Arrays Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ACAMEL-XSLT-JCE.html">HTTP:APACHE:CAMEL-XSLT-JCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Camel XSLT Component Java Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ACOUCHDB-UUID-DOS.html">HTTP:APACHE:COUCHDB-UUID-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache CouchDB CVE-2014-2668 UUID Request Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ADAV-SVN-HEAP-OVRFLW.html">HTTP:APACHE:DAV-SVN-HEAP-OVRFLW</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Subversion mod_dav_svn Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AFILEUPLOAD-CNT-TYPE.html">HTTP:APACHE:FILEUPLOAD-CNT-TYPE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Tomcat FileUpload Content-Type Header Infinite Loop
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTTPD-ERROR-400.html">HTTP:APACHE:HTTPD-ERROR-400</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache HTTPD Error Code 400 httpOnly Cookie Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AHTTPD-MODLOG-COOKIE.html">HTTP:APACHE:HTTPD-MODLOG-COOKIE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache HTTPD mod_log_config Cookie Handling Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-LOG-CONFIG-DOS.html">HTTP:APACHE:MOD-LOG-CONFIG-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_log_config Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AMOD-REWRITE-CMD-EXE.html">HTTP:APACHE:MOD-REWRITE-CMD-EXE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server mod_rewrite RewriteLog Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AREV-PROXY-EXPLOIT.html">HTTP:APACHE:REV-PROXY-EXPLOIT</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache HTTP Server Reverse Proxy/Rewrite URL Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3AROLLER-OGNL-RCE.html">HTTP:APACHE:ROLLER-OGNL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Roller OGNL Injection Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASERVER-STATUS-PROBE.html">HTTP:APACHE:SERVER-STATUS-PROBE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache server-status Page Probe Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASOLR-FILE-DISC.html">HTTP:APACHE:SOLR-FILE-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Solr SolrResourceLoader Arbitrary File Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-CI-SECBYPASS.html">HTTP:APACHE:STRUTS-CI-SECBYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts CookieInterceptor Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-INCLUDPARAMS.html">HTTP:APACHE:STRUTS-INCLUDPARAMS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts includeParams Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-OGNL-CE.html">HTTP:APACHE:STRUTS-OGNL-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts Wildcard Matching OGNL Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-OGNL-CMDEXEC.html">HTTP:APACHE:STRUTS-OGNL-CMDEXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts OGNL Expression Parsing Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-RCE.html">HTTP:APACHE:STRUTS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-SECBYPASS.html">HTTP:APACHE:STRUTS-SECBYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts Improper classLoader Parameter Handling Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-SKILLNAME-CE.html">HTTP:APACHE:STRUTS-SKILLNAME-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts2 skillName Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-URI-CMDEXEC.html">HTTP:APACHE:STRUTS-URI-CMDEXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Multiple URI Parameters Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS-URIREDIRECT.html">HTTP:APACHE:STRUTS-URIREDIRECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Multiple URI Parameters Arbitrary Redirection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-COOKIE-OGNL.html">HTTP:APACHE:STRUTS2-COOKIE-OGNL</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 CookieInterceptor OGNL Script Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPACHE%3ASTRUTS2-OGNL-INJ.html">HTTP:APACHE:STRUTS2-OGNL-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 ConversionErrorInterceptor OGNL Script Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAPPLE-SAFARI-BYPASS.html">HTTP:APPLE-SAFARI-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple Safari URL Handling Cross-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AATLASIAN-JIRA-DIR-TRAVER.html">HTTP:ATLASIAN-JIRA-DIR-TRAVER</a></b></th>
   <td width="500" valign="top">
    HTTP: Atlassian JIRA Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AAUTOCAD-FAS-FILE-EXEC.html">HTTP:AUTOCAD-FAS-FILE-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Autodesk AutoCAD Insecure FAS File Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ABACKDOOR-UPATRE-UA.html">HTTP:BACKDOOR-UPATRE-UA</a></b></th>
   <td width="500" valign="top">
    Suspicious Backdoor Upatre User Agent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ABROWSER%3ACHROME-JS-ENG-MC.html">HTTP:BROWSER:CHROME-JS-ENG-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome V8 JavaScript Engine Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AC99-SHELL-BACKDOOR.html">HTTP:C99-SHELL-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    TROJAN: C99 Backdoor Actiivity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACARBERP-BACKDOOR-RCE.html">HTTP:CARBERP-BACKDOOR-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Carberp Backdoor Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AAWC-XSL-CMD-INJ.html">HTTP:CGI:AWC-XSL-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Audio and Web Conferencing xsl Parameter Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-CODE-INJECTION.html">HTTP:CGI:BASH-CODE-INJECTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-INJECTION-HEADER.html">HTTP:CGI:BASH-INJECTION-HEADER</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection In Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ABASH-INJECTION-URL.html">HTTP:CGI:BASH-INJECTION-URL</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Code Injection In URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AGENERIC-WEB-APP-CE.html">HTTP:CGI:GENERIC-WEB-APP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Generic Web Application Unix Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AGROUNDWORK-MONITOR-CE.html">HTTP:CGI:GROUNDWORK-MONITOR-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: GroundWork Monitor Enterprise Monarch Component Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AMAGENTO-RCE.html">HTTP:CGI:MAGENTO-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Magento Web Application Parameter Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AMOVABLE-TYPE-UPGRADE.html">HTTP:CGI:MOVABLE-TYPE-UPGRADE</a></b></th>
   <td width="500" valign="top">
    HTTP: Movable Type Upgrade Script Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AMS-OFFICE-URL-BOF.html">HTTP:CGI:MS-OFFICE-URL-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office XP URL Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-CORE-DOS.html">HTTP:CGI:NAGIOS-CORE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Nagios core CGI Process_cgivars Off-By-One
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-HISTORY-PRM-BO.html">HTTP:CGI:NAGIOS-HISTORY-PRM-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Nagios history.cgi Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ANAGIOS-XI-AUTODISC-CMD.html">HTTP:CGI:NAGIOS-XI-AUTODISC-CMD</a></b></th>
   <td width="500" valign="top">
    HTTP: Nagios XI Autodiscovery Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3ASHELLSHOCK.html">HTTP:CGI:SHELLSHOCK</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACGI%3AZAMFOO-CMD-INJ.html">HTTP:CGI:ZAMFOO-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: ZamFoo Reseller Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3AASA-VPN-SEC-BYPASS.html">HTTP:CISCO:ASA-VPN-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco ASA SSL WebVPN Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACONTROLLER-CSRF.html">HTTP:CISCO:CONTROLLER-CSRF</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Wireless Lan Controller 7.2.110.0 CSRF
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ACUCM-DIR-TRAV.html">HTTP:CISCO:CUCM-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Unified Communications Manager IVRGetAudioFile.do Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ADOWNLOADSERVLET-FU.html">HTTP:CISCO:DOWNLOADSERVLET-FU</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager DownloadServlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3AFILEUPLOADSERVLET.html">HTTP:CISCO:FILEUPLOADSERVLET</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager FileUploadServlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-CMD-INJ.html">HTTP:CISCO:LINKSYS-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-CODE-INJ.html">HTTP:CISCO:LINKSYS-CODE-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Linksys WRT110 Router Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-WRT54GL-CSRF.html">HTTP:CISCO:LINKSYS-WRT54GL-CSRF</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Password Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3ALINKSYS-WRT54GL-XSS.html">HTTP:CISCO:LINKSYS-WRT54GL-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Linksys WRT54GL Cross-site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3APROCESSIMAGESAVE-FU.html">HTTP:CISCO:PROCESSIMAGESAVE-FU</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Prime Data Center Network Manager processImageSave.jsp Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACISCO%3AWIFI-CONTROLLER-DOS.html">HTTP:CISCO:WIFI-CONTROLLER-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Cisco Wireless Lan Controller 7.2.110.0 DOS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACLANSPHERE-COOKIE-LFI.html">HTTP:CLANSPHERE-COOKIE-LFI</a></b></th>
   <td width="500" valign="top">
    HTTP: ClanSphere 2011.3 Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3ACVE-2013-3336.html">HTTP:COLDFUSION:CVE-2013-3336</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion CVE-2013-3336 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ACOLDFUSION%3AXML-CMD-INJ.html">HTTP:COLDFUSION:XML-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe ColdFusion/BlazeDS/LiveCycle XML Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3ACA-ERWIN-WEB-PORTAL.html">HTTP:DIR:CA-ERWIN-WEB-PORTAL</a></b></th>
   <td width="500" valign="top">
    HTTP: CA ERwin Web Portal Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AENDECA-ETLSERVER-DT.html">HTTP:DIR:ENDECA-ETLSERVER-DT</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Information Discovery Integrator ETL Server MoveFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHP-LOADRUNNER-EMU.html">HTTP:DIR:HP-LOADRUNNER-EMU</a></b></th>
   <td width="500" valign="top">
    HTTP: HP LoadRunner Virtual User Generator EmulationAdmin Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-ENCODING.html">HTTP:DIR:HTTP-ACCEPT-ENCODING</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Accept Encoding Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-HDR.html">HTTP:DIR:HTTP-ACCEPT-HDR</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Accept Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-ACCEPT-LANG.html">HTTP:DIR:HTTP-ACCEPT-LANG</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Accept Language Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-AUTH-HDR.html">HTTP:DIR:HTTP-AUTH-HDR</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Authorization Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-CONT-TYPE.html">HTTP:DIR:HTTP-CONT-TYPE</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Content Type Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-CONTENT-MD5.html">HTTP:DIR:HTTP-CONTENT-MD5</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Content md5 Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-HOST-HDR.html">HTTP:DIR:HTTP-HOST-HDR</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal Detected on HTTP Host Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AHTTP-REFERER-HDR.html">HTTP:DIR:HTTP-REFERER-HDR</a></b></th>
   <td width="500" valign="top">
    HTTP: Directory Traversal detected on HTTP Referer Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AMANAGEENGINE.html">HTTP:DIR:MANAGEENGINE</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products File Attachment Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AMANAGEENGINE-DIR-TRA.html">HTTP:DIR:MANAGEENGINE-DIR-TRA</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine ServiceDesk File Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AMNGE-ENGINE-FILE-DLD.html">HTTP:DIR:MNGE-ENGINE-FILE-DLD</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine NetFlow Analyzer Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AMS-SHAREPOINT.html">HTTP:DIR:MS-SHAREPOINT</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3ANOVELL-GROUPWSE-DIRTRA.html">HTTP:DIR:NOVELL-GROUPWSE-DIRTRA</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Admin Service FileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3ANOVELL-ZENWORKS-TRAV.html">HTTP:DIR:NOVELL-ZENWORKS-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AORACLE-HYPERION-TRAV.html">HTTP:DIR:ORACLE-HYPERION-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Hyperion 11 Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AORACLE-INFO-DISCOVERY.html">HTTP:DIR:ORACLE-INFO-DISCOVERY</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AREPRISE-EDIT-IFPROCESS.html">HTTP:DIR:REPRISE-EDIT-IFPROCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Reprise License Manager edit_lf_process Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3ATRAV-ENCODED.html">HTTP:DIR:TRAV-ENCODED</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple HTTP Server Encoded Directory Traversal Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AVISUALMINING-NETCHARTS.html">HTTP:DIR:VISUALMINING-NETCHARTS</a></b></th>
   <td width="500" valign="top">
    HTTP: Visual Mining NetCharts Server File Upload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADIR%3AWP-UNGALLERY-LFD.html">HTTP:DIR:WP-UNGALLERY-LFD</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress UnGallery &#39;pic&#39; Parameter Local File Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADLINK-AUTHENTICATION-BO.html">HTTP:DLINK-AUTHENTICATION-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Dlink Authentication CGI Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADLL-REQ-VIA-WEBDAV.html">HTTP:DLL-REQ-VIA-WEBDAV</a></b></th>
   <td width="500" valign="top">
    HTTP: DLL File Download via WebDAV
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3ADRUPAL-XML-RPC-IEE.html">HTTP:DOS:DRUPAL-XML-RPC-IEE</a></b></th>
   <td width="500" valign="top">
    HTTP: Drupal Core XML-RPC Endpoint Internal Entity Expansion Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3ADRUPAL-XMLRPC-TAGS.html">HTTP:DOS:DRUPAL-XMLRPC-TAGS</a></b></th>
   <td width="500" valign="top">
    HTTP: Drupal Core XML-RPC Endpoint Tags Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3AGOLDENEYE-DOS.html">HTTP:DOS:GOLDENEYE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: GoldenEye HTTP Denial Of Service Tool
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3AHULK-DOS.html">HTTP:DOS:HULK-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: HULK Unbearable Load Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3ASCHNEIDER-EXPRT-SCADA.html">HTTP:DOS:SCHNEIDER-EXPRT-SCADA</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric SCADA Expert ClearSCADA Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ADOS%3ASQUID-HDR-RANGE.html">HTTP:DOS:SQUID-HDR-RANGE</a></b></th>
   <td width="500" valign="top">
    HTTP: Squid Range Header Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEK-ANGLER-JAVA.html">HTTP:EK-ANGLER-JAVA</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Exploit Kit Angler Java
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEMC-DPA-EJBSERVLET-RCE.html">HTTP:EMC-DPA-EJBSERVLET-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: EMC Data Protection Advisor Illuminator EJBInvokerServlet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ABRUTE-FORCE.html">HTTP:EXPLOIT:BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AD-LINK-ADMIN-PW.html">HTTP:EXPLOIT:D-LINK-ADMIN-PW</a></b></th>
   <td width="500" valign="top">
    HTTP: D-Link Admin Password Probe
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AILLEGAL-HOST-CHAR.html">HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</a></b></th>
   <td width="500" valign="top">
    HTTP: Illegal Characters in Host Header Field
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AMS-TCPSTACK-URLDOS.html">HTTP:EXPLOIT:MS-TCPSTACK-URLDOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TCP-IP Stack URL QoS Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3ASLASH-EVASION.html">HTTP:EXPLOIT:SLASH-EVASION</a></b></th>
   <td width="500" valign="top">
    HTTP: Blackhole Forward-Slash Evasion Technique
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AEXPLOIT%3AURI-RANDOM-HOST.html">HTTP:EXPLOIT:URI-RANDOM-HOST</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious URI Request with Randomized Host Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AFORTINET-HELLO-MSG-BOF.html">HTTP:FORTINET-HELLO-MSG-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Fortinet Single Sign On Message Dispatcher Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AFORTINET-HELLO-MSG-DOS.html">HTTP:FORTINET-HELLO-MSG-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Fortinet Single Sign On Hello Message Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AFTP-ACTIVEX-CE.html">HTTP:FTP-ACTIVEX-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Attachmate Reflection FTP Client ActiveX CE
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AGLPI-INSTALLPHP-RCE.html">HTTP:GLPI-INSTALLPHP-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: GLPI install.php Script Arbitrary Command and SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AHP-SITESCOPE-INF-DISC.html">HTTP:HP-SITESCOPE-INF-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: HP SiteScope Log Analyzer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AHTTP-INVALID-PORT-VALUE.html">HTTP:HTTP-INVALID-PORT-VALUE</a></b></th>
   <td width="500" valign="top">
    HTTP: Invalid Port Value in Host Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-NET-FORM-REDIRECT.html">HTTP:IIS:ASP-NET-FORM-REDIRECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Form Authentication Insecure Redirect 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AASP-NET-MVC-SEC-BYPASS.html">HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: ASP.NET MVC Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AASPX-URL.html">HTTP:IIS:ASPX-URL</a></b></th>
   <td width="500" valign="top">
    HTTP: IIS Crafted ASP URL Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3ADOT-NET-SERVER-DOS.html">HTTP:IIS:DOT-NET-SERVER-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Dot Net Technology  Server Side Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3ASINGLE-DIG-1.html">HTTP:IIS:ENCODING:SINGLE-DIG-1</a></b></th>
   <td width="500" valign="top">
    HTTP: IIS Single Encoding (1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AENCODING%3ASINGLE-DIG-2.html">HTTP:IIS:ENCODING:SINGLE-DIG-2</a></b></th>
   <td width="500" valign="top">
    HTTP: IIS Single Encoding (2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-6-7-AUTH-BYPASS.html">HTTP:IIS:IIS-6-7-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    Microsoft IIS 6.0 / 7.5 Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AIIS-AUTH-BYPASS.html">HTTP:IIS:IIS-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Information Services (IIS) Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AINT-OVERFLOW-DOS.html">HTTP:IIS:INT-OVERFLOW-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: IIS Webserver Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AMS-RD-WEB-ACCESS-XSS.html">HTTP:IIS:MS-RD-WEB-ACCESS-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Remote Desktop Web Access Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AMS-SHAREPOINT-DOS.html">HTTP:IIS:MS-SHAREPOINT-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AODATA-PROTOCOL-DOS.html">HTTP:IIS:ODATA-PROTOCOL-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Information Services OData web applications Protocol Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3ASHAREPOINT-MUL-XSS.html">HTTP:IIS:SHAREPOINT-MUL-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3ASP-SCRIPTRESX-XSS.html">HTTP:IIS:SP-SCRIPTRESX-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint scriptresx.ashx Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEB-CONFIG-INFO-LEAK.html">HTTP:IIS:WEB-CONFIG-INFO-LEAK</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IIS Web.config Information Disclosure Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AIIS%3AWEBDAV%3AWINDOWS-SHELL.html">HTTP:IIS:WEBDAV:WINDOWS-SHELL</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Shell File Name Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABOOT-INI.html">HTTP:INFO-LEAK:BOOT-INI</a></b></th>
   <td width="500" valign="top">
    HTTP: boot.ini Probe
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ABOOT-INI-TCP.html">HTTP:INFO-LEAK:BOOT-INI-TCP</a></b></th>
   <td width="500" valign="top">
    HTTP: boot.ini Probe over TCP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ACA-TOTAL-DEFENSE.html">HTTP:INFO-LEAK:CA-TOTAL-DEFENSE</a></b></th>
   <td width="500" valign="top">
    HTTP: CA Total Defense Suite UNCWS getDBConfigSettings Credential Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AF5-BIG-IP-XML.html">HTTP:INFO-LEAK:F5-BIG-IP-XML</a></b></th>
   <td width="500" valign="top">
    HTTP: F5 BIG-IP XML Entity References Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AHP-SITESCOPE.html">HTTP:INFO-LEAK:HP-SITESCOPE</a></b></th>
   <td width="500" valign="top">
    HTTP: HP SiteScope integrationViewer Default Credentials
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AIBM-FP-SERLET.html">HTTP:INFO-LEAK:IBM-FP-SERLET</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Rational Focal Point Login And RequestAccessController Servlet Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AJETY-SRV-RESP.html">HTTP:INFO-LEAK:JETY-SRV-RESP</a></b></th>
   <td width="500" valign="top">
    HTTP: Eclipse Foundation Jetty Web Server HttpParser Remote Memory Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AJOOMLA-SQLREPORT.html">HTTP:INFO-LEAK:JOOMLA-SQLREPORT</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla SQLReport Password Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ALAYTON-TECH.html">HTTP:INFO-LEAK:LAYTON-TECH</a></b></th>
   <td width="500" valign="top">
    HTTP: Layton Technologies Helpbox product Password Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ALIVE-WIRE.html">HTTP:INFO-LEAK:LIVE-WIRE</a></b></th>
   <td width="500" valign="top">
    HTTP: Live Wire For Wordpress Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AMS-VISIO-XML.html">HTTP:INFO-LEAK:MS-VISIO-XML</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Visio Crafted XML File Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3ANOVELL-ZENWORKS.html">HTTP:INFO-LEAK:NOVELL-ZENWORKS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management Session ID Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINFO-LEAK%3AREDHAT-JBOSS.html">HTTP:INFO-LEAK:REDHAT-JBOSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Red Hat JBoss Seam InterfaceGenerator Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINVALID%3ABAD-CONTENT-LENGTH.html">HTTP:INVALID:BAD-CONTENT-LENGTH</a></b></th>
   <td width="500" valign="top">
    HTTP: Bad Content Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINVALID%3ADUPLICATE-HEADER.html">HTTP:INVALID:DUPLICATE-HEADER</a></b></th>
   <td width="500" valign="top">
    HTTP: Invalid Duplicate Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINVALID%3AEXPECT.html">HTTP:INVALID:EXPECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Invalid Expect Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINVALID%3ASTATUS-CODE.html">HTTP:INVALID:STATUS-CODE</a></b></th>
   <td width="500" valign="top">
    HTTP: Invalid Status Code
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AINVALID%3AUNEXPECTCHAR.html">HTTP:INVALID:UNEXPECTCHAR</a></b></th>
   <td width="500" valign="top">
    HTTP: Unexpected Character in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AISA-AUTH-BYPASS.html">HTTP:ISA-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft ISA Server 2006 Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AJAVA-UPDATE-RCE.html">HTTP:JAVA-UPDATE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java Software Update Weakness
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AJENKINS-CI-SERVER-CE.html">HTTP:JENKINS-CI-SERVER-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Jenkins CI Server Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ALEXMARK-LIB-FILE-DIR-TRAV.html">HTTP:LEXMARK-LIB-FILE-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Lexmark Markvision LibraryFileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMAGENTO-PAR-AUTH-BYPASS.html">HTTP:MAGENTO-PAR-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Magento Forwarded Parameter Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMAILCHIMP-PLUGIN-PHP-CE.html">HTTP:MAILCHIMP-PLUGIN-PHP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: MailChimp Plugin for WordPress Remote PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMALICIOUS-SESSION-COOKIE.html">HTTP:MALICIOUS-SESSION-COOKIE</a></b></th>
   <td width="500" valign="top">
    HTTP: Malicious Session Cookie in HTTP Request  
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMAMBO-MYSQL-INF-DISCLOSURE.html">HTTP:MAMBO-MYSQL-INF-DISCLOSURE</a></b></th>
   <td width="500" valign="top">
    HTTP: Mambo MySQL Database Info Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-APP.html">HTTP:MANAGENGINE-APP</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Applications Manager SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-EVTLG-INF-DISC.html">HTTP:MANAGENGINE-EVTLG-INF-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer Hostdetails Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-INF-DISC.html">HTTP:MANAGENGINE-INF-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMANAGENGINE-POL-BYPASS.html">HTTP:MANAGENGINE-POL-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine ServiceDesk Plus User Privileges Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMAXTHON-HISTORY-XSS.html">HTTP:MAXTHON-HISTORY-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Maxthon History Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMICROSYS-BASE64-BO.html">HTTP:MICROSYS-BASE64-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsys Promotic PmBase64Decode Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AAA-COOKIE-PARAM-RCE.html">HTTP:MISC:AA-COOKIE-PARAM-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: ActualAnalyzer Lite Ant Cookie Parameter Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AALIEN-VAULT-OSSIM-CE.html">HTTP:MISC:ALIEN-VAULT-OSSIM-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM av-centerd SOAP Requests Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AALIENVAULT-OSSIM-CE.html">HTTP:MISC:ALIENVAULT-OSSIM-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPPLE-CUPS-RCE.html">HTTP:MISC:APPLE-CUPS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple CUPS Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AAPSTRUTS-DEV-EXEC.html">HTTP:MISC:APSTRUTS-DEV-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Struts 2 Developer Mode OGNL Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AARRIS-VAP-RCE.html">HTTP:MISC:ARRIS-VAP-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Arris VAP Management Portal Password Comparison Failure Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AAVIRA-MGNT-HEADER-BOF.html">HTTP:MISC:AVIRA-MGNT-HEADER-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Avira Management Console Server HTTP Header Processing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ABLKIN-PARAM-HNDLNG-CE.html">HTTP:MISC:BLKIN-PARAM-HNDLNG-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Belkin N750 Guest Network Web Interface Parameter Handling Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACHASYS-BO.html">HTTP:MISC:CHASYS-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Chasys Draw IES Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOGENT-SERVER-CMD-INJ.html">HTTP:MISC:COGENT-SERVER-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Cogent DataHub Web Server GetPermissions.asp Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACOOL-EXKIT-JAR-DL.html">HTTP:MISC:COOL-EXKIT-JAR-DL</a></b></th>
   <td width="500" valign="top">
    HTTP: Cool Exploit Kit JAR Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACUTEZIP-BO.html">HTTP:MISC:CUTEZIP-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: GlobalSCAPE CuteZIP Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2013-3214-AB.html">HTTP:MISC:CVE-2013-3214-AB</a></b></th>
   <td width="500" valign="top">
    HTTP: VTiger CRM SOAP Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-BOF.html">HTTP:MISC:CVE-2014-6332-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-OF.html">HTTP:MISC:CVE-2014-6332-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ACVE-2014-6332-RCE.html">HTTP:MISC:CVE-2014-6332-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-6332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-CMD-INJECTION.html">HTTP:MISC:DLINK-CMD-INJECTION</a></b></th>
   <td width="500" valign="top">
    HTTP: D-Link Device Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-COOKI-HANDLN-BO.html">HTTP:MISC:DLINK-COOKI-HANDLN-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: D-Link Cookie Value Handling Remote Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ADLINK-INFOCGI-BO.html">HTTP:MISC:DLINK-INFOCGI-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: D-Link info.cgi POST Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ADOLIBARR-ERP-COMM-INJ.html">HTTP:MISC:DOLIBARR-ERP-COMM-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Dolibarr ERP &amp; CRM 3 Post Authentication Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AEDOC-UPLOAD-PHP-CE.html">HTTP:MISC:EDOC-UPLOAD-PHP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: E-Document PHP File Upload Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AEK-HIMAN-JAVA.html">HTTP:MISC:EK-HIMAN-JAVA</a></b></th>
   <td width="500" valign="top">
    HTTP: Himan Java Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AEPO-XMLENTITY-INJ.html">HTTP:MISC:EPO-XMLENTITY-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: McAfee ePolicy CVE-2015-0921 XML Entity Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AERS-VIEWER-BO.html">HTTP:MISC:ERS-VIEWER-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: ERS Viewer 2013 ERS File Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AES-GROOVY-CODEEXEC.html">HTTP:MISC:ES-GROOVY-CODEEXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: ElasticSearch Search Groovy Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AESF-PFSENSE-RCE.html">HTTP:MISC:ESF-PFSENSE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: ESF pfSense webConfigurator firewall_aliases_edit.php Input Validation Error
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AF5-ICONTROL-SOAP-CE.html">HTTP:MISC:F5-ICONTROL-SOAP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: F5 Multiple Products iControl API hostname Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AFILE-DOWNLOAD.html">HTTP:MISC:FILE-DOWNLOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Products Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AFLASH-CVE-2014-0554.html">HTTP:MISC:FLASH-CVE-2014-0554</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Local File Access Protection Bypass (CVE-2014-0554) 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AFORTIGATE-CSRF.html">HTTP:MISC:FORTIGATE-CSRF</a></b></th>
   <td width="500" valign="top">
    HTTP: Fortigate Firewalls Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AFREEPBX-AUTH-BYPASS.html">HTTP:MISC:FREEPBX-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP:  FreePBX unserialize Legacy Package Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AFREEPBX-CFG-CODE-EXEC.html">HTTP:MISC:FREEPBX-CFG-CODE-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: FreePBX Framework Module config.php Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGE-MDS-PULSENET.html">HTTP:MISC:GE-MDS-PULSENET</a></b></th>
   <td width="500" valign="top">
    HTTP: General Electric MDS PulseNET Hidden Support Account Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGE-PULSENET-RCE.html">HTTP:MISC:GE-PULSENET-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: GE MDS PulseNET Hidden Support Account Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGITLAB-SH-EXEC.html">HTTP:MISC:GITLAB-SH-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Gitlab-shell Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGITLIST-URI-REQ-CE.html">HTTP:MISC:GITLIST-URI-REQ-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Gitlist Metacharacters In File Name URI Request Remote Command Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGRAPHITE-RCE.html">HTTP:MISC:GRAPHITE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Graphite Web Unsafe Pickle Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AGSM-SIMEDIT-BO.html">HTTP:MISC:GSM-SIMEDIT-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: GSM SIM Editor 5.15 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AHP-RELEASE-CONTROL.html">HTTP:MISC:HP-RELEASE-CONTROL</a></b></th>
   <td width="500" valign="top">
    HTTP: HP Release Control Authenticated Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AHP-SYS-IPRANGE-OF.html">HTTP:MISC:HP-SYS-IPRANGE-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: HP System Management Homepage iprange Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AIBM-CONSOLE-FILE-READ.html">HTTP:MISC:IBM-CONSOLE-FILE-READ</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Global Console Managers Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AIBM-CRDIT-LMT-BYPAS.html">HTTP:MISC:IBM-CRDIT-LMT-BYPAS</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Algo Credit Limits CVE-2014-0867 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AIRFVIEW-JP2-BO.html">HTTP:MISC:IRFVIEW-JP2-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Irfanview JPEG2000 JP2 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AJBOSS-SEAM-EL-RCE.html">HTTP:MISC:JBOSS-SEAM-EL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: JBoss Seam Parameterized Expression Language Expressions Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AJENKINS-CONSOLE-CE.html">HTTP:MISC:JENKINS-CONSOLE-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Jenkins Script-Console Java Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AJOOMLA-UNSER-CE.html">HTTP:MISC:JOOMLA-UNSER-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Akeeba Kickstart Unserialize Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ALETTERBOX-RCE.html">HTTP:MISC:LETTERBOX-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Maarch Multiple Products File Upload Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGE-ENGNE-ADMIN-AC.html">HTTP:MISC:MANAGE-ENGNE-ADMIN-AC</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Desktop Central Servlet AddPluginUser Action Admin Account Creation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGEENGINE-FILE-UP.html">HTTP:MISC:MANAGEENGINE-FILE-UP</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine DesktopCentral AgentLogUpload Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMANAGENGINE-EVNTLG-CE.html">HTTP:MISC:MANAGENGINE-EVNTLG-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer agentUpload Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMINIUPNPD-SOAP-ACTION.html">HTTP:MISC:MINIUPNPD-SOAP-ACTION</a></b></th>
   <td width="500" valign="top">
    HTTP: MiniUPnPd HTTP Service SOAPAction Handler Remote Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMLTPLE-TABLE-INFO-DIS.html">HTTP:MISC:MLTPLE-TABLE-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer AgentHandler GetTableData Mode Multiple Table Remote Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-FOREFRONT-DOS.html">HTTP:MISC:MS-FOREFRONT-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Null Session Cookie Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-OWA-URL-REDIR.html">HTTP:MISC:MS-OWA-URL-REDIR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange OWA CVE-2014-6336 URL Redirection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-SHARE-POINT-RCE.html">HTTP:MISC:MS-SHARE-POINT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server CVE-2013-1330 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMS-XML-SIG-VAL-DOS.html">HTTP:MISC:MS-XML-SIG-VAL-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework XML Signature Validation Entity Expansion Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUTINY-5-EDITDOCUMENT.html">HTTP:MISC:MUTINY-5-EDITDOCUMENT</a></b></th>
   <td width="500" valign="top">
    HTTP: Mutiny 5 EditDocument Servlet Arbitrary File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AMUTINY-CMD-INJ.html">HTTP:MISC:MUTINY-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Mutiny Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ANETCHARTS-SER-RCE.html">HTTP:MISC:NETCHARTS-SER-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Visual Mining NetCharts Server Path Traversal File Upload Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AOPENSIS-PARAM-PHP-INJ.html">HTTP:MISC:OPENSIS-PARAM-PHP-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Opensis Modname Parameter Remote PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3APANDORA-SERVICE-CE.html">HTTP:MISC:PANDORA-SERVICE-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Pandora FMS Anyterm Service Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3APHPMOADMIN-RCE.html">HTTP:MISC:PHPMOADMIN-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: MongoDB PHPMoAdmin Tool Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3APHPWIKI-SHELL-CE.html">HTTP:MISC:PHPWIKI-SHELL-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: PhpWiki Shell Metacharacters Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3APOSTER-SW-PUI-FILE-OF.html">HTTP:MISC:POSTER-SW-PUI-FILE-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Poster Software PUBLISH-iT PUI File Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AREPRISE-DOIT-TRAV.html">HTTP:MISC:REPRISE-DOIT-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Reprise License Manager diagnostics_doit Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ARUBY-RAILS-SECRET-RCE.html">HTTP:MISC:RUBY-RAILS-SECRET-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Ruby On Rails Secret Deserialization Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ASEAGATE-NAS-RCE.html">HTTP:MISC:SEAGATE-NAS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Seagate Business NAS Pre-Authentication Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPLUNK-CUSTOM-APP-CE.html">HTTP:MISC:SPLUNK-CUSTOM-APP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Splunk Custom App Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ASPLUNK-MAPPY-RCE.html">HTTP:MISC:SPLUNK-MAPPY-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Splunk Mappy Search Command Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3ASYMANTEC-COMMAND-EXEC.html">HTTP:MISC:SYMANTEC-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Encryption Management Server Local Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAPP-SUSP-FILEUL1.html">HTTP:MISC:WAPP-SUSP-FILEUL1</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Web Application Parameter Suspicious File Upload Attempt 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWAVELINK-HDR-PARSE-BO.html">HTTP:MISC:WAVELINK-HDR-PARSE-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Wavelink Emulation License Server HTTP Header Processing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWEBUI-COMMAND-EXEC.html">HTTP:MISC:WEBUI-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: WebUI Multiple Parameter Validation Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWESTERN-DIGITAL-LFI.html">HTTP:MISC:WESTERN-DIGITAL-LFI</a></b></th>
   <td width="500" valign="top">
    HTTP: Western Digital Arkeia Appliance Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWING-FTP-COMMNAD-EXEC.html">HTTP:MISC:WING-FTP-COMMNAD-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Wing FTP Server Authenticatd Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWINRAR-FILENM-SPOOF.html">HTTP:MISC:WINRAR-FILENM-SPOOF</a></b></th>
   <td width="500" valign="top">
    HTTP: WinRAR File Name Spoofing  
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWIRESHARK-LUA-RCE.html">HTTP:MISC:WIRESHARK-LUA-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Wireshark Lua Console Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWORDPRESS-PHP-ACE.html">HTTP:MISC:WORDPRESS-PHP-ACE</a></b></th>
   <td width="500" valign="top">
    HTTP: Wordpress PHP Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AWP-IMG-UPLOAD.html">HTTP:MISC:WP-IMG-UPLOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Plugin Arbitrary Image Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AZENOSS-CMD-EXEC.html">HTTP:MISC:ZENOSS-CMD-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Zenoss showDaemonXMLConfig Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AZOPE-CMD-RCE.html">HTTP:MISC:ZOPE-CMD-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Zope cmd parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMISC%3AZPANEL-HTPASWD-MOD-CE.html">HTTP:MISC:ZPANEL-HTPASWD-MOD-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: ZPanel Htpasswd Module Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMONKEY-HTTPD-BO.html">HTTP:MONKEY-HTTPD-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Monkey HTTP Daemon memcpy Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMS-IE-MEMORY-CORRUPTION.html">HTTP:MS-IE-MEMORY-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2782 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMS-LYNC-SERVER-RCE.html">HTTP:MS-LYNC-SERVER-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Lync Server ReachJoin.aspx Remote Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMS-VBSCRIPT-UAF-RCE.html">HTTP:MS-VBSCRIPT-UAF-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft VBScript CVE-2014-6363 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AMS-WIN-FOLDER-GUID-CE.html">HTTP:MS-WIN-FOLDER-GUID-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Folder GUID Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANAGIOS-CONFMGR-SQLINJ.html">HTTP:NAGIOS-CONFMGR-SQLINJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Nagios Core Config Manager tfPassword Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANEUTRINO-EK-SB.html">HTTP:NEUTRINO-EK-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Neutrino Payload Exploit Kit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANGINX-RQST-URI-SECBYPASS.html">HTTP:NGINX-RQST-URI-SECBYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Nginx Request URI Verification Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL-NETIQ-EVAL-POLBYPAS.html">HTTP:NOVELL-NETIQ-EVAL-POLBYPAS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell NetIQ Privileged User Manager Eval Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL-NETIQ-MOD-POLBYPAS.html">HTTP:NOVELL-NETIQ-MOD-POLBYPAS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AACT-PARAM-ID.html">HTTP:NOVELL:ACT-PARAM-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management DirectoryViewer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AFILENAME-PARAM-DT.html">HTTP:NOVELL:FILENAME-PARAM-DT</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell Sentinel Log Manager Filename Parameter Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AGROUPWISE-NETAGT-BO.html">HTTP:NOVELL:GROUPWISE-NETAGT-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Internet Agent HTTP Interface Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AREPORTER-AGENT.html">HTTP:NOVELL:REPORTER-AGENT</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell File Reporter Agent XML Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AZENWORKS-INFODISC.html">HTTP:NOVELL:ZENWORKS-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENWorks Asset Management rtrlet Component Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ANOVELL%3AZENWORKS-RTRLET-COM.html">HTTP:NOVELL:ZENWORKS-RTRLET-COM</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENWorks Asset Management &#39;rtrlet&#39; Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOPENMEDIAVAULT-AUTHEN-ACE.html">HTTP:OPENMEDIAVAULT-AUTHEN-ACE</a></b></th>
   <td width="500" valign="top">
    HTTP: OpenMediaVault Authentication Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOPENX-AD-SERVER-PHP-CE.html">HTTP:OPENX-AD-SERVER-PHP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: OpenX Ad Server Backdoor Arbitrary PHP Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE-ID-MANAGER-REDIRECT.html">HTTP:ORACLE-ID-MANAGER-REDIRECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Identity Manager backUrl Parameter Open Redirect
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE-JRE-INSECURE-LOAD.html">HTTP:ORACLE-JRE-INSECURE-LOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Environment Insecure File Loading
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACONF-ACCESS.html">HTTP:ORACLE:CONF-ACCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Configuration Disclosure Anonymous Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3ACOPYFILE-DIR-TRAV.html">HTTP:ORACLE:COPYFILE-DIR-TRAV</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Endeca CopyFile Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3ADATAINT-ACTIVEX-MC.html">HTTP:ORACLE:DATAINT-ACTIVEX-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Profiling and Data Quality for Data Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3ADEMANTRA-FILEACCESS.html">HTTP:ORACLE:DEMANTRA-FILEACCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Demantra Demand Management Unauthorized File Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AENDECA-SERVER-RCE.html">HTTP:ORACLE:ENDECA-SERVER-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Server createDataStore Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AGENERIC-SIGNATUR-MC.html">HTTP:ORACLE:GENERIC-SIGNATUR-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java Generic Signature Attribute Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOS-2-METAFILE-BOF.html">HTTP:ORACLE:OS-2-METAFILE-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow (2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDE-IN-MSACCESS.html">HTTP:ORACLE:OUTSIDE-IN-MSACCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Microsoft Access 1.x Parser Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AOUTSIDE-IN-PRDOX-BO.html">HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Outside In Paradox Database Handling Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AREPORTS-RCE.html">HTTP:ORACLE:REPORTS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Forms and Reports Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3ASSO-ACCESS.html">HTTP:ORACLE:SSO-ACCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Single-Sign-On Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AORACLE%3AXML-SIG-SPOOFING.html">HTTP:ORACLE:XML-SIG-SPOOFING</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java SE XML Digital Signature Spoofing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOSSIM-COMMAND-EXEC.html">HTTP:OSSIM-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: AlienVault OSSIM Arbitrary Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AAUTH-OVERFLOW.html">HTTP:OVERFLOW:AUTH-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    HTTP: Authorization Header Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ABLACK-ICE-BOF.html">HTTP:OVERFLOW:BLACK-ICE-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Black Ice Software Inc Barcode SDK (BITiff.ocx) Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-OVERFLOW.html">HTTP:OVERFLOW:CONTENT-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    HTTP: Content Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ACONTENT-TYPE.html">HTTP:OVERFLOW:CONTENT-TYPE</a></b></th>
   <td width="500" valign="top">
    HTTP: Content Type Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AD-LINK-HNAP-BO.html">HTTP:OVERFLOW:D-LINK-HNAP-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: D-Link HNAP Request Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AHOST.html">HTTP:OVERFLOW:HOST</a></b></th>
   <td width="500" valign="top">
    HTTP: Host Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AMALICIOUS-HOST.html">HTTP:OVERFLOW:MALICIOUS-HOST</a></b></th>
   <td width="500" valign="top">
    HTTP: Malicious Host Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3AOPENVIEW-NNM-BO.html">HTTP:OVERFLOW:OPENVIEW-NNM-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: HP OpenView Network Node Manager Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AOVERFLOW%3ASENKAS-KALIBRI-BO.html">HTTP:OVERFLOW:SENKAS-KALIBRI-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: SENKAS Kolibri Webserver GET Request Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APARALLEL-PLESK-RCE.html">HTTP:PARALLEL-PLESK-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Parallels Plesk Panel Arbitrary PHP Code Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APCAP-FORMATSTR-GENERIC.html">HTTP:PCAP-FORMATSTR-GENERIC</a></b></th>
   <td width="500" valign="top">
    HTTP: Generic Libpcap/TCPDump PCAP File Format String Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APFSENSE-ZONE-CSS.html">HTTP:PFSENSE-ZONE-CSS</a></b></th>
   <td width="500" valign="top">
    HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ACDF-INFINITE-LOOP-DOS.html">HTTP:PHP:CDF-INFINITE-LOOP-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP CDF File Handling Infinite Loop DOS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ACMD-COMMAND-EXEC.html">HTTP:PHP:CMD-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: PhpFileManager Cmd Parameter Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ACMD-INJ.html">HTTP:PHP:CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ACORE-INT-OF-CE.html">HTTP:PHP:CORE-INT-OF-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP Core unserialize Function Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ADATEINTERVAL-DOS.html">HTTP:PHP:DATEINTERVAL-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP DateInterval Heap Buffer Overread Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AFTP-GENLIST-IO.html">HTTP:PHP:FTP-GENLIST-IO</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP FTP Genlist Method Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AGHOST-GLIBC-WP.html">HTTP:PHP:GHOST-GLIBC-WP</a></b></th>
   <td width="500" valign="top">
    HTTP: Wordpress CVE-2015-0235 glibc Hostname RCE
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-ADMIN-SCAN.html">HTTP:PHP:JOOMLA-ADMIN-SCAN</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Administration Page Scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-COM-COLLECTOR.html">HTTP:PHP:JOOMLA-COM-COLLECTOR</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_collector Component Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-JCE-FILE-UPLOAD.html">HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla JCE  Editor File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AJOOMLA-PHP-OBJ-INJ.html">HTTP:PHP:JOOMLA-PHP-OBJ-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla PHP Object Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ANETWORK-WEATHERMAP-LFI.html">HTTP:PHP:NETWORK-WEATHERMAP-LFI</a></b></th>
   <td width="500" valign="top">
    HTTP: Network Weathermap editor.php Local File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AOPENEMR-GLOBALS-AB.html">HTTP:PHP:OPENEMR-GLOBALS-AB</a></b></th>
   <td width="500" valign="top">
    HTTP: OpenEMR globals.php Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APFSENSE-SNORT-INFO-DIS.html">HTTP:PHP:PFSENSE-SNORT-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    HTTP: ESF pfSense Snort snort_log_view.php Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APHAR-PARSE-TARFILE-ID.html">HTTP:PHP:PHAR-PARSE-TARFILE-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP phar_parse_tarfile method Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-CGI-CMD-LINE-RCE.html">HTTP:PHP:PHP-CGI-CMD-LINE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP &#39;php-cgi&#39; Command Line Attribute Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APHP-FILE-INCL.html">HTTP:PHP:PHP-FILE-INCL</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP File Inclusion System Variable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APHPMYADMIN%3ASETUP-SCAN.html">HTTP:PHP:PHPMYADMIN:SETUP-SCAN</a></b></th>
   <td width="500" valign="top">
    HTTP: PHPMyAdmin Setup Script Scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APHPSPLOIT-POSTEXP.html">HTTP:PHP:PHPSPLOIT-POSTEXP</a></b></th>
   <td width="500" valign="top">
    HTTP: PHPSploit Post Exploitation Backdoor Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3APINEAPP-CMD-INJ.html">HTTP:PHP:PINEAPP-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: PineApp Mail-SeCure test_li_connection.php Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AREGISTER-VARIABLE-CE.html">HTTP:PHP:REGISTER-VARIABLE-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP php_register_variable_ex Function Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASPL-OBJECT-UNSERIALIZE.html">HTTP:PHP:SPL-OBJECT-UNSERIALIZE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP unserialize Call SPL Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASSL-CERT-SEC-BYPASS.html">HTTP:PHP:SSL-CERT-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP SSL Certificate Validation Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASTUNSHELL-RCE.html">HTTP:PHP:STUNSHELL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: STUNSHELL Web Shell Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-GW-LFI.html">HTTP:PHP:SYM-GW-LFI</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Remote LFI root Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASYM-WG-IPCHANG.html">HTTP:PHP:SYM-WG-IPCHANG</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway ipchange.php Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3ASYMC-WEB-CMD-INJ.html">HTTP:PHP:SYMC-WEB-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AV0PCR3W-WEB-SHELL-RCE.html">HTTP:PHP:V0PCR3W-WEB-SHELL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: v0pCr3w Web Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-ACF-ABSPATH-RFI.html">HTTP:PHP:WP-ACF-ABSPATH-RFI</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Advanced Custom Fields Plugin &quot;acf_abspath&quot; Remote File Inclusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-BRUTE-FORCE-LOGIN.html">HTTP:PHP:WP-BRUTE-FORCE-LOGIN</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-INCLUDES-ACCESS.html">HTTP:PHP:WP-INCLUDES-ACCESS</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress &quot;wp-includes&quot; Path Remote Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-README-SCAN.html">HTTP:PHP:WP-README-SCAN</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Readme.html Scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-SIMPLE-ADS-MGR-MUL.html">HTTP:PHP:WP-SIMPLE-ADS-MGR-MUL</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Simple Ads Manager Plugin Multiple Security Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-SLIDER-REV-AFD.html">HTTP:PHP:WP-SLIDER-REV-AFD</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Slider Revolution Responsive Plug-In Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-XML-RPC-PINGBACK-RQ.html">HTTP:PHP:WP-XML-RPC-PINGBACK-RQ</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress XML RPC Pingback Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AWP-XMLRPC-BRUTE.html">HTTP:PHP:WP-XMLRPC-BRUTE</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress XMLRPC Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHP%3AXAMPP-FILE-WRITE.html">HTTP:PHP:XAMPP-FILE-WRITE</a></b></th>
   <td width="500" valign="top">
    HTTP: XAMPP File Write Access 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3APHPWIKI-PLOTICUS-ACE.html">HTTP:PHPWIKI-PLOTICUS-ACE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AREGIN-CNC-TRAFFIC.html">HTTP:REGIN-CNC-TRAFFIC</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious REGIN Infected Host Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AREQERR%3AINV-IPV6-HOST-HDR.html">HTTP:REQERR:INV-IPV6-HOST-HDR</a></b></th>
   <td width="500" valign="top">
    HTTP: Invalid IPv6 Host Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AREQERR%3ANULL-IN-HEADER.html">HTTP:REQERR:NULL-IN-HEADER</a></b></th>
   <td width="500" valign="top">
    HTTP: Null in HTTP Header Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AREQERR%3APOST-MISSING-DATA.html">HTTP:REQERR:POST-MISSING-DATA</a></b></th>
   <td width="500" valign="top">
    HTTP: POST Submission Missing Data
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ARESIN-INFO-DISCLOSURE.html">HTTP:RESIN-INFO-DISCLOSURE</a></b></th>
   <td width="500" valign="top">
    HTTP: Resin Application Server Source Code Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ARUBY-GEM-SEMICOLON.html">HTTP:RUBY-GEM-SEMICOLON</a></b></th>
   <td width="500" valign="top">
    HTTP: Ruby Gem Multiple Wrappers Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ARUBYONRAILS-XMLYAML-RCE.html">HTTP:RUBYONRAILS-XMLYAML-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASCADA-WEB-INTERFACE-DOS.html">HTTP:SCADA-WEB-INTERFACE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Trihedral VTScada Network Request Handling Remote Integer Overflow Denial of Service 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASOLARWINDS-AUTH-BYPASS.html">HTTP:SOLARWINDS-AUTH-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Storage Manager AuthenticationFilter Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASOLARWINDS-POLICYBYPASS.html">HTTP:SOLARWINDS-POLICYBYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Firewall Security Manager userlogin.jsp Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASONICWALL-GMS-RCE.html">HTTP:SONICWALL-GMS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: SonicWALL GMS skipSessionCheck Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-1.html">HTTP:SQL:INJ:ACCEPT-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-2.html">HTTP:SQL:INJ:ACCEPT-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-HDR-3.html">HTTP:SQL:INJ:ACCEPT-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-1.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-2.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AACCEPT-LANG-HDR-3.html">HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Accept Language Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AALTER-MYSQL.html">HTTP:SQL:INJ:ALTER-MYSQL</a></b></th>
   <td width="500" valign="top">
    HTTP: MySQL Alter Database Injection in HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AAND-NUMBER-EQUALS.html">HTTP:SQL:INJ:AND-NUMBER-EQUALS</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;and..equals&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACHAR.html">HTTP:SQL:INJ:CHAR</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Character Conversion Evasion in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACHAR-ENCODE.html">HTTP:SQL:INJ:CHAR-ENCODE</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Character Encoding Evasion in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOMMENT.html">HTTP:SQL:INJ:COMMENT</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Comment Evasion in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACOMPARISON.html">HTTP:SQL:INJ:COMPARISON</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Comparison Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONCAT.html">HTTP:SQL:INJ:CONCAT</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Concatenate Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-1.html">HTTP:SQL:INJ:CONT-MD5-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-2.html">HTTP:SQL:INJ:CONT-MD5-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-MD5-HDR-3.html">HTTP:SQL:INJ:CONT-MD5-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content MD5 Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-1.html">HTTP:SQL:INJ:CONT-TYPE-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-2.html">HTTP:SQL:INJ:CONT-TYPE-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONT-TYPE-HDR-3.html">HTTP:SQL:INJ:CONT-TYPE-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Content Type Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONVERT.html">HTTP:SQL:INJ:CONVERT</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Convert Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ACONVERT-INJ-OF.html">HTTP:SQL:INJ:CONVERT-INJ-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server Injection Convert Parameter Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADECLARE-EXEC.html">HTTP:SQL:INJ:DECLARE-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;declare...exec&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ADELL-SONICWALL.html">HTTP:SQL:INJ:DELL-SONICWALL</a></b></th>
   <td width="500" valign="top">
    HTTP: Dell SonicWALL Scrutinizer SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AEXEC-MASTER.html">HTTP:SQL:INJ:EXEC-MASTER</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;exec master&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AF5-BIGIP-11.2.0.html">HTTP:SQL:INJ:F5-BIGIP-11.2.0</a></b></th>
   <td width="500" valign="top">
    HTTP: F5 BIG-IP 11.2.0 SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHAVIJ-UA.html">HTTP:SQL:INJ:HAVIJ-UA</a></b></th>
   <td width="500" valign="top">
    HTTP: Havij SQL Injection Tool User Agent Alert
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHP-LOADR-GETREPORT.html">HTTP:SQL:INJ:HP-LOADR-GETREPORT</a></b></th>
   <td width="500" valign="top">
    HTTP: HP LoadRunner Virtual User Generator EmulationAdmin getReport SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-1.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-2.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-AUTH-HDR-3.html">HTTP:SQL:INJ:HTTP-AUTH-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Authorization Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-1.html">HTTP:SQL:INJ:HTTP-HOST-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-2.html">HTTP:SQL:INJ:HTTP-HOST-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-HOST-HDR-3.html">HTTP:SQL:INJ:HTTP-HOST-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Host Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-1.html">HTTP:SQL:INJ:HTTP-REQ-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-2.html">HTTP:SQL:INJ:HTTP-REQ-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AHTTP-REQ-HDR-3.html">HTTP:SQL:INJ:HTTP-REQ-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Request Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AINSERT-VALUES.html">HTTP:SQL:INJ:INSERT-VALUES</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;insert..values&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AINTO-OUTFILE.html">HTTP:SQL:INJ:INTO-OUTFILE</a></b></th>
   <td width="500" valign="top">
    HTTP: INTO OUTFILE/DUMPFILE Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AIS_SRVROLEMEMBER.html">HTTP:SQL:INJ:IS_SRVROLEMEMBER</a></b></th>
   <td width="500" valign="top">
    HTTP: IS_SRVROLEMEMBER/IS_MEMBER MS-SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-AD-DJ.html">HTTP:SQL:INJ:JOOMLA-AD-DJ</a></b></th>
   <td width="500" valign="top">
    HTTP: JOOMLA DJ-Classifieds Extenstion SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-ALPHA-EMAIL.html">HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla AlphaRegistration Component email Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-AVRELOADED.html">HTTP:SQL:INJ:JOOMLA-AVRELOADED</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla AvReloaded Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CALCBUILDER.html">HTTP:SQL:INJ:JOOMLA-CALCBUILDER</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Calc Builder Component &#39;id&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CBCONTACT.html">HTTP:SQL:INJ:JOOMLA-CBCONTACT</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_cbcontact Component contact_id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-CCBOARD.html">HTTP:SQL:INJ:JOOMLA-COM-CCBOARD</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla CCBoard Component topic Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-JCE.html">HTTP:SQL:INJ:JOOMLA-COM-JCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla JCE Component Itemid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-JOOMNIK.html">HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Joomnik Gallery Component album Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COM-SHOP.html">HTTP:SQL:INJ:JOOMLA-COM-SHOP</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla shop Component editid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COMHOSPITAL.html">HTTP:SQL:INJ:JOOMLA-COMHOSPITAL</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_hospital Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-COMTEAM.html">HTTP:SQL:INJ:JOOMLA-COMTEAM</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_team Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-CONTROLLER.html">HTTP:SQL:INJ:JOOMLA-CONTROLLER</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Controller Component &#39;Itemid&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-FAQ-BOOK.html">HTTP:SQL:INJ:JOOMLA-FAQ-BOOK</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Minitek FAQ Book Plugin id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-FOTO.html">HTTP:SQL:INJ:JOOMLA-FOTO</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Foto Component &#39;id_categoria&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-JUICY-PICID.html">HTTP:SQL:INJ:JOOMLA-JUICY-PICID</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Juicy Gallery Component &#39;picId&#39; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-MORFEOSHOW.html">HTTP:SQL:INJ:JOOMLA-MORFEOSHOW</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_morfeoshow Component idm Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-NEWSSEARCH.html">HTTP:SQL:INJ:JOOMLA-NEWSSEARCH</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_newssearch Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-QUESTION.html">HTTP:SQL:INJ:JOOMLA-QUESTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_question Component catID Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-RESTAURANTE.html">HTTP:SQL:INJ:JOOMLA-RESTAURANTE</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla and Mambo Restaurante Component id Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-VIRTUAL-MEM.html">HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla Virtual Money com_virtualmoney Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AJOOMLA-VIRTUEMART.html">HTTP:SQL:INJ:JOOMLA-VIRTUEMART</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla VirtueMart Component Page Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMAMBO-COM-DOCMAN.html">HTTP:SQL:INJ:MAMBO-COM-DOCMAN</a></b></th>
   <td width="500" valign="top">
    HTTP: Mambo com_docman Component SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGE-ENGINE-SM.html">HTTP:SQL:INJ:MANAGE-ENGINE-SM</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Security Manager Plus Advanced Search SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGEENGINER-RCE.html">HTTP:SQL:INJ:MANAGEENGINER-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine Multiple Products customerName SQL Injection Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-IT360.html">HTTP:SQL:INJ:MANAGENGINE-IT360</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine IT360 MSP Edition SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-JSON.html">HTTP:SQL:INJ:MANAGENGINE-JSON</a></b></th>
   <td width="500" valign="top">
    HTTP: MANAGEENGINE Admin Services SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-OPMANG.html">HTTP:SQL:INJ:MANAGENGINE-OPMANG</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine OpManager SubmitQuery IntegrationUser SQL Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-RUNQRY.html">HTTP:SQL:INJ:MANAGENGINE-RUNQRY</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine EventLog Analyzer runQuery guest user SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMANAGENGINE-SRC.html">HTTP:SQL:INJ:MANAGENGINE-SRC</a></b></th>
   <td width="500" valign="top">
    HTTP: ManageEngine OpManager APMAlertOperationsServlet source SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMCAFEE-EMAIL-GTWAY.html">HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY</a></b></th>
   <td width="500" valign="top">
    HTTP: McAfee Email Gateway 7.6 SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMS-SQL-FUNCTIONS.html">HTTP:SQL:INJ:MS-SQL-FUNCTIONS</a></b></th>
   <td width="500" valign="top">
    HTTP: MS-SQL Function in URL Variable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMS-SQL-TABLE-NAME.html">HTTP:SQL:INJ:MS-SQL-TABLE-NAME</a></b></th>
   <td width="500" valign="top">
    HTTP: MS-SQL Table Name in URL Variable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AMYSQL-TABLE-NAME.html">HTTP:SQL:INJ:MYSQL-TABLE-NAME</a></b></th>
   <td width="500" valign="top">
    HTTP: MySQL Table Name in URL Variable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ANULL-NULL-NULL.html">HTTP:SQL:INJ:NULL-NULL-NULL</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;null,null,null&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ANULLBYTE-COMMENT.html">HTTP:SQL:INJ:NULLBYTE-COMMENT</a></b></th>
   <td width="500" valign="top">
    HTTP: NullByte Comment Out Query SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AOMNISTAR-MAILER.html">HTTP:SQL:INJ:OMNISTAR-MAILER</a></b></th>
   <td width="500" valign="top">
    HTTP: Omnistar Mailer SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APARALLEL-PLESK.html">HTTP:SQL:INJ:PARALLEL-PLESK</a></b></th>
   <td width="500" valign="top">
    HTTP: Parallels Plesk Panel SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APL-SQL.html">HTTP:SQL:INJ:PL-SQL</a></b></th>
   <td width="500" valign="top">
    HTTP: PL/SQL Command in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3APROC-GENERIC.html">HTTP:SQL:INJ:PROC-GENERIC</a></b></th>
   <td width="500" valign="top">
    HTTP: Generic SQL Procedure Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-1.html">HTTP:SQL:INJ:REFERER-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-2.html">HTTP:SQL:INJ:REFERER-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AREFERER-HDR-3.html">HTTP:SQL:INJ:REFERER-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Referer Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ARESPONSE-PAGE.html">HTTP:SQL:INJ:RESPONSE-PAGE</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP Response Page
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASLASH-STAR.html">HTTP:SQL:INJ:SLASH-STAR</a></b></th>
   <td width="500" valign="top">
    HTTP: Slash-Star Comment SQL Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASLRWINDS-STORG-MGR.html">HTTP:SQL:INJ:SLRWINDS-STORG-MGR</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Storage Manager LoginServlet SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASOLARWINDS.html">HTTP:SQL:INJ:SOLARWINDS</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Orion GetAccountGroups Multiple SQL Injections
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASQLMAP-ACTIVITY.html">HTTP:SQL:INJ:SQLMAP-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    HTTP: sqlmap SQL Injection Tool Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYMC-BLOCKED-PHP.html">HTTP:SQL:INJ:SYMC-BLOCKED-PHP</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway blocked.php Blind SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ASYSOBJECTS.html">HTTP:SQL:INJ:SYSOBJECTS</a></b></th>
   <td width="500" valign="top">
    HTTP: MS-SQL sysobjects SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3ATIVOLI-USER-UPDATE.html">HTTP:SQL:INJ:TIVOLI-USER-UPDATE</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Tivoli Provisioning Manager Express User.updateUserValue SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-1.html">HTTP:SQL:INJ:UA-HDR-1</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-2.html">HTTP:SQL:INJ:UA-HDR-2</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUA-HDR-3.html">HTTP:SQL:INJ:UA-HDR-3</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Injection Detected on HTTP User Agent Header 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUNION-SELECT.html">HTTP:SQL:INJ:UNION-SELECT</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;union...select&#39; Command Injection in URL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AUSER-ADD.html">HTTP:SQL:INJ:USER-ADD</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle User Addition
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AVERSION-DETECT.html">HTTP:SQL:INJ:VERSION-DETECT</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL Version Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWAITFOR-DELAY.html">HTTP:SQL:INJ:WAITFOR-DELAY</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL &#39;waitfor delay&#39; Command Injection Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWORDPRESS-ID.html">HTTP:SQL:INJ:WORDPRESS-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Generic &quot;ID&quot; Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-AJAX-CATEGORY.html">HTTP:SQL:INJ:WP-AJAX-CATEGORY</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-ECOMMERCE.html">HTTP:SQL:INJ:WP-ECOMMERCE</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WP e-Commerce Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-EVENTS-MGR.html">HTTP:SQL:INJ:WP-EVENTS-MGR</a></b></th>
   <td width="500" valign="top">
    HTTP: Wordpress Events Manager Extended Plugin Persistent SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-FBCONNECTOR.html">HTTP:SQL:INJ:WP-FBCONNECTOR</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress FaceBook Connect SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-GD-STAR-RATING.html">HTTP:SQL:INJ:WP-GD-STAR-RATING</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress GD Star Rating Plugin votes Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-MEDIA-LIBRARY.html">HTTP:SQL:INJ:WP-MEDIA-LIBRARY</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Media Library Categories Plugin termid Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-MULTIPLE.html">HTTP:SQL:INJ:WP-MULTIPLE</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Multiple SQL Injection Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-PHOTORACER.html">HTTP:SQL:INJ:WP-PHOTORACER</a></b></th>
   <td width="500" valign="top">
    HTTP: Photoracer WordPress Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SERMON-BROWSER.html">HTTP:SQL:INJ:WP-SERMON-BROWSER</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Sermon Browser Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-STARSRATEBOX.html">HTTP:SQL:INJ:WP-STARSRATEBOX</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WP-StarsRateBox Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SUPER-CAPTCHA.html">HTTP:SQL:INJ:WP-SUPER-CAPTCHA</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Super CAPTCHA Plugin markspam Parameter SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-SYMPOSIUM.html">HTTP:SQL:INJ:WP-SYMPOSIUM</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Symposium Plugin get_profile_avatar.php SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AWP-UNIVERSAL-POST.html">HTTP:SQL:INJ:WP-UNIVERSAL-POST</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Universal Post Manager Plugin SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3AINJ%3AXPCMDSHELL.html">HTTP:SQL:INJ:XPCMDSHELL</a></b></th>
   <td width="500" valign="top">
    HTTP: SQL xp_cmdshell Command Shell Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3ANOVEL-ZENWORKS.html">HTTP:SQL:NOVEL-ZENWORKS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management schedule.ScheduleQuery SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASQL%3ANOVELL-ZENWORKS.html">HTTP:SQL:NOVELL-ZENWORKS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Configuration Management GetStoredResult.class SQL Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTATIC-SERVER-BOF.html">HTTP:STATIC-SERVER-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Static HTTP Server ini File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AABB-CWGRAPH3D.html">HTTP:STC:ACTIVEX:ABB-CWGRAPH3D</a></b></th>
   <td width="500" valign="top">
    HTTP: ABB Test Signal Viewer CWGraph3D ActiveX Arbitrary File Creation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANTECH-BOF.html">HTTP:STC:ACTIVEX:ADVANTECH-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AADVANTECH-WEB.html">HTTP:STC:ACTIVEX:ADVANTECH-WEB</a></b></th>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess Unsafe ActiveX Control (1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAGILENT-INSERT.html">HTTP:STC:ACTIVEX:AGILENT-INSERT</a></b></th>
   <td width="500" valign="top">
    HTTP: Agilent Technologies Feature Extraction Insert Method Out-Of-Bounds Indexing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AASUS-NETSWITCH.html">HTTP:STC:ACTIVEX:ASUS-NETSWITCH</a></b></th>
   <td width="500" valign="top">
    HTTP: ASUS NET4SWITCH Unsafe Activex Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AATTACHMATE-REF.html">HTTP:STC:ACTIVEX:ATTACHMATE-REF</a></b></th>
   <td width="500" valign="top">
    HTTP: Attachmate Reflection FTP Client Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AAXIS-MEDIA-BO.html">HTTP:STC:ACTIVEX:AXIS-MEDIA-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Axis Media Control Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ACVE-2015-0016.html">HTTP:STC:ACTIVEX:CVE-2015-0016</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0016 Directory Traversal Elevation of Privilege 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADOC-CAPTURE-BO.html">HTTP:STC:ACTIVEX:DOC-CAPTURE-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Document Capture Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ADOM-TYPE.html">HTTP:STC:ACTIVEX:DOM-TYPE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer DOM Manipulation Type Confusion Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AELECTRIC-PELCO.html">HTTP:STC:ACTIVEX:ELECTRIC-PELCO</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric Pelco Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHNYWLL-OPOS.html">HTTP:STC:ACTIVEX:HNYWLL-OPOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Honeywell OPOS Suite HWOPOSScale.ocx Open Method Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHONEYWELL-EBI.html">HTTP:STC:ACTIVEX:HONEYWELL-EBI</a></b></th>
   <td width="500" valign="top">
    HTTP: Honeywell Enterprise Buildings Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHONEYWELL-TEMA.html">HTTP:STC:ACTIVEX:HONEYWELL-TEMA</a></b></th>
   <td width="500" valign="top">
    HTTP: Honeywell EBI TEMA Remote Installer Unsafe ActiveX Control Arbitrary File Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-LOADRUNER.html">HTTP:STC:ACTIVEX:HP-LOADRUNER</a></b></th>
   <td width="500" valign="top">
    HTTP: HP LoadRunner micWebAjax.dll Unsafe ActiveX Control Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-OPOS-DRIVER.html">HTTP:STC:ACTIVEX:HP-OPOS-DRIVER</a></b></th>
   <td width="500" valign="top">
    HTTP: HP Point of Sale OPOS Driver OPOSPOSKeyboard.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-RCE.html">HTTP:STC:ACTIVEX:HP-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: HP Point of Sale OPOS Driver Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AHP-SPRINTER.html">HTTP:STC:ACTIVEX:HP-SPRINTER</a></b></th>
   <td width="500" valign="top">
    HTTP: HP Sprinter Tidestone Formula One ActiveX Multiple Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIBM-C1SIZER.html">HTTP:STC:ACTIVEX:IBM-C1SIZER</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM SPSS SamplePower c1sizer ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AIRFILEIOSRVC.html">HTTP:STC:ACTIVEX:IRFILEIOSRVC</a></b></th>
   <td width="500" valign="top">
    HTTP: HP LoadRunner lrFileIOService Unsafe ActiveX Control Input Validation Error
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AISOVIEW-BOF.html">HTTP:STC:ACTIVEX:ISOVIEW-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: PTC IsoView ActiveX Control ViewPort Property Remote Code Excution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AJAVA-DTK.html">HTTP:STC:ACTIVEX:JAVA-DTK</a></b></th>
   <td width="500" valign="top">
    HTTP: Unsafe Java DTK ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKVIEW-KCHARTX1.html">HTTP:STC:ACTIVEX:KVIEW-KCHARTX1</a></b></th>
   <td width="500" valign="top">
    HTTP: KingView KChartXY.ocx Unsafe ActiveX Control1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AKVIEW-KCHARTXY.html">HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</a></b></th>
   <td width="500" valign="top">
    HTTP: KingView KChartXY.ocx Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIQUIDXML-MULT.html">HTTP:STC:ACTIVEX:LIQUIDXML-MULT</a></b></th>
   <td width="500" valign="top">
    HTTP: LiquidXML Studio Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ALIVE-MSG.html">HTTP:STC:ACTIVEX:LIVE-MSG</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows Live Messenger ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMITSUBISHI-V3.html">HTTP:STC:ACTIVEX:MITSUBISHI-V3</a></b></th>
   <td width="500" valign="top">
    HTTP: Mitsubishi MX Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-DOS.html">HTTP:STC:ACTIVEX:MS-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GraphicsControl Unsafe ActiveX Access Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMS-ICARDIE.html">HTTP:STC:ACTIVEX:MS-ICARDIE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft InformationCardSigninHelper Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMSXML-INFODISC.html">HTTP:STC:ACTIVEX:MSXML-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft XML Core Services Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMW6-AZTEC-BO.html">HTTP:STC:ACTIVEX:MW6-AZTEC-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: MW6 Technologies ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AMW6-MAXICODE.html">HTTP:STC:ACTIVEX:MW6-MAXICODE</a></b></th>
   <td width="500" valign="top">
    HTTP: MW6 Technologies MaxiCode ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANATIONAL-INST.html">HTTP:STC:ACTIVEX:NATIONAL-INST</a></b></th>
   <td width="500" valign="top">
    HTTP: National Instruments Installer Framework ActiveX Control Arbitrary File Creation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANETIQ-BO.html">HTTP:STC:ACTIVEX:NETIQ-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: NetIQ Security Solutions for ISeries Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANOVELL-GRPWISE.html">HTTP:STC:ACTIVEX:NOVELL-GRPWISE</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client Unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ANOVELL-RCE.html">HTTP:STC:ACTIVEX:NOVELL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell GroupWise Client for Windows Unsafe ActiveX Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DATAINT.html">HTTP:STC:ACTIVEX:ORACLE-DATAINT</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Integrator Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DQ-TRLM.html">HTTP:STC:ACTIVEX:ORACLE-DQ-TRLM</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality Trillium Based Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-DSCXB.html">HTTP:STC:ACTIVEX:ORACLE-DSCXB</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality DscXB onloadstatechange Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-FILEC.html">HTTP:STC:ACTIVEX:ORACLE-FILEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality FileChooserDlg onChangeDirectory Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORACLE-RCE.html">HTTP:STC:ACTIVEX:ORACLE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Data Quality Unsafe ActiveX Control Access Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AORCLE-WEBCENTR.html">HTTP:STC:ACTIVEX:ORCLE-WEBCENTR</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Control Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APANASONIC-API.html">HTTP:STC:ACTIVEX:PANASONIC-API</a></b></th>
   <td width="500" valign="top">
    HTTP: Panasonic Security API SDK Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3APROCLIMA-F1BV.html">HTTP:STC:ACTIVEX:PROCLIMA-F1BV</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima F1BookView Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQTPLUGINX.html">HTTP:STC:ACTIVEX:QTPLUGINX</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple Quicktime QTPlugin.ocx ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AQUEST-INTRUST.html">HTTP:STC:ACTIVEX:QUEST-INTRUST</a></b></th>
   <td width="500" valign="top">
    HTTP: Quest InTrust ArDoc.dll ActiveX
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAM-DVMR.html">HTTP:STC:ACTIVEX:SAM-DVMR</a></b></th>
   <td width="500" valign="top">
    HTTP: Samsung iPOLiS Device Manager Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAM-SMARTVIEW.html">HTTP:STC:ACTIVEX:SAM-SMARTVIEW</a></b></th>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer STWAxConfig Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSNG-KIES.html">HTTP:STC:ACTIVEX:SAMSNG-KIES</a></b></th>
   <td width="500" valign="top">
    HTTP: Samsung Kies Unsafe ActiveX Control Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-CNC.html">HTTP:STC:ACTIVEX:SAMSUNG-CNC</a></b></th>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer CNC_Ctrl Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASAMSUNG-VIEWER.html">HTTP:STC:ACTIVEX:SAMSUNG-VIEWER</a></b></th>
   <td width="500" valign="top">
    HTTP: Samsung SmartViewer Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER.html">HTTP:STC:ACTIVEX:SCHNEIDER</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric Multiple Products IsObjectModel RemoveParameter Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER-ELEC.html">HTTP:STC:ACTIVEX:SCHNEIDER-ELEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima MetaDraw ArrangeObjects Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASCHNEIDER-PROC.html">HTTP:STC:ACTIVEX:SCHNEIDER-PROC</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric ProClima Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASETHTMLFILE.html">HTTP:STC:ACTIVEX:SETHTMLFILE</a></b></th>
   <td width="500" valign="top">
    HTTP: Schneider Electric Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOLARWINDS.html">HTTP:STC:ACTIVEX:SOLARWINDS</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Server and Application Monitor Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASOLARWINDS-BO.html">HTTP:STC:ACTIVEX:SOLARWINDS-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: SolarWinds Server and Application Monitor Unsafe ActiveX Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3ASYNACTISPDF-BO.html">HTTP:STC:ACTIVEX:SYNACTISPDF-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Synactis PDF In The Box Unsafe Activex Control.
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUNITONICS-OPLC.html">HTTP:STC:ACTIVEX:UNITONICS-OPLC</a></b></th>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC TeeChart ActiveX RemoveSeries Out of Bounds Array Indexing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AUNITRONICS-COR.html">HTTP:STC:ACTIVEX:UNITRONICS-COR</a></b></th>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC TeeCommander Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVISBASIC6-AX-1.html">HTTP:STC:ACTIVEX:VISBASIC6-AX-1</a></b></th>
   <td width="500" valign="top">
    HTTP: Dangerous Visual Basic Unsafe ActiveX Control Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AVLOGIC-MEMCP.html">HTTP:STC:ACTIVEX:VLOGIC-MEMCP</a></b></th>
   <td width="500" valign="top">
    HTTP: Unitronics UniDownloader and VisiLogic OPLC IDE IPWorksSSL.HTTPS Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBGATE-WESP.html">HTTP:STC:ACTIVEX:WEBGATE-WESP</a></b></th>
   <td width="500" valign="top">
    HTTP: WebGate WESPSDK WESPDiscovery unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWEBGATE-WESPM.html">HTTP:STC:ACTIVEX:WEBGATE-WESPM</a></b></th>
   <td width="500" valign="top">
    HTTP: WebGate Multiple Products WESPMonitor unsafe ActiveX control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWELLINTECH.html">HTTP:STC:ACTIVEX:WELLINTECH</a></b></th>
   <td width="500" valign="top">
    HTTP: WellinTech kxClientDownload ActiveX Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AACTIVEX%3AWFILESTRING.html">HTTP:STC:ACTIVEX:WFILESTRING</a></b></th>
   <td width="500" valign="top">
    HTTP: HP LoadRunner WriteFileString Unsafe ActiveX Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2013-5065-PDF.html">HTTP:STC:ADOBE:2013-5065-PDF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2013-5065 Malicious Dropper
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3A2014-0557-RCE.html">HTTP:STC:ADOBE:2014-0557-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0557 Memory Leak
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AACROFORM-NULL-CE.html">HTTP:STC:ADOBE:ACROFORM-NULL-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader AcroForm Null Pointer Dereference Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ABYTEARRAY-UAF.html">HTTP:STC:ADOBE:BYTEARRAY-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Byte Array Class Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACONVFILTER-UAF.html">HTTP:STC:ADOBE:CONVFILTER-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player ConvolutionFilter Matrix Array Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACROSS-SEC-BYPASS.html">HTTP:STC:ADOBE:CROSS-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Cross-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-1862-CE.html">HTTP:STC:ADOBE:CVE-2009-1862-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2009-1862 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-2985-MC.html">HTTP:STC:ADOBE:CVE-2009-2985-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Compact Font Format Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-3791-MC.html">HTTP:STC:ADOBE:CVE-2009-3791-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Media Server Memory Exhaustion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2009-3959-OF.html">HTTP:STC:ADOBE:CVE-2009-3959-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Malformed U3D Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-0195-CE.html">HTTP:STC:ADOBE:CVE-2010-0195-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat TrueType Font Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-0197-MC.html">HTTP:STC:ADOBE:CVE-2010-0197-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2010-0197 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-2202-MC.html">HTTP:STC:ADOBE:CVE-2010-2202-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2010-2202 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2010-2873-CE.html">HTTP:STC:ADOBE:CVE-2010-2873-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Director CVE-2010-2873 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-0622-SB.html">HTTP:STC:ADOBE:CVE-2013-0622-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2013-0622 Remote Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3352-CE.html">HTTP:STC:ADOBE:CVE-2013-3352-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3352 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3353.html">HTTP:STC:ADOBE:CVE-2013-3353</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Head Tag Length Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3354-CE.html">HTTP:STC:ADOBE:CVE-2013-3354-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3354 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-3355-CE.html">HTTP:STC:ADOBE:CVE-2013-3355-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2013-3355 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5324-MC.html">HTTP:STC:ADOBE:CVE-2013-5324-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-5324 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5325-CE.html">HTTP:STC:ADOBE:CVE-2013-5325-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2013-5325 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5329-CE.html">HTTP:STC:ADOBE:CVE-2013-5329-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe SWF CVE-2013-5329 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5330-MC.html">HTTP:STC:ADOBE:CVE-2013-5330-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2013-5330 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5331-CE.html">HTTP:STC:ADOBE:CVE-2013-5331-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-5331 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2013-5332-CE.html">HTTP:STC:ADOBE:CVE-2013-5332-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-5332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0493-CE.html">HTTP:STC:ADOBE:CVE-2014-0493-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0493 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0506-UF.html">HTTP:STC:ADOBE:CVE-2014-0506-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0506 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0511-BO.html">HTTP:STC:ADOBE:CVE-2014-0511-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0511 Heap Based Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0512-CE.html">HTTP:STC:ADOBE:CVE-2014-0512-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0512 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0517-CE.html">HTTP:STC:ADOBE:CVE-2014-0517-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0517 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0518-CE.html">HTTP:STC:ADOBE:CVE-2014-0518-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0518 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0521.html">HTTP:STC:ADOBE:CVE-2014-0521</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0521 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0522-MC.html">HTTP:STC:ADOBE:CVE-2014-0522-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0522 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0523-CE.html">HTTP:STC:ADOBE:CVE-2014-0523-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader CVE-2014-0523 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0524-MC.html">HTTP:STC:ADOBE:CVE-2014-0524-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat and Reader CVE-2014-0524 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0531-MC.html">HTTP:STC:ADOBE:CVE-2014-0531-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0531 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0537-CE.html">HTTP:STC:ADOBE:CVE-2014-0537-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0537 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0538-UF.html">HTTP:STC:ADOBE:CVE-2014-0538-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player MMgc Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0539-CE.html">HTTP:STC:ADOBE:CVE-2014-0539-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0539 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0544-MC.html">HTTP:STC:ADOBE:CVE-2014-0544-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0544 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0545-MC.html">HTTP:STC:ADOBE:CVE-2014-0545-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0545 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0547-MC.html">HTTP:STC:ADOBE:CVE-2014-0547-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0547 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0548-PB.html">HTTP:STC:ADOBE:CVE-2014-0548-PB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0548 Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0550-BO.html">HTTP:STC:ADOBE:CVE-2014-0550-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0550 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0553-MC.html">HTTP:STC:ADOBE:CVE-2014-0553-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0553 Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0554.html">HTTP:STC:ADOBE:CVE-2014-0554</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Local File Access Protection Bypass (CVE-2014-0554)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0555-BO.html">HTTP:STC:ADOBE:CVE-2014-0555-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0555 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0558-CE.html">HTTP:STC:ADOBE:CVE-2014-0558-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0558 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0559-BO.html">HTTP:STC:ADOBE:CVE-2014-0559-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0559 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0564-MC.html">HTTP:STC:ADOBE:CVE-2014-0564-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0564 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0565-MC.html">HTTP:STC:ADOBE:CVE-2014-0565-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0565 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0567-OF.html">HTTP:STC:ADOBE:CVE-2014-0567-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0567 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0568-SE.html">HTTP:STC:ADOBE:CVE-2014-0568-SE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0568 Sandbox Escape
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0574-CE.html">HTTP:STC:ADOBE:CVE-2014-0574-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0574 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0574-MC.html">HTTP:STC:ADOBE:CVE-2014-0574-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0574 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0576-CE.html">HTTP:STC:ADOBE:CVE-2014-0576-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0576 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0577-CE.html">HTTP:STC:ADOBE:CVE-2014-0577-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0577 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0578-CE.html">HTTP:STC:ADOBE:CVE-2014-0578-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2014-0578 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0580-SB.html">HTTP:STC:ADOBE:CVE-2014-0580-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0580 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0584-CE.html">HTTP:STC:ADOBE:CVE-2014-0584-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0584 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0586-CE.html">HTTP:STC:ADOBE:CVE-2014-0586-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0586 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0587-MC.html">HTTP:STC:ADOBE:CVE-2014-0587-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0587 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-0588-CE.html">HTTP:STC:ADOBE:CVE-2014-0588-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0588 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-4671.html">HTTP:STC:ADOBE:CVE-2014-4671</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player and AIR CVE-2014-4671 Cross-Site Requeset Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8440-CE.html">HTTP:STC:ADOBE:CVE-2014-8440-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8440 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8440-ID.html">HTTP:STC:ADOBE:CVE-2014-8440-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8440 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8441-MC.html">HTTP:STC:ADOBE:CVE-2014-8441-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-8441 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8447-MC.html">HTTP:STC:ADOBE:CVE-2014-8447-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8447 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8449-CE.html">HTTP:STC:ADOBE:CVE-2014-8449-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8449 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8450-CE.html">HTTP:STC:ADOBE:CVE-2014-8450-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8450 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8451-ID.html">HTTP:STC:ADOBE:CVE-2014-8451-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat CVE-2014-8451 Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8452-SB.html">HTTP:STC:ADOBE:CVE-2014-8452-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8452 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8455-UF.html">HTTP:STC:ADOBE:CVE-2014-8455-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8455 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8459-MC.html">HTTP:STC:ADOBE:CVE-2014-8459-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8459 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8460-BO.html">HTTP:STC:ADOBE:CVE-2014-8460-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8460 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-8461-MC.html">HTTP:STC:ADOBE:CVE-2014-8461-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8461 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9150-SB.html">HTTP:STC:ADOBE:CVE-2014-9150-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9150 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9159-BO.html">HTTP:STC:ADOBE:CVE-2014-9159-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9159 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9160-CE.html">HTTP:STC:ADOBE:CVE-2014-9160-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-9160 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9161-CE.html">HTTP:STC:ADOBE:CVE-2014-9161-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2014-9161 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2014-9162-ID.html">HTTP:STC:ADOBE:CVE-2014-9162-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-9162 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0087-ID.html">HTTP:STC:ADOBE:CVE-2015-0087-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0087 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0089-ID.html">HTTP:STC:ADOBE:CVE-2015-0089-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0089 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0090-CE.html">HTTP:STC:ADOBE:CVE-2015-0090-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0090 Font Driver Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0091-CE.html">HTTP:STC:ADOBE:CVE-2015-0091-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0093-CE.html">HTTP:STC:ADOBE:CVE-2015-0093-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Font Driver CVE-2015-0093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0301-MC.html">HTTP:STC:ADOBE:CVE-2015-0301-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0301 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0302-ID.html">HTTP:STC:ADOBE:CVE-2015-0302-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0302 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0303-SB.html">HTTP:STC:ADOBE:CVE-2015-0303-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0303 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0305-MC.html">HTTP:STC:ADOBE:CVE-2015-0305-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0305 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0306-MC.html">HTTP:STC:ADOBE:CVE-2015-0306-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0306 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0307-DS.html">HTTP:STC:ADOBE:CVE-2015-0307-DS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0307 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0313-ID.html">HTTP:STC:ADOBE:CVE-2015-0313-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0313 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0314-BO.html">HTTP:STC:ADOBE:CVE-2015-0314-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0314 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0315-CE.html">HTTP:STC:ADOBE:CVE-2015-0315-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0315 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0316-CE.html">HTTP:STC:ADOBE:CVE-2015-0316-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0316 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0317-CE.html">HTTP:STC:ADOBE:CVE-2015-0317-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0317 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0318-CE.html">HTTP:STC:ADOBE:CVE-2015-0318-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0318 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0319-CE.html">HTTP:STC:ADOBE:CVE-2015-0319-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0319 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0320-CE.html">HTTP:STC:ADOBE:CVE-2015-0320-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0320 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0321-CE.html">HTTP:STC:ADOBE:CVE-2015-0321-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0321 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0322-CE.html">HTTP:STC:ADOBE:CVE-2015-0322-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0322 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0323-CE.html">HTTP:STC:ADOBE:CVE-2015-0323-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0323 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0324-CE.html">HTTP:STC:ADOBE:CVE-2015-0324-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0324 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0325-CE.html">HTTP:STC:ADOBE:CVE-2015-0325-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0325 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0326-DS.html">HTTP:STC:ADOBE:CVE-2015-0326-DS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0326 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0328-CE.html">HTTP:STC:ADOBE:CVE-2015-0328-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0328 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0329-CE.html">HTTP:STC:ADOBE:CVE-2015-0329-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0329 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0330-CE.html">HTTP:STC:ADOBE:CVE-2015-0330-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0330 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0333-MC.html">HTTP:STC:ADOBE:CVE-2015-0333-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0333 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0334-CE.html">HTTP:STC:ADOBE:CVE-2015-0334-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0334 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0335-CE.html">HTTP:STC:ADOBE:CVE-2015-0335-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0335 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0337-PB.html">HTTP:STC:ADOBE:CVE-2015-0337-PB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0337 Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0338-CE.html">HTTP:STC:ADOBE:CVE-2015-0338-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0338 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0339-CE.html">HTTP:STC:ADOBE:CVE-2015-0339-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0339 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0340-CE.html">HTTP:STC:ADOBE:CVE-2015-0340-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0340 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0341-CE.html">HTTP:STC:ADOBE:CVE-2015-0341-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0341 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0342-CE.html">HTTP:STC:ADOBE:CVE-2015-0342-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0342 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0346-CE.html">HTTP:STC:ADOBE:CVE-2015-0346-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0346 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0347-CE.html">HTTP:STC:ADOBE:CVE-2015-0347-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0347 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0348-CE.html">HTTP:STC:ADOBE:CVE-2015-0348-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0348 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0349-CE.html">HTTP:STC:ADOBE:CVE-2015-0349-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0349 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0350-MC.html">HTTP:STC:ADOBE:CVE-2015-0350-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0350 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0351-MC.html">HTTP:STC:ADOBE:CVE-2015-0351-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0351 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0352-MC.html">HTTP:STC:ADOBE:CVE-2015-0352-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0352 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0353-CE.html">HTTP:STC:ADOBE:CVE-2015-0353-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0353 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0354-MC.html">HTTP:STC:ADOBE:CVE-2015-0354-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0354 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0355-MC.html">HTTP:STC:ADOBE:CVE-2015-0355-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0355 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0356-CE.html">HTTP:STC:ADOBE:CVE-2015-0356-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0356 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0357-CE.html">HTTP:STC:ADOBE:CVE-2015-0357-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0357 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0358-CE.html">HTTP:STC:ADOBE:CVE-2015-0358-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0358 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0359-MC.html">HTTP:STC:ADOBE:CVE-2015-0359-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0359 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-0360-MC.html">HTTP:STC:ADOBE:CVE-2015-0360-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0360 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-2417-CE.html">HTTP:STC:ADOBE:CVE-2015-2417-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-2417 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3038-MC.html">HTTP:STC:ADOBE:CVE-2015-3038-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3038 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3040-ID.html">HTTP:STC:ADOBE:CVE-2015-3040-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3040  Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3041-CE.html">HTTP:STC:ADOBE:CVE-2015-3041-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3041 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3042-CE.html">HTTP:STC:ADOBE:CVE-2015-3042-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3043-CE.html">HTTP:STC:ADOBE:CVE-2015-3043-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3043 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3044-ID.html">HTTP:STC:ADOBE:CVE-2015-3044-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3044 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3046-CE.html">HTTP:STC:ADOBE:CVE-2015-3046-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3046 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3047-CE.html">HTTP:STC:ADOBE:CVE-2015-3047-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3047 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3050-CE.html">HTTP:STC:ADOBE:CVE-2015-3050-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3051-CE.html">HTTP:STC:ADOBE:CVE-2015-3051-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3051 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3052-CE.html">HTTP:STC:ADOBE:CVE-2015-3052-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3053-CE.html">HTTP:STC:ADOBE:CVE-2015-3053-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3053 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3054-CE.html">HTTP:STC:ADOBE:CVE-2015-3054-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3054 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3055-CE.html">HTTP:STC:ADOBE:CVE-2015-3055-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3055 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3056-MC.html">HTTP:STC:ADOBE:CVE-2015-3056-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3056 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3059-CE.html">HTTP:STC:ADOBE:CVE-2015-3059-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3059 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3062-CE.html">HTTP:STC:ADOBE:CVE-2015-3062-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3062 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3064-CE.html">HTTP:STC:ADOBE:CVE-2015-3064-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3064 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3070-CE.html">HTTP:STC:ADOBE:CVE-2015-3070-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3070 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3072-CE.html">HTTP:STC:ADOBE:CVE-2015-3072-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-3072 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3074-CE.html">HTTP:STC:ADOBE:CVE-2015-3074-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3074 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3076-CE.html">HTTP:STC:ADOBE:CVE-2015-3076-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3076 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3077-CE.html">HTTP:STC:ADOBE:CVE-2015-3077-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3077 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3078-DS.html">HTTP:STC:ADOBE:CVE-2015-3078-DS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3078 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3079-SB.html">HTTP:STC:ADOBE:CVE-2015-3079-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3079 Cross Domain Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3080-CE.html">HTTP:STC:ADOBE:CVE-2015-3080-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3080 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3081-BP.html">HTTP:STC:ADOBE:CVE-2015-3081-BP</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3081 bypass Internet Explorer Protected Mode
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3084-CE.html">HTTP:STC:ADOBE:CVE-2015-3084-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3084 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3085-VB.html">HTTP:STC:ADOBE:CVE-2015-3085-VB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3085 Validation Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3086-CE.html">HTTP:STC:ADOBE:CVE-2015-3086-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3087-CE.html">HTTP:STC:ADOBE:CVE-2015-3087-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3088-BO.html">HTTP:STC:ADOBE:CVE-2015-3088-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3088 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3089-CE.html">HTTP:STC:ADOBE:CVE-2015-3089-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3090-CE.html">HTTP:STC:ADOBE:CVE-2015-3090-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3090 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3091-CE.html">HTTP:STC:ADOBE:CVE-2015-3091-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3092-CE.html">HTTP:STC:ADOBE:CVE-2015-3092-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3093-CE.html">HTTP:STC:ADOBE:CVE-2015-3093-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3096-SB.html">HTTP:STC:ADOBE:CVE-2015-3096-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3096 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3098-CE.html">HTTP:STC:ADOBE:CVE-2015-3098-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3098 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3099-ID.html">HTTP:STC:ADOBE:CVE-2015-3099-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3099 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3100-CE.html">HTTP:STC:ADOBE:CVE-2015-3100-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3102-SB.html">HTTP:STC:ADOBE:CVE-2015-3102-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3102 SOP Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3103-CE.html">HTTP:STC:ADOBE:CVE-2015-3103-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3103 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3104-CE.html">HTTP:STC:ADOBE:CVE-2015-3104-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3106-CE.html">HTTP:STC:ADOBE:CVE-2015-3106-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3107-CE.html">HTTP:STC:ADOBE:CVE-2015-3107-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3108-CE.html">HTTP:STC:ADOBE:CVE-2015-3108-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3108 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3114-ID.html">HTTP:STC:ADOBE:CVE-2015-3114-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3114 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3116-CE.html">HTTP:STC:ADOBE:CVE-2015-3116-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3116 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3117-CE.html">HTTP:STC:ADOBE:CVE-2015-3117-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3117 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3118-CE.html">HTTP:STC:ADOBE:CVE-2015-3118-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3118 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3119-CE.html">HTTP:STC:ADOBE:CVE-2015-3119-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3119 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-312-RCE.html">HTTP:STC:ADOBE:CVE-2015-312-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0312 remote code execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3120-CE.html">HTTP:STC:ADOBE:CVE-2015-3120-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3120 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3121-CE.html">HTTP:STC:ADOBE:CVE-2015-3121-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3121 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3122-CE.html">HTTP:STC:ADOBE:CVE-2015-3122-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3123-CE.html">HTTP:STC:ADOBE:CVE-2015-3123-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3123 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3124-CE.html">HTTP:STC:ADOBE:CVE-2015-3124-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3124 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3125-ID.html">HTTP:STC:ADOBE:CVE-2015-3125-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3125 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3126-CE.html">HTTP:STC:ADOBE:CVE-2015-3126-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3126 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3127-UF.html">HTTP:STC:ADOBE:CVE-2015-3127-UF</a></b></th>
   <td width="500" valign="top">
    Adobe Flash CVE-2015-3127 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3128-CE.html">HTTP:STC:ADOBE:CVE-2015-3128-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3128 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3129-CE.html">HTTP:STC:ADOBE:CVE-2015-3129-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-3129 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3130-CE.html">HTTP:STC:ADOBE:CVE-2015-3130-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3132-UF.html">HTTP:STC:ADOBE:CVE-2015-3132-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3132 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3133-DS.html">HTTP:STC:ADOBE:CVE-2015-3133-DS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-3133 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-3134-BO.html">HTTP:STC:ADOBE:CVE-2015-3134-BO</a></b></th>
   <td width="500" valign="top">
    HTTP:  Adobe Flash CVE-2015-3134 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4429-CE.html">HTTP:STC:ADOBE:CVE-2015-4429-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4429 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4430-CE.html">HTTP:STC:ADOBE:CVE-2015-4430-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4430 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4431-CE.html">HTTP:STC:ADOBE:CVE-2015-4431-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4431 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4433-CE.html">HTTP:STC:ADOBE:CVE-2015-4433-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-4433 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4435-CE.html">HTTP:STC:ADOBE:CVE-2015-4435-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4441-CE.html">HTTP:STC:ADOBE:CVE-2015-4441-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4441 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4446-CE.html">HTTP:STC:ADOBE:CVE-2015-4446-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4446 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4447-CE.html">HTTP:STC:ADOBE:CVE-2015-4447-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-4447 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4448-CE.html">HTTP:STC:ADOBE:CVE-2015-4448-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-4448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4449-CE.html">HTTP:STC:ADOBE:CVE-2015-4449-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4449 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4451-CE.html">HTTP:STC:ADOBE:CVE-2015-4451-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-4451 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-4452-CE.html">HTTP:STC:ADOBE:CVE-2015-4452-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-4452 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5085-CE.html">HTTP:STC:ADOBE:CVE-2015-5085-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5085 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5086-CE.html">HTTP:STC:ADOBE:CVE-2015-5086-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5087-CE.html">HTTP:STC:ADOBE:CVE-2015-5087-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5088-CE.html">HTTP:STC:ADOBE:CVE-2015-5088-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5088 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5089-CE.html">HTTP:STC:ADOBE:CVE-2015-5089-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-5089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5090-CE.html">HTTP:STC:ADOBE:CVE-2015-5090-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5090 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5091-CE.html">HTTP:STC:ADOBE:CVE-2015-5091-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5092-CE.html">HTTP:STC:ADOBE:CVE-2015-5092-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5093-CE.html">HTTP:STC:ADOBE:CVE-2015-5093-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5095-CE.html">HTTP:STC:ADOBE:CVE-2015-5095-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5095 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5096-CE.html">HTTP:STC:ADOBE:CVE-2015-5096-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5096 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5098-CE.html">HTTP:STC:ADOBE:CVE-2015-5098-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5098 Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5100-CE.html">HTTP:STC:ADOBE:CVE-2015-5100-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5102-CE.html">HTTP:STC:ADOBE:CVE-2015-5102-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5102 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5104-CE.html">HTTP:STC:ADOBE:CVE-2015-5104-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5105-CE.html">HTTP:STC:ADOBE:CVE-2015-5105-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2015-5105 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5106-CE.html">HTTP:STC:ADOBE:CVE-2015-5106-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5107-CE.html">HTTP:STC:ADOBE:CVE-2015-5107-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5108-BO.html">HTTP:STC:ADOBE:CVE-2015-5108-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5108 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5109-CE.html">HTTP:STC:ADOBE:CVE-2015-5109-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5109 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5113-CE.html">HTTP:STC:ADOBE:CVE-2015-5113-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5113 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5115-OB.html">HTTP:STC:ADOBE:CVE-2015-5115-OB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf CVE-2015-5115 Out-of-bound Memory Read
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5123-CE.html">HTTP:STC:ADOBE:CVE-2015-5123-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5123 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5123-UF.html">HTTP:STC:ADOBE:CVE-2015-5123-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5123 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5125-CE.html">HTTP:STC:ADOBE:CVE-2015-5125-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5125 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5126-CE.html">HTTP:STC:ADOBE:CVE-2015-5126-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5126 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5129-CE.html">HTTP:STC:ADOBE:CVE-2015-5129-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5129 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5130-CE.html">HTTP:STC:ADOBE:CVE-2015-5130-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5131-CE.html">HTTP:STC:ADOBE:CVE-2015-5131-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5131 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5132-CE.html">HTTP:STC:ADOBE:CVE-2015-5132-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5132 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5133-CE.html">HTTP:STC:ADOBE:CVE-2015-5133-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5133 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5134-CE.html">HTTP:STC:ADOBE:CVE-2015-5134-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5134 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5539-CE.html">HTTP:STC:ADOBE:CVE-2015-5539-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5539 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5540-CE.html">HTTP:STC:ADOBE:CVE-2015-5540-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5540 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5541-CE.html">HTTP:STC:ADOBE:CVE-2015-5541-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5541 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5543-CE.html">HTTP:STC:ADOBE:CVE-2015-5543-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5543 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5544-CE.html">HTTP:STC:ADOBE:CVE-2015-5544-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5544 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5545-CE.html">HTTP:STC:ADOBE:CVE-2015-5545-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5545 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5546-CE.html">HTTP:STC:ADOBE:CVE-2015-5546-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5546 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5547-CE.html">HTTP:STC:ADOBE:CVE-2015-5547-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5547 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5548-CE.html">HTTP:STC:ADOBE:CVE-2015-5548-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5548 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5549-CE.html">HTTP:STC:ADOBE:CVE-2015-5549-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5549 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5550-CE.html">HTTP:STC:ADOBE:CVE-2015-5550-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5550 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5551-CE.html">HTTP:STC:ADOBE:CVE-2015-5551-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5551 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5552-CE.html">HTTP:STC:ADOBE:CVE-2015-5552-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5552 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5553-CE.html">HTTP:STC:ADOBE:CVE-2015-5553-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5553 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5554-CE.html">HTTP:STC:ADOBE:CVE-2015-5554-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5554 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5555-CE.html">HTTP:STC:ADOBE:CVE-2015-5555-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5555 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5556-CE.html">HTTP:STC:ADOBE:CVE-2015-5556-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5556 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5557-CE.html">HTTP:STC:ADOBE:CVE-2015-5557-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5557 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5558-CE.html">HTTP:STC:ADOBE:CVE-2015-5558-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5558 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5559-CE.html">HTTP:STC:ADOBE:CVE-2015-5559-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5559 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5560-CE.html">HTTP:STC:ADOBE:CVE-2015-5560-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5560 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5561-CE.html">HTTP:STC:ADOBE:CVE-2015-5561-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5561 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5562-CE.html">HTTP:STC:ADOBE:CVE-2015-5562-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5562 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5563-UF.html">HTTP:STC:ADOBE:CVE-2015-5563-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5563 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5564-CE.html">HTTP:STC:ADOBE:CVE-2015-5564-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5564 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5565-CE.html">HTTP:STC:ADOBE:CVE-2015-5565-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5565 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5567-CE.html">HTTP:STC:ADOBE:CVE-2015-5567-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5567 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5568-CE.html">HTTP:STC:ADOBE:CVE-2015-5568-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5568 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5570-CE.html">HTTP:STC:ADOBE:CVE-2015-5570-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5570 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5573-CE.html">HTTP:STC:ADOBE:CVE-2015-5573-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5573 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5574-CE.html">HTTP:STC:ADOBE:CVE-2015-5574-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5574 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5575-CE.html">HTTP:STC:ADOBE:CVE-2015-5575-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5575 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5576-CE.html">HTTP:STC:ADOBE:CVE-2015-5576-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5576 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5578-CE.html">HTTP:STC:ADOBE:CVE-2015-5578-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-5578 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5579-DS.html">HTTP:STC:ADOBE:CVE-2015-5579-DS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5579 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5580-CE.html">HTTP:STC:ADOBE:CVE-2015-5580-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe CVE-2015-5580 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5581-CE.html">HTTP:STC:ADOBE:CVE-2015-5581-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5581 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5582-SF.html">HTTP:STC:ADOBE:CVE-2015-5582-SF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5580 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5584-CE.html">HTTP:STC:ADOBE:CVE-2015-5584-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5584 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5587-CE.html">HTTP:STC:ADOBE:CVE-2015-5587-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5587 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-5588-CE.html">HTTP:STC:ADOBE:CVE-2015-5588-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-5588 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6676-CE.html">HTTP:STC:ADOBE:CVE-2015-6676-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6676 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6678-CE.html">HTTP:STC:ADOBE:CVE-2015-6678-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6678 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6679-CE.html">HTTP:STC:ADOBE:CVE-2015-6679-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6679 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-6682-CE.html">HTTP:STC:ADOBE:CVE-2015-6682-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-6682 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7625-CE.html">HTTP:STC:ADOBE:CVE-2015-7625-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7625 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7627-CE.html">HTTP:STC:ADOBE:CVE-2015-7627-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7627 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7628-PE.html">HTTP:STC:ADOBE:CVE-2015-7628-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7628 Top-level And Inner Frame Navigation 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7629-CE.html">HTTP:STC:ADOBE:CVE-2015-7629-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7629 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7631-CE.html">HTTP:STC:ADOBE:CVE-2015-7631-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7631 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7632-CE.html">HTTP:STC:ADOBE:CVE-2015-7632-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7632 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7633-CE.html">HTTP:STC:ADOBE:CVE-2015-7633-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7633 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7651-CE.html">HTTP:STC:ADOBE:CVE-2015-7651-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7652-CE.html">HTTP:STC:ADOBE:CVE-2015-7652-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7652 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7653-CE.html">HTTP:STC:ADOBE:CVE-2015-7653-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7653 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7654-CE.html">HTTP:STC:ADOBE:CVE-2015-7654-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7654 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7655-CE.html">HTTP:STC:ADOBE:CVE-2015-7655-CE</a></b></th>
   <td width="500" valign="top">
     HTTP: Adobe Flash Player CVE-2015-7655 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7657-CE.html">HTTP:STC:ADOBE:CVE-2015-7657-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7657 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7659-CE.html">HTTP:STC:ADOBE:CVE-2015-7659-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7659 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7660-UF.html">HTTP:STC:ADOBE:CVE-2015-7660-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-7660 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-7663-CE.html">HTTP:STC:ADOBE:CVE-2015-7663-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-7663 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8042-UF.html">HTTP:STC:ADOBE:CVE-2015-8042-UF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8042 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8048-CE.html">HTTP:STC:ADOBE:CVE-2015-8048-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8060-CE.html">HTTP:STC:ADOBE:CVE-2015-8060-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8060 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8407-CE.html">HTTP:STC:ADOBE:CVE-2015-8407-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8407 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8408-CE.html">HTTP:STC:ADOBE:CVE-2015-8408-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8408 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8414-CE.html">HTTP:STC:ADOBE:CVE-2015-8414-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8414 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8418-CE.html">HTTP:STC:ADOBE:CVE-2015-8418-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8418 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8419-CE.html">HTTP:STC:ADOBE:CVE-2015-8419-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8419 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8435-CE.html">HTTP:STC:ADOBE:CVE-2015-8435-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8436-CE.html">HTTP:STC:ADOBE:CVE-2015-8436-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8436 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8437-CE.html">HTTP:STC:ADOBE:CVE-2015-8437-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8437 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8438-CE.html">HTTP:STC:ADOBE:CVE-2015-8438-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8438 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8439-CE.html">HTTP:STC:ADOBE:CVE-2015-8439-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8439 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8442-CE.html">HTTP:STC:ADOBE:CVE-2015-8442-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8442 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8443-CE.html">HTTP:STC:ADOBE:CVE-2015-8443-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8443 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8444-CE.html">HTTP:STC:ADOBE:CVE-2015-8444-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8444 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8445-CE.html">HTTP:STC:ADOBE:CVE-2015-8445-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8445 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8446-CE.html">HTTP:STC:ADOBE:CVE-2015-8446-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Falsh CVE-2015-8446 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8447-CE.html">HTTP:STC:ADOBE:CVE-2015-8447-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8447 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8448-CE.html">HTTP:STC:ADOBE:CVE-2015-8448-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2015-8448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8449-CE.html">HTTP:STC:ADOBE:CVE-2015-8449-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8449 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8450-CE.html">HTTP:STC:ADOBE:CVE-2015-8450-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8450 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8457-CE.html">HTTP:STC:ADOBE:CVE-2015-8457-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8457 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8459-CE.html">HTTP:STC:ADOBE:CVE-2015-8459-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8459 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8460-CE.html">HTTP:STC:ADOBE:CVE-2015-8460-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8460 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8634-CE.html">HTTP:STC:ADOBE:CVE-2015-8634-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8634 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8635-CE.html">HTTP:STC:ADOBE:CVE-2015-8635-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8635 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8636-CE.html">HTTP:STC:ADOBE:CVE-2015-8636-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8636 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8638-CE.html">HTTP:STC:ADOBE:CVE-2015-8638-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8638 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8639-CE.html">HTTP:STC:ADOBE:CVE-2015-8639-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8639 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8640-CE.html">HTTP:STC:ADOBE:CVE-2015-8640-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8640 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8641-CE.html">HTTP:STC:ADOBE:CVE-2015-8641-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8641 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8642-CE.html">HTTP:STC:ADOBE:CVE-2015-8642-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8642 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8643-CE.html">HTTP:STC:ADOBE:CVE-2015-8643-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8643 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8644-CE.html">HTTP:STC:ADOBE:CVE-2015-8644-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8644 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8645-CE.html">HTTP:STC:ADOBE:CVE-2015-8645-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8645 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8646-CE.html">HTTP:STC:ADOBE:CVE-2015-8646-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8646 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8647-CE.html">HTTP:STC:ADOBE:CVE-2015-8647-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8647 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8648-CE.html">HTTP:STC:ADOBE:CVE-2015-8648-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8648 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8649-CE.html">HTTP:STC:ADOBE:CVE-2015-8649-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8649 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8650-CE.html">HTTP:STC:ADOBE:CVE-2015-8650-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-8650 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2015-8651-CE.html">HTTP:STC:ADOBE:CVE-2015-8651-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-8651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0931-CE.html">HTTP:STC:ADOBE:CVE-2016-0931-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0931 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0933-CE.html">HTTP:STC:ADOBE:CVE-2016-0933-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0933 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0934-CE.html">HTTP:STC:ADOBE:CVE-2016-0934-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0934 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0935-CE.html">HTTP:STC:ADOBE:CVE-2016-0935-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0935 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0936-CE.html">HTTP:STC:ADOBE:CVE-2016-0936-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0936 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0938-CE.html">HTTP:STC:ADOBE:CVE-2016-0938-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0938 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0939-CE.html">HTTP:STC:ADOBE:CVE-2016-0939-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0939 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0940-CE.html">HTTP:STC:ADOBE:CVE-2016-0940-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0940 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0943-CE.html">HTTP:STC:ADOBE:CVE-2016-0943-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0943 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0944-CE.html">HTTP:STC:ADOBE:CVE-2016-0944-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2016-0944 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0945-CE.html">HTTP:STC:ADOBE:CVE-2016-0945-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0945 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0946-CE.html">HTTP:STC:ADOBE:CVE-2016-0946-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF CVE-2016-0946 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE-2016-0947-CE.html">HTTP:STC:ADOBE:CVE-2016-0947-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Exe CVE-2016-0947 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE2014-8456-DOS.html">HTTP:STC:ADOBE:CVE2014-8456-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-8456 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ACVE2015-0309-RCE.html">HTTP:STC:ADOBE:CVE2015-0309-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0309 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADC-2015-5097-CE.html">HTTP:STC:ADOBE:DC-2015-5097-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-5097 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADIRECTOR-FILE-MC.html">HTTP:STC:ADOBE:DIRECTOR-FILE-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Director file Multiple Record Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ADOMAIN-MEMORY.html">HTTP:STC:ADOBE:DOMAIN-MEMORY</a></b></th>
   <td width="500" valign="top">
    HTTP:Adobe Flash Player-Dangling Pointer-RCE
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-AS3-MC.html">HTTP:STC:ADOBE:FLASH-AS3-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash AS3 Pcre Assertion Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-CVE15-0304.html">HTTP:STC:ADOBE:FLASH-CVE15-0304</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0304 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-CVE15-0308.html">HTTP:STC:ADOBE:FLASH-CVE15-0308</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-0308 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INFO-DISC.html">HTTP:STC:ADOBE:FLASH-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0492 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-INFODISC.html">HTTP:STC:ADOBE:FLASH-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0508 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MATRX3D-IO.html">HTTP:STC:ADOBE:FLASH-MATRX3D-IO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Matrix3D copyRawDataTo Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-MP3-TAG-CE.html">HTTP:STC:ADOBE:FLASH-MP3-TAG-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash MP3 ID3 Tag Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PL-JPEG-OF.html">HTTP:STC:ADOBE:FLASH-PL-JPEG-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player JPEG Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-BO.html">HTTP:STC:ADOBE:FLASH-PLAYER-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0507 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-BOF.html">HTTP:STC:ADOBE:FLASH-PLAYER-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player File Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLAYER-XSS.html">HTTP:STC:ADOBE:FLASH-PLAYER-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0509 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-PLY-BYPASS.html">HTTP:STC:ADOBE:FLASH-PLY-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0535 Security Bounds Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-REGEX-DOS.html">HTTP:STC:ADOBE:FLASH-REGEX-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player RegeEx Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASH-TYPE-CONF.html">HTTP:STC:ADOBE:FLASH-TYPE-CONF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player iExternalizable Interface readExternal Method Type Confusion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLR-FILE-MC.html">HTTP:STC:ADOBE:FLASHPLR-FILE-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Improper File Parsing Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AFLASHPLYR-SBYPAS.html">HTTP:STC:ADOBE:FLASHPLYR-SBYPAS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player URI Handling Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AGETANNOTS-RCE.html">HTTP:STC:ADOBE:GETANNOTS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader PDF JavaScript getAnnots Method Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJS-API-CE.html">HTTP:STC:ADOBE:JS-API-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF JavaScript API Execution Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AJS-TERMINATE-UAF.html">HTTP:STC:ADOBE:JS-TERMINATE-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader PDF Document Closed Prior To Javascript Termination Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMAL-FLV-BOF.html">HTTP:STC:ADOBE:MAL-FLV-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Malformed FLV File Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEM-PTR-LEAK.html">HTTP:STC:ADOBE:MEM-PTR-LEAK</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Pointer Memory Leak
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMDSC-2014-0552.html">HTTP:STC:ADOBE:MEMDSC-2014-0552</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Disclosure (CVE-2014-0552)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMLK-2014-0542.html">HTTP:STC:ADOBE:MEMLK-2014-0542</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Memory Leak
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMEMLK-2014-0543.html">HTTP:STC:ADOBE:MEMLK-2014-0543</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0543 Memory Leak
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AMUL-JS-API-CE.html">HTTP:STC:ADOBE:MUL-JS-API-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Pdf Mul JavaScript API Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ANETMONITOR-UAF.html">HTTP:STC:ADOBE:NETMONITOR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player NetMonitor Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-U3D-BO.html">HTTP:STC:ADOBE:PDF-U3D-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: PDF U3D RHAdobeMeta Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APDF-UAF-RCE.html">HTTP:STC:ADOBE:PDF-UAF-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Use After Free Handle Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3APHOTOSHOP-TIF-OF.html">HTTP:STC:ADOBE:PHOTOSHOP-TIF-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Photoshop CS4 TIFF Parsing Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-API-CE.html">HTTP:STC:ADOBE:READER-API-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader API Call Handling Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-CRASH.html">HTTP:STC:ADOBE:READER-CRASH</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Pointer Dereferenced Leads to Crash
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DCT-NULL.html">HTTP:STC:ADOBE:READER-DCT-NULL</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader DCT Encoded Stream Null Pointer Dereference Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-DOS.html">HTTP:STC:ADOBE:READER-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Node Access Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FILE-DOS.html">HTTP:STC:ADOBE:READER-FILE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Improper File Parsing Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FILE-RCE.html">HTTP:STC:ADOBE:READER-FILE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Incorrect File Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FONT-OF.html">HTTP:STC:ADOBE:READER-FONT-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Font Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-FORM-UAF.html">HTTP:STC:ADOBE:READER-FORM-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Improper Form Handling Use-after-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-HEAP-OVF.html">HTTP:STC:ADOBE:READER-HEAP-OVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2013-3358 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-INFODISC.html">HTTP:STC:ADOBE:READER-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Acrobat Reader Improper JavaScript Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-JS-RCE.html">HTTP:STC:ADOBE:READER-JS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Eval Function Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-NULL-PTR.html">HTTP:STC:ADOBE:READER-NULL-PTR</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2014-0495 Null Pointer Dereference
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-SECBYPASS.html">HTTP:STC:ADOBE:READER-SECBYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Sandbox Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-TTF-DESC.html">HTTP:STC:ADOBE:READER-TTF-DESC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader TTF Descriptions Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADER-UAF.html">HTTP:STC:ADOBE:READER-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe PDF Reader CVE-2014-0527 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AREADR-ACROBAT-BO.html">HTTP:STC:ADOBE:READR-ACROBAT-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader and Acrobat Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASHOCKWAVE-3D-OF.html">HTTP:STC:ADOBE:SHOCKWAVE-3D-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Shockwave 3D Stucture HeapOoverflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-2015-5572-SB.html">HTTP:STC:ADOBE:SWF-2015-5572-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2015-5572 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-INFO-DISC.html">HTTP:STC:ADOBE:SWF-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0504 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ASWF-MEM-CORR.html">HTTP:STC:ADOBE:SWF-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2013-3363 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATEXT-NETCONNECT.html">HTTP:STC:ADOBE:TEXT-NETCONNECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Race Condition Between Text Drawing And NetConnection Object
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATEXTLINE-OB-CE.html">HTTP:STC:ADOBE:TEXTLINE-OB-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash TextLine OpaqueBackground Property Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3ATHUMBNAIL-RCE.html">HTTP:STC:ADOBE:THUMBNAIL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader Thumbnail View Remote Code Execurtion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWRITE-CONFUSION.html">HTTP:STC:ADOBE:WRITE-CONFUSION</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player writeExternal Type Confusion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADOBE%3AWRTE-WAT-WHRE-CE.html">HTTP:STC:ADOBE:WRTE-WAT-WHRE-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Shader Object Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AADVANTEC-WEBACSES-BOF.html">HTTP:STC:ADVANTEC-WEBACSES-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Advantech WebAccess IP Address Parameter Handling Length Check Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPENDED-MAL-JS.html">HTTP:STC:APPENDED-MAL-JS</a></b></th>
   <td width="500" valign="top">
    HTTP: Malicious JavaScript Appended to Existing JavaScript
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-QUIKTME-CE.html">HTTP:STC:APPLE-QUIKTME-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple QuickTime Crafted Movie Files Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AAPPLE-RTSP-DOS.html">HTTP:STC:APPLE-RTSP-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple QuickTime RTSP Response Header Content-Length Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AAWSNAP-DOS.html">HTTP:STC:CHROME:AWSNAP-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Chrome AwSnap Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ACLPBRD-DATA-MC.html">HTTP:STC:CHROME:CLPBRD-DATA-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Clipboard Data Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ADOM-UAF.html">HTTP:STC:CHROME:DOM-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome DOM Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AID-ATTR-OBJ-UAF.html">HTTP:STC:CHROME:ID-ATTR-OBJ-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Object Elements Id Attribute Related Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AIFRAME-VIDEO-MC.html">HTTP:STC:CHROME:IFRAME-VIDEO-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Web Browser Video In Iframe Memory Corruption.
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ALOCATION-UAF.html">HTTP:STC:CHROME:LOCATION-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome locationAttributeSetter Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AMUTATIONOBS-UAF.html">HTTP:STC:CHROME:MUTATIONOBS-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Mutations Observer Object Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ANOTIFY-IWD-UAF.html">HTTP:STC:CHROME:NOTIFY-IWD-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome NotifyInstanceWasDeleted Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AOBJ-BFRLOAD-UAF.html">HTTP:STC:CHROME:OBJ-BFRLOAD-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Object Beforeload Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3APEPPER-PLGN-UAF.html">HTTP:STC:CHROME:PEPPER-PLGN-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Pepper Plugin User After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ARANGE-BLUR-MC.html">HTTP:STC:CHROME:RANGE-BLUR-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Selection In Mutation Event Handler Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ASVG-ELMNT-UAF.html">HTTP:STC:CHROME:SVG-ELMNT-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Blink buildShadowAndInstanceTree Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ATABLE-CSS-MC.html">HTTP:STC:CHROME:TABLE-CSS-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3ATEMPLTE-DOM-UAF.html">HTTP:STC:CHROME:TEMPLTE-DOM-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome Web Browser Template Element DOM based Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACHROME%3AV8-ARRAY-OOB.html">HTTP:STC:CHROME:V8-ARRAY-OOB</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Chrome V8 Dehoistable Array Out Of Bound Read
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACLSID%3AACTIVEX%3ABB-PURE.html">HTTP:STC:CLSID:ACTIVEX:BB-PURE</a></b></th>
   <td width="500" valign="top">
    HTTP: Canvas Babybottle Pure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACPTEXIMG2D-IO.html">HTTP:STC:CPTEXIMG2D-IO</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CopyTexImage2D Integer Overflow.
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACURL-COOKIE-PATH-RCE.html">HTTP:STC:CURL-COOKIE-PATH-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Curl Cookie Path Element Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0058-PRIV.html">HTTP:STC:CVE-2015-0058-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0058 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0062-PRIV.html">HTTP:STC:CVE-2015-0062-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0062 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-0076-INF-DSC.html">HTTP:STC:CVE-2015-0076-INF-DSC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0076 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1677-ID.html">HTTP:STC:CVE-2015-1677-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1677 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1699-RCE.html">HTTP:STC:CVE-2015-1699-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1699 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1722-KERNL-PE.html">HTTP:STC:CVE-2015-1722-KERNL-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1722 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1723-CE.html">HTTP:STC:CVE-2015-1723-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-1723 Server Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1724-BO.html">HTTP:STC:CVE-2015-1724-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1724 Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1727-RCE.html">HTTP:STC:CVE-2015-1727-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windowds CVE-2015-1727 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-1768-PE.html">HTTP:STC:CVE-2015-1768-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1768 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2484-FD.html">HTTP:STC:CVE-2015-2484-FD</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-2484 Remote File Deletion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2507-CE.html">HTTP:STC:CVE-2015-2507-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2507 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2513-RCE.html">HTTP:STC:CVE-2015-2513-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-2513 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2524-PE.html">HTTP:STC:CVE-2015-2524-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2524 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2528-PE.html">HTTP:STC:CVE-2015-2528-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2528 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2545-UAF.html">HTTP:STC:CVE-2015-2545-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2545 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-2554-PE.html">HTTP:STC:CVE-2015-2554-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2554 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6049-CE.html">HTTP:STC:CVE-2015-6049-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6049 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6066-UAF.html">HTTP:STC:CVE-2015-6066-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6066 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6088-RCE.html">HTTP:STC:CVE-2015-6088-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6088 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6097-RCE.html">HTTP:STC:CVE-2015-6097-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6097 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6103-RCE.html">HTTP:STC:CVE-2015-6103-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6103 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6130-CE.html">HTTP:STC:CVE-2015-6130-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-6130 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6135-CE.html">HTTP:STC:CVE-2015-6135-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6135 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6140-CE.html">HTTP:STC:CVE-2015-6140-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6140 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6143-CE.html">HTTP:STC:CVE-2015-6143-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6143 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6160-CE.html">HTTP:STC:CVE-2015-6160-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6160 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6164-CSS.html">HTTP:STC:CVE-2015-6164-CSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6164 Cross-site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6168-RCE.html">HTTP:STC:CVE-2015-6168-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6168 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6171-PE.html">HTTP:STC:CVE-2015-6171-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6152 Privilege Elevation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6174-PE.html">HTTP:STC:CVE-2015-6174-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-6174 Kernel Mode Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2015-6175-PE.html">HTTP:STC:CVE-2015-6175-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows CVE-2015-6175 Kernel Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0003-RCE.html">HTTP:STC:CVE-2016-0003-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2016-0003 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0012-MC.html">HTTP:STC:CVE-2016-0012-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0012 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ACVE-2016-0024-RCE.html">HTTP:STC:CVE-2016-0024-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2016-0021 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AAPPLEQT-MP4-CE.html">HTTP:STC:DL:APPLEQT-MP4-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple QuickTime MP4 Absent stbl Box Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2011-1985-CE.html">HTTP:STC:DL:CVE-2011-1985-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows win32k.sys kernel mode null pointer dereference
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2013-3893-DROP.html">HTTP:STC:DL:CVE-2013-3893-DROP</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3893 Malicious Executable Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-1776-SHELL.html">HTTP:STC:DL:CVE-2014-1776-SHELL</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1776 Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6335-RCE.html">HTTP:STC:DL:CVE-2014-6335-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2014-6335 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6357-RCE.html">HTTP:STC:DL:CVE-2014-6357-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6357 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6360-RCE.html">HTTP:STC:DL:CVE-2014-6360-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2014-6360 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6361-RCE.html">HTTP:STC:DL:CVE-2014-6361-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2014-6361 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2014-6364-RCE.html">HTTP:STC:DL:CVE-2014-6364-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6364 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0003-PRIV.html">HTTP:STC:DL:CVE-2015-0003-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0003 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0054-PRIV.html">HTTP:STC:DL:CVE-2015-0054-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0054 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0063-RCE.html">HTTP:STC:DL:CVE-2015-0063-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Excel CVE-2015-0063 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0064-RCE.html">HTTP:STC:DL:CVE-2015-0064-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Word CVE-2015-0064 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0065-RCE.html">HTTP:STC:DL:CVE-2015-0065-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Word CVE-2015-0065 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0078-PRIV.html">HTTP:STC:DL:CVE-2015-0078-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0078 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0080-ID.html">HTTP:STC:DL:CVE-2015-0080-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0080 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0084-SB.html">HTTP:STC:DL:CVE-2015-0084-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0084 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0085-RCE.html">HTTP:STC:DL:CVE-2015-0085-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word  CVE-2015-0085 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0086-RCE.html">HTTP:STC:DL:CVE-2015-0086-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-0086 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0094-ID.html">HTTP:STC:DL:CVE-2015-0094-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsfot Windows CVE-2015-0094 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-0332-CE.html">HTTP:STC:DL:CVE-2015-0332-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash CVE-2015-0332 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1642-RCE.html">HTTP:STC:DL:CVE-2015-1642-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-1642 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1644-PRIV.html">HTTP:STC:DL:CVE-2015-1644-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1644 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1649-RCE.html">HTTP:STC:DL:CVE-2015-1649-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office RTF File CVE-2015-1649 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1651-RCE.html">HTTP:STC:DL:CVE-2015-1651-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office RTF File CVE-2015-1651 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1671-RCE.html">HTTP:STC:DL:CVE-2015-1671-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Component CVE-2015-1671 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1673-PE.html">HTTP:STC:DL:CVE-2015-1673-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft CCalendar CVE-2015-1673 Heap Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1674-SB.html">HTTP:STC:DL:CVE-2015-1674-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1674 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1675-RCE.html">HTTP:STC:DL:CVE-2015-1675-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1675 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1676-ID.html">HTTP:STC:DL:CVE-2015-1676-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1676 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1678-ID.html">HTTP:STC:DL:CVE-2015-1678-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1678 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1681-DOS.html">HTTP:STC:DL:CVE-2015-1681-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Explorer MSC File Parsing CVE-2015-1681 Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1682-RCE.html">HTTP:STC:DL:CVE-2015-1682-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Office CVE-2015-1682 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1683-UAF.html">HTTP:STC:DL:CVE-2015-1683-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office File Modification Password Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1695-RCE.html">HTTP:STC:DL:CVE-2015-1695-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1695 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1698-RCE.html">HTTP:STC:DL:CVE-2015-1698-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1698 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1719-PRIV.html">HTTP:STC:DL:CVE-2015-1719-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1719 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1721-PRIV.html">HTTP:STC:DL:CVE-2015-1721-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Window CVE-2015-1721 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1725-PRIV.html">HTTP:STC:DL:CVE-2015-1725-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1725 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1726-CE.html">HTTP:STC:DL:CVE-2015-1726-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-1726 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1728-CE.html">HTTP:STC:DL:CVE-2015-1728-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Player CVE-2015-1728 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1739-CE.html">HTTP:STC:DL:CVE-2015-1739-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1739 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1743-RCE.html">HTTP:STC:DL:CVE-2015-1743-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1743 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1759-RCE.html">HTTP:STC:DL:CVE-2015-1759-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-1759 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-1770-CE.html">HTTP:STC:DL:CVE-2015-1770-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2015-1770 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2360-PRIV.html">HTTP:STC:DL:CVE-2015-2360-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2360 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2365-PRIV.html">HTTP:STC:DL:CVE-2015-2365-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2365 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2366-PE.html">HTTP:STC:DL:CVE-2015-2366-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kernel CVE-2015-2366 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2367-SB.html">HTTP:STC:DL:CVE-2015-2367-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft CVE-2015-2367 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2370-PRIV.html">HTTP:STC:DL:CVE-2015-2370-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2370 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2376-CE.html">HTTP:STC:DL:CVE-2015-2376-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2376 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2377-UAF.html">HTTP:STC:DL:CVE-2015-2377-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2377 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2378-CE.html">HTTP:STC:DL:CVE-2015-2378-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel Viewer CVE-2015-2378 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2387-CE.html">HTTP:STC:DL:CVE-2015-2387-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2387 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2415-RCE.html">HTTP:STC:DL:CVE-2015-2415-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2415 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2426-BOF.html">HTTP:STC:DL:CVE-2015-2426-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2426 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2429-CE.html">HTTP:STC:DL:CVE-2015-2429-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2429 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2431-CE.html">HTTP:STC:DL:CVE-2015-2431-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2431 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2432-RCE.html">HTTP:STC:DL:CVE-2015-2432-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office OpenType Fonts CVE-2015-2432 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2455-CE.html">HTTP:STC:DL:CVE-2015-2455-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2455 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2456-CE.html">HTTP:STC:DL:CVE-2015-2456-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2456 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2458-CE.html">HTTP:STC:DL:CVE-2015-2458-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2458 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2459-CE.html">HTTP:STC:DL:CVE-2015-2459-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2459 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2461-CE.html">HTTP:STC:DL:CVE-2015-2461-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2461 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2463-RCE.html">HTTP:STC:DL:CVE-2015-2463-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows TrueType Font Parsing Remote Code Execution (CVE-2015-2463)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2464-RCE.html">HTTP:STC:DL:CVE-2015-2464-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2464 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2467-CE.html">HTTP:STC:DL:CVE-2015-2467-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2467 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2469-CE.html">HTTP:STC:DL:CVE-2015-2469-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2469 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2470-BO.html">HTTP:STC:DL:CVE-2015-2470-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2470 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2478-PE.html">HTTP:STC:DL:CVE-2015-2478-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2478 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2510-RCE.html">HTTP:STC:DL:CVE-2015-2510-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2510 Remote code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2520-RCE.html">HTTP:STC:DL:CVE-2015-2520-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2520 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2521-RCE.html">HTTP:STC:DL:CVE-2015-2521-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2521 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2523-RCE.html">HTTP:STC:DL:CVE-2015-2523-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2523 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2525-PRIV.html">HTTP:STC:DL:CVE-2015-2525-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Task Scheduler CVE-2015-2525 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2546-UAF.html">HTTP:STC:DL:CVE-2015-2546-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2546 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2550-PRIV.html">HTTP:STC:DL:CVE-2015-2550-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2550 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2555-CE.html">HTTP:STC:DL:CVE-2015-2555-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-2555 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-2557-RCE.html">HTTP:STC:DL:CVE-2015-2557-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-2557 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-3048-RCE.html">HTTP:STC:DL:CVE-2015-3048-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Reader CVE-2015-3048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-3083-CE.html">HTTP:STC:DL:CVE-2015-3083-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Broker CVE-2015-3083 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6038-RCE.html">HTTP:STC:DL:CVE-2015-6038-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6038 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6040-RCE.html">HTTP:STC:DL:CVE-2015-6040-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6040 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6091-RCE.html">HTTP:STC:DL:CVE-2015-6091-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6091 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6092-RCE.html">HTTP:STC:DL:CVE-2015-6092-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6092 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6093-RCE.html">HTTP:STC:DL:CVE-2015-6093-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6093 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6094-RCE.html">HTTP:STC:DL:CVE-2015-6094-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6094 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6096-CE.html">HTTP:STC:DL:CVE-2015-6096-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6096 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6098-BO.html">HTTP:STC:DL:CVE-2015-6098-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6098 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6100-RCE.html">HTTP:STC:DL:CVE-2015-6100-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6100 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6101-RCE.html">HTTP:STC:DL:CVE-2015-6101-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6101 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6102-RCE.html">HTTP:STC:DL:CVE-2015-6102-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6102 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6104-RCE.html">HTTP:STC:DL:CVE-2015-6104-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6104 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6106-RCE.html">HTTP:STC:DL:CVE-2015-6106-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6106 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6107-CE.html">HTTP:STC:DL:CVE-2015-6107-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6107 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6113-RCE.html">HTTP:STC:DL:CVE-2015-6113-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6113 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6118-CE.html">HTTP:STC:DL:CVE-2015-6118-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6135 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6122-CE.html">HTTP:STC:DL:CVE-2015-6122-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-6122 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6123-RCE.html">HTTP:STC:DL:CVE-2015-6123-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6123 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6124-RCE.html">HTTP:STC:DL:CVE-2015-6124-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6124 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6127-RCE.html">HTTP:STC:DL:CVE-2015-6127-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows Media Center CVE-2015-6127 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6128-CE.html">HTTP:STC:DL:CVE-2015-6128-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6128 Elevation of Privilege
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6131-RCE.html">HTTP:STC:DL:CVE-2015-6131-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Center CVE-2015-6131 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6132-PRIV.html">HTTP:STC:DL:CVE-2015-6132-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6132 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6133-CE.html">HTTP:STC:DL:CVE-2015-6133-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-6133 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6172-CE.html">HTTP:STC:DL:CVE-2015-6172-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Outlook CVE-2015-6172 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6173-PRIV.html">HTTP:STC:DL:CVE-2015-6173-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-6173 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2015-6177-CE.html">HTTP:STC:DL:CVE-2015-6177-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-6177 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0006-PRIV.html">HTTP:STC:DL:CVE-2016-0006-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0006 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0007-PRIV.html">HTTP:STC:DL:CVE-2016-0007-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0007 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0008-CE.html">HTTP:STC:DL:CVE-2016-0008-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Kernel CVE-2016-0008 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0010-RCE.html">HTTP:STC:DL:CVE-2016-0010-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0010 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0014-RCE.html">HTTP:STC:DL:CVE-2016-0014-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CVE-2016-0014 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0015-RCE.html">HTTP:STC:DL:CVE-2016-0015-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0015 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0016-RCE.html">HTTP:STC:DL:CVE-2016-0016-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0016 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0018-RCE.html">HTTP:STC:DL:CVE-2016-0018-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2016-0018 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0020-PRIV.html">HTTP:STC:DL:CVE-2016-0020-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2016-0020 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ACVE-2016-0035-UAF.html">HTTP:STC:DL:CVE-2016-0035-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2016-0035 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADIRECTPLAY-HEAP-OF.html">HTTP:STC:DL:DIRECTPLAY-HEAP-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: DirectPlay Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADLL-PLANTING-CE.html">HTTP:STC:DL:DLL-PLANTING-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DLL Planting Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOC-2015-2379-CE.html">HTTP:STC:DL:DOC-2015-2379-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Document CVE-2015-2379 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ADOC-2015-2380-CE.html">HTTP:STC:DL:DOC-2015-2380-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Word CVE-2015-2380 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AEMF-IMG-FILE-RCE.html">HTTP:STC:DL:EMF-IMG-FILE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphic Component EMF Image File Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AFF-SAME-ORIG-SB.html">HTTP:STC:DL:FF-SAME-ORIG-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox PDF Viewer Same Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGOGLE-STGEFRIGHT-CE.html">HTTP:STC:DL:GOGLE-STGEFRIGHT-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Stagefright Video File Parsing Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AGOOGLE-PICASA-OVF.html">HTTP:STC:DL:GOOGLE-PICASA-OVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Google Picasa CR2 TIFF StripByteCounts Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ALOTUS-URL-RCE.html">HTTP:STC:DL:LOTUS-URL-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Lotus Notes URL Handler Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMEDIA-CENTR-LINK-CE.html">HTTP:STC:DL:MEDIA-CENTR-LINK-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Media Center Link File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-ACCESS-MEM-CORR.html">HTTP:STC:DL:MS-ACCESS-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Access CVE-2013-3157 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2014-6356-CE.html">HTTP:STC:DL:MS-CVE-2014-6356-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2014-6356 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-0096-CE.html">HTTP:STC:DL:MS-CVE-2015-0096-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-0096 Remote Code Exectution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-0097-CE.html">HTTP:STC:DL:MS-CVE-2015-0097-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2015-0097 Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2549-CE.html">HTTP:STC:DL:MS-CVE-2015-2549-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2549 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2553-CE.html">HTTP:STC:DL:MS-CVE-2015-2553-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2553 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-CVE-2015-2558-CE.html">HTTP:STC:DL:MS-CVE-2015-2558-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Excel CVE-2015-2558 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-DIRECTSHOW-RCE.html">HTTP:STC:DL:MS-DIRECTSHOW-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows DirectShow JPEG Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-NET-ASLR-BYPASS.html">HTTP:STC:DL:MS-NET-ASLR-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft .NET Framework CVE-2015-6115 ASLR Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-2007-MC.html">HTTP:STC:DL:MS-OFFICE-2007-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office 2007 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-BAD-INDEX.html">HTTP:STC:DL:MS-OFFICE-BAD-INDEX</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Bad Index Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-DOC-MC.html">HTTP:STC:DL:MS-OFFICE-DOC-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Document Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-OFFICE-XL-MC.html">HTTP:STC:DL:MS-OFFICE-XL-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel Memory Corruption (CVE-2013-3158)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-THEME-RCE.html">HTTP:STC:DL:MS-THEME-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Theme File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMS-WORD-MEM-CORR.html">HTTP:STC:DL:MS-WORD-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2013-3852 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AMSOFFICE-MSODLL-MC.html">HTTP:STC:DL:MSOFFICE-MSODLL-MC</a></b></th>
   <td width="500" valign="top">
    HTTP:  Microsoft Office Word mso.dll LsCreateLine Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANET-CVE-2015-1672.html">HTTP:STC:DL:NET-CVE-2015-1672</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows .NET CVE-2015-1672 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ANODEJS-YAML-CE.html">HTTP:STC:DL:NODEJS-YAML-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: NodeJS JS YAML Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOFFICE-BO-RCE.html">HTTP:STC:DL:OFFICE-BO-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AOTF-2015-2462-CE.html">HTTP:STC:DL:OTF-2015-2462-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2462 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AQEMU-FLOPPY-DISK-OF.html">HTTP:STC:DL:QEMU-FLOPPY-DISK-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: QEMU Floppy Disk Controller Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AREMOTE-DNS-CHANGE.html">HTTP:STC:DL:REMOTE-DNS-CHANGE</a></b></th>
   <td width="500" valign="top">
    HTTP: Unauthenticated Remote DNS Change Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3ASUSPICIOUS-FILE.html">HTTP:STC:DL:SUSPICIOUS-FILE</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious Malicious File Download Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AULTRAISO-CUE.html">HTTP:STC:DL:ULTRAISO-CUE</a></b></th>
   <td width="500" valign="top">
    HTTP: UltraISO Cue File Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISILOGIC-VLP-BO.html">HTTP:STC:DL:VISILOGIC-VLP-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Unitronics VisiLogic OPLC IDE vlp File Parsing Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AVISIO-VSD-MEMCP.html">HTTP:STC:DL:VISIO-VSD-MEMCP</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Visio 2010 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWIRELURKER-DOWNLOAD.html">HTTP:STC:DL:WIRELURKER-DOWNLOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: WireLurker Suspicious File Download Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWJ-2015-1697-CE.html">HTTP:STC:DL:WJ-2015-1697-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1697 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWJ-CVE-2015-1696-CE.html">HTTP:STC:DL:WJ-CVE-2015-1696-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Journal CVE-2015-1696 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWNDPROC-INFO-DISC.html">HTTP:STC:DL:WNDPROC-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft wndproc Credentials Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-DPPOLYCOUNT.html">HTTP:STC:DL:WORD-DPPOLYCOUNT</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word dppolycount RTF Control Word Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-LISTOVERRIDE.html">HTTP:STC:DL:WORD-LISTOVERRIDE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word RTF listoverridecount Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AWORD-WEBAPPS-RCE.html">HTTP:STC:DL:WORD-WEBAPPS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word and Office Web Apps Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADL%3AXLS-2015-2375-ID.html">HTTP:STC:DL:XLS-2015-2375-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office Excel CVE-2015-2375 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ADOT-NET-ARRAY-RCE.html">HTTP:STC:DOT-NET-ARRAY-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: .Net Array Access Violation Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AFF-SRIALIZE-STREAM-UAF.html">HTTP:STC:FF-SRIALIZE-STREAM-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Firefox SerializeStream Heap Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AFIREPHP-COMMAND-EXEC.html">HTTP:STC:FIREPHP-COMMAND-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: FirePHPArbitrary CreateInstance Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AHIDDEN-IFRAME-2.html">HTTP:STC:HIDDEN-IFRAME-2</a></b></th>
   <td width="500" valign="top">
    HTTP: Hidden IFrame Injection Javascript
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-CVE-2014-0275-MC.html">HTTP:STC:IE:10-CVE-2014-0275-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0275 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-CVE2014-2804-UAF.html">HTTP:STC:IE:10-CVE2014-2804-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 CVE-2014-2804 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-INT-OVF.html">HTTP:STC:IE:10-INT-OVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-MEM-CORRUPTION.html">HTTP:STC:IE:10-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJ-DEL-UAF.html">HTTP:STC:IE:10-OBJ-DEL-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Deletion Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJDEL-UAF.html">HTTP:STC:IE:10-OBJDEL-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Deletion Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJECT-MC.html">HTTP:STC:IE:10-OBJECT-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJECT-RCE.html">HTTP:STC:IE:10-OBJECT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-OBJHANDLING-UAF.html">HTTP:STC:IE:10-OBJHANDLING-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Improper Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-UAF.html">HTTP:STC:IE:10-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A10-UAF-MC.html">HTTP:STC:IE:10-UAF-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A11-CVE-2014-0304-MC.html">HTTP:STC:IE:11-CVE-2014-0304-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 11 CVE-2014-0304 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A2014-1751-MEM-CORR.html">HTTP:STC:IE:2014-1751-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1751 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A2014-6340-INFO-DIS.html">HTTP:STC:IE:2014-6340-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Info Disc CVE-2014-6340
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-10-MEM-CORRUPTION.html">HTTP:STC:IE:6-10-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-11-UAF.html">HTTP:STC:IE:6-11-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6-11 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A6-7-UAF-RCE.html">HTTP:STC:IE:6-7-UAF-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 6 and 7 Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A7-10-MEM-CORRUPTION.html">HTTP:STC:IE:7-10-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A7-CVE-2014-1752-RCE.html">HTTP:STC:IE:7-CVE-2014-1752-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 7 CVE-2014-1752 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-10-MEM-CORR.html">HTTP:STC:IE:8-10-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2013-3163)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-10-MEM-CORRUPTION.html">HTTP:STC:IE:8-10-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3144 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-CVE-2014-0278-MC.html">HTTP:STC:IE:8-CVE-2014-0278-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 CVE-2014-0278 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-CVE-2014-0279-MC.html">HTTP:STC:IE:8-CVE-2014-0279-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 CVE-2014-0279 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-OBJ-MC.html">HTTP:STC:IE:8-OBJ-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Object Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-OBJECT-MC.html">HTTP:STC:IE:8-OBJECT-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Object Memory Corruption (CVE-2013-3139)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A8-UAF-RCE.html">HTTP:STC:IE:8-UAF-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 Use After Free Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-MC.html">HTTP:STC:IE:9-10-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Internet Explorer Memory Corruption (CVE-2013-3191)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-MEM-CORRUPTION.html">HTTP:STC:IE:9-10-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9-10 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-10-OBJERR-UAF.html">HTTP:STC:IE:9-10-OBJERR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 and 10 Improper Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MC-RCE.html">HTTP:STC:IE:9-MC-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-MEM-CORR.html">HTTP:STC:IE:9-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-CE.html">HTTP:STC:IE:9-UAF-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-MEM-CORR.html">HTTP:STC:IE:9-UAF-MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UAF-RCE.html">HTTP:STC:IE:9-UAF-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-UNINITVARS-UAF.html">HTTP:STC:IE:9-UNINITVARS-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Uninitialized Variables Use After Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3A9-USE-AFTER-FREE.html">HTTP:STC:IE:9-USE-AFTER-FREE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 9 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AACCESS-BYPASS-ID.html">HTTP:STC:IE:ACCESS-BYPASS-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Clipboard Access Restriction Bypass Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AAPPLYELEMENT-UAF.html">HTTP:STC:IE:APPLYELEMENT-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer applyElement Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AASLR-BYPASS-RCE.html">HTTP:STC:IE:ASLR-BYPASS-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer ASLR Security Bypass Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACLIP-MEM.html">HTTP:STC:IE:CLIP-MEM</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Clip Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACOLLECTGARBAGE-B64.html">HTTP:STC:IE:COLLECTGARBAGE-B64</a></b></th>
   <td width="500" valign="top">
    HTTP: CollectGarbage In Base64 String
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACQUOTES-OBJECT-CE.html">HTTP:STC:IE:CQUOTES-OBJECT-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IE CQuotes Object Handling Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACRAFTED-WEB-CE.html">HTTP:STC:IE:CRAFTED-WEB-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Crafted Web Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACSHADOW-RCE.html">HTTP:STC:IE:CSHADOW-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IE CShadow Function Integer Overflow Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACTABLE-RCE.html">HTTP:STC:IE:CTABLE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Ctable Access Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2012-1877-CE.html">HTTP:STC:IE:CVE-2012-1877-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2012-1877 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3115-MC.html">HTTP:STC:IE:CVE-2013-3115-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3115 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3153-MC.html">HTTP:STC:IE:CVE-2013-3153-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3153 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3188-MC.html">HTTP:STC:IE:CVE-2013-3188-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3188 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3189-MC.html">HTTP:STC:IE:CVE-2013-3189-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3189 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3194-UAF.html">HTTP:STC:IE:CVE-2013-3194-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3194 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3199-CE.html">HTTP:STC:IE:CVE-2013-3199-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3199 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3207-UAF.html">HTTP:STC:IE:CVE-2013-3207-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3207 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3208-UAF.html">HTTP:STC:IE:CVE-2013-3208-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3208 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3209-UAF.html">HTTP:STC:IE:CVE-2013-3209-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3209 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3845-UAF.html">HTTP:STC:IE:CVE-2013-3845-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3845 Use-After-Free Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3871-MC.html">HTTP:STC:IE:CVE-2013-3871-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Internet Explorer Memory Corruption (CVE-2013-3871)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3873-MC.html">HTTP:STC:IE:CVE-2013-3873-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3873 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3874-UAF.html">HTTP:STC:IE:CVE-2013-3874-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3874 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3875-MC.html">HTTP:STC:IE:CVE-2013-3875-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3875 Memory Corruption 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3885-UAF.html">HTTP:STC:IE:CVE-2013-3885-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 CVE-2013-3885 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3908-DISC.html">HTTP:STC:IE:CVE-2013-3908-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3908 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3910-UAF.html">HTTP:STC:IE:CVE-2013-3910-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3910 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3911-MC.html">HTTP:STC:IE:CVE-2013-3911-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3911 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3912-RCE.html">HTTP:STC:IE:CVE-2013-3912-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3912 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3914-MC.html">HTTP:STC:IE:CVE-2013-3914-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3914 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3916-RCE.html">HTTP:STC:IE:CVE-2013-3916-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3916 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-3917-UAF.html">HTTP:STC:IE:CVE-2013-3917-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-3917 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5047-UAF.html">HTTP:STC:IE:CVE-2013-5047-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5047 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5048-MC.html">HTTP:STC:IE:CVE-2013-5048-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5048 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5049-MC.html">HTTP:STC:IE:CVE-2013-5049-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5049 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5051-MC.html">HTTP:STC:IE:CVE-2013-5051-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5051 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5052-MC.html">HTTP:STC:IE:CVE-2013-5052-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object&#39;s Dangling Pointer Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2013-5056-UAF.html">HTTP:STC:IE:CVE-2013-5056-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2013-5056 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0263-MC.html">HTTP:STC:IE:CVE-2014-0263-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0263 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0267-MC.html">HTTP:STC:IE:CVE-2014-0267-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0267 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0269-MC.html">HTTP:STC:IE:CVE-2014-0269-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0269 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0270-UAF.html">HTTP:STC:IE:CVE-2014-0270-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0270 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0271-MC.html">HTTP:STC:IE:CVE-2014-0271-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0271 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0272-MC.html">HTTP:STC:IE:CVE-2014-0272-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0272 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0273-MC.html">HTTP:STC:IE:CVE-2014-0273-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0273 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0274-MC.html">HTTP:STC:IE:CVE-2014-0274-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0274 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0276-MC.html">HTTP:STC:IE:CVE-2014-0276-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-0276)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0277-MC.html">HTTP:STC:IE:CVE-2014-0277-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0277 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0281-MC.html">HTTP:STC:IE:CVE-2014-0281-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0281 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0282-UAF.html">HTTP:STC:IE:CVE-2014-0282-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0282 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0283-MC.html">HTTP:STC:IE:CVE-2014-0283-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0283 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0284-MC.html">HTTP:STC:IE:CVE-2014-0284-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0284 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0285-MC.html">HTTP:STC:IE:CVE-2014-0285-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0285 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0286-MC.html">HTTP:STC:IE:CVE-2014-0286-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-0286)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0287-MC.html">HTTP:STC:IE:CVE-2014-0287-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0287 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0288-MC.html">HTTP:STC:IE:CVE-2014-0288-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0288 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0289-MC.html">HTTP:STC:IE:CVE-2014-0289-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0289 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0290-MC.html">HTTP:STC:IE:CVE-2014-0290-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0290 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0297-MC.html">HTTP:STC:IE:CVE-2014-0297-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0297 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0298-UAF.html">HTTP:STC:IE:CVE-2014-0298-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0298 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0299-RCE.html">HTTP:STC:IE:CVE-2014-0299-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0299 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0302-MC.html">HTTP:STC:IE:CVE-2014-0302-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0302 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0303-MC.html">HTTP:STC:IE:CVE-2014-0303-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0303 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0305-MC.html">HTTP:STC:IE:CVE-2014-0305-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-030 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0306-RCE.html">HTTP:STC:IE:CVE-2014-0306-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0306 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0307-MC.html">HTTP:STC:IE:CVE-2014-0307-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0307 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0309-MC.html">HTTP:STC:IE:CVE-2014-0309-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0309 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0310-MC.html">HTTP:STC:IE:CVE-2014-0310-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0310 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0311-UAF.html">HTTP:STC:IE:CVE-2014-0311-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0311 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0312-RCE.html">HTTP:STC:IE:CVE-2014-0312-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0312 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0313-BOF.html">HTTP:STC:IE:CVE-2014-0313-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 10 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0314-MC.html">HTTP:STC:IE:CVE-2014-0314-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0314 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0322-UAF.html">HTTP:STC:IE:CVE-2014-0322-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0322 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-0324-MC.html">HTTP:STC:IE:CVE-2014-0324-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-0324 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1753-MC.html">HTTP:STC:IE:CVE-2014-1753-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1753 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1755-MC.html">HTTP:STC:IE:CVE-2014-1755-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1755 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1762-MC.html">HTTP:STC:IE:CVE-2014-1762-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1762 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1765-RCE.html">HTTP:STC:IE:CVE-2014-1765-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1765 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1766-UAF.html">HTTP:STC:IE:CVE-2014-1766-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1766 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1772-MC.html">HTTP:STC:IE:CVE-2014-1772-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer  CVE-2014-1772 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1775-UAF.html">HTTP:STC:IE:CVE-2014-1775-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer behavior Property CVE-2014-1775 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1785-UAF.html">HTTP:STC:IE:CVE-2014-1785-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1785 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1789-MC.html">HTTP:STC:IE:CVE-2014-1789-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1789 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1791-UAF.html">HTTP:STC:IE:CVE-2014-1791-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1791 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1795-UAF.html">HTTP:STC:IE:CVE-2014-1795-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1795 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1797-UAF.html">HTTP:STC:IE:CVE-2014-1797-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1797 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1800-UAF.html">HTTP:STC:IE:CVE-2014-1800-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1800 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1802-MC.html">HTTP:STC:IE:CVE-2014-1802-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1802 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-1805-MC.html">HTTP:STC:IE:CVE-2014-1805-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-1805 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2787-MC.html">HTTP:STC:IE:CVE-2014-2787-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2787 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2795-MC.html">HTTP:STC:IE:CVE-2014-2795-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2795 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2797-MC.html">HTTP:STC:IE:CVE-2014-2797-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2797 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2799-UAF.html">HTTP:STC:IE:CVE-2014-2799-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-2799)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2801-MC.html">HTTP:STC:IE:CVE-2014-2801-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2801 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2820-UAF.html">HTTP:STC:IE:CVE-2014-2820-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2820 Use After Free 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2823-UAF.html">HTTP:STC:IE:CVE-2014-2823-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2823 Use After Free 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-2824-BO.html">HTTP:STC:IE:CVE-2014-2824-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-2824 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4057-MC.html">HTTP:STC:IE:CVE-2014-4057-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4057 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4063-UAF.html">HTTP:STC:IE:CVE-2014-4063-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4063 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4065-UAF.html">HTTP:STC:IE:CVE-2014-4065-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4065)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4080-UAF.html">HTTP:STC:IE:CVE-2014-4080-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free (CVE-2014-4080)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4081-UAF.html">HTTP:STC:IE:CVE-2014-4081-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4081 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4082-MC.html">HTTP:STC:IE:CVE-2014-4082-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2014-4082)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4084-UAF.html">HTTP:STC:IE:CVE-2014-4084-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4084)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4086-UAF.html">HTTP:STC:IE:CVE-2014-4086-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4086)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4087-UAF.html">HTTP:STC:IE:CVE-2014-4087-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4087)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4088-UAF.html">HTTP:STC:IE:CVE-2014-4088-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4088)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4089-UAF.html">HTTP:STC:IE:CVE-2014-4089-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4089)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4092-UAF.html">HTTP:STC:IE:CVE-2014-4092-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4092)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4094-UAF.html">HTTP:STC:IE:CVE-2014-4094-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4094)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4095-UAF.html">HTTP:STC:IE:CVE-2014-4095-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4095)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4123-CE.html">HTTP:STC:IE:CVE-2014-4123-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4123 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4124-CE.html">HTTP:STC:IE:CVE-2014-4124-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4124 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4126-MC.html">HTTP:STC:IE:CVE-2014-4126-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4126 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4127-MC.html">HTTP:STC:IE:CVE-2014-4127-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4127 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4128-MC.html">HTTP:STC:IE:CVE-2014-4128-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4128 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4129-MC.html">HTTP:STC:IE:CVE-2014-4129-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4129 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4132-MC.html">HTTP:STC:IE:CVE-2014-4132-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4132 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4133-CE.html">HTTP:STC:IE:CVE-2014-4133-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4133 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4134-MC.html">HTTP:STC:IE:CVE-2014-4134-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4134 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4137-MC.html">HTTP:STC:IE:CVE-2014-4137-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4137 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4138-CE.html">HTTP:STC:IE:CVE-2014-4138-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4138 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4140-CE.html">HTTP:STC:IE:CVE-2014-4140-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4140 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4141-MC.html">HTTP:STC:IE:CVE-2014-4141-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4141 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-4143-MC.html">HTTP:STC:IE:CVE-2014-4143-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-4143 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6323-ID.html">HTTP:STC:IE:CVE-2014-6323-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6323 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6327-MC.html">HTTP:STC:IE:CVE-2014-6327-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6327 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6329-RCE.html">HTTP:STC:IE:CVE-2014-6329-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6329 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6330-MC.html">HTTP:STC:IE:CVE-2014-6330-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6330 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6337-UAF.html">HTTP:STC:IE:CVE-2014-6337-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6337 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6339-MC.html">HTTP:STC:IE:CVE-2014-6339-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6339 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6341-UAF.html">HTTP:STC:IE:CVE-2014-6341-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6341 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6342-MEMCP.html">HTTP:STC:IE:CVE-2014-6342-MEMCP</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer MEMCP CVE-2014-6342
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6343-UAF.html">HTTP:STC:IE:CVE-2014-6343-UAF</a></b></th>
   <td width="500" valign="top">
    Microsoft Internet Explorer CVE-2014-6343 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6344-UAF.html">HTTP:STC:IE:CVE-2014-6344-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6344 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6345-INFO.html">HTTP:STC:IE:CVE-2014-6345-INFO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6345 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6346-INFO.html">HTTP:STC:IE:CVE-2014-6346-INFO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6346 Cross Domain Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6347-MC.html">HTTP:STC:IE:CVE-2014-6347-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6347 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6347-RCE.html">HTTP:STC:IE:CVE-2014-6347-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6347 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6348-UAF.html">HTTP:STC:IE:CVE-2014-6348-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6348 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6349-CE.html">HTTP:STC:IE:CVE-2014-6349-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6349 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6350-CE.html">HTTP:STC:IE:CVE-2014-6350-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6350 Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6353-UAF.html">HTTP:STC:IE:CVE-2014-6353-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer UAF CVE-2014-6353
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6355-IDISC.html">HTTP:STC:IE:CVE-2014-6355-IDISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6355 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6366-CE.html">HTTP:STC:IE:CVE-2014-6366-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6366 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6368-RCE.html">HTTP:STC:IE:CVE-2014-6368-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6368 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-MC.html">HTTP:STC:IE:CVE-2014-6369-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6369 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-RCE.html">HTTP:STC:IE:CVE-2014-6369-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6369 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6369-UAF.html">HTTP:STC:IE:CVE-2014-6369-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6369 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6373-UAF.html">HTTP:STC:IE:CVE-2014-6373-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6373 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6374-RCE.html">HTTP:STC:IE:CVE-2014-6374-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6374 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6375-RCE.html">HTTP:STC:IE:CVE-2014-6375-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6375 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-6376-RCE.html">HTTP:STC:IE:CVE-2014-6376-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2014-6376 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2014-8967-RCE.html">HTTP:STC:IE:CVE-2014-8967-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-8967 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0018-UAF.html">HTTP:STC:IE:CVE-2015-0018-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0018 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0019-RCE.html">HTTP:STC:IE:CVE-2015-0019-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0019 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0020-CE.html">HTTP:STC:IE:CVE-2015-0020-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0020 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0021-CE.html">HTTP:STC:IE:CVE-2015-0021-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0021 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0022-UAF.html">HTTP:STC:IE:CVE-2015-0022-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0022 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0025-RCE.html">HTTP:STC:IE:CVE-2015-0025-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0025 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0026-UAF.html">HTTP:STC:IE:CVE-2015-0026-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0026 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0029-UAF.html">HTTP:STC:IE:CVE-2015-0029-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0029 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0030-UAF.html">HTTP:STC:IE:CVE-2015-0030-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0030 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0032-RCE.html">HTTP:STC:IE:CVE-2015-0032-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0032 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0035-UAF.html">HTTP:STC:IE:CVE-2015-0035-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0035 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0037-CE.html">HTTP:STC:IE:CVE-2015-0037-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0037 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0038-RCE.html">HTTP:STC:IE:CVE-2015-0038-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0038 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0039-RCE.html">HTTP:STC:IE:CVE-2015-0039-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0039 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0040-RCE.html">HTTP:STC:IE:CVE-2015-0040-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0040 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0042-RCE.html">HTTP:STC:IE:CVE-2015-0042-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0042 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0043-RCE.html">HTTP:STC:IE:CVE-2015-0043-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0043 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0044-RCE.html">HTTP:STC:IE:CVE-2015-0044-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0044 Remote Code execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0045-RCE.html">HTTP:STC:IE:CVE-2015-0045-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0045 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0048-RCE.html">HTTP:STC:IE:CVE-2015-0048-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0048 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0049-RCE.html">HTTP:STC:IE:CVE-2015-0049-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0049 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0050-CE.html">HTTP:STC:IE:CVE-2015-0050-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0051-SB.html">HTTP:STC:IE:CVE-2015-0051-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0051 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0053-RCE.html">HTTP:STC:IE:CVE-2015-0053-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0053 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0054-RCE.html">HTTP:STC:IE:CVE-2015-0054-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0054 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0055-CE.html">HTTP:STC:IE:CVE-2015-0055-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0055 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0056-MC.html">HTTP:STC:IE:CVE-2015-0056-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0056 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0067-UAF.html">HTTP:STC:IE:CVE-2015-0067-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0067 User After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0068-UAF.html">HTTP:STC:IE:CVE-2015-0068-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0068 User After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0069-INFO.html">HTTP:STC:IE:CVE-2015-0069-INFO</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0069 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0081-RCE.html">HTTP:STC:IE:CVE-2015-0081-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer  CVE-2015-0081  Out-of-Bound Array
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0099-RCE.html">HTTP:STC:IE:CVE-2015-0099-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0099 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0100-UAF.html">HTTP:STC:IE:CVE-2015-0100-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0100 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-0655-RCE.html">HTTP:STC:IE:CVE-2015-0655-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6155 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1622-RCE.html">HTTP:STC:IE:CVE-2015-1622-RCE</a></b></th>
   <td width="500" valign="top">
     HTTP: Microsoft Internet Explorer CVE-2015-1622 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1623-MC.html">HTTP:STC:IE:CVE-2015-1623-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1623 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1624-RCE.html">HTTP:STC:IE:CVE-2015-1624-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1624 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1625-RCE.html">HTTP:STC:IE:CVE-2015-1625-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1625 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1626-RCE.html">HTTP:STC:IE:CVE-2015-1626-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1626 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1627-PRIV.html">HTTP:STC:IE:CVE-2015-1627-PRIV</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1627 Elevation of Privileges
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1634-RCE.html">HTTP:STC:IE:CVE-2015-1634-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1634 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1652-RCE.html">HTTP:STC:IE:CVE-2015-1652-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1652 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1657-ID.html">HTTP:STC:IE:CVE-2015-1657-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1657 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1658-RCE.html">HTTP:STC:IE:CVE-2015-1658-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Micorsoft Internet Explorer CVE-2015-1658 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1659-RCE.html">HTTP:STC:IE:CVE-2015-1659-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1659 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1660-RCE.html">HTTP:STC:IE:CVE-2015-1660-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1660 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1661-ID.html">HTTP:STC:IE:CVE-2015-1661-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1661 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1662-RCE.html">HTTP:STC:IE:CVE-2015-1662-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1662 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1666-RCE.html">HTTP:STC:IE:CVE-2015-1666-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1666 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1668-RCE.html">HTTP:STC:IE:CVE-2015-1668-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1668 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1685-RCE.html">HTTP:STC:IE:CVE-2015-1685-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1685 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1686-ID.html">HTTP:STC:IE:CVE-2015-1686-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1686 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1687-RCE.html">HTTP:STC:IE:CVE-2015-1687-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1687 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1688-SB.html">HTTP:STC:IE:CVE-2015-1688-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1688 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1691-UAF.html">HTTP:STC:IE:CVE-2015-1691-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1691 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1705-UAF.html">HTTP:STC:IE:CVE-2015-1705-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1705 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1706-UAF.html">HTTP:STC:IE:CVE-2015-1706-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1706 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1708-UAF.html">HTTP:STC:IE:CVE-2015-1708-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1708 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1709-RCE.html">HTTP:STC:IE:CVE-2015-1709-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1709 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1710-CE.html">HTTP:STC:IE:CVE-2015-1710-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1710 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1711-UAF.html">HTTP:STC:IE:CVE-2015-1711-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1711 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1712-RCE.html">HTTP:STC:IE:CVE-2015-1712-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1712 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1713-SB.html">HTTP:STC:IE:CVE-2015-1713-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1713 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1714-UAF.html">HTTP:STC:IE:CVE-2015-1714-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1714 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1717-CE.html">HTTP:STC:IE:CVE-2015-1717-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1717 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1718-UAF.html">HTTP:STC:IE:CVE-2015-1718-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1718 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1729-UAF.html">HTTP:STC:IE:CVE-2015-1729-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1729 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1730-RCE.html">HTTP:STC:IE:CVE-2015-1730-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1730 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1731-CE.html">HTTP:STC:IE:CVE-2015-1731-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1731 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1732-UAF.html">HTTP:STC:IE:CVE-2015-1732-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1732 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1733-RCE.html">HTTP:STC:IE:CVE-2015-1733-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1733 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1735-UAF.html">HTTP:STC:IE:CVE-2015-1735-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1735 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1736-RCE.html">HTTP:STC:IE:CVE-2015-1736-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1736 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1737-UAF.html">HTTP:STC:IE:CVE-2015-1737-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1737 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1738-UAF.html">HTTP:STC:IE:CVE-2015-1738-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1738 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1740-UAF.html">HTTP:STC:IE:CVE-2015-1740-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1740 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1741-RCE.html">HTTP:STC:IE:CVE-2015-1741-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1741 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1742-RCE.html">HTTP:STC:IE:CVE-2015-1742-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1742 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1744-CE.html">HTTP:STC:IE:CVE-2015-1744-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1744 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1745-UAF.html">HTTP:STC:IE:CVE-2015-1745-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1745 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1748-RCE.html">HTTP:STC:IE:CVE-2015-1748-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1748 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1750-UAF.html">HTTP:STC:IE:CVE-2015-1750-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1750 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1751-RCE.html">HTTP:STC:IE:CVE-2015-1751-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1751 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1753-RCE.html">HTTP:STC:IE:CVE-2015-1753-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1753 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1755-UAF.html">HTTP:STC:IE:CVE-2015-1755-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1755 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1766-RCE.html">HTTP:STC:IE:CVE-2015-1766-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1766 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-1767-UAF.html">HTTP:STC:IE:CVE-2015-1767-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-1767 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2372-UAF.html">HTTP:STC:IE:CVE-2015-2372-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2372 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2383-UAF.html">HTTP:STC:IE:CVE-2015-2383-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2383 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2384-RCE.html">HTTP:STC:IE:CVE-2015-2384-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2384 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2388-UAF.html">HTTP:STC:IE:CVE-2015-2388-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2388 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2389-UAF.html">HTTP:STC:IE:CVE-2015-2389-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2389 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2390-UAF.html">HTTP:STC:IE:CVE-2015-2390-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2390 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2391-RCE.html">HTTP:STC:IE:CVE-2015-2391-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2391 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2397-UAF.html">HTTP:STC:IE:CVE-2015-2397-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2397 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2402-SB.html">HTTP:STC:IE:CVE-2015-2402-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2402 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2403-UAF.html">HTTP:STC:IE:CVE-2015-2403-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2403 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2404-RCE.html">HTTP:STC:IE:CVE-2015-2404-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2404 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2406-RCE.html">HTTP:STC:IE:CVE-2015-2406-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2406 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2408-UAF.html">HTTP:STC:IE:CVE-2015-2408-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2408 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2411-UAF.html">HTTP:STC:IE:CVE-2015-2411-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2411 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2412-SB.html">HTTP:STC:IE:CVE-2015-2412-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explore CVE-2015-2412 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2413.html">HTTP:STC:IE:CVE-2015-2413</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2413 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2414-RCE.html">HTTP:STC:IE:CVE-2015-2414-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2414 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2421-ID.html">HTTP:STC:IE:CVE-2015-2421-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2421 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2422-UAF.html">HTTP:STC:IE:CVE-2015-2422-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2422 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2425-CE.html">HTTP:STC:IE:CVE-2015-2425-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2425 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2441-RCE.html">HTTP:STC:IE:CVE-2015-2441-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2441 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2442-RCE.html">HTTP:STC:IE:CVE-2015-2442-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2442 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2443-RCE.html">HTTP:STC:IE:CVE-2015-2443-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2443 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2448-RCE.html">HTTP:STC:IE:CVE-2015-2448-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2448 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2450-UAF.html">HTTP:STC:IE:CVE-2015-2450-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2450 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2451-CE.html">HTTP:STC:IE:CVE-2015-2451-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2451 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2452-CE.html">HTTP:STC:IE:CVE-2015-2452-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2452 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2482-CE.html">HTTP:STC:IE:CVE-2015-2482-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2482 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2483-ID.html">HTTP:STC:IE:CVE-2015-2483-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2483 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2485-CE.html">HTTP:STC:IE:CVE-2015-2485-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2485 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2486-RCE.html">HTTP:STC:IE:CVE-2015-2486-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2486 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2487-CE.html">HTTP:STC:IE:CVE-2015-2487-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2487 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2490-CE.html">HTTP:STC:IE:CVE-2015-2490-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2490 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2491-RCE.html">HTTP:STC:IE:CVE-2015-2491-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2491 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2492-RCE.html">HTTP:STC:IE:CVE-2015-2492-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2492 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2493-UAF.html">HTTP:STC:IE:CVE-2015-2493-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2493 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2498-CE.html">HTTP:STC:IE:CVE-2015-2498-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-2498 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2500-CE.html">HTTP:STC:IE:CVE-2015-2500-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2500 Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2501-CE.html">HTTP:STC:IE:CVE-2015-2501-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2501 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2502-CE.html">HTTP:STC:IE:CVE-2015-2502-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2502 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2515-UAF.html">HTTP:STC:IE:CVE-2015-2515-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2515 User After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-2548-RCE.html">HTTP:STC:IE:CVE-2015-2548-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-2548 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6042-UAF.html">HTTP:STC:IE:CVE-2015-6042-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6042 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6046-RCE.html">HTTP:STC:IE:CVE-2015-6046-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6046 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6047-CE.html">HTTP:STC:IE:CVE-2015-6047-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6047 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6048-UAF.html">HTTP:STC:IE:CVE-2015-6048-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6048 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6050-CE.html">HTTP:STC:IE:CVE-2015-6050-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6050 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6052-RCE.html">HTTP:STC:IE:CVE-2015-6052-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6053-UAF.html">HTTP:STC:IE:CVE-2015-6053-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6053 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6055-CE.html">HTTP:STC:IE:CVE-2015-6055-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6055 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6059-ID.html">HTTP:STC:IE:CVE-2015-6059-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6059 Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6064-UAF.html">HTTP:STC:IE:CVE-2015-6064-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6064 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6065-RCE.html">HTTP:STC:IE:CVE-2015-6065-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6065 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6068-CE.html">HTTP:STC:IE:CVE-2015-6068-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6068 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6070-RCE.html">HTTP:STC:IE:CVE-2015-6070-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6070 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6071-CE.html">HTTP:STC:IE:CVE-2015-6071-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6071 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6072-RCE.html">HTTP:STC:IE:CVE-2015-6072-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6072 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6073-UAF.html">HTTP:STC:IE:CVE-2015-6073-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6073 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6075-CE.html">HTTP:STC:IE:CVE-2015-6075-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6075 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6076-RCE.html">HTTP:STC:IE:CVE-2015-6076-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6066 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6077-UAF.html">HTTP:STC:IE:CVE-2015-6077-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6077 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6078-UAF.html">HTTP:STC:IE:CVE-2015-6078-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6078 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6079-CE.html">HTTP:STC:IE:CVE-2015-6079-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6079 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6080-CE.html">HTTP:STC:IE:CVE-2015-6080-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6080 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6081-RCE.html">HTTP:STC:IE:CVE-2015-6081-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6081 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6082-RCE.html">HTTP:STC:IE:CVE-2015-6082-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6082 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6083-CE.html">HTTP:STC:IE:CVE-2015-6083-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6083 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6084-RCE.html">HTTP:STC:IE:CVE-2015-6084-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6084 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6085-UAF.html">HTTP:STC:IE:CVE-2015-6085-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6085 Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6086-SB.html">HTTP:STC:IE:CVE-2015-6086-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6086 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6087-CE.html">HTTP:STC:IE:CVE-2015-6087-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6087 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6089-RCE.html">HTTP:STC:IE:CVE-2015-6089-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6089 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6134-RCE.html">HTTP:STC:IE:CVE-2015-6134-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6134 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6136-UAF.html">HTTP:STC:IE:CVE-2015-6136-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6136 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6141-RCE.html">HTTP:STC:IE:CVE-2015-6141-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6141 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6142-CE.html">HTTP:STC:IE:CVE-2015-6142-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6142 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6146-RCE.html">HTTP:STC:IE:CVE-2015-6146-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6146 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6147-CE.html">HTTP:STC:IE:CVE-2015-6147-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6147 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6148-UAF.html">HTTP:STC:IE:CVE-2015-6148-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6148 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6149-CE.html">HTTP:STC:IE:CVE-2015-6149-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6149 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6150-CE.html">HTTP:STC:IE:CVE-2015-6150-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6150 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6151-UAF.html">HTTP:STC:IE:CVE-2015-6151-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6151 Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6152-RCE.html">HTTP:STC:IE:CVE-2015-6152-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6152 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6153-CE.html">HTTP:STC:IE:CVE-2015-6153-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6153 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6154-CE.html">HTTP:STC:IE:CVE-2015-6154-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6154 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6156-RCE.html">HTTP:STC:IE:CVE-2015-6156-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6156 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6157-RCE.html">HTTP:STC:IE:CVE-2015-6157-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer CVE-2015-6157 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6158-CE.html">HTTP:STC:IE:CVE-2015-6158-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6158 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2015-6159-RCE.html">HTTP:STC:IE:CVE-2015-6159-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-6159 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0002-CE.html">HTTP:STC:IE:CVE-2016-0002-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0002 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0005-PB.html">HTTP:STC:IE:CVE-2016-0005-PB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0005 Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ACVE-2016-0034-RCE.html">HTTP:STC:IE:CVE-2016-0034-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2016-0034 Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ADOC-MARKUP-RCE.html">HTTP:STC:IE:DOC-MARKUP-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Document Markup Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AFILE-EXT-SPOOF.html">HTTP:STC:IE:FILE-EXT-SPOOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IE File Download Extension Spoofing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGETMARKUPPTR-UAF.html">HTTP:STC:IE:GETMARKUPPTR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer GetMarkupPtr Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AGRAPHICS-EOP-CE.html">HTTP:STC:IE:GRAPHICS-EOP-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer and Spartan Graphics Component EOP Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AHTML-LAYOUT-CE.html">HTTP:STC:IE:HTML-LAYOUT-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer HTML Layout ColSpan Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE-TGVAL-DOS.html">HTTP:STC:IE:IE-TGVAL-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IE TryGetValueAndRemove DOS Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AIE11-HEAPSPRAY-W81.html">HTTP:STC:IE:IE11-HEAPSPRAY-W81</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer 11 Heap Spraying Attack Windows 8.1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINCOMPLETE-EM.html">HTTP:STC:IE:INCOMPLETE-EM</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Uninitialized Object Memory Corruption (CVE-2010-0490)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINP-ELNT-OBJCT-RCE.html">HTTP:STC:IE:INP-ELNT-OBJCT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft IE CInputElement Object Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AINSECURE-OBJDEL-UAF.html">HTTP:STC:IE:INSECURE-OBJDEL-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Insecure Object Deletion Use-after-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJSCRIPT9-CE.html">HTTP:STC:IE:JSCRIPT9-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Jscript9 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AJSON-ARRAY-INFO-DIS.html">HTTP:STC:IE:JSON-ARRAY-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer JSON Array Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ALETTER-STYLE-UAF.html">HTTP:STC:IE:LETTER-STYLE-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Letter Style UAF (CVE-2014-4050)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMARQUEE-STYLE.html">HTTP:STC:IE:MARQUEE-STYLE</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer Marquee Memory corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORR.html">HTTP:STC:IE:MEM-CORR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption (CVE-2013-3122)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORR-UAF.html">HTTP:STC:IE:MEM-CORR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3111)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMEM-CORRUPT-RCE.html">HTTP:STC:IE:MEM-CORRUPT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Memory Corruption Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-IE-MEM-RCE.html">HTTP:STC:IE:MS-IE-MEM-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unsafe Memory Operations Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMS-UAF-MC.html">HTTP:STC:IE:MS-UAF-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3145)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSAPP-TASK.html">HTTP:STC:IE:MSAPP-TASK</a></b></th>
   <td width="500" valign="top">
    msapplication-task vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AMSIE-OBJ-UAF.html">HTTP:STC:IE:MSIE-OBJ-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Memory Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJ-MGMT-MC.html">HTTP:STC:IE:OBJ-MGMT-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Internet Explorer Object Management Memory Corruption Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJCT-PROCESSING-CE.html">HTTP:STC:IE:OBJCT-PROCESSING-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Processing Remote Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-CODE-EXEC.html">HTTP:STC:IE:OBJECT-CODE-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJECT-PROCESING-CE.html">HTTP:STC:IE:OBJECT-PROCESING-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Obeject Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJERR-UAF.html">HTTP:STC:IE:OBJERR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Erroneous Object Handling Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AOBJHAN-ERR-UAF.html">HTTP:STC:IE:OBJHAN-ERR-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Object Handling Error Use-After-Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ARANGE-OBJ-HNDLNG-ID.html">HTTP:STC:IE:RANGE-OBJ-HNDLNG-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Range Object Handling Information Discloure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AREMOVECHILD-UAF.html">HTTP:STC:IE:REMOVECHILD-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer removeChild Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ARES-URI-INFODISC.html">HTTP:STC:IE:RES-URI-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Resource URI Handling Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAME-ORI-SEC-BYPASS.html">HTTP:STC:IE:SAME-ORI-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same-Origin Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASAVE-HISTORY-UAF.html">HTTP:STC:IE:SAVE-HISTORY-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer saveHistory Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASCROL-INTO-VIEW-UAF.html">HTTP:STC:IE:SCROL-INTO-VIEW-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Scroll Into View Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASETCAPTURE-UAF.html">HTTP:STC:IE:SETCAPTURE-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer SetCapture Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASLAYOUTRUN-UAF.html">HTTP:STC:IE:SLAYOUTRUN-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer 8 SLayoutRun Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ASMEORIGIN-BYPASS.html">HTTP:STC:IE:SMEORIGIN-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Same Origin Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATABLE-POSWIDTH-MC.html">HTTP:STC:IE:TABLE-POSWIDTH-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer RuntimeStyle Handling Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATITLE-BAR-URI.html">HTTP:STC:IE:TITLE-BAR-URI</a></b></th>
   <td width="500" valign="top">
    HTTP: URI in Popup Title Bar
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATREE-POS-OBJECT-RCE.html">HTTP:STC:IE:TREE-POS-OBJECT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTreePos Object Handling Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3ATYPE-CONFUSION-RCE.html">HTTP:STC:IE:TYPE-CONFUSION-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0052 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-ARBITRARY-CE.html">HTTP:STC:IE:UAF-ARBITRARY-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Arbitrary Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MC.html">HTTP:STC:IE:UAF-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MC-RCE.html">HTTP:STC:IE:UAF-MC-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use-After-Free Remote Code Execution (CVE-2013-3116)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUAF-MEM-COR.html">HTTP:STC:IE:UAF-MEM-COR</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Use After Free Memory Corruption (CVE-2013-3151)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUNCLOSED-DIV-UAF.html">HTTP:STC:IE:UNCLOSED-DIV-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Unclosed Div Element Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AUSE-AFTR-FREE.html">HTTP:STC:IE:USE-AFTR-FREE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CTitleElement Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVBS-BSTR-HEAP-SPRAY.html">HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vbscript BSTR Heap Spray
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-AFTERFREE.html">HTTP:STC:IE:VML-AFTERFREE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer VML Use-After-Free Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVML-MEM-CORRUPTION.html">HTTP:STC:IE:VML-MEM-CORRUPTION</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Vector Markup Language Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AVTABLE-CODE-EXEC.html">HTTP:STC:IE:VTABLE-CODE-EXEC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer vtable Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWINCVE-2014-4113-PE.html">HTTP:STC:IE:WINCVE-2014-4113-PE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2014-4113 Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AWRITE-WAT-WHERE-UAF.html">HTTP:STC:IE:WRITE-WAT-WHERE-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Handling DataView Object Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXML-PARSER-RCE.html">HTTP:STC:IE:XML-PARSER-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer Improper XML Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIE%3AXMLDOM-INFODISC.html">HTTP:STC:IE:XMLDOM-INFODISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer XMLDOM ActiveX Control Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AGOOGLE-SKETCH-BMP.html">HTTP:STC:IMG:GOOGLE-SKETCH-BMP</a></b></th>
   <td width="500" valign="top">
    HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3663)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANO-JPG-GIF-PNG-BMP.html">HTTP:STC:IMG:NO-JPG-GIF-PNG-BMP</a></b></th>
   <td width="500" valign="top">
    HTTP: Response is not JPEG/GIF/PNG/BMP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3ANOT-JPEG.html">HTTP:STC:IMG:NOT-JPEG</a></b></th>
   <td width="500" valign="top">
    HTTP: Data is Not JPEG
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AIMG%3AWPG-HEAP-OVF.html">HTTP:STC:IMG:WPG-HEAP-OVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office .wpg Image Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-CLASS-FILE.html">HTTP:STC:JAVA:APPLET-CLASS-FILE</a></b></th>
   <td width="500" valign="top">
    HTTP: Java Applet/Class File Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AAPPLET-REFLECTRCE.html">HTTP:STC:JAVA:APPLET-REFLECTRCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Java Applet Reflection Type Confusion Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AATOMIC-SB-BREACH.html">HTTP:STC:JAVA:ATOMIC-SB-BREACH</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java AtomicReferenceArray Sandbox Breach
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ABYTCOMPNT-RSTR-MC.html">HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java ByteComponentRaster Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJAVASE-LIBCALL-CE.html">HTTP:STC:JAVA:JAVASE-LIBCALL-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java SE CVE-2015-2590 Library Calls Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJNLP-OF.html">HTTP:STC:JAVA:JNLP-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Java Runtime Environment Web Start JNLP File Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AJPEGIMGEWRITER-MC.html">HTTP:STC:JAVA:JPEGIMGEWRITER-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java JPEGImageWriter Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AMETHODHANDLE.html">HTTP:STC:JAVA:METHODHANDLE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java Private MethodHandle Sandbox Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AORA-BYTECODE-CE.html">HTTP:STC:JAVA:ORA-BYTECODE-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Java Runtime Bytecode Verifier Cache Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3ASIGNED-APPLET-CE.html">HTTP:STC:JAVA:SIGNED-APPLET-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Java Signed Applet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJAVA%3AWEBSTART.html">HTTP:STC:JAVA:WEBSTART</a></b></th>
   <td width="500" valign="top">
    HTTP: Java Web Start Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AJS-DATA-SCHEME.html">HTTP:STC:JS-DATA-SCHEME</a></b></th>
   <td width="500" valign="top">
    HTTP: JavaScript &quot;data:&quot; URL Scheme Source
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AADDON-RCE.html">HTTP:STC:MOZILLA:ADDON-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Bootstrapped Addon Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACANVAS-BO.html">HTTP:STC:MOZILLA:CANVAS-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Canvas Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ACHROME-PRIVESC.html">HTTP:STC:MOZILLA:CHROME-PRIVESC</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CVE-2014-1510 WebIDL Implementation Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ADOC-WRITE-MC.html">HTTP:STC:MOZILLA:DOC-WRITE-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Document.Write And DOM Insertions Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AFF-SELECT-UAF.html">HTTP:STC:MOZILLA:FF-SELECT-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser Select Element Heap Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALAYOUT-HEAP-OF.html">HTTP:STC:MOZILLA:LAYOUT-HEAP-OF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox In The Wild Layout Rendering Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ALOCATION-HOST.html">HTTP:STC:MOZILLA:LOCATION-HOST</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Dom Property Cookie Theft
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AMESA-TEXIMG2D.html">HTTP:STC:MOZILLA:MESA-TEXIMG2D</a></b></th>
   <td width="500" valign="top">
    HTTP: Firefox Mesa TexImage2D Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AOBJ-TYPE-CURR.html">HTTP:STC:MOZILLA:OBJ-TYPE-CURR</a></b></th>
   <td width="500" valign="top">
    HTTP: Firefox Web Browser Object Prototype Type Confusion/Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3APLUGIN-ACL.html">HTTP:STC:MOZILLA:PLUGIN-ACL</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Plugin Access Control Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AREADYSTATE-UAF.html">HTTP:STC:MOZILLA:READYSTATE-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Onreadystatechange Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASHAREDWORK-UAF.html">HTTP:STC:MOZILLA:SHAREDWORK-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox SharedWorker MessagePort Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASTR-RPLACE-MEM.html">HTTP:STC:MOZILLA:STR-RPLACE-MEM</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser String Replacement Heap Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-CODE-INJ.html">HTTP:STC:MOZILLA:SVG-CODE-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Browser SVG Code Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ASVG-IN-XBL-UAF.html">HTTP:STC:MOZILLA:SVG-IN-XBL-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser SVG In XBL Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3ATABLE-BG-UAF.html">HTTP:STC:MOZILLA:TABLE-BG-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Web Browser TableBackgroundData::Destroy Heap-Use-After-Free.
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AWGL-BUFFERDATA.html">HTTP:STC:MOZILLA:WGL-BUFFERDATA</a></b></th>
   <td width="500" valign="top">
    HTTP: Firefox Webgl Bufferedata Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXRAYWRAPPER-SB.html">HTTP:STC:MOZILLA:XRAYWRAPPER-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox CVE-2014-8636 XrayWrapper Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXSLT-FILE-DOS.html">HTTP:STC:MOZILLA:XSLT-FILE-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox XSLT Stylesheets Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMOZILLA%3AXUL-DLL-DOS.html">HTTP:STC:MOZILLA:XUL-DLL-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Mozilla Firefox Xul Dll Null Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2435-CE.html">HTTP:STC:MS-CVE-2015-2435-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-2435 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2460-CE.html">HTTP:STC:MS-CVE-2015-2460-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component CVE-2015-2460 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-CVE-2015-2527-CE.html">HTTP:STC:MS-CVE-2015-2527-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows CVE-2015-2527 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-FOREFRONT-RCE.html">HTTP:STC:MS-FOREFRONT-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Threat Management Gateway Client Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-FRONTPAGE-INFO-DISC.html">HTTP:STC:MS-FRONTPAGE-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft FrontPage XML Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-FILE-BOF.html">HTTP:STC:MS-OFFICE-FILE-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-OFFICE-WRITEAV-RCE.html">HTTP:STC:MS-OFFICE-WRITEAV-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office OneNote File Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WIN-JPEG-PARSE-IDIS.html">HTTP:STC:MS-WIN-JPEG-PARSE-IDIS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Graphics Component JPEG DHT Parsing Information Disclosure 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WINDOWS-FILE-BOF.html">HTTP:STC:MS-WINDOWS-FILE-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Improper File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WINDOWS-FILE-RCE.html">HTTP:STC:MS-WINDOWS-FILE-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows File Handling Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-WORD-CVE-2013-1325.html">HTTP:STC:MS-WORD-CVE-2013-1325</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Word CVE-2013-1325 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMS-XML-RCE.html">HTTP:STC:MS-XML-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows XML Core Services (MSXML) XML Content Arbitrary Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AMSXML-CVE-2015-1646-SB.html">HTTP:STC:MSXML-CVE-2015-1646-SB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft MSXML3 CVE-2015-1646 Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ANORTON%3ALAUNCHURL-HTTP.html">HTTP:STC:NORTON:LAUNCHURL-HTTP</a></b></th>
   <td width="500" valign="top">
    HTTP: Norton Internet Security LaunchURL Exploit Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AOBJ-FILE-BASE64.html">HTTP:STC:OBJ-FILE-BASE64</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Client Object Base64 File Evasion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AOFFCE-CVE-2015-1760-CE.html">HTTP:STC:OFFCE-CVE-2015-1760-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Office CVE-2015-1760 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AOPERA%3AALERTBOX-BOVF.html">HTTP:STC:OPERA:ALERTBOX-BOVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Opera Javascript Alert Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AORACLE-ENDECA-CSRF.html">HTTP:STC:ORACLE-ENDECA-CSRF</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Endeca Server CVE-2014-2399 Cross Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3APHP-DATE-TIME-OBJ-RCE.html">HTTP:STC:PHP-DATE-TIME-OBJ-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP DateTimeZone Object Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3APHP-DATE-TIME-OBJ-UAF.html">HTTP:STC:PHP-DATE-TIME-OBJ-UAF</a></b></th>
   <td width="500" valign="top">
    HTTP: PHP Date Time Object Unserialize Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AREPRISE-PARAM-PARSE-BO.html">HTTP:STC:REPRISE-PARAM-PARSE-BO</a></b></th>
   <td width="500" valign="top">
    HTTP: Reprise License Manager HTTP Parameter Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAFARI%3AJSARR-SORT-HOVF.html">HTTP:STC:SAFARI:JSARR-SORT-HOVF</a></b></th>
   <td width="500" valign="top">
    HTTP: Apple Safari Webkit Javascript Array Sort Function Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASAP-SQL-ALIAS-BOF.html">HTTP:STC:SAP-SQL-ALIAS-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: SAP SQL Anywhere Data Provider Column Alias Remote Stack Buffer Overflow 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AAPACHE-XML-DOS.html">HTTP:STC:SCRIPT:APACHE-XML-DOS</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Santuario XML Security for Java DTD Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ABROWSER-RECON.html">HTTP:STC:SCRIPT:BROWSER-RECON</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Browser Fingerprint
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ABROWSER-RECON-1.html">HTTP:STC:SCRIPT:BROWSER-RECON-1</a></b></th>
   <td width="500" valign="top">
    HTTP: Browser Recon (1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AFUNC-REASSIGN.html">HTTP:STC:SCRIPT:FUNC-REASSIGN</a></b></th>
   <td width="500" valign="top">
    HTTP: Script Evasion Function Reassignment
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AJAVA-EVASION.html">HTTP:STC:SCRIPT:JAVA-EVASION</a></b></th>
   <td width="500" valign="top">
    HTTP: JavaScript Evasion Technique Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3APAYLOAD-SETUP.html">HTTP:STC:SCRIPT:PAYLOAD-SETUP</a></b></th>
   <td width="500" valign="top">
    HTTP: Script Evasion Payload Setup
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3APYTHON-RECVFROM.html">HTTP:STC:SCRIPT:PYTHON-RECVFROM</a></b></th>
   <td width="500" valign="top">
    HTTP: Python socket.recvfrom_into() Function Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AREBOTS-DOT-PHP.html">HTTP:STC:SCRIPT:REBOTS-DOT-PHP</a></b></th>
   <td width="500" valign="top">
    HTTP: Rebots.php Javascript Include
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3ASVL-DBL-FREE.html">HTTP:STC:SCRIPT:SVL-DBL-FREE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Double Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASCRIPT%3AVB-REGX-ID.html">HTTP:STC:SCRIPT:VB-REGX-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows VBScript Regular Expression Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASEARCH-LINK.html">HTTP:STC:SEARCH-LINK</a></b></th>
   <td width="500" valign="top">
    HTTP: Windows Search Link
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-CE.html">HTTP:STC:SILVERLIGHT-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight Privilege Escalation Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASILVERLIGHT-INFO-DISC.html">HTTP:STC:SILVERLIGHT-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Silverlight WriteableBitmap SetSource Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASTREAM%3AGDI-WMF-HEADER.html">HTTP:STC:STREAM:GDI-WMF-HEADER</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows GDI WMF File HeaderSize Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-ALPHA.html">HTTP:STC:SUSPICIOUS-JS-ALPHA</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript with Alphabet Array
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-EVASION.html">HTTP:STC:SUSPICIOUS-JS-EVASION</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript with Evasion
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASUSPICIOUS-JS-FUNC.html">HTTP:STC:SUSPICIOUS-JS-FUNC</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious JavaScript Function
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3AADOBE-FLASH-FILEBO.html">HTTP:STC:SWF:ADOBE-FLASH-FILEBO</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player Improper File Parsing Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACVE-2014-0510-MC.html">HTTP:STC:SWF:CVE-2014-0510-MC</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0510 Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3ASWF%3ACVE-2014-0585-CE.html">HTTP:STC:SWF:CVE-2014-0585-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0585 Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AVAR-EQUALS-REDIRECT.html">HTTP:STC:VAR-EQUALS-REDIRECT</a></b></th>
   <td width="500" valign="top">
    HTTP: Spam URL Variable Equals Redirect Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASTC%3AWLW-INFO-DISC.html">HTTP:STC:WLW-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Windows Live Writer Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASUN-GLASSFISH-AUTH-BP.html">HTTP:SUN-GLASSFISH-AUTH-BP</a></b></th>
   <td width="500" valign="top">
    HTTP: Sun Goldfish AUthentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASWF-CVE-2014-0503-RCE.html">HTTP:SWF-CVE-2014-0503-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Adobe Flash Player CVE-2014-0503 Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ASYMANTEC-EP-POLICY-BYPAS.html">HTTP:SYMANTEC-EP-POLICY-BYPAS</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Endpoint Protection Console Servlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ATOMCAT%3AADMIN-SCAN.html">HTTP:TOMCAT:ADMIN-SCAN</a></b></th>
   <td width="500" valign="top">
    HTTP: Apache Tomcat Administration Page Scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ATOO-MANY-PARAMETERS.html">HTTP:TOO-MANY-PARAMETERS</a></b></th>
   <td width="500" valign="top">
    HTTP: Too many parameters
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ATRENDMICRO-FMT-STR.html">HTTP:TRENDMICRO-FMT-STR</a></b></th>
   <td width="500" valign="top">
    HTTP: Trend Micro OfficeScan Atxconsole ActiveX Control Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3ATUNNEL%3ASIP.html">HTTP:TUNNEL:SIP</a></b></th>
   <td width="500" valign="top">
    HTTP: SIP over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUA%3ACRAZY-BROWSER.html">HTTP:UA:CRAZY-BROWSER</a></b></th>
   <td width="500" valign="top">
    HTTP: Crazy Browser Usage Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUA%3APHP-BASE64-DECODE.html">HTTP:UA:PHP-BASE64-DECODE</a></b></th>
   <td width="500" valign="top">
    HTTP: User-Agent Contains PHP base64_decode Function
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUA%3APHP-CODE-INJ.html">HTTP:UA:PHP-CODE-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: User-Agent Field PHP Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUBIQUITI-AIROS-CE.html">HTTP:UBIQUITI-AIROS-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: Ubiquiti Networks AirOS Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUNIX-FILE%3AETC-PASSWD.html">HTTP:UNIX-FILE:ETC-PASSWD</a></b></th>
   <td width="500" valign="top">
    HTTP: Unix File /etc/passwd Probe
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AUNUSUAL-REFERER.html">HTTP:UNUSUAL-REFERER</a></b></th>
   <td width="500" valign="top">
    HTTP: Unusual Value In HTTP Referer Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AVMTURBO-OS-COMM-INJ.html">HTTP:VMTURBO-OS-COMM-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: VMTurbo OS Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AWEBLOGIC%3ACONSOLE-HELP-PORT.html">HTTP:WEBLOGIC:CONSOLE-HELP-PORT</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle BEA Weblogic Server console-help.portal Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-SNUPLOAD.html">HTTP:WIRELURKER-SNUPLOAD</a></b></th>
   <td width="500" valign="top">
    HTTP: WireLurker Serial Number Upload Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AWIRELURKER-VRUPDATE.html">HTTP:WIRELURKER-VRUPDATE</a></b></th>
   <td width="500" valign="top">
    HTTP: WireLurker Version Update Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AWIRESHARK-MPEG-BOF.html">HTTP:WIRESHARK-MPEG-BOF</a></b></th>
   <td width="500" valign="top">
    HTTP: Wireshark MPEG Dissector Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXML-EXTERNAL-ENTITY-INJ.html">HTTP:XML-EXTERNAL-ENTITY-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP:Multiple Product XML External Entity Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ACA-SITEMINDER-OLUNICDE.html">HTTP:XSS:CA-SITEMINDER-OLUNICDE</a></b></th>
   <td width="500" valign="top">
    HTTP:XSS:CA SiteMinder J2EE Overlong Unicode
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ADYNAMICAX-PORTAL-XSS.html">HTTP:XSS:DYNAMICAX-PORTAL-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Dynamic AX Enterprise Portal Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHDR-REFERRER.html">HTTP:XSS:HDR-REFERRER</a></b></th>
   <td width="500" valign="top">
    HTTP: Referrer Header Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHP-SMH-REDIRCTURL.html">HTTP:XSS:HP-SMH-REDIRCTURL</a></b></th>
   <td width="500" valign="top">
    HTTP: HP System Management Homepage RedirectUrl Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-AE.html">HTTP:XSS:HTML-SCRIPT-IN-AE</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Accept-Encoding
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-AL.html">HTTP:XSS:HTML-SCRIPT-IN-AL</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Accept-Language
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-COOKIE.html">HTTP:XSS:HTML-SCRIPT-IN-COOKIE</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Cookie
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-HOST.html">HTTP:XSS:HTML-SCRIPT-IN-HOST</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Header Host
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-POST.html">HTTP:XSS:HTML-SCRIPT-IN-POST</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in Post Submission
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AHTML-SCRIPT-IN-UA.html">HTTP:XSS:HTML-SCRIPT-IN-UA</a></b></th>
   <td width="500" valign="top">
    HTTP: HTML Script Tag Embedded in User-Agent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AIBM-OPEN-ADMIN.html">HTTP:XSS:IBM-OPEN-ADMIN</a></b></th>
   <td width="500" valign="top">
    HTTP: IBM Open Admin Tool Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AIE-CVE-2015-0070.html">HTTP:XSS:IE-CVE-2015-0070</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2015-0070 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AJOOMLA-CITY.html">HTTP:XSS:JOOMLA-CITY</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla city parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AJOOMLA-COM-RESMAN.html">HTTP:XSS:JOOMLA-COM-RESMAN</a></b></th>
   <td width="500" valign="top">
    HTTP: Joomla com_resman Component Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-CVE-2015-6170.html">HTTP:XSS:MS-CVE-2015-6170</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Edge CVE-2015-6170 Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-DEFAULT.html">HTTP:XSS:MS-FOREFRONT-DEFAULT</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway Default Reflected Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-EXCEL-TBL.html">HTTP:XSS:MS-FOREFRONT-EXCEL-TBL</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway ExcelTable Reflected Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-FOREFRONT-INFO-DISC.html">HTTP:XSS:MS-FOREFRONT-INFO-DISC</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Forefront Unified Access Gateway ExcelTable Response Splitting Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-IE-CVE-2014-6328.html">HTTP:XSS:MS-IE-CVE-2014-6328</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6328 XSS Filter Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-IE-XSS-BYPASS.html">HTTP:XSS:MS-IE-XSS-BYPASS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Internet Explorer CVE-2014-6365 XSS Filter Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-LYNC-SERVER.html">HTTP:XSS:MS-LYNC-SERVER</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Lync Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-OWA-MUTIPLE.html">HTTP:XSS:MS-OWA-MUTIPLE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Exchange OWA Multiple Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-REPORT-MANAGER.html">HTTP:XSS:MS-REPORT-MANAGER</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SQL Server Report Manager Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-REPORT-VIEWER.html">HTTP:XSS:MS-REPORT-VIEWER</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Report Viewer Control Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SCCM-REFLECTED.html">HTTP:XSS:MS-SCCM-REFLECTED</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft System Center Configuration Manager Reflected XSS Attack
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SCOM-WEB-CONSOLE.html">HTTP:XSS:MS-SCOM-WEB-CONSOLE</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SCOM Web Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-SHAREPOINT-PARAM.html">HTTP:XSS:MS-SHAREPOINT-PARAM</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Parameter Injection Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMS-VSTWAC-TFS.html">HTTP:XSS:MS-VSTWAC-TFS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Visual Studio Team Web Access Console Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMUL-RECORDPRESS.html">HTTP:XSS:MUL-RECORDPRESS</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple RecordPress Cross Site Scripting Vulnerabilities
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AMULTI-VENDOR.html">HTTP:XSS:MULTI-VENDOR</a></b></th>
   <td width="500" valign="top">
    HTTP: Multiple Vendors Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ANAGIOS-XI-ALERT-CLOUD.html">HTTP:XSS:NAGIOS-XI-ALERT-CLOUD</a></b></th>
   <td width="500" valign="top">
    HTTP: Nagios XI Alert Cloud Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ANASA-TRACE.html">HTTP:XSS:NASA-TRACE</a></b></th>
   <td width="500" valign="top">
    HTTP: NASA Tri-Agency Climate Education Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ANOVELL-ZENWORKS-XSS.html">HTTP:XSS:NOVELL-ZENWORKS-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Novell ZENworks Mobile Management Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AOPENFIRE-SEARCH.html">HTTP:XSS:OPENFIRE-SEARCH</a></b></th>
   <td width="500" valign="top">
    HTTP: Ignite Realtime Openfire group-summary.jsp Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AOPENFIRE-USER-CREATE.html">HTTP:XSS:OPENFIRE-USER-CREATE</a></b></th>
   <td width="500" valign="top">
    HTTP: Ignite Realtime Openfire user-create.jsp Cross-Site Request Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-BIEE-XSS.html">HTTP:XSS:ORACLE-BIEE-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle Business Intelligence Enterprise Edition Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AORACLE-GLASSFISH.html">HTTP:XSS:ORACLE-GLASSFISH</a></b></th>
   <td width="500" valign="top">
    HTTP: Oracle GlassFish Enterprise Server Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3APHPWEBSITE-PAGE-ID.html">HTTP:XSS:PHPWEBSITE-PAGE-ID</a></b></th>
   <td width="500" valign="top">
    HTTP: phpWebSite page_id Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-CALLBACK.html">HTTP:XSS:SHAREPOINT-CALLBACK</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Callback Function Privilege Escalation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-COMMAND.html">HTTP:XSS:SHAREPOINT-COMMAND</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Command Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-EDITFORM.html">HTTP:XSS:SHAREPOINT-EDITFORM</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server Editform Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-INPLVIEW.html">HTTP:XSS:SHAREPOINT-INPLVIEW</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server inplview.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-LIST-XSS.html">HTTP:XSS:SHAREPOINT-LIST-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Reflected List Parameter Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-THEMEWEB.html">HTTP:XSS:SHAREPOINT-THEMEWEB</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server themeweb.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-USER.html">HTTP:XSS:SHAREPOINT-USER</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft Sharepoint User XSS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASHAREPOINT-WIZARDLIST.html">HTTP:XSS:SHAREPOINT-WIZARDLIST</a></b></th>
   <td width="500" valign="top">
    HTTP: Microsoft SharePoint Server wizardlist.aspx Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASUBRION-CMS.html">HTTP:XSS:SUBRION-CMS</a></b></th>
   <td width="500" valign="top">
    HTTP: Subrion CMS Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASUSPICIOUS-SCAN.html">HTTP:XSS:SUSPICIOUS-SCAN</a></b></th>
   <td width="500" valign="top">
    HTTP: Suspicious Cross Site Scripting Scan Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYM-GATEWAY-PHP-PAGE.html">HTTP:XSS:SYM-GATEWAY-PHP-PAGE</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Multiple PHP Pages Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYMANTEC-EP-PARAM-XSS.html">HTTP:XSS:SYMANTEC-EP-PARAM-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Endpoint Protection URI Parameter Reflected Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ASYMANTEC-WG.html">HTTP:XSS:SYMANTEC-WG</a></b></th>
   <td width="500" valign="top">
    HTTP: Symantec Web Gateway Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3ATYPO3-LOCALURL-CMS.html">HTTP:XSS:TYPO3-LOCALURL-CMS</a></b></th>
   <td width="500" valign="top">
    HTTP: Typo3 CMS SanitizeLocalUrl Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AURL-IMG-XSS.html">HTTP:XSS:URL-IMG-XSS</a></b></th>
   <td width="500" valign="top">
    HTTP: IMG tag in URL with Javascript Cross-Side Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWHITE-LABEL-CMS.html">HTTP:XSS:WHITE-LABEL-CMS</a></b></th>
   <td width="500" valign="top">
    HTTP: White Label CMS 1.5 Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWORDPRESS-COMMENT.html">HTTP:XSS:WORDPRESS-COMMENT</a></b></th>
   <td width="500" valign="top">
    HTTP: Wordpress Comment Stored Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWORDPRESS-COMMENTS-CE.html">HTTP:XSS:WORDPRESS-COMMENTS-CE</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Comments Stored Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-CALENDAR.html">HTTP:XSS:WP-AJAX-CALENDAR</a></b></th>
   <td width="500" valign="top">
    HTTP: WP Ajax Calendar example.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-CATEGORY.html">HTTP:XSS:WP-AJAX-CATEGORY</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Ajax Category Dropdown Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-AJAX-RECENT-POSTS.html">HTTP:XSS:WP-AJAX-RECENT-POSTS</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WP Ajax Recent Posts Plugin number Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-DAILY-MAUI-PHOTO.html">HTTP:XSS:WP-DAILY-MAUI-PHOTO</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Daily Maui Photo Widget Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-ESHOP.html">HTTP:XSS:WP-ESHOP</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress eShop Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-FANCYBOX-PLUGIN.html">HTTP:XSS:WP-FANCYBOX-PLUGIN</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Fancybox Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-GAZETTE-THEME.html">HTTP:XSS:WP-GAZETTE-THEME</a></b></th>
   <td width="500" valign="top">
    HTTP: Gazette WordPress Theme Plugin src Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-LIVE-WIRE-THEME.html">HTTP:XSS:WP-LIVE-WIRE-THEME</a></b></th>
   <td width="500" valign="top">
    HTTP: Live Wire WordPress Theme Plugin src Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PHOTO-ALBUM.html">HTTP:XSS:WP-PHOTO-ALBUM</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WP Photo Album Plugin id Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PHOTORACER.html">HTTP:XSS:WP-PHOTORACER</a></b></th>
   <td width="500" valign="top">
    HTTP: Photoracer WordPress Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-PLACESTER.html">HTTP:XSS:WP-PLACESTER</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Placester Plugin ajax_action Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-SERMON-BROWSER.html">HTTP:XSS:WP-SERMON-BROWSER</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Sermon Browser Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-SOCIALGRID.html">HTTP:XSS:WP-SOCIALGRID</a></b></th>
   <td width="500" valign="top">
    HTTP: SocialGrid for WordPress default_services Parameter Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-STATS-DASHBOARD.html">HTTP:XSS:WP-STATS-DASHBOARD</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WP-Stats-Dashboard Plugin Multiple Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-UNIVERSAL-POST.html">HTTP:XSS:WP-UNIVERSAL-POST</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress Universal Post Manager Plugin Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AWP-WOOTHEMES.html">HTTP:XSS:WP-WOOTHEMES</a></b></th>
   <td width="500" valign="top">
    HTTP: WordPress WooThemes test.php Cross Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AXSS%3AX-FORWARDED-FOR-INJ.html">HTTP:XSS:X-FORWARDED-FOR-INJ</a></b></th>
   <td width="500" valign="top">
    HTTP: X-Forwarded-For Cross-Site Script Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="HTTP%3AZENOSS-VER-CHECK-RCE.html">HTTP:ZENOSS-VER-CHECK-RCE</a></b></th>
   <td width="500" valign="top">
    HTTP: Zenoss Core Version Check Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ACOMMAND.html">IMAP:OVERFLOW:COMMAND</a></b></th>
   <td width="500" valign="top">
    IMAP: Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AIMAP-LSUB-OF.html">IMAP:OVERFLOW:IMAP-LSUB-OF</a></b></th>
   <td width="500" valign="top">
    IMAP: NetWin SurgeMail IMAPD LSUB Command Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALINE.html">IMAP:OVERFLOW:LINE</a></b></th>
   <td width="500" valign="top">
    IMAP: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3ALIT_LENGTH_OFLOW.html">IMAP:OVERFLOW:LIT_LENGTH_OFLOW</a></b></th>
   <td width="500" valign="top">
    IMAP: Literal Length Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AMAILBOX.html">IMAP:OVERFLOW:MAILBOX</a></b></th>
   <td width="500" valign="top">
    IMAP: Mailbox Name Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AOVERFLOW%3AUSER.html">IMAP:OVERFLOW:USER</a></b></th>
   <td width="500" valign="top">
    IMAP: Username Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IMAP%3AREQERR%3AINVALID_LITERAL_LEN.html">IMAP:REQERR:INVALID_LITERAL_LEN</a></b></th>
   <td width="500" valign="top">
    IMAP: Invalid Literal Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IP%3AOPTERR%3AINVALID-INFRAGMENT.html">IP:OPTERR:INVALID-INFRAGMENT</a></b></th>
   <td width="500" valign="top">
    IP: Option in Fragment
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="IP%3AOVERFLOW%3AOPTIONS.html">IP:OVERFLOW:OPTIONS</a></b></th>
   <td width="500" valign="top">
    IP: Options Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3ABERGET-NXT-DOS.html">LDAP:BERGET-NXT-DOS</a></b></th>
   <td width="500" valign="top">
    LDAP: OpenLDAP ber_get_next Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3ACONTROLS-MISMATCH.html">LDAP:CONTROLS-MISMATCH</a></b></th>
   <td width="500" valign="top">
    LDAP: Controls Mismatch
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3AEMPTY%3ASCHREQ_FILTER_EMPTY.html">LDAP:EMPTY:SCHREQ_FILTER_EMPTY</a></b></th>
   <td width="500" valign="top">
    LDAP: Search Request: Filter Empty
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3AFORMAT%3AATTRIB-DESC-FMTERR.html">LDAP:FORMAT:ATTRIB-DESC-FMTERR</a></b></th>
   <td width="500" valign="top">
    LDAP: Attribute Descriptor Format Error
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3AINVALID%3AENC_INTEGER_LEN.html">LDAP:INVALID:ENC_INTEGER_LEN</a></b></th>
   <td width="500" valign="top">
    LDAP: Integer Length Invalid
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3AMS-WINDOWS-AD-LDAP-DOS.html">LDAP:MS-WINDOWS-AD-LDAP-DOS</a></b></th>
   <td width="500" valign="top">
    LDAP: Microsoft Windows Active Directory LDAP Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3AOVERFLOW%3AREQ-OF.html">LDAP:OVERFLOW:REQ-OF</a></b></th>
   <td width="500" valign="top">
    LDAP: Active Directory Request Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3ASAMBALDAP-LIBLDB.html">LDAP:SAMBALDAP-LIBLDB</a></b></th>
   <td width="500" valign="top">
    LDAP: Samba LDAP Server libldb Infinite Loop Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LDAP%3ASLAPD-OVERLAY-DOS.html">LDAP:SLAPD-OVERLAY-DOS</a></b></th>
   <td width="500" valign="top">
    LDAP: OpenLDAP slapd Deref Overlay Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="LPD%3AACTFAX-SERVER-BO.html">LPD:ACTFAX-SERVER-BO</a></b></th>
   <td width="500" valign="top">
    LPD: ActFax LPD Server Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MISC%3ALIBREOFICE-IMPRESS-RSM-RCE.html">MISC:LIBREOFICE-IMPRESS-RSM-RCE</a></b></th>
   <td width="500" valign="top">
    MISC: LibreOffice Impress Remote Socket Manager Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MISC%3ALINUX-KERNEL-ISCSI-BO.html">MISC:LINUX-KERNEL-ISCSI-BO</a></b></th>
   <td width="500" valign="top">
    MISC: Linux Kernel iscsi_add_notunderstood_response Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MISC%3ASHELLSHOCK.html">MISC:SHELLSHOCK</a></b></th>
   <td width="500" valign="top">
    MISC: Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3ABROADWIN-BOF.html">MS-RPC:BROADWIN-BOF</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Advantech/BroadWin SCADA RPC Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3ADCOM%3ASVRNAME-2LONG.html">MS-RPC:DCOM:SVRNAME-2LONG</a></b></th>
   <td width="500" valign="top">
    MS-RPC: DCOM Server Name Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AEPDUMP-SCAN-2.html">MS-RPC:EPDUMP-SCAN-2</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Epdump Scan Detected (2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AERR%3AFRAG-LEN-TOO-BIG.html">MS-RPC:ERR:FRAG-LEN-TOO-BIG</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Frag Length Too Big
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AERR%3AFRAG-LEN-TOO-SMALL.html">MS-RPC:ERR:FRAG-LEN-TOO-SMALL</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Frag Length Too Small
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ADCE-LARGE-FRAG-2.html">MS-RPC:EVASION:DCE-LARGE-FRAG-2</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (4a)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AEVASION%3ADCERPC-SMALL-REQ.html">MS-RPC:EVASION:DCERPC-SMALL-REQ</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Evasion Technique (7a)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3AHOST-INTEGRATION-RCE.html">MS-RPC:HOST-INTEGRATION-RCE</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Microsoft Host Integration Server RPC access remote code execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3ASNORT-EVAL-BOF.html">MS-RPC:SNORT-EVAL-BOF</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Sourcefire Snort rule20275eval Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="MS-RPC%3ATRND-MICRO-RPC.html">MS-RPC:TRND-MICRO-RPC</a></b></th>
   <td width="500" valign="top">
    MS-RPC: Trend Micro ServerProtect Multiple Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NETBIOS%3ANBDS%3AMS-PRINT-SPOOL-FMT.html">NETBIOS:NBDS:MS-PRINT-SPOOL-FMT</a></b></th>
   <td width="500" valign="top">
    NETBIOS: Microsoft Windows Print Spooler Service Format String Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NETBIOS%3ANBNS%3AEMPTY-UDP-MSG.html">NETBIOS:NBNS:EMPTY-UDP-MSG</a></b></th>
   <td width="500" valign="top">
    NETBIOS NS: Empty UDP Message
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NETBIOS%3AWINS%3AISATAP-INFO-DIS.html">NETBIOS:WINS:ISATAP-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    NETBIOS: WPAD WINS Server Registration Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NFS%3AERR%3ASHORT-READ.html">NFS:ERR:SHORT-READ</a></b></th>
   <td width="500" valign="top">
    NFS: Short Read
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NFS%3AMS-WINDOWS-NFS-NULL-DOS.html">NFS:MS-WINDOWS-NFS-NULL-DOS</a></b></th>
   <td width="500" valign="top">
    NFS: Microsoft Windows NFS Server NULL Pointer Dereference Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NTP%3AMONLIST-REQUEST.html">NTP:MONLIST-REQUEST</a></b></th>
   <td width="500" valign="top">
    NTP: Monitor List Command
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NTP%3AMONLIST-REQUEST-FLOOD.html">NTP:MONLIST-REQUEST-FLOOD</a></b></th>
   <td width="500" valign="top">
    NTP: Monitor List Command Flood
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NTP%3AMULTIPLE-STACK-OVERFLOW.html">NTP:MULTIPLE-STACK-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    NTP: Multiple NTP Daemon Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="NTP%3APIDFILE-DRIFTFILE-OVERWRITE.html">NTP:PIDFILE-DRIFTFILE-OVERWRITE</a></b></th>
   <td width="500" valign="top">
    NTP: Pidfile Driftfile Arbitrary File Overwrite
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="P2P%3AGNUCLEUSLAN%3ABROADCAST.html">P2P:GNUCLEUSLAN:BROADCAST</a></b></th>
   <td width="500" valign="top">
    P2P: GnucleusLAN Broadcast
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3AEXT%3ADOUBLE-EXTENSION.html">POP3:EXT:DOUBLE-EXTENSION</a></b></th>
   <td width="500" valign="top">
    POP3: Double File Extension
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ALINE.html">POP3:OVERFLOW:LINE</a></b></th>
   <td width="500" valign="top">
    POP3: Buffer Overflow Line
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3APASS.html">POP3:OVERFLOW:PASS</a></b></th>
   <td width="500" valign="top">
    POP3: Buffer Overflow Password
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3ATXTLINE_2LONG.html">POP3:OVERFLOW:TXTLINE_2LONG</a></b></th>
   <td width="500" valign="top">
    POP3: Data Line Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3AOVERFLOW%3AUSER.html">POP3:OVERFLOW:USER</a></b></th>
   <td width="500" valign="top">
    POP3: Buffer Overflow Username
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="POP3%3ASUSPICIOUS-HEADER.html">POP3:SUSPICIOUS-HEADER</a></b></th>
   <td width="500" valign="top">
    POP3: Suspicious Mail Sender with Randomized Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3ALARGE-CRED.html">PORTMAPPER:ERR:LARGE-CRED</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: RPC Credentials Too Large
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AERR%3ASHORT-READ.html">PORTMAPPER:ERR:SHORT-READ</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: RPC Short Read
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AGETADDR-RESP-MAL-UA.html">PORTMAPPER:GETADDR-RESP-MAL-UA</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: GETADDR Response Malformed Universal Address
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3ADUMP_PROC.html">PORTMAPPER:INFO:DUMP_PROC</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: Dump Proc
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3APORTMAP-DUMP.html">PORTMAPPER:INFO:PORTMAP-DUMP</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: DUMP Call
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AINFO%3AUNSET-PROC.html">PORTMAPPER:INFO:UNSET-PROC</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: Unset Proc
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="PORTMAPPER%3AINVALID%3ABAD-VERF-CRD.html">PORTMAPPER:INVALID:BAD-VERF-CRD</a></b></th>
   <td width="500" valign="top">
    PORTMAPPER: RPC Incorrect Verifier Credential
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RADIUS%3AINVALID_ATTR_LENGTH.html">RADIUS:INVALID_ATTR_LENGTH</a></b></th>
   <td width="500" valign="top">
    RADIUS: Invalid Attribute Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RADIUS%3AUSR-AUTHENTICATION.html">RADIUS:USR-AUTHENTICATION</a></b></th>
   <td width="500" valign="top">
    RADIUS: Username Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RPC%3ACALL-IT-OF.html">RPC:CALL-IT-OF</a></b></th>
   <td width="500" valign="top">
    RPC: Novell NetWare NFS Portmapper RPC Module Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT.html">RPC:RPC.MOUNTD:SHOWMOUNT</a></b></th>
   <td width="500" valign="top">
    RPC: Mountd Export Listing
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT-TCP.html">RPC:RPC.MOUNTD:SHOWMOUNT-TCP</a></b></th>
   <td width="500" valign="top">
    RPC: Showmount Request (TCP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RPC%3ARPC.MOUNTD%3ASHOWMOUNT-UDP.html">RPC:RPC.MOUNTD:SHOWMOUNT-UDP</a></b></th>
   <td width="500" valign="top">
    RPC: Showmount Request (UDP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RTSP%3AOVERFLOW%3ALINE-OF.html">RTSP:OVERFLOW:LINE-OF</a></b></th>
   <td width="500" valign="top">
    RTSP: Line Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RTSP%3AUBIQUITI-AIRCAM-BOF.html">RTSP:UBIQUITI-AIRCAM-BOF</a></b></th>
   <td width="500" valign="top">
    RTSP: Ubiquiti AirCam Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RTSP%3AUBIQUITI-AIRCAM-BOF1.html">RTSP:UBIQUITI-AIRCAM-BOF1</a></b></th>
   <td width="500" valign="top">
    RTSP: Ubiquiti AirCam Remote Code Execution 1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RTSP%3AVLC-BO.html">RTSP:VLC-BO</a></b></th>
   <td width="500" valign="top">
    RTSP: VLC Media Player RTSP Plugin Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RUSERS%3AERR%3AWRONG-DIR.html">RUSERS:ERR:WRONG-DIR</a></b></th>
   <td width="500" valign="top">
    RUSERS: Wrong Direction
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="RUSERS%3AINVALID%3AINVALID-DIR.html">RUSERS:INVALID:INVALID-DIR</a></b></th>
   <td width="500" valign="top">
    RUSERS Invalid Direction
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3AABB-MICROSCADA-BOF.html">SCADA:ABB-MICROSCADA-BOF</a></b></th>
   <td width="500" valign="top">
    APP: ABB MicroSCADA Wserver Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3AABB-WSERVER-CMD-EXEC.html">SCADA:ABB-WSERVER-CMD-EXEC</a></b></th>
   <td width="500" valign="top">
    SCADA: ABB MicroSCADA Wserver Component Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3ACODESYS-BO.html">SCADA:CODESYS-BO</a></b></th>
   <td width="500" valign="top">
    SCADA: 3S Smart Software Solutions CoDeSys Gateway Server Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3ACODESYS-OPCODE03EF.html">SCADA:CODESYS-OPCODE03EF</a></b></th>
   <td width="500" valign="top">
    SCADA: CoDeSys Gateway Server Opcode 0x3ef Heap Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3ASCHNEIDER-ELEC-INTER-BOF.html">SCADA:SCHNEIDER-ELEC-INTER-BOF</a></b></th>
   <td width="500" valign="top">
    SCADA: Schneider Electric Interactive Graphical SCADA System Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3ASCHNIDER-DB-INFO-DIS.html">SCADA:SCHNIDER-DB-INFO-DIS</a></b></th>
   <td width="500" valign="top">
    SCADA: Schneider Electric SCADA Expert ClearSCADA Authentication Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3AWELLINTECH-KING-OF.html">SCADA:WELLINTECH-KING-OF</a></b></th>
   <td width="500" valign="top">
    SCADA: WellinTech KingSCADA kxNetDispose.dll Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCADA%3AYOKOGAWA-STACK-OF.html">SCADA:YOKOGAWA-STACK-OF</a></b></th>
   <td width="500" valign="top">
    SCADA: Yokogawa BKFSim CVE-2014-3888 Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3ADIRBUSTER-UA.html">SCAN:DIRBUSTER-UA</a></b></th>
   <td width="500" valign="top">
    SCAN: OWASP DirBuster User Agent Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMASSCAN-UA.html">SCAN:MASSCAN-UA</a></b></th>
   <td width="500" valign="top">
    SCAN: Masscan Scanner User Agent 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AEXECCOMMAND-UAF.html">SCAN:METASPLOIT:EXECCOMMAND-UAF</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit ie_execcommand_uaf Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AJAVA-APPLET.html">SCAN:METASPLOIT:JAVA-APPLET</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit Framework Java Applet In-Line Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AJS-HEAPLIB.html">SCAN:METASPLOIT:JS-HEAPLIB</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit JavaScript Heap Exploitation Library
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AMETERPRETER-DLL.html">SCAN:METASPLOIT:METERPRETER-DLL</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit Meterpreter DLL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3ASMB-ACTIVE.html">SCAN:METASPLOIT:SMB-ACTIVE</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit SMB Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMETASPLOIT%3AVICTIM-PROFILE.html">SCAN:METASPLOIT:VICTIM-PROFILE</a></b></th>
   <td width="500" valign="top">
    SCAN: Metasploit Victim Profiling Script
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AMUIEBLACKCAT-TOOL.html">SCAN:MUIEBLACKCAT-TOOL</a></b></th>
   <td width="500" valign="top">
    SCAN: Muieblackcat Scanner Tool Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AOPENVAS-UA.html">SCAN:OPENVAS-UA</a></b></th>
   <td width="500" valign="top">
    SCAN: OpenVAS Scanner User Agent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3APHP-CGI-RCE-ACTIVITY.html">SCAN:PHP-CGI-RCE-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    SCAN: PHP-CGI Remote Code Execution Scanner Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SCAN%3AW3AF.html">SCAN:W3AF</a></b></th>
   <td width="500" valign="top">
    SCAN: Web Application Attack and Audit Framework 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-HTTP-CL.html">SHELLCODE:ACTIVE:BIND-1-HTTP-CL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-HTTP-SR.html">SHELLCODE:ACTIVE:BIND-1-HTTP-SR</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-SMB-CTS.html">SHELLCODE:ACTIVE:BIND-1-SMB-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (SMB-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-SMB-STC.html">SHELLCODE:ACTIVE:BIND-1-SMB-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (SMB-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-TCP-CTS.html">SHELLCODE:ACTIVE:BIND-1-TCP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-TCP-STC.html">SHELLCODE:ACTIVE:BIND-1-TCP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-UDP-CTS.html">SHELLCODE:ACTIVE:BIND-1-UDP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ABIND-1-UDP-STC.html">SHELLCODE:ACTIVE:BIND-1-UDP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Bindshell 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-TCP-CTS.html">SHELLCODE:ACTIVE:DCDR-1-TCP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-1-TCP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-1-UDP-CTS</a></b></th>
   <td width="500" valign="top">
    Shellcode: Decoder Loop 1 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-1-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-1-UDP-STC</a></b></th>
   <td width="500" valign="top">
    Shellcode: Decoder Loop 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-TCP-CTS.html">SHELLCODE:ACTIVE:DCDR-2-TCP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-2-TCP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-2-UDP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-2-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-2-UDP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-TCP-STC.html">SHELLCODE:ACTIVE:DCDR-3-TCP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-UDP-CTS.html">SHELLCODE:ACTIVE:DCDR-3-UDP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (UDP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADCDR-3-UDP-STC.html">SHELLCODE:ACTIVE:DCDR-3-UDP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER1-80-CL.html">SHELLCODE:ACTIVE:DECODER1-80-CL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER1-80-SV.html">SHELLCODE:ACTIVE:DECODER1-80-SV</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER2-80-CL.html">SHELLCODE:ACTIVE:DECODER2-80-CL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER2-80-SV.html">SHELLCODE:ACTIVE:DECODER2-80-SV</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 2 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER3-80-CL.html">SHELLCODE:ACTIVE:DECODER3-80-CL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ADECODER3-80-SV.html">SHELLCODE:ACTIVE:DECODER3-80-SV</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Decoder Loop 3 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AJS-ESCAPE.html">SHELLCODE:ACTIVE:JS-ESCAPE</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Javascript Escaped Shell
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AJS-UNESCAPE.html">SHELLCODE:ACTIVE:JS-UNESCAPE</a></b></th>
   <td width="500" valign="top">
    Shellcode: Javascript &#39;Unescape&#39; Shellcode
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-1-SMB.html">SHELLCODE:ACTIVE:REVERSE-1-SMB</a></b></th>
   <td width="500" valign="top">
    Shellcode: Reverse Shell 1 (SMB)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-1-TCP.html">SHELLCODE:ACTIVE:REVERSE-1-TCP</a></b></th>
   <td width="500" valign="top">
    Shellcode: Reverse Shell 1 (TCP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-80-CTS.html">SHELLCODE:ACTIVE:REVERSE-80-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3AREVERSE-80-STC.html">SHELLCODE:ACTIVE:REVERSE-80-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (HTTP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ARVRS-1-UDP-CLT.html">SHELLCODE:ACTIVE:RVRS-1-UDP-CLT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (UDP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AACTIVE%3ARVRS-1-UDP-STC.html">SHELLCODE:ACTIVE:RVRS-1-UDP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Reverse Shell 1 (UDP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ABSDX86%3ASHELL-1-HTTP.html">SHELLCODE:BSDX86:SHELL-1-HTTP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OpenBSD Command Shell (Gobbles)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ABSDX86%3ASHELL-2-HTTP.html">SHELLCODE:BSDX86:SHELL-2-HTTP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: FreeBSD/OpenBSD/NetBSD Command Shell (Gobbles)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AHEX-ASCII-HEAPS-CHAR.html">SHELLCODE:HEX-ASCII-HEAPS-CHAR</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Hexadecimal encoding And Ascii Heapspray Characters Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AJS%3AMAL-ABOUT.html">SHELLCODE:JS:MAL-ABOUT</a></b></th>
   <td width="500" valign="top">
    HTTP: Metasploit Framework Malicious About JavaScript 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STAGER.html">SHELLCODE:LINUX:ARMLE-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STGR-80C.html">SHELLCODE:LINUX:ARMLE-STGR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AARMLE-STGR-80S.html">SHELLCODE:LINUX:ARMLE-STGR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux ARMLE Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ACHMOD-ROOT-RWX.html">SHELLCODE:LINUX:CHMOD-ROOT-RWX</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Generic x86 Root Directory RWX Enable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ACHMOD-SHADOW.html">SHELLCODE:LINUX:CHMOD-SHADOW</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux/x86 Shadow File World Read/Write Enable
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AIPTABLES.html">SHELLCODE:LINUX:IPTABLES</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: IPTables Flush Security Bypass (TCP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AIPTABLES-H.html">SHELLCODE:LINUX:IPTABLES-H</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: IPTables Flush Security Bypass (HTTP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AREBOOT.html">SHELLCODE:LINUX:REBOOT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Forced Reboot
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ASSH-PORTFWD.html">SHELLCODE:LINUX:SSH-PORTFWD</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux/x86 SSH Port Forwarding
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3ASYSKILL.html">SHELLCODE:LINUX:SYSKILL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux sys_kill Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AUNLINK.html">SHELLCODE:LINUX:UNLINK</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux unlink autofsck Execute
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ALINUX%3AUNLINK-HTTP.html">SHELLCODE:LINUX:UNLINK-HTTP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux unlink autofsck Execute (HTTP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-80C.html">SHELLCODE:MIPS:BE-BYTEXORI-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-80S.html">SHELLCODE:MIPS:BE-BYTEXORI-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-CTS.html">SHELLCODE:MIPS:BE-BYTEXORI-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-BYTEXORI-STC.html">SHELLCODE:MIPS:BE-BYTEXORI-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/byte_xori Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-80C.html">SHELLCODE:MIPS:BE-LONGXOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-80S.html">SHELLCODE:MIPS:BE-LONGXOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-CTS.html">SHELLCODE:MIPS:BE-LONGXOR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ABE-LONGXOR-STC.html">SHELLCODE:MIPS:BE-LONGXOR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsbe/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-80C.html">SHELLCODE:MIPS:LE-BYTEXORI-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-80S.html">SHELLCODE:MIPS:LE-BYTEXORI-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-CTS.html">SHELLCODE:MIPS:LE-BYTEXORI-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-BYTEXORI-STC.html">SHELLCODE:MIPS:LE-BYTEXORI-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/byte_xori Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-80C.html">SHELLCODE:MIPS:LE-LONGXOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-80S.html">SHELLCODE:MIPS:LE-LONGXOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-CTS.html">SHELLCODE:MIPS:LE-LONGXOR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMIPS%3ALE-LONGXOR-STC.html">SHELLCODE:MIPS:LE-LONGXOR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit mipsle/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AALPHA2-GETEIP-CTS.html">SHELLCODE:MSF:ALPHA2-GETEIP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AALPHA2-GETEIP-STC.html">SHELLCODE:MSF:ALPHA2-GETEIP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-80C.html">SHELLCODE:MSF:DCX86-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-80S.html">SHELLCODE:MSF:DCX86-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-CTS.html">SHELLCODE:MSF:DCX86-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for x86 (TCP-CTS1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-STC.html">SHELLCODE:MSF:DCX86-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for x86 (TCP-STC2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-UDP1.html">SHELLCODE:MSF:DCX86-UDP1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 (UDP-CTS1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3ADCX86-UDP2.html">SHELLCODE:MSF:DCX86-UDP2</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Decoder Routine for X86 (UDP-STC2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AFTENV-SMB1.html">SHELLCODE:MSF:FTENV-SMB1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Execution (x86/fnstenv_mov) Shellcode (SMB-CTS1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AFTENV-SMB2.html">SHELLCODE:MSF:FTENV-SMB2</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Execution (x86/fnstenv_mov) Shellcode (SMB-STC2)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AJAVA-APP.html">SHELLCODE:MSF:JAVA-APP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Framework Java Applet Shellcode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3AJAVA-JAR.html">SHELLCODE:MSF:JAVA-JAR</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit Framework Java Archive Shellcode Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-CTS.html">SHELLCODE:MSF:PEXALPHANUM-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-CTS-1.html">SHELLCODE:MSF:PEXALPHANUM-CTS-1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-CTS-1
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXALPHANUM-STC.html">SHELLCODE:MSF:PEXALPHANUM-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXCALL-CTS.html">SHELLCODE:MSF:PEXCALL-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APEXCALL-STC.html">SHELLCODE:MSF:PEXCALL-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AMSF%3APROPSPRAY.html">SHELLCODE:MSF:PROPSPRAY</a></b></th>
   <td width="500" valign="top">
    HTTP: Metasploit js_property_spray Heap Spraying Technique
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AOSX%3AARMLE-STAGER.html">SHELLCODE:OSX:ARMLE-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX ARMLE Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-80C.html">SHELLCODE:PHP:BASE64-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-80S.html">SHELLCODE:PHP:BASE64-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-CTS.html">SHELLCODE:PHP:BASE64-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ABASE64-STC.html">SHELLCODE:PHP:BASE64-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit php/base64 Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3AREVERSE-SHELL.html">SHELLCODE:PHP:REVERSE-SHELL</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: PHP Reverse Shell
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APHP%3ASHELL-URI.html">SHELLCODE:PHP:SHELL-URI</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: PHPShell Haxplorer URI
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3AAIX-STAGER.html">SHELLCODE:PPC:AIX-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: AIX PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALIN-GNRC-STGR-80C.html">SHELLCODE:PPC:LIN-GNRC-STGR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALIN-GNRC-STGR-80S.html">SHELLCODE:PPC:LIN-GNRC-STGR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALINUX-GNRC-STAGER.html">SHELLCODE:PPC:LINUX-GNRC-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-80C.html">SHELLCODE:PPC:LONGXOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-80S.html">SHELLCODE:PPC:LONGXOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-CTS.html">SHELLCODE:PPC:LONGXOR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-STC.html">SHELLCODE:PPC:LONGXOR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-80C.html">SHELLCODE:PPC:LONGXOR-TAG-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-80S.html">SHELLCODE:PPC:LONGXOR-TAG-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-CTS.html">SHELLCODE:PPC:LONGXOR-TAG-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3ALONGXOR-TAG-STC.html">SHELLCODE:PPC:LONGXOR-TAG-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit ppc/longxor_tag Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APPC%3AOSX-STAGER.html">SHELLCODE:PPC:OSX-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX PPC Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-HTTP.html">SHELLCODE:PREPENDENCODER-HTTP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-HTTP-1.html">SHELLCODE:PREPENDENCODER-HTTP-1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection Over HTTP (1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3APREPENDENCODER-TCP.html">SHELLCODE:PREPENDENCODER-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Prepend Encoder Routine Detection (TCP)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABIN-KSH.html">SHELLCODE:SPARC:BIN-KSH</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Solaris /bin/ksh Execute
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABSD-BIND-TCP.html">SHELLCODE:SPARC:BSD-BIND-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ABSD-REVERSE-TCP.html">SHELLCODE:SPARC:BSD-REVERSE-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-80C.html">SHELLCODE:SPARC:LONGXORTAG-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-80S.html">SHELLCODE:SPARC:LONGXORTAG-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-CTS.html">SHELLCODE:SPARC:LONGXORTAG-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ALONGXORTAG-STC.html">SHELLCODE:SPARC:LONGXORTAG-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit sparc/longxor_tag Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3ASOLARIS-STAGER.html">SHELLCODE:SPARC:SOLARIS-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Solaris sparc Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3ASPARC%3AWRITE-EXIT.html">SHELLCODE:SPARC:WRITE-EXIT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Solaris write and exit System Calls
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-EXPTERM.html">SHELLCODE:WIN:7-EXPTERM</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Explorer Termination
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-SHUTDOWN.html">SHELLCODE:WIN:7-SHUTDOWN</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Force Shutdown
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3A7-TASKMGR.html">SHELLCODE:WIN:7-TASKMGR</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows 7 Disable Task Manager
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3APARTITION-FMT.html">SHELLCODE:WIN:PARTITION-FMT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Partitions Format Shellcode of Death
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHELL-PROMPT.html">SHELLCODE:WIN:SHELL-PROMPT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Microsoft Windows CMD.EXE Prompt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATA-GANAI-STC.html">SHELLCODE:WIN:SHIKATA-GANAI-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-21C.html">SHELLCODE:WIN:SHIKATAGANAI-21C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over FTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-80C.html">SHELLCODE:WIN:SHIKATAGANAI-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-80S.html">SHELLCODE:WIN:SHIKATAGANAI-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASHIKATAGANAI-HTTP.html">SHELLCODE:WIN:SHIKATAGANAI-HTTP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Shikata Ga Nai Encoder Routine Over HTTP (1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASMB-REM-EXEC1.html">SHELLCODE:WIN:SMB-REM-EXEC1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Remote Execute Command (Little Endian)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AWIN%3ASMB-REM-EXEC2.html">SHELLCODE:WIN:SMB-REM-EXEC2</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Remote Execute Command (Big Endian)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALIN-SHEL-BIND-80C.html">SHELLCODE:X64:LIN-SHEL-BIND-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALIN-SHEL-BIND-80S.html">SHELLCODE:X64:LIN-SHEL-BIND-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-FIND-PORT.html">SHELLCODE:X64:LINUX-FIND-PORT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-80C.html">SHELLCODE:X64:LINUX-REVERSE-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-80S.html">SHELLCODE:X64:LINUX-REVERSE-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-REVERSE-TCP.html">SHELLCODE:X64:LINUX-REVERSE-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x64 Reverse TCP Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3ALINUX-SHELL-BIND.html">SHELLCODE:X64:LINUX-SHELL-BIND</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AOSX-STAGER.html">SHELLCODE:X64:OSX-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX x64 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER.html">SHELLCODE:X64:WIN-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER-80C.html">SHELLCODE:X64:WIN-STAGER-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AWIN-STAGER-80S.html">SHELLCODE:X64:WIN-STAGER-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x64 Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-80C.html">SHELLCODE:X64:XOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-80S.html">SHELLCODE:X64:XOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-CTS.html">SHELLCODE:X64:XOR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX64%3AXOR-STC.html">SHELLCODE:X64:XOR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x64/xor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-80C.html">SHELLCODE:X86:ADD-SUB-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-80S.html">SHELLCODE:X86:ADD-SUB-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-CTS.html">SHELLCODE:X86:ADD-SUB-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AADD-SUB-STC.html">SHELLCODE:X86:ADD-SUB-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/add_sub Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-80C.html">SHELLCODE:X86:ALPHA-MIXED-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-80S.html">SHELLCODE:X86:ALPHA-MIXED-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over HTTP STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-CTS.html">SHELLCODE:X86:ALPHA-MIXED-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_mixed Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-MIXED-STC.html">SHELLCODE:X86:ALPHA-MIXED-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit X86 alpha_mixed Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-80C.html">SHELLCODE:X86:ALPHA-UPPER-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-80S.html">SHELLCODE:X86:ALPHA-UPPER-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-CTS.html">SHELLCODE:X86:ALPHA-UPPER-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA-UPPER-STC.html">SHELLCODE:X86:ALPHA-UPPER-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/alpha_upper Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA2-GETEIP-80C.html">SHELLCODE:X86:ALPHA2-GETEIP-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AALPHA2-GETEIP-80S.html">SHELLCODE:X86:ALPHA2-GETEIP-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Alpha2 GetEIPs Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8-LWR-80C.html">SHELLCODE:X86:AVD-UTF8-LWR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8-LWR-80S.html">SHELLCODE:X86:AVD-UTF8-LWR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8TLWR-CTS.html">SHELLCODE:X86:AVD-UTF8TLWR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AAVD-UTF8TLWR-STC.html">SHELLCODE:X86:AVD-UTF8TLWR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/avoid_utf8_tolower Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-80C.html">SHELLCODE:X86:BASE64-NOOP-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-80S.html">SHELLCODE:X86:BASE64-NOOP-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-CTS.html">SHELLCODE:X86:BASE64-NOOP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABASE64-NOOP-STC.html">SHELLCODE:X86:BASE64-NOOP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Base64 X86 NOOP Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-80C.html">SHELLCODE:X86:BLOXOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-80S.html">SHELLCODE:X86:BLOXOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-TCP-CTS.html">SHELLCODE:X86:BLOXOR-TCP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABLOXOR-TCP-STC.html">SHELLCODE:X86:BLOXOR-TCP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/bloxor Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-BIND-IPV6-TCP.html">SHELLCODE:X86:BSD-BIND-IPV6-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Bind IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-BIND-TCP.html">SHELLCODE:X86:BSD-BIND-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-EXEC.html">SHELLCODE:X86:BSD-EXEC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Exec Metasploit Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-FIND-PORT.html">SHELLCODE:X86:BSD-FIND-PORT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-FIND-TAG.html">SHELLCODE:X86:BSD-FIND-TAG</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-REV-IPV6.html">SHELLCODE:X86:BSD-REV-IPV6</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD Reverse IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSD-REVERSE-TCP.html">SHELLCODE:X86:BSD-REVERSE-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSD x86 Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ABSDI-STAGER.html">SHELLCODE:X86:BSDI-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: BSDI x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-80C.html">SHELLCODE:X86:CONTEXT-CPUID-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-80S.html">SHELLCODE:X86:CONTEXT-CPUID-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-CTS.html">SHELLCODE:X86:CONTEXT-CPUID-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-CPUID-STC.html">SHELLCODE:X86:CONTEXT-CPUID-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_cpuid Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-80C.html">SHELLCODE:X86:CONTEXT-STAT-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-80S.html">SHELLCODE:X86:CONTEXT-STAT-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-CTS.html">SHELLCODE:X86:CONTEXT-STAT-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-STAT-STC.html">SHELLCODE:X86:CONTEXT-STAT-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_stat Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-80C.html">SHELLCODE:X86:CONTEXT-TIME-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-80S.html">SHELLCODE:X86:CONTEXT-TIME-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-CTS.html">SHELLCODE:X86:CONTEXT-TIME-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACONTEXT-TIME-STC.html">SHELLCODE:X86:CONTEXT-TIME-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/context_time Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-80C.html">SHELLCODE:X86:COUNTDOWN-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-80S.html">SHELLCODE:X86:COUNTDOWN-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-CTS.html">SHELLCODE:X86:COUNTDOWN-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ACOUNTDOWN-STC.html">SHELLCODE:X86:COUNTDOWN-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/countdown Encoder Routine TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-80C.html">SHELLCODE:X86:DWORD-ADITIVE-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-80S.html">SHELLCODE:X86:DWORD-ADITIVE-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-CTS.html">SHELLCODE:X86:DWORD-ADITIVE-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ADWORD-ADITIVE-STC.html">SHELLCODE:X86:DWORD-ADITIVE-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Dword Additive Feedback Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-80C.html">SHELLCODE:X86:FLDZ-GET-EIP-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-80S.html">SHELLCODE:X86:FLDZ-GET-EIP-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-CTS.html">SHELLCODE:X86:FLDZ-GET-EIP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFLDZ-GET-EIP-STC.html">SHELLCODE:X86:FLDZ-GET-EIP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 fldz GET EIP Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80S.html">SHELLCODE:X86:FNSTENV-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-80S-1.html">SHELLCODE:X86:FNSTENV-80S-1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-STC(1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-STC.html">SHELLCODE:X86:FNSTENV-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AFNSTENV-STC-1.html">SHELLCODE:X86:FNSTENV-STC-1</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over TCP-STC(1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-80C.html">SHELLCODE:X86:GETEIP-XOR-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-80S.html">SHELLCODE:X86:GETEIP-XOR-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-CTS.html">SHELLCODE:X86:GETEIP-XOR-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AGETEIP-XOR-STC.html">SHELLCODE:X86:GETEIP-XOR-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic Call geteip Byte XOR Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-80C.html">SHELLCODE:X86:JMPCALLADTIVE-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-80S.html">SHELLCODE:X86:JMPCALLADTIVE-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-CTS.html">SHELLCODE:X86:JMPCALLADTIVE-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AJMPCALLADTIVE-STC.html">SHELLCODE:X86:JMPCALLADTIVE-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/jmp_call_additive Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-IPV6-80C.html">SHELLCODE:X86:LIN-BIND-IPV6-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-IPV6-80S.html">SHELLCODE:X86:LIN-BIND-IPV6-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-NONX-80C.html">SHELLCODE:X86:LIN-BIND-NONX-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-BIND-NONX-80S.html">SHELLCODE:X86:LIN-BIND-NONX-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-IPV6-80C.html">SHELLCODE:X86:LIN-REV-IPV6-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-IPV6-80S.html">SHELLCODE:X86:LIN-REV-IPV6-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-NONX-80C.html">SHELLCODE:X86:LIN-REV-NONX-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-REV-NONX-80S.html">SHELLCODE:X86:LIN-REV-NONX-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-SHELL-REV-80C.html">SHELLCODE:X86:LIN-SHELL-REV-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALIN-SHELL-REV-80S.html">SHELLCODE:X86:LIN-SHELL-REV-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-80C.html">SHELLCODE:X86:LINUX-BIND-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-80S.html">SHELLCODE:X86:LINUX-BIND-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-IPV6.html">SHELLCODE:X86:LINUX-BIND-IPV6</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind IPv6 TCP Metasploit Stager Payload 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-NONX.html">SHELLCODE:X86:LINUX-BIND-NONX</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Bind Nonx TCP Metasploit Stager Payload 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-BIND-TCP.html">SHELLCODE:X86:LINUX-BIND-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FIND-PORT.html">SHELLCODE:X86:LINUX-FIND-PORT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FIND-TAG.html">SHELLCODE:X86:LINUX-FIND-TAG</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-PRT-80C.html">SHELLCODE:X86:LINUX-FND-PRT-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-PRT-80S.html">SHELLCODE:X86:LINUX-FND-PRT-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux x86 Find Port Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-TAG-80C.html">SHELLCODE:X86:LINUX-FND-TAG-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-FND-TAG-80S.html">SHELLCODE:X86:LINUX-FND-TAG-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Find Tag Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REV-IPV6.html">SHELLCODE:X86:LINUX-REV-IPV6</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse IPv6 TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REV-NONX.html">SHELLCODE:X86:LINUX-REV-NONX</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse Nonx TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-REVERSE-TCP.html">SHELLCODE:X86:LINUX-REVERSE-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ALINUX-SHELL-REV.html">SHELLCODE:X86:LINUX-SHELL-REV</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Linux Shell Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-80C.html">SHELLCODE:X86:NONALPHAUPPER-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-80S.html">SHELLCODE:X86:NONALPHAUPPER-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-CTS.html">SHELLCODE:X86:NONALPHAUPPER-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ANONALPHAUPPER-STC.html">SHELLCODE:X86:NONALPHAUPPER-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/nonupper or x86/nonalpha Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-BIND-TCP.html">SHELLCODE:X86:OSX-BIND-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Bind TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-FIND-PORT.html">SHELLCODE:X86:OSX-FIND-PORT</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Find Port Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AOSX-REVERSE-TCP.html">SHELLCODE:X86:OSX-REVERSE-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: OSX x86 Reverse TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXALPHANUM-80C.html">SHELLCODE:X86:PEXALPHANUM-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXALPHANUM-80S.html">SHELLCODE:X86:PEXALPHANUM-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexAlphaNum Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXCALL-80C.html">SHELLCODE:X86:PEXCALL-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3APEXCALL-80S.html">SHELLCODE:X86:PEXCALL-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 PexCall Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-80C.html">SHELLCODE:X86:REVERS-CONECT-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-80S.html">SHELLCODE:X86:REVERS-CONECT-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-CTS.html">SHELLCODE:X86:REVERS-CONECT-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AREVERS-CONECT-STC.html">SHELLCODE:X86:REVERS-CONECT-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Linux Reverse Connect Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-80C.html">SHELLCODE:X86:SINGLSTATCBIT-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-80S.html">SHELLCODE:X86:SINGLSTATCBIT-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATCBIT-STC.html">SHELLCODE:X86:SINGLSTATCBIT-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASINGLSTATICBT-CTS.html">SHELLCODE:X86:SINGLSTATICBT-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/single_static_bit Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3ASOLARIS-STAGER.html">SHELLCODE:X86:SOLARIS-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Solaris x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUDP-ENCODER.html">SHELLCODE:X86:UDP-ENCODER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Multiple Encoder For UDP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-80C.html">SHELLCODE:X86:UNICODE-MIXED-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-80S.html">SHELLCODE:X86:UNICODE-MIXED-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-CTS.html">SHELLCODE:X86:UNICODE-MIXED-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-MIXED-STC.html">SHELLCODE:X86:UNICODE-MIXED-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_mixed Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-80C.html">SHELLCODE:X86:UNICODE-UPPER-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-80S.html">SHELLCODE:X86:UNICODE-UPPER-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-CTS.html">SHELLCODE:X86:UNICODE-UPPER-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AUNICODE-UPPER-STC.html">SHELLCODE:X86:UNICODE-UPPER-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Metasploit x86/unicode_upper Encoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-BIND-IPV6-80C.html">SHELLCODE:X86:WIN-BIND-IPV6-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Bind IPv6 TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG.html">SHELLCODE:X86:WIN-FIND-TAG</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG-80C.html">SHELLCODE:X86:WIN-FIND-TAG-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-FIND-TAG-80S.html">SHELLCODE:X86:WIN-FIND-TAG-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Find Tag Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP.html">SHELLCODE:X86:WIN-NONX-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP-80C.html">SHELLCODE:X86:WIN-NONX-TCP-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-NONX-TCP-80S.html">SHELLCODE:X86:WIN-NONX-TCP-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Nonx TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-80C.html">SHELLCODE:X86:WIN-REV-ORD-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-80S.html">SHELLCODE:X86:WIN-REV-ORD-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-REV-ORD-TCP.html">SHELLCODE:X86:WIN-REV-ORD-TCP</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Reverse Ordered TCP Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SHELL-XPFW.html">SHELLCODE:X86:WIN-SHELL-XPFW</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Disable Windows ICF Bind TCP Shell Metasploit Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SHLL-XPFW-80S.html">SHELLCODE:X86:WIN-SHLL-XPFW-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Disable Windows ICF Bind TCP Shell Metasploit Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWN-80C.html">SHELLCODE:X86:WIN-SPEAK-PWN-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned! Over HTTP (CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWN-80S.html">SHELLCODE:X86:WIN-SPEAK-PWN-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned! Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-SPEAK-PWNED.html">SHELLCODE:X86:WIN-SPEAK-PWNED</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows Speech API - Say You Got Pwned!
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER.html">SHELLCODE:X86:WIN-STAGER</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER-80C.html">SHELLCODE:X86:WIN-STAGER-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN-STAGER-80S.html">SHELLCODE:X86:WIN-STAGER-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: Windows x86 Metasploit Stager Payload Over HTTP
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN2K-2K3-CTS.html">SHELLCODE:X86:WIN2K-2K3-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 win2k-2k3 Decoder Base Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-80C.html">SHELLCODE:X86:WIN32-ENUM-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-80S.html">SHELLCODE:X86:WIN32-ENUM-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-CTS.html">SHELLCODE:X86:WIN32-ENUM-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AWIN32-ENUM-STC.html">SHELLCODE:X86:WIN32-ENUM-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-80C.html">SHELLCODE:X86:X86-NOOP1-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-80S.html">SHELLCODE:X86:X86-NOOP1-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-CTS.html">SHELLCODE:X86:X86-NOOP1-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX86-NOOP1-STC.html">SHELLCODE:X86:X86-NOOP1-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 NOOP (1) Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-CTS.html">SHELLCODE:X86:X90-NOOP-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (TCP-CTS)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-HTTP-HDR.html">SHELLCODE:X86:X90-NOOP-HTTP-HDR</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide In HTTP Header
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-HTTP-REQ.html">SHELLCODE:X86:X90-NOOP-HTTP-REQ</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (HTTP-Request)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AX90-NOOP-STC.html">SHELLCODE:X86:X90-NOOP-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (TCP-STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-80C.html">SHELLCODE:X86:XOR-DWORD-80C</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over HTTP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-80S.html">SHELLCODE:X86:XOR-DWORD-80S</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over HTTP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-CTS.html">SHELLCODE:X86:XOR-DWORD-CTS</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over TCP-CTS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SHELLCODE%3AX86%3AXOR-DWORD-STC.html">SHELLCODE:X86:XOR-DWORD-STC</a></b></th>
   <td width="500" valign="top">
    SHELLCODE: X86 OS agnostic XOR Dword Decoder Routine Over TCP-STC
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AAUDIT%3ABRUTE-LOGIN.html">SMB:AUDIT:BRUTE-LOGIN</a></b></th>
   <td width="500" valign="top">
    SMB: Brute Force Login Attempt to enumerate SMB shares
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ACORE-DLL-REQ-VIA-SMB.html">SMB:CORE-DLL-REQ-VIA-SMB</a></b></th>
   <td width="500" valign="top">
    SMB: Corel Path Subversion Arbitrary DLL Injection Code Execution 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ADCE-RPC-FRAG-EXP-PAYLOAD.html">SMB:DCE-RPC-FRAG-EXP-PAYLOAD</a></b></th>
   <td width="500" valign="top">
    SMB: DCE/RPC Fragmented Packets with Exploit Code
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ADCE-RPC-FRAG-MAL-PAYLOAD.html">SMB:DCE-RPC-FRAG-MAL-PAYLOAD</a></b></th>
   <td width="500" valign="top">
    SMB: DCE/RPC Fragmented Packets with Malicious Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ADOUBLE-NEGO-RESP.html">SMB:DOUBLE-NEGO-RESP</a></b></th>
   <td width="500" valign="top">
    SMB: Redundant Negotiation Response
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AERROR%3AGRIND.html">SMB:ERROR:GRIND</a></b></th>
   <td width="500" valign="top">
    SMB: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AERROR%3AINV-MSG-LEN.html">SMB:ERROR:INV-MSG-LEN</a></b></th>
   <td width="500" valign="top">
    SMB: Invalid Message Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ACVE-2015-0240-RCE.html">SMB:EXPLOIT:CVE-2015-0240-RCE</a></b></th>
   <td width="500" valign="top">
    SMB: Samba CVE-2015-0240 ServerPasswordSet Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AFLASH-CHROME-BREAK.html">SMB:EXPLOIT:FLASH-CHROME-BREAK</a></b></th>
   <td width="500" valign="top">
    SMB: Adobe Flash Player Google Chrome Sandbox Breakout Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3AMS-2015-0096-CE.html">SMB:EXPLOIT:MS-2015-0096-CE</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows CVE-2015-0096 Remote Code Exectution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB-SHRE-NAME-OFLOW.html">SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW</a></b></th>
   <td width="500" valign="top">
    SMB: Share Name Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AEXPLOIT%3ASMB1-CHAINING-MC.html">SMB:EXPLOIT:SMB1-CHAINING-MC</a></b></th>
   <td width="500" valign="top">
    SMB: Samba SMB1 Packets Chaining Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AFILE%3AMS-INSECUR-LIB-LOAD.html">SMB:FILE:MS-INSECUR-LIB-LOAD</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows CVE-2016-0018 Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AFILE%3AMS-OBJ-PACKAGER.html">SMB:FILE:MS-OBJ-PACKAGER</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows Object Packager Insecure Executable Launching
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AFILE%3ASANDWORM-RCE.html">SMB:FILE:SANDWORM-RCE</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Office SandWorm Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AFRAG-MALICIOUS-PAYLOAD.html">SMB:FRAG-MALICIOUS-PAYLOAD</a></b></th>
   <td width="500" valign="top">
    SMB: Fragmented Packets with Malicious Payload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AMICROSOFT-LIB-LOADING-CE.html">SMB:MICROSOFT-LIB-LOADING-CE</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows Media Device Manager Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AMS-ELS-LIB-LOAD.html">SMB:MS-ELS-LIB-LOAD</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows Els.dll Insecure Library Loading
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AMS-RAP-STACK-OV.html">SMB:MS-RAP-STACK-OV</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Remote Administration Protocol Stack Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AMS-WINDOWS-FILE-RCE.html">SMB:MS-WINDOWS-FILE-RCE</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows File Handling Component Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AMSSQL-DECLARE-EXEC.html">SMB:MSSQL-DECLARE-EXEC</a></b></th>
   <td width="500" valign="top">
    SMB: MS-SQL Declare Exec Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AOF%3ASPOOL-SVC-OF.html">SMB:OF:SPOOL-SVC-OF</a></b></th>
   <td width="500" valign="top">
    SMB: Printer Spooler Service Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AOF%3AWKSSVC-CALL.html">SMB:OF:WKSSVC-CALL</a></b></th>
   <td width="500" valign="top">
    SMB: Invalid Workstation Service Call
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3AREPLY-ENCRYPTION-KEYS.html">SMB:REPLY-ENCRYPTION-KEYS</a></b></th>
   <td width="500" valign="top">
    SMB: Replay Overlapping Encryption Keys Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASAMBA%3AREAD-NTTRANS-EA-LIST.html">SMB:SAMBA:READ-NTTRANS-EA-LIST</a></b></th>
   <td width="500" valign="top">
    SMB: Samba smbd read_nttrans_ea_list Infinite Allocation Loop DOS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASAMBA%3AROOT-SYS.html">SMB:SAMBA:ROOT-SYS</a></b></th>
   <td width="500" valign="top">
    SMB: Samba Root File System Access Exploit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASETINFOPOLICY-HEAP.html">SMB:SAMBA:SETINFOPOLICY-HEAP</a></b></th>
   <td width="500" valign="top">
    SMB: Samba SetInformationPolicy AuditEventsInfo Heap Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASMBD-ANDX-INFINITE.html">SMB:SAMBA:SMBD-ANDX-INFINITE</a></b></th>
   <td width="500" valign="top">
    SMB: Samba smbd Packets Chaining AndX Offset Infinite Loop
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASAMBA%3ASYMLINK-INFODISC.html">SMB:SAMBA:SYMLINK-INFODISC</a></b></th>
   <td width="500" valign="top">
    SMB: Samba smbd Daemon Symlink Verification Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASEARCH-OF.html">SMB:SEARCH-OF</a></b></th>
   <td width="500" valign="top">
    SMB: SMB Search Context Remote Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMB%3ASERVER-SVC-OF.html">SMB:SERVER-SVC-OF</a></b></th>
   <td width="500" valign="top">
    SMB: Microsoft Windows Server Service Crafted RPC Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3ADOS%3AOPENSSL-TLSRECORD.html">SMTP:DOS:OPENSSL-TLSRECORD</a></b></th>
   <td width="500" valign="top">
    SMTP: OpenSSL TLS Record Tampering Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AAUTH-BRUTE-FORCE.html">SMTP:EXPLOIT:AUTH-BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    SMTP: SMTP Authentication Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AEXPLOIT%3AEXIM-DOVECOT-RCE.html">SMTP:EXPLOIT:EXIM-DOVECOT-RCE</a></b></th>
   <td width="500" valign="top">
    SMTP: Exim with Dovecot LDA sender_address Parameter Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AEXT%3ADOUBLE-EXTENSION.html">SMTP:EXT:DOUBLE-EXTENSION</a></b></th>
   <td width="500" valign="top">
    SMTP: Double Extension
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AIBM-LOTUS-INT-OVERFLOW.html">SMTP:IBM-LOTUS-INT-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    SMTP: IBM Lotus Domino BMP Parsing Integer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AINVALID-HELO.html">SMTP:INVALID-HELO</a></b></th>
   <td width="500" valign="top">
    SMTP: Invalid HELO Value
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AOUTLOOK%3AMIME-PARSE-UAF.html">SMTP:OUTLOOK:MIME-PARSE-UAF</a></b></th>
   <td width="500" valign="top">
    SMTP: Microsoft Outlook MIME Email Message Parsing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3ACOMMAND-LINE.html">SMTP:OVERFLOW:COMMAND-LINE</a></b></th>
   <td width="500" valign="top">
    SMTP: Command Line Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AEMAIL-USERNAME.html">SMTP:OVERFLOW:EMAIL-USERNAME</a></b></th>
   <td width="500" valign="top">
    SMTP: Email Username
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AOVERFLOW%3AMAILENABLE-BO.html">SMTP:OVERFLOW:MAILENABLE-BO</a></b></th>
   <td width="500" valign="top">
    SMTP: MailEnable SMTP Authentication Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3ASHELLSHOCK.html">SMTP:SHELLSHOCK</a></b></th>
   <td width="500" valign="top">
    SMTP:  Multiple Products Bash Shellshock Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3ASPAM-ADDRESS-EVASION.html">SMTP:SPAM-ADDRESS-EVASION</a></b></th>
   <td width="500" valign="top">
    SMTP: Address Evasion Spam
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AVULN%3AIBM-LOTUS-GIF-PARS-CE.html">SMTP:VULN:IBM-LOTUS-GIF-PARS-CE</a></b></th>
   <td width="500" valign="top">
    SMTP: IBM Domino GIF Processing Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AVULN%3AIMG-PARSE-BOF.html">SMTP:VULN:IMG-PARSE-BOF</a></b></th>
   <td width="500" valign="top">
    SMTP: IBM Domino Image File Parsing CVE-2015-5040 Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SMTP%3AVULN%3ANOVELL-GROUPWISE-XSS.html">SMTP:VULN:NOVELL-GROUPWISE-XSS</a></b></th>
   <td width="500" valign="top">
    SMTP: Novell GroupWise WebAccess Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SNMP%3AENCODING%3AGET-BULK-REQ.html">SNMP:ENCODING:GET-BULK-REQ</a></b></th>
   <td width="500" valign="top">
    SNMP: Microsoft Windows SNMP Service Memory Corruption
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SNMP%3AENCODING%3AINVALID-MIBROOT.html">SNMP:ENCODING:INVALID-MIBROOT</a></b></th>
   <td width="500" valign="top">
    SNMP: Encoding Invalid MIB Root
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SNMP%3AFREEBSD-GETBULKRQST-BO.html">SNMP:FREEBSD-GETBULKRQST-BO</a></b></th>
   <td width="500" valign="top">
    SNMP: FreeBSD bsnmpd GETBULK PDU Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SNMPTRAP%3AENCODING%3AINVALID-MROOT.html">SNMPTRAP:ENCODING:INVALID-MROOT</a></b></th>
   <td width="500" valign="top">
    SNMPTRAP: Invalid MIB Root
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SNMPTRAP%3AERROR%3AUNEXPECTED-REPLY.html">SNMPTRAP:ERROR:UNEXPECTED-REPLY</a></b></th>
   <td width="500" valign="top">
    SNMPTRAP: Unexpected Reply
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SPYWARE%3AAD%3APRICE-FOUNTAIN.html">SPYWARE:AD:PRICE-FOUNTAIN</a></b></th>
   <td width="500" valign="top">
    SPYWARE: Price Fountain adware
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUPERFISH.html">SPYWARE:AD:SUPERFISH</a></b></th>
   <td width="500" valign="top">
    SPYWARE: Superfish
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SPYWARE%3AAD%3ASUPERFISH-INSTALL.html">SPYWARE:AD:SUPERFISH-INSTALL</a></b></th>
   <td width="500" valign="top">
    SPYWARE: Superfish(1)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFF-RAT-BIN-BEACON.html">SPYWARE:RAT:FF-RAT-BIN-BEACON</a></b></th>
   <td width="500" valign="top">
    SPYWARE:  FF-RAT Malware Binary Beacon Communication
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SPYWARE%3ARAT%3AFF-RAT-SRV-RSP.html">SPYWARE:RAT:FF-RAT-SRV-RSP</a></b></th>
   <td width="500" valign="top">
    SPYWARE: FF-RAT Malware Server Response
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSH%3ABRUTE-LOGIN.html">SSH:BRUTE-LOGIN</a></b></th>
   <td width="500" valign="top">
    SSH: Brute Force Login Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSH%3APACKET-WRITE-WAIT-BO.html">SSH:PACKET-WRITE-WAIT-BO</a></b></th>
   <td width="500" valign="top">
    SSH: Resume Packet Write Wait Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSH%3ASYSAX-SERVER-DOS.html">SSH:SYSAX-SERVER-DOS</a></b></th>
   <td width="500" valign="top">
    SSH: Sysax Multi Server SSH Component Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-OSSIM-SOAP-CE.html">SSL:ALIEN-VAULT-OSSIM-SOAP-CE</a></b></th>
   <td width="500" valign="top">
    SSL:AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-SOAP-CE.html">SSL:ALIEN-VAULT-SOAP-CE</a></b></th>
   <td width="500" valign="top">
    SSL: AlienVault OSSIM av-centerd SOAP Requests Multiple Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AALIEN-VAULT-SOAP-REQUEST-CE.html">SSL:ALIEN-VAULT-SOAP-REQUEST-CE</a></b></th>
   <td width="500" valign="top">
    SSL: AlienVault OSSIM av-centerd Util.pm Request Arbitrary Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAPPLE-SSL-BYPASS.html">SSL:APPLE-SSL-BYPASS</a></b></th>
   <td width="500" valign="top">
    SSL: Apple Products SSL Security Feature Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAPPLE-SSL-BYPASS-PROXY.html">SSL:APPLE-SSL-BYPASS-PROXY</a></b></th>
   <td width="500" valign="top">
    SSL:Apple Products SSL Security Feature Bypass Via Proxy
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAUDIT%3ADHEEXP-512CPHR-LOGJAM.html">SSL:AUDIT:DHEEXP-512CPHR-LOGJAM</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Logjam 512-Bit DHE_EXPORT Cipher Suite
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAUDIT%3AKEY-RENEGOTIATION.html">SSL:AUDIT:KEY-RENEGOTIATION</a></b></th>
   <td width="500" valign="top">
    SSL: Key Renegotiation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAUDIT%3ARSA-EXPORT-CIPHER.html">SSL:AUDIT:RSA-EXPORT-CIPHER</a></b></th>
   <td width="500" valign="top">
    SSL: RSA Export Grade Cipher Suite
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AAUDIT%3ASSL-V3-TRAFFIC.html">SSL:AUDIT:SSL-V3-TRAFFIC</a></b></th>
   <td width="500" valign="top">
    SSL: SSLv3 Traffic Identified
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ACLNT-MSTR-KEY-OVERFLOW.html">SSL:CLNT-MSTR-KEY-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    SSL: Client Master Key Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ACOMPROMISEDCERT-DECTECTION.html">SSL:COMPROMISEDCERT-DECTECTION</a></b></th>
   <td width="500" valign="top">
    SSL: CompromisedCert Detection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AEGO-GOV-FRAUD-CERTIFICATE.html">SSL:EGO-GOV-FRAUD-CERTIFICATE</a></b></th>
   <td width="500" valign="top">
    SSL: EGO.GOV.TR Fraudulent Digital Certificate Content Spoofing Attack
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AGNU-DER-PARSING-DOS.html">SSL:GNU-DER-PARSING-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: Gnu DER Certificate Parsing Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AGNUTLS-EXTRACT-DER-DOS.html">SSL:GNUTLS-EXTRACT-DER-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: GnuTLS DER Certificate Format Decoding Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AGNUTLS-TLS-RECORD-MC.html">SSL:GNUTLS-TLS-RECORD-MC</a></b></th>
   <td width="500" valign="top">
    SSL: GnuTLS TLS Record Decoding Out-of-bounds Memory Access
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AHTTPS-UNIX-CMDS.html">SSL:HTTPS-UNIX-CMDS</a></b></th>
   <td width="500" valign="top">
    SSL: UNIX Post-Exploit Commands
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AINVALID%3ACIPHER-LEN.html">SSL:INVALID:CIPHER-LEN</a></b></th>
   <td width="500" valign="top">
    SSL: Invalid Change Cipher Spec Length
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AINVALID%3ANULL-CERT.html">SSL:INVALID:NULL-CERT</a></b></th>
   <td width="500" valign="top">
    SSL: Null Byte in Common Name
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AMCAFEE-EPOLICY-XML.html">SSL:MCAFEE-EPOLICY-XML</a></b></th>
   <td width="500" valign="top">
    SSL: McAfee ePolicy Orchestrator XML External Entity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AMOZILLA-NSS-RSA-SIG-FORGERY.html">SSL:MOZILLA-NSS-RSA-SIG-FORGERY</a></b></th>
   <td width="500" valign="top">
    SSL: Mozilla Network Security Services RSA Signature Forgery
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AMS-SCHANNEL-RCE.html">SSL:MS-SCHANNEL-RCE</a></b></th>
   <td width="500" valign="top">
    SSL: Microsoft Schannel Remote Code Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ANAGIOS-NRPE-CHKUSRS-CI.html">SSL:NAGIOS-NRPE-CHKUSRS-CI</a></b></th>
   <td width="500" valign="top">
    SSL: Nagios Remote Plugin Executor Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ANOVELL-GROUPWISE-DIR-TRA.html">SSL:NOVELL-GROUPWISE-DIR-TRA</a></b></th>
   <td width="500" valign="top">
    SSL: Novell GroupWise Service FileUploadServlet Directory Traversal
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ANOVELL-ZENWORKS-UL.html">SSL:NOVELL-ZENWORKS-UL</a></b></th>
   <td width="500" valign="top">
    SSL: Novell ZENworks Configuration Management File Upload
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DHE-DOS.html">SSL:OPENSSL-DHE-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DHE Client Key Exchange Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DO-SSL3-WRITE-DOS.html">SSL:OPENSSL-DO-SSL3-WRITE-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL do_ssl3_write Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-DOS.html">SSL:OPENSSL-DTLS-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Retransmission Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-MEMEXHTN_DOS.html">SSL:OPENSSL-DTLS-MEMEXHTN_DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS dtls1_buffer_record Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS-REC-DOS.html">SSL:OPENSSL-DTLS-REC-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Recursion Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS1-BOF.html">SSL:OPENSSL-DTLS1-BOF</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL dtls1_reassemble_fragment Invalid Fragment Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLS1-DOS.html">SSL:OPENSSL-DTLS1-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Handshake Memory Exhaustion Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-DTLSCLIENTHELLO-DOS.html">SSL:OPENSSL-DTLSCLIENTHELLO-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL dtls1 Client Hello Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-ECDH-DOS.html">SSL:OPENSSL-ECDH-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Anonymous ECDH Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-FLOOD.html">SSL:OPENSSL-FLOOD</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Client Connection Flood
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-MEMLEAK-DOS.html">SSL:OPENSSL-MEMLEAK-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid Session Ticket Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-MITM-SEC-BYPASS.html">SSL:OPENSSL-MITM-SEC-BYPASS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL ChangeCipherSpec MITM Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLS-DTLS-HEARTBEAT.html">SSL:OPENSSL-TLS-DTLS-HEARTBEAT</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL TLS DTLS Heartbeat Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLS-HEARTBEAT.html">SSL:OPENSSL-TLS-HEARTBEAT</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL TLS Heartbeat Information Disclosure
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOPENSSL-TLSRECORD-DOS.html">SSL:OPENSSL-TLSRECORD-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL TLS Record Tampering Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AELLIPTIC-POLY-DOS.html">SSL:OVERFLOW:ELLIPTIC-POLY-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Elliptic Polynomial Denial-Of-Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AMSCRSFT-SCHANNL-CE.html">SSL:OVERFLOW:MSCRSFT-SCHANNL-CE</a></b></th>
   <td width="500" valign="top">
    SSL: Microsoft Windows SChannel Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AOVERFLOW%3AOPENSSL-SRP-CSUITE.html">SSL:OVERFLOW:OPENSSL-SRP-CSUITE</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid SRP Parameter Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASERVER-HELLO-SESSION-ID-OF.html">SSL:SERVER-HELLO-SESSION-ID-OF</a></b></th>
   <td width="500" valign="top">
    SSL: Server Hello Session ID Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASSL-V3-BRUTE-FORCE.html">SSL:SSL-V3-BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    SSL: SSLv3 Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASSL-V3-TRAFFC.html">SSL:SSL-V3-TRAFFC</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL ssl23_get_client_hello Function Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASSLSCAN-ACTIVITY.html">SSL:SSLSCAN-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    SSL: SSLSCAN Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASYMANTEC-EP-POLICY-BYPASS.html">SSL:SYMANTEC-EP-POLICY-BYPASS</a></b></th>
   <td width="500" valign="top">
    SSL: Symantec Endpoint Protection Console Servlet Policy Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ASYMC-WEB-CMD-INJ.html">SSL:SYMC-WEB-CMD-INJ</a></b></th>
   <td width="500" valign="top">
    SSL: Symantec Web Gateway OS Command Injection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ATHC-SSL-DOS.html">SSL:THC-SSL-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: The Hacker&#39;s Choice SSL Denial of Service (DoS) Attack
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ATLS-BRUTE-FORCE.html">SSL:TLS-BRUTE-FORCE</a></b></th>
   <td width="500" valign="top">
    SSL: TLS Multiple Versions Brute Force Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3ATURKTRUST-FRAUD-CERTIFICATE.html">SSL:TURKTRUST-FRAUD-CERTIFICATE</a></b></th>
   <td width="500" valign="top">
    SSL: TURKTRUST Fraudulent Digital Certificate Content Spoofing Attack
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AUTN-USERFIRST-HARDWARE.html">SSL:UTN-USERFIRST-HARDWARE</a></b></th>
   <td width="500" valign="top">
    SSL: Untrusted Certificate (UTN-USERFirst-Hardware)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3AASN1-TYPE-CMP-DOS.html">SSL:VULN:ASN1-TYPE-CMP-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL ASN1_TYPE_cmp Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3ACVE-2015-0208-DOS.html">SSL:VULN:CVE-2015-0208-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Invalid PSS Parameters Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3ACVE-2015-0291-DOS.html">SSL:VULN:CVE-2015-0291-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL Signature Algorithm CVE-2015-0291 DOS
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3ADTLS-DOUBLE-FREE-DOS.html">SSL:VULN:DTLS-DOUBLE-FREE-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL DTLS Handshake Double Free Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3AF5-ICONTROL-SOAP-CE.html">SSL:VULN:F5-ICONTROL-SOAP-CE</a></b></th>
   <td width="500" valign="top">
    SSL: F5 Multiple Products iControl API hostname Remote Command Execution
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3AKS-SSL-CERTVALIDATION.html">SSL:VULN:KS-SSL-CERTVALIDATION</a></b></th>
   <td width="500" valign="top">
    SSL: Kaspersky Internet Security HTTPS Inspection Insecure Certificate Validation
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3AOPENSSL-PSS-PARAM.html">SSL:VULN:OPENSSL-PSS-PARAM</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL RSA PSS Absent Mask Generation Parameter Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3AOPENSSL-X509-DOS.html">SSL:VULN:OPENSSL-X509-DOS</a></b></th>
   <td width="500" valign="top">
    SSL: OpenSSL X509_cmp_time Denial-of-Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SSL%3AVULN%3ASYMANTEC-EP-PARAM-XSS.html">SSL:VULN:SYMANTEC-EP-PARAM-XSS</a></b></th>
   <td width="500" valign="top">
    SSL: Symantec Endpoint Protection URI Parameter Reflected Cross-Site Scripting
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SYSLOG%3APRI-PARSING-DOS.html">SYSLOG:PRI-PARSING-DOS</a></b></th>
   <td width="500" valign="top">
    SYSLOG: RSYSLOG PRI Parsing Remote Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="SYSLOG%3APRI-PARSING-TCP-DOS.html">SYSLOG:PRI-PARSING-TCP-DOS</a></b></th>
   <td width="500" valign="top">
    SYSLOG: RSYSLOG PRI Value Parsing Integer Overflow Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TCP%3AAUDIT%3AS2C-SIMUL-SYN.html">TCP:AUDIT:S2C-SIMUL-SYN</a></b></th>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Simultaneous SYN
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TCP%3AC2S%3AEXPLOIT%3ATCP-ZERO-PORT.html">TCP:C2S:EXPLOIT:TCP-ZERO-PORT</a></b></th>
   <td width="500" valign="top">
    TCP: Zero Port Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TCP%3AERROR%3AFLOW-MEMORY-EXCEEDED.html">TCP:ERROR:FLOW-MEMORY-EXCEEDED</a></b></th>
   <td width="500" valign="top">
    TCP: Error Too Many Packets Pending on Flow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TCP%3AERROR%3AREASS-MEMORY-OVERFLOW.html">TCP:ERROR:REASS-MEMORY-OVERFLOW</a></b></th>
   <td width="500" valign="top">
    TCP: Error Reassembler Packet Memory Exhausted
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TCP%3AS2C%3AAMBIG%3AOLAP-MISMATCH.html">TCP:S2C:AMBIG:OLAP-MISMATCH</a></b></th>
   <td width="500" valign="top">
    TCP: S2C Ambiguity Mismatching Overlapping Data
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TELNET%3ACMD%3ASCRIPT-TAGS-STREAM.html">TELNET:CMD:SCRIPT-TAGS-STREAM</a></b></th>
   <td width="500" valign="top">
    TELNET: HTML Script Tags Embedded in Telnet Stream
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TELNET%3ADOS%3ATLNTSVR-EXE-DOS.html">TELNET:DOS:TLNTSVR-EXE-DOS</a></b></th>
   <td width="500" valign="top">
    TELNET: Telnet service tlntsvr.exe Denial Of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TELNET%3AOVERFLOW%3ABSD-ENCRY-KEYID.html">TELNET:OVERFLOW:BSD-ENCRY-KEYID</a></b></th>
   <td width="500" valign="top">
    TELNET: Multiple Vendors BSD telnetd Encryption Key Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TFTP%3AFILENAME-TOO-LONG.html">TFTP:FILENAME-TOO-LONG</a></b></th>
   <td width="500" valign="top">
    TFTP: Filename Too Long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TFTP%3AOVERFLOW%3AMODE-TOO-LONG.html">TFTP:OVERFLOW:MODE-TOO-LONG</a></b></th>
   <td width="500" valign="top">
    TFTP: mode too long
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TFTP%3ATRANSPORT-BOF.html">TFTP:TRANSPORT-BOF</a></b></th>
   <td width="500" valign="top">
    TFTP: Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AAPACHE-DARKLEECH.html">TROJAN:APACHE-DARKLEECH</a></b></th>
   <td width="500" valign="top">
    TROJAN: Apache Web Servers Darkleech Malware Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2-DIV-UA.html">TROJAN:APT1-WEBC2-DIV-UA</a></b></th>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-DIV HTTP UserAgent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2-UGX-UA.html">TROJAN:APT1-WEBC2-UGX-UA</a></b></th>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-UGX UserAgent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AAPT1-WEBC2RAVE-TOSCTB-UA.html">TROJAN:APT1-WEBC2RAVE-TOSCTB-UA</a></b></th>
   <td width="500" valign="top">
    TROJAN: APT1 WEBC2-RAVE and Win32/Tosct.B UserAgent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AASPXSPY-CONNECT.html">TROJAN:ASPXSPY-CONNECT</a></b></th>
   <td width="500" valign="top">
    TROJAN: Possible ASPXSpy Connection
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR-BY-ZOMBIE.html">TROJAN:BACKDOOR-BY-ZOMBIE</a></b></th>
   <td width="500" valign="top">
    TROJAN: FuzzDB PHP Backdoor By Zombie
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ACHINACHOPPERCNC.html">TROJAN:BACKDOOR:CHINACHOPPERCNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: China Chopper Webshell Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ADRIDEX-FEODO.html">TROJAN:BACKDOOR:DRIDEX-FEODO</a></b></th>
   <td width="500" valign="top">
    HTTP: Backdoor Dridex Feodo Cidrex
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3AGHOSTNET-CNC.html">TROJAN:BACKDOOR:GHOSTNET-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Backdoor.GhostNet Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3APANDORA-DOS-CNC.html">TROJAN:BACKDOOR:PANDORA-DOS-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Pandora DDoS Toolkit Command and Control Communication 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ASCREENOS-PWD.html">TROJAN:BACKDOOR:SCREENOS-PWD</a></b></th>
   <td width="500" valign="top">
    TROJAN: Juniper ScreenOS Telnet Backdoor Password Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKDOOR%3ASCREENOS-SSH.html">TROJAN:BACKDOOR:SCREENOS-SSH</a></b></th>
   <td width="500" valign="top">
    TROJAN: Juniper ScreenOS SSH Response
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABACKOFF-ACTIVITY.html">TROJAN:BACKOFF-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    TROJAN: BackOff Point-of-Sale Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABLACKHOLE-KIT-URL-REQ.html">TROJAN:BLACKHOLE-KIT-URL-REQ</a></b></th>
   <td width="500" valign="top">
    TROJAN: Possible Blackhole Exploit Kit URL Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ABLEEDING-LIFE-EK.html">TROJAN:BLEEDING-LIFE-EK</a></b></th>
   <td width="500" valign="top">
    TROJAN: Bleeding Life Exploit Kit URL Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ACDORKED-BACKDOOR.html">TROJAN:CDORKED-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    TROJAN: Linux/Cdorked HTTP Backdoor Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ACDORKED-INFECTED-SERVER.html">TROJAN:CDORKED-INFECTED-SERVER</a></b></th>
   <td width="500" valign="top">
    TROJAN: Linux/Cdorked Infected Web Server
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ACFM-UFO.html">TROJAN:CFM-UFO</a></b></th>
   <td width="500" valign="top">
    TROJAN: UFO Backdoor Submission
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ACRYPTOWALL.html">TROJAN:CRYPTOWALL</a></b></th>
   <td width="500" valign="top">
    CRYPTOWALL
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ACVE-2013-3893-CNC.html">TROJAN:CVE-2013-3893-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Microsoft Internet Explorer CVE-2013-3893 Command and Control Communication
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ADEADBEEF-CNC.html">TROJAN:DEADBEEF-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: DEADBEEF Banking Trojan Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ADLINK-BACKDOOR.html">TROJAN:DLINK-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    TROJAN: D-Link Device Unauthorized Backdoor
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ADYRE.html">TROJAN:DYRE</a></b></th>
   <td width="500" valign="top">
    TROJAN: Dyre Remote Access Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AEBURY-DNS-EXFILTRATION.html">TROJAN:EBURY-DNS-EXFILTRATION</a></b></th>
   <td width="500" valign="top">
    TROJAN: Ebury Trojaned SSH Daemon DNS Data Exfiltration
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AEBURY-SSH-BACKDOOR.html">TROJAN:EBURY-SSH-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    TROJAN: Linux/Ebury SSH Backdoor Connection Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-CRYPTOLIB.html">TROJAN:EQUATIONGRP-CRYPTOLIB</a></b></th>
   <td width="500" valign="top">
    TROJAN: Equation Group Malware Crypto Library Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-EQUATIONLASR.html">TROJAN:EQUATIONGRP-EQUATIONLASR</a></b></th>
   <td width="500" valign="top">
    TROJAN: Equation Group EQUATIONLASER Malware Download
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AEQUATIONGRP-PRIVLIB.html">TROJAN:EQUATIONGRP-PRIVLIB</a></b></th>
   <td width="500" valign="top">
    TROJAN: Equation Group PrivLib Exploitation Library Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AHTRAN-UA.html">TROJAN:HTRAN-UA</a></b></th>
   <td width="500" valign="top">
    TROJAN: HTRAN HTTP UserAgent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AHTTP-ZEROACCESS-BOTNET.html">TROJAN:HTTP-ZEROACCESS-BOTNET</a></b></th>
   <td width="500" valign="top">
    Trojan: HTTP ZeroAccess BotNet P2P Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AITSOKNOPROBLEMBRO-CNC.html">TROJAN:ITSOKNOPROBLEMBRO-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: itsoknoproblembro Command and Control
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AKAZY-BEACON.html">TROJAN:KAZY-BEACON</a></b></th>
   <td width="500" valign="top">
    TROJAN: Kazy &quot;Phone Home&quot; Beacon
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AKRONOS-CNC-COMM.html">TROJAN:KRONOS-CNC-COMM</a></b></th>
   <td width="500" valign="top">
    TROJAN: KRONOS Banking Trojan Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AMALVERTISING-CO-CC.html">TROJAN:MALVERTISING-CO-CC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Malicious Advertising (*.co.cc)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AMISC%3AMWI-DOC-EXPKIT.html">TROJAN:MISC:MWI-DOC-EXPKIT</a></b></th>
   <td width="500" valign="top">
    TROJAN: Microsoft Word Intruder Exploit Kit
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ANGRBOT-ACTIVITY.html">TROJAN:NGRBOT-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    TROJAN: ngrBot IRC Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ANIGHT-DRAGON-CC.html">TROJAN:NIGHT-DRAGON-CC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Night Dragon Botnet Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AOLDBAIT-CHOSTICK-CHECKIN.html">TROJAN:OLDBAIT-CHOSTICK-CHECKIN</a></b></th>
   <td width="500" valign="top">
    TROJAN: OLDBAIT And Chopstick Checkin
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AOPHIARU-BOTNET.html">TROJAN:OPHIARU-BOTNET</a></b></th>
   <td width="500" valign="top">
    TROJAN: Ophia.ru C&amp;C Botnet Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3APITTY-TIGER-ACTIVITY.html">TROJAN:PITTY-TIGER-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    TROJAN: Pitty Tiger Trojan C&amp;C Activity Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3APUSHDO-POST-CNC.html">TROJAN:PUSHDO-POST-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: PushDo POST C&amp;C Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ARUN-FOREST-RUN.html">TROJAN:RUN-FOREST-RUN</a></b></th>
   <td width="500" valign="top">
    TROJAN: RunForestRun Infection Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASAKURA-BIN-LOAD-REQ.html">TROJAN:SAKURA-BIN-LOAD-REQ</a></b></th>
   <td width="500" valign="top">
    TROJAN: Sakura Exploit Kit Binary Load Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASIMPLE-PHP-BACKDOOR.html">TROJAN:SIMPLE-PHP-BACKDOOR</a></b></th>
   <td width="500" valign="top">
    TROJAN: FuzzDB Simple PHP Backdoor
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASOFACY-CNC.html">TROJAN:SOFACY-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Sofacy Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASOFACY-MALICIOUS-REQUEST.html">TROJAN:SOFACY-MALICIOUS-REQUEST</a></b></th>
   <td width="500" valign="top">
    TROJAN: Sofacy Malicious HTTP Request 
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASYNFUL-KNOCK-CNC.html">TROJAN:SYNFUL-KNOCK-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Cisco SYNful Knock Attack Malware C&amp;C Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ASYNOLOCKER-ACTIVITY.html">TROJAN:SYNOLOCKER-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    TROJAN: SynoLocker Ransomware Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ATAIDOOR-CNC.html">TROJAN:TAIDOOR-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: Taidoor Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ATESLACRYPT-CNC.html">TROJAN:TESLACRYPT-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: TeslaCrypt C&amp;C Communication Detected
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3ATHE-RAT.html">TROJAN:THE-RAT</a></b></th>
   <td width="500" valign="top">
    Trojan: The Rat Update Protocol Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AUNKNOWN-BACKDOOR-KNOCK.html">TROJAN:UNKNOWN-BACKDOOR-KNOCK</a></b></th>
   <td width="500" valign="top">
    TROJAN: Unidentified Backdoor Knock Request
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AW32-PARITE-CNC.html">TROJAN:W32-PARITE-CNC</a></b></th>
   <td width="500" valign="top">
    TROJAN: W32/Parite Command and Control Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AWIPER-BACKDOOR-ACT.html">TROJAN:WIPER-BACKDOOR-ACT</a></b></th>
   <td width="500" valign="top">
    TROJAN: Wiper Backdoor C&amp;C Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AZEROACCESS-BOTNET-P2P.html">TROJAN:ZEROACCESS-BOTNET-P2P</a></b></th>
   <td width="500" valign="top">
    Trojan: ZeroAccess BotNet P2P Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="TROJAN%3AZMEU-BOT-SCAN.html">TROJAN:ZMEU-BOT-SCAN</a></b></th>
   <td width="500" valign="top">
    TROJAN: ZmEu Bot Scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="UDP%3AZERO-DATA.html">UDP:ZERO-DATA</a></b></th>
   <td width="500" valign="top">
    UDP: Zero Data
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VIRUS%3ASMTP%3AASPROX.html">VIRUS:SMTP:ASPROX</a></b></th>
   <td width="500" valign="top">
    VIRUS: Possible ASProx Botnet Email Content
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VIRUS%3ASMTP%3ADOUBLE-EXTENSION.html">VIRUS:SMTP:DOUBLE-EXTENSION</a></b></th>
   <td width="500" valign="top">
    VIRUS: Double File Extension
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VNC%3ALIBVNCSERVER-DIVBYZERO-DOS.html">VNC:LIBVNCSERVER-DIVBYZERO-DOS</a></b></th>
   <td width="500" valign="top">
    VNC: LibVNCServer rfbProcessClientNormalMessage Divide by Zero Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VNC%3AOVERFLOW%3ASER-WRT-SCALNG-RCE.html">VNC:OVERFLOW:SER-WRT-SCALNG-RCE</a></b></th>
   <td width="500" valign="top">
    VNC: LibVNCServer Scaling Use After Free
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ADIGIUM-ASTERISK-SECBYPASS.html">VOIP:DIGIUM-ASTERISK-SECBYPASS</a></b></th>
   <td width="500" valign="top">
    VOIP: Digium Asterisk NULL Certificate Security Bypass
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3AASTERISK-SDP-MEDIA-DOS.html">VOIP:SIP:ASTERISK-SDP-MEDIA-DOS</a></b></th>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Invalid SDP Media Descriptions Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-ENUMIAX.html">VOIP:SIP:BT-RECON-ENUMIAX</a></b></th>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Enumiax
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SIPSCAN.html">VOIP:SIP:BT-RECON-SIPSCAN</a></b></th>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Sip-scan
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SMAP.html">VOIP:SIP:BT-RECON-SMAP</a></b></th>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Smap
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ABT-RECON-SVMAP.html">VOIP:SIP:BT-RECON-SVMAP</a></b></th>
   <td width="500" valign="top">
    VOIP: BackTrack VOIP Reconnaissance Tool Svmap
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ADIGIUM-ASTERISK-DOS.html">VOIP:SIP:DIGIUM-ASTERISK-DOS</a></b></th>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP Terminated Channel ACK with SDP Denial of Service
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AHDR-BOF.html">VOIP:SIP:SDP:HDR-BOF</a></b></th>
   <td width="500" valign="top">
    VOIP: Digium Asterisk SIP SDP Header Parsing Stack Buffer Overflow
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ASDP%3AMAL-HEADER-STC.html">VOIP:SIP:SDP:MAL-HEADER-STC</a></b></th>
   <td width="500" valign="top">
    SIP: Malformed SDP Header (STC)
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="VOIP%3ASIP%3ASIPSAK-OPTION-FLOOD.html">VOIP:SIP:SIPSAK-OPTION-FLOOD</a></b></th>
   <td width="500" valign="top">
    VOIP: SIPSAK SIP Option Flood
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ABLACKHOLE-ACTIVITY.html">WORM:BLACKHOLE-ACTIVITY</a></b></th>
   <td width="500" valign="top">
    WORM: Blackhole Malware Toolkit Activity
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ACRYPTO-RANSOM-CNC2.html">WORM:CRYPTO-RANSOM-CNC2</a></b></th>
   <td width="500" valign="top">
    WORM: Cryptolocker Ransomware Download Attempt 2
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ACRYPTO-RANSOM-CNC3.html">WORM:CRYPTO-RANSOM-CNC3</a></b></th>
   <td width="500" valign="top">
    WORM: Cryptolocker Ransomware Download Attempt 3
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ADISTTRACK-CNC.html">WORM:DISTTRACK-CNC</a></b></th>
   <td width="500" valign="top">
    WORM: DistTrack Command and Control Traffic
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ADISTTRACK-USER-AGENT.html">WORM:DISTTRACK-USER-AGENT</a></b></th>
   <td width="500" valign="top">
    WORM: DistTrack Malware Known Malicious User Agent
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3AMINIFLAME-CNC.html">WORM:MINIFLAME-CNC</a></b></th>
   <td width="500" valign="top">
    WORM: Miniflame Command and Conrol Communication
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ASLAMMER%3AINFECT-ATTEMPT.html">WORM:SLAMMER:INFECT-ATTEMPT</a></b></th>
   <td width="500" valign="top">
    WORM: SQLSlammer Worm Infection Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ASTATS-PHP-IFRAME.html">WORM:STATS-PHP-IFRAME</a></b></th>
   <td width="500" valign="top">
    WORM: HTTP IFRAME Containing Possible Malicious Stats.php
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="WORM%3ATHE-MOON-LINKSYS.html">WORM:THE-MOON-LINKSYS</a></b></th>
   <td width="500" valign="top">
    WORM: Linksys The Moon Infection Attempt
   </td>
  </tr>
  
  <tr>
   <th width="300" valign="top"><b><a href="X11%3AXFS-QUERYX.html">X11:XFS-QUERYX</a></b></th>
   <td width="500" valign="top">
    X11: X.Org X Font Server QueryXBitmaps and QueryXExtents Handlers Integer Overflow
   </td>
  </tr>
  
  
 </tbody>
</table>

      </div>
    </div>
    <!-- end tabular -->
    <!--start right column content  -->
    <!--begin footer -->
    <div class="seperator clear">
      <div class="footer" id="footer">
        <div class="fNav"> <a title="Site Map" href="http://www.juniper.net/us/en/site-map/">Site Map</a> </div>
        <div class="fNav"> <a title="RSS Feeds" href="http://rss.juniper.net">RSS Feeds</a> </div>
        <div class="fNav"> <a title="Careers" href="http://www.juniper.net/us/en/company/careers/">Careers</a> </div>
        <div class="fNav"> <a title="Accessibility" href="http://www.juniper.net/us/en/accessibility/">Accessibility</a> </div>
        <div class="fNav"> <a title="Feedback" href="http://www.juniper.net/cgi-bin/feedback">Feedback</a> </div>
        <div class="fNav"> <a title="Privacy Policy" href="http://www.juniper.net/us/en/privacy-policy/">Privacy Policy</a> </div>
        <div class="fNav"> <a title="Legal Notices" href="http://www.juniper.net/us/en/legal-notices/">Legal Notices</a> </div>
        <div class="fCopyRight">Copyright &copy; 1999-2010 Juniper Networks, Inc. All rights reserved.</div>
      </div>
    </div>
    <!--end footer -->
  </div>
  <div class="footerBottom clear"></div>
  <!--stopindex-->
  <div id="loggedTop">
    <div class="left"><a title="Help" href="https://www.juniper.net/customers/csc/help/index.jsp">Help</a></div>
    <div class="hSep left">|</div>
    <div class="left"><a title="My Account" href="https://www.juniper.net/customers/csc/administer/">My Account</a></div>
    <div class="hSep left">|</div>
    <div class="left"><a title="Log Out" href="https://www.juniper.net/customers/support/logout.jsp">Log Out</a></div>
  </div>
  <!--startindex-->
</div>
</body>
</html>
