<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><style type="text/css">				* {text-decoration: none; vertical-align: baseline;}				table {border-collapse: collapse; empty-cells: show;}				:link, :visited {text-decoration: underline;}				.style_0 { font-family: serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: medium; text-indent: 0em; text-align: left; letter-spacing: normal; word-spacing: normal; text-transform: none; white-space: normal; color: #000000; orphans: 2; widows: 2; page-break-inside: auto; line-height: normal;}				.style_5 { font-weight: bold; font-size: xx-large; text-align: center;}
				.style_13 { text-align: right;}
				.style_15 { background-color: #eaeaea;}
				.style_18 { vertical-align: top;}
				.style_20 { border-top: thin solid #808080; border-right: thin solid #808080; border-bottom: thin solid #808080; border-left: thin solid #808080;}
				.style_21 { vertical-align: middle;}
				.style_22 { font-family: sans-serif; font-weight: bold; font-size: 18pt; color: #004080;}
				.style_23 { font-family: sans-serif; font-size: 10pt;}
				.style_24 { font-family: sans-serif; font-weight: bold; font-size: 18pt;}
				.style_25 { background-color: #ffffff; vertical-align: top;}
				.style_32 { background-color: #4b6987;}
				.style_43 { font-family: sans-serif; font-weight: bold; font-size: x-large;}
				.style_45 { font-family: sans-serif; font-style: italic; font-weight: bold; font-size: x-large; padding-top: 2pt; padding-right: 2pt; padding-bottom: 2pt; padding-left: 2pt;}
				.style_52 { background-color: orange;}
				.style_54 { font-family: sans-serif; font-weight: bold; padding-top: 2pt; padding-right: 2pt; padding-bottom: 2pt; padding-left: 2pt;}
				.style_56 { font-family: sans-serif; padding-top: 2pt; padding-right: 2pt; padding-bottom: 2pt; padding-left: 2pt;}
				.style_58 { font-family: sans-serif; padding-top: 2pt; padding-right: 2pt; padding-bottom: 2pt; padding-left: 2pt;}
				.style_61 { font-family: sans-serif; font-size: x-small;}
		</style>	<!--[if gte IE 5.5000]>
		   <script language="JavaScript"> var ie55up = true </script>
		<![endif]-->
		<script language="JavaScript">
		   function fixPNG(myImage) // correctly handle PNG transparency in Win IE 5.5 or higher.
		      {
		      if (window.ie55up)
		         {
		         var imgID = (myImage.id) ? "id='" + myImage.id + "' " : ""
		         var imgClass = (myImage.className) ? "class='" + myImage.className + "' " : ""
		         var imgTitle = (myImage.title) ? "title='" + myImage.title + "' " : "title='" + myImage.alt + "' "
		         var imgStyle = "display:inline-block;" + myImage.style.cssText
		         var strNewHTML = "<span " + imgID + imgClass + imgTitle
		         strNewHTML += " style=\"" + "width:" + myImage.width + "px; height:" + myImage.height + "px;" + imgStyle + ";"
		         strNewHTML += "filter:progid:DXImageTransform.Microsoft.AlphaImageLoader"
		         strNewHTML += "(src=\'" + myImage.src + "\', sizingMethod='scale');\"></span>"
		         myImage.outerHTML = strNewHTML
		         }
		      }
		</script>
	</head>	<body class="style_0">
		<table class="style_15" style=" width: 100%;">
			<colgroup><col style=" width: 2.8in;">
			<col style=" width: 3.125in;">
			</colgroup><tbody>
				<tr class="style_18">
					<td>
						<div>
							<img  width="300" src="../logo.png">
						</div>
					</td>
					<td class="style_21">
						<div class="style_22" style="margin-left:-180px;">
					Penetration Test Report - Generated using Exploit Pack	
						</div>
						<div class="style_23" style="margin-left:-180px;">
							<br>
							<br>lun, 20 mar 2017 18:27:02 CET
							<br>
							<br>
						</div>
						<div class="style_24" style="margin-left:-180px;">
							This is an example subtitle
						</div>
					</td>
				</tr>
				<tr class="style_25" style=" height: 0.25in;">
					<td></td>
					<td class="style_21"></td>
				</tr>
			</tbody>
		</table>	<table style=" width: 100%;">
			<colgroup><col style=" width: 3.114in;">
			<col style=" width: 1.427in;">
			<col style=" width: 1.427in;">
			</colgroup><tbody>


<!-- HEADER -->
<tr class="style_32" style=" height: 0.1in;">
					<td class="style_32"></td>
					<td class="style_32"></td>
					<td class="style_32"></td>
				</tr>
				<tr style=" height: 0.1in;">
					<td colspan="3">
						<table style=" width: 100%;">
							<colgroup><col style=" width: 2.093in;">
							<col style=" width: 3.802in;">
							</colgroup><tbody>
								<tr>
									<td>
										<div class="style_43">
										Overview and Results
										</div>
									</td>
									<td>
										<div class="style_45">
												1. Executive Summary
										</div>
									</td>
								</tr>
							</tbody>
						</table>
					</td>
				</tr>

                                <tr>
                                        <td colspan="3">
                                                                                               This is an overview of the conducted pentest. 
						</div>
                                        </td>
                                </tr>
                                <tr style=" height: 0.25in;">
                                        <td></td>
                                        <td></td>
                                        <td></td>
                                </tr>


				<tr class="style_32" style=" height: 0.1in;">
					<td class="style_32" colspan="3"></td>
				</tr>
				<tr style=" height: 0.25in;">
					<td></td>
					<td></td>
					<td></td>
				</tr> <!-- FINDINGS -->
                <tr class="style_32" style=" height: 0.1in;">
                    <td class="style_32"></td>
                    <td class="style_32"></td>
                    <td class="style_32"></td>
                </tr>
                <tr style=" height: 0.1in;">
                    <td colspan="3">
                        <table style=" width: 100%;">
                            <colgroup><col style=" width: 2.093in;">
                                <col style=" width: 3.802in;">
                                    </colgroup><tbody>
                                        <tr>
                                            <td>
                                                <div class="style_43">
                                                    Vulnerability Details                                </div>
                                            </td>
                                            <td>
                                                <div class="style_45">
                                                    2. List of Findings
                                                </div>
                                            </td>
                                        </tr>
                                    </tbody>
                        </table>
                    </td>
                </tr>
                
                <tr>
                    <td colspan="3">
            <hr><!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ABBS-Audio-Media-Player-3.1-(.lst)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Exploit Title: ABBS Audio Media Player v3.1 (.lst) Buffer Overflow# Version:       v3.1# Date:          2013-05-04                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-4.31---Local-System
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            #Title: ActFax 4.31 Local Privilege Escalation Exploit#Author: Craig Freyman (@cd1zz)#Discovered: July 10, 2012#Vendor Notified: June 12, 2012#Description: http://www.pwnag3.com/2012/08/actfax-local-privilege-escalation.html                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Reader-PDF-LibTiff
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Title: Adobe PDF LibTiff Integer Overflow Code Execution.Product: Adobe Acrobat ReaderVersion: 8.3.0, 9.3.0CVE: 2010-0188                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  A-PDF-WAV-to-MP3-1.0.0
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # This exploit uses SEH to gain code execution, while EDB 14676 uses a direct# EIP overwrite which is operating system specific.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BACnet-OPC-Client-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # After communicating via several emails with the vendor, sharing details# about the vulnerability, as well as proof-of-concept code (I also offered# to send the exploit code for them to test themselves), it was clear that# they weren't very interested in fixing the vulnerability.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BlazeDVD-Pro-player-6.1-Stack-Based-Buffer
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # BlazeDVD Pro player 6.1  Local stack based buffer overflow# Author: PuN1sh3r# Email: luiguibiker@gmail.com# Date: Mon Jul 15 03:01:37 EDT 2013# Vendor link: http://www.blazevideo.com/download.htmm# Software Link: http://www.blazevideo.com/download.php?product=BlazeDVDPro# App Version: 6.1                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Address-Book-Server-1.6
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # By setting UserID in the cookie to a long string, we can overwrite EDX which # allows us to control execution flow when "call dword ptr [edx+28h]" is # executed. EDX is overwritten with an address pointing to a location on the # stack which in turn points to a NOP sled leading to the shellcode. This # address on the stack is brute forced, but doesn't take long since only the # 2nd byte is always different, so the address is always 0x01??B494.                                      </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  EChat-Server-v2.5
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    EChat Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user-supplied data.        Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.        Failed exploit attempts will result in a denial-of-service condition.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Acrobat-and-Reader
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Title:  Adobe Acrobat and Reader "pushstring" Memory CorruptionVersion:  Adobe Reader 9.3.2Analysis:  http://www.abysssec.com                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  AIX 3.x bugfiler Arbitrary File Creation Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  aix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            AIX 3.x bugfiler Arbitrary File Creation Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  AIX 4.24.3 netstat -Z Statistic Clearing Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  aix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            AIX 4.24.3 netstat -Z Statistic Clearing Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Apache-mod_cgi-Shellshock
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Shellshock apache mod_cgi remote exploitrhost: victim hostrport: victim port for TCP shell bindinglhost: attacker host for TCP shell reversinglport: attacker port for TCP shell reversingpages:  specific cgi vulnerable pages (separated by comma)proxy: host:port proxy                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Linux Kernel 2.6.x - ALSA snd-page-alloc Local Proc File Information Disclosure Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Linux Kernel 2.6.x - ALSA snd-page-alloc Local Proc File Information Disclosure Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Test
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            goes here                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BIG-Ant-Server-XPLT
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            BigAnt Server version 2.50 SEH Overwrite - 0day remote buffer overflow exploit suffer because it fails to perform adequate boundary-checks.Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.Failed exploit attempts will result in a denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BIG-Ant-Server-XPLT
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            BigAnt Server version 2.50 SEH Overwrite - 0day remote buffer overflow exploit suffer because it fails to perform adequate boundary-checks.Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.Failed exploit attempts will result in a denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-Word-2007-RTF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ABBS-Audio-Media-Player-3.1-(.lst)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Exploit Title: ABBS Audio Media Player v3.1 (.lst) Buffer Overflow# Version:       v3.1# Date:          2013-05-04                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-4.31---Local-System
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            #Title: ActFax 4.31 Local Privilege Escalation Exploit#Author: Craig Freyman (@cd1zz)#Discovered: July 10, 2012#Vendor Notified: June 12, 2012#Description: http://www.pwnag3.com/2012/08/actfax-local-privilege-escalation.html                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Reader-PDF-LibTiff
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Title: Adobe PDF LibTiff Integer Overflow Code Execution.Product: Adobe Acrobat ReaderVersion: 8.3.0, 9.3.0CVE: 2010-0188                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  A-PDF-WAV-to-MP3-1.0.0
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # This exploit uses SEH to gain code execution, while EDB 14676 uses a direct# EIP overwrite which is operating system specific.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BACnet-OPC-Client-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # After communicating via several emails with the vendor, sharing details# about the vulnerability, as well as proof-of-concept code (I also offered# to send the exploit code for them to test themselves), it was clear that# they weren't very interested in fixing the vulnerability.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BlazeDVD-Pro-player-6.1-Stack-Based-Buffer
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # BlazeDVD Pro player 6.1  Local stack based buffer overflow# Author: PuN1sh3r# Email: luiguibiker@gmail.com# Date: Mon Jul 15 03:01:37 EDT 2013# Vendor link: http://www.blazevideo.com/download.htmm# Software Link: http://www.blazevideo.com/download.php?product=BlazeDVDPro# App Version: 6.1                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Address-Book-Server-1.6
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # By setting UserID in the cookie to a long string, we can overwrite EDX which # allows us to control execution flow when "call dword ptr [edx+28h]" is # executed. EDX is overwritten with an address pointing to a location on the # stack which in turn points to a NOP sled leading to the shellcode. This # address on the stack is brute forced, but doesn't take long since only the # 2nd byte is always different, so the address is always 0x01??B494.                                      </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  EChat-Server-v2.5
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    EChat Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user-supplied data.        Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.        Failed exploit attempts will result in a denial-of-service condition.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Flash-Mp4
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1        allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors,         a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  PC-Man-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title: PCMan FTP Server v2.0.7 Buffer Overflow - MKD Command# Date : 12/02/2015 # Author: R-73eN# Software: PCMan FTP Server v2.0.7# Tested On Windows Xp SP3                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Adobe-Acrobat-and-Reader
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Title:  Adobe Acrobat and Reader "pushstring" Memory CorruptionVersion:  Adobe Reader 9.3.2Analysis:  http://www.abysssec.com                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Mac-OSX-Privilege-Escalation
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  unix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Apple Mac OS X contains a flaw in the Admin Framework that is triggered when checking XPC entitlements. This may allow a process to gain administrative privileges without properly authenticating.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  AIX 3.x bugfiler Arbitrary File Creation Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  aix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            AIX 3.x bugfiler Arbitrary File Creation Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  AIX 4.24.3 netstat -Z Statistic Clearing Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  aix
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            AIX 4.24.3 netstat -Z Statistic Clearing Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Apache-mod_cgi-Shellshock
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Shellshock apache mod_cgi remote exploitrhost: victim hostrport: victim port for TCP shell bindinglhost: attacker host for TCP shell reversinglport: attacker port for TCP shell reversingpages:  specific cgi vulnerable pages (separated by comma)proxy: host:port proxy                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Linux Kernel 2.6.x - ALSA snd-page-alloc Local Proc File Information Disclosure Vulnerability
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Linux Kernel 2.6.x - ALSA snd-page-alloc Local Proc File Information Disclosure Vulnerability                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  ActFax-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                                    This module exploits a stack-based buffer overflow in actfax ftp Server version 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command.        ToDo: Add Execute Shell        ToDo: Test Targets                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Test
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            goes here                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BIG-Ant-Server-XPLT
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            BigAnt Server version 2.50 SEH Overwrite - 0day remote buffer overflow exploit suffer because it fails to perform adequate boundary-checks.Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.Failed exploit attempts will result in a denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  BIG-Ant-Server-XPLT
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            BigAnt Server version 2.50 SEH Overwrite - 0day remote buffer overflow exploit suffer because it fails to perform adequate boundary-checks.Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.Failed exploit attempts will result in a denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Kolibri-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Kolibri v2.0 is vulnerable to a remote buffer overflow attack. By sending a malformed HEAD request, we are able to overwrite both the return address and an SEH handler. Null bytes terminate the request though,but we are able to partially overwrite with a pointer to a POP + POP + RET instruction inside kolibri.exe and gain control.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  KiTTY-Portable---Remote-Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little roomfor exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit small shellcode such as windows/shell/reverse_ord_tcp (118 bytes encoded) makes KiTTY crashing after the first connection. We control the SEH overflow, but as all DLLs are SafeSEH protected, using an address from KiTTY itself has a NULL which forces us to jump backward with no extra space. We are jailed in a tight environment with little room to work with.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office---RTF-(-ASLR---DEP-Bypass-)
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-RTF-ASLR-DEP-Bypass
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-Word-2007-RTF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Exploit-Tutorial-1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that will help you learn the basics of exploit development, the focus on this oneis a stack-buffer type of overflow and the platform used is GNU/Linux.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  VFU-4.10-1.1---Buffer-Overflow
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  linux
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # VFU v4.10-1.1 is prone to a stack-based buffer overflow# vulnerability because the application fails to perform adequate# boundary-checks on user-supplied input.## An attacker can exploit this issue to execute arbitrary code in the# context of the application. Failed exploit attempts will result in a# denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-Chat-Server-3.1
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy Chat Server contains an overflow condition that is triggered as user-supplied input is not properly validated when handling input passed via the 'username' parameter to the /chat.ghp script. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Easy-FTP-Server-1.7.11
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Easy FTP Server USER Command Remote Buffer Overflow Exploitwhen parsing the command 'USR', which leads to a stack based overflow. Easy FTP Server allow remote anonymous login by defaultexploiting these issues could allow an attacker to compromise the application, access or modify data.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example                                        </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Word-Record
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the contextof the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions.This update adds support for Office 2003 SP0.                                     </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-Word-2007-RTF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-Word-2007-RTF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Microsoft-Office-Word-2007-RTF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Title : Microsoft Office Word 2007 - RTF Object Confusion ASLR and DEP bypass# Date : 28/02/2015 # Author : R-73eN# Software : Microsoft Office Word 2007 # Tested : Windows 7 Starter                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  XM-Easy-Personal-FTP-Server
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            # Because this address is relative and has a static base in this environment, I was able# to use the heap chunk address as the pointer to write at the vtable. Then a function is# called at offset 0xb0 or 0x98 and we can reliably return into a ROP payload and execute# arbitrary code.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-RepeatRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to repeat previously saved RF data for debugging purposes.In order to save or repeat RF signals an SDR is needed.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-RepeatRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to repeat previously saved RF data for debugging purposes.In order to save or repeat RF signals an SDR is needed.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-RepeatRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to repeat previously saved RF data for debugging purposes.In order to save or repeat RF signals an SDR is needed.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  EChat-Server-v2.5
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            EChat Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user-supplied data.Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application.Failed exploit attempts will result in a denial-of-service condition.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  clientside
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  WinAxePlus-8.7
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  remote
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  windows
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            WinAxe server is prone to a remote buffer overflow that could allow a malicious suer to execute arbitrary codein the context of the affected application. The exploit has been tested in Windows platforms and currently there is no fix or patch available for this program.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-SaveRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to save RF signals for debugging purpouses or to be replayedusing a repeater, by default the destination is /tmp/saveRF                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-RepeatRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to repeat previously saved RF data for debugging purposes.In order to save or repeat RF signals an SDR is needed.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  SDR-SaveRF
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            This is a module that could be used to save RF signals for debugging purpouses or to be replayedusing a repeater, by default the destination is /tmp/saveRF                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name:  Skeleton-Exploit
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type:  local
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Platform:  custom
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                            Exploit information example for the Skeleton module. This is an example structure you can use to create your modulesuse this module as a template or create your own.                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name: vulnerability name..
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type: Custom
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Risk level: Low
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                           The webserver is prone to stack buffer overflow by abusing of CVE: 123                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY --> <!-- VULNERABILITY-->
                                                <tr class="style_52">
                                <td class="style_52">
                                    <div class="style_54">
                                        Name: vulnerability name..
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_56" style="margin-left:-210px;">
                                        Module type: Custom
                                    </div>
                                </td>
                                <td class="style_52">
                                    <div class="style_58">
                                        Risk level: Low
                                    </div>
                                </td>
                            </tr>
                            <tr>
                                <td colspan="3">
                                                                           The ftp server is prone to a heap based overflow by abusing of CVE: 123                                    </div>
                                </td>
                            </tr>
                            <tr style=" height: 0.25in;">
                                <td></td>
                                <td></td>
                                <td></td>
                            </tr>
                            
                        </div>
           <!-- END VULNERABILITY -->                   </td>
                </tr>
                <tr style=" height: 0.25in;">
                    <td></td>
                    <td></td>
                    <td></td>
                </tr>
                
                <tr class="style_32" style=" height: 0.1in;">
                    <td class="style_32" colspan="3"></td>
                </tr>
                <tr style=" height: 0.25in;">
                    <td></td>
                    <td></td>
                    <td></td>
                </tr>
            <!-- FOOTER -->
                <tr class="style_32" style=" height: 0.1in;">
                    <td class="style_32"></td>
                    <td class="style_32"></td>
                    <td class="style_32"></td>
                </tr>
                <tr style=" height: 0.1in;">
                    <td colspan="3">
                        <table style=" width: 100%;">
                            <colgroup><col style=" width: 2.093in;">
                                <col style=" width: 3.802in;">
                                    </colgroup><tbody>
                                        <tr>
                                            <td>
                                                <div class="style_43">
                                                    Summary and Conclusions
                                                </div>
                                            </td>
                                            <td>
                                                <div class="style_45">
                                                3. Recommendations
                                                </div>
                                            </td>
                                        </tr>
                                    </tbody>
                        </table>
                    </td>
                </tr>
                
                <tr>
                    <td colspan="3">
                                                    Recommendations to be shown on the report
                        </div>
                    </td>
                </tr>
                <tr style=" height: 0.25in;">
                    <td></td>
                    <td></td>
                    <td></td>
                </tr>
                
                <tr class="style_32" style=" height: 0.1in;">
                    <td class="style_32" colspan="3"></td>
                </tr>
                <tr style=" height: 0.25in;">
                    <td></td>
                    <td></td>
                    <td></td>
                </tr>
			</tbody>
		</table>
        <center style="font-family: verdana;">Please consider making a donation to Exploit Pack Project.</center>
</body></html>