- d2sec_hpphoto : HP Photo Creative ContentMan.dll ActiveX Control Buffer Overflow Vulnerability (Exploit Windows)
- d2sec_wmitools : Microsoft WMI Administrative Tools ActiveX Remote Code Execution Vulnerability (Exploit Windows)
- d2sec_proftpd_bdoor : Exploits a backdoor added to the ProFTPD archive (Exploit Linux)
- d2sec_proftpd_modsql : Exploits ProFTPD 'mod_sql' Username SQL Injection Vulnerability (Exploit Linux)
- d2sec_gwimap : Novell GroupWise Internet Agent IMAP Stack Buffer Overflow Vulnerability (Exploit Windows)
- d2sec_httpstk : Novell eDirectory httpstk Stack Buffer Overflow Vulnerability (Exploit Windows)
- d2sec_moodle_rexec: Moodle remote command execution Vulnerability (Web exploit)
- d2sec_moodle_tex: Moodle 'texed.php' remote command execution Vulnerability (Web Exploit)
- d2sec_hpdp : HP OpenView Data Protector Recovery Manager Stack Buffer Overflow Vulnerability (Exploit Windows)
- d2sec_javaws3 : Sun Java Web Start BasicServiceImpl Remote Code Execution Vulnerability (Exploit Windows)
- d2sec_cve_2010_3856 : GNU C library dynamic linker LD_AUDIT DSO load Vulnreability (Exploit Linux)
- d2sec_drosera : Check if a Windows node is already compromised with Drosera driver (Post-Intrusion)
- d2sec_tispro : Trend Micro Internet Security Pro 2010 UfProxyBrowserCtrl ActiveX Remote Code Execution Vulnerability (Exploit Windows)
- d2sec_lotuscal : IBM Lotus Domino iCalendar Email Address Stack Buffer Overflow Vulnerability (Exploit Windows)
- d2sec_accton : Backdoor password in Accton-based switches Vulnerability (Exploit)
- d2sec_zcm : Novell ZENworks Configuration Management FileUploadServlet Remote Code Execution Vulnerability (Web Exploit)
- d2sec_iprint4 : Novell iPrint Client ienipp.ocx ActiveX Stack Overflow (Exploit Windows)
- d2sec_dnsdiscovery : Passive information gathering about DNS (Recon)
- d2sec_axis : Apache Axis2 Remote File Access Vulnerability (Web Exploit)
- d2sec_hpnnm3 : HP Network Node Manager 7.53 Snmp.exe Oid Variable Stack Overflow Vulnerability (Exploit Windows)
- d2sec_hpnnm4 : HP Network Node Manager 7.53 OvWebHelp.exe Topic Variable Stack Overflow Vulnerability (Exploit Windows)
- d2sec_tsmcad : IBM Tivoli Storage Manager CAD Service Stack Overflow Vulnerability (Exploit Windows)
- d2sec_tsmcad2 : IBM Tivoli Storage Manager AGENT Service Stack Overflow Vulnerability (Exploit Windows)
- d2sec_hplr : HP Mercury LoadRunner Agent Remote Code Execution Vulnerability (Exploit Windows)
- d2sec_caxosoft : CA XOsoft Control Service entry_point.aspx Remote Stack Overflow Vulnerability (Exploit Windows)
d2sec_homebase : EMC HomeBase SSL Service Arbitrary File Upload Remote Code Execution Vulnerability (Exploit Windows)
- d2sec_symiao : Symantec Intel Alert Originator Service Command Execution Vulnerabilty (Exploit Windows)
- d2sec_lotus_hash : Old vulnerability to access to the password hashes of Lotus users (Exploit Windows/Linux)
- d2sec_emcaxw : EMC ApplicationXtender Workflow Server Arbitrary File Upload Vulnerability (Exploit Windows)
- d2sec_inotes2 : IBM Lotus Domino Web Access ActiveX Stack Overflow Vulnerability (Exploit Windows)
- d2sec_jretk : Java Runtime Environment Deployment Toolkit Command Execution Vulnerability (Exploit Windows)
- d2sec_hppm3 : [0day] HP Power Manager Management Command Injection Vulnerability (Exploit Windows)
- d2sec_ibmegath : IBM Access Support ActiveX Stack Overflow Vulnerability (Exploit Windows)
- d2sec_vmware : VmWare Server Directory Traversal Vulnerability (Web Exploit)
- d2sec_npum : Novell Privileged User Manager Remote DLL Injection Vulnerability (Exploit Windows)
- d2sec_hppm : HP Power Manager Login Stack Overflow Vulnerability (Exploit Windows)
- d2sec_hppm2 : HP Power Manager Export Logs Stack Overflow Vulnerability (Exploit Windows)
- d2sec_metakern : add 'pipe.c' Local Privilege Escalation Vulnerability (Exploit Linux)
- d2sec_hpnnm2 : HP Network Node Manager Command Injection Vulnerability (Exploit Windows)
- d2sec_altirisrc : Symantec Altiris Products ActiveX Stack Overflow Vulnerability(Exploit Windows)
- d2sec_iprint3 : Novell iPrint Client ienipp.ocx ActiveX Stack Overflow (Exploit Windows)