#Windows,local,
-
AIDA64 Business 5.99.4900 - SEH Buffer Overflow (EggHunter)
-
AIDA64 Extreme 5.99.4900 - 'Logging' SEH Buffer Overflow
-
FlexHEX 2.71 - SEH Buffer Overflow (Unicode)
-
AllPlayer 7.4 - SEH Buffer Overflow (Unicode)
-
River Past Cam Do 3.7.6 - 'Activation Code' Local Buffer Overflow
-
Download Accelerator Plus (DAP) 10.0.6.0 - SEH Buffer Overflow
-
FTPShell Server 6.83 - 'Account name to ban' Local Buffer
-
FTPShell Server 6.83 - 'Virtual Path Mapping' Local Buffer
-
Microsoft Internet Explorer 11 - XML External Entity Injection
-
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
-
LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
-
Ross Video DashBoard 8.5.1 - Insecure Permissions
-
Lavavo CD Ripper 4.20 - 'License Activation Name' Buffer Overflow (SEH)
-
NSClient++ 0.5.2.35 - Privilege Escalation
-
Admin Express 1.2.5.485 - 'Folder Path' Local SEH Alphanumeric Encoded Buffer Overflow
-
JetAudio jetCast Server 2.0 - 'Log Directory' Local SEH Alphanumeric Encoded Buffer Overflow
-
Iperius Backup 6.1.0 - Privilege Escalation
-
Microsoft Windows 10 (17763.379) - Install DLL
-
Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow
-
Microsoft Internet Explorer 11 - Sandbox Escape