Juniper Networks

Index

APP

APP:ENCRYPTED-TRAFFIC-2
APP:ENCRYPTED-TRAFFIC-1
APP:ENCRYPTED-TRAFFIC-3
APP:HP-SAN-IQ-CMD-INJ
APP:GIOP-COMM
APP:WINCOM-AUTH-BO
APP:NAV-ENT-WEB-OF
APP:JONDO-PROXY
APP:LINUX-SCTP-FWD-TSN-BO
APP:YOUSENDIT
APP:RH-ICOMMERCE-ANYFILE
APP:HP-DATA-PROTECTOR-MMD-BOF
APP:IPSO-FILE-VIEW
APP:HP-STORAGEWORKS-OPC22-BO
APP:WINMAIL-PATH-DIS
APP:COLDFUSIONMX-ACC
APP:VMS-8.3.5-CMD-EXE
APP:MOZY-ACTY
APP:GOOG-PICASA
APP:PEER2MAIL
APP:HP-LOADRUNNER-RCE
APP:WINPRICE
APP:OPENVIEW-STORAGE-BO
APP:CHKPOINT-FW-INFO-DISC
APP:EMC-NSRINDEXD-BO
APP:VCENTER-JMX-RCE
APP:FEDORA-DIR-SER-INFO-LEAK
APP:CHROME-ENGINE-4-DOS
APP:EMC-DATA-PROTECTION-DOS
APP:VCENTER-JMX-RCE2
APP:FREEPBX-ARI-DOS
APP:SOLARWINDS-LOG-EVENT-MANAGR
APP:CLAMAV-UPX-OF-HTTP
APP:SITEMINDER-AUTH-REDIR
APP:RETRO-CL-BO
APP:VINZANT-ARCHTCTR-AUTHWKNESS
APP:HP-INSIGHT-MANAGER-RCE
APP:ZEND-SERVER-JAVA-RCE
APP:HP-LEFTHAND-HYDRA-PING-OF
APP:HP-LEFTHAND-HYDRA-DIAG-OF
APP:SVN-DATE-SERVE
APP:HP-MEDIA-SIGN-IN-NAME-DOS
APP:MCAFEE-FIREWALL-RCE
APP:APPLE-MACOSX-ODP-RCE
APP:WEBSENSE-FAV-BYPASS
APP:FLEXERA-FLEXNET-BO
APP:PEERCAST-FS
APP:LANDESK-OF
APP:MERCURY-BOF
APP:HP-DATA-PROTECTOR-OP-DOS
APP:EMBARCADERO-CONNECT-OF
APP:FLASH-RTMP-RESP
APP:HP-LOADRUNNER-SSL
APP:HP-DATA-PRTCTR-EXEC-BAR-CE
APP:HP-DATA-PROTECTOR-DOS
APP:EMC-ALPHASTOR-LIB-BOF
APP:QUEST-BIG-BRO-FD
APP:WEBSENSE-TRITON-RCE
APP:BORLAND-STARTEAM
APP:APPLE-CUPS-PNG-FILTER-OF
APP:HP-DATA-PRTCTR-EXEC_SETUP
APP:RDP-BRUTE-FORCE
APP:MERCURY-PH-BO
APP:BAKBON-NETVAULT-HEAP-OF
APP:YOUSENDIT-ENCRYPTED
APP:SQUID-BUMP-DOS
APP:DISKPULSE-GETSERVERINFO-OF
APP:CDE-DTSPCD-OF
APP:IA-WEBMAIL-OF
APP:VIDEOSPIRIT-OF
APP:CHKPOINT-FW-WEBUI-REDIRECT
APP:INTERSYSTEMS-CACHE-OF
APP:POSTFIX-GREYLISTD-OF
APP:SPREECOMMERCE-RCE
APP:BOMBER-BO
APP:NOW-SMS-OF
APP:HP-DATA-PRTCTR-OPCODE
APP:APPLE-SIRI
APP:MAL-AFP-DSI-REQ
APP:FCKEDITOR-RCE-UPLOAD
APP:KINDLE-BROWSER-NPAPI-RCE
APP:TRACKERCAM-OF
APP:HP-DATA-PRTCTR-RDS-DOS
APP:VMWARE-SPRING-CLASSLOADER
APP:EMC-NETWORKER-NSRD-BO
APP:HP-DATA-PROTECTOR-REQ-SQL
APP:NOW-SMS-OF-MSF
APP:EMC-DOS
APP:MCAFEE-ORCH-BO
APP:HP-MGMT-UAM-BO
APP:CUPS-GIF-BO
APP:VERITAS-ADMIN-BO
APP:AFP-LEN-OF
APP:MCAFEE-ORCHESTRATOR-FS
APP:HP-PROCURVE-FUPLOAD-SSL
APP:DIGIUM-IAX2-DOS
APP:MIT-KERBEROS-5-POLICY-DOS
APP:HP-INTELLIGENT-INFO-DISC
APP:QNX-QCONN-CMDEXEC
APP:AVAYA-CCRWEBCLIENT-RCE
APP:HP-DATA-PROTECTOR-SQL
APP:EMC-NETWORKER-NSRINDEXD-OF
APP:VMWARE-VCENTER-CHARGEBACK
APP:2WIRE-DSL-VULN
APP:HP-MGMT-FILE-UPLOAD
APP:BIGANT-USV-BOF
APP:HP-DATA-PRTCTR-EXEC_CMD-BO
APP:HP-LASERJET-EWS-XSS
APP:CAIN-ABEL-CISCO-IOS-BOF
APP:BLUECOAT-AAA-OF
APP:JBOSS-JMX-AUTH-BYPASS
APP:DIGIUM-IAX2-POKE-DOS
APP:DIGIUM-ASTERISK-SKINNY-DOS
APP:HP-STORAGEWORKS-CIFS
APP:HP-OPENVIEW-DTPRTCTR-BO
APP:DIGIUM-ASTERISK-MGR-CMDEXEC
APP:SIEMENS-SIMATIC-WINCC-BO
APP:REALNETWORKS-HELIXSRV-DOS
APP:LENOVO-RCE-UPLOAD
APP:CUPS-IPP-RCE
APP:NOVELL-EDIR-LEN-DOS
APP:INDUSOFT-WEB-STUDIO-BO
APP:INDUSOFT-WEB-STUDIO-RCE
APP:FREEPBX-RECORDING-RCE
APP:HTTPD-MODLOG-COOKIE
APP:HP-MGMT-DBMAN-OF
APP:HP-PROCRVE-SNAC-FILE-UPLD
APP:HP-PROCURVE-BYPASS
APP:ASTIUM-PBX-DOS
APP:DISTCC-EXEC
APP:FREEPBX-FILE-UPLOAD
APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC
APP:DIGIUM-ASTERISK-OF
APP:BLUECOAT-BCAAA-BOF
APP:ACCELLION-FILE-TRANSFER
APP:SUN-JAVA-SYSCAL-TZID-DOS
APP:DELL-OPENMANAGE-BO
APP:MCAFEE-DLP-MGR-INFO-DISCL
APP:HP-SM-RCE
APP:GTS-WAP-PASSDISC
APP:HP-NNM-HLEN-BOF
APP:HP-OPNVW-STORAGE-DATA-BO
APP:REPLISTOR-DOS
APP:HP-OPNVIEWSTORAGE-BOF
APP:HP-DATA-PRTCTR-DBSERVER-BO
APP:WIRESHARK-LWRES
APP:TROLLTECH-QT-BMP-OF
APP:HP-SITESCOPE-CMD-INJ
APP:SUN-JAVA-SERVER-ADMIN-DOS
APP:YOUNGZSOFT-CONNECT
APP:SAFENET-VPN-OF
APP:HP-MGMT-BIMS-FILE-UPLOAD
APP:SVN-DATE-OF
APP:NTOP-WEB-FS1
APP:GE-PROFICY-RT-DIRTRAVERSAL
APP:HP-ICTDOWNLOADSERVLET
APP:EMC-AUTOSTART-BOF
APP:GIMP-SCRIPTFU-OF
APP:HP-FAULTDOWNLOADSERVLET
APP:HP-LOGIN-BOF
APP:HP-ACMSERVLETDOWNLOAD
APP:HP-DATA-PRTCTR-OP215-263
APP:HP-MGMT-IMG-OF
APP:WEBSENSE-PROXY-BYPASS
APP:HP-DATA-PRTCTR-EXEC_CMD-RCE
APP:VMWARE-OVF-FMTSTR
APP:HP-DATA-PRTCTR-OP267-BO
APP:HP-DATA-PRTCTR-OP-27
APP:HP-DATA-PRTCTR-OP260-BO
APP:HP-PROCURVE-FILE-UPLOAD
APP:EMC-REPLICATION-MGR-CMD-EXE
APP:MCAFEE-WR-JBOSS-RCE
APP:HP-SYS-IPRANGE-OF
APP:HP-DIAGNOSTICS-OF
APP:HPLOADRUNNER-XDR-BO
APP:VLC-RTSP-PLUGIN-BO
APP:EMC-PACKT-INJ-COM-EXEC
APP:WINMEDIASRV-RCE
APP:MEDIAWIKI-RCE
APP:MS-SNABASE-EXE-DOS
APP:EMC-ALPHASTORE-CMDEXEC
APP:BRG-MAIL-US-PASS
APP:HP-AIO-BO
APP:HP-DATA-PRTCTR-OP1091-305
APP:SBS-TRAINING-OF2
APP:SCOHELP-OF1
APP:EMC-DATAPROTECTION-NULL-DOS
APP:VMAUTH-FS
APP:MCAFEE-EPOLICY-XSS
APP:WEBSENS-TRITON-RCE
APP:FLEXNET-SERVER-BO
APP:REDIS-GETNUM-IO
APP:EMC-NSRINDEXD-DOS
APP:QEMU-VNC-SETPIXEL-PTR-DEREF
APP:ASTERISK-REG-SIPREQ-DOS
APP:MCAFEE-EPOLICY-XML
APP:EMC-CMCNE-INFO-DISC
APP:HP-LEFTHAND-VIRT-SAN
APP:HP-SYS-RCE
APP:MCAFEE-DIR-TRAVERSAL
APP:SOPHOS-WA-PWD-CHG
APP:NAV-ENT-WEB-OF-2
APP:SOPHOS-WEBAPP-CMDEXEC-SSL
APP:MCAFEE-AM-INPUT
APP:XEROX-DS-SQ-INJ
APP:MCAFEE-AM-INPUT-SSL
APP:MCAFEE-AM-INFO-DISC-SSL
APP:MSDOTNET-CVE-2014-1806
APP:EMC-ALPHA-BO
APP:OSSIM-COMMAND-EXEC
APP:OBSERVICED-OF
APP:PERSISTENT-COMMAND-EXEC
APP:ASUS-WRT-INFOSVR-COMND-EXEC
APP:CLAMAV-UPX-OF-SMTP
APP:HP-PM-EXP-DATA-LOGS
APP:HP-LOADRUNNER-BO
APP:EMC-APLHASTORE-FMTSTR
APP:HP-MGMT-SOM-SDFILE
APP:HP-STORAGEWORKS-BO
APP:HP-MGMT-TFTP-DATA-OF
APP:HP-DATA-PRTCTR-OP235-BO
APP:ISCSI-TARGET-OF
APP:SQUID-SNMPHANDLEUDP-CE
APP:ASTERISK-PJSIP-MODULE-DOS
APP:HP-REPORTIMGSERVLET
APP:LANDESK-THINKMGT-DIRTRVRSAL
APP:ALTN-WORLDCLIENT-MEM
APP:ADOBE-CF-DIR-TRAV
APP:WSDAPI-OF
APP:HP-DATA-PROTECTOR-SIGN-DOS
APP:HP-DATA-PRTCTR-MULTI-OP-OF
APP:SUNPROXY
APP:MS-SNBASE
APP:HP-VIRTUAL-SAN
APP:FLEXERA-FLXNETPUB-IMGRD-BO
APP:IPMI-CIPHER-ZERO
APP:ABB-NETSCANHOST-OF
APP:ADOBE-COLDFUSION-WEBSOCKET
APP:HP-DBARCHIVE-GIOP-BO
APP:SECURECRT-CONF
APP:HP-LEFTHAND-HYDRA-INFO-DISC
APP:ZLIB-COMPRES-LIB-DOS
APP:SOPHOS-WEBAPP-CMDEXEC
APP:HP-INODEMNGCHECKER-EXE-BOF
APP:NETSUPPORT-MANAGER-BO
APP:HP-STORAGEWORKS-BOF
APP:HP-DATA-PROTECTOR-DTBCLS-OF
APP:NOVELL-SECURITY-BYPASS
APP:LINUX-SCTP-FWD-TSN-BO2
APP:CPANEL-RESETPASS
APP:LIBGTOP-FMT-STR
APP:BIGANT-SERVER-FILE-UPLOAD
APP:HP-LIPS-HSSPD
APP:OBSERVICED-BOF
APP:BIGANT-SCH-CMD-BOF
APP:INDUSOFT-WEBSTUDIO-RCE
APP:SUPERSCOUT-USERDB
APP:ISCSI-TARGET-FMT-STR
APP:INVISIONIX-RS-RFI
APP:NOVELL-NET-FTP-DEL-CMD-OF
APP:ROCKET-SERVERGRAPH-CE
APP:MCAFEE-EPOLICY-SQLI
APP:VMWARE-ISAPI-DOS
APP:HP-MGMT-CENTER-BO
APP:HP-SYS-MANGMNT-CMD-INJ
APP:FREEPBX-CALLMENUM
APP:HP-DATA-PROC-NEW-FOLDER
APP:HP-DATA-PRTCTR-OP45-46
APP:HP-DATA-PRTCTR-OPCODES
APP:HP-DATA-PRTCTR-OP28-11
APP:EIQ-LM-OF
APP:LANDESK-QIP-HEAL
APP:ICECAST-BOF
APP:HP-PWR-MGR-DIR-TRAV
APP:EMC-NETWORKER-BYPASS
APP:DIGIUM-ASTERISK-COOKIE-OF
APP:EMC-ALPHASTOR-BOF
APP:ADOBE-FLASH-RTMP-RCE
APP:HP-DATA-PROTECTOR-GET-SQL
APP:HP-DATA-PRTCTR-OP42-DIR-TRV
APP:HP-DATA-PRTCTR-OP211-264
APP:HP-DATA-PRTCTR-OP1092-BO
APP:UNIVERSAL-CMDB-AXIS2-RCE
APP:HP-PROTECTOR-DIR-TRAV
APP:HP-DATA-PRTCTR-OP234-BO
APP:HP-DATA-PROTECTOR-FIN-SQL
APP:HP-DATA-PRTCTR-OP259-BO
APP:RIM-BLACKBERRY-DOS
APP:FLASH-SRV-DOS
APP:HP-MGMT-TFTP-MODE-RCE
APP:HP-INTELLI-MGMT-TFTP-BO
APP:HP-DATA-PRTCTR-OP227-BO
APP:SOPHOS-WA-PWD-CHG-SSL
APP:HP-PROCRVE-MANAGER-CE
APP:MS-SMS-DOS
APP:SQUID-HTCP-DOS
APP:POSTFIX-IPV6-RELAYING-ISSUE
APP:AGENTX-RECEIVE-INT-OF
APP:AGENTX-RECEIVE-OF
APP:SENTINEL-LM-OF
APP:BAKBON-NETVAULT-INT-OF
APP:HORDE-WEBMAIL-CSRF
APP:POSTFIX-GLD-FS
APP:SVN-PROTOCOL-STRING-OF
APP:VMWARE-ESX-SOAP-DOS
APP:HP-PROCURVE-FILE-UPLD-SSL
APP:SOLARWINDS-VMACC-CE
APP:CONEXANT-LOGIN
APP:HPIM-SOM-EUACCNT-BYPASS
APP:SQUID-HTTPVER-DOS

APP:AI

APP:AI:NO-MATCH
APP:AI:PARTIAL-MATCH
APP:AI:PROTOCOL-MISMATCH

APP:AMANDA

APP:AMANDA:AMANDA-ROOT-OF1
APP:AMANDA:AMANDA-ROOT-OF2

APP:APT-WWW-PROXY

APP:APT-WWW-PROXY:AWPLOG-DOS

APP:ARKEIA

APP:ARKEIA:AGENT-CONFIG
APP:ARKEIA:DEFAULT-PASSWORD
APP:ARKEIA:TYPE-77-OF
APP:ARKEIA:DEFAULT-ADMIN-PW
APP:ARKEIA:AGENT-ACCESS

APP:BORLAND

APP:BORLAND:VISIBROKER

APP:CA

APP:CA:ETRUST-ID-KEY-DOS
APP:CA:IGATEWAY-CNT-LEN-OF
APP:CA:RPC-MSG-OF-2
APP:CA:LOG-SEC-BOF
APP:CA:CONSOLE-LOGIN-OVERFLOW
APP:CA:LIC-PUTOLF-OF
APP:CA:RPC-MSG-OF
APP:CA:LIC-GETCONFIG-OF-CLT
APP:CA:LIC-GCR-OF-CLT
APP:CA:LIC-GETCONFIG-OF-SVR
APP:CA:LIC-GCR-OF-SVR
APP:CA:IGATEWAY-DEBUG
APP:CA:IGATEWAY-BOF
APP:CA:RPC-MSG-BO
APP:CA:DBASVR-POINT
APP:CA:LIC-GETCONFIG-OF2
APP:CA:PRODUCT-DISC-BOF
APP:CA:ALERT-SRV-OF
APP:CA:MESSAGE-QUEUE-HEAP
APP:CA:DBA-SVR-POINT
APP:CA:LIC-COMMAND-OF

APP:CA:ARCSRV

APP:CA:ARCSRV:CALOGGERD-BO
APP:CA:ARCSRV:RPC-MEMRCORRUPT
APP:CA:ARCSRV:RPC-MEMCORRUPT
APP:CA:ARCSRV:BACKUP-CMD-EXEC
APP:CA:ARCSRV:METHD-EXPOSURE
APP:CA:ARCSRV:TAPE-ENGNE-DOS
APP:CA:ARCSRV:DIRTRAV
APP:CA:ARCSRV:GWT-INFO-DISC
APP:CA:ARCSRV:BCK-MSG
APP:CA:ARCSRV:HSM-OF
APP:CA:ARCSRV:XDR-PARSING-BO
APP:CA:ARCSRV:TCP-BOF
APP:CA:ARCSRV:LGSERVER-HSHAKE
APP:CA:ARCSRV:RPC-TAPE-ENG
APP:CA:ARCSRV:PORTMAPPER
APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS
APP:CA:ARCSRV:BCKUP-AUTHSRV-CE
APP:CA:ARCSRV:MAILSLOT-OF
APP:CA:ARCSRV:UA-OF
APP:CA:ARCSRV:BRIGHTSTOR-BKP-BO
APP:CA:ARCSRV:FILE-UPLOAD
APP:CA:ARCSRV:METHOD-EXPOSURE
APP:CA:ARCSRV:CAMEDIASRV
APP:CA:ARCSRV:BME-OP-117
APP:CA:ARCSRV:D2D-AXIS2-RCE
APP:CA:ARCSRV:CAMEDIASRV-UDP
APP:CA:ARCSRV:DISCSRV-DOS
APP:CA:ARCSRV:MEDIASERVER-BO
APP:CA:ARCSRV:TAPE-OP-207
APP:CA:ARCSRV:SQLOF
APP:CA:ARCSRV:PORTMAPPER-1
APP:CA:ARCSRV:SQLOF-1
APP:CA:ARCSRV:PORTMAPPER-2
APP:CA:ARCSRV:MEDIASERVER-BO1
APP:CA:ARCSRV:LGSERVER-CMDNAME
APP:CA:ARCSRV:PORTMAPPER-4
APP:CA:ARCSRV:UNICENTERAGENT-2
APP:CA:ARCSRV:PORTMAPPER-3
APP:CA:ARCSRV:TAPE-ENGINE-DOS
APP:CA:ARCSRV:MOBILE
APP:CA:ARCSRV:LG-SERVER-RCE
APP:CA:ARCSRV:PORTMAPPER-6
APP:CA:ARCSRV:LGSERVER-AUTH-USR
APP:CA:ARCSRV:BCK-MESSAGE
APP:CA:ARCSRV:LGSERVER-AUTH
APP:CA:ARCSRV:UNICENTERAGENT-OF
APP:CA:ARCSRV:LOGGERD-DOS

APP:CISCO

APP:CISCO:ACS-FS
APP:CISCO:CNS-NETWORK-DOS
APP:CISCO:LAN-MGMT-SOL-RCE
APP:CISCO:ACS-OF
APP:CISCO:VIDEO-SURVEILANCE-LFI
APP:CISCO:VIDEO-SURVEILANCE-XSS
APP:CISCO:SECUREACS-AUTH-BYPASS
APP:CISCO:FW-SCCP-DOS
APP:CISCO:ASA-IKE-BO
APP:CISCO:SECURITY-AGENT-CE
APP:CISCO:REGISTRAR-AUTH-BYPASS
APP:CISCO:NX-OS-PRIV-ESC

APP:CITRIX

APP:CITRIX:META-IMA-AUTH
APP:CITRIX:STEAM-OF
APP:CITRIX:AG-CMD-INJ
APP:CITRIX:PROVISIONING-OPCODE
APP:CITRIX:PROVISIONINGSERV-UF
APP:CITRIX:XENAPP-XML-RCE
APP:CITRIX:NSEPACOM-BOF
APP:CITRIX:STREAMPROCESS-BOF
APP:CITRIX:AGENT-OF-1
APP:CITRIX:AGENT-OF-2
APP:CITRIX:IMA-BO
APP:CITRIX:AGENT-OF

APP:CUPS

APP:CUPS:CUPS-JOBS-EXP
APP:CUPS:HPGL-PC-OF
APP:CUPS:COMMAND-CHAR
APP:CUPS:APPLE-DOSELECT
APP:CUPS:CGI-ADMIN-OF
APP:CUPS:TEXTTOPS-OF
APP:CUPS:GIF-READ-LZW-OF
APP:CUPS:JBIG2-SYMBOLDICTIONARY

APP:CVS

APP:CVS:CVS-AUTHOR-OF
APP:CVS:DIR-OVERFLOW
APP:CVS:ENTRY-TAG-OF
APP:CVS:EXCESSIVE-MAX-DOTDOT
APP:CVS:ARGUMENTX-CMD
APP:CVS:CVS-FILE-INFO

APP:ESIGNAL

APP:ESIGNAL:OVERFLOW-EXPLOIT

APP:ETHEREAL

APP:ETHEREAL:TCP-80-DOS
APP:ETHEREAL:DISTCC-OF
APP:ETHEREAL:NETFLOW-OF
APP:ETHEREAL:EIGRP-OF-STC
APP:ETHEREAL:IGAP-ACCT-OF
APP:ETHEREAL:EIGRP-OF-CLT
APP:ETHEREAL:3G-A11-B0F
APP:ETHEREAL:TCPDUMP-ISAKMP-DOS

APP:EXCHANGE

APP:EXCHANGE:EMSMDB32-DOS

APP:GAME

APP:GAME:MEDAL-OF-HONOR-BO
APP:GAME:COD4-CONNECT
APP:GAME:CS-CONNECT
APP:GAME:CS-S-CONNECT
APP:GAME:XBOX-HTTP-ACCESS
APP:GAME:XBOX-LIVE-MARKETPLACE
APP:GAME:XBOX-KERBEROS-LOGIN
APP:GAME:XBOX-DASHBOARD
APP:GAME:STARDOCK-IMPULSE
APP:GAME:STEAM-LOGIN
APP:GAME:UT3-QUERY
APP:GAME:UT2004-QUERY
APP:GAME:EAD-LOGIN
APP:GAME:STEAM-URI
APP:GAME:WII-ACTIVITY
APP:GAME:WOW-REALM
APP:GAME:DIRECTPLAY-NULL-PTR
APP:GAME:DIRECTPLAY-PLAYER-DOS
APP:GAME:SOURCE-QUERY
APP:GAME:WORDS-WITH-FRIENDS
APP:GAME:DIABLO3
APP:GAME:UNREAL-GAMESPY-QP-BOF
APP:GAME:PS-UPDATE
APP:GAME:PS-APPLICATIONS
APP:GAME:PS-COMMUNITY
APP:GAME:XBOX-LIVE
APP:GAME:PS-CHAT
APP:GAME:WOW-LOGIN
APP:GAME:DIRECTPLAY-DOS

APP:GAUNTLET

APP:GAUNTLET:GAUNTLET-URL-OF

APP:HPOV

APP:HPOV:OVALARMSRV-OF
APP:HPOV:NNM-BO
APP:HPOV:REQ_SEV_CHANGE-DOS
APP:HPOV:OVALARMSRV-FMT-STR
APP:HPOV:OVALARMSRV-DOS
APP:HPOV:HPOPSMGT-OF
APP:HPOV:OMNIBACK-II-ACE
APP:HPOV:CMD-INJ
APP:HPOV:NNM-OVLAUNCH-BO
APP:HPOV:OMNIINET-OF
APP:HPOV:NNM-HTTP-REQUEST
APP:HPOV:NNM-RADIA-NOTIFY
APP:HPOV:PERFORMANCE-INSIGHT
APP:HPOV:OALARM-LANG-OF
APP:HPOV:INT-MGMT-CTR-INFO-DIS
APP:HPOV:NNM-HTTP-OF
APP:HPOV:OVDLL-OVBUILDPATH-BOF
APP:HPOV:INT-MGMT-CTR-DIRTRAV
APP:HPOV:NNMRPTCONG-TEMPL
APP:HPOV:NNMI-BO
APP:HPOV:NNM-RPING-BOF
APP:HPOV:NNM-GETNNMDATA-OF
APP:HPOV:OID-OF
APP:HPOV:NNM-OVW-MSG
APP:HPOV:NNM-OVALARM-IO
APP:HPOV:SNMPVIEWER-APP-OF
APP:HPOV:OVTRACE
APP:HPOV:NODE-MGR-NNMRPTCONFIG
APP:HPOV:NNM-DISPLAYWIDTH-BOF
APP:HPOV:HP-DPBC-OF
APP:HPOV:NNM-SNMP-BOF
APP:HPOV:NNMRPTCONFIG-EXE-BOF
APP:HPOV:OPE-AGENT-CODA-BO-1
APP:HPOV:SDPM-HEAP-BOF
APP:HPOV:NNMRPTCONFIG-EXE-OF
APP:HPOV:NNM-XSS
APP:HPOV:OVALARMSRV-DOS2
APP:HPOV:DEMANDPOLL-FMT-STR
APP:HPOV:NNM-EVTCOR-CMD-INJ
APP:HPOV:NNM-EXECVP-NC-OF
APP:HPOV:OVJAVALOCALE-OF
APP:HPOV:OPE-AGENT-CODA-BO
APP:HPOV:NNMRPTCONFIG-EXE-RCE
APP:HPOV:NNM-SNMP-HOST
APP:HPOV:OMNILNET-NULL
APP:HPOV:UNAUTH-FILE-UPLOAD
APP:HPOV:NNM-LOGIN-BOF
APP:HPOV:OVWEBSNMPSRV-OF

APP:IBM

APP:IBM:DOMINO-BYPASS
APP:IBM:TIVOLI-SRV-OP1335
APP:IBM:TIVOLI-FASTBACK-SER-RCE
APP:IBM:FXCLI-EXECBO
APP:IBM:INFORMIX-LIBRPC-DLL-BOF
APP:IBM:TIVOLI-FASTBACK-OF
APP:IBM:TEALEAF-PCA-CMDEXEC
APP:IBM:WCM-XPATH-INJ
APP:IBM:OPCODE-1330-CMD-INJ
APP:IBM:INFORMIX-EXPLAIN-BOF
APP:IBM:FORMVIEWER-XFDL-BOF
APP:IBM:TIVOLI-PRO-MGR-BO
APP:IBM:SOLIDDB-DOS
APP:IBM:SYS-DIRECTOR-DLL-LOAD
APP:IBM:COGNOS-BACKDOOR
APP:IBM:DB2-KUDDB2-DOS
APP:IBM:TIVOLI-OF
APP:IBM:DIRECTOR-AGENT-DOS
APP:IBM:COGNOS-TM1-BOF
APP:IBM:TIVOLI-FASTBACK-RCE
APP:IBM:TIVOLI-FASTBACK-BOF
APP:IBM:IDS-LIBRPC
APP:IBM:TIVOLI-OP4115-BO
APP:IBM:DOMINO-BYPASS-1
APP:IBM:TSM-RCE
APP:IBM:TSM-CVE-2015-0119-BO
APP:IBM:INFORMIX-CMD-OF
APP:IBM:TME-AGENT
APP:IBM:DIRECTOR-CIM-DOS
APP:IBM:LDAP-MODIFYREQUEST-BO
APP:IBM:TSM-NODE-NAME-OF
APP:IBM:SYMPHONY-SOAP-BOF
APP:IBM:TSM-SIGN-ON-OF
APP:IBM:TIVOLI-FASTBACK-OP-BO
APP:IBM:TIV-OP1329-BOF
APP:IBM:TIV-OP1331-CMDINJ
APP:IBM:TIV-SCHEDULEPARAM-XSS
APP:IBM:TIVOLI-MAN-HEAP
APP:IBM:TIV-OP1339-CMDINJ
APP:IBM:WS-APPSRV-RCE
APP:IBM:BLADECENTER-INFO
APP:IBM:WS-APPSRV-RCE2
APP:IBM:TIVOLI-SRV-OP1301
APP:IBM:BLADECENTER-AMM-CSRF
APP:IBM:INFORMIX-EXPLAIN
APP:IBM:LOTUS-NOTES-HTML-OF
APP:IBM:TSM-CLIENT-OF
APP:IBM:INFORMIX-DBINFO-BOF
APP:IBM:TIV-DS-IBMSLAPD-EXE
APP:IBM:TIV-SM-CAD
APP:IBM:BLADECENTER-DOS
APP:IBM:SET-ENVIRONMENT-BOF

APP:INGRES

APP:INGRES:DB-COMM-SVR-OF
APP:INGRES:DB-COMP-BO

APP:IPSWITCH

APP:IPSWITCH:LOGGING-SVC-DOS

APP:KERBEROS

APP:KERBEROS:KRB5-MITM-DES
APP:KERBEROS:EXCESSIVE-ERRORS
APP:KERBEROS:XREALM-DOS
APP:KERBEROS:DOS-TCP
APP:KERBEROS:KRB5-DOS
APP:KERBEROS:INV-TOKEN-DOS-TCP
APP:KERBEROS:DBLFREE-2
APP:KERBEROS:SPNEGO-5-DOS
APP:KERBEROS:XREALM-KDC-DOS
APP:KERBEROS:DBLFREE
APP:KERBEROS:DOS
APP:KERBEROS:MIT-KRB5-KDC-DOS
APP:KERBEROS:KDC-NULL-DOS
APP:KERBEROS:PREP-REPROCESS-REQ
APP:KERBEROS:BLDPRINCIPAL-VA2
APP:KERBEROS:CHKSUM-PRIV-ESC
APP:KERBEROS:MIT-KRB5-DOS
APP:KERBEROS:MS-WIN-2000-DOMAIN
APP:KERBEROS:KDC-AUTH-DOS
APP:KERBEROS:READ-MSG-DOS
APP:KERBEROS:GSS-ZERO-TOKEN
APP:KERBEROS:KBR-DOS-TCP-2
APP:KERBEROS:MULTI-REALM-DOS
APP:KERBEROS:BLDPRINCIPAL-VA1
APP:KERBEROS:INV-TOKEN-DOS-UDP
APP:KERBEROS:MS-KERB-ASN-BIT
APP:KERBEROS:KPASSWD-UDP-DOS

APP:MDAEMON

APP:MDAEMON:MDCONFIG-VER
APP:MDAEMON:FORM2RAW-OF
APP:MDAEMON:SEND-OF
APP:MDAEMON:LIST-OF

APP:MISC

APP:MISC:AVID-MEDIA-OF
APP:MISC:SPLASHTOP-DOS
APP:MISC:OP5-APP-TIMESTAMP
APP:MISC:BIGANT-IM-ANTSERVER-OF
APP:MISC:DIASOFT-EXECCMD-CE
APP:MISC:SIMENS-GIGAST-DOS
APP:MISC:ACTFAX-BO
APP:MISC:PIGEON-DOS
APP:MISC:TVMOBILI-DOS
APP:MISC:ACROREAD-XML-URL
APP:MISC:DOMINO-MGR-FS
APP:MISC:GITORIOUS-RCE
APP:MISC:AVIRA-ANTIVIR
APP:MISC:OP5-APP-PASSWORD
APP:MISC:NETVAULT-SD-DOS
APP:MISC:WSHARK-ENTTEC-BO
APP:MISC:HEARTBEAT-OF
APP:MISC:EMC-AS-INSECUREOPS
APP:MISC:FREEBSD-MBUF-DOS
APP:MISC:ARCSERVE-GETBACKUP
APP:MISC:SAMSUNG-SWIFTKEY-RCE
APP:MISC:DSM-SLICEUPLOAD-RCE
APP:MISC:GOOGLE-EARTH
APP:MISC:APACHE-SVN-IO
APP:MISC:PXESERVICE-UDP
APP:MISC:UNISYS-BIS
APP:MISC:GUESTBOOK-CGI
APP:MISC:AVAYA-WINPDM
APP:MISC:SPREE-SEARCH-CMD-EXE
APP:MISC:DOGFOOD-RCE
APP:MISC:ACTFAX-BO-HTTP
APP:MISC:UPLUS-FTP-WEB-OF
APP:MISC:ZABBIX-AGENT-RCE
APP:MISC:ESIGNAL-WINSIG-BO
APP:MISC:SIELCO-SISTEMI-WINLOG
APP:MISC:REDHAT-JBOSS-JNDI
APP:MISC:HP-OA-HEALTH-BO
APP:MISC:HP-SITESCOPE-LOADFILE
APP:MISC:YEALINK-IP-PHONE-CSRF
APP:MISC:NAGIOS-NRPE-CE
APP:MISC:LCDPROC-BOF
APP:MISC:YEALINK-IP-PHONE-BO
APP:MISC:ENTERASYS-NETSIGHT-BOF
APP:MISC:D-LINK-SEC-BYPASS
APP:MISC:ZABBIX-SQLI
APP:MISC:HP-SITESCOPE-SOAP
APP:MISC:F-SECURE-WEB-BO
APP:MISC:EMC-AUTOSTART-NULLBYTE
APP:MISC:HP-SITESCOPE-DIR-TRAV
APP:MISC:SYNERGY-CLPBRD-OF
APP:MISC:HP-AUTOKEYLIB-RCE
APP:MISC:SAP-NETWEAVER-SOAP-RCE
APP:MISC:KADMIN-4-OF
APP:MISC:HP-SSC-APIMONITORIMPL
APP:MISC:SOPHOS-WEBAPP-RCE
APP:MISC:SAMSUNG-ALLSHARE-DOS
APP:MISC:HP-RADIO-CLI-MEMCP
APP:MISC:HP-DATA-PROTECTOR-TRAV
APP:MISC:ADOBE-RTMP-UAF
APP:MISC:HP-INODE-BO
APP:MISC:ALIENVALT-BAKUP-COM-RE
APP:MISC:HP-SITESCOPE-CE
APP:MISC:SAMSUNG-TV-SERVER-DOS
APP:MISC:NOVELL-NETWARE-FUNC-OF
APP:MISC:SCHNEIDER-ELE-MGR-BO
APP:MISC:MS-WIN-SMB-SER-DOS-1
APP:MISC:MS-WIN-SMB-RENAME-DOS
APP:MISC:HP-MERCURY-BOF
APP:MISC:FARONICS-DFE-RCE
APP:MISC:MUL-DOS-UDP
APP:MISC:MUL-DOS
APP:MISC:HP-AUTOKEYLIB-CE
APP:MISC:APACHE-QPID-SESS-DOS
APP:MISC:MUL-PRDCTS-CMD-EXEC
APP:MISC:MULTI-VENDORS-OF
APP:MISC:MUL-VENDORS-ID
APP:MISC:MULTI-VENDORS-BOF
APP:MISC:APACHE-QPID-SEQSET-DOS
APP:MISC:MULTIPLE-RCE
APP:MISC:FUJITSU-WEB-DIR-TRAV
APP:MISC:MUL-MEMCP-2
APP:MISC:MUL-MEMCP-1
APP:MISC:SCHNEIDER-SQLI-RCE
APP:MISC:NEC-EXPCLU-BO
APP:MISC:OBJ-OBJDB-BO
APP:MISC:SAM-ACTQ-MULTI
APP:MISC:EZHOMETECH-EZSERVER-BO
APP:MISC:SAMSUNG-TV-BD-DOS
APP:MISC:AUTONOMY-CONN-TYPE-13
APP:MISC:ARCSERVE-BKUP
APP:MISC:ZEND-XMLRPC-INFO-DISC
APP:MISC:ZABBIC-NODE-PROCESS-CE
APP:MISC:QUEST-NETVAULT-DOS
APP:MISC:CNTWR-FV-GIF-LZWMCS-MC
APP:MISC:NAGIOS-NRPE-CHKUSRS-CI
APP:MISC:BIGANT-DDNF-BO
APP:MISC:ENDIAN-PRX-CMDEXEC2
APP:MISC:CLEARSCADA-OPF-PARSE
APP:MISC:MS-ACTIVE-DIR-RCE
APP:MISC:TANNE-FMT-STR
APP:MISC:CITADEL-BO
APP:MISC:APPLE-CUPS-PNG-OF-1
APP:MISC:GANGLIA-METE-BOF
APP:MISC:CVE-2014-0549-RTMP-MC
APP:MISC:SAMSUNG-NET-I-WARE-DOS
APP:MISC:LCDPROC-TEST-FUNC-FS
APP:MISC:ACTMQ-SHUTDN-CMD
APP:MISC:MCAFEE-EPOL-ORCH
APP:MISC:ZIMBRA-COLLAB-INFODISC
APP:MISC:AV-USM-DESER-RCE
APP:MISC:SCHNEIDER-INDUSOFT-RCE
APP:MISC:JRE-PACK200-OF
APP:MISC:HICP-HOSTNAME
APP:MISC:SCHNEIDER-ACCUTECH-B0

APP:NOVELL

APP:NOVELL:GROUPWISE-WA
APP:NOVELL:REPORTER-AGENT-BOF
APP:NOVELL:GRPWISE-HOST-RCE
APP:NOVELL:HTTP-NOVELL-REDIRECT
APP:NOVELL:ZENWORKS-MSG-DLL-OF
APP:NOVELL:EDIR-HEADER-DOS
APP:NOVELL:IMONITOR-OF
APP:NOVELL:EDIRECTORY-DOS
APP:NOVELL:EDIRECTORY-ME-OF
APP:NOVELL:ZENWORKS-CONTENT-LEN
APP:NOVELL:REPORTER-AGENT
APP:NOVELL:IMANAGER-FILE-UPLOAD
APP:NOVELL:ZENWORKS-FHIPCND-EXE
APP:NOVELL:ZENWORKS-MGT-UPLOAD
APP:NOVELL:GROUPWISE-CLIENT-BO
APP:NOVELL:GWMGR-INFODISC
APP:NOVELL:IMANAGER-ARB-UPLOAD
APP:NOVELL:DIS-PRINT-SRV
APP:NOVELL:RECORD-TAG-BOF
APP:NOVELL:NMAP-NETMAIL-STOR
APP:NOVELL:MESSENGER-LOGIN
APP:NOVELL:GROUPWISEIA-ICAL-DOS
APP:NOVELL:IPRINT-ATTRIB-BO
APP:NOVELL:EDIR-PLUGIN-OF
APP:NOVELL:XNFS-NLM
APP:NOVELL:REMOTE-MGR-DOS
APP:NOVELL:MSNGR-CREATESEARCH
APP:NOVELL:REPORTER-FSFUI
APP:NOVELL:CASA-PAM-BOF
APP:NOVELL:MESSENGER-BOF
APP:NOVELL:MESSENGER-SERVER-BOF
APP:NOVELL:ZENWORKS-DIR-TRVRS
APP:NOVELL:ZENWORKS-MOBILE-LFI
APP:NOVELL:ZENWORKS-DIR-TRAV
APP:NOVELL:INTERNET-AGENT-BOF
APP:NOVELL:ZENWORKS-TFTPD-RCE
APP:NOVELL:NDS-IO
APP:NOVELL:ZENWORKS-PREBOOT-SVC
APP:NOVELL:NETIQ-EDIR-BOF
APP:NOVELL:ZENWORKS-MGMT-DIR
APP:NOVELL:ZENWORKSCM-DIRTRVRSL
APP:NOVELL:GROUPWISE-MAILTO-BO
APP:NOVELL:MESSENGER-DOS
APP:NOVELL:IMANAGER-TREE-NAME
APP:NOVELL:PREBOOT-POLICY-BO
APP:NOVELL:GROUPWISE-ADDRESS
APP:NOVELL:GWCLIENT-BOF
APP:NOVELL:REPORTER-SRS
APP:NOVELL:REPORTER-VOL
APP:NOVELL:ZENWORKS-ZFHIPCND-OF
APP:NOVELL:NETWARE-XNFS-BO
APP:NOVELL:ZENWORKS-CONFMGR-BO
APP:NOVELL:GROUPWISE-ADDRESSBK
APP:NOVELL:ZENWORKS-AGENT-OF
APP:NOVELL:IMANAGER-CREATE-BO
APP:NOVELL:ZENWORKS-LG-DIR-TRAV
APP:NOVELL:EDIR-CONTENT-LEN-OF

APP:ORACLE

APP:ORACLE:OHS-PROXY-BYPASS
APP:ORACLE:BUSINESS-FLSHSVC-RCE
APP:ORACLE:WEBCACHE-INSECURE
APP:ORACLE:WEBCACHE-METHOD-OF
APP:ORACLE:OUTSIDE-IN-FLASHPIX
APP:ORACLE:WEBLOGIC-SRV-RCE
APP:ORACLE:SBAS-AUTH-BYPASS
APP:ORACLE:JAVA-RMI-RCE
APP:ORACLE:RAPID-WEBSRV-XSS
APP:ORACLE:SQL-QUERY-DIR-TRAV
APP:ORACLE:MEMCACHED-PLUGIN
APP:ORACLE:OUTSIDE-JPEG2-CRG
APP:ORACLE:OUTSIDEIN-MET-HOVF
APP:ORACLE:CLNT-SYS-ANLZR-FL-UP
APP:ORACLE:WEBUI-CMD-INJ
APP:ORACLE:SYSTEM-ARRAYCOPY-RCE
APP:ORACLE:OOXML-TAG
APP:ORACLE:VIRTUAL-AGENT-CMDINJ
APP:ORACLE:RHINOSCRIPT-BYPASS
APP:ORACLE:SECURE-BACKUP-INJ
APP:ORACLE:OUTSIDE-JPEG2-CODCOC
APP:ORACLE:REPORT-CMD-INJ
APP:ORACLE:WEBCACHE-INSECURE2
APP:ORACLE:WEBLOGIC-CMD-EXEC
APP:ORACLE:GOLDENGATE-SOAP-OF
APP:ORACLE:VIRTUAL-AGT-CMDIJ-HS

APP:PCANYWHERE

APP:PCANYWHERE:LOGIN-FAILURE
APP:PCANYWHERE:STARTUP
APP:PCANYWHERE:LOGIN-ADMIN
APP:PCANYWHERE:HOST-SERVICES
APP:PCANYWHERE:SERVER-DOS
APP:PCANYWHERE:LOGIN-PASSWD-BO

APP:PPTP

APP:PPTP:POPTOP-OF
APP:PPTP:MICROSOFT-PPTP
APP:PPTP:PPTP-UNK-CTRL

APP:PROXY

APP:PROXY:SQUID-HOST-HDR-BYPASS
APP:PROXY:SQUID-ACCEPT-LANG-DOS
APP:PROXY:SQUID-SSLBUMP-CERT
APP:PROXY:SQUID-WCCP-BO
APP:PROXY:SQUID-WCCP-DOS
APP:PROXY:SQUID-PROXY-CACHE

APP:QT-SERVER

APP:QT-SERVER:PARSE-XML-CGI-RCE
APP:QT-SERVER:DESCRIBE-DOS
APP:QT-SERVER:DEV-URL-DOS

APP:REAL

APP:REAL:PLAYER-MAL-META-FILE
APP:REAL:RAM-FILE-OF
APP:REAL:SERVER-DOS
APP:REAL:HELIX-URL-OF
APP:REAL:PLAYER-INVALID-CHUNK
APP:REAL:HTML-PARSING-DOS
APP:REAL:SMIL-WALLCLOCK-OF
APP:REAL:REAL-MPG-WIDTH
APP:REAL:RMP-FILE-OF
APP:REAL:IVR-OF
APP:REAL:IVR-OF-1
APP:REAL:VIDPLIN-DLL
APP:REAL:PLAYER-MAL-SKIN
APP:REAL:HELIX-NTLM-OF
APP:REAL:MAL-FLV-FILE
APP:REAL:PLAYER-FILE-SEC-BYPASS
APP:REAL:PLAYER-SMIL-OF
APP:REAL:REALTEXT-ERR-OF
APP:REAL:PLAYER-FORMAT-STRING
APP:REAL:NEG-CONT-LEN

APP:REMOTE

APP:REMOTE:RDP-CONNECT
APP:REMOTE:TEAMVIEWER-URL-MODE
APP:REMOTE:TIMBUKTU-CONNECT
APP:REMOTE:TEAMVIEWER
APP:REMOTE:TEAMVIEWER-HTTP
APP:REMOTE:LOGMEIN
APP:REMOTE:GOTOMYPC-CONN-TEST
APP:REMOTE:GOTOMYPC
APP:REMOTE:RDP-HEAP-BO
APP:REMOTE:NETTRANSPORT-DM
APP:REMOTE:RDP-HEAP-OF
APP:REMOTE:MS-WIN-RDP-RCE
APP:REMOTE:RDP-RCE
APP:REMOTE:RDP-MEM-OBJ
APP:REMOTE:TIMBUKTU-AUTH-OF
APP:REMOTE:MS-RDP-ACTIVEX-RCE
APP:REMOTE:CVE-2015-2373-RCE
APP:REMOTE:RDP-DOS

APP:RWHOISD

APP:RWHOISD:RWHOISD-FS

APP:SAP

APP:SAP:NETWEAVER-DOS
APP:SAP:NETWEAVER-DIAGI-DOS
APP:SAP:IGS-OF
APP:SAP:WEB-SRV-OF
APP:SAP:NETWEAVER-SOAP-RCE
APP:SAP:MSG-SRV-GRP
APP:SAP:BIS-LIC-MGR-BOF
APP:SAP:NETWEAVER-MSG-RCE
APP:SAP:3DVIS-FLIC-BO
APP:SAP:SYBASE-ESPPARSE-DOS
APP:SAP:CONFIGSERVLET-CMD-EXEC
APP:SAP:NETWEAVER-BO
APP:SAP:3DM-FILE-BOF
APP:SAP:WEBAS-DOS
APP:SAP:NETWEAVER-MSG-SERVER-B0
APP:SAP:INT-GRAPHICS-PARAMS-XSS

APP:SHOUTCAST

APP:SHOUTCAST:ICY-OVERFLOW

APP:SNORT

APP:SNORT:GARBAGE-PACKET
APP:SNORT:BACKORIFICE-BOF
APP:SNORT:REPORT-RCE
APP:SNORT:DCE-RPC-DOS
APP:SNORT:BACKORIFICE-DOS

APP:SOCKS

APP:SOCKS:SMTP-PROXY-HTTP

APP:SYMC

APP:SYMC:WORKSPACE-RCE
APP:SYMC:VRTSWEB-EXEC
APP:SYMC:AV-MGT-SVC-BOF
APP:SYMC:VERITAS-VXSVC-BO
APP:SYMC:WEB-GATEWAY-CSRF
APP:SYMC:IM-MGR-ADM-INJ
APP:SYMC:NETBACKUP-CMD-EXEC
APP:SYMC:BLOCKED-PHP-SQLI
APP:SYMC:WEB-GW-PWD-CHG
APP:SYMC:MESSAGING-DIR-TRAV
APP:SYMC:IM-MGR-INJ
APP:SYMC:AGENT-RM-CMD
APP:SYMC:WEB-GATEWAY-OS-CMD-INJ
APP:SYMC:WORKSPACE-FILE-UPLOAD
APP:SYMC:LIVE-UPDATE-SEC-BYPASS
APP:SYMC:ENCRYPTED-CMD-EXEC
APP:SYMC:XFERWAN-OF
APP:SYMC:SCAN-ENG-AUTH-BYPASS
APP:SYMC:BACKUP-EXEC
APP:SYMC:MESSAGING-SSH-PASSWORD
APP:SYMC:AV-INTEL-ALERT
APP:SYMC:AMS-HNDLRSVC-RCE
APP:SYMC:ALERT-MGT-1
APP:SYMC:AMS-SEND-ALERT-ACK-OF
APP:SYMC:IM-MGR-WEB-UI-INJ
APP:SYMC:AMS-PIN-OF
APP:SYMC:AV-AHS-DOS
APP:SYMC:WG-PBCONTROL
APP:SYMC:ALERT-MGT-FILE-TRNS
APP:SYMC:LUA-HTML-INJ
APP:SYMC:AMS-MODEM-STRING-OF
APP:SYMC:MESSAGING-SAVE.DO-CSRF
APP:SYMC:MGM-CONSOLE-XSS
APP:SYMC:ALTIRIS-DS-SQL-INJ
APP:SYMC:ALERT-MGT

APP:TMIC

APP:TMIC:SP-EARTHAGENT-OF
APP:TMIC:SP-CREATEBIND-OF
APP:TMIC:SP-CREATE-BIND-OF
APP:TMIC:CTRLMGR-CHUNKED
APP:TMIC:CONTROL-MANAGER-CMD
APP:TMIC:TMREGCHANGE
APP:TMIC:SP-EARTH-AGENT-OF
APP:TMIC:INTERSCAN-XSS
APP:TMIC:OFFICESCAN-PW-OF
APP:TMIC:OFFICESCAN-AUTH

APP:TUN

APP:TUN:TOR-3
APP:TUN:TOR-2
APP:TUN:TOR-1
APP:TUN:ESP-TUNNEL
APP:TUN:GPRS-TUNNEL
APP:TUN:GRE-TUNNEL
APP:TUN:ANCHORFREE-VPN-UDP
APP:TUN:PACKETIX-VPN-CONNECT
APP:TUN:TEREDO-INFO
APP:TUN:ANCHORFREE-VPN-SSL
APP:TUN:IPV6-OVER-IPV4
APP:TUN:ESP-OVER-UDP
APP:TUN:TOR-EXIT-HOSTHEADER
APP:TUN:TEREDO-TUNNEL
APP:TUN:TIC-LOGIN
APP:TUN:ANCHORFREE-VPN-TCP
APP:TUN:6TO4-TUNNEL

APP:UPNP

APP:UPNP:MINIUPNPD-DOS
APP:UPNP:LIBUPNP-UUID-BOF
APP:UPNP:DLINK-SEARCH-NOTIFY
APP:UPNP:LIBUPNP-ROOT-DSN-BOF
APP:UPNP:MS-UPNP
APP:UPNP:APPLE-MDNS
APP:UPNP:LIBUPNP-DSN-BOF

APP:VERITAS

APP:VERITAS:NB-VMD-OF2
APP:VERITAS:REG-WRITE-2
APP:VERITAS:VERITAS-FILE-DUMP
APP:VERITAS:COMMAND-CHAIN
APP:VERITAS:NETBACKUP-VNETD
APP:VERITAS:NETBACKUP-BPCD
APP:VERITAS:AGENT-NAME-OF
APP:VERITAS:NB-VMD-OF
APP:VERITAS:VERITAS-NULL-PTR
APP:VERITAS:NETBACKUP-FS
APP:VERITAS:NETBCKP-CMD-EXEC
APP:VERITAS:MAL-REQUEST-DOS
APP:VERITAS:CLIENT-AUTH-OF
APP:VERITAS:REG-WRITE

APP:WHATSUP

APP:WHATSUP:IPSWITCH-DIR-TRV

APP:WINAMP

APP:WINAMP:CDA-DEV-NAME-OF
APP:WINAMP:CAF-OF
APP:WINAMP:MP4-MC
APP:WINAMP:MIDI-FILE-OF
APP:WINAMP:AMF-BO
APP:WINAMP:AVI-STREAM-BO
APP:WINAMP:RIFF-INFO

APP:WMP

APP:WMP:DSHOW-BIGCHUNK-HTTP
APP:WMP:DSHOW-BIGCHUNK-SMTP
APP:WMP:DSHOW-BIGCHUNK-SMB

APP:XDMCP

APP:XDMCP:DTLOGIN-DBL-FREE

CHARGEN

CHARGEN:ECHO-DOS
CHARGEN:TRAFFIC

CHARGEN:EXPLOIT

CHARGEN:EXPLOIT:UNEXPECTED-REQ

CHAT

CHAT:OOVOO-ACTIVITY
CHAT:POPO-CHAT-LOGIN
CHAT:APPLE-IMESSAGE-CONNECTION
CHAT:MS-LYNC-2010-CE
CHAT:STEAM-FRIENDS

CHAT:AIM

CHAT:AIM:FILE-EXE
CHAT:AIM:CLOSE-CONNECTION
CHAT:AIM:MESSAGE-SEND
CHAT:AIM:SERVER-READY
CHAT:AIM:MESSAGE-RECEIVE
CHAT:AIM:LOGIN-ATTEMPT
CHAT:AIM:FILE-SEND
CHAT:AIM:FILE-GET
CHAT:AIM:HTTP-PROXY
CHAT:AIM:TUNNEL
CHAT:AIM:TOC
CHAT:AIM:HTTPS-LOGIN
CHAT:AIM:LINK-EXEC

CHAT:AIM:OVERFLOW

CHAT:AIM:OVERFLOW:AWAY-FS
CHAT:AIM:OVERFLOW:TRILIN-XML-BO
CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY
CHAT:AIM:OVERFLOW:TRILLIAN-XML

CHAT:AUDIT

CHAT:AUDIT:IRC-CMD-CHR
CHAT:AUDIT:IRC-CMD

CHAT:AUDIT:AIM

CHAT:AUDIT:AIM:INV-TLV-LEN
CHAT:AUDIT:AIM:MSG-TOO-SHORT
CHAT:AUDIT:AIM:INVALID-TLV
CHAT:AUDIT:AIM:MSG-HEADER
CHAT:AUDIT:AIM:TLV-LEN-OVFLW
CHAT:AUDIT:AIM:MSG-TOO-BIG

CHAT:AUDIT:MSN

CHAT:AUDIT:MSN:MSG
CHAT:AUDIT:MSN:PHONE-NUM
CHAT:AUDIT:MSN:MSN-USER-NAME
CHAT:AUDIT:MSN:GROUP-NAME
CHAT:AUDIT:MSN:URL
CHAT:AUDIT:MSN:MSG-2LONG
CHAT:AUDIT:MSN:USER-STATE
CHAT:AUDIT:MSN:CMD
CHAT:AUDIT:MSN:IP-PORT

CHAT:AUDIT:YMSG

CHAT:AUDIT:YMSG:MSG-TOO-BIG
CHAT:AUDIT:YMSG:VALUE
CHAT:AUDIT:YMSG:ACTIVITY
CHAT:AUDIT:YMSG:MAIL-SUBJECT
CHAT:AUDIT:YMSG:BUD-LIST
CHAT:AUDIT:YMSG:EVENT-CODE
CHAT:AUDIT:YMSG:OFLOW-GRP-NAME
CHAT:AUDIT:YMSG:BUDY-LIST
CHAT:AUDIT:YMSG:OFLOW-PASSWD
CHAT:AUDIT:YMSG:INV-GROUP-NAME
CHAT:AUDIT:YMSG:FILE-NAME
CHAT:AUDIT:YMSG:INV-STAT-CODE
CHAT:AUDIT:YMSG:MEMBER-NAME
CHAT:AUDIT:YMSG:DATA-TYPE
CHAT:AUDIT:YMSG:CHATRM-MSG
CHAT:AUDIT:YMSG:OFLOW-COOKIE
CHAT:AUDIT:YMSG:BUD-LST
CHAT:AUDIT:YMSG:OFLOW-RESP-CRPT
CHAT:AUDIT:YMSG:STATUS-CODE
CHAT:AUDIT:YMSG:USERNAME
CHAT:AUDIT:YMSG:OFLOW-URL
CHAT:AUDIT:YMSG:SENDER
CHAT:AUDIT:YMSG:URL
CHAT:AUDIT:YMSG:USER-NAME
CHAT:AUDIT:YMSG:MSG-SIZE
CHAT:AUDIT:YMSG:ACTIVITY-SIZE
CHAT:AUDIT:YMSG:BUD-NAME
CHAT:AUDIT:YMSG:CHALLENGE
CHAT:AUDIT:YMSG:CONF-INVIT
CHAT:AUDIT:YMSG:CRYPT-PASSWD
CHAT:AUDIT:YMSG:CONF-MSG
CHAT:AUDIT:YMSG:MAIL-SNDR-NAME
CHAT:AUDIT:YMSG:GROUP-NAME
CHAT:AUDIT:YMSG:CHATROOM-NAME
CHAT:AUDIT:YMSG:MSG
CHAT:AUDIT:YMSG:RECIPIENT
CHAT:AUDIT:YMSG:CONF-NAME
CHAT:AUDIT:YMSG:CONTACT-NAME
CHAT:AUDIT:YMSG:MAIL-SNDR-ADDR
CHAT:AUDIT:YMSG:CONF-HOST
CHAT:AUDIT:YMSG:RESP-CRYPT
CHAT:AUDIT:YMSG:OFLOW-CHALNG
CHAT:AUDIT:YMSG:MAIL-ADDR
CHAT:AUDIT:YMSG:COOKIE
CHAT:AUDIT:YMSG:SEPARATOR
CHAT:AUDIT:YMSG:OFLOW-CONF-NAME
CHAT:AUDIT:YMSG:CHAT-NAME-OF
CHAT:AUDIT:YMSG:OFLOW-CONF-MSG
CHAT:AUDIT:YMSG:WEBCAM-KEY
CHAT:AUDIT:YMSG:MESSAGE-SEND
CHAT:AUDIT:YMSG:MESSAGE-RECEIVE
CHAT:AUDIT:YMSG:FILE-SEND
CHAT:AUDIT:YMSG:FILE-SEND-HTTP

CHAT:GADU-GADU

CHAT:GADU-GADU:BANNER
CHAT:GADU-GADU:CLIENT-REQ
CHAT:GADU-GADU:DISCOVER

CHAT:GOOGLE

CHAT:GOOGLE:SEND-HTTP
CHAT:GOOGLE:GTALK-STARTUP
CHAT:GOOGLE:GTALK-CALL
CHAT:GOOGLE:START
CHAT:GOOGLE:GTALK-PHONE-SESSION
CHAT:GOOGLE:TALKGADGET
CHAT:GOOGLE:GTALK-SSL
CHAT:GOOGLE:TALKGADGET-ACTIVITY
CHAT:GOOGLE:JABBER
CHAT:GOOGLE:JABBER-SSL

CHAT:ICQ

CHAT:ICQ:FILE-RECEIVE
CHAT:ICQ:FILE-SEND
CHAT:ICQ:ISS-BLACKICE-OF

CHAT:IRC

CHAT:IRC:SRV-RESPONSE
CHAT:IRC:SSN-CLEARTEXT
CHAT:IRC:NICK
CHAT:IRC:MIRC-PRIVMSG
CHAT:IRC:UNREALRCD-BACKDOOR
CHAT:IRC:LOIC-HIVE-LOGIN
CHAT:IRC:COLLOQUY-DOS
CHAT:IRC:COLLOQUY-INVITE-FS
CHAT:IRC:RATBOX-MCAPAB-DOS
CHAT:IRC:CC-NUMBER

CHAT:IRC:BOTNET

CHAT:IRC:BOTNET:AGOBOT-CMD
CHAT:IRC:BOTNET:DOWNLOAD-CMD
CHAT:IRC:BOTNET:SDBOT-CMD
CHAT:IRC:BOTNET:RA1NX-BOT-CE

CHAT:IRC:INVALID

CHAT:IRC:INVALID:ARGS
CHAT:IRC:INVALID:MSG
CHAT:IRC:INVALID:NUM-REPLY
CHAT:IRC:INVALID:PREFIX
CHAT:IRC:INVALID:NULL-CHAR
CHAT:IRC:INVALID:FORMAT-STR

CHAT:IRC:OVERFLOW

CHAT:IRC:OVERFLOW:LINE
CHAT:IRC:OVERFLOW:USERNAME
CHAT:IRC:OVERFLOW:NUM-REPLY
CHAT:IRC:OVERFLOW:NICK
CHAT:IRC:OVERFLOW:CHANNEL
CHAT:IRC:OVERFLOW:PASSWORD
CHAT:IRC:OVERFLOW:OPENBSD-DOS
CHAT:IRC:OVERFLOW:XCHAT-SOCKS

CHAT:JABBER

CHAT:JABBER:JABBER-CTRAF
CHAT:JABBER:JABBER-XTRAF
CHAT:JABBER:NIMBUZZ
CHAT:JABBER:UNAME-OF

CHAT:MSN

CHAT:MSN:POINT-TO-POINT
CHAT:MSN:ACCESS
CHAT:MSN:LOGIN-ATTEMPT
CHAT:MSN:INVITE-RECV
CHAT:MSN:INVITE-SEND
CHAT:MSN:BRIDGE
CHAT:MSN:GIF-OVERFLOW
CHAT:MSN:PIDGIN-MSN-IO

CHAT:MSN:HTTP

CHAT:MSN:HTTP:LOGIN
CHAT:MSN:HTTP:CHAT
CHAT:MSN:HTTP:MSNFTP-INVITE
CHAT:MSN:HTTP:CALL

CHAT:MSN:INVALID

CHAT:MSN:INVALID:PNG-HEIGHT
CHAT:MSN:INVALID:PNG-WIDTH
CHAT:MSN:INVALID:MSN-VID-FRAME

CHAT:QQ

CHAT:QQ:QQ-CONNECT
CHAT:QQ:QQ-CONNECT-TCP

CHAT:YIM

CHAT:YIM:XSS
CHAT:YIM:HTTP-FILE-TRANSFER
CHAT:YIM:FILE-TRANSFER
CHAT:YIM:YAHOO-HTTP-PROXY
CHAT:YIM:DOUBLE-EXT
CHAT:YIM:LONG-FILE-NAME
CHAT:YIM:LOGIN-ATTEMPT
CHAT:YIM:HTTP-TUNNEL

CHAT:YIM:OVERFLOW

CHAT:YIM:OVERFLOW:SPOOFED-NAME

DB

DB:MONGODB-NATIVEHELPER-RCE
DB:INGRES-UUID_FROM_CHAR-OF
DB:SOLIDDB-LOG-FS
DB:FIREBIRD-XDR-DOS
DB:INGRESDB-IIDBMS-OF
DB:FIREBIRD-USER-BO
DB:IBM-SOLIDDB-AUTH-BYPASS
DB:SALESLOGIX-DISC
DB:IBM-SOLIDBD-WHERE-DOS
DB:SAPDB-WEB-OF
DB:IBM-SOLIDDB-ROWNUM
DB:SOLIDDB-DOS
DB:FIREBIRD-DOS
DB:BORLAND-MSG-BO

DB:DB2

DB:DB2:JDBC-OF
DB:DB2:XML-QUERY-OF
DB:DB2:CONNECT-DOS
DB:DB2:DB2-DOS
DB:DB2:INVALID-DATA-STREAM-DOS
DB:DB2:HS-DOS
DB:DB2:SQL-REPEAT-OF
DB:DB2:IBM-DAS-BOF

DB:IB

DB:IB:CONNECT-BOF
DB:IB:BORLAND-INTERBASE-BOF

DB:MS-SQL

DB:MS-SQL:SQLMON-PING-DOS
DB:MS-SQL:SQLMON-EMPTY-PKT
DB:MS-SQL:PREAUTH-OVERFLOW
DB:MS-SQL:SQLMON-MDAC-OFLOW
DB:MS-SQL:NULL-PSWRD
DB:MS-SQL:MSSQL-LGN-BRUTE-FORCE
DB:MS-SQL:SQLMON-STACK-OFLOW
DB:MS-SQL:SQLMON-MALFORM-DOS
DB:MS-SQL:SQLMON-HEAP-OFLOW
DB:MS-SQL:XP_CMDSHELL-SMB
DB:MS-SQL:PWD-CHANGE
DB:MS-SQL:XP_CMDSHELL-TDS
DB:MS-SQL:USER-ADD
DB:MS-SQL:XP-DIRTREE1
DB:MS-SQL:COMMAND-BO
DB:MS-SQL:PWD-ENCRYPT
DB:MS-SQL:LOGIN-FAILURE
DB:MS-SQL:X-RAY-SCANNER
DB:MS-SQL:SA-LOGIN
DB:MS-SQL:HELLO-OF
DB:MS-SQL:WINCC-DEFAULT-PASS
DB:MS-SQL:DOS1
DB:MS-SQL:TDS-FRAG-FLOOD
DB:MS-SQL:CONVERT-OF
DB:MS-SQL:STOR-PROC-PRIV-UPGRD
DB:MS-SQL:2000-SP_START_JOB
DB:MS-SQL:INSERT-CMD-BOF
DB:MS-SQL:TDS-FRAG-LEN-ZERO
DB:MS-SQL:MAL-INSERT
DB:MS-SQL:TDI-OVERFLOW
DB:MS-SQL:REPLWRITETIVARBIN-DB

DB:MYSQL

DB:MYSQL:LOGIN-OVERLONG-USER
DB:MYSQL:LOGIN-NO-PSWD
DB:MYSQL:LOGIN-NO-USER
DB:MYSQL:LOGIN-OVERLONG-PSWD
DB:MYSQL:SHORT-MSG
DB:MYSQL:MAXDB-WEBDAV-OF
DB:MYSQL:AUTHENTICATION-BYPASS
DB:MYSQL:MYSQL-PFIELD-TYPE
DB:MYSQL:LOGIN-FAILED
DB:MYSQL:ROOT-USER
DB:MYSQL:SINGLE-ROW-DOS
DB:MYSQL:CREATE-FUNCTION
DB:MYSQL:MYSQL-LDAP-DOS
DB:MYSQL:BRUTE-FORCE
DB:MYSQL:SELECT-SUB-DOS
DB:MYSQL:CREATE-TABLE
DB:MYSQL:MYSQL-IFDOS
DB:MYSQL:IN-NULL-ARG-DOS
DB:MYSQL:YASSL-HELLO-BO
DB:MYSQL:UPDATEXML
DB:MYSQL:MYSQL-USE-DOS
DB:MYSQL:LOGIN-INFO-DISCLOSURE
DB:MYSQL:SSL-OF
DB:MYSQL:COMMANDS-BO
DB:MYSQL:LONG-FUNC
DB:MYSQL:BENCHMARK-DOS
DB:MYSQL:MYSQL-DATE-FS
DB:MYSQL:MOF-EXEC
DB:MYSQL:UPDATEXML-DOS
DB:MYSQL:GEOMETRY-INT-OVF
DB:MYSQL:WINDOWS-REMOTE-ROOT
DB:MYSQL:WIN-RCE
DB:MYSQL:MAXDB-CMD
DB:MYSQL:FS-REQUEST
DB:MYSQL:PROC-ANALYSE-DOS
DB:MYSQL:COM-FIELD-LIST-BO
DB:MYSQL:COMTABLEDUMP-OF
DB:MYSQL:EXTRACT-VAL-RCE
DB:MYSQL:MAXDB-SERVER-OF
DB:MYSQL:ORACLE-XPATH-DOS
DB:MYSQL:UNIQ-SET-COL-JOIN-DOS
DB:MYSQL:GRANT-FILE-BO
DB:MYSQL:MYSQL-PASSWORD-OF
DB:MYSQL:AUTH-BYPASS
DB:MYSQL:USER-ENUMERATION
DB:MYSQL:CLIENT-BOF
DB:MYSQL:MAXDB-WEB-OF
DB:MYSQL:MAXDB-GET-OF
DB:MYSQL:MS-DOS-NAMES-DOS
DB:MYSQL:ZERO-LEN-PW

DB:ORACLE

DB:ORACLE:VULN-VER-9.2.0.4
DB:ORACLE:VULN-VER-10.1.0.1
DB:ORACLE:SDO-CODE-AUTH-BYPASS
DB:ORACLE:APPDET-CONNECT
DB:ORACLE:USERNAME-DUMP
DB:ORACLE:REPORTS-XML-DISC
DB:ORACLE:DECLARE-EXEC
DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO
DB:ORACLE:OSB-NDMP-OF
DB:ORACLE:DBMS-ASSERT
DB:ORACLE:WAREHOUSE-BUILDER
DB:ORACLE:AS-EMCHARTBEAN-TRAV
DB:ORACLE:INSECURE-TNS-LISTENER
DB:ORACLE:WEBLOGIC-SERVER
DB:ORACLE:TIMES-TEN-HTTP-DOS
DB:ORACLE:WORKSPACE-MGR-INJ
DB:ORACLE:EVTDUMP
DB:ORACLE:XDB-PITRIG-SQLINJ
DB:ORACLE:INVALID-LOGIN
DB:ORACLE:LINK-BOF
DB:ORACLE:METAFILE-PARSER-DOS
DB:ORACLE:SQL-PLUS-LOAD-UIX
DB:ORACLE:STRCONV-BOF
DB:ORACLE:XML-SCHEMA-OF
DB:ORACLE:CREATE_TABLES-INJ
DB:ORACLE:SEARCH-P-GROUPS
DB:ORACLE:LOGIN-CMD-INJ
DB:ORACLE:EMANAGEMENT-BOF
DB:ORACLE:ODCITABLESTART-OF
DB:ORACLE:SDO_CS-TRANS-OF
DB:ORACLE:SDO_TOPO_DROP_FTBL
DB:ORACLE:GRANT-TYPE-ACCESS-INJ
DB:ORACLE:ORACLE-SQL-BOF
DB:ORACLE:FUSION-XLS-IO
DB:ORACLE:COMPILER-ACL
DB:ORACLE:XDB-DROPMETADATA
DB:ORACLE:EXP-APP-WEBCACHE
DB:ORACLE:ORACLE-DSI
DB:ORACLE:CREATE-VIEW
DB:ORACLE:ROLLBACKWORKSPACE
DB:ORACLE:LOGIN-BYPASS
DB:ORACLE:DBMS-CDC-PUBLISH-INJ
DB:ORACLE:PITRIG-TRUNC-DROP

DB:ORACLE:DBMS

DB:ORACLE:DBMS:OPMN-LOG-FMT-STR
DB:ORACLE:DBMS:CDC-AQJM-UNSAFE
DB:ORACLE:DBMS:EXPORT-PRIV
DB:ORACLE:DBMS:VAL-REMOTE-INJ
DB:ORACLE:DBMS:JVM-EXP-PERMS
DB:ORACLE:DBMS:AQELM-OF
DB:ORACLE:DBMS:CORE-DOS
DB:ORACLE:DBMS:JVM-SYS-CMD
DB:ORACLE:DBMS:EXPORT-EXTN2
DB:ORACLE:DBMS:METADATA-UNSAFE
DB:ORACLE:DBMS:OUTPUT-TO-JAVA
DB:ORACLE:DBMS:EXPORT-EXTENSION
DB:ORACLE:DBMS:EXP-EXT-UNSAFE
DB:ORACLE:DBMS:SUB_NAME-SQL-INJ

DB:ORACLE:PASSWD

DB:ORACLE:PASSWD:TRACESVR
DB:ORACLE:PASSWD:SYSTEM
DB:ORACLE:PASSWD:SYS
DB:ORACLE:PASSWD:ORDSYS
DB:ORACLE:PASSWD:OUTLN
DB:ORACLE:PASSWD:ORDPLUGINS
DB:ORACLE:PASSWD:SCOTT
DB:ORACLE:PASSWD:ADAMS
DB:ORACLE:PASSWD:JONES
DB:ORACLE:PASSWD:CLARK
DB:ORACLE:PASSWD:CTXSYS
DB:ORACLE:PASSWD:BLAKE
DB:ORACLE:PASSWD:ORDCOMMON
DB:ORACLE:PASSWD:AURORA
DB:ORACLE:PASSWD:MDSYS
DB:ORACLE:PASSWD:DBSNMP

DB:ORACLE:SYS

DB:ORACLE:SYS:KUPW-WORKER
DB:ORACLE:SYS:MDSYS-SDO-LRS
DB:ORACLE:SYS:LT-WORKSPACE
DB:ORACLE:SYS:LT-FINDRICSET
DB:ORACLE:SYS:KUPVFT-UNSAFE
DB:ORACLE:SYS:PBSDE-INIT-OF
DB:ORACLE:SYS:LPXFSMSAX-NAME-BO

DB:ORACLE:TNS

DB:ORACLE:TNS:OVERFLOW_MSG
DB:ORACLE:TNS:MALFORMED-IP
DB:ORACLE:TNS:UNK-COMMAND
DB:ORACLE:TNS:MALFORMED-PORT
DB:ORACLE:TNS:SHORT_MSG
DB:ORACLE:TNS:RDBMS-DOS
DB:ORACLE:TNS:INTERMEDIA-DOS
DB:ORACLE:TNS:CMD-EXEC
DB:ORACLE:TNS:UNSAFE-CMD
DB:ORACLE:TNS:LOOP-DOS
DB:ORACLE:TNS:DBMS-OF
DB:ORACLE:TNS:ORACLE-PRIVESC
DB:ORACLE:TNS:DOS
DB:ORACLE:TNS:OF
DB:ORACLE:TNS:TRACE-OF
DB:ORACLE:TNS:BEQ-BYPASS
DB:ORACLE:TNS:ACC-CONTROL-BP
DB:ORACLE:TNS:SERVICE-AUTH
DB:ORACLE:TNS:AUTH-SESSKEY-OF-2
DB:ORACLE:TNS:SERVICE-NAME-OF
DB:ORACLE:TNS:INTERMEDIA-DOS-1
DB:ORACLE:TNS:TABLEFUNC-ASOWN
DB:ORACLE:TNS:AUTH-SESSKEY
DB:ORACLE:TNS:AUTH-SESSKEY-OF-1

DB:POSTGRESQL

DB:POSTGRESQL:SET-ROLE-BYPASS
DB:POSTGRESQL:CACHEW-OF
DB:POSTGRESQL:LINUX-DBLINK-RCE
DB:POSTGRESQL:DBNAME-CLIFLAGINJ
DB:POSTGRESQL:POSTGRE-DBSEC-BP
DB:POSTGRESQL:GEO-OPS-PATH-IN
DB:POSTGRESQL:DBA-AUTH-BYPASS
DB:POSTGRESQL:DATETIME-BO
DB:POSTGRESQL:DATETIME-BO-1
DB:POSTGRESQL:SUBSTRING-OF

DB:SYBASE

DB:SYBASE:OPEN-SERVER-CE
DB:SYBASE:OPEN-SERVER-MC
DB:SYBASE:MOBILINK-BO

DDOS

DDOS:LOIC-ANONYMOUS-HTTP
DDOS:JAVALOIC-TWITTER
DDOS:HOIC-HTTP-METHOD
DDOS:LOIC-TCP-METHOD
DDOS:LOIC-UDP-METHOD
DDOS:LONGCAT
DDOS:DIRTJUMPER
DDOS:JAVALOIC-TCP-METHOD
DDOS:LOIC-WEB
DDOS:LOIC-HTTP-METHOD
DDOS:JAVALOIC-UDP-METHOD

DDOS:SHAFT

DDOS:SHAFT:AGENT-TO-HANDLER
DDOS:SHAFT:HANDLER-TO-AGENT
DDOS:SHAFT:CLIENT-TO-HANDLER
DDOS:SHAFT:AGENT-TO-HANDLER-PKT

DDOS:TRIN00

DDOS:TRIN00:MASTER-CMD-MSIZE
DDOS:TRIN00:DAEMON-CMD-XYZ
DDOS:TRIN00:DAEMON-CMD-SHI
DDOS:TRIN00:DAEMON-CMD
DDOS:TRIN00:MASTER-CMD-KILLDEAD
DDOS:TRIN00:MASTERPW-DEFLT-WIN
DDOS:TRIN00:MASTERPW-DEF-STRTUP
DDOS:TRIN00:MASTERPW-DEF-KDIE
DDOS:TRIN00:MASTER-CMD-DOS
DDOS:TRIN00:MASTERPW-DEF-REMOTE
DDOS:TRIN00:DAEMON-TO-MASTER-2
DDOS:TRIN00:DAEMON-TO-MASTER-1
DDOS:TRIN00:MASTER-CMD-MDOS
DDOS:TRIN00:MASTER-CMD-MDIE
DDOS:TRIN00:MASTER-PROMPT
DDOS:TRIN00:DAEMON-TO-MSTR1-PKT
DDOS:TRIN00:MASTER-CMD-MPING
DDOS:TRIN00:DAEMON-TO-MSTR2-PKT

DDOS:TRINITY

DDOS:TRINITY:DEFAULT-PW

DHCP

DHCP:ISC-ZERO-LEN-DOS

DHCP:AUDIT

DHCP:AUDIT:INV-CLI-SRC-PORT
DHCP:AUDIT:CLI-HW-MISMATCH
DHCP:AUDIT:UNK-OPCODE
DHCP:AUDIT:UNK-HW-TYPE
DHCP:AUDIT:INV-SVR-SRC-PORT
DHCP:AUDIT:SVRNAME-NOT-T2
DHCP:AUDIT:BOOT-FNAME-NOT-T2
DHCP:AUDIT:CLI-HWADDR-NOT-T2
DHCP:AUDIT:MISS-MAGIC-COOKIE

DHCP:ERROR

DHCP:ERROR:INV-MAGIC-COOKIE
DHCP:ERROR:INV-MSG-TYPE
DHCP:ERROR:INV-HW-LEN

DHCP:EXPLOIT

DHCP:EXPLOIT:MSG-TOO-SHORT
DHCP:EXPLOIT:HOSTNAME-HTML
DHCP:EXPLOIT:SOLARIS-EXEC

DHCP:OPT

DHCP:OPT:INV-OPT-VAL
DHCP:OPT:MAX-MSG-SIZE-2-SMALL
DHCP:OPT:IFMTU-TOO-SMALL
DHCP:OPT:LEASE-TIME-ZERO
DHCP:OPT:DEF-TTL-ZERO
DHCP:OPT:MAX-DGM-SZ-2-SMALL
DHCP:OPT:INV-NB-NODE-TYPE
DHCP:OPT:BAD-HOSTNAME
DHCP:OPT:TCP-DEF-TTL-ZERO
DHCP:OPT:INV-OPT-LEN
DHCP:OPT:MISSING-EOO
DHCP:OPT:LOG-BUF-OVERFLOW
DHCP:OPT:MS-OPT-OF
DHCP:OPT:ISC-DHCPD-MMS-DOS
DHCP:OPT:DHCPD-PKT-SIZE-BO

DHCP:RQST

DHCP:RQST:ISC-DOS

DHCP:SERVER

DHCP:SERVER:FMT-STR
DHCP:SERVER:ISC-FORMAT-STRING
DHCP:SERVER:ISC-DHCLIENT-BOF
DHCP:SERVER:ISC-PACKET-PRO-DOS
DHCP:SERVER:ISC-MAL-CLID
DHCP:SERVER:ISC-DUID-BO
DHCP:SERVER:ISC-PACKET-DOS
DHCP:SERVER:ISC-DHCPD-BO
DHCP:SERVER:ISC-DISCOVER-DOS
DHCP:SERVER:ISC-DHCLIENT-BOF-1
DHCP:SERVER:ISC-CMD-INJ
DHCP:SERVER:GNU-BASH-CMD-EXE
DHCP:SERVER:ISC-PACKET-DOS-1

DISCARD

DISCARD:TRAFFIC

DISCARD:EXPLOIT

DISCARD:EXPLOIT:UNEXPECTED-REP

DISCARD:INFO

DISCARD:INFO:ASCEND-DISCARD

DNS

DNS:TOO-MANY-ERRORS
DNS:SQUID-DNS-DOS-1
DNS:ISC-INSIST-DOS
DNS:ISC-BIND-DOS
DNS:PDNS-AUTHSERV-DOS
DNS:POWERDNS-NAMESRVR-UDP-DOS
DNS:WPADREG
DNS:SAMBA-DNS-REPLY-FLAG-DOS
DNS:PHP-PARSERR-HEAP-BO
DNS:ISC-BIND-RRSIG-DOS
DNS:TRAFFIC-UDP
DNS:TRAFFIC-TCP
DNS:BIND9-ASSERT-DOS
DNS:ISC-BIND-PACKAGE-DOS
DNS:RRSIG-QUERY
DNS:NGINX-RESOLVER-DOS
DNS:BIND-DBC-ASSERT-DOS
DNS:CRAFTED-MX
DNS:ISC-BIND-REGEX-DOS
DNS:RESOLVER-BO
DNS:SQUID-DNS-RESPONSE-SPOOF
DNS:REQUEST-RRTYPE-ANY
DNS:MICROSOFT-DNS-DOS
DNS:NEGANY
DNS:RESP-SPOOF
DNS:SQUID-DNS-DOS
DNS:BIND-RRSIG-DOS-2
DNS:WORDPRESS-SOAK-SOAK-MALWARE
DNS:BIND-DELEGATION-HANDLNG-DOS
DNS:SYMANTEC-DNS-RESPONSE-DOS
DNS:ISC-BIND9-DOS
DNS:ISC-BIND-TKEY-DOS
DNS:MUL-VEND-TXT-BOF
DNS:SYMANTEC-CACHE-POIS
DNS:BIND-NXT-OVERFLOW4
DNS:BIND-NXT-OVERFLOW3
DNS:BIND-NXT-OVERFLOW1
DNS:BIND-NXT-OVERFLOW2
DNS:MS-FOREFRONT-RCE
DNS:POWERDNS-NAMSRVR-TCP-DOS
DNS:DYNAMICUPDATE
DNS:MS-ANY-QUERY-SPOOFING
DNS:MS-ISA-CE
DNS:ISATAPREG
DNS:MAILENABLE-SPF
DNS:SYMANTEC-DNS-POISIONING
DNS:GNUTLS-DANE-BOF
DNS:SYMNTC-FIREWALL-MULT
DNS:ISC-BIND-DNSSEC-DOS
DNS:BIND-RRSIG-QUERY-DOS
DNS:BIND-RRSIG-DOS
DNS:ISC-BIND-EDNS-OPT-DOS

DNS:AUDIT

DNS:AUDIT:OPT-NMB-EXCEEDED
DNS:AUDIT:REP-MISMATCHING-QD
DNS:AUDIT:REP-MISMATCHING-AN
DNS:AUDIT:RCODE-NOT-IMPL
DNS:AUDIT:CLASS-NON-IN
DNS:AUDIT:REP-QTYPE-UNEXPECTED
DNS:AUDIT:MISMATCHING-AN-CNAME
DNS:AUDIT:REQ-INVALID-HDR-RA
DNS:AUDIT:RCODE-NAME-ERROR
DNS:AUDIT:RCODE-REFUSED
DNS:AUDIT:RCODE-FORMAT-ERROR
DNS:AUDIT:TYPE-UNKNOWN
DNS:AUDIT:TYPE-ALL
DNS:AUDIT:REQ-ANSWERS-IN-QUERY
DNS:AUDIT:INVALID-Z
DNS:AUDIT:CLASS-UNKNOWN
DNS:AUDIT:TYPE-OBSOLETE
DNS:AUDIT:INVALID-RCODE
DNS:AUDIT:TYPE-EXPERIMENTAL
DNS:AUDIT:REQ-C2S-RESPONSE
DNS:AUDIT:TYPE-NON-1035
DNS:AUDIT:QCLASS-UNEXP
DNS:AUDIT:REP-S2C-QUERY
DNS:AUDIT:AAAA-RR
DNS:AUDIT:Z-RESERVED-OPT
DNS:AUDIT:UNASSIGNED-OPCODE

DNS:EXPLOIT

DNS:EXPLOIT:PNTRS-PERNAME-EXCD
DNS:EXPLOIT:TRANSPOOF-2
DNS:EXPLOIT:POINTER-LOOP
DNS:EXPLOIT:EMPTY-UDP-MSG
DNS:EXPLOIT:REQUEST-SHORT-MSG
DNS:EXPLOIT:EXPLOIT-BIND9-RT
DNS:EXPLOIT:MAL-TXT-REC
DNS:EXPLOIT:BIND-KEYPARSE-DOS
DNS:EXPLOIT:ISC-BIND-RDATA-DOS
DNS:EXPLOIT:BIND-MULT-RRSET
DNS:EXPLOIT:ISC-BIND-DNS64-RPZ
DNS:EXPLOIT:BIND-ADDSOA
DNS:EXPLOIT:BIND-MULT-RRSET2
DNS:EXPLOIT:BIND-OPENPGPKEY-DOS
DNS:EXPLOIT:SQUID-PROXY-DOS
DNS:EXPLOIT:LIBCVE-2015-7547BO2
DNS:EXPLOIT:CLIBCVE-2015-7547BO
DNS:EXPLOIT:SQUID-PROXY-PTR-DOS

DNS:FAILURE

DNS:FAILURE:RCODE_NOTAUTH
DNS:FAILURE:RCODE_NOTZONE

DNS:HEADERERROR

DNS:HEADERERROR:INVALID-OPCODE

DNS:INFO

DNS:INFO:OVERSIZED_ADV_PAYLOAD
DNS:INFO:RCODE-BADVERS
DNS:INFO:TYPE-AXFR
DNS:INFO:RCODE-SERVER-FAILURE
DNS:INFO:XFER-BAD
DNS:INFO:XFER-GOOD

DNS:OVERFLOW

DNS:OVERFLOW:NAME-TOO-LONG
DNS:OVERFLOW:TOO-LONG-TCP-MSG
DNS:OVERFLOW:OPT-DOS
DNS:OVERFLOW:OPT-OVERFLOW
DNS:OVERFLOW:INVALID-POINTER
DNS:OVERFLOW:INVALID-LABEL-LEN
DNS:OVERFLOW:NXT-OVERFLOW
DNS:OVERFLOW:SIG-OVERFLOW
DNS:OVERFLOW:SPARC-TCP
DNS:OVERFLOW:SCO-NAMED2-OF2
DNS:OVERFLOW:SCO-NAMED2-OF1
DNS:OVERFLOW:NOOP-RQUERY
DNS:OVERFLOW:HOSTNAME-OF
DNS:OVERFLOW:SYMANTEC-CNAME
DNS:OVERFLOW:DNS-ATMA-SIZE-OF
DNS:OVERFLOW:TCP-RESPONSE
DNS:OVERFLOW:EXIM-DECODE-BO2
DNS:OVERFLOW:TFTPD32
DNS:OVERFLOW:TRANSPOOF-3
DNS:OVERFLOW:SYMNTEC-CNAME
DNS:OVERFLOW:ADM-TCP
DNS:OVERFLOW:GNU-C-GLIBC
DNS:OVERFLOW:BAD-CHAR-UDP
DNS:OVERFLOW:TXTRECORD
DNS:OVERFLOW:TXTRECORD-1

DNS:QUERY

DNS:QUERY:VERSION-QUERY
DNS:QUERY:NULL-QUERY
DNS:QUERY:BIND-IQUERY-BO
DNS:QUERY:HOSTNAME
DNS:QUERY:AUTHORS
DNS:QUERY:ISC-BIND-NSEC3-DOS
DNS:QUERY:WIN-DNS-SERVER-SPOOF
DNS:QUERY:ENC-STATUS-SPOOF
DNS:QUERY:SYMC-DNS-CACHE

DNS:REPERR

DNS:REPERR:NAPRT-IOF
DNS:REPERR:NULL-RDATA-LEN

DNS:REQUEST

DNS:REQUEST:SUN-JRE-DOS

DNS:TUNNEL

DNS:TUNNEL:NULL-RECORD
DNS:TUNNEL:IODINE
DNS:TUNNEL:DNS2TCP
DNS:TUNNEL:OZYMANDNS
DNS:TUNNEL:SHORT-TTL
DNS:TUNNEL:I2P-DNS-QUERY

DOS

DOS:EMULE-DOS
DOS:LINUX-COOKIE-ECHO-DOS
DOS:FREEBSD-ROUTED-DAEMON
DOS:SLOWHTTPTEST-TOOL
DOS:UPNP-CHARGEN-DOS
DOS:MULTIVENDOR-TCP-TIMESTAMP
DOS:DELL-NETVAULT-DOS

DOS:APPLICATION

DOS:APPLICATION:DOS
DOS:APPLICATION:MS-HIS-UDP
DOS:APPLICATION:MS-HIS-TCP

DOS:IP

DOS:IP:LINUX-KERNEL-OOTB
DOS:IP:LINUX-KERNEL-NF-DOS
DOS:IP:LINUX-DCCP-DOS
DOS:IP:LINUX-KERNEL-INIT
DOS:IP:LINUX-CHUNKINIT-DOS
DOS:IP:ASCONF-CHUNK-PARSE
DOS:IP:LIN-KERNEL-SKACK-DOS
DOS:IP:IGMP-OVERSIZE
DOS:IP:CISCO-IOS-NHRP
DOS:IP:FRAGMENT
DOS:IP:PGM
DOS:IP:LINUX-CHUNKINIT-DOS-1
DOS:IP:IGMP-LINUX
DOS:IP:CHARGEN-BOMB

DOS:NETDEV

DOS:NETDEV:LINKSYS-GOZILA-DOS2
DOS:NETDEV:HP-LCD-MOD-9001
DOS:NETDEV:CISCO-IPMOBILITY
DOS:NETDEV:CISCO-SUNND
DOS:NETDEV:LINKSYS-GOZILA-DOS3
DOS:NETDEV:WEBJET-WRITETOFILE
DOS:NETDEV:WEBJET-HTS-DOT
DOS:NETDEV:WEBJET-FW-INFOLEAK
DOS:NETDEV:ASCEND-KILL2
DOS:NETDEV:CISCO-SYSLOG-DOS
DOS:NETDEV:CISCO-SWIPE
DOS:NETDEV:CISCO-TELNET-BOF1
DOS:NETDEV:CISCO-HTTPD-DOS
DOS:NETDEV:ROUTEFINDER-VPN-DOS
DOS:NETDEV:D-LINK-DNS-320
DOS:NETDEV:NORTEL-MARLIN
DOS:NETDEV:CATALYST-SSH-DOS
DOS:NETDEV:NETWORK-3COM-DOS
DOS:NETDEV:ASCEND-KILL
DOS:NETDEV:LIVINGSTON
DOS:NETDEV:CISCO-5000
DOS:NETDEV:CISCO-PIM
DOS:NETDEV:HP-LCD-MOD-9100

DOS:WINDOWS

DOS:WINDOWS:WINNUKE-NETBIOS
DOS:WINDOWS:MS-RDP-PATTERN-DOS
DOS:WINDOWS:HTTP-SYS
DOS:WINDOWS:ISCSI-TARGET

ECHO

ECHO:CHARGEN-DOS

ECHO:AUDIT

ECHO:AUDIT:LINE

ECHO:EXPLOIT

ECHO:EXPLOIT:MISMATCHING-REPLY
ECHO:EXPLOIT:SERVER-NO-RESPONSE

FINGER:AUDIT

FINGER:AUDIT:REQ-WRONG-FORMAT

FINGER:BACKDOOR

FINGER:BACKDOOR:CMD-ROOTSH

FINGER:DOS

FINGER:DOS:BOMB

FINGER:EXPLOIT

FINGER:EXPLOIT:REDIRECTION
FINGER:EXPLOIT:NULL-BYTE
FINGER:EXPLOIT:DOT-AT-HOST
FINGER:EXPLOIT:ACCOUNT-ENUM
FINGER:EXPLOIT:ZERO-AT-HOST
FINGER:EXPLOIT:PIPE

FINGER:OVERFLOW

FINGER:OVERFLOW:LINE

FINGER:REPLYERROR

FINGER:REPLYERROR:BIN-DATA

FINGER:REQERR

FINGER:REQERR:UNEXP-LINE
FINGER:REQERR:REQ-BINARY-DATA
FINGER:REQERR:BIN-HOST

FINGER:USER

FINGER:USER:SEARCH
FINGER:USER:SLASH-FILE
FINGER:USER:ROOT

FTP

FTP:VSFTPD-BACKDOOR
FTP:CISCO-VPN-ACCESS
FTP:CURL-OF-BANNER
FTP:FORMAT-STRING-IN-CMD
FTP:FREEFLOAT-CMD-BO
FTP:TRIPWIRE-FORMAT-STRING
FTP:SHELLSHOCK
FTP:PHP-FILE-UPLOAD
FTP:SYMLINKS-WGET-INPT-VALID

FTP:AUDIT

FTP:AUDIT:LOGIN-FAILED
FTP:AUDIT:COMMAND-FAILED
FTP:AUDIT:REP-INVALID-REPLY
FTP:AUDIT:REQ-NESTED-REQUEST
FTP:AUDIT:REQ-UNKNOWN-CMD
FTP:AUDIT:REQ-INVALID-CMD-SEQ
FTP:AUDIT:REP-NESTED-REPLY
FTP:AUDIT:REP-BINARY-DATA
FTP:AUDIT:REQ-BINARY-DATA
FTP:AUDIT:BINARY-DATA-FOLDER

FTP:COMMAND

FTP:COMMAND:FTP-FS-COMMAND
FTP:COMMAND:PLATFTP-CD-DOS
FTP:COMMAND:WS-FTP-REST
FTP:COMMAND:3CDAEMON-PATH-DISCL
FTP:COMMAND:SYMLINK
FTP:COMMAND:SITE-CMD-INJ
FTP:COMMAND:GET-CMD-DIR-TRAV
FTP:COMMAND:SLIMFTP-LIST
FTP:COMMAND:PUT-CMD-DIR-TRAV
FTP:COMMAND:GET-CMD-DIR-TRAV-2
FTP:COMMAND:CTRL-CHAR
FTP:COMMAND:WINFTP-LIST-CMD-BO
FTP:COMMAND:MULTIPLE-CMD-DIRTRA
FTP:COMMAND:MULTIPLE-OF
FTP:COMMAND:STOR-RHOSTS
FTP:COMMAND:SITE-EXEC
FTP:COMMAND:WS_FTP-CMD-BO
FTP:COMMAND:MALICIOUS-CHARS
FTP:COMMAND:VICFTPS-DOS

FTP:DIRECTORY

FTP:DIRECTORY:FTP-REQ-DIR-TRAV
FTP:DIRECTORY:DOT-DOT
FTP:DIRECTORY:DOT-PCT-20-DOT
FTP:DIRECTORY:CISCOFTP-OF
FTP:DIRECTORY:TILDE-ROOT

FTP:DOS

FTP:DOS:NULL-CRED
FTP:DOS:XM-NLST-NEG
FTP:DOS:VSFTPD-STAT
FTP:DOS:FTPDMIN-LIST-CMD
FTP:DOS:VSFTPD-CONNECTION
FTP:DOS:GOOGLE-CHROME-DOS
FTP:DOS:MACOSX-FTPD
FTP:DOS:MUL-FTP-DOS
FTP:DOS:MS-IIS-WILDCARD
FTP:DOS:GEN-GLOB-DOS

FTP:EXPLOIT

FTP:EXPLOIT:BOUNCE-ATTACK
FTP:EXPLOIT:ILLEGAL-PORT
FTP:EXPLOIT:SYNTAX-ERROR
FTP:EXPLOIT:WIN32-WFTPD-BOF
FTP:EXPLOIT:GLFTPD-KAKAKA
FTP:EXPLOIT:FTPBIN-WRITEABLE
FTP:EXPLOIT:TYPSOFT-DOS
FTP:EXPLOIT:ZYXEL-CONF-GET
FTP:EXPLOIT:OPENFTPD-MSG-FS
FTP:EXPLOIT:WSFTP-FMT-STR
FTP:EXPLOIT:CA-FTP-LIST-PASV
FTP:EXPLOIT:VERMILLION-PORT-OF
FTP:EXPLOIT:MOD-INCLUDE-BOF
FTP:EXPLOIT:LEAPFTP-CLI-BO

FTP:EXT

FTP:EXT:DOT-EXEC
FTP:EXT:DOT-PDF

FTP:FILE

FTP:FILE:SPACE.ASP
FTP:FILE:STOR
FTP:FILE:RETR
FTP:FILE:FREEFLOAT-AUTH-BYPASS

FTP:LUKEMFTP

FTP:LUKEMFTP:URG-RELOGIN

FTP:MS-FTP

FTP:MS-FTP:MSFTPSVC-DOS
FTP:MS-FTP:MSFTPSVC-EXEC
FTP:MS-FTP:IIS7-5-DOS
FTP:MS-FTP:STAT-GLOB
FTP:MS-FTP:IIS-BOF
FTP:MS-FTP:MSFTPSVC-DOS-1

FTP:OVERFLOW

FTP:OVERFLOW:SITESTRING-2-LONG
FTP:OVERFLOW:LINE-TOO-LONG
FTP:OVERFLOW:PATH-TOO-LONG
FTP:OVERFLOW:PASS-TOO-LONG
FTP:OVERFLOW:USERNAME-2-LONG
FTP:OVERFLOW:GUILDFTP-HEAP
FTP:OVERFLOW:MS-IE-FTP-RES-MC
FTP:OVERFLOW:K4FTP-OF1
FTP:OVERFLOW:PCMAN-STOR-BOF
FTP:OVERFLOW:WFTPD-SIZE
FTP:OVERFLOW:S2C-PATH-OF
FTP:OVERFLOW:FREEFLOAT-MULTICMD
FTP:OVERFLOW:FREE-FTPD-PASS
FTP:OVERFLOW:REST-INT-OF
FTP:OVERFLOW:EASY-FTP-OF
FTP:OVERFLOW:MUL-FTP-MKDOF
FTP:OVERFLOW:WINFTP-DATA-OF
FTP:OVERFLOW:ASCII-WRITE
FTP:OVERFLOW:OPENBSD-FTPD-GLOB
FTP:OVERFLOW:CMD-OF
FTP:OVERFLOW:CMD-NOOP-SLED
FTP:OVERFLOW:TYPSOFT-SERVER
FTP:OVERFLOW:SAMI-LIST-CMND-BO
FTP:OVERFLOW:UPLUS-MULTI-CMDS
FTP:OVERFLOW:XLINK-CLIENT
FTP:OVERFLOW:WFTPD-MKD-OVERFLOW
FTP:OVERFLOW:WUBSD-SE-RACE
FTP:OVERFLOW:PATH-LINUX-X86-3

FTP:PABLO-FTP

FTP:PABLO-FTP:FORMAT-STRING

FTP:PASSWORD

FTP:PASSWORD:BRUTE-FORCE
FTP:PASSWORD:PLUS
FTP:PASSWORD:H0TB0X
FTP:PASSWORD:WH00T
FTP:PASSWORD:LRKR0X
FTP:PASSWORD:SATORI
FTP:PASSWORD:ROOT
FTP:PASSWORD:COMMON-PASSWD
FTP:PASSWORD:USER-DICT
FTP:PASSWORD:DEFAULT-USERNM-PW
FTP:PASSWORD:FTPPASS-BLUESKIES

FTP:PROFTP

FTP:PROFTP:USER-DOS
FTP:PROFTP:SIZE-DOS2
FTP:PROFTP:OFF-BY-ONE
FTP:PROFTP:MOD-SQL-HEAP-OF
FTP:PROFTP:PROFTP-FS-MKDIR
FTP:PROFTP:REMOTE-FILE-COPY
FTP:PROFTP:OVERFLOW1
FTP:PROFTP:PPC-FS2

FTP:REQERR

FTP:REQERR:REQ-TOO-MANY-ARGS
FTP:REQERR:REQ-MISSING-ARGS
FTP:REQERR:GNULS-WIDTH-DOS

FTP:RPLERR

FTP:RPLERR:CUTEFTP-OF

FTP:SERVU

FTP:SERVU:STOU-DOS
FTP:SERVU:CHMOD-OVERFLOW
FTP:SERVU:MDTM-OVERFLOW
FTP:SERVU:RNTO-TRAV
FTP:SERVU:LIST-OVERFLOW

FTP:USER

FTP:USER:ACFTP-BAD-LOGIN
FTP:USER:ANONYMOUS
FTP:USER:FORMAT-STRING
FTP:USER:IRIX-DEF-ACCT
FTP:USER:ROOT
FTP:USER:FREEBSD-OFF-BY-ONE-MC

FTP:VULN

FTP:VULN:SERVU-FTP-BO
FTP:VULN:SERV-U-FTP-5-0-0-6
FTP:VULN:SERV-U-FTP-4-2
FTP:VULN:WS-FTP-4-0-2
FTP:VULN:SERV-U-FTP-2-6
FTP:VULN:WS-FTP-5-0-4

FTP:WS-FTP

FTP:WS-FTP:WS-FTP-COMM-OF
FTP:WS-FTP:CPWD
FTP:WS-FTP:WS-FTP-COMM-OF-1

FTP:WU-FTP

FTP:WU-FTP:SETPROCTITLE
FTP:WU-FTP:SITE-OF
FTP:WU-FTP:IREPLY-FS
FTP:WU-FTP:FTPD-BSD-X86
FTP:WU-FTP:GLOBARG
FTP:WU-FTP:WUFTPD-FMT-STR
FTP:WU-FTP:LINUX-OF
FTP:WU-FTP:OFFBYONE-BOF

GOPHER

GOPHER:IE-GOPHER-OF

GOPHER:INVALID

GOPHER:INVALID:PORT
GOPHER:INVALID:DOC-TYPE
GOPHER:INVALID:NST-REQ
GOPHER:INVALID:EOL
GOPHER:INVALID:TRUNC-LINE

GOPHER:OVERFLOW

GOPHER:OVERFLOW:HOST
GOPHER:OVERFLOW:SELECTOR
GOPHER:OVERFLOW:DISPLAY
GOPHER:OVERFLOW:LINE

HTTP

HTTP:INFO-LEAK-CC
HTTP:INFO-LEAK-SSN
HTTP:TOO-MANY-PARAMETERS
HTTP:SCRIPT-INJ-EXP-84
HTTP:JOOMLA-CMS-ACE
HTTP:EK-MUL-SUCCESSFUL-REDIR1
HTTP:EK-ANGLER-URI-STRUCT
HTTP:SCRIPT-INJ-EXP-99
HTTP:SUSP-HDR-REDRCT-EXP-101
HTTP:LOCALHOST-ON-INTERNET1
HTTP:RUBYONRAILS-XMLYAML-RCE1
HTTP:CVE-2014-6332-EXP-04
HTTP:GD-GRAPHICS-PNG1
HTTP:SUSP-HDR-REDRCT-EXP-47
HTTP:EK-KAIXIN-LANDING-PAGE1
HTTP:WORDPRESS-W3PLUGIN-RCE1
HTTP:INTEGARD-PASSWORD-BOF
HTTP:SONICWALL-GMS-RCE1
HTTP:JAVA-UPDATE-RCE
HTTP:SUSP-HDR-REDRCT-EXP-80
HTTP:MAL-REDIRECT-EXP-79
HTTP:EMBEDDED-IFRAME-REDIR
HTTP:EK-FIESTA-PD
HTTP:SCRIPT-INJ-EXP-48
HTTP:REAL-DESCBO
HTTP:SCRIPT-INJ-EXP-102
HTTP:SUN-WEBDAV-FD
HTTP:SUSP-HDR-REDRCT-EXP-59
HTTP:ISAPI-RSA-WEB
HTTP:SCRIPT-INJ-EXP-81
HTTP:MAL-REDIRECT-EXP-49
HTTP:EK-UNKNOWN-SCRIPT-INJ
HTTP:EK-IMPACT-LP
HTTP:SCRIPT-INJ-EXP-60
HTTP:MAL-REDIRECT-EXP-85
HTTP:MONGOOSE-HTTPD-URI-OF
HTTP:SUSP-HDR-REDRCT-EXP-50
HTTP:EK-ZUPONCIC-LP
HTTP:GONGDA-EK-LAND-PG2
HTTP:MALICIOUS-SESSION-COOKIE
HTTP:REMOTE-URL-IN-VAR
HTTP:PVT-EK-LNDPG4
HTTP:CVE-2015-2442-RCE
HTTP:CVE-2015-2448-RCE
HTTP:SUSP-HDR-REDRCT-EXP-92
HTTP:TELE-EK-DL4
HTTP:MAL-REDIRECT-EXP-52
HTTP:SCRIPT-INJ-EXP-51
HTTP:MULTI-EK-PAYLOAD-CALC3
HTTP:SUSP-HDR-REDRCT-EXP-53
HTTP:EMBED-IFRAMEINJ-TOOL
HTTP:MUL-EK-EXE
HTTP:SUN-DIGEST-OF
HTTP:MUL-EK-SILVERLIGHT-DL
HTTP:MUL-EK-PAYLOAD-DL
HTTP:HITMAN-EK-PAYLOAD
HTTP:CRITX-EK
HTTP:BLEEDINGLIFE-EK-OB
HTTP:COTTONCASTLE-EK-DL
HTTP:EK-ANGLER-LP-DETECTED
HTTP:EK-SCANBOX-ENUM
HTTP:BLEEDINGLIFE-EK-OB1
HTTP:EK-CK-MAL-JS-PACKER
HTTP:EK-ANGLER-LP-1
HTTP:NUCLEAR-OUTBOUND-PR
HTTP:EK-ANGLER-LP4
HTTP:EK-GONGDA-LP
HTTP:EK-ANGLER-LP
HTTP:EK-ANGLER-LP2
HTTP:EK-ANGLER-FLASH-DOWNLOAD5
HTTP:EK-NUCLEAR-LP3
HTTP:EK-ANGLER-LP5
HTTP:OPENX-AD-SERVER-PHP-CE
HTTP:MUL-EXPLOIT-KIT-INFO-EXE
HTTP:MAL-REDIRECT-EXP-97
HTTP:GOON-EK-LP
HTTP:EASYLAN-REG-BOF
HTTP:XDOMAINXML
HTTP:EK-STYX-LP-3
HTTP:SUSP-HDR-REDRCT-EXP-86
HTTP:SWEETORANGE-EK-DL
HTTP:DFIND-PROBE
HTTP:YOUNGZSOFT-MAILCOM-BO
HTTP:WEBDAV-FS
HTTP:SAP-MGT-CON-OSEXEC
HTTP:NUCLEAR-OUTBOUND-CONN
HTTP:EK-TOPIC-OUTBOUND-C2
HTTP:EK-DOTKACHEF-ZEROACCESS
HTTP:NEUTRINO-EK-REDIR
HTTP:HIMAN-EK-DL
HTTP:X2O-EK-LN-PAGE
HTTP:CVE-2014-1815-RCE
HTTP:CVE-2014-0287-RCE
HTTP:SCRIPT-INJ-EXP-75
HTTP:EK-MAGNITUDE-IE-REQ
HTTP:SAKURA-EK-REDIR
HTTP:CVE-2014-0288-RCE
HTTP:EK-CRIMEBOSS-DA
HTTP:CVE-2015-0019-RCE
HTTP:EK-CRIMEBOSS-PEXEC
HTTP:CVE-2015-2557-RCE
HTTP:CVE-2015-0099-RCE
HTTP:CVE-2015-0081-RCE
HTTP:CVE-2015-312-RCE
HTTP:CVE-2015-0063-RCE
HTTP:EK-STYX-LP4
HTTP:CVE-2014-2795-RCE
HTTP:VLCFS
HTTP:MAL-REDIRECT-EXP-76
HTTP:CVE-2015-0053-RCE
HTTP:MAL-REDIRECT-EXP-70
HTTP:EK-CRIMEBOSS-JED
HTTP:SKYPE-EZPMUTILS
HTTP:LIGHTSOUT-EK-HDR
HTTP:CVE-2014-1802-RCE
HTTP:EK-FLASHPACK-MAL-DOWNLOAD
HTTP:CLAMAV-ENCRYPT-PDF-MC
HTTP:CVE-2014-6347-RCE
HTTP:CVE-2014-6369-RCE
HTTP:EK-CRIMEBOSS-RA
HTTP:EK-BLACKHOLE-V2-LP1
HTTP:CVE-2014-1795-RCE
HTTP:EK-STYX-LP
HTTP:CVE-2011-0033-RCE
HTTP:EK-NUCLEAR-ADOBE-FLASH-1
HTTP:CVE-2014-0282-RCE
HTTP:CVE-2014-4141-RCE
HTTP:IFRAME-EK-REDIR5
HTTP:EK-FLASHPACK-JAVA-V6
HTTP:EK-STYX-OUT-CONN
HTTP:IFRAME-EK-REDIR4
HTTP:SUSP-HDR-REDRCT-EXP-71
HTTP:HELLO-EK-XP
HTTP:CVE-2015-2513-RCE
HTTP:IFRAME-EK-REDIR3
HTTP:CVE-2014-0283-RCE
HTTP:EK-CRITX-EXECUT-REQ
HTTP:STATIC-SERVER-BOF
HTTP:LIGHTSOUT-EK-DL
HTTP:DLINK-CMD-RCE
HTTP:SCRIPT-INJ-EXP-93
HTTP:SOLARWINDS-POLICYBYPASS
HTTP:ELASTICSEARCH-REST-ACE
HTTP:IFRAME-EK-REDIR6
HTTP:SUN-JAVA-SYSTEM-WEBDAV-OF
HTTP:ASC-TIMETABLES-SUBJECT-BOF
HTTP:MAL-URL-REQUEST-2
HTTP:EK-MUL-LP-SS
HTTP:HITMAN-EK-LP-FLASH
HTTP:SUSP-HDR-REDRCT-EXP-77
HTTP:EK-HELLO-LIGHTOUT-LP
HTTP:MAL-URL-REQUEST-1
HTTP:RANDOMIZATION-ENCODIN2
HTTP:HITMAN-EK-POST
HTTP:MAILCHIMP-PLUGIN-PHP-CE
HTTP:EK-IFRAMER-INJ-SS
HTTP:EK-SWEET-ORANGE-LP4
HTTP:EK-NUCLEAR-ORACLE-JAVA-1
HTTP:INFINITY-EK-LP1
HTTP:G01PACK-EK-REDIR
HTTP:EK-DOTKACHEF-REDIR
HTTP:RANDOMIZATION-ENCODIN3
HTTP:X2O-EK-LAND-PG
HTTP:MAL-REDIRECT-EXP-100
HTTP:ADOBE-ROBOHELP-FILE-UPLOAD
HTTP:MUL-EK-IFRAME
HTTP:WIRESHARK-MPEG-BOF1
HTTP:RANDOMIZATION-ENCODIN4
HTTP:EK-SAKURA-PDF-DOWN
HTTP:MUL-EK-XOR
HTTP:X2O-EK-LAND-PG3
HTTP:SYMANTEC-EP-POLICY-BYPAS
HTTP:MICROSOFT-ASPNET-POST-DOS
HTTP:EK-DRIVEBY-DWNLD
HTTP:EK-SAKURA-JAR
HTTP:EK-CRITX-PR
HTTP:MAL-URL-REQUEST-3
HTTP:JENKINS-XSTREAM-EXEC
HTTP:SOLARWINDS-AUTH-BYPASS
HTTP:STYX-EK-PE-DL
HTTP:EK-SAKURA-LT
HTTP:EK-CRIMEPACK-DR
HTTP:APPLE-QUICKTIME-MC
HTTP:ANGLER-EK-LP1
HTTP:WP-FGALLERY-MAL-FILE-POST
HTTP:SAKURA-EK-PAYLOAD-DL
HTTP:MULTI-EK-PAYLOAD-CONTACTS2
HTTP:SCRIPT-INJ-EXP-87
HTTP:APPLE-SAFARI-BYPASS
HTTP:SAKURA-EK-EXP-DL
HTTP:EASYLAN-REG-BOF1
HTTP:EK-ANGLER-JAVA1
HTTP:FIREFOX-XDOMAIN-INFODISC
HTTP:MULTI-EK-PAYLOAD-CALC
HTTP:EK-NUCLEAR-OUT-JAR-REQ
HTTP:HP-PRINTER-INFO-DISCLOSUR1
HTTP:EK-ELEANORE-PR
HTTP:EK-GLAZUNOV-OUT-JNLP
HTTP:MS-VBSCRIPT-UAF-RCE
HTTP:INFINITY-EK-PAYLOAD-DL
HTTP:EK-SAKURA-JAR-DOWN-DET
HTTP:GLAZUNOV-EK-DL
HTTP:HITMAN-EK-PAYLOAD2
HTTP:SAKURA-EK-OUT
HTTP:CVE-2013-2551-EXP-18
HTTP:WINAMP-SKIN-DOWNLOAD
HTTP:MULTI-EK-PAYLOAD-ABOUT5
HTTP:TELETUBBIES-EK-2
HTTP:REGIN-CNC-TRAFFIC
HTTP:TELETUBBIES-EK2
HTTP:EK-MIULT-LP-SS
HTTP:GOON-EK-EXE
HTTP:ORACLE-JRE-INSECURE-LOAD
HTTP:EK-TELETUBBIES-SEC
HTTP:SYBASE-AGSOAP-EXE-BOF
HTTP:MS-LYNC-SERVER-RCE
HTTP:EK-CRITX-JAVA-REQ
HTTP:EK-CRITX-REDIRECT
HTTP:CVE-2015-0085-RCE
HTTP:CVE-2013-2551-RCE
HTTP:DOURAN-ARB-FILE-DL
HTTP:GOON-EK-LP1
HTTP:DLINK-DIR605L-CAPTCHA-BOF1
HTTP:SPL2-EK-LP
HTTP:SPL2-EK-DL
HTTP:TELE-EK-DL5
HTTP:CVE-2014-6332-RCE
HTTP:ADVANTECH-DASHBRD-FILEUPLD
HTTP:MAGNITUDE-EK-RDIR
HTTP:HITMAN-PAYLOAD-EK
HTTP:GLAZUNOV-EK-LP
HTTP:MUL-EXPLOIT-KIT-CALC-EXE
HTTP:EK-ANGLER-FLASH-EXPLOIT
HTTP:EK-ANGLER-FLASH
HTTP:EK-NUCLEAR-FLASH-DWNLD
HTTP:ALTNWADMIN
HTTP:HP-PRINTER-INFO-DISCLOSURE
HTTP:EFS-FILE-SERVER-BO
HTTP:ADOBE-FLASH-PLAYER-BO
HTTP:CVE-2014-4132-RCE
HTTP:UBIQUITI-AIROS-CE
HTTP:BH-COOL-EK-LAND-PG
HTTP:CNT-IFRAME-RDIR
HTTP:EK-ANGLE-EXPLOIT-DWNLD
HTTP:BH-COOL-EK-LANDPG
HTTP:EXPLOIT-KIT-REDIRECTION-PG
HTTP:TELE-EK-DL8
HTTP:SYSAX-SERVER-BOF
HTTP:EK-REDKIT-OBFUS-PE
HTTP:CVE-2014-4137-RCE
HTTP:CVE-2014-6327-RCE
HTTP:MS-IE-MEMORY-CORRUPTION
HTTP:EK-KAIXIN-ATTACK
HTTP:WP-FGALLERY-MAL-FILE-HOST
HTTP:MAL-REDIRECT-EXP-88
HTTP:TELE-EK-DL7
HTTP:TELE-EK-DL6
HTTP:CVE-2014-0515-RCE
HTTP:TELE-EK-DL3
HTTP:MULTIPLE-WEBSER-INFO-LEAK
HTTP:ADOBE-FLASHPLYR-PRIV-ESC
HTTP:LIBREOFFICE-INTEGR-UNDRFLW
HTTP:TELE-EK-DL9
HTTP:TELE-EK-DL10
HTTP:EK-CRIMEBOSS-CONN
HTTP:ISA-AUTH-BYPASS
HTTP:EK-SAKURA-EXP-REQ
HTTP:EK-STYX-LANDPAGE
HTTP:CVE-2014-0285-RCE
HTTP:HP-INSIGHT-DIAGNOSTICS-LFI
HTTP:ANGLER-EK-LP
HTTP:MAL-REDIRECT-EXP-61
HTTP:INOUT-ARTICLE-BASE-CSRF
HTTP:EK-CRIMEBOSS-JAVA-ED
HTTP:EK-ASTRUM-DWNLD-REQ
HTTP:COTTONCASTLE-EK
HTTP:CVE-2014-4087-RCE
HTTP:EK-SCANBOX-EXFILTRATION
HTTP:EK-NUCLEAR-JAR-DWNLD
HTTP:CRITX-EK-LP1
HTTP:BLIFE-MODCALL-4
HTTP:MAMBO-MYSQL-INF-DISCLOSURE
HTTP:EK-ANGLER-FLASH-SHELLCODE
HTTP:EK-CK-LANDING-PAGE
HTTP:BLIFE-EK-MODCALL
HTTP:EK-NUCLEAR-LP-DETECTION
HTTP:EK-HANJUAN-ER
HTTP:EK-ANGLER-IE-SHELLCODE
HTTP:EK-ANGLER-JAVA-SHELLCODE
HTTP:CVE-2014-4082-RCE
HTTP:EK-SCANBOX-ENUM-CD
HTTP:MS-IE-MHTMLFILE-DOS
HTTP:BLEEDINGLIFE-EK
HTTP:ALLATORI-JAVA-OBFUSCATOR
HTTP:MAL-REDIRECT-EXP-94
HTTP:CVE-2014-0284-RCE
HTTP:EK-HANJUAN-LP
HTTP:EK-FLASHPACK-LP
HTTP:NETBSD-TNFTP-CE
HTTP:CVE-2014-4094-RCE
HTTP:LIGHTHTTPD-CONNECTION-DOS
HTTP:ULTRAVNC-VNCLOG-BO
HTTP:ORACLE-ID-MANAGER-REDIREC1
HTTP:EK-NAILED-IE
HTTP:EK-NAILED-LANDING-S2
HTTP:RUBY-GEM-SEMICOLON
HTTP:CVE-2015-2524-PE
HTTP:EK-NEUTRINO-LP
HTTP:EK-SWEETORANGE-LANDPAGE
HTTP:EK-NEUTRINO-LP-3
HTTP:TRENDMICRO-CTRLMGR-SQLINJ
HTTP:EK-NEUTRINO-LP-2
HTTP:EK-IMPACT-LANDPAGE
HTTP:EK-CRIMEBOSS-SETUP
HTTP:EK-CRIMEBOSS-SL
HTTP:CVE-2014-0302-RCE
HTTP:CRITX-EK-OB
HTTP:CVE-2014-0297-RCE
HTTP:EK-CRIMEBOSS-JO
HTTP:ZENOSS-VER-CHECK-RCE
HTTP:EK-DOTKACHEF-INBOUND-JAVA
HTTP:CVE-2014-0312-RCE
HTTP:CVE-2010-0248-RCE
HTTP:CVE-2014-6343-RCE
HTTP:CVE-2014-6337-RCE
HTTP:EK-FLIM-PE-DOWNLOAD
HTTP:EK-CRITX-PDF
HTTP:MANAGENGINE-EVTLG-INF-DISC
HTTP:LAYTON-HELPBOX-AUTH-BYPASS
HTTP:EK-CRITX-DA
HTTP:NAGIOS-GRAPHEXPLORE-CMDINJ
HTTP:MACROCHECK-DOCUMENT
HTTP:EK-REDKIT-LP-1
HTTP:EK-FLASHPACK-PLUGIN-DET
HTTP:EK-CRIX-JAVA-ED
HTTP:EK-KAIXIN-JAVA-CLS-DL
HTTP:EK-IFRAMER-INJECTION-SS
HTTP:EK-NAILED-FIREFOX
HTTP:VLC-ABC-FILE-BOF
HTTP:EK-KAIXIN-ATTACK-VECTOR
HTTP:STATIC-SERVER-BOF1
HTTP:ADOBE-INDESIGN-SOAP-RCE
HTTP:EK-NAILED-RHINO
HTTP:ACMS-ASSETS-INFODISC
HTTP:EK-NUCLEAR-LP
HTTP:FOXIT-FF-URL-STG-BO
HTTP:EK-PORTABLE-EXEC-BAD-DOS
HTTP:FTP-ACTIVEX-CE
HTTP:CVE-2014-4127-RCE
HTTP:EK-CRIMEPACK-CPA
HTTP:RUBYONRAILS-XMLYAML-RCE
HTTP:JOOMLA-WEBRING-RFI
HTTP:CVE-2014-4140-RCE
HTTP:EK-PROPACK-OUTBOUND-CONN
HTTP:EK-ELEANORE-EFR
HTTP:EK-MAGNITUDE-JNLP-REQ
HTTP:EK-RAWIN-OUTBOUND-JAVA-RET
HTTP:EK-STYX-JORG
HTTP:EK-MUL-PAYLOAD-DOWN-1
HTTP:EK-ANGLER-OUT-URL
HTTP:EK-HELLSPAWN-LP
HTTP:EK-NUCLEAR-MS-IE-VULN
HTTP:HANJUAN-EK
HTTP:EK-UNKNOWN-MAL-S1
HTTP:HELLO-EK
HTTP:EK-NUCLEAR-IE-VULN-REQ
HTTP:EK-X20-POST-JAVA-EXPLOIT
HTTP:EK-SWEET-ORANGE-LP
HTTP:CVE-2015-1699-RCE
HTTP:EK-NUCLEAR-ORACLE-JAVA
HTTP:EK-STYX-MAL-REDIR
HTTP:PARALLEL-PLESK-RCE
HTTP:CVE-2015-1727-RCE
HTTP:WIPER-SHAMOON-FILE-DWNLD
HTTP:KORE-EK-JSEXPL-DL
HTTP:NGINX-CHUNKED-BO
HTTP:RESIN-INFO-DISCLOSURE
HTTP:EK-NEUTRINO-OUT-PLUGIN
HTTP:WORDPRESS-W3PLUGIN-RCE
HTTP:SPL2-SILVERLIGHT-PLUG
HTTP:CLANSPHERE-COOKIE-LFI
HTTP:VMWARE-VSPHERE-DOS
HTTP:EK-NUCLEAR-PDF-REQ
HTTP:LOCALHOST-ON-INTERNET
HTTP:EK-MAGNITUDE-FONT-FILE-REQ
HTTP:EK-ANGLER-DOWNLOAD
HTTP:EK-NUCLEAR-POST-JAVA-COMP
HTTP:EK-SWEET-ORANGE-JAR-LP
HTTP:EK-SAKURA-LP-REC
HTTP:EK-STAMP-LP
HTTP:EK-STAMP-MAL-PYLOAD-DL
HTTP:EK-REDKIT-LP
HTTP:EK-STYX-LP1
HTTP:STYX-EK-DL
HTTP:EK-SWEETORAANGE-LP
HTTP:TELE-EK-DL
HTTP:SCRIPT-INJ-EXP-54
HTTP:EK-SAKURA-REDIR-STRUCT
HTTP:EK-CRIMEBOSS-PEDA
HTTP:EK-MULTIPLE-OUTBOUND
HTTP:CVE-2015-1671-RCE
HTTP:EK-CRIMEPACK-PDF
HTTP:EK-MULTIPLE-REDIRECTION-GT
HTTP:EK-CRIMEBOSS-SA
HTTP:EK-MAGNITUDE-ORACLE
HTTP:MANAGENGINE-APP
HTTP:GOON-EK-ENC-DL
HTTP:EK-CRITX-LANDING-PAGE
HTTP:GOON-EK-BIN
HTTP:EK-REDKIT-LP-REDIRECTION
HTTP:AVIRA-SECURE-BCKUP-REG-BOF
HTTP:EK-NEUTRINO-RP-2
HTTP:EXPLOIT-KIT-PROPACK
HTTP:EMC-DPA-EJBSERVLET-RCE
HTTP:EXPLOIT-KIT-JAR-DOWNLOAD
HTTP:EK-NUCLEAR-OUTBOUND-REQ
HTTP:ESTSOFT-ALZIP-MIM-BO1
HTTP:EK-MAGNITUDE-LANDING-PG
HTTP:EXPLOIT-KIT-REDKIT
HTTP:CVE-2014-0286-RCE
HTTP:EK-MAGNITUDE-JAVA
HTTP:EXPLOIT-KIT-STYX-PLU
HTTP:SONICWALL-GMS-RCE
HTTP:CVE-2015-1730-RCE
HTTP:ROBOHELP-SQL-INJ
HTTP:EK-GONGDA-RP
HTTP:EK-CRITX-PG-REDIRECT
HTTP:EXPLOIT-KIT-CONTACTS-EXE
HTTP:DLINK-DIR605L-CAPTCHA-BOF
HTTP:HITMAN-EK-OUT
HTTP:FOXIT-PNG-PDF-BO1
HTTP:BROWSER-WINDOW-INJECTION
HTTP:EXPLOIT-KIT-CRITX-JAVA-V6
HTTP:EK-NUCLEAR-PDF-REQUEST
HTTP:NGINX-CHUNKED-BO1
HTTP:EK-NEUTRINO-RP
HTTP:GD-GRAPHICS-PNG
HTTP:ALTN-SG-OF
HTTP:EK-SIBHOST
HTTP:EK-ORACLE-JAVA-DWNLD
HTTP:EK-NUCLEAR-PD
HTTP:MS-WINDOWS-X509-DOS
HTTP:HELLO-EK-3
HTTP:CVE-2015-1733-RCE
HTTP:EK-TELETUBBIES-SEC-PAYLOAD
HTTP:EK-CRITX-PDF-REQ
HTTP:EK-NAILED-LP-SS
HTTP:JOOMLA-MEDIAMGR-FILEUPLOAD
HTTP:CRITX-EK-FLA
HTTP:HTTP-INVALID-PORT-VALUE
HTTP:HELLO-EK-PAYLOAD
HTTP:SCRIPT-INJ-EXP-72
HTTP:GLPI-INSTALLPHP-RCE
HTTP:FIREFOX-IDN-SPOOF
HTTP:MAL-REDIRECT-EXP-73
HTTP:EK-DOTKACHEF-RMAYANA
HTTP:EK-SWEET-ORANGE-STRUCT-LP
HTTP:BLEEDINGLIFE-EK-FLASH
HTTP:EK-DOTKACHEF-LP
HTTP:EK-TELETUBBIES-PAYLOAD-1
HTTP:EK-TOPIC-OUTBOUND-C1
HTTP:RUBYONRAILS-JSONYAML-RCE
HTTP:EK-SWEET-ORANGE-LP-URI
HTTP:BACKDOOR-UPATRE-UA
HTTP:EK-REDKIT-JAVA-EXPLOIT
HTTP:CA-XOSOFT-XOSOAP
HTTP:EK-DOTKACHEF-JAVA
HTTP:EK-FLASHPACK-JAVA-V7
HTTP:EK-STYX-JOVF
HTTP:EK-REDKIT-LP-REDIR
HTTP:EK-ELEANORE-PDF-PR
HTTP:EK-REDKIT-ENC-BIN
HTTP:EK-PROPACK-REQUEST
HTTP:EK-NAILED-FLASH
HTTP:EK-IMPACT-STAMP-LP
HTTP:EK-MULT-JAVA-PAYLOAD
HTTP:EK-MULT-PAYLOAD-INFO
HTTP:EK-NAILED-JMXBEAN
HTTP:EXPLOIT-KIT-JAR-REDIRECT
HTTP:CVE-2014-0309-RCE
HTTP:HITMAN-EK-OUTBOUND
HTTP:CVE-2014-1755-RCE
HTTP:EK-UNKNOWN-MAL-HOSTILE
HTTP:EXPLOIT-KIT-JAVA-USR-AGENT
HTTP:EK-TOPIC-OUTBOUND-C3
HTTP:EK-TOPIC-OUTBOUND-C4
HTTP:EK-ANGLER-BIN-DWNLD
HTTP:EXPLOIT-KIT-STYX-EXE
HTTP:EK-ANGLER-FLASH-DWNLD
HTTP:EK-FAKE-TRANS-REDIRECT
HTTP:SUSP-HDR-REDRCT-EXP-83
HTTP:HIMAN-EK-DL-2
HTTP:IFRAME-EK-REDIR
HTTP:MAL-REDIRECT-EXP-82
HTTP:EK-NUCLEAR-LP1
HTTP:EK-SWEETORANGE-LP
HTTP:EK-SUSPICIOUS-FILESYSOBJ
HTTP:EK-POST-COMPRO-TASKKILL
HTTP:SWF-CVE-2014-0503-RCE
HTTP:SUSP-HDR-REDRCT-EXP-62
HTTP:EK-SUSPICIOUS-REV-SHELL
HTTP:EK-SUSPICIOUS-TASKKILL
HTTP:EK-CRITX-REDIRECTION-PAGE
HTTP:EK-POST-COMPRO-STRREV
HTTP:RMAYANA-EK-OBFTECH
HTTP:IFRAMER-INJ-DETECTION
HTTP:EK-SET-JAVA-APPLET-LOAD
HTTP:NGINX-RQST-URI-SECBYPASS
HTTP:EK-STYX-REDIRECTION-PAGE
HTTP:WIRELURKER-VRUPDATE
HTTP:WIRESHARK-MPEG-BOF
HTTP:WIRELURKER-SNUPLOAD
HTTP:AUTOCAD-FAS-FILE-EXEC
HTTP:KORE-EL-PAYLOAD-OUT
HTTP:MONKEY-HTTPD-BO
HTTP:ORACLE-ID-MANAGER-REDIRECT
HTTP:CVE-2014-1775-RCE
HTTP:EK-BLEEDINGLIFE-MOD-CALL
HTTP:EK-BLEEDING0LIFE-MOD-CALL2
HTTP:EK-PHOENIX-POST
HTTP:CVE-2014-1765-RCE
HTTP:RANDOMIZATION-ENCODIN1
HTTP:EK-WHITEHOLE-LP
HTTP:ESTSOFT-ALZIP-MIM-BO
HTTP:EK-BLEEDINGLIFE-MOD
HTTP:MANAGENGINE-INF-DISC
HTTP:MANAGENGINE-POL-BYPASS
HTTP:BLIFE-EK-MODCALL1
HTTP:BH-DLEECH-EK-LANDPG
HTTP:C99-SHELL-BACKDOOR
HTTP:CONTENTKEEPER-BENETOOL-CE
HTTP:BLIFE-EK-MODCALL3
HTTP:EK-BLEEDINGLIFE-MOD-CAL
HTTP:OSSIM-COMMAND-EXEC
HTTP:EK-BLEEDINGLIFE-MOD-CALL9
HTTP:EK-BLEEDINGLIFE-MOD-CALL8
HTTP:EK-BLEEDINGLIFE-MOD-CALL11
HTTP:WP-FGALLERY-MAL-FILE-HOST1
HTTP:MICROSYS-BASE64-BO
HTTP:LEXMARK-LIB-FILE-DIR-TRAV
HTTP:NEUTRINO-EK-PLUGDET-PG
HTTP:EK-MUL-JAR-FILE-DROPPED
HTTP:FORTINET-HELLO-MSG-BOF
HTTP:EK-FLASH-DWNLD
HTTP:UNUSUAL-REFERER
HTTP:TREND-MICRO-IWSVA-CMDI
HTTP:EK-ZUPONCIC-ORACLE-JAVA
HTTP:MAGENTO-PAR-AUTH-BYPASS
HTTP:CVE-2014-2801-RCE
HTTP:CVE-2010-3335-RCE
HTTP:EK-RED-DOT-LP1
HTTP:EK-RED-DOT-EXE-RETRI
HTTP:CLAMAV-ENCRYPT-PDF-MC2
HTTP:EXPLOIT-KIT-JDB-LP1
HTTP:EXPLOIT-KIT-JDB-LP
HTTP:CVE-2014-2824-RCE
HTTP:MULTI-EK-REDIR-PAGF
HTTP:EK-SWEET-ORANGE-LP3
HTTP:IMAGEMAGICK-COMM-INJ
HTTP:MULTI-EK-LAND-PAGE
HTTP:PHPWIKI-PLOTICUS-ACE
HTTP:CARBERP-BACKDOOR-RCE
HTTP:EK-ANGLER-OBFU-FLASH1
HTTP:EK-SWEET-ORANGE-LP2
HTTP:HP-SITESCOPE-INF-DISC
HTTP:XML-EXTERNAL-ENTITY-INJ
HTTP:DLINK-AUTHENTICATION-BO
HTTP:OPENMEDIAVAULT-AUTHEN-ACE
HTTP:VMTURBO-OS-COMM-INJ
HTTP:IFRAMER-EK-EMBEDJS
HTTP:SUSP-HDR-REDRCT-EXP-74
HTTP:MANAGENGINE-EVENTLOG-CSRF
HTTP:EK-BLACKHOLE-LP
HTTP:MAXTHON-HISTORY-XSS
HTTP:LIGHTSOUT-EK-1
HTTP:SUSP-HDR-REDRCT-EXP-65
HTTP:SCRIPT-INJ-EXP-63
HTTP:EK-ANGLER-RELAY
HTTP:PVT-EK-LANDPG3
HTTP:ADOBE-FLASHPLYR-PRIV-ESC1
HTTP:EK-NUCLEAR-OUTBOUND
HTTP:EK-REDKIT-LP2
HTTP:SQUID-HEADER-VALUE-DOS
HTTP:EK-MUL-SUCCESSFUL-REDIR
HTTP:GONG-DA-EK-JAVAREQ
HTTP:LIGHTSOUT-EK-2
HTTP:ATLASIAN-JIRA-DIR-TRAVER
HTTP:GONGDA-EK-REQ1
HTTP:MS-DOT-NET-HEAP-CORRUPT
HTTP:MAL-REDIRECT-EXP-64
HTTP:SUSP-HDR-REDRCT-EXP-68
HTTP:IFRAMER-IFRAMEINJ-EK
HTTP:EK-NUCLEAR-SPOOFED-HOST
HTTP:EK-UNIX-BACKDOOR-CDORKED
HTTP:KORE-EK-LANDPG-3
HTTP:SCRIPT-INJ-EXP-66
HTTP:KORE-EK-LANDPG
HTTP:CVE-2014-4080-RCE
HTTP:EK-NECLEAR-OBFU-FILE
HTTP:MICROSOFT-ASPNET-POST-DOS1
HTTP:EK-FLASHPACK-SAFE-CRITX
HTTP:WINAMP-WLZ-BO1
HTTP:EK-COTTONCASTLE-FLASH-OC
HTTP:FOXIT-PNG-PDF-BO11
HTTP:INTELLITAMPER-DEFER-BO1
HTTP:EK-ANGLER-OUTBOUND-URL
HTTP:EK-NGLER-BROWSER-VER
HTTP:REDKIT-EK-MULTI-REQS
HTTP:EK-FLIM-LP
HTTP:PVR-EK-LANDPG
HTTP:NUCLEAR-EK-BIN-DL
HTTP:ADOBE-INDESIGN-SOAP-RCE1
HTTP:MAMBO-MYSQL-INF-DISCLOSUR1
HTTP:EK-DOTKACHEF-MAL-CAMP
HTTP:EK-MUL-PE-DOWNLOAD
HTTP:EK-COTTONCASTLE-DECRYPT-OR
HTTP:SOLARWINDS-POLICYBYPASS1
HTTP:PVT-EK-OUTBOUND-REQ
HTTP:EK-COTTONCASTLE-JAVA-CONN
HTTP:FORTINET-HELLO-MSG-DOS
HTTP:CVE-2015-0309-RCE
HTTP:TRENDMICRO-FMT-STR
HTTP:SCRIPT-INJ-EXP-69
HTTP:MICROSOFT-IE-USEAFTERFREE
HTTP:REDKIT-EK-JAVACLASS-REQ
HTTP:SUSP-HDR-REDRCT-EXP-95
HTTP:REDKIT-EK-5DIGIT-APPLET
HTTP:EK-RIG-DGA-REQ
HTTP:EK-NUCLEAR-LP2
HTTP:EK-NUCLEAR-FLASH-FILE1
HTTP:EK-COTTONCASTLE-JAVA-OC
HTTP:EK-URI-MALREQ
HTTP:CRITX-EK-JAVA-EXPL-REQ
HTTP:EK-STAMP-PE-DOWNLOAD
HTTP:EK-FLASHPACK-SAFE-JAR
HTTP:EK-ANGLER-FLASH-DOWNLOAD3
HTTP:SYMANTEC-EP-POLICY-BYPAS1
HTTP:EK-ANGLER-LP3
HTTP:EMBED-IFRAME-REDIR-EK2
HTTP:CVE-2014-4124-RCE
HTTP:CVE-2011-0036-RCE
HTTP:CRIMEPACK-EK-LANDPG
HTTP:GOON-INFIN-EK-IFRAME
HTTP:SCADA-WEB-INTERFACE-DOS
HTTP:EK-RIG-MS-SILVERLIGHT-REQ
HTTP:CVE-2015-1666-RCE
HTTP:REDKIT-EK-5DIGIT-REQ
HTTP:WIRELURKER-VRUPDATE1
HTTP:EK-FIESTA-REDIRECTION
HTTP:FOXIT-PNG-PDF-BO
HTTP:CVE-2011-0042-RCE
HTTP:EK-NUCLEAR-OUTBOUND-STR
HTTP:CVE-2010-3972-RCE
HTTP:CVE-2011-0032-RCE
HTTP:SOFOSFO-EK-PLUGIN
HTTP:CRIMEBOSS-EK-REDIR2
HTTP:REGIN-CNC-TRAFFIC1
HTTP:HPEV-RCI
HTTP:REDKIT-EK-PAYLOAD
HTTP:CVE-2011-0035-RCE
HTTP:CVE-2015-1753-RCE
HTTP:CRIMEBOSS-EK-OUTCONN3
HTTP:SAKURA-EK-PAY
HTTP:SUN-DIGEST-OF1
HTTP:STAMP-EK-LP
HTTP:CRIMEBOSS-EK-OUTCONN
HTTP:CVE-2014-6360-RCE
HTTP:EK-NUCLEAR-JAVA-REQ
HTTP:EK-NUCLEAR-LAND-PG
HTTP:MS-MDAC-RCE1
HTTP:CVE-2015-1709-RCE
HTTP:STAMP-EK-BIN
HTTP:STAMP-EK-JAR
HTTP:MAL-REDIRECT-EXP-55
HTTP:SCRIPT-INJ-EXP-57
HTTP:EK-ANGLER-JAVA-REQ
HTTP:EK-HELLSPAWN-JAVA-REQ
HTTP:CRITX-EK-JAVA-DL
HTTP:EK-BLEEDINGLIFE-MOD-C12
HTTP:PCAP-FORMATSTR-GENERIC
HTTP:CRITX-EK-PDF-DL
HTTP:EK-BLEEDINGLIFE-MOD-CALL10
HTTP:SIBHOST-EK-JAR-DL
HTTP:KASPERSKY-URI-PARSING-DOS1
HTTP:CVE-2014-6349-RCE
HTTP:MUL-EXPLOIT-KIT-ABOUT-EXE
HTTP:CRITX-EK-PE-DL
HTTP:INFINITY-EK-LP
HTTP:REALTEK-MEDIAPLAYER-PLA-B1
HTTP:EXPLOIT-KIT-CRITX-JAVA-V7
HTTP:EK-NUCLEAR-ORACLE-JAR-FILE
HTTP:GOOGLE-SKETCHUP-BMP-BO
HTTP:EXPLOIT-KIT-CRITX-PDF
HTTP:SUSP-HDR-REDRCT-EXP-56
HTTP:CVE-2011-0101-RCE
HTTP:CVE-2014-6357-RCE
HTTP:MAL-REDIRECT-EXP-58
HTTP:LANDESK-REMOTE-FILE-INC
HTTP:SPRING-XMLENTITY-INFODISC
HTTP:EK-NUCLEAR-MS-SILVERLIGH
HTTP:EK-NUCLEAR-PAYLOAD-REQ
HTTP:ANGLER-EK-RD
HTTP:JDB-EK-LANDPAGE
HTTP:CVE-2014-6375-RCE
HTTP:EK-ANGLER-JAVA
HTTP:EK-SCANBOX-EXFILTER1
HTTP:NEUTRINO-EK-SB
HTTP:REDKIT-EK-LANDPG4
HTTP:EK-MULTIPLE-FLASH
HTTP:CVE-2014-6329-RCE
HTTP:SONICWALL-GMS-RCE-2
HTTP:CVE-2011-0029-RCE
HTTP:CVE-2014-6364-RCE
HTTP:CVE-2015-0038-RCE
HTTP:CVE-2011-0978-RCE
HTTP:SUSP-HDR-REDRCT-EXP-44
HTTP:EK-ANGLER-RELAY-TRAFFIC
HTTP:CVE-2014-0515-EXP-38
HTTP:CVE-2013-2551-EXP-39
HTTP:NTOP-BASIC-AUTHORIZATION1
HTTP:JAVAUA-PE-DL-EK
HTTP:CVE-2013-2551-EXP-36
HTTP:SCRIPT-INJ-EXP-45
HTTP:MAL-REDIRECT-EXP-43
HTTP:TDS-REDIR-EK
HTTP:CVE-2011-0098-RCE
HTTP:MAXTHON-HISTORY-XSS1
HTTP:NAGIOS-CONFMGR-SQLINJ
HTTP:DIGIUM-ASTERISK-BO1
HTTP:JAVA-JSP-SRC-CODE-DISC1
HTTP:CVE-2014-6332-MAL-2
HTTP:MS-TELNET-INSECURE-LOADING
HTTP:DLL-REQ-VIA-WEBDAV
HTTP:SCRIPT-INJ-EXP-42
HTTP:CVE-2011-0979-RCE
HTTP:INTEGARD-VERSION-CHECK1
HTTP:PFSENSE-ZONE-CSS
HTTP:DIGIUM-ASTERISK-BO
HTTP:SCRIPT-INJ-EXP-78
HTTP:PHPWIKI-PLOTICUS-ACE1
HTTP:SQUID-BUMP-DOS
HTTP:EK-FIESTA-FLASH-DWLD
HTTP:SCRIPT-INJ-EXP-96
HTTP:WHITEHOLE-EK-JAVA-DL
HTTP:MUL-EXPLOIT-KIT-README-EXE
HTTP:CVE-2014-6332-EXP-31
HTTP:CVE-2013-2551-EXP-33
HTTP:BH2-EK-URL-STRUCT
HTTP:CVE-2015-0042-RCE
HTTP:CVE-2014-0515-EXP-32
HTTP:CVE-2014-6332-EXP-34
HTTP:WIRELURKER-SNUPLOAD1
HTTP:NOVELL-NETIQ-MOD-POLBYPAS1
HTTP:MANAGENGINE-APP1
HTTP:SUSP-HDR-REDRCT-EXP-41
HTTP:OFFICESCAN-CGIRECVFILE1
HTTP:DLL-REQ-VIA-WEBDAV1
HTTP:CVE-2015-0045-RCE
HTTP:VLCFS1
HTTP:EK-SWEETORANGE-OC
HTTP:REDKIT-EK-JAVA-EXPLOIT-DL
HTTP:CVE-2014-0515-EXP-35
HTTP:MULTI-EK-32ALPHA-REQ
HTTP:TRENDMICRO-CTRLMGR-SQLINJ1
HTTP:MAGNITUDE-EK-LAND
HTTP:VMWARE-VSPHERE-DOS1
HTTP:MS-IE-MEMORY-CORRUPTION1
HTTP:FIREFLY-MEDIA-SERVER-DOS1
HTTP:HP-SITESCOPE-INF-DISC1
HTTP:JAVA-EXPRESS-HTML-INJ1
HTTP:MS-DOT-NET-HEAP-CORRUPT1
HTTP:BROWSER-WINDOW-INJECTION1
HTTP:MS-TELNET-INSECURE-LOADIN1
HTTP:EK-FIESTA-JAVA-DWNLD
HTTP:EK-FIESTA-ADOBE-DWNLD
HTTP:ALTNWADMIN11
HTTP:MS-WIN-FOLDER-GUID-CE1
HTTP:WIPER-SHAMOON-FILE-DWNLD1
HTTP:ROBOHELP-SQL-INJ1
HTTP:ACMS-ASSETS-INFODISC1
HTTP:ULTRAVNC-VNCLOG-BO1
HTTP:MS-WINDOWS-HYPERLINK-BO1
HTTP:MS-DOT-NET-XAML-RCE1
HTTP:FTP-ACTIVEX-CE1
HTTP:SUN-GLASSFISH-AUTH-BP1
HTTP:MULTIPLE-WEBSER-INFO-LEAK1
HTTP:FOXIT-FF-URL-STG-BO1
HTTP:EMC-DPA-EJBSERVLET-RCE1
HTTP:AVIRA-SECURE-BCKUP-REG-BO1
HTTP:MAL-REDIRECT-EXP-67
HTTP:IFRAME-EK-REDIR7
HTTP:EK-ANGLER-LANDING-PG
HTTP:JENKINS-CI-SERVER-CE
HTTP:INOUT-ARTICLE-BASE-CSRF1
HTTP:CVE-2013-2551-SUSP-4
HTTP:SCRIPT-INJ-EXP-90
HTTP:SUSP-HDR-REDRCT-EXP-89
HTTP:APPLE-QT-TTD-BO
HTTP:CVE-2014-0306-RCE
HTTP:EK-RIG-OUTBOUND-COM-1
HTTP:NOVELL-NETIQ-EVAL-POLBYPAS
HTTP:STYX-EK-LP2
HTTP:RUBY-GEM-SEMICOLON1
HTTP:SYSAX-SERVER-BOF1
HTTP:XNVIEW-MBM-FILE-BO1
HTTP:GOOGLE-SKETCHUP-BMP-BO1
HTTP:CVE-2015-1652-RCE
HTTP:XML-EXTERNAL-ENTITY-INJ1
HTTP:MS-IE-MHTMLFILE-DOS1
HTTP:MANAGENGINE-INF-DISC1
HTTP:MICROSOFT-WORKS-WKSSS-BO1
HTTP:CVE-2014-8967-RCE
HTTP:W3C-AMAYA-BOF1
HTTP:UNUSUAL-REFERER1
HTTP:WIRESHARK-MPEG-BOF11
HTTP:SAP-MGT-CON-OSEXEC1
HTTP:HP-INSIGHT-DIAGNOSTICS-LF1
HTTP:RESIN-INFO-DISCLOSURE1
HTTP:ADOBE-ROBOHELP-FILE-UPLOA1
HTTP:NGINX-RQST-URI-SECBYPASS1
HTTP:CRIMEBOSS-EK-JAVA-DL2
HTTP:EK-ANGLER-LP-2
HTTP:C99-SHELL-BACKDOOR1
HTTP:INTEGARD-PASSWORD-BOF1
HTTP:FORTINET-HELLO-MSG-DOS1
HTTP:CVE-2014-6332-EXP-40
HTTP:CVE-2015-0039-RCE
HTTP:CVE-2014-0299-RCE
HTTP:SPRING-XMLENTITY-INFODISC1
HTTP:PFSENSE-ZONE-CSS1
HTTP:APPLE-SGI-BOF1
HTTP:XAMPP-REQUEST-FORGERY1
HTTP:IESHIMS-DLL-HIJACK1
HTTP:EK-FIESTA-SILVERLIGHT-DWLD
HTTP:CVE-2013-2551-SUSP-19
HTTP:CVE-2013-3912-RCE
HTTP:EK-RIG-OUTBOUND-COM
HTTP:IESHIMS-DLL-HIJACK
HTTP:CVE-2014-0515-INFCT-21
HTTP:CVE-2014-6332-EXP-01
HTTP:CVE-2014-6332-MAL-59
HTTP:CVE-2014-6332-EXP-03
HTTP:CVE-2014-0515-INFCT-60
HTTP:CVE-2014-6332-MAL-53
HTTP:CVE-2014-6332-EXP-06
HTTP:CVE-2013-2551-EXP-13
HTTP:CVE-2014-0515-INFCT-54
HTTP:CVE-2014-0515-INFCT-57
HTTP:CVE-2013-2551-SUSP-61
HTTP:CVE-2013-2551-SUSP-58
HTTP:CVE-2013-2551-EXP-14
HTTP:CVE-2014-6332-EXP-07
HTTP:CVE-2014-6332-EXP-05
HTTP:CVE-2014-6332-MAL-56
HTTP:CVE-2014-6332-MAL-62
HTTP:CVE-2013-2551-SUSP-55
HTTP:CVE-2014-6332-EXP-09
HTTP:CVE-2014-6332-EXP-08
HTTP:CVE-2014-0515-INFCT-30
HTTP:CVE-2014-6332-MAL-26
HTTP:CVE-2013-2551-SUSP-28
HTTP:CVE-2014-0515-INFCT-27
HTTP:CVE-2014-6332-MAL-23
HTTP:CVE-2013-2551-SUSP-25
HTTP:CVE-2014-6332-MAL-29
HTTP:CVE-2014-0515-INFCT-36
HTTP:CVE-2013-2551-SUSP-22
HTTP:MS-WIN-FOLDER-GUID-CE
HTTP:CVE-2013-2551-SUSP-16
HTTP:CVE-2014-0515-INFCT-9
HTTP:CVE-2014-0515-INFCT-6
HTTP:CVE-2013-2551-SUSP-7
HTTP:CVE-2014-6332-MAL-8
HTTP:CVE-2014-6332-MAL-5
HTTP:CVE-2014-6332-MAL-11
HTTP:CVE-2014-0515-INFCT-12
HTTP:CVE-2013-2551-SUSP-10
HTTP:MAL-REDIRECT-EXP-46
HTTP:CVE-2013-2551-EXP-15
HTTP:CVE-2013-2551-EXP-17
HTTP:CVE-2014-6332-EXP-11
HTTP:CVE-2014-6332-EXP-02
HTTP:CVE-2013-2551-EXP-16
HTTP:CVE-2013-2551-EXP-12
HTTP:CVE-2013-2551-EXP-19
HTTP:CVE-2014-6332-EXP-30
HTTP:CVE-2013-2551-SUSP-37
HTTP:CVE-2013-2551-SUSP-64
HTTP:CVE-2014-6332-MAL-65
HTTP:CVE-2014-6332-MAL-41
HTTP:CVE-2013-2551-SUSP-40
HTTP:CVE-2014-0515-INFCT-42
HTTP:CVE-2013-2551-SUSP-43
HTTP:CVE-2014-0515-INFCT-39
HTTP:CVE-2013-2551-SUSP-52
HTTP:CVE-2014-6332-MAL-38
HTTP:CVE-2014-0515-INFCT-63
HTTP:CVE-2014-6332-MAL-44
HTTP:CVE-2014-0515-INFCT-18
HTTP:CVE-2014-0515-INFCT-15
HTTP:CVE-2014-6332-MAL-35
HTTP:CVE-2014-0515-INFCT-3
HTTP:SUSP-HDR-REDRCT-EXP-98
HTTP:EK-KAIXIN-LANDING-PAGE
HTTP:MS-WORDPERFECT-BOF
HTTP:CVE-2014-0515-EXP-25
HTTP:CVE-2014-0515-EXP-28
HTTP:CVE-2014-0515-INFCT-45
HTTP:CVE-2014-6332-MAL-20
HTTP:CVE-2013-2551-SUSP-13
HTTP:CVE-2013-2551-SUSP-31
HTTP:CVE-2014-6332-MAL-32
HTTP:CVE-2014-0515-EXP-22
HTTP:CVE-2014-0515-EXP-27
HTTP:CVE-2014-6332-MAL-14
HTTP:CVE-2014-0515-EXP-26
HTTP:CVE-2014-0515-INFCT-24
HTTP:CVE-2014-0515-EXP-20
HTTP:CVE-2014-0515-EXP-23
HTTP:CVE-2014-6332-EXP-10
HTTP:CVE-2013-2551-SUSP-1
HTTP:CVE-2014-6332-MAL-17
HTTP:CVE-2014-0515-EXP-24
HTTP:APPLE-SGI-BOF
HTTP:EK-RIG-OUT-COMMUNICATION
HTTP:CVE-2014-6332-MAL-50
HTTP:CVE-2013-2551-SUSP-46
HTTP:CVE-2013-2551-SUSP-49
HTTP:CVE-2014-6332-MAL-47
HTTP:CVE-2014-0515-INFCT-48
HTTP:CVE-2014-0515-INFCT-51
HTTP:CVE-2013-2551-SUSP-34
HTTP:CVE-2014-0515-INFCT-33
HTTP:EITEST-REDIR-EK
HTTP:MS-DOT-NET-HEAP-CORRUPT-1
HTTP:MS-DOT-NET-XAML-RCE
HTTP:WEBSRV-BO-4096
HTTP:SUN-GLASSFISH-AUTH-BP
HTTP:MALJS-REDIR-EK
HTTP:OFFICESCAN-CGIRECVFILE
HTTP:JAVA-UA-EXE-DL
HTTP:MS-DOT-NET-HEAP-CORRUPT-2
HTTP:LIBGD-HEAP-BO
HTTP:NOVELL-NETIQ-MOD-POLBYPAS
HTTP:MAL-REDIRECT-EXP-91
HTTP:JABBER-SERVER-BYPASS
HTTP:RUBYONRAILS-JSONYAML-RCE1
HTTP:JAVA-UPDATE-RCE1
HTTP:EK-RED-SIMPLETDS-GO
HTTP:MS-OUTLOOK-2003-OBJ-SEC-SB
HTTP:MS-WINDOWS-HYPERLINK-BO
HTTP:EK-ANGLER-XTEA-ENYCP-BIN
HTTP:EK-ANGLER-FLASH-REQ
HTTP:JABBER-SERVER-BYPASS1

HTTP:3COM

HTTP:3COM:LOG-CLEAN
HTTP:3COM:CONF-DOWNLOAD
HTTP:3COM:ADMIN-LOGOUT
HTTP:3COM:3COM-PASS-LEAK
HTTP:3COM:OFFICECONNECT

HTTP:AGORA

HTTP:AGORA:DBACCESS
HTTP:AGORA:POSTGRES65
HTTP:AGORA:AUTH

HTTP:APACHE

HTTP:APACHE:MOD-LOG-CONFIG-DOS
HTTP:APACHE:WWWPASSWD-FILE-DISC
HTTP:APACHE:USER-ENUM
HTTP:APACHE:PHP-DOS
HTTP:APACHE:ENCODED-DIRTRAV
HTTP:APACHE:STRUTS-XSLT-FI
HTTP:APACHE:INV-HEADER-DOS
HTTP:APACHE:STRUTS-URIREDIRECT
HTTP:APACHE:MOD-NTLM-BOF1
HTTP:APACHE:WIN32BATCH
HTTP:APACHE:REWRITE-OF
HTTP:APACHE:STRUTS-CI-SECBYPASS
HTTP:APACHE:COUCHDB-UUID-DOS
HTTP:APACHE:WILDCARD-CMD-EXEC
HTTP:APACHE:STRUTS-INCLUDPARAMS
HTTP:APACHE:AXIS-SOAP-DOS
HTTP:APACHE:APACHE-CHUNKREQ-DOS
HTTP:APACHE:NOSEJOB
HTTP:APACHE:STRUTS2-COOKIE-OGNL
HTTP:APACHE:HTTP-SERVER-MOD-DOS
HTTP:APACHE:STRUTS2-OGNL-INJ
HTTP:APACHE:REV-PROXY-EXPLOIT
HTTP:APACHE:HTGREP-HDR
HTTP:APACHE:MOD-CACHE-DOS
HTTP:APACHE:STRUTS2-OGNL-CE
HTTP:APACHE:SERVER-STATUS-PROBE
HTTP:APACHE:RANGE-DOS
HTTP:APACHE:MODRPAF-XFWD-DOS
HTTP:APACHE:MYFACES-DIR-TRAV
HTTP:APACHE:MOD-PROXY-SECBYPASS
HTTP:APACHE:SERVER-MOD-STATS-BO
HTTP:APACHE:MOD-CACHE-DOS-CLT
HTTP:APACHE:MOD-CACHE-DOS-STC
HTTP:APACHE:HTTPD-MODLOG-COOKIE
HTTP:APACHE:STRUTS-RCE
HTTP:APACHE:SCALP
HTTP:APACHE:STRUTS2-PI-RCE
HTTP:APACHE:APR-UTIL-LIB-DOS
HTTP:APACHE:ROLLER-OGNL-RCE
HTTP:APACHE:APR-PSPRINTF-MC
HTTP:APACHE:STRUTS-OGNL-CMDEXEC
HTTP:APACHE:SOLR-FILE-DISC
HTTP:APACHE:STRUTS-SKILLNAME-CE
HTTP:APACHE:RPC-RAVE-INFO-DISC
HTTP:APACHE:CAMEL-XSLT-JCE
HTTP:APACHE:STRUTS-URI-CMDEXEC
HTTP:APACHE:MOVE-DIRTRAV
HTTP:APACHE:STRUTS-RST-DMI-EXEC
HTTP:APACHE:FILEUPLOAD-CNT-TYPE
HTTP:APACHE:STRUTS-OGNL-CE
HTTP:APACHE:FILTER-DISPATCHER
HTTP:APACHE:DAV-SVN-HEAP-OVRFLW
HTTP:APACHE:LDAPFS
HTTP:APACHE:MODPHP-UPLOAD-HOF
HTTP:APACHE:MODPROXY-AJP-DOS
HTTP:APACHE:XSPACE
HTTP:APACHE:BYTE-RANGE-LEAK
HTTP:APACHE:RESIN-WEB-INF
HTTP:APACHE:MOD-ISAPI-RCE1
HTTP:APACHE:MOD-DAV-MERGE-DOS
HTTP:APACHE:STRUTS2DMI-RCE
HTTP:APACHE:APR-DOS
HTTP:APACHE:WEBDAV-PROPFIND
HTTP:APACHE:STRUTS-SECBYPASS
HTTP:APACHE:HTTPD-ERROR-400
HTTP:APACHE:MOD-REWRITE-CMD-EXE
HTTP:APACHE:APACHE-NIO-DOS
HTTP:APACHE:MOD-ISAPI-RCE
HTTP:APACHE:MOD-TCL-FS
HTTP:APACHE:SERVER-MODPROXY-DOS
HTTP:APACHE:LONG-HEADER-DOS

HTTP:AUDIT

HTTP:AUDIT:LENGTH-OVER-2048
HTTP:AUDIT:LENGTH-OVER-4096
HTTP:AUDIT:LENGTH-OVER-1024
HTTP:AUDIT:LENGTH-OVER-256
HTTP:AUDIT:LENGTH-OVER-8192
HTTP:AUDIT:URL
HTTP:AUDIT:INV-HTTP-VER
HTTP:AUDIT:TOO-MANY-HEADERS
HTTP:AUDIT:LENGTH-OVER-512
HTTP:AUDIT:REQ-LONG-UTF8CODE
HTTP:AUDIT:MALICIOUS-FILE-DL-5
HTTP:AUDIT:MALICIOUS-FILE-DL-3
HTTP:AUDIT:MALICIOUS-FILE-DL-4
HTTP:AUDIT:GENERIC-FMT-STR
HTTP:AUDIT:NULL-HREF
HTTP:AUDIT:ROBOTS.TXT
HTTP:AUDIT:UNWISE-CHAR
HTTP:AUDIT:FW1-SCHEME-OF
HTTP:AUDIT:HTTP-VER-1.0
HTTP:AUDIT:HTTP-1.0-HOST-HEADER
HTTP:AUDIT:BINARY-IN-URLENCODE
HTTP:AUDIT:CHUNKED-TRANSFER
HTTP:AUDIT:ACMS-FLV-URLSPOOF
HTTP:AUDIT:PDF-SCIIHEXDECODE
HTTP:AUDIT:UNKNOWN-VERB
HTTP:AUDIT:PDF-SCIIHEXDECODE1
HTTP:AUDIT:MALICIOUS-FILE-DL
HTTP:AUDIT:MALICIOUS-FILE-DL-2
HTTP:AUDIT:MALICIOUS-FILE-DL-1

HTTP:BADBLUE

HTTP:BADBLUE:PROXY-RELAY
HTTP:BADBLUE:MFC-ISAPI-CMD-OF
HTTP:BADBLUE:INVALID-GET-DOS

HTTP:BARRACUDA

HTTP:BARRACUDA:PREV-EXEC

HTTP:BIGBROTHER

HTTP:BIGBROTHER:INFO-DISCLOSURE

HTTP:BROWSER

HTTP:BROWSER:ICQ
HTTP:BROWSER:MOZILLA-DBKEYRANGE
HTTP:BROWSER:URI-OBFUSCATION
HTTP:BROWSER:POLICY-BYPASS
HTTP:BROWSER:FIREFOX-DATA-URI
HTTP:BROWSER:CHROME-JS-ENG-MC

HTTP:CGI

HTTP:CGI:IKONBOARD-BADCOOKIE
HTTP:CGI:LIBCGI-RFP-OVERWRITE
HTTP:CGI:MAGENTO-API-RCE
HTTP:CGI:MONALBUM
HTTP:CGI:INCLUDER-EXEC
HTTP:CGI:CHETCPASSWD-OF
HTTP:CGI:REF-CMD-INJECT
HTTP:CGI:AXIS-EXEC
HTTP:CGI:AXIS-ACCOUNT
HTTP:CGI:SOFTCART
HTTP:CGI:SOJOURN-FILE-VIEW
HTTP:CGI:NAGIOS-CMD-INJ
HTTP:CGI:STORE-ATTEMPT
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
HTTP:CGI:WAYBOARD-FILE-DISCLSR
HTTP:CGI:HASSAN-DIR-TRAVERSAL
HTTP:CGI:INFOSRCH-REMOTE-EXEC
HTTP:CGI:CVSWEB-CGI-SEMICOLON
HTTP:CGI:EXCITE-AT-ADMIN-CGI
HTTP:CGI:EXTROPIA-DIR-TRAVERSAL
HTTP:CGI:CAREY-COMMERCE-DIR-TRV
HTTP:CGI:ALLAIRE-SHELL-ATTEMPT
HTTP:CGI:USERONLINE-LOGLEAK
HTTP:CGI:MONALBUM-INFO
HTTP:CGI:EASYNEWS-ADMIN1
HTTP:CGI:LIBCGI-TUXBR-OF1
HTTP:CGI:BOOZT-CGI-OF
HTTP:CGI:EMUMAIL-INFO-LEAK
HTTP:CGI:HTDIG-INCLUSION
HTTP:CGI:SITESEARCHER-EXEC
HTTP:CGI:TEXIS-INFOPROBE
HTTP:CGI:SMARTSEARCH-EXEC
HTTP:CGI:CPANEL5-GB-EXEC
HTTP:CGI:MAIL-FORM-ACCESS
HTTP:CGI:BATCH-PIPE
HTTP:CGI:FORMMAIL-VULN
HTTP:CGI:TWIKI-REV-CMD-INJ
HTTP:CGI:VIRTUAL-VISION-TRVRSL
HTTP:CGI:GLIMPSE-PIPE
HTTP:CGI:APM-ACC-BYPASS
HTTP:CGI:UBNT-AIROS-CMD-INJ
HTTP:CGI:YABB-DIR-TRAVERSAL
HTTP:CGI:CYBEROFFICE-DB-REQUEST
HTTP:CGI:ROADS-FILE-DISCLOSURE
HTTP:CGI:GLIMPSE-PIPE1
HTTP:CGI:LANDSK-UPLOAD-RCE
HTTP:CGI:GROUNDWORK-MONITOR-CE
HTTP:CGI:EMAIL-VIRTUAL-APP
HTTP:CGI:WEBSCADA3
HTTP:CGI:WEBSCADA
HTTP:CGI:MAGENTO-RCE
HTTP:CGI:APPLE-QT-FILEDISC1
HTTP:CGI:BASH-INJECTION-URL
HTTP:CGI:ZEN-LB-CMD-EXEC
HTTP:CGI:MOVABLE-TYPE-UPGRADE
HTTP:CGI:QUIKSTORE-CFG-ACCESS
HTTP:CGI:SPIDERSALES
HTTP:CGI:BASH-CODE-INJECTION
HTTP:CGI:AWC-XSL-CMD-INJ
HTTP:CGI:TECHNOTE-MAIN-DCLSR
HTTP:CGI:BUGZILLA-SEMICOLON
HTTP:CGI:CTEK-SKYROUTER-EXEC
HTTP:CGI:TWIKI-MAKETEXT-RCE
HTTP:CGI:LITESERV-CGI-DISC
HTTP:CGI:NAGIOS-HISTORY-PRM-BO
HTTP:CGI:NAGIOS-XI-AUTODISC-CMD
HTTP:CGI:SUNPS-IRUNBOOK
HTTP:CGI:ZAMFOO-CMD-INJ
HTTP:CGI:NULL-ENCODING
HTTP:CGI:SCRUTINIZER-CE
HTTP:CGI:SUPERMICRO-BOF
HTTP:CGI:MS-OFFICE-URL-BOF
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE
HTTP:CGI:GENERIC-WEB-APP-CE
HTTP:CGI:LISTSERV-BO
HTTP:CGI:EASY-MB-PRINT
HTTP:CGI:KORWEBLOG-PATHDISC
HTTP:CGI:DLINK-ROUTER-CMD-INJ
HTTP:CGI:ORACLE-RPT-INFOLEAK
HTTP:CGI:ME-DESKTOP-CENT-ADMIN
HTTP:CGI:FAXSURVEY-REMOTE-EXEC
HTTP:CGI:TWIKI-SEARCH-CMD-EXEC
HTTP:CGI:TWIKI-VIEW-EXEC
HTTP:CGI:WEBPALS-EXEC
HTTP:CGI:CDOMAINFREE-RMT-EXEC
HTTP:CGI:RSA-AGENT-BOF
HTTP:CGI:NAGIOS-CORE-DOS
HTTP:CGI:ANYFORM-SEMICOLON
HTTP:CGI:BASH-INJECTION-HEADER
HTTP:CGI:OFFICESCAN-CGI-BO
HTTP:CGI:TEST-CGI
HTTP:CGI:SHELLSHOCK
HTTP:CGI:AWSTATS
HTTP:CGI:ALTAVISTA-TRAVERSAL

HTTP:CGI:BUGZILLA

HTTP:CGI:BUGZILLA:PRIV-UP

HTTP:CGI:PERL

HTTP:CGI:PERL:DUMPENV-PROBE
HTTP:CGI:PERL:WEBHINT-CMD-INJ

HTTP:CHKP

HTTP:CHKP:AUTH-HDR-BOF
HTTP:CHKP:AUTH-FMT-STR

HTTP:CISCO

HTTP:CISCO:SERVLETEXEC
HTTP:CISCO:MARS-JMX
HTTP:CISCO:WIFI-AUTH-DOS
HTTP:CISCO:CISCOWORKS-DIR-TRAV
HTTP:CISCO:IOS-ADMIN-ACCESS
HTTP:CISCO:UNIFIED-XSS
HTTP:CISCO:WIFI-CONTROLLER-DOS
HTTP:CISCO:LINKSYS-WRT54GL-XSS
HTTP:CISCO:LINKSYS-CMD-INJ
HTTP:CISCO:LINKSYS-WRT54GL-CSRF
HTTP:CISCO:LINKSYS-CODE-INJ
HTTP:CISCO:CUCM-DIR-TRAV
HTTP:CISCO:SCANNER-PROBE
HTTP:CISCO:CONTROLLER-CSRF
HTTP:CISCO:SOURCE-CODE-DISC
HTTP:CISCO:ASA-VPN-SEC-BYPASS
HTTP:CISCO:CATALYST-ARB-CMD
HTTP:CISCO:IOS-HTML-INJ
HTTP:CISCO:LINKSYS-APPLY-RCE
HTTP:CISCO:FILEUPLOADSERVLET
HTTP:CISCO:DOWNLOADSERVLET-FU
HTTP:CISCO:PROCESSIMAGESAVE-FU
HTTP:CISCO:UNIFIED-XSS-2
HTTP:CISCO:CSUSERCGI-BOF

HTTP:CISCO:VOIP

HTTP:CISCO:VOIP:STREAM-ID-REQ
HTTP:CISCO:VOIP:PORT-INFO-DOS
HTTP:CISCO:VOIP:PORT-INFO-DOS1
HTTP:CISCO:VOIP:STREAM-ID-DOS

HTTP:COBALT

HTTP:COBALT:CONF-DIR-TRAV
HTTP:COBALT:SEC-REQ-PROBE-2
HTTP:COBALT:SERVICE-DOS
HTTP:COBALT:SEC-REQ-PROBE

HTTP:COLDFUSION

HTTP:COLDFUSION:CFCACHE-MAP
HTTP:COLDFUSION:GETFILE-PROBE
HTTP:COLDFUSION:CF-CLASS-DWLD
HTTP:COLDFUSION:ENV-VAR-OW
HTTP:COLDFUSION:ADMIN-PROBE
HTTP:COLDFUSION:CFM-FILE
HTTP:COLDFUSION:XML-CMD-INJ
HTTP:COLDFUSION:CVE-2013-3336
HTTP:COLDFUSION:CFIDE-AUTHBYPAS
HTTP:COLDFUSION:HEADER-LOG-OF

HTTP:CYCLADES

HTTP:CYCLADES:SAVEUSER-PRIV
HTTP:CYCLADES:CONSOLE-CON

HTTP:DIR

HTTP:DIR:TRAVERSE-DIRECTORY
HTTP:DIR:NOVELL-ZENWORKS
HTTP:DIR:HTTP-HOST-HDR
HTTP:DIR:APACHE-OPENMEETINGS
HTTP:DIR:REPRISE-EDIT-IFPROCESS
HTTP:DIR:WP-UNGALLERY-LFD
HTTP:DIR:HTTP-COOKIE-HDR
HTTP:DIR:MESMP-DIR-TRAV
HTTP:DIR:WINACE-DIR-TRVRS
HTTP:DIR:ORACLE-HYPERION-TRAV
HTTP:DIR:TRAV-ENCODED
HTTP:DIR:DLINK-DNS-DIR-TRAV
HTTP:DIR:MNGE-ENGINE-FILE-DLD
HTTP:DIR:HTTP-ACCEPT-ENCODING
HTTP:DIR:HTTP-ACCEPT-LANG
HTTP:DIR:HTTP-AUTH-HDR
HTTP:DIR:VISUALMINING-NETCHARTS
HTTP:DIR:CA-ERWIN-WEB-PORTAL
HTTP:DIR:HTTP-CONTENT-MD5
HTTP:DIR:HTTP-UA-HDR
HTTP:DIR:HTTP-REFERER-HDR
HTTP:DIR:HTTP-CONT-TYPE
HTTP:DIR:HTTP-ACCEPT-HDR
HTTP:DIR:ADMIN-PATH-TRAVERSAL
HTTP:DIR:HTTP-REQUEST-HDR
HTTP:DIR:HTTP-REQ-URL
HTTP:DIR:MUL-VEN-DIR-TRAV
HTTP:DIR:MANAGEENGINE
HTTP:DIR:CRYSTAL-REPORTS
HTTP:DIR:ENDECA-ETLSERVER-DT
HTTP:DIR:NOVELL-ZENWORKS-TRAV
HTTP:DIR:CISCO-PRIME-DATA-ID
HTTP:DIR:MS-SHAREPOINT
HTTP:DIR:ORACLE-INFO-DISCOVERY
HTTP:DIR:ORACLE-APP-TEST-SUITE
HTTP:DIR:ZIMBRA-SERVER-LDAP
HTTP:DIR:NOVELL-GROUPWSE-DIRTRA
HTTP:DIR:APJS-PORTAL-DIRTRAV
HTTP:DIR:MANAGEENGINE-DIR-TRA
HTTP:DIR:HP-LOADRUNNER-EMU
HTTP:DIR:BARRACUDA-DIRTRAV
HTTP:DIR:PARAMETER-TRAVERSE

HTTP:DOMINO

HTTP:DOMINO:POST-DOS2
HTTP:DOMINO:USERNAME-DISCOVERY
HTTP:DOMINO:NSF-DIR-TRAVERSAL
HTTP:DOMINO:INFO-LEAK
HTTP:DOMINO:CSP-SRC-DISCLOSURE
HTTP:DOMINO:REDIR-BOF
HTTP:DOMINO:NSF-PASSWORD-BYPASS
HTTP:DOMINO:HPRAGENTNAME-BOF
HTTP:DOMINO:ACCEPT-LANG-OF
HTTP:DOMINO:HASH-DUMPER
HTTP:DOMINO:INFO-LEAK-1
HTTP:DOMINO:SAMETIME-URL-OF

HTTP:DOS

HTTP:DOS:SLOW-HEADER-DOS
HTTP:DOS:HULK-DOS
HTTP:DOS:DRUPAL-XMLRPC-TAGS
HTTP:DOS:HTTPKILLER-KEEPALIVE
HTTP:DOS:GOLDENEYE-DOS
HTTP:DOS:NOOP-SLED-REQ-MALF
HTTP:DOS:SCHNEIDER-EXPRT-SCADA
HTTP:DOS:SAFARI-FILE-DOWNLOAD
HTTP:DOS:MUL-PRODUCTS
HTTP:DOS:MUL-VENDORS
HTTP:DOS:MIT-KERBEROS-5-POLICY
HTTP:DOS:MICROSOFT-HTTP-SYS-2
HTTP:DOS:APACHE-TOMCAT-CHUNKED
HTTP:DOS:SQUID-HDR-RANGE
HTTP:DOS:APACHE-TOMCAT-CHUNKED2
HTTP:DOS:DRUPAL-XML-RPC-IEE
HTTP:DOS:LAN-MSG-DOS
HTTP:DOS:DOMSHTTPD-BO

HTTP:EXPLOIT

HTTP:EXPLOIT:AMBIG-CONTENT-LEN
HTTP:EXPLOIT:BRUTE-FORCE
HTTP:EXPLOIT:BRUTE-SEARCH
HTTP:EXPLOIT:WEBMIN-FS-INT
HTTP:EXPLOIT:SLASH-EVASION
HTTP:EXPLOIT:SWS-NO-LINEFEED
HTTP:EXPLOIT:VAR-RESPONSE-SPLIT
HTTP:EXPLOIT:SMALL-FIRST-DATA
HTTP:EXPLOIT:PI3WEB-USERS
HTTP:EXPLOIT:XERVER-NULL-INJ
HTTP:EXPLOIT:SYM-FILEUPLOAD
HTTP:EXPLOIT:MS-DOS-DEV
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
HTTP:EXPLOIT:WEBSTER-URL-OF
HTTP:EXPLOIT:FP2K-ASP-UPLOAD
HTTP:EXPLOIT:BIN-IN-AUTH-BASIC
HTTP:EXPLOIT:REDMINE-CMD-EXEC
HTTP:EXPLOIT:HOST-RANDOM-2
HTTP:EXPLOIT:AMBIG-CONTENT-LEN1
HTTP:EXPLOIT:HOST-RANDOM-3
HTTP:EXPLOIT:HOST-RANDOM-4
HTTP:EXPLOIT:D-LINK-ADMIN-PW
HTTP:EXPLOIT:HOST-RANDOM-1
HTTP:EXPLOIT:IE-SAVE-AS-HIDE
HTTP:EXPLOIT:MAL-LNK1
HTTP:EXPLOIT:URI-RANDOM-HOST
HTTP:EXPLOIT:MS-TCPSTACK-URLDOS
HTTP:EXPLOIT:SQLXML-ISAPI-OF
HTTP:EXPLOIT:HOST-RANDOM-5
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
HTTP:EXPLOIT:GENERIC-EVASION-AT
HTTP:EXPLOIT:ILLEGAL-HOST-CHR-1
HTTP:EXPLOIT:XITAMI-HEAD-DOS
HTTP:EXPLOIT:D-LINK-ADMIN-PW1
HTTP:EXPLOIT:DNSCHANGER-EK
HTTP:EXPLOIT:MAL-LNK

HTTP:EXT

HTTP:EXT:FILE-EXT-IN-DIR
HTTP:EXT:DOT-PPT
HTTP:EXT:DOT-RPT
HTTP:EXT:DOT-PIF
HTTP:EXT:SCR
HTTP:EXT:DOT-UNSAFE
HTTP:EXT:DOT-VML
HTTP:EXT:DOT-LNK
HTTP:EXT:HTRSRCFRAG
HTTP:EXT:DOT-CHM
HTTP:EXT:METAFILE
HTTP:EXT:DOT-RAT
HTTP:EXT:DOT-HLP
HTTP:EXT:DOT-JOB
HTTP:EXT:DOT-GRP
HTTP:EXT:SCR3
HTTP:EXT:RAT-SVR-PUSH
HTTP:EXT:DOT-XUL

HTTP:FRONTPAGE

HTTP:FRONTPAGE:ADMIN.PWD-REQ
HTTP:FRONTPAGE:AUTH-PWD-PROBE
HTTP:FRONTPAGE:FRM-RES-PROBE
HTTP:FRONTPAGE:SERVICE.PWD-REQ
HTTP:FRONTPAGE:AUTHOR-PWD-INFO
HTTP:FRONTPAGE:DOS-NAME-DOS

HTTP:GMAIL

HTTP:GMAIL:FILE-DOWNLOAD
HTTP:GMAIL:FILE-UPLOAD

HTTP:HOTMAIL

HTTP:HOTMAIL:FILE-DOWNLOAD
HTTP:HOTMAIL:EXE-DOWNLOAD
HTTP:HOTMAIL:LIVE-ATTACH
HTTP:HOTMAIL:LIVE-EXE-ATTACH
HTTP:HOTMAIL:LIVE-ACTIVITY
HTTP:HOTMAIL:FILE-UPLOAD
HTTP:HOTMAIL:ZIP-DOWNLOAD

HTTP:IIS

HTTP:IIS:FILE-LIST-ATTEMPT
HTTP:IIS:MFC-EXT-OF
HTTP:IIS:CMDSHELL-ATTEMPT
HTTP:IIS:ASN-1-BOF
HTTP:IIS:ENUMDSN-ATTEMPT
HTTP:IIS:EXAIR-DOS
HTTP:IIS:ISM.DLL-FILENAME
HTTP:IIS:SHAREPOINT-XSS
HTTP:IIS:FPCOUNT-OVERFLOW
HTTP:IIS:JET-DB-VBA-REMOTE-EXEC
HTTP:IIS:SITE-SERVER-FILE-UPLD
HTTP:IIS:PERL-0A-ATTEMPT
HTTP:IIS:ADMIN-PROBE
HTTP:IIS:BAT-AMP
HTTP:IIS:REGREAD-ATTEMPT
HTTP:IIS:SAM-DOWNLOAD-ATTEMPT
HTTP:IIS:FP30REG-CSS1
HTTP:IIS:HDR-EVASION
HTTP:IIS:MALFORMED-EXT-DATA
HTTP:IIS:MSADC-PROBE
HTTP:IIS:MSADC-VBBO-ACCESS
HTTP:IIS:ASPX-DOS
HTTP:IIS:SCHANNEL-IMPROPER-CERT
HTTP:IIS:MALFORMED-HTR-REQUEST
HTTP:IIS:INDEX-SERVER-SQLQHIT
HTTP:IIS:IIS-DISC
HTTP:IIS:IIS-BYPASS
HTTP:IIS:TILDE-INFO-DISC
HTTP:IIS:IIS-6-7-AUTH-BYPASS
HTTP:IIS:SENSEPOST.EXE
HTTP:IIS:IIS-AUTH-BYPASS
HTTP:IIS:ISAPI-IDQ-OVERFLOW
HTTP:IIS:ASP-SEARCH-PROBE
HTTP:IIS:DIR-BYPASS
HTTP:IIS:ASP-PAGE-BOF
HTTP:IIS:ASP-FORMS-DISCLOSURE
HTTP:IIS:COLDFUSION-INFOLEAK
HTTP:IIS:ASP-RCE
HTTP:IIS:SOURCE-CODE-DISC
HTTP:IIS:ASPNET-DISCLOSURE
HTTP:IIS:PBSERVER-PARAM-OF
HTTP:IIS:4-INTERNAL-IP-DISC
HTTP:IIS:SP-SCRIPTRESX-XSS
HTTP:IIS:SHAREPOINT-DOS
HTTP:IIS:SERVERVARIABLES-INFO
HTTP:IIS:DOT-NET-SERVER-DOS
HTTP:IIS:LOCALHOST-SPOOF
HTTP:IIS:IIS-HTR-CHUNKED
HTTP:IIS:SHARE-ID2
HTTP:IIS:SHARE-ID3
HTTP:IIS:ISAPI-IDA-OVERFLOW
HTTP:IIS:NSIISLOG-CHUNKED-POST
HTTP:IIS:SHARE-ID4
HTTP:IIS:TRACK-REQUEST
HTTP:IIS:HTW-CROSS-SITE
HTTP:IIS:ASPX-URL
HTTP:IIS:HTR-OF-2
HTTP:IIS:MDAC-RDS
HTTP:IIS:MDAC-DATASTUB
HTTP:IIS:HEADER-HOST-DOS
HTTP:IIS:X-SITE-SCRIPT
HTTP:IIS:CGI-BIN-CMD-EXE
HTTP:IIS:ASP-SHOWCODE
HTTP:IIS:ASPNET-DOS
HTTP:IIS:PROPFIND
HTTP:IIS:IISCHECK-PROBE
HTTP:IIS:IISADMPWD-PROXY-PASSWD
HTTP:IIS:IIS-EXT-BYPASS
HTTP:IIS:AD-SERVER-CONFIG
HTTP:IIS:INT-OVERFLOW-DOS
HTTP:IIS:WEB-CONFIG-INFO-LEAK
HTTP:IIS:ASP-CHUNKED-OF
HTTP:IIS:ISAPI-PRINTER-OVERFLOW
HTTP:IIS:SAMPLE-ACCESS
HTTP:IIS:IIS-ADS-BYPASS
HTTP:IIS:SHAREPOINT-CONVERT
HTTP:IIS:ASP-NET-MVC-SEC-BYPASS
HTTP:IIS:SHAREPOINT-PRIV-ESC
HTTP:IIS:PERC-2E-ASP
HTTP:IIS:DATA-DISCLOSURE
HTTP:IIS:SHARE-ID1
HTTP:IIS:SHAREPOINT-MUL-XSS
HTTP:IIS:REP-PARAM-REQ-DOS
HTTP:IIS:HTR-OVERFLOW
HTTP:IIS:ASPX-URL-1
HTTP:IIS:MS-SHAREPOINT-DOS
HTTP:IIS:ODATA-PROTOCOL-DOS
HTTP:IIS:ASP-DOT-NET-BACKSLASH
HTTP:IIS:MDAC-RDS-2
HTTP:IIS:ASN.1-BIT-STRING
HTTP:IIS:ASP-NET-FORM-REDIRECT
HTTP:IIS:IIS-HILIGHT-BYPASS
HTTP:IIS:FASTCGI
HTTP:IIS:UNC-PATH-DISC
HTTP:IIS:INDEX-SERVER-SRC-CODE
HTTP:IIS:ADFS-MAL-HEADER
HTTP:IIS:ASP-DOT-NET-VSTATE
HTTP:IIS:SHAREPOINT-2010-XSS
HTTP:IIS:REQ-HDR-BO
HTTP:IIS:DLL-URL-REQ
HTTP:IIS:NSIISLOG-OF
HTTP:IIS:MS-RD-WEB-ACCESS-XSS

HTTP:IIS:CMS

HTTP:IIS:CMS:MAL-CMS-REQ-2
HTTP:IIS:CMS:MAL-CMS-REQ

HTTP:IIS:ENCODING

HTTP:IIS:ENCODING:SINGLE-DIG-2
HTTP:IIS:ENCODING:SINGLE-DIG-1
HTTP:IIS:ENCODING:UNICODE-BP
HTTP:IIS:ENCODING:PERC-PERC-2
HTTP:IIS:ENCODING:PERC-PERC-1
HTTP:IIS:ENCODING:PERC-PERC-3
HTTP:IIS:ENCODING:UNICODE

HTTP:IIS:WEBDAV

HTTP:IIS:WEBDAV:MALFORMED-REQ1
HTTP:IIS:WEBDAV:SEARCH-OF
HTTP:IIS:WEBDAV:MALFORMED-REQ2
HTTP:IIS:WEBDAV:WINDOWS-SHELL
HTTP:IIS:WEBDAV:REQ-DISCLO
HTTP:IIS:WEBDAV:XML-HANDLER-DOS
HTTP:IIS:WEBDAV:COMMAND-OF
HTTP:IIS:WEBDAV:AUTH-BYPASS

HTTP:INFLATE

HTTP:INFLATE:TYPE-MISMATCH
HTTP:INFLATE:OVERFLOW

HTTP:INFO

HTTP:INFO:REQ-NO-CONTENT-LENGTH
HTTP:INFO:YOUTUBE
HTTP:INFO:TMICRO-PROXY-REQ
HTTP:INFO:MWS-SEARCH-OF1
HTTP:INFO:RESIN-DEV-WEBROOT
HTTP:INFO:XEROX-DS-INFO
HTTP:INFO:MS-UPDATE
HTTP:INFO:FACEBOOK
HTTP:INFO:FARK
HTTP:INFO:SPIDER-ROBOT
HTTP:INFO:HTML5-CONTENT
HTTP:INFO:OFFLINE-CACHING-HTML5
HTTP:INFO:HTTPPOST-GETSTYLE
HTTP:INFO:YOUTUBE-APP
HTTP:INFO:IDN-HOSTNAME
HTTP:INFO:NULL-AUTH
HTTP:INFO:AUTH-NEGOTIATE
HTTP:INFO:CHARSET-ASCII
HTTP:INFO:HTML5-CONTENT1
HTTP:INFO:FACEBOOK1

HTTP:INFO-LEAK

HTTP:INFO-LEAK:WWW-AUTH-OVFLOW
HTTP:INFO-LEAK:MISSG-EXPT-100
HTTP:INFO-LEAK:EXT-ASCII-CH
HTTP:INFO-LEAK:HTTP-VERSION-NT
HTTP:INFO-LEAK:MISSG-LOCATN-3XX
HTTP:INFO-LEAK:MISS-ETAG
HTTP:INFO-LEAK:MISSG-PROXY-AUT
HTTP:INFO-LEAK:MULT-SPACES-ST
HTTP:INFO-LEAK:LOCATION-OF
HTTP:INFO-LEAK:MISS-DATE
HTTP:INFO-LEAK:MISSING-RES-CODE
HTTP:INFO-LEAK:SPACE-AFT-CHUNK
HTTP:INFO-LEAK:MISSG-RANGE-206
HTTP:INFO-LEAK:PROXY-AUTH-OF
HTTP:INFO-LEAK:BAD-REASON-PHRS
HTTP:INFO-LEAK:NO-SP-AFTER-FLD
HTTP:INFO-LEAK:MISSING-WWW-AUTH
HTTP:INFO-LEAK:FOLDING-HEADER
HTTP:INFO-LEAK:EXPECT-OVERFLOW
HTTP:INFO-LEAK:MULT-TRANS-ENC
HTTP:INFO-LEAK:SPACE-IN-CON-LEN
HTTP:INFO-LEAK:RANGE-OVERFLOW
HTTP:INFO-LEAK:JOOMLA-SQLREPORT
HTTP:INFO-LEAK:POLYCOM
HTTP:INFO-LEAK:NSCONFIG
HTTP:INFO-LEAK:SALESCART-DB
HTTP:INFO-LEAK:NETGEAR-CONFLEAK
HTTP:INFO-LEAK:JBOSS-JSP-SRC
HTTP:INFO-LEAK:WFCHAT3
HTTP:INFO-LEAK:VIGNETTE-LEAK
HTTP:INFO-LEAK:HTPASSWD-REQUEST
HTTP:INFO-LEAK:LAYTON-TECH
HTTP:INFO-LEAK:WFCHAT
HTTP:INFO-LEAK:ORACLE-SQL
HTTP:INFO-LEAK:WIN-INI
HTTP:INFO-LEAK:CUTENEWS
HTTP:INFO-LEAK:SELENA-WEBSTORE
HTTP:INFO-LEAK:COFFEECUP
HTTP:INFO-LEAK:ASP-WEB-CONFIG
HTTP:INFO-LEAK:GOAHEAD-PERM
HTTP:INFO-LEAK:BOOT-INI
HTTP:INFO-LEAK:BUGZILLA-DISC
HTTP:INFO-LEAK:WORDPRES-GAZETTE
HTTP:INFO-LEAK:WFCHAT4
HTTP:INFO-LEAK:WEB-INF-DOT
HTTP:INFO-LEAK:LIVE-WIRE
HTTP:INFO-LEAK:WFCHAT7
HTTP:INFO-LEAK:WFCHAT8
HTTP:INFO-LEAK:WFCHAT6
HTTP:INFO-LEAK:WFCHAT5
HTTP:INFO-LEAK:VIGNETTE-LEAK-2
HTTP:INFO-LEAK:SSN-CLEARTEXT
HTTP:INFO-LEAK:WP-DBM-CFG
HTTP:INFO-LEAK:WFCHAT2
HTTP:INFO-LEAK:CC-CLEAR-VAR
HTTP:INFO-LEAK:D-LINK-MUL
HTTP:INFO-LEAK:GOOGLEMAP-PLUGIN
HTTP:INFO-LEAK:MULTIPLE-VENDORS
HTTP:INFO-LEAK:CART32-INFO-LEAK
HTTP:INFO-LEAK:SHAREPOINT-INFO
HTTP:INFO-LEAK:SNOOP-DISLOSURE
HTTP:INFO-LEAK:HTACCESS
HTTP:INFO-LEAK:BANNERMATIC
HTTP:INFO-LEAK:IBM-FP-SERLET
HTTP:INFO-LEAK:ZYXEL-PRESTIGE
HTTP:INFO-LEAK:PHP-PROXIMA
HTTP:INFO-LEAK:HP-SITESCOPE
HTTP:INFO-LEAK:MS-IE-MOUSE-MVMT
HTTP:INFO-LEAK:BOOT-INI-TCP
HTTP:INFO-LEAK:DVR-VS-PWD-DISC
HTTP:INFO-LEAK:F5-BIG-IP-XML
HTTP:INFO-LEAK:DVR-VS-LOG-DISC
HTTP:INFO-LEAK:MS-VISIO-XML
HTTP:INFO-LEAK:MS-PKCS-INFODISC
HTTP:INFO-LEAK:HTTP-SHARE-ENUM
HTTP:INFO-LEAK:NET-INFO-DISC
HTTP:INFO-LEAK:F-SECURE-MANAGER
HTTP:INFO-LEAK:IIS-FILE-ACCESS
HTTP:INFO-LEAK:HP-LASERJET-PRO
HTTP:INFO-LEAK:WP-MUL-PLUGINS
HTTP:INFO-LEAK:CONCRETE5
HTTP:INFO-LEAK:MUL-VENDORS-1
HTTP:INFO-LEAK:NETGEAR-MUL
HTTP:INFO-LEAK:CHECK-POINT-MUL
HTTP:INFO-LEAK:JETY-SRV-RESP
HTTP:INFO-LEAK:NOVELL-ZENWORKS
HTTP:INFO-LEAK:ASP-ORACLE-PAD
HTTP:INFO-LEAK:DOT-NET-CODE
HTTP:INFO-LEAK:HP-APISITESCOPE
HTTP:INFO-LEAK:DS-STORE
HTTP:INFO-LEAK:DOT-NET-CODE1
HTTP:INFO-LEAK:MS-VISIO-XML1
HTTP:INFO-LEAK:WFCHAT1
HTTP:INFO-LEAK:BARRACUDADRIVE1
HTTP:INFO-LEAK:VIGNETTE-DIAG
HTTP:INFO-LEAK:WFCHAT9
HTTP:INFO-LEAK:REDHAT-JBOSS
HTTP:INFO-LEAK:CA-TOTAL-DEFENSE
HTTP:INFO-LEAK:TOSTATICHTML-API

HTTP:INVALID

HTTP:INVALID:INVLD-AUTH-CHAR
HTTP:INVALID:NON-STAND-W-SPACE
HTTP:INVALID:HDR-FIELD
HTTP:INVALID:BAD-CONTENT-LENGTH
HTTP:INVALID:UNEXPECTCHAR
HTTP:INVALID:INVLD-AUTH-LEN
HTTP:INVALID:MSNG-HTTP-VER
HTTP:INVALID:MISSING-REQ
HTTP:INVALID:DUPLICATE-HEADER
HTTP:INVALID:HOST_HEADER_S2C
HTTP:INVALID:STATUS-CODE
HTTP:INVALID:CHUNK-HEADER
HTTP:INVALID:GZIP-TRANSACTION
HTTP:INVALID:EXPECT
HTTP:INVALID:VAR-NEG-LG
HTTP:INVALID:HTTP-RESPONSE-CODE
HTTP:INVALID:CHUNK-EVASION

HTTP:IRIX

HTTP:IRIX:CGI-BIN-REMOTE-EXEC
HTTP:IRIX:CGI-BIN-WRAP

HTTP:LHTTPD

HTTP:LHTTPD:HOST-DOT-DOT-SLASH
HTTP:LHTTPD:GET-BOF
HTTP:LHTTPD:FCGI-HEADER-OF
HTTP:LHTTPD:HOST-DOT-DOT-SLASH1

HTTP:LINUX

HTTP:LINUX:RPM-QUERY
HTTP:LINUX:DD-WRT-MGMT-GUI
HTTP:LINUX:REDHAT-ACCEPT-LANG

HTTP:MISC

HTTP:MISC:BLUECOAT-ADMIN
HTTP:MISC:BLUECOAT-LICENSE
HTTP:MISC:MULTPLE-EK-JAR-DOWNLD
HTTP:MISC:MOBY-LENGTH-DOS
HTTP:MISC:WWWACL-PROBE
HTTP:MISC:AVAILABLEMEDIA-REQ
HTTP:MISC:SINAPSI-CMD-INJ
HTTP:MISC:WEBWEAVER-DDP
HTTP:MISC:XOOPS-WEBROOT
HTTP:MISC:TOPTOOLS-HPNST-DOS
HTTP:MISC:RAS-CFG
HTTP:MISC:MOODLOGIC-CLIENT
HTTP:MISC:SUPERMICRO-LOGIN-BO
HTTP:MISC:MS-USERS-PWD-INFO-DIS
HTTP:MISC:NG-WG602-BACKDOOR
HTTP:MISC:EMULIVE-ADMIN
HTTP:MISC:LINBIT-LINBOX-BYPASS
HTTP:MISC:X-MICRO-WLAN-PASSWORD
HTTP:MISC:DLINK-CAMERA-VIDEO-BY
HTTP:MISC:FORTIGATE-CSRF
HTTP:MISC:OPENSIS-PARAM-PHP-INJ
HTTP:MISC:MUTINY-5-EDITDOCUMENT
HTTP:MISC:MOTOROLA-WR850
HTTP:MISC:WESTERN-DIGITAL-LFI
HTTP:MISC:ZENOSS-CMD-EXEC
HTTP:MISC:NODEJS-DOS
HTTP:MISC:KEYFOCUS-KF-DIRTRAV
HTTP:MISC:IBM-CONSOLE-FILE-READ
HTTP:MISC:APPLE-MAPS-APP
HTTP:MISC:MS-IIS-DOS
HTTP:MISC:RAILS-ROUTING
HTTP:MISC:TM-INTERSCAN-DIR-TRAV
HTTP:MISC:COREL-PDF-FUSION-XPS
HTTP:MISC:DLINK-CE
HTTP:MISC:ZENOSS-CE
HTTP:MISC:WAPP-PARAM-SEC2
HTTP:MISC:MUTINY-CMD-INJ
HTTP:MISC:NETCHARTS-SER-RCE
HTTP:MISC:ABYSS-HDR-DOS
HTTP:MISC:UPTIME-MONTRN-PHP-RCE
HTTP:MISC:MS-USERS-PWD-INFO-DI1
HTTP:MISC:WIN-MOVIE-MAKER-DOS
HTTP:MISC:HP-SYS-IPRANGE-OF
HTTP:MISC:ALIEN-VAULT-OSSIM-CE
HTTP:MISC:JENKINS-CONSOLE-CE
HTTP:MISC:DLINK-CMD-INJECTION
HTTP:MISC:RAILS-ROUTING4
HTTP:MISC:NGINX-CHUNK-TRANS-DOS
HTTP:MISC:OPENFILER-NETWORKCARD
HTTP:MISC:SPAM-TO-PHP-REDIR
HTTP:MISC:ZOPE-CMD-RCE
HTTP:MISC:LIFESIZE-ROOM-SEC-BY
HTTP:MISC:JIGSAW-DEV-DOS1
HTTP:MISC:SQUID-PROXY-GOPHER-RP
HTTP:MISC:JOOMLA-UNSER-CE
HTTP:MISC:LIFESIZE-ROOM-CMD-INJ
HTTP:MISC:BLUECOAT-HOST-HDR-OF
HTTP:MISC:PHPWIKI-SHELL-CE
HTTP:MISC:SPRING-HEADER-INJ
HTTP:MISC:RAILS-ROUTING2
HTTP:MISC:RAILS-ROUTING3
HTTP:MISC:MULTIPLE-PRODCT-CSRF
HTTP:MISC:DLINK-CAPTCHA-BO
HTTP:MISC:SQUID-DNS-REPLIES
HTTP:MISC:MONOWALL-CSRF
HTTP:MISC:BELKIN-ROUTER-UPLOAD
HTTP:MISC:AV-INVALID-CHKSUM
HTTP:MISC:DB-POMER-AMP-BO
HTTP:MISC:MULTI-ANTIVIRUS-ASCII
HTTP:MISC:GRAPHITE-RCE
HTTP:MISC:MS-FOREFRONT-DOS
HTTP:MISC:WEEVELY
HTTP:MISC:MINIUPNPD-SOAP-ACTION
HTTP:MISC:SONICWALL-AUTH-BYPAS
HTTP:MISC:ASTIUM-PBX-PHP-CE
HTTP:MISC:BUFFALO-LINK-INFO
HTTP:MISC:UBIQUITI-AIROS-CE
HTTP:MISC:AWSTATS-EXEC
HTTP:MISC:DLINK-INFO-DISCLOSURE
HTTP:MISC:D-LINK-DIR-615-PASSWD
HTTP:MISC:D-LINK-DAP-1160
HTTP:MISC:ALCATEL-OMNIPCX-CE
HTTP:MISC:CVSTRAC-FILEDIFF-RCE
HTTP:MISC:COPPERMINE-SQL-INJ
HTTP:MISC:ALCATEL-OMNIPCX-RCE
HTTP:MISC:DVR-VS-RCE
HTTP:MISC:DLINK-OS-CMD-INJ
HTTP:MISC:FREEPBX-AUTH-BYPASS
HTTP:MISC:APPLE-CUPS-RCE
HTTP:MISC:HASTYMAIL-CMD-INJ
HTTP:MISC:WIRESHARK-DECT-OF
HTTP:MISC:IBM-JAVA-UTF8-BYPASS
HTTP:MISC:TP-LINK-TD-8817-CSRF
HTTP:MISC:WEB-BBS-CE
HTTP:MISC:WEBUI-COMMAND-EXEC
HTTP:MISC:MS-XML-SIG-VAL-DOS
HTTP:MISC:BEETEL-TC1-450-CSRF
HTTP:MISC:ADOBE-COLDFUSION-HTML
HTTP:MISC:MANAGEENGINE-APPS
HTTP:MISC:MS-SHARE-POINT-RCE
HTTP:MISC:MANAGENGINE-EVNTLG-CE
HTTP:MISC:AV-INVALID-CHKSUM1
HTTP:MISC:NETGEAR-CMD-INJ
HTTP:MISC:AA-COOKIE-PARAM-RCE
HTTP:MISC:DLINK-CAMERA-CMD-INJ
HTTP:MISC:MS-MOVIE-MAKER-OCX
HTTP:MISC:CVE-2014-6332-OF
HTTP:MISC:SONICWALL-AUTH-BYPASS
HTTP:MISC:F5-ICONTROL-SOAP-CE
HTTP:MISC:MANAGE-ENGNE-ADMIN-AC
HTTP:MISC:MS-OWA-URL-REDIR
HTTP:MISC:FLASH-CVE-2014-0554
HTTP:MISC:MULTIPLE-PRDCT-CSRF
HTTP:MISC:SYMANTEC-COMMAND-EXEC
HTTP:MISC:HP-RELEASE-CONTROL
HTTP:MISC:MUL-VENDORS-CSRF
HTTP:MISC:MULTI-PRDCTS-CSRF-1
HTTP:MISC:SNORT-URICNTNT-EVASON
HTTP:MISC:MULTIPLE-PRODUCT-CSRF
HTTP:MISC:WAPP-PARAM-SEC1
HTTP:MISC:MUL-AUTH-BYPASS
HTTP:MISC:WAPP-SUSP-FILEUL1
HTTP:MISC:MULTPLE-PRDCTS-RCE
HTTP:MISC:WAPP-PARAM-SEC3
HTTP:MISC:SPLUNK-CUSTOM-APP-CE
HTTP:MISC:WORDPRESS-PHP-ACE
HTTP:MISC:PRDCTS-COMMAND-INJ
HTTP:MISC:MUL-VEND-IMPRO-ACCESS
HTTP:MISC:PRDCTS-COMMAND-EXEC
HTTP:MISC:MANAGEENGINE-PRIV-ESC
HTTP:MISC:XENEO-WEBREQ-DOS
HTTP:MISC:PHPMOADMIN-RCE
HTTP:MISC:MULTIPLE-VENDORS-UAF
HTTP:MISC:MULTPLE-PRODUCT-CSRF
HTTP:MISC:MULTIPLE-VENDORS-RCE
HTTP:MISC:WAVELINK-HDR-PARSE-BO
HTTP:MISC:MULTIPLE-VENDORS-CSRF
HTTP:MISC:MUTI-PROD-COMND-EXEC
HTTP:MISC:SEAGATE-NAS-RCE
HTTP:MISC:FILE-DOWNLOAD
HTTP:MISC:SAMSNG-DVR-COOKI-AUTH
HTTP:MISC:LETTERBOX-RCE
HTTP:MISC:IRFVIEW-JP2-BO
HTTP:MISC:ES-GROOVY-CODEEXEC
HTTP:MISC:APSTRUTS-DEV-EXEC
HTTP:MISC:JBOSS-SEAM-EL-RCE
HTTP:MISC:CHASYS-BO
HTTP:MISC:CUTEZIP-BO
HTTP:MISC:WING-FTP-COMMNAD-EXEC
HTTP:MISC:DLINK-EXSHEL-PARAM-CE
HTTP:MISC:BLKIN-PARAM-HNDLNG-CE
HTTP:MISC:DLINK-INFOCGI-BO
HTTP:MISC:ERS-VIEWER-BO
HTTP:MISC:GSM-SIMEDIT-BO
HTTP:MISC:EPO-XMLENTITY-INJ
HTTP:MISC:CVE-2014-6332-RCE
HTTP:MISC:MLTPLE-TABLE-INFO-DIS
HTTP:MISC:ESF-PFSENSE-RCE
HTTP:MISC:GE-GEFEBT-CE
HTTP:MISC:WIRESHARK-LUA-RCE
HTTP:MISC:EDOC-UPLOAD-PHP-CE
HTTP:MISC:SAVANT-WEBSERVER-BOF
HTTP:MISC:DLINK-COOKI-HANDLN-BO
HTTP:MISC:CVE-2013-3214-AB
HTTP:MISC:WINRAR-FILENM-SPOOF
HTTP:MISC:MAC-COMM-EXEC
HTTP:MISC:WINDOWS-DLL-LOAD-CE
HTTP:MISC:NEOTERIS-IVE-BF
HTTP:MISC:ARRIS-VAP-RCE
HTTP:MISC:FRITZ-SEC-BYPASS-CE
HTTP:MISC:DOLIBARR-ERP-COMM-INJ
HTTP:MISC:WINDOWS-GREENDAM-BO
HTTP:MISC:PANDORA-SERVICE-CE
HTTP:MISC:RUBY-RAILS-SECRET-RCE
HTTP:MISC:ZPANEL-HTPASWD-MOD-CE
HTTP:MISC:OPENPLI-CE
HTTP:MISC:MANAGEENGINE-FILE-UP
HTTP:MISC:MAYA-EO-VIDEO-BO1
HTTP:MISC:SEAGATE-NAS-RCE1
HTTP:MISC:CVE-2015-5718-BO
HTTP:MISC:MOODLE-RCE
HTTP:MISC:MCAFFEE-SRV-HDR
HTTP:MISC:REDR-ACROFORM-MC-1
HTTP:MISC:NGINX-ENCODED-DOS
HTTP:MISC:RAILS-ROUTING1
HTTP:MISC:CVE-2014-6332-BOF
HTTP:MISC:IBM-CRDIT-LMT-BYPAS
HTTP:MISC:EK-HIMAN-JAVA
HTTP:MISC:COOL-EXKIT-JAR-DL
HTTP:MISC:EZGUESTBOOK
HTTP:MISC:SHAMBALA-DOS1
HTTP:MISC:DYNDNSUPDATE
HTTP:MISC:EK-REDKIT-JAR-DOWNLD
HTTP:MISC:APPLE-INSTALLER-FS
HTTP:MISC:REAL-RMP-TRAV
HTTP:MISC:POSTER-SW-PUI-FILE-OF
HTTP:MISC:HP-PROCURVE-RESET
HTTP:MISC:GE-PULSENET-RCE
HTTP:MISC:GITLIST-URI-REQ-CE
HTTP:MISC:MS-IIS-DOS-1
HTTP:MISC:WP-IMG-UPLOAD
HTTP:MISC:NGINX-CHUNK-TRANSDOS2
HTTP:MISC:DLINK-IP-CAMERA-ID
HTTP:MISC:AVIRA-MGNT-HEADER-BOF
HTTP:MISC:REPRISE-DOIT-TRAV
HTTP:MISC:NG-ARB-FLUPLOAD
HTTP:MISC:SPLUNK-MAPPY-RCE
HTTP:MISC:IE-CVE-2013-2551-RCE
HTTP:MISC:GE-MDS-PULSENET
HTTP:MISC:ALIENVAULT-OSSIM-CE
HTTP:MISC:IE-CVE-2013-2551-RCE1
HTTP:MISC:NEG-CTN-LENGTH-STC
HTTP:MISC:FREEPBX-CFG-CODE-EXEC
HTTP:MISC:NEG-CTN-LENGTH-CLT
HTTP:MISC:COGENT-SERVER-CMD-INJ
HTTP:MISC:GITLAB-SH-EXEC
HTTP:MISC:ENDIAN-PRX-CMDEXEC
HTTP:MISC:VISNETIC-DOS

HTTP:NCSA

HTTP:NCSA:PHF-EXEC
HTTP:NCSA:NPH-TEST-CGI

HTTP:NETGEAR

HTTP:NETGEAR:DG834G-DEBUG-MODE
HTTP:NETGEAR:DGN1000B-SETUP-RCE
HTTP:NETGEAR:NETGEAR-PRO-SAFE

HTTP:NETSCAPE

HTTP:NETSCAPE:INDEX-DISCLOSURE
HTTP:NETSCAPE:ENTERPRISE-DOS

HTTP:NOVELL

HTTP:NOVELL:ZENWORKS-RTRLET-COM
HTTP:NOVELL:ZENWORKS-INFODISC
HTTP:NOVELL:REPORTER-AGENT
HTTP:NOVELL:IMANAGER-TOMCAT-BOF
HTTP:NOVELL:DHOST-BOF
HTTP:NOVELL:DHOST-URI-BOF
HTTP:NOVELL:GROUPWISE-IMG-BOF
HTTP:NOVELL:EDIR-ACCEPT-LANG-OF
HTTP:NOVELL:EDIR-DHOST
HTTP:NOVELL:WEBACC-MODIFY
HTTP:NOVELL:GROUPWISE-CSS
HTTP:NOVELL:ACT-PARAM-ID
HTTP:NOVELL:NETMAIL-WEBADMIN
HTTP:NOVELL:GROUPWISE-CSS-2
HTTP:NOVELL:GROUPWISE-NETAGT-BO
HTTP:NOVELL:TEAMING-UPLOAD
HTTP:NOVELL:FILENAME-PARAM-DT
HTTP:NOVELL:EDIRECTORY-SOAP

HTTP:ORACLE

HTTP:ORACLE:SOAP-ACCESS1
HTTP:ORACLE:OWA-UTIL-INFO-DISC
HTTP:ORACLE:SERVER-FORMS-CE
HTTP:ORACLE:APEX-HASH
HTTP:ORACLE:SSO-ACCESS
HTTP:ORACLE:WEBCENTER-SITES-RF
HTTP:ORACLE:JNLP-CODE-EXEC
HTTP:ORACLE:ISQLPLUS-OF
HTTP:ORACLE:SBA-CMD-INJ
HTTP:ORACLE:GLASSFISH-REST
HTTP:ORACLE:OUTSIDEIN-MET-BOF1
HTTP:ORACLE:CONF-ACCESS
HTTP:ORACLE:9I-APP-SERVER-DOS
HTTP:ORACLE:GLASSFISH-MUL-XSS
HTTP:ORACLE:ENDECA-SERVER-RCE
HTTP:ORACLE:OUTSIDE-IN-MSACCESS
HTTP:ORACLE:ORACLE9I-INFO-LEAK
HTTP:ORACLE:CHAR-CONV-VULN
HTTP:ORACLE:OUTSIDE-PRDOX-BO2
HTTP:ORACLE:OUTSIDEIN-CORELDRAW
HTTP:ORACLE:PARADOX-DB-DOS
HTTP:ORACLE:DEMANTRA-FILEACCESS
HTTP:ORACLE:APP-SERVER-BYPASS
HTTP:ORACLE:XML-SIG-SPOOFING
HTTP:ORACLE:EVNTPRO-DIR-TRAV
HTTP:ORACLE:DATAINT-ACTIVEX-MC
HTTP:ORACLE:SOAP-CONF
HTTP:ORACLE:COPYFILE-DIR-TRAV
HTTP:ORACLE:JAVA-SERVICELOADER
HTTP:ORACLE:OUTSIDEIN-MET-BOF
HTTP:ORACLE:OS-2-METAFILE-BOF
HTTP:ORACLE:GLASSFISH-BYPASS
HTTP:ORACLE:GENERIC-SIGNATUR-MC
HTTP:ORACLE:BACKUP-CMD-INJ
HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO
HTTP:ORACLE:BACKUP-AUTH-BYPASS
HTTP:ORACLE:COREL-DRAW-BO
HTTP:ORACLE:REPORTS-RCE
HTTP:ORACLE:SRV-OPMN-FS
HTTP:ORACLE:LOGIN-COOKIES-INJ

HTTP:OVERFLOW

HTTP:OVERFLOW:CONTENT-OVERFLOW
HTTP:OVERFLOW:CONTENT-ENCODING
HTTP:OVERFLOW:CONTENT-LANGUAGE
HTTP:OVERFLOW:ACCEPT-ENCODING
HTTP:OVERFLOW:ACCEPT
HTTP:OVERFLOW:CONNECTION
HTTP:OVERFLOW:ACCEPT-LANGUAGE
HTTP:OVERFLOW:SET-COOKIE
HTTP:OVERFLOW:CONTENT-LOCATION
HTTP:OVERFLOW:REFERER
HTTP:OVERFLOW:CONTENT-MD5
HTTP:OVERFLOW:SERVER
HTTP:OVERFLOW:CONTENT-LENGTH
HTTP:OVERFLOW:TRANSFER-ENCODING
HTTP:OVERFLOW:AUTHORIZATION
HTTP:OVERFLOW:USER-AGENT
HTTP:OVERFLOW:CONTENT-RANGE
HTTP:OVERFLOW:CHUNK-OVERFLOW
HTTP:OVERFLOW:COOKIE
HTTP:OVERFLOW:VERB-OVERFLOW
HTTP:OVERFLOW:HEADER
HTTP:OVERFLOW:INV-CHUNK-LEN
HTTP:OVERFLOW:CONTENT-TYPE
HTTP:OVERFLOW:CHUNKS-TOO-SMALL
HTTP:OVERFLOW:CHUNK-LEN-OFLOW
HTTP:OVERFLOW:HOST
HTTP:OVERFLOW:URL-OVERFLOW
HTTP:OVERFLOW:AUTH-OVFLW
HTTP:OVERFLOW:NULLHTTPD-ROOT-OF
HTTP:OVERFLOW:MULTIWEB-REQOF
HTTP:OVERFLOW:HTTPDX-GET-URL-OF
HTTP:OVERFLOW:HTTPDX-POST-BOF
HTTP:OVERFLOW:GAZTEK-HTTPD-OF
HTTP:OVERFLOW:WEBC-REQ-OF
HTTP:OVERFLOW:WSHELL-CGIC
HTTP:OVERFLOW:ATP-HTTPD-OF
HTTP:OVERFLOW:JANA-PRXY-OF1
HTTP:OVERFLOW:SERVU-SESSION
HTTP:OVERFLOW:EVOCAM-WEBSRV-GET
HTTP:OVERFLOW:BLACK-ICE-BOF
HTTP:OVERFLOW:HTTPDX-URL
HTTP:OVERFLOW:WEBDAV-JAVASYSTEM
HTTP:OVERFLOW:PI3WEB-SLASH-OF
HTTP:OVERFLOW:SAVANT
HTTP:OVERFLOW:AUTH-OVERFLOW
HTTP:OVERFLOW:D-LINK-HNAP-BO
HTTP:OVERFLOW:IMAGEMAGICK-EXIF
HTTP:OVERFLOW:OVWEBHELP-BO
HTTP:OVERFLOW:XITAMIIFMOD
HTTP:OVERFLOW:ACROBATX-NULL
HTTP:OVERFLOW:IMAGEMAGICK-SGI
HTTP:OVERFLOW:COREHTTP-URI
HTTP:OVERFLOW:LINKSYS-APPLY
HTTP:OVERFLOW:SAMBAR-SEARCH
HTTP:OVERFLOW:MS-IE-URL-BOF
HTTP:OVERFLOW:MS-W3WHO-OF
HTTP:OVERFLOW:METHOD-GENRC-OF
HTTP:OVERFLOW:SENKAS-KALIBRI-BO
HTTP:OVERFLOW:EXPRESSVIEW
HTTP:OVERFLOW:XNVIEW-IMAGE-FILE
HTTP:OVERFLOW:CAM2PC
HTTP:OVERFLOW:STATUS-CODE-OF
HTTP:OVERFLOW:MUL-VENDORS-BO
HTTP:OVERFLOW:IRFANVIEW-PLUGIN
HTTP:OVERFLOW:ACDSEE-PRO-IMAGE
HTTP:OVERFLOW:GSM-SIM-UTILITY
HTTP:OVERFLOW:JESKOLA-BUZZ
HTTP:OVERFLOW:MULTIPLE-PRODUCTS
HTTP:OVERFLOW:MALICIOUS-HOST
HTTP:OVERFLOW:HP-POWERMAN-OF
HTTP:OVERFLOW:MISSING-VER-BO
HTTP:OVERFLOW:MAIL-ENABLE-AUTH
HTTP:OVERFLOW:LIBYAML-SCANNER
HTTP:OVERFLOW:SIMPLE-WEB-SRV-BO
HTTP:OVERFLOW:RSA-WEB-OF
HTTP:OVERFLOW:SYBASE-WEBCONSOLE
HTTP:OVERFLOW:OPENVIEW-NNM-BO
HTTP:OVERFLOW:ACROBATX-HEAP
HTTP:OVERFLOW:MS-HTTP-SERVICES

HTTP:OWA

HTTP:OWA:LOGIN-REDIR

HTTP:PASSWD

HTTP:PASSWD:COMMON

HTTP:PHP

HTTP:PHP:FORMMAIL-INCLUDE
HTTP:PHP:BZOPEN-OF
HTTP:PHP:SILENT-STORM-ADMIN
HTTP:PHP:CACTI-RRD-AUTH-BYPASS
HTTP:PHP:SQUIRRELMAIL-AUTH
HTTP:PHP:FORMMAIL-SCRIPTROOT
HTTP:PHP:FAMILY-CONN-CMS-RCE
HTTP:PHP:WP-XML-RPC-PINGBACK-RQ
HTTP:PHP:PHPRPC-EXEC
HTTP:PHP:SPL-OBJECT-UNSERIALIZE
HTTP:PHP:ALEXPHP-INCLUDE
HTTP:PHP:VBULLETIN-CODE-EXEC
HTTP:PHP:TAX-DRAWIMAGE-RCE
HTTP:PHP:EXOOPS-FD
HTTP:PHP:COOLFORUM-INJ
HTTP:PHP:PHP-CAL-FILE-INC
HTTP:PHP:WP-GLOBAL-INFO-DISC
HTTP:PHP:PINEAPP-LIVELOG-RCE
HTTP:PHP:RUNCMS-FILE-UP
HTTP:PHP:TIKIWIKI-FORM
HTTP:PHP:PHP-FILE-INCL
HTTP:PHP:ZIPARCHIVE-IO
HTTP:PHP:PHPINFO-QUERY
HTTP:PHP:PHPINFO-SERVER
HTTP:PHP:WP-INCLUDES-ACCESS
HTTP:PHP:COOLFORUM-SRC-DISC
HTTP:PHP:LOKWABB-PRIVM
HTTP:PHP:LOKWABB-PRIVM2
HTTP:PHP:WP-XML-RPC-PINGBACK-PP
HTTP:PHP:LOKWABB-PRIVM3
HTTP:PHP:YABBSE-PKG-EXEC
HTTP:PHP:LOG-INSERT
HTTP:PHP:MANTIS-ARB-EXEC1
HTTP:PHP:PAGETOOL-SQL-INJ
HTTP:PHP:DOTBR-PHP-EXEC
HTTP:PHP:DFORUM-PHP-INC
HTTP:PHP:CEDRIC-EMAIL-PHPINC2
HTTP:PHP:PHPPASS-BYPASS
HTTP:PHP:WORDPRESS-UPLOAD
HTTP:PHP:PHPFORUM-INC
HTTP:PHP:PMACHINE-PATH-DISC
HTTP:PHP:WP-XMLRPC-BRUTE
HTTP:PHP:JOOMLA-DIR-TRAV
HTTP:PHP:WORDPRESS-SPEED-RCE
HTTP:PHP:MLOG-SCREEN
HTTP:PHP:DOTBR-INFO-LEAK
HTTP:PHP:WORDPRESS-USER-INJ
HTTP:PHP:REMOTE-FILE-INCL
HTTP:PHP:SCHEDULEIT-RCE
HTTP:PHP:QDPM-FILE-UPLOAD
HTTP:PHP:GLOSSWORD-FILE-UPLOAD
HTTP:PHP:GAPICMS-DIRDEPTH-INC
HTTP:PHP:OABOARD-RFI
HTTP:PHP:SITEMAN-USER
HTTP:PHP:WP-FOXYPRESS-FILE-UP
HTTP:PHP:CEDRIC-EMAIL-PHPINC1
HTTP:PHP:POSTNUKE-CMD-EXEC
HTTP:PHP:PHPMYNEWS-FILE-ACCESS
HTTP:PHP:CLAROLINE-INCLUDE
HTTP:PHP:FTP-GENLIST-ACE
HTTP:PHP:VWAROOT-INCLUDE
HTTP:PHP:CACTI-RDD-LOCAL-SCRIPT
HTTP:PHP:WEBMIN-TARGET
HTTP:PHP:ACONTENT-AUTH-BYPASS
HTTP:PHP:WEBCAL-INC
HTTP:PHP:ULTIMATE-PHP-BOARD
HTTP:PHP:WP-MRKPLC-UPLOADIFY
HTTP:PHP:PODCAST-FILE-INCL
HTTP:PHP:AWSTATS-SORT
HTTP:PHP:SYM-WG-FILE-UP
HTTP:PHP:VAMCART-FU
HTTP:PHP:WP-DOUPLOAD-FU
HTTP:PHP:MEDIAWIKI-RCE
HTTP:PHP:PHPROJEKT-INC
HTTP:PHP:XODA-FILE-UPLOAD
HTTP:PHP:OPEN-FLASH-CHART-RCE
HTTP:PHP:FILE-INCL-DL
HTTP:PHP:WP-README-SCAN
HTTP:PHP:JOOMLA-COM-PHOCADL-LF1
HTTP:PHP:PINEAPP-CMD-INJ
HTTP:PHP:WORDPRESS-SPELCHECK-FI
HTTP:PHP:PHPMYNEWS-INCLUDE
HTTP:PHP:WAN-EMULATOR-CE
HTTP:PHP:REDHAT-PIRANHA-PASSWD1
HTTP:PHP:PACER-CMS-FILE-DELETE1
HTTP:PHP:PHAR-PARSE-TARFILE-ID
HTTP:PHP:STUNSHELL-RCE
HTTP:PHP:PHPADSNEW-RFI1
HTTP:PHP:AJAXPLORER-RCE
HTTP:PHP:CMSQLITE-LFI
HTTP:PHP:BASILIC-CMD-EXE
HTTP:PHP:WORDPRESS-COOKIE-INJ
HTTP:PHP:PINE-APP-CMD-INJE
HTTP:PHP:NARCISSUS-CMD-EXE
HTTP:PHP:SUGARCRM-CE
HTTP:PHP:COMPACTCMS-ENGINE-RFI
HTTP:PHP:JOOMLA-LOC-FILE
HTTP:PHP:SSL-CERT-SEC-BYPASS
HTTP:PHP:XML-HEAP-MEM-CORR
HTTP:PHP:CDF-INFINITE-LOOP-DOS
HTTP:PHP:WEBSVN-CMD-INJ
HTTP:PHP:PACER-CMS-FILE-DELETE
HTTP:PHP:PACER-EDITION-CMS-LFI
HTTP:PHP:WP-IS-HUMAN-CMD-INJ
HTTP:PHP:JOOMLA-XCLONER
HTTP:PHP:EXTPLORER-FILE-UPLOAD
HTTP:PHP:WORDPRESS-MUL-GND-ALBM
HTTP:PHP:WORDPRESS-MUL-FL-GAL
HTTP:PHP:PHPSECUREPAGE-RFI4
HTTP:PHP:BACULA-WEB-REPORT
HTTP:PHP:PHPSECUREPAGE-RFI3
HTTP:PHP:WEBTESTER-CMD-EXE
HTTP:PHP:CONSTRUCTR-CMS-MUL
HTTP:PHP:N-CMS-PAGE-LFI
HTTP:PHP:WORDPRESS-OPS-LFI
HTTP:PHP:PACER-EDITION-CMS-LFI1
HTTP:PHP:TINYWEBGALLERY-LFI
HTTP:PHP:PINEAPP-COMMAND-INJ
HTTP:PHP:WP-JQUERY-MEGAMENU-LFI
HTTP:PHP:WP-GLOBAL-CONT-CE
HTTP:PHP:PHP-XML-CMD
HTTP:PHP:PHPESCSHELL
HTTP:PHP:HTML-SPCL-CHARS
HTTP:PHP:CORE-INT-OF-CE
HTTP:PHP:PROJECTPIER-FILE-UP
HTTP:PHP:EXIF-HEADER
HTTP:PHP:OSCOMMERCE-ADMIN
HTTP:PHP:WHMCS-LFI
HTTP:PHP:CMD-COMMAND-EXEC
HTTP:PHP:724CMS-LFI
HTTP:PHP:JOOMLA-FILE-LISTER
HTTP:PHP:FORMAT-OF
HTTP:PHP:CMD-INJ-UA
HTTP:PHP:CACTI-RRD-FILE-INC
HTTP:PHP:MYBB-BACKDOOR
HTTP:PHP:JOOMLA-ADMIN-SCAN
HTTP:PHP:GIF-HEADER-EVASION
HTTP:PHP:MANTIS-ARB-EXEC2
HTTP:PHP:VBULLETIN-IMPEX-INC
HTTP:PHP:HORDE-EVAL
HTTP:PHP:AWACTSCRPT-CMS-FILE-UP
HTTP:PHP:EASYPHP-CODETESTER-RCE
HTTP:PHP:SYMC-WEB-CMD-INJ
HTTP:PHP:VS-NEWS-RFI1
HTTP:PHP:WP-GRAND-FLASH-ALBUM
HTTP:PHP:WP-GRAND-FLASH
HTTP:PHP:DRIES-BUYTRT-DRUPAL-ID
HTTP:PHP:SPHPBLOG-PW-DOWNLOAD
HTTP:PHP:TIKIWIKI-JHOT
HTTP:PHP:BITRIX-SITE-MGR-CS
HTTP:PHP:PINE-APP-CMD-INJ
HTTP:PHP:CHARTS-RCE
HTTP:PHP:JOOMLA-COM-COLLECTOR
HTTP:PHP:MOODLE-TEX-FILTER-RCE
HTTP:PHP:HPE-HPEINC-RFI
HTTP:PHP:DBGUESTBOOK-DBSBASE
HTTP:PHP:4IMAGES-RFI
HTTP:PHP:427BB-AUTH-BYPASS
HTTP:PHP:PHP-CGI-CMD-LINE-RCE
HTTP:PHP:ACAL-AUTH-BYPASS
HTTP:PHP:BEAUTIFIER-RFI
HTTP:PHP:ULTIMATE-PHP-CODE-EXEC
HTTP:PHP:VS-NEWS-RFI
HTTP:PHP:WMNEWS-RFI
HTTP:PHP:FREE-FILE-HOSTING-RFI
HTTP:PHP:ULTIMATE-FUN-BOOK-RFI
HTTP:PHP:PHPSECUREPAGE-RFI
HTTP:PHP:REDHAT-PIRANHA-PASSWD
HTTP:PHP:PHP-QUOT-PRINT-ENCODE
HTTP:PHP:KIETU-HIT-INCLUDE
HTTP:PHP:OPEN-EDUCATION-SYS-RFI
HTTP:PHP:EXIFF-THUMBNAIL-BOF
HTTP:PHP:CAUPOSHOP-LFI
HTTP:PHP:FREENEWS-PHP-INC1
HTTP:PHP:INTERPHOTO-IPLANG-LFI
HTTP:PHP:MEMORY-LIMIT-CE
HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD
HTTP:PHP:XOOPS-BANNERS-LFI
HTTP:PHP:EGROUPWARE-FI
HTTP:PHP:BHARAT-MEDIARATTA-RFI
HTTP:PHP:JOOMLA-JOOMTOUCH-LFI
HTTP:PHP:BITWEAVER-LFI
HTTP:PHP:CMD-INJ
HTTP:PHP:ZEBRAFEEDS-RFI
HTTP:PHP:WEBID-FILE-DISCLOSURE
HTTP:PHP:WP-BRUTE-FORCE-LOGIN
HTTP:PHP:SABDRIMER-RFI
HTTP:PHP:UPLOAD-LOCATION
HTTP:PHP:FORM-DOS
HTTP:PHP:STRIP-TAGS-XSS
HTTP:PHP:WP-ACF-ABSPATH-RFI
HTTP:PHP:ZONEMINDER-SERVER-CE
HTTP:PHP:WORDPRESS-WPCUSTOM-LFI
HTTP:PHP:JOOMLA-COM-PHOCADL-LFI
HTTP:PHP:JOOMLA-OBSUGGEST-LFI
HTTP:PHP:WP-WPTOUCH-REDIRECT
HTTP:PHP:JOOMLA-JMSFILESELL-LFI
HTTP:PHP:WP-ANNOUNCES-RFI
HTTP:PHP:JOOMLA-JE-STORY-LFI
HTTP:PHP:PFSENSE-SNORT-INFO-DIS
HTTP:PHP:EXIF-HEADER1
HTTP:PHP:OPENSSL-X509-CERT-MC
HTTP:PHP:XAMPP-FILE-WRITE
HTTP:PHP:V0PCR3W-WEB-SHELL-RCE
HTTP:PHP:JOOMLA-COM-PHOCADL-LF3
HTTP:PHP:TIKIWIKI-CMD-EXEC
HTTP:PHP:DATEINTERVAL-DOS
HTTP:PHP:WP-SLIDER-REV-AFD
HTTP:PHP:PHPSPLOIT-POSTEXP
HTTP:PHP:YABBSE-PKG-EXEC4
HTTP:PHP:HORDE-HREF-BACKDOOR
HTTP:PHP:YABBSE-PKG-EXEC5
HTTP:PHP:GESTART-RFI
HTTP:PHP:YABBSE-PKG-EXEC6
HTTP:PHP:YABBSE-PKG-EXEC7
HTTP:PHP:COOLPHP-DIRTRAV
HTTP:PHP:EXIF-NULL-DEREFERENCE
HTTP:PHP:LIBMAGIC-PE-RCE
HTTP:PHP:PHAR_SET_INODE-FUNC-BO
HTTP:PHP:YABBSE-PKG-EXEC8
HTTP:PHP:WP-PROPERTY-RCE
HTTP:PHP:WP-FILE-UPLOAD
HTTP:PHP:PHPSECUREPAGE-RFI2
HTTP:PHP:SYM-WG-FILE-DOWN-DEL
HTTP:PHP:LIBMAGIC-CDF-FILE-DOS
HTTP:PHP:PHPSECUREPAGE-RFI9
HTTP:PHP:ACGVCLICK-RFI
HTTP:PHP:REGISTER-VARIABLE-CE
HTTP:PHP:PHP-CORE-UAF
HTTP:PHP:PHPSECUREPAGE-RFI8
HTTP:PHP:JOOMLA-PHP-OBJ-INJ
HTTP:PHP:SYM-GW-LFI
HTTP:PHP:PHPSECUREPAGE-RFI5
HTTP:PHP:PHPSECUREPAGE-RFI7
HTTP:PHP:APACHE-RQST-HEADER-BO
HTTP:PHP:IBM-PROVENTIA-RFI
HTTP:PHP:HORDE-HREF-BACKDOOR1
HTTP:PHP:RAXNET-CACTI-RCE
HTTP:PHP:OPEN-REALITY-XSS-SQLI
HTTP:PHP:EXIF-HEADER-INT-OF
HTTP:PHP:PHPBOOK-CODE-INJECTION
HTTP:PHP:EXPLOIT-KIT-ACTIV
HTTP:PHP:SQUIRRELMAIL-AUTH1
HTTP:PHP:YABBSE-PKG-EXEC1
HTTP:PHP:FLASHCHAT-RFI
HTTP:PHP:ARDEACORE-RFI
HTTP:PHP:SEARCHBLOX-REQ-ID
HTTP:PHP:YABBSE-PKG-EXEC9
HTTP:PHP:GLOBALS-INJ
HTTP:PHP:WP-SIMPLE-ADS-MGR-MUL
HTTP:PHP:EMPIRE-CMS-RFI
HTTP:PHP:YABBSE-PKG-EXEC3
HTTP:PHP:YABBSE-PKG-EXEC2
HTTP:PHP:FTP-GENLIST-IO
HTTP:PHP:GHOST-GLIBC-WP
HTTP:PHP:PHPSECUREPAGE-RFI6
HTTP:PHP:DBGUESTBOOK-DBSBASE1
HTTP:PHP:NETWORK-WEATHERMAP-LFI
HTTP:PHP:MAMBO-PATH-INCL
HTTP:PHP:SQUIRRELMAIL
HTTP:PHP:YABBSE-SSI-INCLUDE
HTTP:PHP:CVE-2015-2331-BO
HTTP:PHP:AKARRU-SOCIAL-RFI
HTTP:PHP:TSEP-COLORSWITCH-RFI
HTTP:PHP:BLACKBOARD-INC
HTTP:PHP:COPPERMINE-RCE
HTTP:PHP:PHPWEB-REMOTE-FILE
HTTP:PHP:PMACHINE-INCLUDE
HTTP:PHP:JOOMLA-COM-PHOCADL-LF4
HTTP:PHP:PHPSECUREPAGE-RFI1
HTTP:PHP:SAVEWEB-PORTAL-RFI
HTTP:PHP:MYNEWSGROUPS-RFI
HTTP:PHP:MIDICART-DB
HTTP:PHP:AINS-AD-FUNDUM-RFI
HTTP:PHP:WOLTAB-SQL-INJ
HTTP:PHP:SYM-WG-IPCHANG
HTTP:PHP:PHPZIPURL
HTTP:PHP:BASE-RFI
HTTP:PHP:JOOMLA-COM-PHOCADL-LF2
HTTP:PHP:MYSQL-COMMANDER-RFI
HTTP:PHP:ACTIVIST-BASE-RFI
HTTP:PHP:PHPLIB-REMOTE-EXEC
HTTP:PHP:ESF-PFSENSE-COM-INJ
HTTP:PHP:MEDIAWIKI-SCRIPT-INSER
HTTP:PHP:PHP-NEWS-FILE-INC
HTTP:PHP:OPENEMR-GLOBALS-AB
HTTP:PHP:FILEINFO-DOS
HTTP:PHP:OPENI-CMS-RFI
HTTP:PHP:SDNTOJEWISH-FUNC-OF
HTTP:PHP:SITE-ASSISTANT-RFI
HTTP:PHP:CACTI-CONFIG-INC

HTTP:PHP:GALLERY

HTTP:PHP:GALLERY:EMBED-AUTH
HTTP:PHP:GALLERY:EMBED-AUTH-VAR
HTTP:PHP:GALLERY:HTTP-VARS

HTTP:PHP:PHORUM

HTTP:PHP:PHORUM:REMOTE-EXEC
HTTP:PHP:PHORUM:READ-ACCESS
HTTP:PHP:PHORUM:RESPONSE-SPLIT
HTTP:PHP:PHORUM:ADMIN-PW-CHG

HTTP:PHP:PHPBB

HTTP:PHP:PHPBB:DL-SQL-INJ
HTTP:PHP:PHPBB:PROFILE-ADD-DOS
HTTP:PHP:PHPBB:SEARCH-DOS
HTTP:PHP:PHPBB:PM-SQL-USER
HTTP:PHP:PHPBB:LANG-EXEC
HTTP:PHP:PHPBB:UID-SQL-INJECT
HTTP:PHP:PHPBB:AUTH-BYPASS
HTTP:PHP:PHPBB:SELECT-FISH
HTTP:PHP:PHPBB:PROOTPATH-INJ
HTTP:PHP:PHPBB:PRIV-DEL
HTTP:PHP:PHPBB:SEARCH-INJECT
HTTP:PHP:PHPBB:UID-SQL-INJECT1
HTTP:PHP:PHPBB:AVATAR-PATH-INC
HTTP:PHP:PHPBB:AVATAR-UPLOAD
HTTP:PHP:PHPBB:HIGHLIGHT-EXEC

HTTP:PHP:PHPMYADMIN

HTTP:PHP:PHPMYADMIN:SVR-PARAM
HTTP:PHP:PHPMYADMIN:BACKDOOR-CE
HTTP:PHP:PHPMYADMIN:FMT-OPTION
HTTP:PHP:PHPMYADMIN:SERVERDB
HTTP:PHP:PHPMYADMIN:GOTO-RFI
HTTP:PHP:PHPMYADMIN:SETUP-SCAN
HTTP:PHP:PHPMYADMIN:LOCALFILE
HTTP:PHP:PHPMYADMIN:PREG-REPLAC
HTTP:PHP:PHPMYADMIN:SVR-PARAM1

HTTP:PHP:PHPNEWS

HTTP:PHP:PHPNEWS:SQL-SENDTO

HTTP:PHP:PHPNUKE

HTTP:PHP:PHPNUKE:QR-SQL-INJECT
HTTP:PHP:PHPNUKE:PRIV-ESC
HTTP:PHP:PHPNUKE:VIEWADMIN
HTTP:PHP:PHPNUKE:DELADMIN
HTTP:PHP:PHPNUKE:SID-SQL-INJECT
HTTP:PHP:PHPNUKE:BOOKMARK-SQL
HTTP:PHP:PHPNUKE:ADMIN-GUESS
HTTP:PHP:PHPNUKE:PATH-DISC2
HTTP:PHP:PHPNUKE:PATH-DISC1
HTTP:PHP:PHPNUKE:CID-SQL-INJECT
HTTP:PHP:PHPNUKE:4NALBUM-INC
HTTP:PHP:PHPNUKE:DOWNLD-SQL-INJ
HTTP:PHP:PHPNUKE:MODULES-DOS

HTTP:PHP:THATWARE

HTTP:PHP:THATWARE:ARTLIST-INC
HTTP:PHP:THATWARE:THATFILE-INC
HTTP:PHP:THATWARE:CONFIG-INC
HTTP:PHP:THATWARE:AUTH-INC

HTTP:PKG

HTTP:PKG:WEBMIN-BRUTE
HTTP:PKG:EWAVE-SERVLET-DOS
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-2
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-1
HTTP:PKG:EZMALL-LOG-ORDER-ACCSS
HTTP:PKG:VWALL-FTPSAV-DLL
HTTP:PKG:OFFICESCAN-JDKRQNOTIFY
HTTP:PKG:CART32-CLI-DIS
HTTP:PKG:DNSTOOLS-AUTH-BYPASS
HTTP:PKG:TUXEDO-DOS
HTTP:PKG:TUXEDO-INIFILE
HTTP:PKG:MOUNTAIN-WEBCART-DISC
HTTP:PKG:ANACONDA-DIR-TRAVERSAL
HTTP:PKG:WEBGAIS-REMOTE-EXEC
HTTP:PKG:ALLAIRE-JRUN-DOS
HTTP:PKG:SALESLOGIC-UNAUTH-ADMN
HTTP:PKG:WEBMIN-SHOWCGI-CMDEXEC
HTTP:PKG:SUPERSCOUT-USERLIST
HTTP:PKG:SALESLOGIX-AUTH-BYPASS
HTTP:PKG:DB4WEB-FILE-ACCESS
HTTP:PKG:CARELLO-VBEXEC
HTTP:PKG:ICQ-WEBFRONT-DOS-2
HTTP:PKG:WEBMIN-FILEDISC
HTTP:PKG:MS-JET-VBA
HTTP:PKG:WEBMIN-FAKE-SESSION
HTTP:PKG:CART32-ADM-PW-CHG

HTTP:PROXY

HTTP:PROXY:PROXYPRO-GET
HTTP:PROXY:SQUID-ESI-BO
HTTP:PROXY:SQUID-AT-AT
HTTP:PROXY:HTTP-PROXY-GET
HTTP:PROXY:CAW-URI-RES
HTTP:PROXY:SQUID-FTP
HTTP:PROXY:SQUID-CACHE-UPDATE
HTTP:PROXY:WINGATE-OF
HTTP:PROXY:SQUID-DOS
HTTP:PROXY:PSOPROXY-OF
HTTP:PROXY:SQUID-TRACE
HTTP:PROXY:SQUID-RES-DOS
HTTP:PROXY:SQUID-SQSN-HDR-POISN
HTTP:PROXY:SQUID-STRLISTGETITEM
HTTP:PROXY:SQUID-NTLM-OF
HTTP:PROXY:WPAD-CONNECTION
HTTP:PROXY:SQUID-NULL-PTR

HTTP:PROXY:ANON

HTTP:PROXY:ANON:CGIPROXY
HTTP:PROXY:ANON:CONCEAL-WS
HTTP:PROXY:ANON:PROXY-1
HTTP:PROXY:ANON:PROXY-2
HTTP:PROXY:ANON:FOXY-FILTER
HTTP:PROXY:ANON:PHPROXY

HTTP:PROXY:LIST

HTTP:PROXY:LIST:PROXYFIND
HTTP:PROXY:LIST:PUBWEBPROXIES

HTTP:REQERR

HTTP:REQERR:REQ-MALFORMED-URL
HTTP:REQERR:REQ-INVALID-FORMAT
HTTP:REQERR:REQ-MISSING-HOST
HTTP:REQERR:DOUBLE-ENCODE
HTTP:REQERR:BIN-DATA-CONT-LOC
HTTP:REQERR:FS-HOST
HTTP:REQERR:BIN-DATA-ACC-ENC
HTTP:REQERR:BIN-DATA-CONT-ENC
HTTP:REQERR:BIN-DATA-ACCEPT
HTTP:REQERR:BIN-DATA-CONT-LANG
HTTP:REQERR:HEADER-INJECT
HTTP:REQERR:BIN-DATA-AUTH
HTTP:REQERR:URL-VAR-FS
HTTP:REQERR:BIN-DATA-HEADER
HTTP:REQERR:INV-HTTP-VERSION
HTTP:REQERR:NULL-IN-HEADER
HTTP:REQERR:INV-IPV6-HOST-HDR
HTTP:REQERR:POST-MISSING-DATA
HTTP:REQERR:REQ-INJECTION
HTTP:REQERR:URL-LF-CR

HTTP:SAVANT

HTTP:SAVANT:GET-PERCENT
HTTP:SAVANT:GET-DOT1

HTTP:SQL

HTTP:SQL:NOVEL-ZENWORKS
HTTP:SQL:NOVELL-ZENWORKS

HTTP:SQL:INJ

HTTP:SQL:INJ:IS_SRVROLEMEMBER
HTTP:SQL:INJ:TOLINET-AGENCIA-ID
HTTP:SQL:INJ:MANGENG-SYNCMONITR
HTTP:SQL:INJ:JOOMLA-COMHOSPITAL
HTTP:SQL:INJ:JOOMLA-CBCONTACT
HTTP:SQL:INJ:JOOMLA-CONTROLLER
HTTP:SQL:INJ:JOOMLA-NEWSSEARCH
HTTP:SQL:INJ:JOOMLA-FOTO
HTTP:SQL:INJ:OSCOM
HTTP:SQL:INJ:JOOMLA-AVRELOADED
HTTP:SQL:INJ:SFX-SQLI
HTTP:SQL:INJ:HEADER-3
HTTP:SQL:INJ:HEADER-2
HTTP:SQL:INJ:WAITFOR-DELAY
HTTP:SQL:INJ:SYNERGY-SW
HTTP:SQL:INJ:FACTO-CMS
HTTP:SQL:INJ:HTTP-REQ-HDR-1
HTTP:SQL:INJ:PHPTOPSITES
HTTP:SQL:INJ:MYSHOP
HTTP:SQL:INJ:JOOMLA-COMTEAM1
HTTP:SQL:INJ:WS2000
HTTP:SQL:INJ:PANGOLIN
HTTP:SQL:INJ:AUTHID
HTTP:SQL:INJ:SQLMAP-ACTIVITY
HTTP:SQL:INJ:CONVERT-INJ-OF
HTTP:SQL:INJ:JOOMLA-COM-JCE
HTTP:SQL:INJ:OMNISTAR-MAILER
HTTP:SQL:INJ:YABSOFT-GALLERY-ID
HTTP:SQL:INJ:SINAPSI-ESOLAR
HTTP:SQL:INJ:WP-AJAX-CATEGORY8
HTTP:SQL:INJ:MNG-ENG-SECMNG-PLS
HTTP:SQL:INJ:MYSQL-BINLOG-DOS
HTTP:SQL:INJ:JOOMLA-FILTERORDER
HTTP:SQL:INJ:AUTO-TRANS
HTTP:SQL:INJ:MAIAN-WEBLOG
HTTP:SQL:INJ:WP-MEDIA-LIBRARY
HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM
HTTP:SQL:INJ:4IMAGES-DETAIL-PHP
HTTP:SQL:INJ:GLOBAL-VAR
HTTP:SQL:INJ:WP-AJAX-CATEGORY9
HTTP:SQL:INJ:OVERSIZE-STATEMENT
HTTP:SQL:INJ:SYMC-BLOCKED-PHP
HTTP:SQL:INJ:JOOMLA-RESTAURANTE
HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK
HTTP:SQL:INJ:JOOMLA-QUESTION
HTTP:SQL:INJ:JOOMLA-MAPLOCATOR
HTTP:SQL:INJ:KUBELABS-PHPDUG
HTTP:SQL:INJ:WP-SERMON-BROWSER
HTTP:SQL:INJ:JOOMLA-COMTEAM
HTTP:SQL:INJ:JOOMLA-COM-SHOP
HTTP:SQL:INJ:JOOMLA-JUICY-PICID
HTTP:SQL:INJ:JOOMLA-FAQ-BOOK
HTTP:SQL:INJ:WP-UNIVERSAL-POST
HTTP:SQL:INJ:TEDE-SIMPLIFICADO
HTTP:SQL:INJ:MAMBO-COM-DOCMAN
HTTP:SQL:INJ:WP-STARSRATEBOX
HTTP:SQL:INJ:JOOSTINA
HTTP:SQL:INJ:JOOMLA-CALCBUILDER
HTTP:SQL:INJ:WP-SYMPOSIUM
HTTP:SQL:INJ:MANAGENGINE-SRC
HTTP:SQL:INJ:JOOMLA-ALLCINEVID
HTTP:SQL:INJ:MANAGENGINE-JSON
HTTP:SQL:INJ:JOOMLA-COM-CLAN
HTTP:SQL:INJ:WORDPRESS-WP-FRM
HTTP:SQL:INJ:COVER-VISION-ID
HTTP:SQL:INJ:SYNDEO-CMS-USRNAME
HTTP:SQL:INJ:DH-MLM-LOGIN-PHP
HTTP:SQL:INJ:MYSCHOOL
HTTP:SQL:INJ:NULLBYTE-COMMENT
HTTP:SQL:INJ:S9Y-SERENDIPITY3
HTTP:SQL:INJ:S9Y-SERENDIPITY2
HTTP:SQL:INJ:WP-ECOMMERCE
HTTP:SQL:INJ:CHAR-ENCODE
HTTP:SQL:INJ:HAVIJ-UA
HTTP:SQL:INJ:WP-AJAX-CATEGORY
HTTP:SQL:INJ:MS-SQL-TABLE-NAME
HTTP:SQL:INJ:USER-ADD
HTTP:SQL:INJ:CHAR
HTTP:SQL:INJ:WORDPRESS-ID
HTTP:SQL:INJ:WP-PHOTORACER
HTTP:SQL:INJ:MS-SQL-FUNCTIONS
HTTP:SQL:INJ:WP-MULTIPLE
HTTP:SQL:INJ:POSTNUKE
HTTP:SQL:INJ:WORD-CIRCLE-SQL
HTTP:SQL:INJ:COMPARISON
HTTP:SQL:INJ:UNION-SELECT
HTTP:SQL:INJ:ORACLE-WEBCENTER
HTTP:SQL:INJ:HEADER-1
HTTP:SQL:INJ:CONVERT
HTTP:SQL:INJ:CA-EXPORTREPORT
HTTP:SQL:INJ:NULL-NULL-NULL
HTTP:SQL:INJ:PL-SQL
HTTP:SQL:INJ:SLASH-STAR
HTTP:SQL:INJ:DECLARE-EXEC
HTTP:SQL:INJ:INTO-OUTFILE
HTTP:SQL:INJ:IMP
HTTP:SQL:INJ:JOOMLA-COM-CCBOARD
HTTP:SQL:INJ:HEADER-REFERRER
HTTP:SQL:INJ:RUBY-ON-RAILS
HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL
HTTP:SQL:INJ:HEADER-COOKIE
HTTP:SQL:INJ:JOOMLA-MORFEOSHOW
HTTP:SQL:INJ:F5-BIGIP-11.2.0
HTTP:SQL:INJ:L-FORUM
HTTP:SQL:INJ:JOOMLA-VIRTUEMART
HTTP:SQL:INJ:FORUM-LIVRE
HTTP:SQL:INJ:BIT5-BLOG
HTTP:SQL:INJ:SYMANTEC-IM
HTTP:SQL:INJ:IISPROTECT
HTTP:SQL:INJ:SLRWINDS-STORG-MGR
HTTP:SQL:INJ:XPCMDSHELL
HTTP:SQL:INJ:DELL-SONICWALL
HTTP:SQL:INJ:AGENT-ADMIN
HTTP:SQL:INJ:S9Y-SERENDIPITY
HTTP:SQL:INJ:TIVOLI-USER-UPDATE
HTTP:SQL:INJ:SCOZNET-ADMINNAME
HTTP:SQL:INJ:VERSION-DETECT
HTTP:SQL:INJ:MYSQL-PRIV-ESCAL
HTTP:SQL:INJ:WP-FBCONNECTOR
HTTP:SQL:INJ:JOOMLA-AD-DJ
HTTP:SQL:INJ:WEBID-BLIND-SQL
HTTP:SQL:INJ:VENOM-BOARD
HTTP:SQL:INJ:WP-GD-STAR-RATING
HTTP:SQL:INJ:WP-EVENTS-MGR
HTTP:SQL:INJ:REQ-VAR-4
HTTP:SQL:INJ:COMMENT
HTTP:SQL:INJ:EXEC-MASTER
HTTP:SQL:INJ:WP-SUPER-CAPTCHA
HTTP:SQL:INJ:ACCEPT-LANG-HDR-3
HTTP:SQL:INJ:ADMENTOR-ADMIN
HTTP:SQL:INJ:SYSOBJECTS
HTTP:SQL:INJ:MYSQL-TABLE-NAME
HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY
HTTP:SQL:INJ:OPMNGR-AGENT-SQL
HTTP:SQL:INJ:WP-AJAX-CATEGORY5
HTTP:SQL:INJ:MANAGE-ENGINE-SM
HTTP:SQL:INJ:MANAGEENGINER-RCE
HTTP:SQL:INJ:ALTER-MYSQL
HTTP:SQL:INJ:WP-AJAX-CATEGORY6
HTTP:SQL:INJ:GENERIC
HTTP:SQL:INJ:CMD-CHAIN-1
HTTP:SQL:INJ:UA-HDR-2
HTTP:SQL:INJ:COOKIE-HDR-3
HTTP:SQL:INJ:HTTP-AUTH-HDR-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-1
HTTP:SQL:INJ:ACCEPT-HDR-2
HTTP:SQL:INJ:CONT-TYPE-HDR-3
HTTP:SQL:INJ:PARALLEL-PLESK
HTTP:SQL:INJ:REQ-VAR-3
HTTP:SQL:INJ:HTTP-AUTH-HDR-3
HTTP:SQL:INJ:UA-HDR-1
HTTP:SQL:INJ:UA-HDR-3
HTTP:SQL:INJ:REFERER-HDR-3
HTTP:SQL:INJ:HTTP-HOST-HDR-2
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-1
HTTP:SQL:INJ:COOKIE-HDR-2
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-2
HTTP:SQL:INJ:REFERER-HDR-2
HTTP:SQL:INJ:ACCEPT-HDR-1
HTTP:SQL:INJ:SOLARWINDS
HTTP:SQL:INJ:MULTI-VENDORS-2
HTTP:SQL:INJ:ACCEPT-LANG-HDR-2
HTTP:SQL:INJ:CONT-MD5-HDR-2
HTTP:SQL:INJ:REQ-URL-2
HTTP:SQL:INJ:CONT-MD5-HDR-3
HTTP:SQL:INJ:REQ-URL-1
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-3
HTTP:SQL:INJ:CONT-TYPE-HDR-2
HTTP:SQL:INJ:ACCEPT-LANG-HDR-1
HTTP:SQL:INJ:HTTP-HOST-HDR-1
HTTP:SQL:INJ:HTTP-REQ-HDR-3
HTTP:SQL:INJ:REQ-URL-3
HTTP:SQL:INJ:RESPONSE-PAGE
HTTP:SQL:INJ:HTTP-REQ-HDR-2
HTTP:SQL:INJ:CONT-MD5-HDR-1
HTTP:SQL:INJ:REQ-VAR-2
HTTP:SQL:INJ:CONT-TYPE-HDR-1
HTTP:SQL:INJ:COOKIE-HDR-1
HTTP:SQL:INJ:HTTP-HOST-HDR-3
HTTP:SQL:INJ:ACCEPT-HDR-3
HTTP:SQL:INJ:REFERER-HDR-1
HTTP:SQL:INJ:CONCAT-FUNC-CALL
HTTP:SQL:INJ:CHR-FUNC-CALL
HTTP:SQL:INJ:ASCII-FUNC-CALL
HTTP:SQL:INJ:SELECT-CONCAT-STAT
HTTP:SQL:INJ:HP-LOADR-GETREPORT
HTTP:SQL:INJ:WP-AJAX-CATEGORY7
HTTP:SQL:INJ:WP-AJAX-CATEGORY2
HTTP:SQL:INJ:WP-AJAX-CATEGORY3
HTTP:SQL:INJ:TOLINET-AGNCIA-I11
HTTP:SQL:INJ:TIVOLI-USER-UPDAT1
HTTP:SQL:INJ:OMNISTAR-MAILER1
HTTP:SQL:INJ:AND-NUMBER-EQUALS
HTTP:SQL:INJ:REQ-VAR-1
HTTP:SQL:INJ:CONCAT
HTTP:SQL:INJ:PROC-GENERIC
HTTP:SQL:INJ:JOOMLA-COM-JCE1
HTTP:SQL:INJ:S9Y-SERENDIPITY1
HTTP:SQL:INJ:WP-AJAX-CATEGORY1
HTTP:SQL:INJ:WP-SQL
HTTP:SQL:INJ:CISCO-UCM
HTTP:SQL:INJ:MANAGENGINE-RUNQRY
HTTP:SQL:INJ:MANAGENGINE-IT360
HTTP:SQL:INJ:ACTIVECAMPAIGN
HTTP:SQL:INJ:WP-AJAX-CATEGORY4
HTTP:SQL:INJ:VERSION-DETECT1
HTTP:SQL:INJ:S9Y-SERENDIPITY4
HTTP:SQL:INJ:CA-TOTAL-DEFENSE
HTTP:SQL:INJ:BIZTALK
HTTP:SQL:INJ:INSERT-VALUES
HTTP:SQL:INJ:CMD-IN-URL
HTTP:SQL:INJ:CA-TOTAL-UNCWS
HTTP:SQL:INJ:DRUPAL-DATABASE
HTTP:SQL:INJ:MULTI-VENDORS-1
HTTP:SQL:INJ:CMD-CHAIN-2
HTTP:SQL:INJ:MANAGENGINE-OPMANG
HTTP:SQL:INJ:SOLARWINDS-SQL-INJ
HTTP:SQL:INJ:BTTLXEFORUM
HTTP:SQL:INJ:MERCURY-UA
HTTP:SQL:INJ:SELECT-SUB-DOS
HTTP:SQL:INJ:REMOTE-EXEC

HTTP:STC

HTTP:STC:CVE-2016-0184-RCE
HTTP:STC:SOAPUI-WSDL-WADL-CE
HTTP:STC:QTIME-TEXTBOX-MEMC
HTTP:STC:APPLE-MIME-TYPE-BOF
HTTP:STC:SUSPICIOUS-JS-FUNC
HTTP:STC:MPG123-STEREO-OF
HTTP:STC:SYMANTEC-AV-STACK
HTTP:STC:LOTUS-CAI-URI
HTTP:STC:ACUNETIX-EXT-DOMAIN-BO
HTTP:STC:CVE-2015-6175-PE
HTTP:STC:CVE-2015-2507-CE
HTTP:STC:DIRECTSHOW-AVI-EXEC
HTTP:STC:CVE-2015-6171-PE
HTTP:STC:CVE-2015-2524-PE
HTTP:STC:X11-OVERSIZE-FONT
HTTP:STC:CVE-2016-0123-RCE
HTTP:STC:CVE-2016-0124-RCE
HTTP:STC:MCAFEE-FILE-NAME-OF
HTTP:STC:WMP-AU-DOS
HTTP:STC:NTP-DECODENETNUM-AF
HTTP:STC:MS-CVE-2015-2527-CE
HTTP:STC:CVE-2015-2484-FD
HTTP:STC:CVE-2015-6160-CE
HTTP:STC:CVE-2015-6174-PE
HTTP:STC:APPLE-CFNETWORK-DOS
HTTP:STC:DNAME-RRSIG-DOS
HTTP:STC:CVE-2015-2528-PE
HTTP:STC:WINHELP32-OF2
HTTP:STC:MS-VISUALSTUD-BOF
HTTP:STC:RPM-CPIO-HDR-BOF
HTTP:STC:APPLE-QUIKTME-CE
HTTP:STC:APPLE-QTIME-ENOF-OF
HTTP:STC:CVE-2015-2545-UAF
HTTP:STC:BLACKBERRY-SVR-DOS
HTTP:STC:WIN-SHELLHNDL
HTTP:STC:WGET-REDIRECT
HTTP:STC:AUTODESK-GIF-BO
HTTP:STC:CVE-2015-2513-RCE
HTTP:STC:AV-MAGIC-EVADE
HTTP:STC:IBM-IIM-URI-EXEC
HTTP:STC:XMPLAY-ASX
HTTP:STC:CVE-2015-6140-CE
HTTP:STC:MS-OFFICE-WRITEAV-RCE
HTTP:STC:DESKTOP-INI-CODE-EXE
HTTP:STC:CACHETIME
HTTP:STC:ADVANTECH-WEBACCESS
HTTP:STC:JSXX-OBFS-JS
HTTP:STC:CVE-2015-6164-CSS
HTTP:STC:CVE-2016-0061-CE
HTTP:STC:CVE-2016-0033-DOS
HTTP:STC:SILVERLIGHT-RCE
HTTP:STC:FF-NAV-URI
HTTP:STC:SKYPE4COM
HTTP:STC:OBJ-FILE-BASE64
HTTP:STC:HHP-PARA-OF
HTTP:STC:FILE-UTF7
HTTP:STC:HEADER-UTF7
HTTP:STC:CVE-2016-0157-RCE
HTTP:STC:CVE-2016-0147-CE
HTTP:STC:CVE-2016-0024-RCE
HTTP:STC:CVE-2016-0155-RCE
HTTP:STC:CVE-2016-0158-UXSS
HTTP:STC:CVE-2016-0003-RCE
HTTP:STC:CVE-2015-6066-UAF
HTTP:STC:REPRISE-PARAM-PARSE-BO
HTTP:STC:GOOGLE-APP-MAILTO
HTTP:STC:MALFORMED-RESPONSE1
HTTP:STC:CVE-2016-0161-RCE
HTTP:STC:DOT-NET-ARRAY-RCE
HTTP:STC:INTERWOVEN-WORKDOC-XSS
HTTP:STC:CURL-COOKIE-PATH-RCE
HTTP:STC:WINDOWS-FAX-COVER
HTTP:STC:DOTNET-FRAMEWORK-RCE
HTTP:STC:DIRECT-AVI-WAV-PARSE-1
HTTP:STC:APPLE-ICHAT
HTTP:STC:FIREPHP-COMMAND-EXEC
HTTP:STC:CSS-STATUS-BAR-SPOOF1
HTTP:STC:HIDDEN-IFRAME
HTTP:STC:SBS-TRAIN
HTTP:STC:DOTNET-BUFF-ALLOC4
HTTP:STC:DAVREDIR
HTTP:STC:ABOUT-JAVASCRIPT
HTTP:STC:RESIZE-DOS
HTTP:STC:CVE-2016-0012-MC
HTTP:STC:WIN32KSYS-MEM
HTTP:STC:DOTNET-BUFF-ALLOC
HTTP:STC:ITUNES-PL
HTTP:STC:ITUNES-HANDLER-OF
HTTP:STC:WEBEX-WRF-BOF
HTTP:STC:MS-OBJ-PACKAGER
HTTP:STC:CVE-2015-6143-CE
HTTP:STC:OLE-SHELL1
HTTP:STC:BROWSER-FLOAT-STYLE-MC
HTTP:STC:SCHNEIDER-CFG-FILE-BO1
HTTP:STC:M3U-VLC-SMB-LINK
HTTP:STC:SUSPICIOUS-HYD
HTTP:STC:SUSPICIOUS-WEB-SERVER
HTTP:STC:CVE-2015-2554-PE
HTTP:STC:ADVANTEC-WEBACSES-BOF
HTTP:STC:VAR-EQUALS-REDIRECT
HTTP:STC:DOTNET-BUFF-ALLOC5
HTTP:STC:SUSP-SILVERLIGHT-XAP
HTTP:STC:DOTNET-BUFF-ALLOC7
HTTP:STC:DOTNET-BUFF-ALLOC6
HTTP:STC:DOTNET-BUFF-ALLOC9
HTTP:STC:CVE-2015-6168-RCE
HTTP:STC:WIN-SHELLHNDL1
HTTP:STC:JS-DATA-SCHEME
HTTP:STC:CSS-STATUS-BAR-SPOOF
HTTP:STC:CVE-2015-6135-CE
HTTP:STC:NAV-REDIR
HTTP:STC:DOTNET-BUFF-ALLOC2
HTTP:STC:CVE-2015-6049-CE
HTTP:STC:SUSPICIOUS-JS-ALPHA
HTTP:STC:DOTNET-BUFF-ALLOC3
HTTP:STC:SUSPICIOUS-JS-EVASION
HTTP:STC:HIDDEN-IFRAME-2
HTTP:STC:SAFARI-MALFRMD-URI-DOS
HTTP:STC:APPENDED-MAL-JS
HTTP:STC:DIRECTSHOW-AVI-EXEC1
HTTP:STC:OLE-AUTO-RCE
HTTP:STC:DOTNET-WINFORMS-RCE
HTTP:STC:COREL-WP-BOF
HTTP:STC:CVE-2015-0058-PRIV
HTTP:STC:MS-OFFICE-XP-HTML-LINK
HTTP:STC:SILVERLIGHT-MEM-COR
HTTP:STC:DOTNET-BUFF-ALLOC8
HTTP:STC:WMF-FILE-DOS
HTTP:STC:MS-WORD-INDEX-MC
HTTP:STC:FILE-UPLOAD
HTTP:STC:MS-JSCRIPT-ENGINE-RCE
HTTP:STC:SKYPE-URI-HANDLER
HTTP:STC:PAJAX-RCE
HTTP:STC:GOOGLE-SKETCHUP-PICT
HTTP:STC:FF-SRIALIZE-STREAM-UAF
HTTP:STC:MS-DIRECTSHOW-GIF-RCE
HTTP:STC:MHTML-CDI
HTTP:STC:TELNET-URL-OPTS
HTTP:STC:MS-WIN-JPEG-PARSE-IDIS
HTTP:STC:ADVANTEC-INP-PARAM-RCE
HTTP:STC:CPTEXIMG2D-IO
HTTP:STC:WLW-INFO-DISC
HTTP:STC:MS-DOTNET-NAMESPACE-BO
HTTP:STC:WEBKIT-FLOAT-TYPE-RCE
HTTP:STC:MSXML-XSLT-RCE
HTTP:STC:VLC-ABC-HOVF
HTTP:STC:RHINO-HDR-OF
HTTP:STC:MS-FRONTPAGE-INFO-DISC
HTTP:STC:DATA-SCHEME
HTTP:STC:CVE-2015-0062-PRIV
HTTP:STC:PIWIGO-LOCALFILES-CSRF
HTTP:STC:GOOGLE-CHROME-UAF
HTTP:STC:TRIMBL-NAV-BMP-HOVF
HTTP:STC:CVE-2015-6130-CE
HTTP:STC:DOTNET-SERIALIZATION
HTTP:STC:CANVAS-BABYBOTTLE-GZIP
HTTP:STC:MS-WORD-CVE-2013-1325
HTTP:STC:WINHELP32-MSGBOX-RCE
HTTP:STC:NOVEL-CLIENT-NMX-BOF
HTTP:STC:ADVANTECH-WEBACCES-BOF
HTTP:STC:CVE-2016-0051-DOS
HTTP:STC:HHP-BINARY
HTTP:STC:MS-WINDOWS-FILE-RCE
HTTP:STC:DOT-NET-RCE
HTTP:STC:OLE-SHELL
HTTP:STC:NDROID-BROW-SAME-ORIGN
HTTP:STC:GIT-CLIENT-CE
HTTP:STC:CVE-2016-0058-RCE
HTTP:STC:CVE-2015-0076-INF-DSC
HTTP:STC:M3U-VLC-SMB-LINK-1
HTTP:STC:TOMCAT-CHUNKED-REQ-DOS
HTTP:STC:SCHNEIDER-CFG-FILE-BO
HTTP:STC:MSXML-CVE-2015-1646-SB
HTTP:STC:SAP-SQL-ALIAS-BOF
HTTP:STC:PHP-DATE-TIME-OBJ-RCE
HTTP:STC:CVE-2015-1724-BO
HTTP:STC:CVE-2015-1699-RCE
HTTP:STC:CVE-2015-1677-ID
HTTP:STC:CLAMAV-UPX-DECODE-DOS
HTTP:STC:SILVERLIGHT-CE
HTTP:STC:APPLE-MUL-KERNEL-DOS
HTTP:STC:OSX-UPDATE
HTTP:STC:MS-CVE-2014-4121-RCE
HTTP:STC:DOT-NET-REFLECTION
HTTP:STC:IE-INDEX
HTTP:STC:FAX-COVER-MC
HTTP:STC:URI-INJ
HTTP:STC:APPLE-QTIME-DREF-BO
HTTP:STC:SAFARI-IE-RCE
HTTP:STC:CVE-2016-0046-RCE
HTTP:STC:MS-XML-RCE
HTTP:STC:SEARCH-LINK
HTTP:STC:EMBED-SRC-OF
HTTP:STC:SILVERLIGHT-MEM-CORR
HTTP:STC:SILVERLIGHT-INFO-DISC
HTTP:STC:APPLE-QUICKTIME-CE
HTTP:STC:CVE-2015-1768-PE
HTTP:STC:CVE-2015-6103-RCE
HTTP:STC:CVE-2015-1723-CE
HTTP:STC:CVE-2015-1727-RCE
HTTP:STC:CVE-2016-0038-RCE
HTTP:STC:CVE-2015-1722-KERNL-PE
HTTP:STC:WMF-FILE-DOS1
HTTP:STC:MS-OFFICE-WRITEAV-RCE1
HTTP:STC:MIRC-URI-OF
HTTP:STC:CVE-2015-6097-RCE
HTTP:STC:W32-PARAM-HTTP
HTTP:STC:CVE-2015-6088-RCE
HTTP:STC:DOTNET-BUFF-ALLOC1
HTTP:STC:ORBIT-DL-URL
HTTP:STC:BROWSER-DISPLAY-BOX-MC
HTTP:STC:MS-WINDOWS-FILE-BOF
HTTP:STC:IE-STREAM-HDR
HTTP:STC:UNZIP-EXTRA-FIELD-BO
HTTP:STC:WHSC-RCE
HTTP:STC:APPLE-RTSP-DOS
HTTP:STC:QT-RTSP-LINK-OF
HTTP:STC:MEM-COR-EDGE
HTTP:STC:BROWSER-RUBY-BLOCK
HTTP:STC:HP-LOADRUNNER-RCE
HTTP:STC:PPT-LONGNAME
HTTP:STC:CHAR-CONFLICT
HTTP:STC:ADVANTEC-INP-PARAM-RC1
HTTP:STC:PHP-DATE-TIME-OBJ-UAF
HTTP:STC:CANVAS-BABYBOTTLE
HTTP:STC:OFFCE-CVE-2015-1760-CE
HTTP:STC:RSS-FEED-CODE-INJ
HTTP:STC:MICROSOFT-GDI-TIFF-RCE
HTTP:STC:CVE-2016-0191-RCE
HTTP:STC:DOTNET-XML-SIG-SPOOF
HTTP:STC:HPJ-OPTIONS
HTTP:STC:IMGMAGIC-EPMRL-FL-DEL
HTTP:STC:ORACLE-ENDECA-CSRF
HTTP:STC:CSS-RELOADED
HTTP:STC:WIN-CCL-BOF
HTTP:STC:DIRECTX-AVI-WAV-PARSE
HTTP:STC:MSA-SPOOF
HTTP:STC:PPT-CRAFTED-PATH
HTTP:STC:MS-FOREFRONT-RCE
HTTP:STC:MS-CVE-2015-2460-CE
HTTP:STC:CHTSKDIC
HTTP:STC:WIRESHARK-INSECUREPATH
HTTP:STC:ON-BEFORE-UNLOAD
HTTP:STC:MS-OFFICE-FILE-BOF
HTTP:STC:NOTES-INI
HTTP:STC:MS-CVE-2015-2435-CE
HTTP:STC:AV-GATEWAY-BYPASS

HTTP:STC:ACTIVEX

HTTP:STC:ACTIVEX:CISCO-ASMC
HTTP:STC:ACTIVEX:EBAY
HTTP:STC:ACTIVEX:BACKDOORS
HTTP:STC:ACTIVEX:ADODB-CONNECT
HTTP:STC:ACTIVEX:HP
HTTP:STC:ACTIVEX:BSTORM-WINGRPH
HTTP:STC:ACTIVEX:HPUPDATE
HTTP:STC:ACTIVEX:SYMFAX
HTTP:STC:ACTIVEX:GRPWISE-GIXMIM
HTTP:STC:ACTIVEX:ROXIO-CINEPL
HTTP:STC:ACTIVEX:MCA-VTRACE
HTTP:STC:ACTIVEX:EBOOK-FLIP
HTTP:STC:ACTIVEX:VERYPDF
HTTP:STC:ACTIVEX:WINDVD7
HTTP:STC:ACTIVEX:TM-OS
HTTP:STC:ACTIVEX:PESTPATROL
HTTP:STC:ACTIVEX:THREEDIFY-BOF
HTTP:STC:ACTIVEX:LIVE-MSG
HTTP:STC:ACTIVEX:MSO-DATASRC
HTTP:STC:ACTIVEX:CVE-2015-0016
HTTP:STC:ACTIVEX:EASYMAIL
HTTP:STC:ACTIVEX:UNITRONICS-COR
HTTP:STC:ACTIVEX:MS-AGENT-LIB1
HTTP:STC:ACTIVEX:UNCOMMON-AX
HTTP:STC:ACTIVEX:CVE-2016-0113
HTTP:STC:ACTIVEX:TRENDNET
HTTP:STC:ACTIVEX:MOROVIA-BARCOD
HTTP:STC:ACTIVEX:QUEST-PNLLMCLI
HTTP:STC:ACTIVEX:VLOG-OPLC-ACTX
HTTP:STC:ACTIVEX:DLINK-DCS-5605
HTTP:STC:ACTIVEX:QUEST-INTRUST
HTTP:STC:ACTIVEX:SAM-CONNECTDDN
HTTP:STC:ACTIVEX:IRFILEIOSRVC
HTTP:STC:ACTIVEX:GATEWAYX
HTTP:STC:ACTIVEX:ASK-COM
HTTP:STC:ACTIVEX:TM-HOUSECALL
HTTP:STC:ACTIVEX:GOMPLAYER
HTTP:STC:ACTIVEX:LINKSYS
HTTP:STC:ACTIVEX:RWSO
HTTP:STC:ACTIVEX:REVEALTRANS
HTTP:STC:ACTIVEX:HTMLSAFHLP
HTTP:STC:ACTIVEX:MAL-CON-2
HTTP:STC:ACTIVEX:HPVIRTUAL
HTTP:STC:ACTIVEX:CISCO-CSD-WEB
HTTP:STC:ACTIVEX:MACINSTALL
HTTP:STC:ACTIVEX:OLE-AUTO
HTTP:STC:ACTIVEX:DERIVO
HTTP:STC:ACTIVEX:MCFE-OVERWRITE
HTTP:STC:ACTIVEX:SAP-IRRFC-OF
HTTP:STC:ACTIVEX:QUEST-TOAD-DBA
HTTP:STC:ACTIVEX:UBISOFT-UPLAY
HTTP:STC:ACTIVEX:WINIMGLOG
HTTP:STC:ACTIVEX:SAPI-DLL
HTTP:STC:ACTIVEX:QUEST-RCE
HTTP:STC:ACTIVEX:VIDEOCALL
HTTP:STC:ACTIVEX:SAP-BEXGLOBAL
HTTP:STC:ACTIVEX:JETAUDIO-DIR
HTTP:STC:ACTIVEX:EDRAW-LIC-NAME
HTTP:STC:ACTIVEX:JVIEWPRO
HTTP:STC:ACTIVEX:ADESK-AX
HTTP:STC:ACTIVEX:SCHNEIDER-PROC
HTTP:STC:ACTIVEX:MITSUBISHI
HTTP:STC:ACTIVEX:VIELIB
HTTP:STC:ACTIVEX:DELL-INFO-DISC
HTTP:STC:ACTIVEX:MSGSC-DLL
HTTP:STC:ACTIVEX:EASEWE-FTP
HTTP:STC:ACTIVEX:REAL-GAMEHOUSE
HTTP:STC:ACTIVEX:HP-APP-LIFE
HTTP:STC:ACTIVEX:UUSEE-UUPLAYER
HTTP:STC:ACTIVEX:HP-MERC-CLR1
HTTP:STC:ACTIVEX:MS-IE-WMS1
HTTP:STC:ACTIVEX:IMAGE-VIEWER
HTTP:STC:ACTIVEX:IBM-SPSS-EXHTM
HTTP:STC:ACTIVEX:IMESH-IMWEBCON
HTTP:STC:ACTIVEX:ISIS-AFP-BO
HTTP:STC:ACTIVEX:LEADTOOLS
HTTP:STC:ACTIVEX:SOLARWINDS-BO
HTTP:STC:ACTIVEX:SAMSUNG-BACKUP
HTTP:STC:ACTIVEX:DRM-MSNETOBJ
HTTP:STC:ACTIVEX:GE-HISTORIAN
HTTP:STC:ACTIVEX:SOPCAST-CNAME
HTTP:STC:ACTIVEX:CHILLKAT-CRYPT
HTTP:STC:ACTIVEX:WONDERWARE
HTTP:STC:ACTIVEX:INST-SHLD-FO
HTTP:STC:ACTIVEX:CRYSTAL-SEARCH
HTTP:STC:ACTIVEX:SAMSUNG-NET-I
HTTP:STC:ACTIVEX:LTOCXTWAINU
HTTP:STC:ACTIVEX:MAPGUIDE-LAYER
HTTP:STC:ACTIVEX:EDRAW-OFF-BOF
HTTP:STC:ACTIVEX:MOXA-PFILENAME
HTTP:STC:ACTIVEX:AVAYA-ONE-X
HTTP:STC:ACTIVEX:MCFEE-MCINSCTL
HTTP:STC:ACTIVEX:GESTEC-ELONFMT
HTTP:STC:ACTIVEX:DELL-SCANNER
HTTP:STC:ACTIVEX:CODEBASE
HTTP:STC:ACTIVEX:SAP-CRSTL-RPT
HTTP:STC:ACTIVEX:SAM-SMARTVIEW
HTTP:STC:ACTIVEX:IENIPP
HTTP:STC:ACTIVEX:ORACLE-DOC-CAP
HTTP:STC:ACTIVEX:HYLEOS
HTTP:STC:ACTIVEX:ALADDIN
HTTP:STC:ACTIVEX:PHOTOBASIC-AX
HTTP:STC:ACTIVEX:AURIGMAIMG
HTTP:STC:ACTIVEX:MSCOMM32
HTTP:STC:ACTIVEX:CA-ETRUST
HTTP:STC:ACTIVEX:DECISIONTOOLS
HTTP:STC:ACTIVEX:MS-DEBUGDIAG4
HTTP:STC:ACTIVEX:CYGNICON
HTTP:STC:ACTIVEX:BARCODEWIZ
HTTP:STC:ACTIVEX:LIVE-WRITER
HTTP:STC:ACTIVEX:IBMINTS-INT-OF
HTTP:STC:ACTIVEX:CHILKAT-FTP2
HTTP:STC:ACTIVEX:PRO-SOFTNET
HTTP:STC:ACTIVEX:RKD-BARCODE
HTTP:STC:ACTIVEX:PCVUE-SCADA
HTTP:STC:ACTIVEX:REAL-IEFRAME
HTTP:STC:ACTIVEX:SYMC-NAVCOMUI
HTTP:STC:ACTIVEX:CLSID-OBFUS
HTTP:STC:ACTIVEX:EDRAW-VIEWER
HTTP:STC:ACTIVEX:CO-FLEXGRID
HTTP:STC:ACTIVEX:2X-APPLICATION
HTTP:STC:ACTIVEX:STARUML
HTTP:STC:ACTIVEX:C6-URL-DL
HTTP:STC:ACTIVEX:SUNWAY
HTTP:STC:ACTIVEX:IBM-VSVIEW6
HTTP:STC:ACTIVEX:ABB-CWGRAPH3D
HTTP:STC:ACTIVEX:EMC-KEYHELP
HTTP:STC:ACTIVEX:YAHOO-CD-PLY
HTTP:STC:ACTIVEX:MCAFEE-MYCIO
HTTP:STC:ACTIVEX:AOL-PHOBOS
HTTP:STC:ACTIVEX:BENNET-TEC
HTTP:STC:ACTIVEX:TEECHARTPRO-OF
HTTP:STC:ACTIVEX:AXVLC
HTTP:STC:ACTIVEX:SAP-GUI-TABONE
HTTP:STC:ACTIVEX:SAP-WEBBVIEWER
HTTP:STC:ACTIVEX:DOM-INOTES-WEB
HTTP:STC:ACTIVEX:WKIMGSRV
HTTP:STC:ACTIVEX:FACEBOOK-PHOTO
HTTP:STC:ACTIVEX:SAPGUI-AX
HTTP:STC:ACTIVEX:MSXML2-MEMCORR
HTTP:STC:ACTIVEX:WEBVIEWER3D3
HTTP:STC:ACTIVEX:WEBVIEWER3D4
HTTP:STC:ACTIVEX:MDAC-DATASPACE
HTTP:STC:ACTIVEX:URLMON-DLL
HTTP:STC:ACTIVEX:MSACCESS-AX
HTTP:STC:ACTIVEX:EASYMAIL-EXP
HTTP:STC:ACTIVEX:TUMBLEWEED
HTTP:STC:ACTIVEX:VLOGIC-MEMCP
HTTP:STC:ACTIVEX:SKINCRAFTER-OF
HTTP:STC:ACTIVEX:IMAGESHACK
HTTP:STC:ACTIVEX:AWINGSOFT
HTTP:STC:ACTIVEX:SHELL-APP
HTTP:STC:ACTIVEX:JNPR-SSL-VPN
HTTP:STC:ACTIVEX:ATTACHMATE-REF
HTTP:STC:ACTIVEX:AURIGMA
HTTP:STC:ACTIVEX:FLASH9D-CSS
HTTP:STC:ACTIVEX:HP-LOADRUNER
HTTP:STC:ACTIVEX:MS-ICARDIE
HTTP:STC:ACTIVEX:ADVANCED-FILE
HTTP:STC:ACTIVEX:NETCRAFT
HTTP:STC:ACTIVEX:DBPOWERAMP
HTTP:STC:ACTIVEX:YAHOO-RCE
HTTP:STC:ACTIVEX:ULTRAOFFIC
HTTP:STC:ACTIVEX:FLASH-PLY-NULL
HTTP:STC:ACTIVEX:AOL-AMPX
HTTP:STC:ACTIVEX:KVIEW-KCHARTXY
HTTP:STC:ACTIVEX:HUSDAWG
HTTP:STC:ACTIVEX:ORACLE-SIEBEL
HTTP:STC:ACTIVEX:JAVA-DTK
HTTP:STC:ACTIVEX:DAXCTLE
HTTP:STC:ACTIVEX:HP-XUPLOAD-OCX
HTTP:STC:ACTIVEX:ATUCFOBJ-DLL
HTTP:STC:ACTIVEX:YSHORTCUT
HTTP:STC:ACTIVEX:WINZIP-CMDLINE
HTTP:STC:ACTIVEX:MOVIE-PLAYER
HTTP:STC:ACTIVEX:SONY-PCOMP-BOF
HTTP:STC:ACTIVEX:CYME-POWER-ENG
HTTP:STC:ACTIVEX:WIBUKEY-RT-BO
HTTP:STC:ACTIVEX:HONEYWELL-TEMA
HTTP:STC:ACTIVEX:MSCOMCTL-OCX1
HTTP:STC:ACTIVEX:MITSUBISHI-V3
HTTP:STC:ACTIVEX:LIQUIDXML-MULT
HTTP:STC:ACTIVEX:MAGNETOSOFT-OF
HTTP:STC:ACTIVEX:SIEMENS-WINCC
HTTP:STC:ACTIVEX:MAGNETO-ICMP
HTTP:STC:ACTIVEX:MAGNETOSOFT
HTTP:STC:ACTIVEX:MAGNETOSOFT-OV
HTTP:STC:ACTIVEX:EBCRYPT-PRNG
HTTP:STC:ACTIVEX:GOMPLAYER6
HTTP:STC:ACTIVEX:GOMPLAYER5
HTTP:STC:ACTIVEX:IBM-ACCESS
HTTP:STC:ACTIVEX:SPEECH-API
HTTP:STC:ACTIVEX:SAMSNG-KIES
HTTP:STC:ACTIVEX:ORACLE-DSCXB
HTTP:STC:ACTIVEX:KASP-AX
HTTP:STC:ACTIVEX:NATIONAL-INST
HTTP:STC:ACTIVEX:ISOVIEW-BOF
HTTP:STC:ACTIVEX:VMWARE-FS
HTTP:STC:ACTIVEX:MS-MDAC
HTTP:STC:ACTIVEX:BROADWIN
HTTP:STC:ACTIVEX:MSMASK32-OCX
HTTP:STC:ACTIVEX:LIVE-PROFILE
HTTP:STC:ACTIVEX:ORA-AUTOVUE
HTTP:STC:ACTIVEX:ORBIT-DWNLDR
HTTP:STC:ACTIVEX:ADODB
HTTP:STC:ACTIVEX:HPIS-DATA-MGR
HTTP:STC:ACTIVEX:SYNACTISPDF-BO
HTTP:STC:ACTIVEX:CITRIX-NSEPA
HTTP:STC:ACTIVEX:SNAPVIEW-RCE
HTTP:STC:ACTIVEX:ICONICS-WEBHMI
HTTP:STC:ACTIVEX:WEBVIEWER3D2
HTTP:STC:ACTIVEX:ZENWORKS
HTTP:STC:ACTIVEX:PANASONIC-API
HTTP:STC:ACTIVEX:MS-OWC
HTTP:STC:ACTIVEX:IBM-TIVOLI
HTTP:STC:ACTIVEX:ORACLE-SSSPLT
HTTP:STC:ACTIVEX:FLEXERA-ISGRID
HTTP:STC:ACTIVEX:CLEARQUEST-OLE
HTTP:STC:ACTIVEX:LPVIEWER
HTTP:STC:ACTIVEX:ORACLE-FILEC
HTTP:STC:ACTIVEX:MSXML-INFODISC
HTTP:STC:ACTIVEX:GOMPLAYER8
HTTP:STC:ACTIVEX:SAMSUNG-CNC
HTTP:STC:ACTIVEX:HPSUPPORT
HTTP:STC:ACTIVEX:DATA-ANALYSIS
HTTP:STC:ACTIVEX:DEV-TOOL
HTTP:STC:ACTIVEX:GOMPLAYER9
HTTP:STC:ACTIVEX:HONEYWELL-EBI
HTTP:STC:ACTIVEX:MSVIDCTL-1
HTTP:STC:ACTIVEX:XMLHTTP
HTTP:STC:ACTIVEX:MS-OWC-RCE
HTTP:STC:ACTIVEX:ACCESS-CORRUPT
HTTP:STC:ACTIVEX:IEMOUSE-IMGTAG
HTTP:STC:ACTIVEX:MS-WIN-MSGR
HTTP:STC:ACTIVEX:YMAILATTACH-OF
HTTP:STC:ACTIVEX:GOMPLAYER7
HTTP:STC:ACTIVEX:OWC
HTTP:STC:ACTIVEX:UNITONICS-OPLC
HTTP:STC:ACTIVEX:ORCLE-WEBCENTR
HTTP:STC:ACTIVEX:IBM-INOTES-BOF
HTTP:STC:ACTIVEX:IBM-SPSS-MRAB
HTTP:STC:ACTIVEX:WMEX
HTTP:STC:ACTIVEX:ADVANTECH-BOF
HTTP:STC:ACTIVEX:ORACLE-CROPROJ
HTTP:STC:ACTIVEX:CAPICOM
HTTP:STC:ACTIVEX:IE-POPUP
HTTP:STC:ACTIVEX:SIEMENS-SOLID
HTTP:STC:ACTIVEX:CODEBASE-2
HTTP:STC:ACTIVEX:MW6-BARCODE
HTTP:STC:ACTIVEX:HP-RCE
HTTP:STC:ACTIVEX:SOLARWINDS
HTTP:STC:ACTIVEX:MCKESSON
HTTP:STC:ACTIVEX:UBISOFT
HTTP:STC:ACTIVEX:QUICKTIME-BOF
HTTP:STC:ACTIVEX:WEBGATE-WESP
HTTP:STC:ACTIVEX:ELECTRIC-PELCO
HTTP:STC:ACTIVEX:SAMSUNG-VIEWER
HTTP:STC:ACTIVEX:DOM-TYPE
HTTP:STC:ACTIVEX:MS-DOS
HTTP:STC:ACTIVEX:REAL-PLR-RPAU
HTTP:STC:ACTIVEX:ORACLE-DQ-TRLM
HTTP:STC:ACTIVEX:OFFICE-OCX
HTTP:STC:ACTIVEX:AGILENT-INSERT
HTTP:STC:ACTIVEX:DELL-WEBCAM
HTTP:STC:ACTIVEX:HNYWLL-OPOS
HTTP:STC:ACTIVEX:IE-DA
HTTP:STC:ACTIVEX:MS-OWC-BOF
HTTP:STC:ACTIVEX:ALTIRIS
HTTP:STC:ACTIVEX:HP-SPRINTR-BOF
HTTP:STC:ACTIVEX:ORACLE-TTF16
HTTP:STC:ACTIVEX:ORACLE-RCE
HTTP:STC:ACTIVEX:IBM-C1SIZER
HTTP:STC:ACTIVEX:VMWARE
HTTP:STC:ACTIVEX:DOC-CAPTURE-BO
HTTP:STC:ACTIVEX:JBOX
HTTP:STC:ACTIVEX:HP-EASYPRINTER
HTTP:STC:ACTIVEX:WORD-VIEWER
HTTP:STC:ACTIVEX:MS-IE-COM-RCE
HTTP:STC:ACTIVEX:DATA-ACTIVEBAR
HTTP:STC:ACTIVEX:CA-XMLSECDB
HTTP:STC:ACTIVEX:IBM-LOTUS-QIKR
HTTP:STC:ACTIVEX:SETHTMLFILE
HTTP:STC:ACTIVEX:HP-AUDIO-REC
HTTP:STC:ACTIVEX:MSCOMCTL-OCX
HTTP:STC:ACTIVEX:SYMC-APPSTEAM
HTTP:STC:ACTIVEX:WMP-SCRIPT
HTTP:STC:ACTIVEX:RDP-UNSAFE-AX
HTTP:STC:ACTIVEX:PDWIZARD
HTTP:STC:ACTIVEX:IBM-RATIONAL
HTTP:STC:ACTIVEX:HHCTRL-IMAGE
HTTP:STC:ACTIVEX:EMV-PIXTOOLS
HTTP:STC:ACTIVEX:IETAB-AX
HTTP:STC:ACTIVEX:ASUS-NETSWITCH
HTTP:STC:ACTIVEX:CISCO-VPN
HTTP:STC:ACTIVEX:MS-IE-WMS
HTTP:STC:ACTIVEX:AXIS-MEDIA-BO
HTTP:STC:ACTIVEX:CTSUENG-OCX
HTTP:STC:ACTIVEX:ADDCOLUMN
HTTP:STC:ACTIVEX:CA-WEBSCAN-AX
HTTP:STC:ACTIVEX:GOMPLAYER1
HTTP:STC:ACTIVEX:ICQPHONE-EXEC
HTTP:STC:ACTIVEX:QTPLUGINX
HTTP:STC:ACTIVEX:ICONICS-WEBHM1
HTTP:STC:ACTIVEX:BORLAND-TCHAR1
HTTP:STC:ACTIVEX:WFILESTRING
HTTP:STC:ACTIVEX:MS-DEBUGDIAG1
HTTP:STC:ACTIVEX:PERSITS-UPLOA1
HTTP:STC:ACTIVEX:JRE-DNSRESOLVE
HTTP:STC:ACTIVEX:INDUSOFT-ISSY1
HTTP:STC:ACTIVEX:SASCAM-WEBCAM1
HTTP:STC:ACTIVEX:REAL-IEFRAME1
HTTP:STC:ACTIVEX:NOVELL-CLIENT
HTTP:STC:ACTIVEX:GUI-CM-CTRLS
HTTP:STC:ACTIVEX:REAL-PLAYER
HTTP:STC:ACTIVEX:WEBVIEWER3D1
HTTP:STC:ACTIVEX:SNOOPYCTRL
HTTP:STC:ACTIVEX:MS-SQLDMO
HTTP:STC:ACTIVEX:DATASRCCTL
HTTP:STC:ACTIVEX:ISSYMBOL
HTTP:STC:ACTIVEX:HPQUTIL
HTTP:STC:ACTIVEX:EASYMAIL-LEAK
HTTP:STC:ACTIVEX:KVIEW-KCHARTX1
HTTP:STC:ACTIVEX:BACKWEB-LIA
HTTP:STC:ACTIVEX:WIN2K-AX
HTTP:STC:ACTIVEX:SCHNEIDER-ELEC
HTTP:STC:ACTIVEX:MW6-MAXICODE
HTTP:STC:ACTIVEX:VISAGESFT-PDF
HTTP:STC:ACTIVEX:WELLINTECH
HTTP:STC:ACTIVEX:TRIEDITDOC
HTTP:STC:ACTIVEX:ADVANTECH-WEB
HTTP:STC:ACTIVEX:HP-SPRINTER
HTTP:STC:ACTIVEX:NORTON-SYMSPAM
HTTP:STC:ACTIVEX:SQLVDIR-DLL
HTTP:STC:ACTIVEX:MS-DEBUGDIAG3
HTTP:STC:ACTIVEX:EASEWE-FTP3
HTTP:STC:ACTIVEX:MS-DEBUGDIAG2
HTTP:STC:ACTIVEX:NETIQ-BO
HTTP:STC:ACTIVEX:SONY-WIFIMAN
HTTP:STC:ACTIVEX:VS05-INJ
HTTP:STC:ACTIVEX:NSKEY-DLL
HTTP:STC:ACTIVEX:TOM-SAMYER-GET
HTTP:STC:ACTIVEX:SYGATE-SSHELP
HTTP:STC:ACTIVEX:MCAFEE-FREESCN
HTTP:STC:ACTIVEX:BAOFENG-BO
HTTP:STC:ACTIVEX:MS-AGENT-LIB
HTTP:STC:ACTIVEX:VLC-PLY-RCE
HTTP:STC:ACTIVEX:WMI-ADMIN
HTTP:STC:ACTIVEX:CRYSTAL-PRINT
HTTP:STC:ACTIVEX:PVCAL
HTTP:STC:ACTIVEX:HXVZ
HTTP:STC:ACTIVEX:ORACLE-DATAINT
HTTP:STC:ACTIVEX:SOFTARTISANS
HTTP:STC:ACTIVEX:MICRO-FOCUS
HTTP:STC:ACTIVEX:YAHOO-AUDIO
HTTP:STC:ACTIVEX:IE-ECENTREX
HTTP:STC:ACTIVEX:ISUSWEB
HTTP:STC:ACTIVEX:KAZAA-ALTNET
HTTP:STC:ACTIVEX:TROUBLE-QUERY
HTTP:STC:ACTIVEX:VISBASIC6-AX-1
HTTP:STC:ACTIVEX:OFFICEVIEW-DOS
HTTP:STC:ACTIVEX:OLEAUTO32
HTTP:STC:ACTIVEX:TM-ISP-2010
HTTP:STC:ACTIVEX:HP-PROTECT-DAM
HTTP:STC:ACTIVEX:IPSWITCH-IMAIL
HTTP:STC:ACTIVEX:SONICWALL-VPN
HTTP:STC:ACTIVEX:AXIS-CAMERA
HTTP:STC:ACTIVEX:GOMPLAYER4
HTTP:STC:ACTIVEX:SCHNEIDER
HTTP:STC:ACTIVEX:WFICA
HTTP:STC:ACTIVEX:MSVIDCTL-2
HTTP:STC:ACTIVEX:VULN-DHTML
HTTP:STC:ACTIVEX:IE-CCRP
HTTP:STC:ACTIVEX:CITRIX-GATEWAY
HTTP:STC:ACTIVEX:MW6-AZTEC-BO
HTTP:STC:ACTIVEX:NOVELL-RCE
HTTP:STC:ACTIVEX:AKAMAI-DM
HTTP:STC:ACTIVEX:XML-CORE-3-0
HTTP:STC:ACTIVEX:NOVELL-GRPWISE
HTTP:STC:ACTIVEX:CA-PSFORMX-AX
HTTP:STC:ACTIVEX:ADVANTECH-OF
HTTP:STC:ACTIVEX:IBM-SPSS
HTTP:STC:ACTIVEX:SAM-DVMR
HTTP:STC:ACTIVEX:RICHTXT
HTTP:STC:ACTIVEX:MCAFEE-VT
HTTP:STC:ACTIVEX:VFP6R
HTTP:STC:ACTIVEX:ADOBE-DL-MGR
HTTP:STC:ACTIVEX:BB-LOAD
HTTP:STC:ACTIVEX:COM-OBJ
HTTP:STC:ACTIVEX:PROCLIMA-F1BV
HTTP:STC:ACTIVEX:VB-TLBINF32
HTTP:STC:ACTIVEX:SYMC-CLIPROXY
HTTP:STC:ACTIVEX:WEBGATE-WESPM
HTTP:STC:ACTIVEX:REAL-IERPCTL
HTTP:STC:ACTIVEX:HP-OPOS-DRIVER
HTTP:STC:ACTIVEX:SAMSUNG-KIES
HTTP:STC:ACTIVEX:NTR-BOF
HTTP:STC:ACTIVEX:CISCO-WVC200
HTTP:STC:ACTIVEX:HP-SW-UPDATE
HTTP:STC:ACTIVEX:HP-EASY-XML
HTTP:STC:ACTIVEX:FLEXERA

HTTP:STC:ADOBE

HTTP:STC:ADOBE:CVE-2016-0939-CE
HTTP:STC:ADOBE:CVE-2016-0946-CE
HTTP:STC:ADOBE:FLASH-ARGREST
HTTP:STC:ADOBE:CVE-2016-0933-CE
HTTP:STC:ADOBE:CVE-2016-0938-CE
HTTP:STC:ADOBE:CVE-2016-0941-CE
HTTP:STC:ADOBE:CVE-2016-0944-CE
HTTP:STC:ADOBE:CVE-2015-5091-CE
HTTP:STC:ADOBE:CVE-2016-0943-CE
HTTP:STC:ADOBE:CVE-2015-5089-CE
HTTP:STC:ADOBE:PDF-DESC-FONTS
HTTP:STC:ADOBE:CVE-2015-5550-CE
HTTP:STC:ADOBE:CVE-2016-0936-CE
HTTP:STC:ADOBE:CVE-2016-0945-CE
HTTP:STC:ADOBE:CVE-2016-0934-CE
HTTP:STC:ADOBE:CVE-2016-0947-CE
HTTP:STC:ADOBE:SWF-FLASH-OF
HTTP:STC:ADOBE:READER-DCT-NULL
HTTP:STC:ADOBE:CVE-2015-3096-SB
HTTP:STC:ADOBE:2014-0557-RCE
HTTP:STC:ADOBE:PDF-CATALOG
HTTP:STC:ADOBE:CVE-2016-0940-CE
HTTP:STC:ADOBE:SWF-INFO-DISC
HTTP:STC:ADOBE:PDF-HEAP-RCE
HTTP:STC:ADOBE:CVE-2014-0534-SB
HTTP:STC:ADOBE:READER-DOS
HTTP:STC:ADOBE:CVE-2014-0559-BO
HTTP:STC:ADOBE:CVE-2015-5096-CE
HTTP:STC:ADOBE:FLASH-MP3-TAG-CE
HTTP:STC:ADOBE:CVE-2015-4441-CE
HTTP:STC:ADOBE:CVE-2015-5564-CE
HTTP:STC:ADOBE:CVE-2016-4116-CE
HTTP:STC:ADOBE:CVE-2016-1080-CE
HTTP:STC:ADOBE:CVE-2015-5554-CE
HTTP:STC:ADOBE:CVE-2016-1072-CE
HTTP:STC:ADOBE:CVE-2015-5562-CE
HTTP:STC:ADOBE:CVE-2015-5576-C1
HTTP:STC:ADOBE:CVE-2014-0545-MC
HTTP:STC:ADOBE:CVE-2016-1090-CE
HTTP:STC:ADOBE:CVE-2016-1042-CE
HTTP:STC:ADOBE:CVE-2016-1097-CE
HTTP:STC:ADOBE:THUMBNAIL-RCE
HTTP:STC:ADOBE:CVE-2016-1039-CE
HTTP:STC:ADOBE:CVE-2016-1043-CE
HTTP:STC:ADOBE:CVE-2016-1092-CE
HTTP:STC:ADOBE:CVE-2016-1111-CE
HTTP:STC:ADOBE:CVE-2016-1100-CE
HTTP:STC:ADOBE:CVE-2015-3125-ID
HTTP:STC:ADOBE:CVE-2015-4435-CE
HTTP:STC:ADOBE:CVE-2016-1109-CE
HTTP:STC:ADOBE:CVE-2016-1065-CE
HTTP:STC:ADOBE:CVE-2016-1063-CE
HTTP:STC:ADOBE:CVE-2015-3129-CE
HTTP:STC:ADOBE:CVE-2016-1037-CE
HTTP:STC:ADOBE:CVE-2016-1060-CE
HTTP:STC:ADOBE:CVE-2016-1074-CE
HTTP:STC:ADOBE:CVE-2016-1071-CE
HTTP:STC:ADOBE:FLASH-DEFINE-TAG
HTTP:STC:ADOBE:CVE-2016-1048-CE
HTTP:STC:ADOBE:CVE-2016-1096-CE
HTTP:STC:ADOBE:CVE-2016-1099-CE
HTTP:STC:ADOBE:CVE-2016-1066-CE
HTTP:STC:ADOBE:CVE-2016-1073-CE
HTTP:STC:ADOBE:CVE-2016-1059-CE
HTTP:STC:ADOBE:CVE-2016-1082-CE
HTTP:STC:ADOBE:FLASH-DYN-SCRIPT
HTTP:STC:ADOBE:CVE-2016-1040-CE
HTTP:STC:ADOBE:CVE-2016-1056-CE
HTTP:STC:ADOBE:CVE-2016-1049-CE
HTTP:STC:ADOBE:CVE-2016-1069-CE
HTTP:STC:ADOBE:CVE-2015-5565-CE
HTTP:STC:ADOBE:CVE-2016-1078-CE
HTTP:STC:ADOBE:CVE-2016-1055-CE
HTTP:STC:ADOBE:CVE-2016-1110-CE
HTTP:STC:ADOBE:CVE-2016-1017-CE
HTTP:STC:ADOBE:CVE-2016-1108-CE
HTTP:STC:ADOBE:CVE-2016-1106-CE
HTTP:STC:ADOBE:CVE-2016-1062-CE
HTTP:STC:ADOBE:CVE-2016-1076-CE
HTTP:STC:ADOBE:MUL-JS-API-CE
HTTP:STC:ADOBE:FLASH-FLV-MEM
HTTP:STC:ADOBE:PDF-UUEXEC
HTTP:STC:ADOBE:CVE-2016-1094-CE
HTTP:STC:ADOBE:CVE-2016-1046-CE
HTTP:STC:ADOBE:CVE-2016-1107-CE
HTTP:STC:ADOBE:CVE-2016-4108-CE
HTTP:STC:ADOBE:CVE-2016-1079-CE
HTTP:STC:ADOBE:CVE-2016-1047-CE
HTTP:STC:ADOBE:GETANNOTS-RCE
HTTP:STC:ADOBE:FLASH-AS-MEM-DOS
HTTP:STC:ADOBE:CVE-2016-1064-CE
HTTP:STC:ADOBE:CVE-2016-1085-CE
HTTP:STC:ADOBE:CVE-2016-1001-CE
HTTP:STC:ADOBE:CVE-2016-0993-CE
HTTP:STC:ADOBE:CVE-2016-0990-CE
HTTP:STC:ADOBE:CVE-2015-3124-CE
HTTP:STC:ADOBE:CVE-2016-0961-CE
HTTP:STC:ADOBE:CVE-2016-0988-CE
HTTP:STC:ADOBE:CVE-2015-8655-CE
HTTP:STC:ADOBE:CVE-2016-0995-CE
HTTP:STC:ADOBE:CVE-2016-0987-CE
HTTP:STC:ADOBE:CVE-2016-0986-DS
HTTP:STC:ADOBE:CVE-2016-0994-CE
HTTP:STC:ADOBE:CVE-2016-1045-CE
HTTP:STC:ADOBE:CVE-2016-0962-CE
HTTP:STC:ADOBE:CVE-2016-4117-CE
HTTP:STC:ADOBE:CVE-2016-1009-CE
HTTP:STC:ADOBE:CVE-2016-1095-CE
HTTP:STC:ADOBE:FLASH-NULL-PTR
HTTP:STC:ADOBE:CVE-2016-0963-CE
HTTP:STC:ADOBE:CVE-2016-0991-CE
HTTP:STC:ADOBE:CVE-2016-0960-CE
HTTP:STC:ADOBE:CONVFILTER-UAF
HTTP:STC:ADOBE:CVE-2016-1088-CE
HTTP:STC:ADOBE:CVE-2014-9159-BO
HTTP:STC:ADOBE:CVE-2016-1105-CE
HTTP:STC:ADOBE:CVE-2016-1058-CE
HTTP:STC:ADOBE:ACROFORM-NULL-CE
HTTP:STC:ADOBE:NETMONITOR-UAF
HTTP:STC:ADOBE:CVE-2014-8459-MC
HTTP:STC:ADOBE:CVE-2015-5105-CE
HTTP:STC:ADOBE:CVE-2015-3078-DS
HTTP:STC:ADOBE:CVE-2016-0931-CE
HTTP:STC:ADOBE:CVE-2016-0932-CE
HTTP:STC:ADOBE:CVE-2015-0301-MC
HTTP:STC:ADOBE:TEXTLINE-OB-CE1
HTTP:STC:ADOBE:PDF-COMPACT
HTTP:STC:ADOBE:SWF-INVALID-OBF1
HTTP:STC:ADOBE:CVE-2016-0935-CE
HTTP:STC:ADOBE:U3D-TEXTURE-BOF1
HTTP:STC:ADOBE:CVE-2014-9165-UA
HTTP:STC:ADOBE:CVE-2015-5107-CE
HTTP:STC:ADOBE:READER-10.1.4-MC
HTTP:STC:ADOBE:CVE-2015-5108-BO
HTTP:STC:ADOBE:PDF-JS-METHOD
HTTP:STC:ADOBE:READER-NULL-PTR
HTTP:STC:ADOBE:PDF-GOTO-XSS
HTTP:STC:ADOBE:CVE-2015-0306-MC
HTTP:STC:ADOBE:CVE-2015-312-RCE
HTTP:STC:ADOBE:CVE-2015-4449-CE
HTTP:STC:ADOBE:PDF-OPENACTION
HTTP:STC:ADOBE:CVE-2015-7625-CE
HTTP:STC:ADOBE:PDF-MAL-JPEG
HTTP:STC:ADOBE:2015-0310-REGMCP
HTTP:STC:ADOBE:CVE-2014-8452-SB
HTTP:STC:ADOBE:READER-ICC-RCE1
HTTP:STC:ADOBE:CVE-2014-0587-MC
HTTP:STC:ADOBE:FLASH-FIREFOX
HTTP:STC:ADOBE:PDF-ICC-PRODESC
HTTP:STC:ADOBE:PDF-OBFUSCATION
HTTP:STC:ADOBE:PDF-TJ-OBJECT
HTTP:STC:ADOBE:CVE-2014-0493-CE
HTTP:STC:ADOBE:CVE-2015-7627-CE
HTTP:STC:ADOBE:PDF-CLUT
HTTP:STC:ADOBE:PARSE-FLOAT-BOF1
HTTP:STC:ADOBE:FLASH-INT-DOS
HTTP:STC:ADOBE:WRITE-CONFUSION
HTTP:STC:ADOBE:PDF-U3D-BO
HTTP:STC:ADOBE:CVE-2015-5551-CE
HTTP:STC:ADOBE:SWF-MAL-FILE
HTTP:STC:ADOBE:EMBED-OBJ-MIME
HTTP:STC:ADOBE:CVE-2015-5540-CE
HTTP:STC:ADOBE:CVE-2015-7631-CE
HTTP:STC:ADOBE:CVE-2015-5109-CE
HTTP:STC:ADOBE:CVE-2015-3050-CE
HTTP:STC:ADOBE:MEMDSC-2014-0552
HTTP:STC:ADOBE:XFIR-PAMI-RCE
HTTP:STC:ADOBE:FLASH-INT-OVF
HTTP:STC:ADOBE:CVE-2014-0574-MC
HTTP:STC:ADOBE:CVE-2015-7633-CE
HTTP:STC:ADOBE:FLASH-INVOP
HTTP:STC:ADOBE:READER-FILE-DOS
HTTP:STC:ADOBE:SWF-ACTIONSET
HTTP:STC:ADOBE:CVE-2015-6678-CE
HTTP:STC:ADOBE:PDF-URI-OACTION
HTTP:STC:ADOBE:FLV-FILE-DOS
HTTP:STC:ADOBE:CVE-2015-7629-CE
HTTP:STC:ADOBE:DIRECTOR-FILE-M1
HTTP:STC:ADOBE:CVE-2015-5552-CE
HTTP:STC:ADOBE:CVE-2015-5567-CE
HTTP:STC:ADOBE:CVE-2015-5126-CE
HTTP:STC:ADOBE:READER-FILE-RCE
HTTP:STC:ADOBE:CVE-2015-3080-CE
HTTP:STC:ADOBE:CVE-2015-7632-CE
HTTP:STC:ADOBE:CVE-2013-3354-CE
HTTP:STC:ADOBE:CVE-2015-5541-CE
HTTP:STC:ADOBE:CVE-2015-3122-C1
HTTP:STC:ADOBE:CVE-2015-5133-C1
HTTP:STC:ADOBE:CVE-2015-0307-DS
HTTP:STC:ADOBE:CVE-2014-0523-CE
HTTP:STC:ADOBE:READER-HEAP-OVF
HTTP:STC:ADOBE:PDF-JAVASCRIPT
HTTP:STC:ADOBE:CVE-2014-0588-CE
HTTP:STC:ADOBE:CVE-2015-0302-ID
HTTP:STC:ADOBE:CVE-2015-7628-PE
HTTP:STC:ADOBE:PDF-FREETYPE
HTTP:STC:ADOBE:CVE-2014-0539-CE
HTTP:STC:ADOBE:PDF-PRINTSEPS-2
HTTP:STC:ADOBE:ACROFORM-MEM
HTTP:STC:ADOBE:CVE-2014-0537-CE
HTTP:STC:ADOBE:CVE-2014-4671
HTTP:STC:ADOBE:CVE-2015-5573-CE
HTTP:STC:ADOBE:CVE-2015-3102-SB
HTTP:STC:ADOBE:CVE-2015-8640-CE
HTTP:STC:ADOBE:READER-BMP
HTTP:STC:ADOBE:FLASHPLYR-HEAPOF
HTTP:STC:ADOBE:CVE-2015-3098-CE
HTTP:STC:ADOBE:PDF-FONT
HTTP:STC:ADOBE:CVE-2014-0493-C1
HTTP:STC:ADOBE:CVE-2014-0565-MC
HTTP:STC:ADOBE:CVE-2015-2417-CE
HTTP:STC:ADOBE:FLASH-REGEX-DOS
HTTP:STC:ADOBE:CVE-2015-5555-CE
HTTP:STC:ADOBE:CVE-2015-5560-CE
HTTP:STC:ADOBE:CVE2014-8456-DOS
HTTP:STC:ADOBE:CVE-2014-0577-CE
HTTP:STC:ADOBE:WRTE-WAT-WHRE-CE
HTTP:STC:ADOBE:CVE-2015-3103-CE
HTTP:STC:ADOBE:CVE-2015-5132-CE
HTTP:STC:ADOBE:CVE-2015-5134-CE
HTTP:STC:ADOBE:CVE-2015-5547-CE
HTTP:STC:ADOBE:CVE-2015-5548-CE
HTTP:STC:ADOBE:MAL-FLV-BOF
HTTP:STC:ADOBE:CVE-2015-3099-ID
HTTP:STC:ADOBE:CVE-2014-0522-MC
HTTP:STC:ADOBE:CVE-2015-3107-CE
HTTP:STC:ADOBE:CVE-2015-3089-CE
HTTP:STC:ADOBE:CVE-2015-5129-CE
HTTP:STC:ADOBE:FLASH-RUNTIME
HTTP:STC:ADOBE:CFF-OF
HTTP:STC:ADOBE:CVE-2014-0574-CE
HTTP:STC:ADOBE:READER-BMP-COLOR
HTTP:STC:ADOBE:CVE-2015-5543-CE
HTTP:STC:ADOBE:PDF-SPELL-MC
HTTP:STC:ADOBE:READER-DCT
HTTP:STC:ADOBE:PDF-UNI-3D
HTTP:STC:ADOBE:PDF-LAUNCH-CMD
HTTP:STC:ADOBE:CVE-2015-5539-CE
HTTP:STC:ADOBE:SWF-GRADIENTFIL2
HTTP:STC:ADOBE:CVE-2015-4446-CE
HTTP:STC:ADOBE:SWF-ACTIONIF-DO
HTTP:STC:ADOBE:CVE-2013-5331-CE
HTTP:STC:ADOBE:CVE-2015-5558-CE
HTTP:STC:ADOBE:SWF-GRADIENTFILL
HTTP:STC:ADOBE:2014-0515-CE2
HTTP:STC:ADOBE:CVE-2015-5561-CE
HTTP:STC:ADOBE:READER-WIDGET
HTTP:STC:ADOBE:CVE-2014-0568-SE
HTTP:STC:ADOBE:U3D-CLODMESH-MC
HTTP:STC:ADOBE:CVE2014-0532-RCE
HTTP:STC:ADOBE:MAL-PSD
HTTP:STC:ADOBE:CVE-2014-0584-CE
HTTP:STC:ADOBE:PARSE-FLOAT-BOF
HTTP:STC:ADOBE:SWF-APPLY-FUNC
HTTP:STC:ADOBE:FLASH-XSRF
HTTP:STC:ADOBE:FLASH-FILEREF-BO
HTTP:STC:ADOBE:ACROBAT-PICT-IMG
HTTP:STC:ADOBE:ACROBAT-GLYPH-MC
HTTP:STC:ADOBE:PDF-BITDEF-OF1
HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC
HTTP:STC:ADOBE:SWF-IN-PDF
HTTP:STC:ADOBE:SWF-INVALID-OBF
HTTP:STC:ADOBE:FLASH-SEQUENCE
HTTP:STC:ADOBE:PDF-JPEG-FILE-CE
HTTP:STC:ADOBE:PDF-JS-FILE
HTTP:STC:ADOBE:READER-BPROTECT
HTTP:STC:ADOBE:ACROBAT-IFF-OF
HTTP:STC:ADOBE:FLASH-XDOMAIN
HTTP:STC:ADOBE:READER-DOTRANGE
HTTP:STC:ADOBE:CVE-2013-0622-SB
HTTP:STC:ADOBE:READER-FORM-UAF
HTTP:STC:ADOBE:FLASH-ACTIVEX-MC
HTTP:STC:ADOBE:SWF-UNVRSL-XSS
HTTP:STC:ADOBE:READER-HYBRID-BY
HTTP:STC:ADOBE:READER-PICT-RLE
HTTP:STC:ADOBE:FLASH-MP4-NULL
HTTP:STC:ADOBE:READER-U3D
HTTP:STC:ADOBE:CVE-2015-5544-CE
HTTP:STC:ADOBE:CVE-2014-8441-MC
HTTP:STC:ADOBE:PDF-JPXDECODE
HTTP:STC:ADOBE:PS-TIFF-BOF
HTTP:STC:ADOBE:DOMAIN-MEM-RCE
HTTP:STC:ADOBE:PDF-JS-HIDE
HTTP:STC:ADOBE:SWF-SEC-BYPASS
HTTP:STC:ADOBE:SWF-OPENTYPE-CFF
HTTP:STC:ADOBE:PDF-EVASIVE-FF
HTTP:STC:ADOBE:FLASH-ACTIONIF
HTTP:STC:ADOBE:ACROBAT-U3D-BO
HTTP:STC:ADOBE:SWF-FLASH-BOF
HTTP:STC:ADOBE:SWF-MAL-AS-OF
HTTP:STC:ADOBE:SWF-DEFINEFUNC2
HTTP:STC:ADOBE:SWF-MAL-AS
HTTP:STC:ADOBE:CAM-RAW-PLUGIN
HTTP:STC:ADOBE:FLASH-SETSLOT
HTTP:STC:ADOBE:SWF-XSFORGE
HTTP:STC:ADOBE:CROSS-SEC-BYPASS
HTTP:STC:ADOBE:READER-INFODISC
HTTP:STC:ADOBE:TRUETYPE-FONT-CE
HTTP:STC:ADOBE:ACROBAT-JS-XRF
HTTP:STC:ADOBE:PDF-PICT-HEAP-OF
HTTP:STC:ADOBE:SWF-SETTARGET
HTTP:STC:ADOBE:SWF-TYPE-CONFUS
HTTP:STC:ADOBE:CVE-2015-8645-CE
HTTP:STC:ADOBE:CVE-2015-5556-CE
HTTP:STC:ADOBE:CVE-2016-1011-UF
HTTP:STC:ADOBE:ILLUSTRATOR-MC
HTTP:STC:ADOBE:FLASH-TYPE-CONF
HTTP:STC:ADOBE:CVE-2015-5131-CE
HTTP:STC:ADOBE:CVE-2015-5130-CE
HTTP:STC:ADOBE:CVE-2015-8652-CE
HTTP:STC:ADOBE:CVE-2016-1013-UF
HTTP:STC:ADOBE:SWF-NEWFUNC1
HTTP:STC:ADOBE:CVE-2014-0564-MC
HTTP:STC:ADOBE:CVE-2015-5085-CE
HTTP:STC:ADOBE:SWF-XLS-MALF
HTTP:STC:ADOBE:MEM-PTR-LEAK
HTTP:STC:ADOBE:CVE-2015-4452-CE
HTTP:STC:ADOBE:CVE-2014-8440-CE
HTTP:STC:ADOBE:PDF-COOLTYPE-BO
HTTP:STC:ADOBE:DC-2015-5097-CE
HTTP:STC:ADOBE:PDF-BITDEF-OF
HTTP:STC:ADOBE:FLASH-OOB-MC
HTTP:STC:ADOBE:CVE-2016-1012-CE
HTTP:STC:ADOBE:CVE-2016-0989-CE
HTTP:STC:ADOBE:CVE-2016-1015-CE
HTTP:STC:ADOBE:CVE-2015-8639-CE
HTTP:STC:ADOBE:CVE-2015-8460-CE
HTTP:STC:ADOBE:READER-TTF-DESC
HTTP:STC:ADOBE:CVE-2015-8649-CE
HTTP:STC:ADOBE:REVOKED-CERT
HTTP:STC:ADOBE:SWF-UAF-JS
HTTP:STC:ADOBE:READER-PLUGIN9
HTTP:STC:ADOBE:READER-STACK-EXH
HTTP:STC:ADOBE:FLASH-ARGCOUNT
HTTP:STC:ADOBE:CVE-2016-1019-CE
HTTP:STC:ADOBE:CVE-2016-1005-CE
HTTP:STC:ADOBE:CVE-2016-1018-BO
HTTP:STC:ADOBE:FLASH-INT-OV
HTTP:STC:ADOBE:CVE-2016-0996-CE
HTTP:STC:ADOBE:READER-CID-FONT
HTTP:STC:ADOBE:CVE-2016-1016-UF
HTTP:STC:ADOBE:CVE-2016-1006-UF
HTTP:STC:ADOBE:READER-WRITAV-CE
HTTP:STC:ADOBE:CVE-2014-0547-MC
HTTP:STC:ADOBE:CVE-2014-8449-CE
HTTP:STC:ADOBE:READER-CRASH
HTTP:STC:ADOBE:READER-PRC
HTTP:STC:ADOBE:READER-PLUGIN2
HTTP:STC:ADOBE:CVE-2015-8643-CE
HTTP:STC:ADOBE:READER-OOB-WRITE
HTTP:STC:ADOBE:READER-PLUGIN3
HTTP:STC:ADOBE:ACROBAT-GETICON
HTTP:STC:ADOBE:READER-MC-RCE
HTTP:STC:ADOBE:READER-PLUGIN4
HTTP:STC:ADOBE:PS-PNG-BO
HTTP:STC:ADOBE:READER-JP2K-BO
HTTP:STC:ADOBE:TTF-HANDLING
HTTP:STC:ADOBE:READER-PLUGIN5
HTTP:STC:ADOBE:CVE-2015-8635-CE
HTTP:STC:ADOBE:JPEG-FILE-OF
HTTP:STC:ADOBE:READER-PLUGIN6
HTTP:STC:ADOBE:FLSHPLYR-INFDISC
HTTP:STC:ADOBE:BMP-HEADER
HTTP:STC:ADOBE:CVE-2013-5325-CE
HTTP:STC:ADOBE:U3D-TEXTURE-BOF
HTTP:STC:ADOBE:CVE-2015-5588-CE
HTTP:STC:ADOBE:CVE-2015-8634-CE
HTTP:STC:ADOBE:CVE-2015-8644-CE
HTTP:STC:ADOBE:CVE-2015-8646-CE
HTTP:STC:ADOBE:WEIGHTVECTOR
HTTP:STC:ADOBE:CVE-2014-8443-MC
HTTP:STC:ADOBE:SWF-LINUX-AS
HTTP:STC:ADOBE:FLASH-AS2-OF
HTTP:STC:ADOBE:CVE-2015-8638-CE
HTTP:STC:ADOBE:CVE-2014-9150-SB
HTTP:STC:ADOBE:CVE-2015-3108-CE
HTTP:STC:ADOBE:CVE-2015-3100-CE
HTTP:STC:ADOBE:CVE-2014-8461-MC
HTTP:STC:ADOBE:PDF-FIELDDIR
HTTP:STC:ADOBE:PDF-3D-WH
HTTP:STC:ADOBE:CVE-2014-8458-MC
HTTP:STC:ADOBE:FLASH-DYN-CALC
HTTP:STC:ADOBE:CVE2015-0309-RCE
HTTP:STC:ADOBE:CVE-2014-9158-MC
HTTP:STC:ADOBE:MEMLK-2014-0543
HTTP:STC:ADOBE:CVE-2015-0330-CE
HTTP:STC:ADOBE:CVE-2014-0580-SB
HTTP:STC:ADOBE:CVE-2015-8651-CE
HTTP:STC:ADOBE:FLASH-MC
HTTP:STC:ADOBE:SHKWV-LINGO-BOF
HTTP:STC:ADOBE:SHOCKWAVE-RCSL
HTTP:STC:ADOBE:FLASH-SNATIVE
HTTP:STC:ADOBE:FLASH-RCE
HTTP:STC:ADOBE:CVE-2014-9162-ID
HTTP:STC:ADOBE:TRUETYPE-OF
HTTP:STC:ADOBE:FLATEDECODE-BO
HTTP:STC:ADOBE:CVE-2015-0313-ID
HTTP:STC:ADOBE:READER-IT
HTTP:STC:ADOBE:TEXT-NETCONNECT
HTTP:STC:ADOBE:PDF-UAC-HANDLE
HTTP:STC:ADOBE:SWF-MEM-COR
HTTP:STC:ADOBE:CVE-2014-8460-BO
HTTP:STC:ADOBE:PDF-GDI-OBJ-RCE
HTTP:STC:ADOBE:PDF-COOLTYPE-RCE
HTTP:STC:ADOBE:FLASH-CVE15-0308
HTTP:STC:ADOBE:FLASH-MP4LOAD-BO
HTTP:STC:ADOBE:ACROBAT-BMP-HEAD
HTTP:STC:ADOBE:FLASH-BITMAPDATA
HTTP:STC:ADOBE:ACROBAT-PCX-OF
HTTP:STC:ADOBE:PDF-EXT-OF
HTTP:STC:ADOBE:PDF-EMBEDDEDFILE
HTTP:STC:ADOBE:CVE-2015-0317-CE
HTTP:STC:ADOBE:CVE-2015-3121-CE
HTTP:STC:ADOBE:FLASH-BO
HTTP:STC:ADOBE:FLASH-AS3-INT-OV
HTTP:STC:ADOBE:CVE-2013-3352-CE
HTTP:STC:ADOBE:2013-5065-PDF
HTTP:STC:ADOBE:CVE-2015-3119-CE
HTTP:STC:ADOBE:READER-PLUGIN8
HTTP:STC:ADOBE:SWF-MAL-AS-RCE
HTTP:STC:ADOBE:CVE-2015-3116-CE
HTTP:STC:ADOBE:PDF-UNIVERSAL3D
HTTP:STC:ADOBE:CVE-2015-0323-CE
HTTP:STC:ADOBE:CVE-2016-1041-CE
HTTP:STC:ADOBE:PDF-UAF-RCE
HTTP:STC:ADOBE:CVE-2016-1083-ID
HTTP:STC:ADOBE:CVE-2013-5330-MC
HTTP:STC:ADOBE:CVE-2016-1093-CE
HTTP:STC:ADOBE:READER-PLUGIN7
HTTP:STC:ADOBE:JS-CE
HTTP:STC:ADOBE:MEMLK-2014-0542
HTTP:STC:ADOBE:CVE-2014-0578-CE
HTTP:STC:ADOBE:DOMAIN-MEMORY
HTTP:STC:ADOBE:CVE-2016-1038-CE
HTTP:STC:ADOBE:CVE-2016-1098-CE
HTTP:STC:ADOBE:FLASHPLYR-SBYPAS
HTTP:STC:ADOBE:CVE-2015-3117-CE
HTTP:STC:ADOBE:CVE-2016-1084-CE
HTTP:STC:ADOBE:CVE-2015-8647-CE
HTTP:STC:ADOBE:FLASH-MAL-ACTION
HTTP:STC:ADOBE:PDF-EBUK-FORMSTR
HTTP:STC:ADOBE:CVE-2016-1068-CE
HTTP:STC:ADOBE:CVE-2016-1075-CE
HTTP:STC:ADOBE:CVE-2014-0497-MC
HTTP:STC:ADOBE:READER-ICC-RCE
HTTP:STC:ADOBE:CVE-2015-0322-CE
HTTP:STC:ADOBE:CVE-2015-3114-ID
HTTP:STC:ADOBE:READER-SECBYPASS
HTTP:STC:ADOBE:CVE-2015-8636-CE
HTTP:STC:ADOBE:CVE-2016-1070-CE
HTTP:STC:ADOBE:CVE-2014-0499-MC
HTTP:STC:ADOBE:CVE-2015-8650-CE
HTTP:STC:ADOBE:CVE-2016-1044-CE
HTTP:STC:ADOBE:WRTE-WAT-WHRE-C1
HTTP:STC:ADOBE:BMP-INT-OVF
HTTP:STC:ADOBE:CVE-2015-0326-DS
HTTP:STC:ADOBE:BYTEARRAY-UAF
HTTP:STC:ADOBE:CVE-2015-0303-SB
HTTP:STC:ADOBE:CVE-2016-1086-CE
HTTP:STC:ADOBE:CVE-2013-3357-MC
HTTP:STC:ADOBE:CVE-2013-5324-MC
HTTP:STC:ADOBE:LIBTIF-FETCHDATA
HTTP:STC:ADOBE:CVE-2016-1061-CE
HTTP:STC:ADOBE:CVE-2016-1050-CE
HTTP:STC:ADOBE:CVE-2016-1053-ID
HTTP:STC:ADOBE:READER-API-CE
HTTP:STC:ADOBE:CVE-2013-5332-CE
HTTP:STC:ADOBE:CVE-2015-8459-CE
HTTP:STC:ADOBE:CVE-2016-1077-CE
HTTP:STC:ADOBE:CVE-2016-1054-ID
HTTP:STC:ADOBE:CVE-2016-1081
HTTP:STC:ADOBE:CVE-2015-8641-CE
HTTP:STC:ADOBE:CVE-2015-3118-CE
HTTP:STC:ADOBE:PS-CS4-MULTI-BO1
HTTP:STC:ADOBE:CVE-2016-1051-CE
HTTP:STC:ADOBE:CVE-2015-3128-CE
HTTP:STC:ADOBE:CVE-2016-1104
HTTP:STC:ADOBE:MAL-IFF
HTTP:STC:ADOBE:CVE-2016-1052-CE
HTTP:STC:ADOBE:AUD-TRKM
HTTP:STC:ADOBE:CVE-2016-0937-CE
HTTP:STC:ADOBE:CVE-2015-8642-CE
HTTP:STC:ADOBE:AUD-SESSFILE
HTTP:STC:ADOBE:CVE-2016-1116-CE
HTTP:STC:ADOBE:CVE-2015-8648-CE
HTTP:STC:ADOBE:CVE-2016-1102-CE
HTTP:STC:ADOBE:CVE-2015-5102-CE
HTTP:STC:ADOBE:CVE-2015-5104-CE
HTTP:STC:ADOBE:CVE-2014-0558-CE
HTTP:STC:ADOBE:CVE-2016-1103
HTTP:STC:ADOBE:CVE-2016-1101-CE
HTTP:STC:ADOBE:CVE-2015-5087-CE
HTTP:STC:ADOBE:CVE-2015-0328-CE
HTTP:STC:ADOBE:CVE-2016-1087-CE
HTTP:STC:ADOBE:CVE-2016-1067-CE
HTTP:STC:ADOBE:CVE-2015-5095-CE
HTTP:STC:ADOBE:CVE-2015-5113-CE
HTTP:STC:ADOBE:PDF-JS-EXECUTION
HTTP:STC:ADOBE:PDF-CCITT
HTTP:STC:ADOBE:CVE-2013-3353
HTTP:STC:ADOBE:ACROBAT-JPEG2000
HTTP:STC:ADOBE:CVE-2014-0538-UF
HTTP:STC:ADOBE:CVE-2015-5086-CE
HTTP:STC:ADOBE:CVE-2015-5090-CE
HTTP:STC:ADOBE:FLASH-PLAYER-BOF
HTTP:STC:ADOBE:FLV-APPENDBYTES
HTTP:STC:ADOBE:FLASH-PLAYER-AIR
HTTP:STC:ADOBE:CVE-2014-0518-CE
HTTP:STC:ADOBE:PDF-COLORS-INT
HTTP:STC:ADOBE:CVE-2015-4448-CE
HTTP:STC:ADOBE:CVE-2015-5100-CE
HTTP:STC:ADOBE:CVE-2014-8450-CE
HTTP:STC:ADOBE:CVE-2014-0550-BO
HTTP:STC:ADOBE:TEXTLINE-OB-CE
HTTP:STC:ADOBE:READER-JAVA-CE
HTTP:STC:ADOBE:CVE-2015-5545-CE
HTTP:STC:ADOBE:CVE-2014-0544-MC
HTTP:STC:ADOBE:CVE-2014-0555-BO
HTTP:STC:ADOBE:CVE-2014-0506-UF
HTTP:STC:ADOBE:FLASH-CVE15-0304
HTTP:STC:ADOBE:FLASH-PLAYER-BO
HTTP:STC:ADOBE:FLASH-INFODISC
HTTP:STC:ADOBE:CVE-2014-0586-CE
HTTP:STC:ADOBE:READR-ACROBAT-BO
HTTP:STC:ADOBE:CVE-2014-0524-MC
HTTP:STC:ADOBE:CVE-2014-0511-BO
HTTP:STC:ADOBE:CVE-2014-0512-CE
HTTP:STC:ADOBE:CVE-2014-0531-MC
HTTP:STC:ADOBE:CVE-2014-0521
HTTP:STC:ADOBE:FLASH-AS3-MC
HTTP:STC:ADOBE:CVE-2014-0517-CE
HTTP:STC:ADOBE:CVE-2014-8455-UF
HTTP:STC:ADOBE:READER-JS-RCE
HTTP:STC:ADOBE:CVE-2015-0321-CE
HTTP:STC:ADOBE:CVE-2015-0329-CE
HTTP:STC:ADOBE:CVE-2015-0305-MC
HTTP:STC:ADOBE:CVE-2015-0315-CE
HTTP:STC:ADOBE:CVE-2015-0318-CE
HTTP:STC:ADOBE:CVE-2015-0324-CE
HTTP:STC:ADOBE:CVE-2015-0316-CE
HTTP:STC:ADOBE:CVE-2015-0319-CE
HTTP:STC:ADOBE:CVE-2015-0325-CE
HTTP:STC:ADOBE:CVE-2015-0314-BO
HTTP:STC:ADOBE:CVE-2015-0320-CE
HTTP:STC:ADOBE:CVE-2015-0093-CE
HTTP:STC:ADOBE:CVE-2015-0339-CE
HTTP:STC:ADOBE:CVE-2015-0338-CE
HTTP:STC:ADOBE:CVE-2015-0342-CE
HTTP:STC:ADOBE:CVE-2015-0334-CE
HTTP:STC:ADOBE:CVE-2015-0340-CE
HTTP:STC:ADOBE:CVE-2015-3041-CE
HTTP:STC:ADOBE:CVE-2015-0333-MC
HTTP:STC:ADOBE:CVE-2015-0341-CE
HTTP:STC:ADOBE:CVE-2015-0335-CE
HTTP:STC:ADOBE:CVE-2013-3355-CE
HTTP:STC:ADOBE:CVE-2015-0327-CE
HTTP:STC:ADOBE:CVE-2015-0347-CE
HTTP:STC:ADOBE:CVE-2015-3044-ID
HTTP:STC:ADOBE:CVE-2015-3042-CE
HTTP:STC:ADOBE:CVE-2015-3038-MC
HTTP:STC:ADOBE:CVE-2015-0358-CE
HTTP:STC:ADOBE:CVE-2015-0357-CE
HTTP:STC:ADOBE:CVE-2015-0349-CE
HTTP:STC:ADOBE:CVE-2015-0355-MC
HTTP:STC:ADOBE:CVE-2015-3040-ID
HTTP:STC:ADOBE:CVE-2015-0352-MC
HTTP:STC:ADOBE:CVE-2015-0359-MC
HTTP:STC:ADOBE:CVE-2015-0346-CE
HTTP:STC:ADOBE:CVE-2015-0351-MC
HTTP:STC:ADOBE:CVE-2015-0350-MC
HTTP:STC:ADOBE:CVE-2015-0360-MC
HTTP:STC:ADOBE:CVE-2015-0354-MC
HTTP:STC:ADOBE:CVE-2015-0348-CE
HTTP:STC:ADOBE:CVE-2015-0337-PB
HTTP:STC:ADOBE:CVE-2015-0356-CE
HTTP:STC:ADOBE:CS-NULL-POINTER
HTTP:STC:ADOBE:CVE-2015-0353-CE
HTTP:STC:ADOBE:CVE-2015-0090-CE
HTTP:STC:ADOBE:READER-XSLT-BO
HTTP:STC:ADOBE:CVE-2015-0089-ID
HTTP:STC:ADOBE:CVE-2015-0091-CE
HTTP:STC:ADOBE:CVE-2015-0087-ID
HTTP:STC:ADOBE:CVE-2015-0092-CE
HTTP:STC:ADOBE:FLASHPLR-FILE-MC
HTTP:STC:ADOBE:FLASH-STAGE3D
HTTP:STC:ADOBE:CVE-2014-8440-ID
HTTP:STC:ADOBE:CVE-2015-3043-CE
HTTP:STC:ADOBE:CVE-2015-3064-CE
HTTP:STC:ADOBE:CVE-2015-3088-BO
HTTP:STC:ADOBE:CVE-2015-3056-MC
HTTP:STC:ADOBE:CVE-2015-3076-CE
HTTP:STC:ADOBE:CVE-2015-3059-CE
HTTP:STC:ADOBE:CVE-2015-3086-CE
HTTP:STC:ADOBE:JS-API-CE
HTTP:STC:ADOBE:CVE-2015-3093-CE
HTTP:STC:ADOBE:CVE-2015-3081-BP
HTTP:STC:ADOBE:CVE-2015-3085-VB
HTTP:STC:ADOBE:CVE-2015-3079-SB
HTTP:STC:ADOBE:CVE-2015-3055-CE
HTTP:STC:ADOBE:CVE-2015-3054-CE
HTTP:STC:ADOBE:CVE-2015-3092-CE
HTTP:STC:ADOBE:CVE-2015-3070-CE
HTTP:STC:ADOBE:CVE-2015-3091-CE
HTTP:STC:ADOBE:CVE-2015-3053-CE
HTTP:STC:ADOBE:CVE-2015-3077-CE
HTTP:STC:ADOBE:CVE-2014-9161-CE
HTTP:STC:ADOBE:CVE-2015-3087-CE
HTTP:STC:ADOBE:CVE-2015-3051-CE
HTTP:STC:ADOBE:CVE-2015-3074-CE
HTTP:STC:ADOBE:CVE-2015-3046-CE
HTTP:STC:ADOBE:CVE-2015-3084-CE
HTTP:STC:ADOBE:CVE-2015-3062-CE
HTTP:STC:ADOBE:CVE-2015-3052-CE
HTTP:STC:ADOBE:CVE-2015-3072-CE
HTTP:STC:ADOBE:CVE-2009-2985-MC
HTTP:STC:ADOBE:CVE-2015-5123-CE
HTTP:STC:ADOBE:CVE-2010-0195-CE
HTTP:STC:ADOBE:CVE-2010-2202-MC
HTTP:STC:ADOBE:CVE-2009-3791-MC
HTTP:STC:ADOBE:CVE-2010-2873-CE
HTTP:STC:ADOBE:DIRECTOR-FILE-MC
HTTP:STC:ADOBE:SHOCKWAVE-3D-OF
HTTP:STC:ADOBE:PHOTOSHOP-TIF-OF
HTTP:STC:ADOBE:FLASH-PL-JPEG-OF
HTTP:STC:ADOBE:ACROBAT-URL-DF
HTTP:STC:ADOBE:FLASH-OP
HTTP:STC:ADOBE:CVE-2015-4431-CE
HTTP:STC:ADOBE:CVE-2015-3123-CE
HTTP:STC:ADOBE:CVE-2015-3130-CE
HTTP:STC:ADOBE:CVE-2015-4429-CE
HTTP:STC:ADOBE:CVE-2015-4430-CE
HTTP:STC:ADOBE:CVE-2015-3122-CE
HTTP:STC:ADOBE:PM-FONT-OF
HTTP:STC:ADOBE:CVE-2015-4433-CE
HTTP:STC:ADOBE:SWF-DMNMEM-CP
HTTP:STC:ADOBE:CVE-2015-3120-CE
HTTP:STC:ADOBE:SWF-REMOTE-MC
HTTP:STC:ADOBE:FLASH-MATRX3D-IO
HTTP:STC:ADOBE:2014-8439-RCE
HTTP:STC:ADOBE:CVE-2015-3134-BO
HTTP:STC:ADOBE:CVE-2014-9160-CE
HTTP:STC:ADOBE:SWF-EVENTLISTEN
HTTP:STC:ADOBE:CVE-2015-3127-UF
HTTP:STC:ADOBE:CVE-2015-5574-CE
HTTP:STC:ADOBE:FP-CASI-MC
HTTP:STC:ADOBE:CVE-2015-3132-UF
HTTP:STC:ADOBE:SWF-DMNMEM-CP1
HTTP:STC:ADOBE:PHOTOSHOP-ASSET
HTTP:STC:ADOBE:FLASHPLR-NULL-MC
HTTP:STC:ADOBE:CVE-2015-3126-CE
HTTP:STC:ADOBE:SWF-MEM-CORR
HTTP:STC:ADOBE:CVE-2015-8438-CE
HTTP:STC:ADOBE:PDF-UTILPRINTF
HTTP:STC:ADOBE:CVE-2015-8448-CE
HTTP:STC:ADOBE:CVE-2015-4451-CE
HTTP:STC:ADOBE:CVE-2015-5568-CE
HTTP:STC:ADOBE:CVE-2009-1862-CE
HTTP:STC:ADOBE:CVE-2015-8442-CE
HTTP:STC:ADOBE:CVE-2015-8060-CE
HTTP:STC:ADOBE:CVE-2015-8450-CE
HTTP:STC:ADOBE:THUMBNAIL-RCE1
HTTP:STC:ADOBE:CVE-2015-5576-CE
HTTP:STC:ADOBE:CVE-2015-8437-CE
HTTP:STC:ADOBE:CVE-2015-8418-CE
HTTP:STC:ADOBE:CVE-2015-8457-CE
HTTP:STC:ADOBE:CVE-2015-8445-CE
HTTP:STC:ADOBE:SWF-2015-5572-SB
HTTP:STC:ADOBE:CVE-2015-8444-CE
HTTP:STC:ADOBE:CVE-2015-8435-CE
HTTP:STC:ADOBE:CVE-2015-5578-CE
HTTP:STC:ADOBE:CVE-2015-8446-CE
HTTP:STC:ADOBE:CVE-2014-0520-CE
HTTP:STC:ADOBE:CVE-2015-8449-CE
HTTP:STC:ADOBE:CVE-2015-8407-CE
HTTP:STC:ADOBE:CVE-2015-8443-CE
HTTP:STC:ADOBE:CVE-2015-8436-CE
HTTP:STC:ADOBE:CVE-2015-5570-CE
HTTP:STC:ADOBE:PDF-BITDEF-OF-1
HTTP:STC:ADOBE:CVE-2015-3133-DS
HTTP:STC:ADOBE:PDF-JBIG2DECODE
HTTP:STC:ADOBE:CVE-2015-8419-CE
HTTP:STC:ADOBE:CVE-2015-8447-CE
HTTP:STC:ADOBE:CVE-2015-5587-CE
HTTP:STC:ADOBE:CVE-2013-5329-CE
HTTP:STC:ADOBE:CVE-2015-8414-CE
HTTP:STC:ADOBE:CVE-2015-8048-CE
HTTP:STC:ADOBE:READER-PLUGIN1
HTTP:STC:ADOBE:READER-WKT-BO
HTTP:STC:ADOBE:PDF-FLATEDECODE
HTTP:STC:ADOBE:CVE-2015-5123-UF
HTTP:STC:ADOBE:CVE-2014-0548-PB
HTTP:STC:ADOBE:CVE-2015-5580-CE
HTTP:STC:ADOBE:CVE-2015-4447-CE
HTTP:STC:ADOBE:READER-INFO-DISC
HTTP:STC:ADOBE:CVE-2015-3106-CE
HTTP:STC:ADOBE:CVE-2015-8439-CE
HTTP:STC:ADOBE:CVE-2014-0554
HTTP:STC:ADOBE:CVE-2015-5093-CE
HTTP:STC:ADOBE:CVE-2015-8408-CE
HTTP:STC:ADOBE:CVE-2015-5579-DS
HTTP:STC:ADOBE:PDF-CIDFONT
HTTP:STC:ADOBE:DEFINEFONT
HTTP:STC:ADOBE:CVE-2015-5125-CE
HTTP:STC:ADOBE:CVE-2015-6676-CE
HTTP:STC:ADOBE:CVE-2015-5581-CE
HTTP:STC:ADOBE:XFIR-PAMM-MEM
HTTP:STC:ADOBE:SWF-UNC-JUMP
HTTP:STC:ADOBE:SWF-DEFINEFONT4
HTTP:STC:ADOBE:FLASH-PLAYER-XSS
HTTP:STC:ADOBE:JS-TERMINATE-UAF
HTTP:STC:ADOBE:CVE-2015-5133-CE
HTTP:STC:ADOBE:DLMGR-AOM-OF
HTTP:STC:ADOBE:CVE-2016-4139-CE
HTTP:STC:ADOBE:RMAS-RCE
HTTP:STC:ADOBE:JBIG2-SYMBOL-RCE
HTTP:STC:ADOBE:CVE-2015-5549-CE
HTTP:STC:ADOBE:PS-CS4-MULTI-BO
HTTP:STC:ADOBE:XFIR-RECORD
HTTP:STC:ADOBE:CVE-2015-3047-CE
HTTP:STC:ADOBE:CVE-2010-0197-MC
HTTP:STC:ADOBE:PDF-LIBTIFF
HTTP:STC:ADOBE:FLASH-BMD-SCROLL
HTTP:STC:ADOBE:CVE-2015-5582-SF
HTTP:STC:ADOBE:FLASH-INFO-DISC
HTTP:STC:ADOBE:CVE-2015-5575-CE
HTTP:STC:ADOBE:CVE-2015-7655-CE
HTTP:STC:ADOBE:SWF-BUTTON
HTTP:STC:ADOBE:CVE-2015-7653-CE
HTTP:STC:ADOBE:READER-MAL-PDF
HTTP:STC:ADOBE:ACROBAT-U3D-RCE
HTTP:STC:ADOBE:PDF-U3D-CLOD
HTTP:STC:ADOBE:CVE-2016-4142
HTTP:STC:ADOBE:SWF-JPG-OF
HTTP:STC:ADOBE:CVE-2015-3090-CE
HTTP:STC:ADOBE:CVE-2015-5584-CE
HTTP:STC:ADOBE:CVE-2016-4132-CE
HTTP:STC:ADOBE:XFIR-KEY
HTTP:STC:ADOBE:CVE-2015-6679-CE
HTTP:STC:ADOBE:TOOLBUTTON-UAF
HTTP:STC:ADOBE:PDF-DRAWIMG
HTTP:STC:ADOBE:CVE-2016-4136
HTTP:STC:ADOBE:CVE-2016-4149
HTTP:STC:ADOBE:MAL-BMP
HTTP:STC:ADOBE:2014-0515-CE1
HTTP:STC:ADOBE:PDF-XML-XSS
HTTP:STC:ADOBE:FLASHPLR-NUL-MC3
HTTP:STC:ADOBE:CVE-2015-3104-CE
HTTP:STC:ADOBE:XFIR-PAMI
HTTP:STC:ADOBE:READER-INT-OF
HTTP:STC:ADOBE:CVE-2015-5559-CE
HTTP:STC:ADOBE:POSTSCRIPT-RCE
HTTP:STC:ADOBE:CVE-2016-4152
HTTP:STC:ADOBE:CVE-2016-4146-CE
HTTP:STC:ADOBE:CVE-2015-7654-CE
HTTP:STC:ADOBE:CVE-2015-7652-CE
HTTP:STC:ADOBE:CVE-2015-7657-CE
HTTP:STC:ADOBE:CVE-2015-7663-CE
HTTP:STC:ADOBE:CVE-2016-4148-CE
HTTP:STC:ADOBE:CVE-2016-4138-CE
HTTP:STC:ADOBE:CVE-2016-4156-CE
HTTP:STC:ADOBE:CVE-2016-4153-CE
HTTP:STC:ADOBE:CVE-2016-4135-CE
HTTP:STC:ADOBE:CVE-2015-5092-CE
HTTP:STC:ADOBE:CVE-2016-4121-CE
HTTP:STC:ADOBE:CVE-2016-4171-CE
HTTP:STC:ADOBE:CVE-2016-4141-CE
HTTP:STC:ADOBE:CVE-2016-4137-CE
HTTP:STC:ADOBE:CVE-2015-5088-CE
HTTP:STC:ADOBE:CVE-2016-4154-CE
HTTP:STC:ADOBE:CVE-2015-7651-CE
HTTP:STC:ADOBE:CVE-2015-7659-CE
HTTP:STC:ADOBE:CVE-2015-6682-CE
HTTP:STC:ADOBE:CVE-2016-4151-CE
HTTP:STC:ADOBE:CVE-2016-4133-CE
HTTP:STC:ADOBE:CVE-2016-4144-CE
HTTP:STC:ADOBE:CVE-2016-4150-CE
HTTP:STC:ADOBE:CVE-2016-4147-CE
HTTP:STC:ADOBE:CVE-2016-4143-CE
HTTP:STC:ADOBE:CVE-2015-5557-CE
HTTP:STC:ADOBE:CVE-2009-3959-OF
HTTP:STC:ADOBE:CVE-2014-8451-ID
HTTP:STC:ADOBE:CVE-2014-8447-MC
HTTP:STC:ADOBE:CVE-2015-5115-OB
HTTP:STC:ADOBE:CVE-2015-5098-CE
HTTP:STC:ADOBE:CVE-2016-4155-CE
HTTP:STC:ADOBE:CVE-2014-8453-CE
HTTP:STC:ADOBE:FLASH-PLY-BYPASS
HTTP:STC:ADOBE:2014-0515-CE3
HTTP:STC:ADOBE:CVE-2015-7660-UF
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT
HTTP:STC:ADOBE:CVE-2016-0968-CE
HTTP:STC:ADOBE:PDF-XFAFRM-OVRFL
HTTP:STC:ADOBE:CVE-2015-5106-CE
HTTP:STC:ADOBE:CVE-2015-5546-CE
HTTP:STC:ADOBE:SWF-POINTOBJ
HTTP:STC:ADOBE:CVE-2015-5563-UF
HTTP:STC:ADOBE:PDF-GLYPH-OF
HTTP:STC:ADOBE:CVE-2014-0553-MC
HTTP:STC:ADOBE:CVE-2016-0965-CE
HTTP:STC:ADOBE:CVE-2016-0975-CE
HTTP:STC:ADOBE:CVE-2016-0972-CE
HTTP:STC:ADOBE:CVE-2016-0959-CE
HTTP:STC:ADOBE:CVE-2016-0971-CE
HTTP:STC:ADOBE:CVE-2016-0973-CE
HTTP:STC:ADOBE:CVE-2016-0978-CE
HTTP:STC:ADOBE:CVE-2016-0977-CE
HTTP:STC:ADOBE:CVE-2016-0984-CE
HTTP:STC:ADOBE:CVE-2016-0982-CE
HTTP:STC:ADOBE:CVE-2016-0979-CE
HTTP:STC:ADOBE:CVE-2016-0969-CE
HTTP:STC:ADOBE:CVE-2016-0974-CE
HTTP:STC:ADOBE:CVE-2016-0976-CE
HTTP:STC:ADOBE:CVE-2016-0966-CE
HTTP:STC:ADOBE:CVE-2016-0981-CE
HTTP:STC:ADOBE:CVE-2015-5553-CE
HTTP:STC:ADOBE:TSAC-STRING
HTTP:STC:ADOBE:XFIR-RCSL
HTTP:STC:ADOBE:SWF-NEWFUNC
HTTP:STC:ADOBE:CVE-2014-0567-OF
HTTP:STC:ADOBE:CVE-2014-0556-BO
HTTP:STC:ADOBE:CVE-2014-0576-CE
HTTP:STC:ADOBE:CVE-2015-8042-UF
HTTP:STC:ADOBE:CVE-2016-0967-CE
HTTP:STC:ADOBE:PDF-JS-NEWPLAYER
HTTP:STC:ADOBE:CVE-2016-0970-CE
HTTP:STC:ADOBE:CVE-2016-0964-CE
HTTP:STC:ADOBE:CVE-2016-0985-CE
HTTP:STC:ADOBE:CVE-2016-0983-CE
HTTP:STC:ADOBE:PDF-PRINTSEPS
HTTP:STC:ADOBE:PDF-ICC-RCE
HTTP:STC:ADOBE:READER-FONT-OF
HTTP:STC:ADOBE:READER-UAF
HTTP:STC:ADOBE:FLASH-PLAYER-MP4
HTTP:STC:ADOBE:PDF-UNICODED-SC
HTTP:STC:ADOBE:CVE-2014-0515-BO
HTTP:STC:ADOBE:SHOCKWAVE-OOB
HTTP:STC:ADOBE:CVE-2014-0533-XS
HTTP:STC:ADOBE:FLASH-PLY-RCE
HTTP:STC:ADOBE:XFIR-TSAC
HTTP:STC:ADOBE:XFIR-LNAM
HTTP:STC:ADOBE:2014-0515-CE4

HTTP:STC:ATL

HTTP:STC:ATL:OWC
HTTP:STC:ATL:SHOCKWAVE
HTTP:STC:ATL:CISCO-UNITY
HTTP:STC:ATL:MSOFFICE-AX
HTTP:STC:ATL:DIRECTSHOW

HTTP:STC:BT

HTTP:STC:BT:FDM-TORRENT-BOF

HTTP:STC:CHROME

HTTP:STC:CHROME:JS-MSGBOX-DOS1
HTTP:STC:CHROME:RESPONSE-MC1
HTTP:STC:CHROME:TEMPLTE-DOM-UAF
HTTP:STC:CHROME:LOCATION-UAF
HTTP:STC:CHROME:ID-ATTR-OBJ-UAF
HTTP:STC:CHROME:MUTATIONOBS-UAF
HTTP:STC:CHROME:DOM-UAF
HTTP:STC:CHROME:RESPONSE-MC
HTTP:STC:CHROME:ARRAY-INTOVF
HTTP:STC:CHROME:MUL-FILE-TYPE
HTTP:STC:CHROME:RESPONSE-MC2
HTTP:STC:CHROME:RESPONSE-MC3
HTTP:STC:CHROME:V8-ARRAY-OOB
HTTP:STC:CHROME:IFRAME-VIDEO-MC
HTTP:STC:CHROME:SVG-ELMNT-UAF
HTTP:STC:CHROME:RANGE-BLUR-MC
HTTP:STC:CHROME:TABLE-CSS-MC
HTTP:STC:CHROME:STALE-PTR
HTTP:STC:CHROME:AWSNAP-DOS
HTTP:STC:CHROME:EXECCMD-UAF
HTTP:STC:CHROME:JS-MSGBOX-DOS
HTTP:STC:CHROME:CLPBRD-DATA-MC
HTTP:STC:CHROME:TABLE-CSS-MC1
HTTP:STC:CHROME:V8-JS-OOB
HTTP:STC:CHROME:PEPPER-PLGN-UAF
HTTP:STC:CHROME:BUG-REPORT-CE1
HTTP:STC:CHROME:LIST-INSIDE-COL
HTTP:STC:CHROME:GURL-XO-BYPASS
HTTP:STC:CHROME:WEBKIT-OO
HTTP:STC:CHROME:OBJ-BFRLOAD-UAF
HTTP:STC:CHROME:GURL-XO-BYPASS1
HTTP:STC:CHROME:BUG-REPORT-CE
HTTP:STC:CHROME:NOTIFY-IWD-UAF
HTTP:STC:CHROME:SVG-DSTRCTR-UAF

HTTP:STC:CLSID:ACTIVEX

HTTP:STC:CLSID:ACTIVEX:DLMGR
HTTP:STC:CLSID:ACTIVEX:ORADC2
HTTP:STC:CLSID:ACTIVEX:LEN-AX
HTTP:STC:CLSID:ACTIVEX:MDSAUTH
HTTP:STC:CLSID:ACTIVEX:SWCTL
HTTP:STC:CLSID:ACTIVEX:INTUIT
HTTP:STC:CLSID:ACTIVEX:AX-91
HTTP:STC:CLSID:ACTIVEX:AX-90
HTTP:STC:CLSID:ACTIVEX:AX-92
HTTP:STC:CLSID:ACTIVEX:AX-82
HTTP:STC:CLSID:ACTIVEX:AX-86
HTTP:STC:CLSID:ACTIVEX:AX-84
HTTP:STC:CLSID:ACTIVEX:AX-15
HTTP:STC:CLSID:ACTIVEX:AX-14
HTTP:STC:CLSID:ACTIVEX:AX-17
HTTP:STC:CLSID:ACTIVEX:AX-11
HTTP:STC:CLSID:ACTIVEX:AX-40
HTTP:STC:CLSID:ACTIVEX:AX-38
HTTP:STC:CLSID:ACTIVEX:AX-12
HTTP:STC:CLSID:ACTIVEX:AX-46
HTTP:STC:CLSID:ACTIVEX:AX-51
HTTP:STC:CLSID:ACTIVEX:AX-130
HTTP:STC:CLSID:ACTIVEX:AX-73
HTTP:STC:CLSID:ACTIVEX:AX-74
HTTP:STC:CLSID:ACTIVEX:AX-60
HTTP:STC:CLSID:ACTIVEX:AX-42
HTTP:STC:CLSID:ACTIVEX:AX-77
HTTP:STC:CLSID:ACTIVEX:AX-72
HTTP:STC:CLSID:ACTIVEX:AX-89
HTTP:STC:CLSID:ACTIVEX:AX-83
HTTP:STC:CLSID:ACTIVEX:AX-70
HTTP:STC:CLSID:ACTIVEX:AX-120
HTTP:STC:CLSID:ACTIVEX:AX-107
HTTP:STC:CLSID:ACTIVEX:AX-105
HTTP:STC:CLSID:ACTIVEX:PAVPZ
HTTP:STC:CLSID:ACTIVEX:AX-147
HTTP:STC:CLSID:ACTIVEX:AX-78
HTTP:STC:CLSID:ACTIVEX:AX-01
HTTP:STC:CLSID:ACTIVEX:AX-29
HTTP:STC:CLSID:ACTIVEX:AX-119
HTTP:STC:CLSID:ACTIVEX:NCT-AX
HTTP:STC:CLSID:ACTIVEX:AX-126
HTTP:STC:CLSID:ACTIVEX:AX-58
HTTP:STC:CLSID:ACTIVEX:LENOVO
HTTP:STC:CLSID:ACTIVEX:AX-94
HTTP:STC:CLSID:ACTIVEX:HP-AX
HTTP:STC:CLSID:ACTIVEX:VERI-AX
HTTP:STC:CLSID:ACTIVEX:NAVOPTS
HTTP:STC:CLSID:ACTIVEX:HTML-HP2
HTTP:STC:CLSID:ACTIVEX:MAGVIEW
HTTP:STC:CLSID:ACTIVEX:MOTIVE
HTTP:STC:CLSID:ACTIVEX:DXTLIPI
HTTP:STC:CLSID:ACTIVEX:SHELLAPP
HTTP:STC:CLSID:ACTIVEX:RFCGUI
HTTP:STC:CLSID:ACTIVEX:XMLCORE
HTTP:STC:CLSID:ACTIVEX:YVERINFO
HTTP:STC:CLSID:ACTIVEX:FPOLE
HTTP:STC:CLSID:ACTIVEX:SYM-SS
HTTP:STC:CLSID:ACTIVEX:AX-27
HTTP:STC:CLSID:ACTIVEX:HP-MODEM
HTTP:STC:CLSID:ACTIVEX:AX-28
HTTP:STC:CLSID:ACTIVEX:AX-32
HTTP:STC:CLSID:ACTIVEX:AX-71
HTTP:STC:CLSID:ACTIVEX:AX-149
HTTP:STC:CLSID:ACTIVEX:AX-62
HTTP:STC:CLSID:ACTIVEX:AX-21
HTTP:STC:CLSID:ACTIVEX:AX-31
HTTP:STC:CLSID:ACTIVEX:BB-PURE
HTTP:STC:CLSID:ACTIVEX:CTX-ICA
HTTP:STC:CLSID:ACTIVEX:AX-136
HTTP:STC:CLSID:ACTIVEX:AX-10
HTTP:STC:CLSID:ACTIVEX:HRTBEAT
HTTP:STC:CLSID:ACTIVEX:OUACTR
HTTP:STC:CLSID:ACTIVEX:SONICAX
HTTP:STC:CLSID:ACTIVEX:MACRO-A2
HTTP:STC:CLSID:ACTIVEX:AX-08
HTTP:STC:CLSID:ACTIVEX:AX-36
HTTP:STC:CLSID:ACTIVEX:AX-49
HTTP:STC:CLSID:ACTIVEX:AX-48
HTTP:STC:CLSID:ACTIVEX:VMWARE
HTTP:STC:CLSID:ACTIVEX:SONY-XCP
HTTP:STC:CLSID:ACTIVEX:AX-25
HTTP:STC:CLSID:ACTIVEX:AX-35
HTTP:STC:CLSID:ACTIVEX:AX-30
HTTP:STC:CLSID:ACTIVEX:AX-13
HTTP:STC:CLSID:ACTIVEX:AX-47
HTTP:STC:CLSID:ACTIVEX:AX-59
HTTP:STC:CLSID:ACTIVEX:SAP-AX
HTTP:STC:CLSID:ACTIVEX:AX-24
HTTP:STC:CLSID:ACTIVEX:AX-22
HTTP:STC:CLSID:ACTIVEX:AX-50
HTTP:STC:CLSID:ACTIVEX:AX-56
HTTP:STC:CLSID:ACTIVEX:AX-57
HTTP:STC:CLSID:ACTIVEX:AX-55
HTTP:STC:CLSID:ACTIVEX:AX-65
HTTP:STC:CLSID:ACTIVEX:EXECHAND
HTTP:STC:CLSID:ACTIVEX:AX-66
HTTP:STC:CLSID:ACTIVEX:OSCAN8
HTTP:STC:CLSID:ACTIVEX:MCAFEE
HTTP:STC:CLSID:ACTIVEX:AX-111
HTTP:STC:CLSID:ACTIVEX:AX-121
HTTP:STC:CLSID:ACTIVEX:AX-131
HTTP:STC:CLSID:ACTIVEX:AX-125
HTTP:STC:CLSID:ACTIVEX:AX-135
HTTP:STC:CLSID:ACTIVEX:AX-68
HTTP:STC:CLSID:ACTIVEX:AX-132
HTTP:STC:CLSID:ACTIVEX:AX-133
HTTP:STC:CLSID:ACTIVEX:AX-137
HTTP:STC:CLSID:ACTIVEX:AX-129
HTTP:STC:CLSID:ACTIVEX:AX-127
HTTP:STC:CLSID:ACTIVEX:AX-114
HTTP:STC:CLSID:ACTIVEX:AX-115
HTTP:STC:CLSID:ACTIVEX:AX-118
HTTP:STC:CLSID:ACTIVEX:AX-138
HTTP:STC:CLSID:ACTIVEX:AX-140
HTTP:STC:CLSID:ACTIVEX:AX-141
HTTP:STC:CLSID:ACTIVEX:AX-146
HTTP:STC:CLSID:ACTIVEX:AX-80
HTTP:STC:CLSID:ACTIVEX:DXSDK
HTTP:STC:CLSID:ACTIVEX:AX-116
HTTP:STC:CLSID:ACTIVEX:WH32-OF
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ
HTTP:STC:CLSID:ACTIVEX:TREND-AX
HTTP:STC:CLSID:ACTIVEX:AX-102
HTTP:STC:CLSID:ACTIVEX:AX-110
HTTP:STC:CLSID:ACTIVEX:AX-134
HTTP:STC:CLSID:ACTIVEX:AX-122
HTTP:STC:CLSID:ACTIVEX:AX-123
HTTP:STC:CLSID:ACTIVEX:MACRO-A3
HTTP:STC:CLSID:ACTIVEX:AX-06
HTTP:STC:CLSID:ACTIVEX:AX-16
HTTP:STC:CLSID:ACTIVEX:AX-43
HTTP:STC:CLSID:ACTIVEX:AX-26
HTTP:STC:CLSID:ACTIVEX:AX-34
HTTP:STC:CLSID:ACTIVEX:AX-37
HTTP:STC:CLSID:ACTIVEX:AX-39
HTTP:STC:CLSID:ACTIVEX:AX-33
HTTP:STC:CLSID:ACTIVEX:AX-53
HTTP:STC:CLSID:ACTIVEX:AX-45
HTTP:STC:CLSID:ACTIVEX:AX-67
HTTP:STC:CLSID:ACTIVEX:AX-79
HTTP:STC:CLSID:ACTIVEX:AX-54
HTTP:STC:CLSID:ACTIVEX:AX-19
HTTP:STC:CLSID:ACTIVEX:AX-41
HTTP:STC:CLSID:ACTIVEX:AX-108
HTTP:STC:CLSID:ACTIVEX:AX-76
HTTP:STC:CLSID:ACTIVEX:AX-02
HTTP:STC:CLSID:ACTIVEX:HTML-HLP
HTTP:STC:CLSID:ACTIVEX:AX-139
HTTP:STC:CLSID:ACTIVEX:AX-05
HTTP:STC:CLSID:ACTIVEX:AX-07
HTTP:STC:CLSID:ACTIVEX:VBTOVSI
HTTP:STC:CLSID:ACTIVEX:AX-09
HTTP:STC:CLSID:ACTIVEX:VML-AX
HTTP:STC:CLSID:ACTIVEX:AX-151
HTTP:STC:CLSID:ACTIVEX:AX-44
HTTP:STC:CLSID:ACTIVEX:AX-88
HTTP:STC:CLSID:ACTIVEX:JINIT-AX
HTTP:STC:CLSID:ACTIVEX:CREATEOB
HTTP:STC:CLSID:ACTIVEX:INOTES6W
HTTP:STC:CLSID:ACTIVEX:AX-106
HTTP:STC:CLSID:ACTIVEX:AX-112
HTTP:STC:CLSID:ACTIVEX:ORADC
HTTP:STC:CLSID:ACTIVEX:AX-23
HTTP:STC:CLSID:ACTIVEX:AX-64
HTTP:STC:CLSID:ACTIVEX:MACRO-A1
HTTP:STC:CLSID:ACTIVEX:AX-153
HTTP:STC:CLSID:ACTIVEX:YAHOO-IM
HTTP:STC:CLSID:ACTIVEX:AX-87
HTTP:STC:CLSID:ACTIVEX:AX-93
HTTP:STC:CLSID:ACTIVEX:NESSCAN
HTTP:STC:CLSID:ACTIVEX:VANTAGEX
HTTP:STC:CLSID:ACTIVEX:MACRO-AX
HTTP:STC:CLSID:ACTIVEX:NESSCAN1
HTTP:STC:CLSID:ACTIVEX:AX-143
HTTP:STC:CLSID:ACTIVEX:AX-75
HTTP:STC:CLSID:ACTIVEX:AX-61
HTTP:STC:CLSID:ACTIVEX:AX-52
HTTP:STC:CLSID:ACTIVEX:WSH
HTTP:STC:CLSID:ACTIVEX:AX-99
HTTP:STC:CLSID:ACTIVEX:AX-104
HTTP:STC:CLSID:ACTIVEX:AX-98
HTTP:STC:CLSID:ACTIVEX:AX-97
HTTP:STC:CLSID:ACTIVEX:AX-101
HTTP:STC:CLSID:ACTIVEX:AX-103
HTTP:STC:CLSID:ACTIVEX:AX-100
HTTP:STC:CLSID:ACTIVEX:AX-124
HTTP:STC:CLSID:ACTIVEX:AX-85
HTTP:STC:CLSID:ACTIVEX:AX-20
HTTP:STC:CLSID:ACTIVEX:AX-128
HTTP:STC:CLSID:ACTIVEX:SYM-FWAX
HTTP:STC:CLSID:ACTIVEX:MACRO-A4
HTTP:STC:CLSID:ACTIVEX:AX-109
HTTP:STC:CLSID:ACTIVEX:INC-AX
HTTP:STC:CLSID:ACTIVEX:AOL-AX
HTTP:STC:CLSID:ACTIVEX:EPO-SM
HTTP:STC:CLSID:ACTIVEX:AX-18
HTTP:STC:CLSID:ACTIVEX:AX-69
HTTP:STC:CLSID:ACTIVEX:AX-144
HTTP:STC:CLSID:ACTIVEX:AX-63
HTTP:STC:CLSID:ACTIVEX:AX-145
HTTP:STC:CLSID:ACTIVEX:AX-142
HTTP:STC:CLSID:ACTIVEX:AX-117
HTTP:STC:CLSID:ACTIVEX:AX-113
HTTP:STC:CLSID:ACTIVEX:ACROPDF

HTTP:STC:DL

HTTP:STC:DL:QT-UDTA-ATOM
HTTP:STC:DL:MS-CVE-2015-2549-CE
HTTP:STC:DL:VISIO-VSD-MEMCP
HTTP:STC:DL:CVE-2016-0174-CE
HTTP:STC:DL:REMOTE-DNS-CHANGE
HTTP:STC:DL:GIF-AND-PHPFUNC
HTTP:STC:DL:MS-GDI-OUTBOUND-OBA
HTTP:STC:DL:MINI-STREAM-PLS-OF
HTTP:STC:DL:JRE-APPLET2CLASS-LD
HTTP:STC:DL:CVE-2016-0176-CE
HTTP:STC:DL:OPEN-TYPE-RCE11
HTTP:STC:DL:ONENOTE-INFO-DISC1
HTTP:STC:DL:OTF-2015-2462-CE
HTTP:STC:DL:CVE-2015-6127-RCE
HTTP:STC:DL:CVE-2016-0173-CE
HTTP:STC:DL:AVI-LIST-OF
HTTP:STC:DL:CVE-2016-0126-MC
HTTP:STC:DL:VIDEOLAN-VLC-SWF-CE
HTTP:STC:DL:CVE-2016-0196-PRIV
HTTP:STC:DL:CVE-2016-0170-CE
HTTP:STC:DL:CVE-2016-0121-RCE
HTTP:STC:DL:CVE-2016-0101-RCE
HTTP:STC:DL:CVE-2015-6118-CE
HTTP:STC:DL:CVE-2016-0180-CE
HTTP:STC:DL:CVE-2016-0172-RCE
HTTP:STC:DL:CVE-2016-0171-UAF
HTTP:STC:DL:CVE-2016-0178-RCE
HTTP:STC:DL:CVE-2016-0175-ID
HTTP:STC:DL:WORD-CLSID
HTTP:STC:DL:CVE-2015-6131-RCE
HTTP:STC:DL:CVE-2015-6040-RCE
HTTP:STC:DL:CVE-2015-2546-UAF
HTTP:STC:DL:CVE-2015-6177-CE
HTTP:STC:DL:CVE-2015-6128-CE
HTTP:STC:DL:SOPHOS-ZIPDOS1
HTTP:STC:DL:OFFICEART-PROP
HTTP:STC:DL:SOPHOS-MAL-VISIO1
HTTP:STC:DL:XLS-DATA-INIT
HTTP:STC:DL:CVE-2015-2463-RCE
HTTP:STC:DL:WORD-FONT1
HTTP:STC:DL:CVE-2016-0091-RCE
HTTP:STC:DL:CVE-2015-2429-CE
HTTP:STC:DL:WORD-MEM-CORR1
HTTP:STC:DL:WORD-REC-LEN-OF1
HTTP:STC:DL:REAL-SWF-BOF1
HTTP:STC:DL:CVE-2016-0118-RCE
HTTP:STC:DL:CVE-2016-0134-RCE
HTTP:STC:DL:SANDWORM-RCE1
HTTP:STC:DL:MAL-PLS
HTTP:STC:DL:CVE-2015-2459-CE
HTTP:STC:DL:VLC-TY-BO1
HTTP:STC:DL:VLC-MEDIA-PLY-BO1
HTTP:STC:DL:CVE-2015-2432-RCE
HTTP:STC:DL:HELP-IMG-HEAP
HTTP:STC:DL:CVE-2015-2525-PRIV
HTTP:STC:DL:APPLEQT-MP4-CE
HTTP:STC:DL:CVE-2016-0151-PRIV
HTTP:STC:DL:CVE-2016-0127-CE
HTTP:STC:DL:WORD-STYLE-EXEC
HTTP:STC:DL:OFF-GDI-HOF1
HTTP:STC:DL:PPT-FF-BOF1
HTTP:STC:DL:NETOP-DWS-BOF1
HTTP:STC:DL:MS-PP-PRESENT-RCE1
HTTP:STC:DL:CVE-2015-6124-RCE
HTTP:STC:DL:CVE-2015-2431-CE
HTTP:STC:DL:MS-OFFICE-PICT-MC1
HTTP:STC:DL:MSDOTNET-FUNC-PTR1
HTTP:STC:DL:MS-PUB-RCE1
HTTP:STC:DL:QT-FLIPFILETYPE
HTTP:STC:DL:MSHTML-HELP1
HTTP:STC:DL:MAL-MEDIA-RCE1
HTTP:STC:DL:MEDIA-CENTR-LINK-CE
HTTP:STC:DL:MAL-MPEG-41
HTTP:STC:DL:OSX-GIF-BANDPROC
HTTP:STC:DL:EICAR1
HTTP:STC:DL:CVE-2015-1683-UAF
HTTP:STC:DL:ACE-BO1
HTTP:STC:DL:APPLE-QT-MOV-DOS1
HTTP:STC:DL:CVE-2015-6133-CE
HTTP:STC:DL:XLS-INT-OR1
HTTP:STC:DL:XLS-NULL-PTR1
HTTP:STC:DL:CVE-2015-2464-RCE
HTTP:STC:DL:WPS-HEAP-OF
HTTP:STC:DL:XLS-SERIES-TYPE-RC1
HTTP:STC:DL:MS-GDI-WMF-OF
HTTP:STC:DL:WINRAR-FILE
HTTP:STC:DL:ZIP-FILE
HTTP:STC:DL:BZIP2-FILE
HTTP:STC:DL:PDF-FILE
HTTP:STC:DL:CVE-2015-2523-RCE
HTTP:STC:DL:VISILOGIC-VLP-BO
HTTP:STC:DL:CVE-2015-6173-PRIV
HTTP:STC:DL:CVE-2015-6172-CE
HTTP:STC:DL:CVE-2015-6132-PRIV
HTTP:STC:DL:CVE-2015-6106-RCE
HTTP:STC:DL:OFFICE-MAL-PUB1
HTTP:STC:DL:CVE-2016-0041-CE
HTTP:STC:DL:AVI-LIST-OF1
HTTP:STC:DL:SE-GP-PRO-EX
HTTP:STC:DL:MSOFFICE-MSO-RCE
HTTP:STC:DL:CYTEL-CRSOVR-CYB-BO
HTTP:STC:DL:OO-WORD-TABLE
HTTP:STC:DL:PPT-SHAPES-MEM
HTTP:STC:DL:OTF-DOS
HTTP:STC:DL:WORD-CMAJ
HTTP:STC:DL:AOL-DESKTOP-RTX-BOF
HTTP:STC:DL:PPT-OFFICEART1
HTTP:STC:DL:WORD-BOOKMARK-OF
HTTP:STC:DL:APPLE-PLS-FILE-BOF
HTTP:STC:DL:OTF-DOS1
HTTP:STC:DL:AVAST-LHA
HTTP:STC:DL:REAL-SWF-BOF
HTTP:STC:DL:QT-FPX-IO
HTTP:STC:DL:ACE-BO
HTTP:STC:DL:WORD-MEM-CORR
HTTP:STC:DL:APPLE-QT-H264-BOF1
HTTP:STC:DL:MS-OFFICE-STRING1
HTTP:STC:DL:WPD-BO
HTTP:STC:DL:VLC-TY-BO
HTTP:STC:DL:XBM-BO
HTTP:STC:DL:CVE-2016-0018-RCE
HTTP:STC:DL:WORD-MAL-INDEX
HTTP:STC:DL:VIDEOLAN-WAV-IO
HTTP:STC:DL:MS-OBJ-PACKAGER-RC1
HTTP:STC:DL:RTF-LISTID-UAF
HTTP:STC:DL:WORD-RTF-RCE
HTTP:STC:DL:AVISOFT-DTV-PLF-BO
HTTP:STC:DL:INFORMIX-NFX
HTTP:STC:DL:LIBXML2-ENTRY-NAME1
HTTP:STC:DL:FF-SAME-ORIG-SB
HTTP:STC:DL:CVE-2016-0010-RCE
HTTP:STC:DL:CVE-2016-0153-MC
HTTP:STC:DL:VISIO-INVALID-ROW1
HTTP:STC:DL:CVE-2016-0122-RCE
HTTP:STC:DL:CVE-2016-0165-CE
HTTP:STC:DL:CAB-VULNS1
HTTP:STC:DL:CVE-2016-0035-UAF
HTTP:STC:DL:CVE-2016-0145-RCE
HTTP:STC:DL:MS-WIN-VERIFY-TRUST
HTTP:STC:DL:MULTIMEDIA-JUKEBOX
HTTP:STC:DL:MAL-XRL
HTTP:STC:DL:XLS-HFPICTURE-REC
HTTP:STC:DL:XLS-DRAWING-REC
HTTP:STC:DL:CVE-2016-0139-RCE
HTTP:STC:DL:CVE-2016-0007-PRIV
HTTP:STC:DL:XNVIEW-PCT-FILE-BOF
HTTP:STC:DL:ORACLE-JPEG-QCD-OF
HTTP:STC:DL:OPEN-TYPE-RCE1
HTTP:STC:DL:WP5-FILE
HTTP:STC:DL:CCMPLAYER-M3U-OF
HTTP:STC:DL:MS-OFFICE-DOC-MC
HTTP:STC:DL:MAL-WAV-FILE
HTTP:STC:DL:CVE-2016-0135-DOS
HTTP:STC:DL:CVE-2016-0006-PRIV
HTTP:STC:DL:CVE-2015-2415-RCE
HTTP:STC:DL:MSHTML-DBLFREE
HTTP:STC:DL:CVE-2016-0015-RCE
HTTP:STC:DL:CVE-2014-6361-RCE
HTTP:STC:DL:CVE-2016-0020-PRIV
HTTP:STC:DL:WMF-IO
HTTP:STC:DL:LIBAV-LZO-IO
HTTP:STC:DL:MS-READER-MC
HTTP:STC:DL:XLS-SERIES
HTTP:STC:DL:OFF-GDI-RCD-TYPE
HTTP:STC:DL:APPLE-ITUNES-IO
HTTP:STC:DL:XLS-SERIES-TYPE-RCE
HTTP:STC:DL:MS-OFFICE-XL-MC
HTTP:STC:DL:AVI-MMAKER
HTTP:STC:DL:MS-THEME-RCE
HTTP:STC:DL:XL-CVE-2013-1315
HTTP:STC:DL:XLS-OBJ-BIFF
HTTP:STC:DL:VLC-MEDIAPLAYER-RCE
HTTP:STC:DL:VIDEOLAN-VLC-PNG-CE
HTTP:STC:DL:PPT-FB1-ATOM-OF
HTTP:STC:DL:CVE-2016-0014-RCE
HTTP:STC:DL:APPLE-QT-VR-TRCK-OF
HTTP:STC:DL:GNU-TAR-PAX-BOF
HTTP:STC:DL:XLS-XF-BIFF
HTTP:STC:DL:OPENSSL-CMS-FILE
HTTP:STC:DL:XLS-SCENARIO
HTTP:STC:DL:CVE-2015-2557-RCE
HTTP:STC:DL:PANDA-ZOO-BO
HTTP:STC:DL:APPLE-QT-H264-OF
HTTP:STC:DL:MS-OFFICE-EXCEL-RCE
HTTP:STC:DL:CYBERLINK-LIST-OF
HTTP:STC:DL:APPLE-QT-JPEG-OF3
HTTP:STC:DL:MS-EXCEL-OBJ-MC
HTTP:STC:DL:OPENOFFICE-TIFF-OF
HTTP:STC:DL:RTF-MISMATCH
HTTP:STC:DL:WORD-BOF
HTTP:STC:DL:OO-EMF
HTTP:STC:DL:XLS-WRITEAV
HTTP:STC:DL:JAVA-FILEDIALOG-BOF
HTTP:STC:DL:LOTUS-DOC-VIEWER
HTTP:STC:DL:ACDSEE-XPM-COLOR
HTTP:STC:DL:XLS-MERGECELLS-OF
HTTP:STC:DL:XLS-XISPARENT
HTTP:STC:DL:MPLAYER-CALLOC
HTTP:STC:DL:ISPVM-SYS-XCF-BOF
HTTP:STC:DL:PPT-OFFART-ATOM-RCE
HTTP:STC:DL:CVE-2016-0055-MC
HTTP:STC:DL:ORACLE-LOTUS-123
HTTP:STC:DL:PEAZIP-CINJ
HTTP:STC:DL:FOXIT-READER-ESCAPE
HTTP:STC:DL:CVE-2016-0022-RCE
HTTP:STC:DL:MS-PUBLISHER-RCE
HTTP:STC:DL:VISIO-OBJ-TAG
HTTP:STC:DL:MS-WIN-HLP-MC
HTTP:STC:DL:QT-PANORAMA-ATOM1
HTTP:STC:DL:QT-EMBED-JS
HTTP:STC:DL:IMAGIC-GIF-BO
HTTP:STC:DL:XLS-MAL-REC-MC
HTTP:STC:DL:MS-MEDIA-DVR
HTTP:STC:DL:VISIO-DXF-RCE
HTTP:STC:DL:QT-STSC-ATOM-MC
HTTP:STC:DL:CVE-2016-0016-RCE
HTTP:STC:DL:XLS-BIN-OF
HTTP:STC:DL:XLS-BIFF-MC
HTTP:STC:DL:NUANCE-LAUNCH
HTTP:STC:DL:XLS-OBJECTLINK
HTTP:STC:DL:VISIO-INVALID-ROW
HTTP:STC:DL:WINAMP-MAL-PLS
HTTP:STC:DL:WEBEX-ATDL-OF
HTTP:STC:DL:PDFXCHANGE-AX
HTTP:STC:DL:GALAN-BO
HTTP:STC:DL:PPT-MS-OGRAPH
HTTP:STC:DL:QP-S3M-OF
HTTP:STC:DL:AOL-RTX
HTTP:STC:DL:MAL-WEBEX-WRF
HTTP:STC:DL:A-PDF-RCE
HTTP:STC:DL:MAL-WRI
HTTP:STC:DL:MS-TTF-PARSING
HTTP:STC:DL:CVE-2016-0015-CE-1
HTTP:STC:DL:XLS-WINDOW2
HTTP:STC:DL:DIRECTSHOW-QUICK-MC
HTTP:STC:DL:OTF-FONT-INT
HTTP:STC:DL:OPENOFFICE-CSV-DOS4
HTTP:STC:DL:ULTRAISO-CUE
HTTP:STC:DL:XLS-MS-OGRAPH
HTTP:STC:DL:OFFICE-MSO
HTTP:STC:DL:PPT-2000-BOF
HTTP:STC:DL:OTF-GLYPH
HTTP:STC:DL:PUB-TEXTBOX1
HTTP:STC:DL:XLS-BOUNDSHEET
HTTP:STC:DL:WORD-FONT
HTTP:STC:DL:CVE-2015-0054-PRIV
HTTP:STC:DL:OTF-FONT-SIZE
HTTP:STC:DL:OPENOFFICE-CSV-DOS2
HTTP:STC:DL:OPENOFFICE-CSV-DOS3
HTTP:STC:DL:MS-WORD-XST-BOF
HTTP:STC:DL:OTF-BO
HTTP:STC:DL:ASTONSOFT-DBR-BO
HTTP:STC:DL:TRUETYPE-PARSE2
HTTP:STC:DL:MS-WORD-MEM-CORR
HTTP:STC:DL:SHOCKWAVE-3D-RCE
HTTP:STC:DL:FAT-MEDIAPLAYER-RCE
HTTP:STC:DL:MS-VISIO-DXF-BO
HTTP:STC:DL:MP3-WM-MEM
HTTP:STC:DL:XLS-MAL-OBJ
HTTP:STC:DL:SOPHOS-ZIPDOS
HTTP:STC:DL:MS-PUB-MC
HTTP:STC:DL:NETOP-DWS-BOF
HTTP:STC:DL:WORD-TEXTBOX
HTTP:STC:DL:WORD-SMARTTAG
HTTP:STC:DL:PPT-SOUND-OBJ-OF
HTTP:STC:DL:QT-SMIL-FILEHAND
HTTP:STC:DL:MS-FON-FILE-RCE
HTTP:STC:DL:MAL-RMF-GM
HTTP:STC:DL:QT-TOQTPOINTER
HTTP:STC:DL:MS-PAINT-BMP-MC
HTTP:STC:DL:VISIO-FREED
HTTP:STC:DL:PUB-INDEXLIMITS
HTTP:STC:DL:MS-OFFICE-EXCEL-MC
HTTP:STC:DL:IRFANVIEW-RLE-DC-BO
HTTP:STC:DL:REAL-3G2-WRITEAV-MC
HTTP:STC:DL:QT-UDTA-ATOM1
HTTP:STC:DL:PPT-TXMASTERSTYLE
HTTP:STC:DL:GNOME-RC4-BO
HTTP:STC:DL:JVM-READMABCURVE
HTTP:STC:DL:CLAMAV-PE-INT
HTTP:STC:DL:FFMPEG-READ-OF
HTTP:STC:DL:LIBSNDFILE-PAF-OF
HTTP:STC:DL:PPT-SLIDEATOM
HTTP:STC:DL:VLC-MP4-BOF
HTTP:STC:DL:XLS-LINKED-LIST
HTTP:STC:DL:MPEG4-3IVX-FILE
HTTP:STC:DL:PROSHOW-PSH-FILE-OF
HTTP:STC:DL:OFFICEART-RCE
HTTP:STC:DL:QTPICT-REC-BO
HTTP:STC:DL:DIRECTX-SAMI
HTTP:STC:DL:ACDSEE-XBM-WIDTH
HTTP:STC:DL:XLS-SELECTION
HTTP:STC:DL:EMF-OF
HTTP:STC:DL:PUB-PLC3
HTTP:STC:DL:EXESCOPE-FILE-BO
HTTP:STC:DL:CVE-2014-6364-RCE
HTTP:STC:DL:EICAR-2
HTTP:STC:DL:APPLE-QT-JPEG-OF
HTTP:STC:DL:SYM-AV-RAR-BO
HTTP:STC:DL:REAL-3GP-FILE-MC
HTTP:STC:DL:CVE-2014-6357-RCE
HTTP:STC:DL:MS-OFFICE-WORD-BO
HTTP:STC:DL:EOT-IO
HTTP:STC:DL:WORD-STSH-RCE
HTTP:STC:DL:DS-ATOM-TABLE1
HTTP:STC:DL:DOCX-ACCESS-RCE1
HTTP:STC:DL:CVE-2015-2477-CE
HTTP:STC:DL:ONENOTE-INFO-DISC
HTTP:STC:DL:KINGVIEW-LOGFILE-BO
HTTP:STC:DL:CVE-2015-0003-PRIV
HTTP:STC:DL:VISIO-BOF
HTTP:STC:DL:CVE-2015-2469-CE
HTTP:STC:DL:QT-JVTCOMPENCODE1
HTTP:STC:DL:OO-OLE
HTTP:STC:DL:OLE-ART-INV
HTTP:STC:DL:WMP-DVR-MS
HTTP:STC:DL:QT-FPX-IO1
HTTP:STC:DL:QT-COLOR-ATOM1
HTTP:STC:DL:PPT-VIEWER-MEMALLOC
HTTP:STC:DL:QT-STSC-ATOM-MC1
HTTP:STC:DL:QT-PDAT1
HTTP:STC:DL:MS-DOC-STREAM-CE
HTTP:STC:DL:CVE-2015-2458-CE
HTTP:STC:DL:XLS-SET-FONT
HTTP:STC:DL:MPLAYER-SAMI
HTTP:STC:DL:CVE-2015-6122-CE
HTTP:STC:DL:EXCEL-UAF-RCE
HTTP:STC:DL:PPT-TXMASTERSTYLE1
HTTP:STC:DL:PPT-VIEWER-MEMALLO1
HTTP:STC:DL:MS-PNG-IMG-CE
HTTP:STC:DL:WEBEX-ATDL-BOF
HTTP:STC:DL:XLS-FILTER-REC
HTTP:STC:DL:REALPLAYER-SWF-BO
HTTP:STC:DL:XLS-FRTWRAPPER1
HTTP:STC:DL:APPLE-QT-OBJI
HTTP:STC:DL:MS-PICTURE-MGR-AV
HTTP:STC:DL:MS-DOC-STREAM-CE1
HTTP:STC:DL:VBA-MEM-CORRUPT
HTTP:STC:DL:MS-OPEN-FONT-FILE
HTTP:STC:DL:MS-WORKS9-RTF
HTTP:STC:DL:SOPHOS-CAB-FILE-OF
HTTP:STC:DL:SOPHOS-RAR-FILTER
HTTP:STC:DL:CVE-2015-1698-RCE
HTTP:STC:DL:ZIP-FOR-MEDIA
HTTP:STC:DL:AVAST-LHA1
HTTP:STC:DL:WORD-FILE-MEM
HTTP:STC:DL:REALPLY-URL-BOF
HTTP:STC:DL:WORD-STRING
HTTP:STC:DL:SOPHOS-PDF-FILE-OF
HTTP:STC:DL:GIMP-XWD-BO
HTTP:STC:DL:DIRECTPLAY-HEAP-OF
HTTP:STC:DL:IRFANVIEW-IMXCF-OF
HTTP:STC:DL:MPG123-HEAP-OF
HTTP:STC:DL:VLC-SWF-RCE
HTTP:STC:DL:XENORATE-XPL-BOF
HTTP:STC:DL:CVE-2015-2550-PRIV
HTTP:STC:DL:MS-WORD-BULLET
HTTP:STC:DL:LOTUS-URL-RCE
HTTP:STC:DL:MS-MEDIA-DECOMP
HTTP:STC:DL:SOPHOS-RAR-VMSF-RGB
HTTP:STC:DL:APPLE-QT-QTIF-DOS
HTTP:STC:DL:VISIWAVE-SITE-BOF
HTTP:STC:DL:MS-WIN-MOVIE-MKR-MC
HTTP:STC:DL:MINI-STREAM-ASX-BOF
HTTP:STC:DL:OFFICE-PICT-MC
HTTP:STC:DL:COOLPDF-READER-BO
HTTP:STC:DL:WORD-REC-LEN-OF
HTTP:STC:DL:VISIO-UMLSTRING
HTTP:STC:DL:ASF-DF
HTTP:STC:DL:MS-OFFICE-2010-RCE
HTTP:STC:DL:MS-OFFICE-BAD-INDEX
HTTP:STC:DL:SEARCHMS-EXEC
HTTP:STC:DL:CVE-2015-0063-RCE
HTTP:STC:DL:QT-PDAT
HTTP:STC:DL:VLC-XSPF-MEM
HTTP:STC:DL:OPEN-TYPE-RCE
HTTP:STC:DL:PPT-SCRIPT
HTTP:STC:DL:XLS-VERSIONINFO
HTTP:STC:DL:MCAF-LHA-OF
HTTP:STC:DL:CVE-2014-6335-RCE
HTTP:STC:DL:APPLE-QT-MOV-DOS
HTTP:STC:DL:CSOUND-GETNUM-BOF
HTTP:STC:DL:MS-PUB-RCE
HTTP:STC:DL:EXCEL-SST
HTTP:STC:DL:MS-CVE-2014-6356-CE
HTTP:STC:DL:MS-WMF-PARSE
HTTP:STC:DL:OFF-GDI-HOF
HTTP:STC:DL:MS-PP-PRESENT-RCE
HTTP:STC:DL:MS-OFFICE-STRING
HTTP:STC:DL:URSOFT-W32DASM-BOF
HTTP:STC:DL:WIN-EXE-DOWNLOAD
HTTP:STC:DL:CVE-2015-2387-CE
HTTP:STC:DL:MAL-WIN-BRIEFCASE-1
HTTP:STC:DL:XLS-MSOFBTOPT
HTTP:STC:DL:MS-GDI32-POLYLINE
HTTP:STC:DL:WORD-WEBAPPS-RCE
HTTP:STC:DL:CISCO-FORMAT-PLY-MC
HTTP:STC:DL:APPLE-QT-MJPEG-OF
HTTP:STC:DL:PPT-FF-BOF
HTTP:STC:DL:FREETYPE-TYPE1
HTTP:STC:DL:FONT-HANDLING-CE
HTTP:STC:DL:OO-WORD-TABLE1
HTTP:STC:DL:ULTRAISO-CUE2
HTTP:STC:DL:WORD-SECTION-OF1
HTTP:STC:DL:FAX-EDITOR-RCE
HTTP:STC:DL:XLS-2015-2375-ID
HTTP:STC:DL:EMF-EMR-INT
HTTP:STC:DL:CAB-VULNS
HTTP:STC:DL:MS-NET-ASLR-BYPASS
HTTP:STC:DL:MS-FONTMATRIX
HTTP:STC:DL:DS-ATOM-TABLE
HTTP:STC:DL:WIRELURKER-DOWNLOAD
HTTP:STC:DL:MS-GDI-EMF
HTTP:STC:DL:ULTRAISO-CUE4
HTTP:STC:DL:MS-OFFICE-PICT-MC
HTTP:STC:DL:XLS-SERIES3
HTTP:STC:DL:CVE-2014-6360-RCE
HTTP:STC:DL:ULTRAISO-CUE3
HTTP:STC:DL:XLS-SERIES7
HTTP:STC:DL:GOOGLE-PICASA-OVF
HTTP:STC:DL:DOC-2015-2380-CE
HTTP:STC:DL:CVE-2015-2367-SB
HTTP:STC:DL:CVE-2015-2378-CE
HTTP:STC:DL:MS-PAINT-DOS
HTTP:STC:DL:XLS-SERIES6
HTTP:STC:DL:MS-EXCEL-TXOOBJ-MC
HTTP:STC:DL:MS-MPEG-LAYER-3-DOS
HTTP:STC:DL:CVE-2015-2366-PE
HTTP:STC:DL:MS-XL-ROW-REC-BO
HTTP:STC:DL:MSPROJECT-MEM
HTTP:STC:DL:DBP-FILE-BOF
HTTP:STC:DL:DOT-NET-INFO-DISC
HTTP:STC:DL:XLS-SERIES2
HTTP:STC:DL:CVE-2015-2377-UAF
HTTP:STC:DL:MS-RICHEDIT-RCE
HTTP:STC:DL:MSCOMCTL-ACTIVEX
HTTP:STC:DL:MS-FOREFRONT-CUP
HTTP:STC:DL:OFFICE-PCT
HTTP:STC:DL:VISIO-OBJ-HEADER
HTTP:STC:DL:EXCEL-REC-TYPE
HTTP:STC:DL:VISIO-COMPRESSION
HTTP:STC:DL:XLS-SERIES4
HTTP:STC:DL:PPT-UNK-ANI
HTTP:STC:DL:PUB-PLC
HTTP:STC:DL:SUSPICIOUS-FILE
HTTP:STC:DL:DLL-PLANTING-CE
HTTP:STC:DL:CVE-2015-2376-CE
HTTP:STC:DL:DOC-2015-2379-CE
HTTP:STC:DL:CVE-2015-2370-PRIV
HTTP:STC:DL:XLW-MEM-CORR
HTTP:STC:DL:CVE-2016-0092-RCE
HTTP:STC:DL:XLS-PALETTE
HTTP:STC:DL:XLS-OBJ-RECORD
HTTP:STC:DL:CVE-2016-0008-CE
HTTP:STC:DL:WORD-SMART-TAGS
HTTP:STC:DL:XLS-OFFICE-DRAWING
HTTP:STC:DL:WORDPAD-BO
HTTP:STC:DL:PPT-FB1-ATOM-OF3
HTTP:STC:DL:XLS-SERIES5
HTTP:STC:DL:CVE-2015-2365-PRIV
HTTP:STC:DL:WORD-IND
HTTP:STC:DL:XLS-BUFF-OR
HTTP:STC:DL:XLS-FORMAT-ARRAY
HTTP:STC:DL:PPT-NOTES-MC
HTTP:STC:DL:CVE-2016-0021-RCE
HTTP:STC:DL:WIN-MEDIA-PLY-MC
HTTP:STC:DL:QUICKTIME-QTVR-BOF
HTTP:STC:DL:WMF-HEAPOF
HTTP:STC:DL:CVE-2016-0117-RCE
HTTP:STC:DL:PPT-OFFICEART
HTTP:STC:DL:WORD-SECTION-OF
HTTP:STC:DL:RTF-FPARSE-RCE
HTTP:STC:DL:CVE-2015-0064-RCE
HTTP:STC:DL:AVI-DL-MEM
HTTP:STC:DL:MSHTML-HELP
HTTP:STC:DL:MAL-HLP-CHM
HTTP:STC:DL:CVE-2015-2426-BOF
HTTP:STC:DL:APPLE-QT-FTAB-ATOM
HTTP:STC:DL:MS-DIRECTSHOW-RCE
HTTP:STC:DL:MAL-M3U
HTTP:STC:DL:OFFICE-BO-RCE
HTTP:STC:DL:MS-WORDPAD-DOS
HTTP:STC:DL:XLS-SERIES9
HTTP:STC:DL:CVE-2016-0056-RCE
HTTP:STC:DL:MS-CVE-2015-2553-CE
HTTP:STC:DL:APPLE-QT-RNET-OF
HTTP:STC:DL:XLS-INV-DRAW
HTTP:STC:DL:CVE-2014-1776-SHELL
HTTP:STC:DL:CVE-2016-0059-ID
HTTP:STC:DL:XLS-PIC-REC-MC
HTTP:STC:DL:MSEXCEL-VBMACRO-RCE
HTTP:STC:DL:CVE-2015-0065-RCE
HTTP:STC:DL:CVE-2015-0078-PRIV
HTTP:STC:DL:CVE-2015-0094-ID
HTTP:STC:DL:MAL-PNG-FILE
HTTP:STC:DL:CVE-2016-0042-RCE
HTTP:STC:DL:CVE-2015-0332-CE
HTTP:STC:DL:CVE-2015-1644-PRIV
HTTP:STC:DL:QT-TEXML-BOF
HTTP:STC:DL:OFFICE-VBA-UAF
HTTP:STC:DL:VISIO-OBJ-CONFUSION
HTTP:STC:DL:WNDPROC-INFO-DISC
HTTP:STC:DL:CVE-2015-1650-RCE
HTTP:STC:DL:OBF-PE-DL
HTTP:STC:DL:EMF-IMG-FILE-RCE
HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC
HTTP:STC:DL:DOCX-ACCESS-RCE
HTTP:STC:DL:CVE-2015-0086-RCE
HTTP:STC:DL:CVE-2015-0085-RCE
HTTP:STC:DL:MULTIPLE-MAL-FILE
HTTP:STC:DL:MAL-MPEG-4
HTTP:STC:DL:CVE-2015-0084-SB
HTTP:STC:DL:XLS-FIELD-MC
HTTP:STC:DL:CVE-2015-1642-RCE
HTTP:STC:DL:APPLE-QT-TARGA-BO
HTTP:STC:DL:MAL-AVI-FILE
HTTP:STC:DL:CVE-2015-1675-RCE
HTTP:STC:DL:CVE-2015-1678-ID
HTTP:STC:DL:JS-VAR-OBFUS
HTTP:STC:DL:CVE-2015-1682-RCE
HTTP:STC:DL:VS-XML-INFO
HTTP:STC:DL:CVE-2015-1674-SB
HTTP:STC:DL:NET-CVE-2015-1672
HTTP:STC:DL:MUL-FILES-WITH-PDF
HTTP:STC:DL:CVE-2015-3083-CE
HTTP:STC:DL:WORD-DPPOLYCOUNT
HTTP:STC:DL:CVE-2015-3048-RCE
HTTP:STC:DL:WORD-ARRAY-DATA
HTTP:STC:DL:RTF-PARSE-RCE
HTTP:STC:DL:MAL-VBP
HTTP:STC:DL:CVE-2015-1676-ID
HTTP:STC:DL:CVE-2015-0080-ID
HTTP:STC:DL:CVE-2015-1681-DOS
HTTP:STC:DL:XLS-FILE-IMPORT
HTTP:STC:DL:CVE-2016-3216-RCE
HTTP:STC:DL:ASF-SR
HTTP:STC:DL:MP4-FILE-BOF
HTTP:STC:DL:MSSQL-BACKUP-MEM
HTTP:STC:DL:CVE-2015-1770-CE
HTTP:STC:DL:MS-EXPLORER-URL-OF
HTTP:STC:DL:MSOFFICE-MSODLL-MC
HTTP:STC:DL:CVE-2016-3233-CE
HTTP:STC:DL:MIXERSEQUENCER-RCE
HTTP:STC:DL:PPT-EXTTIMENODE
HTTP:STC:DL:CVE-2016-3203-RCE
HTTP:STC:DL:CVE-2015-1721-PRIV
HTTP:STC:DL:WIN-CHM-DETECTION
HTTP:STC:DL:APPLE-QT-TEXML
HTTP:STC:DL:CVE-2011-1985-CE
HTTP:STC:DL:NODEJS-YAML-CE
HTTP:STC:DL:APPLE-QT-FLIC-BO
HTTP:STC:DL:APPLE-QT-H264-BOF
HTTP:STC:DL:QT-FLASHPIX-BOF
HTTP:STC:DL:XLS-SST
HTTP:STC:DL:XLS-LBL-RECORD
HTTP:STC:DL:OTF-INDEX-RCE
HTTP:STC:DL:XLS-ARR-INDEX
HTTP:STC:DL:XLS-MOD-BYTES
HTTP:STC:DL:OTF-CFF-RCE
HTTP:STC:DL:XLS-SXLI-MC
HTTP:STC:DL:JRE-ZIP-READCEN
HTTP:STC:DL:MSDOTNET-FUNC-PTR
HTTP:STC:DL:WEBEX-ATAS
HTTP:STC:DL:XLS-SHRFMLA
HTTP:STC:DL:WORD-LISTOVERRIDE
HTTP:STC:DL:XLS-IMDATA
HTTP:STC:DL:QT-COLOR-TABLE
HTTP:STC:DL:CLAMAV-INT
HTTP:STC:DL:MPP-MEM-VAL
HTTP:STC:DL:PPT-OEP-ATOM-INV
HTTP:STC:DL:JVM-READMABCURVE1
HTTP:STC:DL:CLAMAV-UPX-BO
HTTP:STC:DL:WJ-CVE-2015-1696-CE
HTTP:STC:DL:MS-WIN-DOTNET-RCE
HTTP:STC:DL:CRYSTAL-RPT-OLE
HTTP:STC:DL:MAL-AIFF
HTTP:STC:DL:OUTLOOK-CE
HTTP:STC:DL:XLS-FORMULA-BIFF
HTTP:STC:DL:QT-PICT-FILE-MC
HTTP:STC:DL:CVE-2016-0054-RCE
HTTP:STC:DL:MS-WORDPAD-DOS1
HTTP:STC:DL:MS-VISUAL-BASIC-BOF
HTTP:STC:DL:CVE-2015-2360-PRIV
HTTP:STC:DL:DOT-NET-WEB-PROXY
HTTP:STC:DL:EXCEL-FEAT11
HTTP:STC:DL:PPT-TEXTBYTESATM-BO
HTTP:STC:DL:PAC-DESIGNER-BO
HTTP:STC:DL:APPLE-QT-IMAGE-MC
HTTP:STC:DL:OFFICE-MAL-PUB
HTTP:STC:DL:CLAMAV-UPX-FILE-MC
HTTP:STC:DL:WIN-GDI-METAFILE
HTTP:STC:DL:CVE-2015-1726-CE
HTTP:STC:DL:CVE-2015-1743-RCE
HTTP:STC:DL:CVE-2015-1728-CE
HTTP:STC:DL:CVE-2015-1719-PRIV
HTTP:STC:DL:CVE-2015-1725-PRIV
HTTP:STC:DL:WORD-DOC-BOF
HTTP:STC:DL:CVE-2015-6104-RCE
HTTP:STC:DL:ORACLE-JPEG-QCD-OF2
HTTP:STC:DL:CVE-2015-1759-RCE
HTTP:STC:DL:CVE-2016-0052-RCE
HTTP:STC:DL:ULTRAISO-CUE1
HTTP:STC:DL:MAL-MOV1
HTTP:STC:DL:MS-OFFICE-BAD-INDE1
HTTP:STC:DL:PPT-SLIDEATOM1
HTTP:STC:DL:XLS-SERIES1
HTTP:STC:DL:MAL-ASX-OF
HTTP:STC:DL:SANDWORM-RCE
HTTP:STC:DL:QUICKTIME-PAINTPOLY
HTTP:STC:DL:MPLAYER-TWINVQ-BO
HTTP:STC:DL:CVE-2016-0053-RCE
HTTP:STC:DL:CVE-2015-2470-BO
HTTP:STC:DL:MOZILLA-WAV-BOF
HTTP:STC:DL:XLS-RTWINDOW
HTTP:STC:DL:MS-VB-VB6STKIT1
HTTP:STC:DL:WNDPROC-INFO-DISC1
HTTP:STC:DL:CVE-2015-2520-RCE
HTTP:STC:DL:XLS-WORKSPACE-IDX
HTTP:STC:DL:MAL-MEDIA-RCE
HTTP:STC:DL:XLS-NAMED-GRAPH
HTTP:STC:DL:CVE-2015-2521-RCE
HTTP:STC:DL:WINASM-STUDIO-BOF1
HTTP:STC:DL:SWF-ACTIONPUSH1
HTTP:STC:DL:AVI-MMAKER1
HTTP:STC:DL:XLS-SHEET-NAME
HTTP:STC:DL:OPENOFFICE-CSV-DOS1
HTTP:STC:DL:PPT-PRINTER-REC-OF
HTTP:STC:DL:MSHTML-HELP-1
HTTP:STC:DL:GZIP-LHZ
HTTP:STC:DL:CVE-2015-1673-PE
HTTP:STC:DL:CVE-2015-1695-RCE
HTTP:STC:DL:TRUETYPE-PARSE
HTTP:STC:DL:CVE-2014-6333-MC
HTTP:STC:DL:WORD-PPAX
HTTP:STC:DL:MS-OFFICE-2007-MC
HTTP:STC:DL:OTF-NULL-PTR
HTTP:STC:DL:LIBPNG-TRAN-CHLT-BO
HTTP:STC:DL:IRFANVIEW-MC
HTTP:STC:DL:XORG-PCF-BO
HTTP:STC:DL:XLS-VBOBJ-RCE
HTTP:STC:DL:ORBIT-DOWNLOADER-OF
HTTP:STC:DL:XLS-BIFF-REC-RCE
HTTP:STC:DL:XLS-SST-REC-MC
HTTP:STC:DL:QT-CRGN-ATOM
HTTP:STC:DL:OLE-STRUCTURE-RCE
HTTP:STC:DL:WORKS-WPS-OF
HTTP:STC:DL:MS-WORKS-BO
HTTP:STC:DL:QEMU-FLOPPY-DISK-OF
HTTP:STC:DL:PPT-PP7-MC
HTTP:STC:DL:PPT-PP7-MC1
HTTP:STC:DL:XLS-SXSTREAMID1
HTTP:STC:DL:XLS-MAL-RTD-REC
HTTP:STC:DL:XLS-SXVIEW-REC
HTTP:STC:DL:GIMP-XWD-HEAP-BO
HTTP:STC:DL:MS-VISIO-OBJ-MC
HTTP:STC:DL:XLS-RTWINDOW1
HTTP:STC:DL:BITDEFEND-SCRIPT
HTTP:STC:DL:EXCEL-SERIES
HTTP:STC:DL:MSWMM-OF
HTTP:STC:DL:XLS-COLUMN-RECORD
HTTP:STC:DL:MS-HELP-CNT-BO
HTTP:STC:DL:WJ-2015-1697-CE
HTTP:STC:DL:WORD-LINK-OBJ
HTTP:STC:DL:XLS-MDXTUPLE-BIFF
HTTP:STC:DL:CGM-IMG-BOF
HTTP:STC:DL:XLS-SERIES8
HTTP:STC:DL:WORD-CONV-INT-OF
HTTP:STC:DL:CVE-2015-6107-CE
HTTP:STC:DL:MS-PUBLISHER-MC
HTTP:STC:DL:CVE-2013-3893-DROP
HTTP:STC:DL:ESIGNAL-MUL-FILE-OF
HTTP:STC:DL:XLS-FNGROUPNAME
HTTP:STC:DL:WORD-DPENDGROUP
HTTP:STC:DL:IDEAL-SERVER-OF
HTTP:STC:DL:MAL-WMV-MEDIA
HTTP:STC:DL:MS-OFFICE-RCE
HTTP:STC:DL:WORD-SPRM-MEM
HTTP:STC:DL:ONENOTE-INFO-DISC2
HTTP:STC:DL:PPT-LEGACY-FMT-OF
HTTP:STC:DL:CVE-2015-1651-RCE
HTTP:STC:DL:VISIO-TYPE-CONF
HTTP:STC:DL:MSPUBLISHER-OBJ
HTTP:STC:DL:CLAMAV-CHM-DOS
HTTP:STC:DL:CVE-2015-1649-RCE
HTTP:STC:DL:WORD-MAL-DOC
HTTP:STC:DL:CLAMAV-JPEG-DOS
HTTP:STC:DL:XLS-NULL-PTR
HTTP:STC:DL:GSTREAMER-QT-OF
HTTP:STC:DL:CVE-2015-1671-RCE
HTTP:STC:DL:EPS-DSC-BOF
HTTP:STC:DL:CVE-2015-6100-RCE
HTTP:STC:DL:MFC-DOC-TITLE
HTTP:STC:DL:CVE-2015-6094-RCE
HTTP:STC:DL:MAL-MIC-BICLRUSED
HTTP:STC:DL:ACDSEE-XPM-VALUES
HTTP:STC:DL:TM-AV-PM-CI
HTTP:STC:DL:JAVA-SB-RES
HTTP:STC:DL:CVE-2015-6102-RCE
HTTP:STC:DL:CVE-2015-6123-RCE
HTTP:STC:DL:OO-RTF
HTTP:STC:DL:XLS-FEATHEADER
HTTP:STC:DL:WORD-SPRMTSETBRC
HTTP:STC:DL:PPTVIEWER-DRAWSHAPE
HTTP:STC:DL:MS-PPT-2007-MC
HTTP:STC:DL:XLS-CHART-OBJ
HTTP:STC:DL:MS-NET-CLILOADER-MC
HTTP:STC:DL:SOPHOS-MAL-VISIO
HTTP:STC:DL:OTF-INF-LOOP
HTTP:STC:DL:COOLPLAYER-PLAYLIST
HTTP:STC:DL:XLS-AXISPARENT
HTTP:STC:DL:WORD-RTF-CONTROL
HTTP:STC:DL:4XM-VULNS
HTTP:STC:DL:CVE-2016-3201-RCE
HTTP:STC:DL:WORD-GLOBAL-INDEX
HTTP:STC:DL:ARJ-BO
HTTP:STC:DL:CVE-2015-1739-CE
HTTP:STC:DL:LIBXML2-ENTRY-NAME
HTTP:STC:DL:MS-CVE-2015-2558-CE
HTTP:STC:DL:CVE-2015-2555-CE
HTTP:STC:DL:XLS-WOPT
HTTP:STC:DL:AV-CAB-HEADER
HTTP:STC:DL:QT-PV-GIF
HTTP:STC:DL:CVE-2015-6113-RCE
HTTP:STC:DL:CVE-2016-0126-RCE
HTTP:STC:DL:CVE-2015-6091-RCE
HTTP:STC:DL:CVE-2015-6092-RCE
HTTP:STC:DL:WMP-SKIN-PARSE
HTTP:STC:DL:CVE-2015-6101-RCE
HTTP:STC:DL:CVE-2015-2478-PE
HTTP:STC:DL:CVE-2016-3234-CE
HTTP:STC:DL:CVE-2015-6096-CE
HTTP:STC:DL:CVE-2015-6093-RCE
HTTP:STC:DL:CVE-2016-0025-UAF
HTTP:STC:DL:CVE-2016-3220-RCE
HTTP:STC:DL:CVE-2016-3221-PRIV
HTTP:STC:DL:CVE-2016-3218-PRIV
HTTP:STC:DL:MS-WMF-DOS
HTTP:STC:DL:CVE-2015-6038-RCE
HTTP:STC:DL:CVE-2016-3219-RCE
HTTP:STC:DL:CVE-2015-6098-BO
HTTP:STC:DL:CVE-2016-0183-ID
HTTP:STC:DL:CVE-2016-0140-ID
HTTP:STC:DL:WORD-STYLESHEET-MEM
HTTP:STC:DL:XLS-DBORPARAMQRY
HTTP:STC:DL:IRFANVIEW-TIF-DC-BO
HTTP:STC:DL:MAL-VISIO
HTTP:STC:DL:MPLAYER-DEMUXER
HTTP:STC:DL:WINVERIFY-TRUST
HTTP:STC:DL:WPD-WP3-TABLE-BO
HTTP:STC:DL:PUB-TEXTBOX
HTTP:STC:DL:OO-XPMREAD-OF
HTTP:STC:DL:MAL-WIN-BRIEFCASE-2
HTTP:STC:DL:CISCO-WEBEX-ATDL
HTTP:STC:DL:DOC-FIB
HTTP:STC:DL:XLS-HFPICT
HTTP:STC:DL:QT-PV-OF
HTTP:STC:DL:PUB-OPY
HTTP:STC:DL:APPLE-PICT
HTTP:STC:DL:APPLE-ITUNES-BOF
HTTP:STC:DL:XLS-PIVOT
HTTP:STC:DL:CVE-2016-3231-PRIV
HTTP:STC:DL:XLS-CF-BIFF
HTTP:STC:DL:MS-OBJ-PACKAGER-RCE
HTTP:STC:DL:XLS-PUB-REC
HTTP:STC:DL:LIBFLAC-PIC-DESC
HTTP:STC:DL:CVE-2016-0168-ID
HTTP:STC:DL:MS-CVE-2015-0097-CE
HTTP:STC:DL:EICAR
HTTP:STC:DL:WORDPAD-PRL
HTTP:STC:DL:QT-STSD-ATOMS
HTTP:STC:DL:VCF-SHELLEXECUTE
HTTP:STC:DL:QT-PANORAMA-ATOM
HTTP:STC:DL:MAL-PLF
HTTP:STC:DL:MS-CVE-2015-0096-CE
HTTP:STC:DL:XLS-SXVIEW
HTTP:STC:DL:CVE-2015-2455-CE
HTTP:STC:DL:KINGSOFT-FONT-BO
HTTP:STC:DL:COM-CLSID-DLL
HTTP:STC:DL:COLORMGMT-PATHNAME
HTTP:STC:DL:XLS-SXSTREAMID
HTTP:STC:DL:VISIO-MAL-DXF
HTTP:STC:DL:VISIO-VSD-MEM
HTTP:STC:DL:CVE-2016-0080-CE
HTTP:STC:DL:LIBFLAC-VORBIS-CMT
HTTP:STC:DL:WEBEX-RECORD-ATAS
HTTP:STC:DL:CVE-2015-2510-RCE
HTTP:STC:DL:MS-EMF-PARSE
HTTP:STC:DL:OFFICE-BMP-HEADER
HTTP:STC:DL:XLS-MBOF
HTTP:STC:DL:XLS-REPT
HTTP:STC:DL:QUO-ESIGNAL-BOF
HTTP:STC:DL:WORD-SPRMTDIAGLINE
HTTP:STC:DL:MAL-MOVIEMAKER
HTTP:STC:DL:LOTUS-LZH-BOF
HTTP:STC:DL:GOGLE-STGEFRIGHT-CE
HTTP:STC:DL:OFFICE-CGM
HTTP:STC:DL:XLS-INT-OR
HTTP:STC:DL:XLS-INDEX
HTTP:STC:DL:VISIO-INV-VERSION
HTTP:STC:DL:CVE-2015-2461-CE
HTTP:STC:DL:MS-ACCESS-MEM-CORR
HTTP:STC:DL:MAL-MDB
HTTP:STC:DL:VLC-MATROSKA
HTTP:STC:DL:VLC-MEDIA-PLY-BO
HTTP:STC:DL:XLS-SHEET-OBJ
HTTP:STC:DL:QT-JVTCOMPENCODE
HTTP:STC:DL:XLS-XML-ZIP
HTTP:STC:DL:PDF-U3D-CLOD
HTTP:STC:DL:XLS-MDSXET-REC
HTTP:STC:DL:XLS-SLK-PICTURE-RCE
HTTP:STC:DL:PAGEMAKER-OF
HTTP:STC:DL:MS-GDI-INT-OVF
HTTP:STC:DL:SWF-ACTIONCONSTPOOL
HTTP:STC:DL:SWF-ACTIONPUSH
HTTP:STC:DL:XLS-SXDB
HTTP:STC:DL:WMP-SKIN-DECOMP
HTTP:STC:DL:VML-GRADIENT
HTTP:STC:DL:XLS-FRTWRAPPER
HTTP:STC:DL:WIN-MAL-COMP-FILE
HTTP:STC:DL:WORD-RTF-MEM
HTTP:STC:DL:XLS-DATA-RECORD
HTTP:STC:DL:WORDPAD-FONT-CONV
HTTP:STC:DL:XLS-HEAP-OF
HTTP:STC:DL:XLS-FILE-HNDL
HTTP:STC:DL:CVE-2015-2456-CE
HTTP:STC:DL:CVE-2015-2467-CE
HTTP:STC:DL:MIDICONTROLEVENT
HTTP:STC:DL:MAL-WOFF
HTTP:STC:DL:VISIO-VSD-ICON
HTTP:STC:DL:QT-COLOR-ATOM
HTTP:STC:DL:LIBFLAC-PIC-TYPE
HTTP:STC:DL:XLS-WORKSPACE-DES
HTTP:STC:DL:CLAMAV-MEW-PACKED
HTTP:STC:DL:ACCESS-MEM-CORR
HTTP:STC:DL:MAL-OGG-FILE
HTTP:STC:DL:WORD-SPRMDEFTABLE
HTTP:STC:DL:PDF-PRINTSEPS
HTTP:STC:DL:QUICKTIME-PNSIZE
HTTP:STC:DL:APPLE-DMG-VOLNAME
HTTP:STC:DL:APPLE-QT-JPEG-2000

HTTP:STC:HSC

HTTP:STC:HSC:MS-HSC-URL-VLN
HTTP:STC:HSC:HCP-QUOTE-SCRIPT

HTTP:STC:IE

HTTP:STC:IE:CVE-2014-6330-MC
HTTP:STC:IE:HTML-HELP-ZONE-BP
HTTP:STC:IE:CVE-2015-2548-RCE
HTTP:STC:IE:INFINITE-ARRAY
HTTP:STC:IE:CVE-2014-6341-UAF
HTTP:STC:IE:CVE-2015-6047-CE
HTTP:STC:IE:CVE-2016-0112-UAF
HTTP:STC:IE:IE-TGVAL-DOS
HTTP:STC:IE:RCDSET-UAF
HTTP:STC:IE:CREATETEXTRANGE-2
HTTP:STC:IE:CVE-2015-1711-UAF
HTTP:STC:IE:9-10-MC
HTTP:STC:IE:CVE-2015-2498-CE
HTTP:STC:IE:9-10-MEM-CORRUPTION
HTTP:STC:IE:VTABLE-RCE
HTTP:STC:IE:LOC-SPOOF
HTTP:STC:IE:CVE-2016-0193-CE
HTTP:STC:IE:TITLE-ELM-CHG
HTTP:STC:IE:CVE-2014-6350-CE
HTTP:STC:IE:CVE-2014-0305-MC
HTTP:STC:IE:CVE-2015-2515-UAF
HTTP:STC:IE:CVE-2013-5056-UAF
HTTP:STC:IE:MDAO-RCE1
HTTP:STC:IE:CVE-2016-0186-CE
HTTP:STC:IE:CVE-2016-0169-CE
HTTP:STC:IE:WSZ-EXEC
HTTP:STC:IE:JS-OOB-WINDOW1
HTTP:STC:IE:MS-TIME-DLL
HTTP:STC:IE:MAL-VB-JSCRIPT
HTTP:STC:IE:MS-IE-MEM-RCE1
HTTP:STC:IE:CVE-2014-4126-MC1
HTTP:STC:IE:CVE-2015-6141-RCE
HTTP:STC:IE:CVE-2015-2490-CE
HTTP:STC:IE:ONUNLOAD-MEM
HTTP:STC:IE:CVE-2016-0194-ID
HTTP:STC:IE:CVE-2014-4140-CE1
HTTP:STC:IE:CVE-2015-2483-ID
HTTP:STC:IE:CVE-2014-4134-MC1
HTTP:STC:IE:CVE-2015-6053-UAF
HTTP:STC:IE:CVE-2016-0185-CE
HTTP:STC:IE:CODE-EXECUTION
HTTP:STC:IE:CVE-2015-6148-UAF
HTTP:STC:IE:CVE-2016-0104-RCE
HTTP:STC:IE:CVE-2015-6146-RCE
HTTP:STC:IE:CVE-2015-6136-UAF
HTTP:STC:IE:BGSOUND-TAG
HTTP:STC:IE:CVE-2015-6152-RCE
HTTP:STC:IE:CVE-2016-0108-RCE
HTTP:STC:IE:CVE-2015-0655-RCE
HTTP:STC:IE:CVE-2015-6151-UAF
HTTP:STC:IE:IE-LOCAL-FORMAT
HTTP:STC:IE:CACHE-EXTERNAL
HTTP:STC:IE:CVE-2016-0110-RCE
HTTP:STC:IE:CVE-2015-6156-RCE
HTTP:STC:IE:CVE-2016-0103-RCE
HTTP:STC:IE:CVE-2016-0107-CE
HTTP:STC:IE:CVE-2015-2451-CE
HTTP:STC:IE:GOPHER-IMGTAG
HTTP:STC:IE:OBJCT-PROCESSING-CE
HTTP:STC:IE:MEM-CORR-UAF
HTTP:STC:IE:FRAME-FLOOD
HTTP:STC:IE:REDIM-PRESERVE-DOS3
HTTP:STC:IE:HTA-CONTENT-TYPE
HTTP:STC:IE:CVE-2014-1762-MC1
HTTP:STC:IE:IFRAME-SMB
HTTP:STC:IE:CVE-2015-2487-CE
HTTP:STC:IE:CVE-2013-3910-UAF
HTTP:STC:IE:CVE-2015-2493-UAF
HTTP:STC:IE:IE-FTP-CMD
HTTP:STC:IE:IFRAME-FILE
HTTP:STC:IE:CVE-2013-3911-MC
HTTP:STC:IE:LOCATION-X-DOMAIN
HTTP:STC:IE:CVE-2015-0048-RCE
HTTP:STC:IE:ADDRBAR-SPOOF-2
HTTP:STC:IE:CVE-2013-3914-MC
HTTP:STC:IE:CMARKUP-UAF
HTTP:STC:IE:MHTML-REDIR1
HTTP:STC:IE:CVE-2013-3153-MC
HTTP:STC:IE:MAL-JPEG1
HTTP:STC:IE:SAME-ORI-SEC-BYPASS
HTTP:STC:IE:CVE-2015-2443-RCE
HTTP:STC:IE:INSERT-ADJACENT-RCE
HTTP:STC:IE:POINTER-AFTERFREE
HTTP:STC:IE:CVE-2015-0100-UAF
HTTP:STC:IE:HTML-TAG-MC
HTTP:STC:IE:WMP-BMP-OF-1
HTTP:STC:IE:CVE-2013-3871-MC
HTTP:STC:IE:MMCN-EXEC
HTTP:STC:IE:IE-IMG-INF-DOS
HTTP:STC:IE:CVE-2016-0072-RCE
HTTP:STC:IE:CVE-2015-2486-RCE
HTTP:STC:IE:INVALID-LAYOUT
HTTP:STC:IE:CVE-2015-2441-RCE
HTTP:STC:IE:CVE-2016-0071-CE
HTTP:STC:IE:HTML-RELOAD-CORRUP1
HTTP:STC:IE:CVE-2015-6157-RCE
HTTP:STC:IE:CVE-2015-6159-RCE
HTTP:STC:IE:CVE-2016-0063-CE
HTTP:STC:IE:SETSLICE-OF
HTTP:STC:IE:HRALIGN-OF
HTTP:STC:IE:USE-AFTER-FREE
HTTP:STC:IE:REDIM-PRESERVE-DOS4
HTTP:STC:IE:SPOF-STATUS-BAR-URL
HTTP:STC:IE:DEL-TABLE
HTTP:STC:IE:ONUNLOAD
HTTP:STC:IE:6-10-MEM-CORRUPTION
HTTP:STC:IE:VML-AFTERFREE
HTTP:STC:IE:PRINT-PREVIEW-CE1
HTTP:STC:IE:EVENT-HANDLER-RCE
HTTP:STC:IE:DEV-TOOLBAR-RCE
HTTP:STC:IE:TOSTATICHTML
HTTP:STC:IE:OE-MSHTML-OF
HTTP:STC:IE:MAL-JPEG
HTTP:STC:IE:IEXDOM-INFO
HTTP:STC:IE:CVE-2014-6376-RCE
HTTP:STC:IE:TOSTATIC-DISC
HTTP:STC:IE:CROSS-FRAME-SCRIPT
HTTP:STC:IE:CVE-2016-0005-PB
HTTP:STC:IE:INSELM-UAF
HTTP:STC:IE:CVE-2015-0099-RCE
HTTP:STC:IE:WMP-SKIN-EXEC
HTTP:STC:IE:UTF8-DECODE-OF1
HTTP:STC:IE:CACHE-CREATERANGE
HTTP:STC:IE:URI-REDIRECTION
HTTP:STC:IE:CVE-2016-0136-RCE
HTTP:STC:IE:CVE-2013-3208-UAF
HTTP:STC:IE:CVE-2014-1805-MC
HTTP:STC:IE:HTML-LAYOUT
HTTP:STC:IE:CVE-2016-0166-UAF
HTTP:STC:IE:MHTML-HREF-OF1
HTTP:STC:IE:CVE-2014-6375-RCE
HTTP:STC:IE:IE11-HEAPSPRAY-W81
HTTP:STC:IE:ANIMATION-RCE
HTTP:STC:IE:SYSMON-DOS
HTTP:STC:IE:TABLE-LAYOUT
HTTP:STC:IE:9-MAL-HTML-DOS
HTTP:STC:IE:TIF-DND1
HTTP:STC:IE:CACHED-OBJ-RCE
HTTP:STC:IE:FILE-EXT-SPOOF
HTTP:STC:IE:7-LOC-DATA-URI-DOS
HTTP:STC:IE:CVE-2016-0164-UAF
HTTP:STC:IE:CVE-2013-5052-MC
HTTP:STC:IE:CVE-2016-0154-CE
HTTP:STC:IE:CVE-2016-0159-RCE
HTTP:STC:IE:CVE-2016-0034-RCE
HTTP:STC:IE:OBJECT-TAG-XML1
HTTP:STC:IE:CVE-2015-6048-UAF
HTTP:STC:IE:INCOMPLETE-EM
HTTP:STC:IE:HTA-CONTENT-TYPE1
HTTP:STC:IE:CVE-2016-0156-MC
HTTP:STC:IE:10-UAF1
HTTP:STC:IE:HTML-HELP-ZONE-BP1
HTTP:STC:IE:TOSTATIC-XSS
HTTP:STC:IE:CVE-2014-0267-MC1
HTTP:STC:IE:CVE-2014-4086-UAF1
HTTP:STC:IE:CVE-2013-3207-UAF
HTTP:STC:IE:CVE-2014-0281-MC
HTTP:STC:IE:CVE-2014-0267-MC
HTTP:STC:IE:EVENT-LISTENER-RCE
HTTP:STC:IE:LETTER-STYLE-UAF
HTTP:STC:IE:CLONENODE-RCE
HTTP:STC:IE:CFLATMARKUPPOINTER
HTTP:STC:IE:CMSHTMLED-UAF
HTTP:STC:IE:VML-RCE
HTTP:STC:IE:CVE-2013-3917-UAF
HTTP:STC:IE:CVE-2014-0285-MC
HTTP:STC:IE:DND-IMG
HTTP:STC:IE:EXECCOMMAND-RCE
HTTP:STC:IE:CVE-2014-4063-UAF
HTTP:STC:IE:RES-URI-INFODISC
HTTP:STC:IE:CELEMENT-RCE
HTTP:STC:IE:CVE-2014-0284-MC
HTTP:STC:IE:XMLDOM-INFODISC
HTTP:STC:IE:CVE-2015-0053-RCE
HTTP:STC:IE:CVE-2014-4057-MC
HTTP:STC:IE:MOUSE-MOVE-MEM
HTTP:STC:IE:CVE-2014-2823-UAF
HTTP:STC:IE:CVE-2015-2450-UAF
HTTP:STC:IE:XML-PARSER-RCE
HTTP:STC:IE:INSERTROW-RCE
HTTP:STC:IE:USERDATA
HTTP:STC:IE:IE-2016-0067-RCE
HTTP:STC:IE:IE-HCP-DELETE
HTTP:STC:IE:MHTML-REDIR-JS
HTTP:STC:IE:IE-2016-0062-RCE
HTTP:STC:IE:BOUNDELEMENTS
HTTP:STC:IE:IEUNMEM
HTTP:STC:IE:GETMARKUPPTR-UAF
HTTP:STC:IE:CVE-2014-6329-RCE
HTTP:STC:IE:SCROLL-EVENT-RCE
HTTP:STC:IE:OPTION-ELEMENT-RCE
HTTP:STC:IE:MHTML-INFO-DISC
HTTP:STC:IE:HTML-LAYOUT-CE
HTTP:STC:IE:CVE-2014-4095-UAF
HTTP:STC:IE:MARKUP-POINTER-RCE
HTTP:STC:IE:XSLT-MC
HTTP:STC:IE:CVE-2014-2824-BO
HTTP:STC:IE:TIME-RCE
HTTP:STC:IE:LAYOUT-UAF
HTTP:STC:IE:AUTH-REFLECTION
HTTP:STC:IE:SAMEID-RCE
HTTP:STC:IE:CSS-OF
HTTP:STC:IE:COL-SPAN
HTTP:STC:IE:CVE-2015-0043-RCE
HTTP:STC:IE:XML-HANDLE-EXEC1
HTTP:STC:IE:CVE-2014-6332-URLEN
HTTP:STC:IE:NESTED-OBJECT-TAG
HTTP:STC:IE:CVE-2014-6332-ID
HTTP:STC:IE:SAMEID-RCE1
HTTP:STC:IE:DHTML-CCR-INV-OBJ
HTTP:STC:IE:FOLDER-COM-EXEC
HTTP:STC:IE:PRINT-PREVIEW-CE
HTTP:STC:IE:CACHE-SMDIALOG
HTTP:STC:IE:CVE-2014-6369-UAF
HTTP:STC:IE:IEFRAME
HTTP:STC:IE:MHTML-REDIR-INFO
HTTP:STC:IE:CVE-2014-6332-HEX
HTTP:STC:IE:CVE-2015-1745-UAF
HTTP:STC:IE:CVE-2016-0068-CE
HTTP:STC:IE:CVE-2015-0030-UAF
HTTP:STC:IE:COLORBALANCE
HTTP:STC:IE:CTREENODE-UAF
HTTP:STC:IE:CVE-2015-2502-CE
HTTP:STC:IE:FULLMEM-RELOAD2
HTTP:STC:IE:HTML-OB-MEM
HTTP:STC:IE:IFRAME-HTA
HTTP:STC:IE:OBJ-PARSING-UAF
HTTP:STC:IE:CVE-2014-6369-RCE
HTTP:STC:IE:CVE-2014-6369-MC
HTTP:STC:IE:EMBED-MC
HTTP:STC:IE:CVE-2015-0040-RCE
HTTP:STC:IE:CVE-2015-0035-UAF
HTTP:STC:IE:CVE-2015-0039-RCE
HTTP:STC:IE:CVE-2015-2452-CE
HTTP:STC:IE:URL-FILE-BOF1
HTTP:STC:IE:CVE-2013-3874-UAF
HTTP:STC:IE:HFS-CVE-2014-6332
HTTP:STC:IE:CVE-2013-5047-UAF
HTTP:STC:IE:TABLES-MEMCORRUPT
HTTP:STC:IE:CVE-2015-0067-UAF
HTTP:STC:IE:CVE-2015-6059-ID
HTTP:STC:IE:CFORMELEMENT-RCE
HTTP:STC:IE:NULL-OBJ-RCE
HTTP:STC:IE:CRAFTED-WEB-CE
HTTP:STC:IE:7-10-MEM-CORRUPTION
HTTP:STC:IE:REMOVECHILD-UAF
HTTP:STC:IE:CCARET-UAF
HTTP:STC:IE:8-CTREENODE-UAF
HTTP:STC:IE:CVE-2013-5051-MC
HTTP:STC:IE:2014-6340-INFO-DIS
HTTP:STC:IE:CVE-2014-6347-MC
HTTP:STC:IE:CVE-2015-0054-RCE
HTTP:STC:IE:FLASH-UAF
HTTP:STC:IE:CVE-2015-0050-CE
HTTP:STC:IE:JS-MEM-CORR
HTTP:STC:IE:UNINIT-LAYOUT
HTTP:STC:IE:CVE-2014-6368-RCE
HTTP:STC:IE:GETELEMENT-CACHE
HTTP:STC:IE:PNG-IMAGE-BO
HTTP:STC:IE:URI-INFODISC
HTTP:STC:IE:CVE-2015-0055-CE
HTTP:STC:IE:CVE-2015-6046-RCE
HTTP:STC:IE:MULTI-ACTION
HTTP:STC:IE:ANTIXSS-INFO-DISC
HTTP:STC:IE:CVE-2015-1706-UAF
HTTP:STC:IE:CVE-2015-1710-CE
HTTP:STC:IE:CVE-2015-1708-UAF
HTTP:STC:IE:CVE-2015-0069-INFO
HTTP:STC:IE:9-MEMCORRUPT-DOS
HTTP:STC:IE:UAF-ARBITRARY-CE
HTTP:STC:IE:JIS-CHAR-INFO-DISC
HTTP:STC:IE:SETCAPTURE-UAF
HTTP:STC:IE:CDISPNODE-UAF
HTTP:STC:IE:CVE-2015-1717-CE
HTTP:STC:IE:LSGETTRAILINFO-UAF
HTTP:STC:IE:CVE-2015-0037-CE
HTTP:STC:IE:CVE-2015-1713-SB
HTTP:STC:IE:10-CVE-2014-0275-MC
HTTP:STC:IE:PASTEHTML-RCE
HTTP:STC:IE:COBJECT-ELE-UAF
HTTP:STC:IE:CVE-2013-3189-MC
HTTP:STC:IE:CVE-2014-1815-UAF1
HTTP:STC:IE:EOT-WEBFONTS-DL1
HTTP:STC:IE:MS-IE-MEM-RCE
HTTP:STC:IE:TABLECELL-INFO-DISC
HTTP:STC:IE:CVE-2015-0068-UAF
HTTP:STC:IE:CVE-2015-0038-RCE
HTTP:STC:IE:CVE-2015-0049-RCE
HTTP:STC:IE:CLEMENT-UAF
HTTP:STC:IE:CVE-2015-0021-CE
HTTP:STC:IE:HTML-OBJECTS-MC
HTTP:STC:IE:CMARKUPBEHAVIOR-UAF
HTTP:STC:IE:SLAYOUTRUN-UAF
HTTP:STC:IE:CVE-2015-0018-UAF
HTTP:STC:IE:SAVE-HISTORY-UAF
HTTP:STC:IE:OBJECT-TAG-XML
HTTP:STC:IE:CVE-2015-1730-RCE
HTTP:STC:IE:CVE-2013-3199-CE
HTTP:STC:IE:IE-8-DOM-UN-MEM
HTTP:STC:IE:INSECURE-OBJDEL-UAF
HTTP:STC:IE:OBJECT-CODE-EXEC
HTTP:STC:IE:CVE-2014-1802-MC
HTTP:STC:IE:CVE-2013-3916-RCE
HTTP:STC:IE:CVE-2014-2799-UAF
HTTP:STC:IE:CVE-2014-4127-MC
HTTP:STC:IE:CVE-2014-2795-MC
HTTP:STC:IE:CVE-2014-4132-MC
HTTP:STC:IE:CVE-2014-4133-CE
HTTP:STC:IE:CPASTECOMMAND
HTTP:STC:IE:INP-ELNT-OBJCT-RCE
HTTP:STC:IE:CVE-2014-6345-INFO
HTTP:STC:IE:CVE-2014-4138-CE
HTTP:STC:IE:CVE-2014-6343-UAF
HTTP:STC:IE:WINCVE-2014-4113-PE
HTTP:STC:IE:UAF-MC-RCE
HTTP:STC:IE:UNSAFE-MEM-OPER-UAF
HTTP:STC:IE:8-10-MEM-CORRUPTION
HTTP:STC:IE:CVE-2014-1785-UAF
HTTP:STC:IE:ONENOTE-URL
HTTP:STC:IE:MEM-CORRUPT-RCE
HTTP:STC:IE:CVE-2013-3845-UAF
HTTP:STC:IE:HTML-XSS
HTTP:STC:IE:CVE-2015-0051-SB
HTTP:STC:IE:CSS-MEMORY-CORRUPT
HTTP:STC:IE:SHOWHELP
HTTP:STC:IE:CVE-2013-3115-MC
HTTP:STC:IE:CVE-2015-0020-CE
HTTP:STC:IE:CVE-2013-3885-UAF
HTTP:STC:IE:HTML-OBJ-MEM-CRPTN
HTTP:STC:IE:COLLECTGARBAGE-B64
HTTP:STC:IE:9-UAF-CE
HTTP:STC:IE:DHTML-OBJ-MC
HTTP:STC:IE:CVE-2014-4128-MC
HTTP:STC:IE:9-UNINITVARS-UAF
HTTP:STC:IE:MSIE-OBJ-UAF
HTTP:STC:IE:10-UAF-MC
HTTP:STC:IE:UNISCRIBE-FNPS-MC
HTTP:STC:IE:JSON-ARRAY-INFO-DIS
HTTP:STC:IE:OBJHAN-ERR-UAF
HTTP:STC:IE:6-7-UAF-RCE
HTTP:STC:IE:HTML-SANITZ
HTTP:STC:IE:CVE-2014-8967-RCE
HTTP:STC:IE:TIF-DND
HTTP:STC:IE:OBJECTS-MC
HTTP:STC:IE:APPLYELEMENT-UAF
HTTP:STC:IE:STYLESHEET-OF
HTTP:STC:IE:CVE-2015-2391-RCE
HTTP:STC:IE:EVENT-HANDLER-INFO
HTTP:STC:IE:CVE-2015-2406-RCE
HTTP:STC:IE:CVE-2015-0029-UAF
HTTP:STC:IE:ANCHOR-URL-SPOOF
HTTP:STC:IE:CVE-2013-5048-MC
HTTP:STC:IE:TABLE-POSWIDTH-MC
HTTP:STC:IE:CVE-2014-1772-MC
HTTP:STC:IE:IMPROPER-REF
HTTP:STC:IE:CVE-2014-6346-INFO
HTTP:STC:IE:DOM-OBJ-MC
HTTP:STC:IE:9-UAF-MEM-CORR
HTTP:STC:IE:CVE-2014-0288-MC
HTTP:STC:IE:CVE-2014-0270-UAF
HTTP:STC:IE:CVE-2014-0290-MC
HTTP:STC:IE:CVE-2014-0272-MC
HTTP:STC:IE:CVE-2014-2797-MC
HTTP:STC:IE:CVE-2014-0286-MC
HTTP:STC:IE:CVE-2014-0314-MC
HTTP:STC:IE:CVE-2014-0302-MC
HTTP:STC:IE:CVE-2014-4126-MC
HTTP:STC:IE:8-10-MEM-CORR
HTTP:STC:IE:MSWEBDVD-NPA
HTTP:STC:IE:CVE-2014-0283-MC
HTTP:STC:IE:CVE-2014-0274-MC
HTTP:STC:IE:CVE-2014-0269-MC
HTTP:STC:IE:CVE-2015-2414-RCE
HTTP:STC:IE:CVE-2015-2390-UAF
HTTP:STC:IE:CVE-2014-0273-MC
HTTP:STC:IE:CVE-2014-0277-MC
HTTP:STC:IE:CVE-2014-1797-UAF
HTTP:STC:IE:URL-FILE-BOF
HTTP:STC:IE:CVE-2014-0312-RCE
HTTP:STC:IE:CVE-2015-2372-UAF
HTTP:STC:IE:CVE-2014-0322-UAF
HTTP:STC:IE:CVE-2014-0303-MC
HTTP:STC:IE:CVE-2014-0297-MC
HTTP:STC:IE:UNCLOSED-DIV-UAF
HTTP:STC:IE:CVE-2014-4123-CE
HTTP:STC:IE:CVE-2015-2397-UAF
HTTP:STC:IE:CVE-2014-0309-MC
HTTP:STC:IE:8-CVE-2014-0278-MC
HTTP:STC:IE:CVE-2014-0299-RCE
HTTP:STC:IE:CVE-2014-0324-MC
HTTP:STC:IE:CVE-2014-0311-UAF
HTTP:STC:IE:CVE-2014-0306-RCE
HTTP:STC:IE:CVE-2014-4137-MC
HTTP:STC:IE:CVE-2014-6348-UAF
HTTP:STC:IE:CSHADOW-RCE
HTTP:STC:IE:CVE-2013-5049-MC
HTTP:STC:IE:11-CVE-2014-0304-MC
HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY
HTTP:STC:IE:CVE-2012-6502-INFO
HTTP:STC:IE:CVE-2014-4129-MC
HTTP:STC:IE:JSCRIPT9-CE
HTTP:STC:IE:CVE-2014-4134-MC
HTTP:STC:IE:CVE-2014-0271-MC
HTTP:STC:IE:CVE-2016-0002-CE
HTTP:STC:IE:MALFORMED-URI-BO
HTTP:STC:IE:CVE-2013-3194-UAF
HTTP:STC:IE:CVE-2015-2384-RCE
HTTP:STC:IE:CVE-2015-1733-RCE
HTTP:STC:IE:CVE-2014-4141-MC
HTTP:STC:IE:CVE-2015-1738-UAF
HTTP:STC:IE:CVE-2014-4124-CE
HTTP:STC:IE:CVE-2015-2413
HTTP:STC:IE:CVE-2015-2404-RCE
HTTP:STC:IE:10-OBJHANDLING-UAF
HTTP:STC:IE:INFOBAR-DOWNLOAD
HTTP:STC:IE:10-INT-OVF
HTTP:STC:IE:CVE-2015-2412-SB
HTTP:STC:IE:CVE-2015-2402-SB
HTTP:STC:IE:IE-MEM-CORR
HTTP:STC:IE:CVE-2014-6344-UAF
HTTP:STC:IE:CVE-2016-0114-UAF
HTTP:STC:IE:XSS-FILTER-DISC
HTTP:STC:IE:CVE-2015-2403-UAF
HTTP:STC:IE:WMP-BMP-OF-3
HTTP:STC:IE:XFRAME-REST-BYPASS
HTTP:STC:IE:INST-ENG-INT-OF
HTTP:STC:IE:IFRAME-MEM-CORR
HTTP:STC:IE:TEXT-HELP-ZONE-BP
HTTP:STC:IE:MAL-DATASTREAM
HTTP:STC:IE:ADDRBOOK-OBJ-DOS
HTTP:STC:IE:CVE-2015-1729-UAF
HTTP:STC:IE:CVE-2015-2388-UAF
HTTP:STC:IE:6.0-FOR-LOOP-DOS
HTTP:STC:IE:CACHE-CLIPDATA
HTTP:STC:IE:10-OBJDEL-UAF
HTTP:STC:IE:10-OBJ-DEL-UAF
HTTP:STC:IE:9-MC-RCE
HTTP:STC:IE:CVE-2013-3188-MC
HTTP:STC:IE:9-10-OBJERR-UAF
HTTP:STC:IE:CVE-2013-3912-RCE
HTTP:STC:IE:CVE-2013-3209-UAF
HTTP:STC:IE:DOC-MARKUP-RCE
HTTP:STC:IE:DESIGNMODE-INFO
HTTP:STC:IE:CVE-2015-2408-UAF
HTTP:STC:IE:EOT-WEBFONTS-DL
HTTP:STC:IE:CVE-2013-3875-MC
HTTP:STC:IE:CVE-2016-0106-RCE
HTTP:STC:IE:CVE-2015-0026-UAF
HTTP:STC:IE:OBJECT-OF1
HTTP:STC:IE:XML-HANDLE-EXEC
HTTP:STC:IE:CVE-2015-2383-UAF
HTTP:STC:IE:OBJERR-UAF
HTTP:STC:IE:MHTML-REDIR
HTTP:STC:IE:CVE-2016-0111-CE
HTTP:STC:IE:8-OBJ-MC
HTTP:STC:IE:CVE-2014-6353-UAF
HTTP:STC:IE:DEL-OBJ-REF
HTTP:STC:IE:CVE-2015-1767-UAF
HTTP:STC:IE:CVE-2016-0109-RCE
HTTP:STC:IE:CVE-2014-1753-MC
HTTP:STC:IE:CVE-2014-6339-MC
HTTP:STC:IE:CVE-2014-6347-RCE
HTTP:STC:IE:2014-1751-MEM-CORR
HTTP:STC:IE:CVE-2014-6351-UAF
HTTP:STC:IE:CVE-2016-0105-RCE
HTTP:STC:IE:6-11-UAF
HTTP:STC:IE:DHTML-OBJ-CORRUPT
HTTP:STC:IE:CVE-2014-4089-UAF
HTTP:STC:IE:OBJECT-OF
HTTP:STC:IE:LOCAL-WEB-FOLDER
HTTP:STC:IE:CVE-2015-0044-RCE
HTTP:STC:IE:CVE-2014-1804-UAF
HTTP:STC:IE:CVE-2014-6355-IDISC
HTTP:STC:IE:CVE-2014-0313-BOF
HTTP:STC:IE:CVE-2014-6366-CE
HTTP:STC:IE:ERROR-HANDLER
HTTP:STC:IE:CVE-2014-4065-UAF
HTTP:STC:IE:CVE-2014-1755-MC
HTTP:STC:IE:7-CVE-2014-1752-RCE
HTTP:STC:IE:SCROL-INTO-VIEW-UAF
HTTP:STC:IE:CVE-2014-0310-MC
HTTP:STC:IE:CVE-2014-1815-UAF
HTTP:STC:IE:CVE-2015-6055-CE
HTTP:STC:IE:CVE-2015-6052-RCE
HTTP:STC:IE:CVE-2013-3873-MC
HTTP:STC:IE:6-10-USE-AFTER-FREE
HTTP:STC:IE:9-USE-AFTER-FREE
HTTP:STC:IE:CVE-2014-1762-MC
HTTP:STC:IE:CVE-2014-4092-UAF
HTTP:STC:IE:CVE-2014-1789-MC
HTTP:STC:IE:CVE-2014-1766-UAF
HTTP:STC:IE:CVE-2014-1800-UAF
HTTP:STC:IE:CVE-2014-1791-UAF
HTTP:STC:IE:CVE-2014-4082-MC
HTTP:STC:IE:CVE-2014-6374-RCE
HTTP:STC:IE:SMEORIGIN-BYPASS
HTTP:STC:IE:CVE-2014-4080-UAF
HTTP:STC:IE:CVE-2014-2787-MC
HTTP:STC:IE:10-CVE2014-2804-UAF
HTTP:STC:IE:CVE-2014-6327-MC
HTTP:STC:IE:ONBEFORECOPY-UAF
HTTP:STC:IE:CVE-2014-2801-MC
HTTP:STC:IE:UAF-MC
HTTP:STC:IE:ASLR-BYPASS-RCE
HTTP:STC:IE:CVE-2016-0064-RCE
HTTP:STC:IE:MSAPP-TASK
HTTP:STC:IE:CVE-2015-1634-RCE
HTTP:STC:IE:CVE-2015-1626-RCE
HTTP:STC:IE:CVE-2015-0081-RCE
HTTP:STC:IE:CVE-2015-1623-MC
HTTP:STC:IE:ONBEFORE-DEACTIVATE
HTTP:STC:IE:CVE-2014-0282-UAF
HTTP:STC:IE:CVE-2015-1660-RCE
HTTP:STC:IE:MEMCORRUPT2
HTTP:STC:IE:CVE-2015-0042-RCE
HTTP:STC:IE:CVE-2015-1668-RCE
HTTP:STC:IE:CVE-2015-1661-ID
HTTP:STC:IE:HTML-RELOAD-CORRUPT
HTTP:STC:IE:CQUOTES-OBJECT-CE
HTTP:STC:IE:CVE-2015-1659-RCE
HTTP:STC:IE:CVE-2015-1662-RCE
HTTP:STC:IE:CVE-2015-1652-RCE
HTTP:STC:IE:CVE-2015-0019-RCE
HTTP:STC:IE:USE-AFTR-FREE
HTTP:STC:IE:10-OBJECT-MC
HTTP:STC:IE:CTREEPOS-RCE
HTTP:STC:IE:CVE-2015-0032-RCE
HTTP:STC:IE:10-MEM-CORRUPTION
HTTP:STC:IE:9-UAF-RCE
HTTP:STC:IE:TYPE-CONFUSION-RCE
HTTP:STC:IE:ATTR-RM-RCE
HTTP:STC:IE:CVE-2015-2448-RCE
HTTP:STC:IE:9-MEM-CORR
HTTP:STC:IE:CVE-2015-1625-RCE
HTTP:STC:IE:CVE-2015-1712-RCE
HTTP:STC:IE:CVE-2015-1686-ID
HTTP:STC:IE:CVE-2015-1688-SB
HTTP:STC:IE:CSS-XSS
HTTP:STC:IE:CVE-2015-1714-UAF
HTTP:STC:IE:PAGE-UPDATE-RACE
HTTP:STC:IE:XML-MIME-CORRUPT
HTTP:STC:IE:RANGE-OBJ-HNDLNG-ID
HTTP:STC:IE:CVE-2015-1709-RCE
HTTP:STC:IE:CVE-2015-1685-RCE
HTTP:STC:IE:CVE-2015-1718-UAF
HTTP:STC:IE:CVE-2015-1658-RCE
HTTP:STC:IE:CVE-2015-1744-CE
HTTP:STC:IE:8-OBJECT-MC
HTTP:STC:IE:WRITE-WAT-WHERE-UAF
HTTP:STC:IE:CVE-2016-0200-UAF
HTTP:STC:IE:CVE-2015-0045-RCE
HTTP:STC:IE:CVE-2015-0022-UAF
HTTP:STC:IE:CVE-2015-1731-CE
HTTP:STC:IE:MS-IE-UAF
HTTP:STC:IE:VTABLE-CODE-EXEC
HTTP:STC:IE:8-CVE-2014-0279-MC
HTTP:STC:IE:VML-MEM-CORRUPTION
HTTP:STC:IE:XML-RCE
HTTP:STC:IE:OLE-AUTO
HTTP:STC:IE:MEM-LEAK
HTTP:STC:IE:TREE-POS-OBJECT-RCE
HTTP:STC:IE:COMPRESSED-URL
HTTP:STC:IE:CVE-2015-1627-PRIV
HTTP:STC:IE:IE-HEADER-XDOM-INFO
HTTP:STC:IE:SCRIPT-STCK-EXH
HTTP:STC:IE:ANIMATEMOTION
HTTP:STC:IE:DOCUMENT-RCE
HTTP:STC:IE:IE-ACTIVEX-DRCTANI1
HTTP:STC:IE:MDAC-CACHESIZE-OF
HTTP:STC:IE:CLIP-MEM
HTTP:STC:IE:UAF-RCE
HTTP:STC:IE:IESTYLE-OBJ
HTTP:STC:IE:FREED-OBJECT
HTTP:STC:IE:CVE-2014-6323-ID
HTTP:STC:IE:CVE-2015-6087-CE
HTTP:STC:IE:REDIRECT-MC
HTTP:STC:IE:VML-NUM-BOF
HTTP:STC:IE:SELECT-EMPTY
HTTP:STC:IE:CVE-2015-1705-UAF
HTTP:STC:IE:TABLE-SPAN-CORRUPT
HTTP:STC:IE:UAF-MEM-CORR
HTTP:STC:IE:CDO-IN-HEADER
HTTP:STC:IE:CSS-HEAP
HTTP:STC:IE:CVE-2016-0060-RCE
HTTP:STC:IE:OBJ-MGMT-MC
HTTP:STC:IE:MS-UAF-MC
HTTP:STC:IE:XML-MEM-COR
HTTP:STC:IE:URL-HIDING-ENC
HTTP:STC:IE:X-DOMAIN-INFO
HTTP:STC:IE:CROSS-DOMAIN-INFO
HTTP:STC:IE:CVE-2015-1732-UAF
HTTP:STC:IE:CVE-2015-6079-CE
HTTP:STC:IE:CVE-2015-1740-UAF
HTTP:STC:IE:OBJECT-PROCESING-CE
HTTP:STC:IE:CVE-2015-6078-UAF
HTTP:STC:IE:CVE-2015-1736-RCE
HTTP:STC:IE:CVE-2015-1741-RCE
HTTP:STC:IE:CVE-2015-6068-CE
HTTP:STC:IE:CVE-2015-6084-RCE
HTTP:STC:IE:HDRLOC-MSITS
HTTP:STC:IE:CVE-2015-6089-RCE
HTTP:STC:IE:CVE-2015-6076-RCE
HTTP:STC:IE:CVE-2015-6064-UAF
HTTP:STC:IE:CVE-2015-1735-UAF
HTTP:STC:IE:CVE-2015-1751-RCE
HTTP:STC:IE:CVE-2015-6081-RCE
HTTP:STC:IE:CVE-2015-1766-RCE
HTTP:STC:IE:CVE-2015-1687-RCE
HTTP:STC:IE:CVE-2015-6080-CE
HTTP:STC:IE:CVE-2015-6071-CE
HTTP:STC:IE:CVE-2015-6085-UAF
HTTP:STC:IE:CVE-2015-6077-UAF
HTTP:STC:IE:IFRAME-NAME-OF
HTTP:STC:IE:ZONE-SPOOF-2
HTTP:STC:IE:INV-CSSARR
HTTP:STC:IE:CVE-2014-0289-MC
HTTP:STC:IE:CVE-2015-6065-RCE
HTTP:STC:IE:CVE-2015-6082-RCE
HTTP:STC:IE:CVE-2015-6072-RCE
HTTP:STC:IE:IE-FTP-SCRIPTING
HTTP:STC:IE:CVE-2015-6073-UAF
HTTP:STC:IE:CVE-2015-6075-CE
HTTP:STC:IE:CVE-2008-2256-MC
HTTP:STC:IE:CVE-2015-1666-RCE
HTTP:STC:IE:IE-REFRESH-OF
HTTP:STC:IE:CVE-2015-2492-RCE
HTTP:STC:IE:CTABLE-RCE
HTTP:STC:IE:XML-DISCLOSE1
HTTP:STC:IE:CVE-2015-1624-RCE
HTTP:STC:IE:DESIGNMODE-INFO1
HTTP:STC:IE:XML-HMAC-BYPASS
HTTP:STC:IE:CSS-PSEUDO-UAF
HTTP:STC:IE:SSL-PROXY-DIS
HTTP:STC:IE:CVE-2015-2500-CE
HTTP:STC:IE:CVE-2015-2442-RCE
HTTP:STC:IE:UTF8-DECODE-OF
HTTP:STC:IE:COMWINDOWPROXY-UAF
HTTP:STC:IE:DOM-CACHE-CORRUPT
HTTP:STC:IE:CVE-2015-2482-CE
HTTP:STC:IE:CVE-2015-1657-ID
HTTP:STC:IE:CVE-2015-2501-CE
HTTP:STC:IE:XML-DISCLOSE
HTTP:STC:IE:IE-MHT-REDIRECT
HTTP:STC:IE:CVE-2014-1775-UAF
HTTP:STC:IE:MERGE-ATTRIB
HTTP:STC:IE:CVE-2014-0263-MC
HTTP:STC:IE:CVE-2008-4258-MC
HTTP:STC:IE:XML-ELEMENT-RCE
HTTP:STC:IE:CHAN-SCRIPT
HTTP:STC:IE:HELPCTR-CODE-EX
HTTP:STC:IE:ONMOVE-RCE
HTTP:STC:IE:CVE-2015-1753-RCE
HTTP:STC:IE:CVE-2015-6153-CE
HTTP:STC:IE:COMPINST-OF
HTTP:STC:IE:EVENT-INVOKE
HTTP:STC:IE:CVE-2014-4088-UAF
HTTP:STC:IE:ONROWSINSERTED-RCE
HTTP:STC:IE:CVE-2015-6142-CE
HTTP:STC:IE:CVE-2015-6149-CE
HTTP:STC:IE:CVE-2015-6154-CE
HTTP:STC:IE:CVE-2015-6150-CE
HTTP:STC:IE:CVE-2014-0276-MC
HTTP:STC:IE:LAYOUT-RCE
HTTP:STC:IE:CSS-RACE-CE
HTTP:STC:IE:EVENT-HANDLER-MC
HTTP:STC:IE:CSS-XDOM-DISC
HTTP:STC:IE:MSRAT-NAME-OF-SVR2
HTTP:STC:IE:DIALOG-MANIP
HTTP:STC:IE:CVE-2015-6158-CE
HTTP:STC:IE:FULLMEM-RELOAD
HTTP:STC:IE:UNINIT-DOM
HTTP:STC:IE:COL-TAG-CACHE
HTTP:STC:IE:CVE-2015-2425-CE
HTTP:STC:IE:JS-MC
HTTP:STC:IE:CVE-2015-6042-UAF
HTTP:STC:IE:CVE-2014-6342-MEMCP
HTTP:STC:IE:CVE-2015-6083-CE
HTTP:STC:IE:DIRECTX-SAMI-BO
HTTP:STC:IE:ONRESIZE-UAF
HTTP:STC:IE:CVE-2014-0287-MC
HTTP:STC:IE:CVE-2014-4084-UAF
HTTP:STC:IE:CVE-2015-6050-CE
HTTP:STC:IE:UNINIT-MEM-CORR
HTTP:STC:IE:CVE-2015-6147-CE
HTTP:STC:IE:CVE-2016-3211-RCE
HTTP:STC:IE:CVE-2016-0199-RCE
HTTP:STC:IE:CVE-2014-4081-UAF
HTTP:STC:IE:REDIM-PRESERVE-DOS
HTTP:STC:IE:CENTER-ELE-RCE
HTTP:STC:IE:CVE-2015-1742-RCE
HTTP:STC:IE:LAYOUT-GRID
HTTP:STC:IE:CVE-2015-2411-UAF
HTTP:STC:IE:CVE-2015-1622-RCE
HTTP:STC:IE:CVE-2015-1750-UAF
HTTP:STC:IE:CVE-2015-2422-UAF
HTTP:STC:IE:CVE-2016-0102-RCE
HTTP:STC:IE:MHTML-REDIRECT
HTTP:STC:IE:CVE-2014-0298-UAF
HTTP:STC:IE:CVE-2016-3205-CE
HTTP:STC:IE:CREATETEXTRANGE
HTTP:STC:IE:CVE-2016-3210-RCE
HTTP:STC:IE:CVE-2015-2389-UAF
HTTP:STC:IE:LOCAL-CNT-INJ
HTTP:STC:IE:CVE-2016-3215-CE
HTTP:STC:IE:STYLEOBJ-MEM
HTTP:STC:IE:STYLESHEET-MC
HTTP:STC:IE:TIME-ELEMENT
HTTP:STC:IE:HISTORY-GO-MC
HTTP:STC:IE:CVE-2015-6070-RCE
HTTP:STC:IE:MHTML-XDOM
HTTP:STC:IE:VML-FILL-BOF
HTTP:STC:IE:WIN-ADO-EXEC
HTTP:STC:IE:DHTML-HANDLER-RACE1
HTTP:STC:IE:DHTML-HANDLER-RACE
HTTP:STC:IE:LOCAL-ACCESS-DAT
HTTP:STC:IE:CVE-2015-0056-MC
HTTP:STC:IE:REDIM-PRESERVE-DOS1
HTTP:STC:IE:CVE-2016-0189-ACE
HTTP:STC:IE:TITLE-BAR-URI
HTTP:STC:IE:CSS-PROPERTY-METHOD
HTTP:STC:IE:IE-MSHTML-OF
HTTP:STC:IE:CVE-2015-6086-SB
HTTP:STC:IE:CVE-2016-0192-RCE
HTTP:STC:IE:CVE-2015-1755-UAF
HTTP:STC:IE:CVE-2015-0025-RCE
HTTP:STC:IE:CVE-2016-3213-RCE
HTTP:STC:IE:CVE-2016-0187-UAF
HTTP:STC:IE:OVERLAP-TAGS
HTTP:STC:IE:CVE-2016-3206-RCE
HTTP:STC:IE:CVE-2015-2491-RCE
HTTP:STC:IE:FULLMEM-RELOAD3
HTTP:STC:IE:CVE-2016-3212-RCE
HTTP:STC:IE:UNINIT-CORRUPT
HTTP:STC:IE:MSRAT-NAME-OF2
HTTP:STC:IE:REDIM-PRESERVE-DOS2
HTTP:STC:IE:CVE-2014-4140-CE
HTTP:STC:IE:CVE-2014-6337-UAF
HTTP:STC:IE:CVE-2014-4086-UAF
HTTP:STC:IE:CVE-2014-4094-UAF
HTTP:STC:IE:COPY-PASTE-INFODISC
HTTP:STC:IE:FRAME-INJ
HTTP:STC:IE:GOOGLEBAR-FILE
HTTP:STC:IE:MAL-GIF-DOS
HTTP:STC:IE:CVE-2016-3222-RCE
HTTP:STC:IE:CVE-2016-3198-CE
HTTP:STC:IE:JS-INFO-DISC
HTTP:STC:IE:CIR-REF
HTTP:STC:IE:MARQUEE-STYLE
HTTP:STC:IE:SELECT-ELEMENT-RCE
HTTP:STC:IE:CVE-2016-3207-RCE
HTTP:STC:IE:CVE-2013-3908-DISC
HTTP:STC:IE:MSRAT-NAME-OF-SVR
HTTP:STC:IE:DRAG-DROP-MOD
HTTP:STC:IE:CVE-2015-2485-CE
HTTP:STC:IE:CVE-2015-1748-RCE
HTTP:STC:IE:ONLOAD-EVT-RCE
HTTP:STC:IE:HTML-TIME
HTTP:STC:IE:HTML-OBJECTS
HTTP:STC:IE:TEXTRANGE-OBJ
HTTP:STC:IE:CVE-2014-1795-UAF
HTTP:STC:IE:HTML-OBJ-MC
HTTP:STC:IE:ACCESS-BYPASS-ID
HTTP:STC:IE:CVE-2014-1765-RCE
HTTP:STC:IE:SETEXP-REFCOUNT
HTTP:STC:IE:CVE-2016-3199-CE
HTTP:STC:IE:CVE-2015-1737-UAF
HTTP:STC:IE:GRAPHICS-EOP-CE
HTTP:STC:IE:CLONE-REF-CORRUPT
HTTP:STC:IE:CSS-IMPORT
HTTP:STC:IE:CVE-2014-2820-UAF
HTTP:STC:IE:CONT-LOC-ZON-BYPASS
HTTP:STC:IE:EXEC-CMD-FILE-SPOOF
HTTP:STC:IE:CHTML-UAF
HTTP:STC:IE:CVE-2014-6349-CE
HTTP:STC:IE:SELECT-ELEMENT
HTTP:STC:IE:CVE-2014-4143-MC
HTTP:STC:IE:SHELL-WEB-FOLDER
HTTP:STC:IE:EUC-JP-XSS
HTTP:STC:IE:CVE-2015-6134-RCE
HTTP:STC:IE:JS-VBS-DECODE-OF
HTTP:STC:IE:EOTF-LZCOMP-OF
HTTP:STC:IE:ZONE-SPOOF
HTTP:STC:IE:MSRAT-NAME-OF
HTTP:STC:IE:ZONE-BYPASS
HTTP:STC:IE:9-NULL-BYTE-DISC
HTTP:STC:IE:8-UAF-RCE
HTTP:STC:IE:CVE-2015-2421-ID
HTTP:STC:IE:CVE-2014-4087-UAF
HTTP:STC:IE:CVE-2014-6373-UAF
HTTP:STC:IE:CVE-2012-1877-CE
HTTP:STC:IE:DEREF-OBJ-ACCESS
HTTP:STC:IE:10-UAF
HTTP:STC:IE:MEM-CORR
HTTP:STC:IE:CSRSS-HE-MSG
HTTP:STC:IE:ONREADYSTATE
HTTP:STC:IE:UAF-MEM-COR
HTTP:STC:IE:JS-LOCATION-ASSIGN
HTTP:STC:IE:CVE-2014-0307-MC
HTTP:STC:IE:10-OBJECT-RCE
HTTP:STC:IE:OBJ-DEL-UAF
HTTP:STC:IE:OBJECT-MC
HTTP:STC:IE:CVE-2015-1691-UAF
HTTP:STC:IE:OBJECT-HANDLNG-RCE
HTTP:STC:IE:VML-VGX-BOF

HTTP:STC:IMG

HTTP:STC:IMG:NOT-BMP
HTTP:STC:IMG:BMP-OVERFLOW
HTTP:STC:IMG:NOT-PNG
HTTP:STC:IMG:PNG_IHDR_INVAL_LEN
HTTP:STC:IMG:PNG-NAME-ERROR
HTTP:STC:IMG:OVERLARGE-BMP
HTTP:STC:IMG:NOT-GIF
HTTP:STC:IMG:PNG-TRNS-ERROR
HTTP:STC:IMG:JPEG-BAD-LENGTH
HTTP:STC:IMG:MALFORMED-JPEG
HTTP:STC:IMG:PNG-IHDR-BAD-PAR
HTTP:STC:IMG:PNG-PLTE-ERROR
HTTP:STC:IMG:PNG_CHUNK_OVERFLOW
HTTP:STC:IMG:BMP-BAD-PARAMETER
HTTP:STC:IMG:JPEG-UNDERRUN
HTTP:STC:IMG:MALFORMED-BMP
HTTP:STC:IMG:GIF-BAD-PARAMETER
HTTP:STC:IMG:NOT-JPEG
HTTP:STC:IMG:WMF-MALFORMED
HTTP:STC:IMG:BMP-WIDTH-OF
HTTP:STC:IMG:OFFEND-GG
HTTP:STC:IMG:OFFEND-TG
HTTP:STC:IMG:PNG-IO
HTTP:STC:IMG:BMP-HEADER-UF
HTTP:STC:IMG:OFFICE-FLASHPIX
HTTP:STC:IMG:XP-MAL-TIFF
HTTP:STC:IMG:MAL-EMF
HTTP:STC:IMG:MAL-EMF-2
HTTP:STC:IMG:MAL-WMF-REC-OF
HTTP:STC:IMG:PICT-POLY-UF
HTTP:STC:IMG:OFFICE-MAL-TIFF3
HTTP:STC:IMG:PNG-TEXT
HTTP:STC:IMG:OFFICE-FLASHPIX2
HTTP:STC:IMG:KODAK-TIFF
HTTP:STC:IMG:JPEG-HEIGHT-OF
HTTP:STC:IMG:LIBPNG-ROWS
HTTP:STC:IMG:JDK-ICC
HTTP:STC:IMG:GOOGLE-SKETCH-BMP
HTTP:STC:IMG:PICT-UNCOMP-UF
HTTP:STC:IMG:PNG-WIDTH
HTTP:STC:IMG:ICO-SIZE-OF
HTTP:STC:IMG:ANI-FILE-DOS
HTTP:STC:IMG:OFFICE-FLASHPIX21
HTTP:STC:IMG:KODAK-TIFF1
HTTP:STC:IMG:MALFORMED-EMF-TAG1
HTTP:STC:IMG:LIBPNG-CHUNK-OV
HTTP:STC:IMG:JPEG-WIDTH-OF1
HTTP:STC:IMG:MS-GIFGDI-OF
HTTP:STC:IMG:WMF-METASPLOIT2
HTTP:STC:IMG:WMF-MAL-HEADER
HTTP:STC:IMG:EXE-IN-IMAGE
HTTP:STC:IMG:BMP-HDR-IO
HTTP:STC:IMG:JPEGDECODERAW-FUNC
HTTP:STC:IMG:PHP-AS-GIF
HTTP:STC:IMG:EMF-DOWNLOAD
HTTP:STC:IMG:TIFF-BOF
HTTP:STC:IMG:ANI-BLOCK-STR23
HTTP:STC:IMG:WMF-METASPLOIT-GZ
HTTP:STC:IMG:WMF-DOWNLOAD
HTTP:STC:IMG:JPEG-WIDTH-OF
HTTP:STC:IMG:JPEG-SCRIPT
HTTP:STC:IMG:WPG-HEAP-OVF
HTTP:STC:IMG:NO-JPG-GIF-PNG-BMP
HTTP:STC:IMG:MS-OFFICE-GIF
HTTP:STC:IMG:JPEG-MAL-MARKER
HTTP:STC:IMG:OFFICE-FLASHPIX1
HTTP:STC:IMG:MALFORMED-EMF-TAG
HTTP:STC:IMG:PNG-CHUNK-OF
HTTP:STC:IMG:WMP-BMP-OF
HTTP:STC:IMG:WMF-METASPLOIT
HTTP:STC:IMG:MS-BMP-OF
HTTP:STC:IMG:EXE-FOR-IMG-TYPE
HTTP:STC:IMG:SUN-JAVA-PNG-BOF
HTTP:STC:IMG:OFFICE-MAL-TIF
HTTP:STC:IMG:ANI-BLOCK-STR2
HTTP:STC:IMG:JAVA-GIF-MEM
HTTP:STC:IMG:TARGA-IMG-HEAP1
HTTP:STC:IMG:EXE-FOR-IMAGE
HTTP:STC:IMG:PAINT-JPEG-OF
HTTP:STC:IMG:TFF-THUNDER
HTTP:STC:IMG:WMF-SETPALETTE
HTTP:STC:IMG:TARGA-IMG-HEAP
HTTP:STC:IMG:PNG-HEIGHT

HTTP:STC:IMG:JPEG

HTTP:STC:IMG:JPEG:WIN-COLOR
HTTP:STC:IMG:JPEG:WIN-COLOR1

HTTP:STC:JAVA

HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC
HTTP:STC:JAVA:TRUE-TYPE-FONT-OF
HTTP:STC:JAVA:PRVDR-SKLTON-SB1
HTTP:STC:JAVA:GIF-MEMCORRUPT1
HTTP:STC:JAVA:JNLP-CHARSET-OF
HTTP:STC:JAVA:JAVA-VM-ARGS-OF
HTTP:STC:JAVA:JPEGIMGEWRITER-MC
HTTP:STC:JAVA:RUNTIME-ENV-BO
HTTP:STC:JAVA:JPEGIMAGE-OF
HTTP:STC:JAVA:HOTSPOT-BCODE-RCE
HTTP:STC:JAVA:CLAS-VERIFY-ABORT
HTTP:STC:JAVA:IMGLIB-LOOKUPBYTE
HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC
HTTP:STC:JAVA:JAR-FILE-DOWNLOAD
HTTP:STC:JAVA:GETSOUNDBANK-OF
HTTP:STC:JAVA:SETDIFFICM-BOF
HTTP:STC:JAVA:SIGVERIFY-BYPASS
HTTP:STC:JAVA:APPLET-RCE1
HTTP:STC:JAVA:CONCHASHMAP
HTTP:STC:JAVA:ORACLE-IMGLIB-OVF
HTTP:STC:JAVA:FINAL-FIELD-OW
HTTP:STC:JAVA:IBM-CLASS-LDR-RCE
HTTP:STC:JAVA:FONT-PROCESSING
HTTP:STC:JAVA:APPLET-CLASS-FILE
HTTP:STC:JAVA:WEBSTART
HTTP:STC:JAVA:SEC-SLIDER-BYPASS
HTTP:STC:JAVA:PRVDR-SKLTON-SB
HTTP:STC:JAVA:LOOKUPBYTEBI-MC
HTTP:STC:JAVA:APPLET-REFLECTRCE
HTTP:STC:JAVA:SQL-DRIVERMANAGER
HTTP:STC:JAVA:FONT-PARSING
HTTP:STC:JAVA:MORT-LIGATURE-BO
HTTP:STC:JAVA:JNDI-BYPASS
HTTP:STC:JAVA:GSUB-TABLE-BO
HTTP:STC:JAVA:JMX-FINDCLASS-RCE
HTTP:STC:JAVA:JRE-MEM-DISC
HTTP:STC:JAVA:NXT-UPDTE-RA
HTTP:STC:JAVA:SHORT-COMPONENT
HTTP:STC:JAVA:FONT-HANDLNG-BO
HTTP:STC:JAVA:JMXMBEAN-RCE
HTTP:STC:JAVA:PHANTOM-OBJ-RCE
HTTP:STC:JAVA:ATOMIC-SB-BREACH
HTTP:STC:JAVA:JNLP-OF
HTTP:STC:JAVA:IBM-CLASS-RCE
HTTP:STC:JAVA:SIGNED-APPLET-CE
HTTP:STC:JAVA:SANDBOX-BYPASS
HTTP:STC:JAVA:TYPECONF
HTTP:STC:JAVA:IMG-INTEGER-MC
HTTP:STC:JAVA:MAL-JNLP-FILE
HTTP:STC:JAVA:APPLET-RCE
HTTP:STC:JAVA:STOREIMG-ARRAY-BO
HTTP:STC:JAVA:PACK200-INT
HTTP:STC:JAVA:JAVASE-LIBCALL-CE
HTTP:STC:JAVA:METHODHANDLE
HTTP:STC:JAVA:JAVADEPLOY-RCE
HTTP:STC:JAVA:ORA-BYTECODE-CE
HTTP:STC:JAVA:MIXERSEQ-OF
HTTP:STC:JAVA:JAR-PROCESS-OF
HTTP:STC:JAVA:BEAST-WEBSOCKET
HTTP:STC:JAVA:IBM-RMI-PROXY-RCE
HTTP:STC:JAVA:GIF-MEMCORRUPT
HTTP:STC:JAVA:DOCBASE-BOF
HTTP:STC:JAVA:GSUB-BOF
HTTP:STC:JAVA:IMG-SETPIXELS-OF
HTTP:STC:JAVA:BASICSERVICEIMPL
HTTP:STC:JAVA:JAX-WS-RCE
HTTP:STC:JAVA:SETPIXEL-INF-DISC
HTTP:STC:JAVA:TYPE1-FONT

HTTP:STC:MOZILLA

HTTP:STC:MOZILLA:WGL-BUFFERDATA
HTTP:STC:MOZILLA:FIRESEARCH
HTTP:STC:MOZILLA:URL-SHRTCUT
HTTP:STC:MOZILLA:IFRAME-STYLE
HTTP:STC:MOZILLA:FIREBURN
HTTP:STC:MOZILLA:URLBAR-RCE
HTTP:STC:MOZILLA:IFRAME-SRC
HTTP:STC:MOZILLA:SVG-CODE-INJ
HTTP:STC:MOZILLA:DEFINESETTER
HTTP:STC:MOZILLA:FIREFOX-DOS
HTTP:STC:MOZILLA:XUL-FRAMETREE
HTTP:STC:MOZILLA:FIREFOX-NSTREE
HTTP:STC:MOZILLA:OVERFLOW-EVENT
HTTP:STC:MOZILLA:SIDEBAR
HTTP:STC:MOZILLA:FF-WYCIWYG
HTTP:STC:MOZILLA:CSSVALUE-MEM
HTTP:STC:MOZILLA:SVG-XML-INT-OF
HTTP:STC:MOZILLA:MOZ-TAG-ORDER
HTTP:STC:MOZILLA:SVG-DATA
HTTP:STC:MOZILLA:TITLE-OF
HTTP:STC:MOZILLA:LOOKUP-MEM-CO1
HTTP:STC:MOZILLA:CHROME-PRIVESC
HTTP:STC:MOZILLA:ONKEYDOWN-FU
HTTP:STC:MOZILLA:MOZ-BINDING
HTTP:STC:MOZILLA:MAL-SVG-INDEX
HTTP:STC:MOZILLA:SSL-ICON
HTTP:STC:MOZILLA:ICONURL-JS
HTTP:STC:MOZILLA:OGG-VORBIS
HTTP:STC:MOZILLA:SVG-RCE
HTTP:STC:MOZILLA:TABLE-BG-UAF
HTTP:STC:MOZILLA:PROPTAB-MEM
HTTP:STC:MOZILLA:CANVAS-BO
HTTP:STC:MOZILLA:OBJ-TYPE-CURR
HTTP:STC:MOZILLA:LAYOUT-HEAP-OF
HTTP:STC:MOZILLA:OGG-VORBIS1
HTTP:STC:MOZILLA:MAL-REG-EX
HTTP:STC:MOZILLA:SOAPPARAM-OF
HTTP:STC:MOZILLA:CONSTRUCTFRAME
HTTP:STC:MOZILLA:XUL-DLL-DOS
HTTP:STC:MOZILLA:TABLE-FRAMES
HTTP:STC:MOZILLA:MOZ-TAG-ORDER1
HTTP:STC:MOZILLA:DOMNODEREMOVED
HTTP:STC:MOZILLA:QUERYINT-OF
HTTP:STC:MOZILLA:FF-REMOTE-MC
HTTP:STC:MOZILLA:FF-IMG-TAG-DOS
HTTP:STC:MOZILLA:XUL-NULL-MENU
HTTP:STC:MOZILLA:FIRE-FAVICON
HTTP:STC:MOZILLA:FF-XSL-TRANS
HTTP:STC:MOZILLA:XML-MEM-CORR
HTTP:STC:MOZILLA:LAYOUT-MC
HTTP:STC:MOZILLA:MOZ-GRID-DOS
HTTP:STC:MOZILLA:FIREFOX-XPCOM
HTTP:STC:MOZILLA:HOST-MAL-IDN
HTTP:STC:MOZILLA:FF-PLUGINSPAGE
HTTP:STC:MOZILLA:XBL-METHD-EVAL
HTTP:STC:MOZILLA:MESA-TEXIMG2D
HTTP:STC:MOZILLA:FF-DEL-OBJ-REF
HTTP:STC:MOZILLA:INNER-HTML-DOS
HTTP:STC:MOZILLA:ADDON-RCE
HTTP:STC:MOZILLA:FF2-DIR-TRAV
HTTP:STC:MOZILLA:FF-ARRAY-SLICE
HTTP:STC:MOZILLA:CLEARTEXTRUN
HTTP:STC:MOZILLA:NSCSSVALUE-OF
HTTP:STC:MOZILLA:FIREFOX-ENG-MC
HTTP:STC:MOZILLA:EVENT-DLOAD
HTTP:STC:MOZILLA:TYPE-OBJ-RCE
HTTP:STC:MOZILLA:JIT-ESCAPE-MC
HTTP:STC:MOZILLA:SVG-IN-XBL-UAF
HTTP:STC:MOZILLA:HTML-JS-DOS
HTTP:STC:MOZILLA:XSLT-FILE-DOS
HTTP:STC:MOZILLA:LOCATION-HOST
HTTP:STC:MOZILLA:MOZ-FLOAT-OF
HTTP:STC:MOZILLA:PLUGIN-ACL
HTTP:STC:MOZILLA:READYSTATE-UAF
HTTP:STC:MOZILLA:TYPE-OBJ-RCE1
HTTP:STC:MOZILLA:DOMSVGLNGTH
HTTP:STC:MOZILLA:FF-SELECT-UAF
HTTP:STC:MOZILLA:FRAME-COMMENT
HTTP:STC:MOZILLA:DOC-WRITE-MC
HTTP:STC:MOZILLA:ARGMNT-FUNC-CE
HTTP:STC:MOZILLA:FIREUNICODE
HTTP:STC:MOZILLA:REDUCE-RIGHT
HTTP:STC:MOZILLA:PARAM-OF
HTTP:STC:MOZILLA:ONUNLOAD-SSL
HTTP:STC:MOZILLA:XRAYWRAPPER-SB
HTTP:STC:MOZILLA:FF-IMG-TAG-DO1
HTTP:STC:MOZILLA:JSCRIPT-CLIP
HTTP:STC:MOZILLA:STR-RPLACE-MEM
HTTP:STC:MOZILLA:FF-ADDR-SPOOF1
HTTP:STC:MOZILLA:SHELL
HTTP:STC:MOZILLA:NNTP-URL1
HTTP:STC:MOZILLA:FF-COMPARTMENT
HTTP:STC:MOZILLA:ARRAY-DANGLE
HTTP:STC:MOZILLA:NAV-OBJ-EXEC
HTTP:STC:MOZILLA:JS-EVAL
HTTP:STC:MOZILLA:DUP-LOC-HEADER
HTTP:STC:MOZILLA:STR-REPLACE
HTTP:STC:MOZILLA:GIF89A-EXT
HTTP:STC:MOZILLA:NONASCII-LINK
HTTP:STC:MOZILLA:SVG-CLIPPATH
HTTP:STC:MOZILLA:NNTP-URL
HTTP:STC:MOZILLA:FF-INFO
HTTP:STC:MOZILLA:SHAREDWORK-UAF
HTTP:STC:MOZILLA:FF-TOSOURCE
HTTP:STC:MOZILLA:FIREFOX-INPUT
HTTP:STC:MOZILLA:MCHANNEL-UAF
HTTP:STC:MOZILLA:WRAPPED-JAVA
HTTP:STC:MOZILLA:FIREFLASH
HTTP:STC:MOZILLA:XBL-TAG-RM
HTTP:STC:MOZILLA:FIREFOX-MC
HTTP:STC:MOZILLA:PKCS11-RCE
HTTP:STC:MOZILLA:XUL-TREE
HTTP:STC:MOZILLA:OFFSET-MEM-COR

HTTP:STC:NORTON

HTTP:STC:NORTON:LAUNCHURL-HTTP
HTTP:STC:NORTON:NAV-AX-DOS

HTTP:STC:OPERA

HTTP:STC:OPERA:OPERA-CONFIG
HTTP:STC:OPERA:DOCUMENT-WRITE
HTTP:STC:OPERA:GETIMAGEDATA-MC
HTTP:STC:OPERA:GIF-PROC-MC
HTTP:STC:OPERA:TELNET-URI
HTTP:STC:OPERA:SVG-ANIMATION
HTTP:STC:OPERA:ALERTBOX-BOVF
HTTP:STC:OPERA:FILE-URL-OF
HTTP:STC:OPERA:SVG-CLIPPATH-MC

HTTP:STC:OUTLOOK

HTTP:STC:OUTLOOK:SHELL-PROFILE
HTTP:STC:OUTLOOK:WABFILE
HTTP:STC:OUTLOOK:WAB-BOF
HTTP:STC:OUTLOOK:WAB-BOF1
HTTP:STC:OUTLOOK:MAILTO-QUOT-CE
HTTP:STC:OUTLOOK:WABFILE-STC
HTTP:STC:OUTLOOK:OUTLOOK-PRF

HTTP:STC:SAFARI

HTTP:STC:SAFARI:HELP-RUNSCRPT
HTTP:STC:SAFARI:DISK-URI
HTTP:STC:SAFARI:SSH-URI
HTTP:STC:SAFARI:WEBKIT-SVG-MARK
HTTP:STC:SAFARI:CONSOLE-LOG-FS
HTTP:STC:SAFARI:MUL-FUNC-DOS
HTTP:STC:SAFARI:CHARSET-XFORM
HTTP:STC:SAFARI:JSARR-SORT-HOVF
HTTP:STC:SAFARI:FILE-URI
HTTP:STC:SAFARI:WEBKIT-TITLE
HTTP:STC:SAFARI:RUNIN-UAF
HTTP:STC:SAFARI:WEBKIT-FREE-CE
HTTP:STC:SAFARI:X-MAN-PAGE-RCE5
HTTP:STC:SAFARI:IPHONE-LIBTIFF
HTTP:STC:SAFARI:WEBKIT-1ST-LTR
HTTP:STC:SAFARI:WEBKIT-MENU-MEM
HTTP:STC:SAFARI:IOS-JS-ARY-RCE
HTTP:STC:SAFARI:CMD-INJECTION
HTTP:STC:SAFARI:XML-INFI-RECUR
HTTP:STC:SAFARI:WEBKIT-AFREE
HTTP:STC:SAFARI:WEBKIT-COLUMN
HTTP:STC:SAFARI:FLOAT-BOF
HTTP:STC:SAFARI:PARENT-CLOSE
HTTP:STC:SAFARI:WEBKIT-RANGEOBJ
HTTP:STC:SAFARI:X-MAN-PAGE-RCE3
HTTP:STC:SAFARI:X-MAN-PAGE-RCE4
HTTP:STC:SAFARI:X-MAN-PAGE-RCE6
HTTP:STC:SAFARI:X-MAN-PAGE-RCE7
HTTP:STC:SAFARI:X-MAN-PAGE-RCE9
HTTP:STC:SAFARI:X-MAN-PAGE-RCE2
HTTP:STC:SAFARI:X-MAN-PAGE-RCE1
HTTP:STC:SAFARI:CHILD-REMOVAL
HTTP:STC:SAFARI:X-MAN-PAGE-RCE8
HTTP:STC:SAFARI:INNERHTML-MC
HTTP:STC:SAFARI:RTL-USE-FREE
HTTP:STC:SAFARI:WEBKIT-ELEMENTS
HTTP:STC:SAFARI:IMG-USE-FREE
HTTP:STC:SAFARI:WEBKIT-LIBXSLT
HTTP:STC:SAFARI:WEBKIT-SVG-MC
HTTP:STC:SAFARI:CONT-EDITABLE
HTTP:STC:SAFARI:CSS-FORMAT-HINT
HTTP:STC:SAFARI:MAL-REGEX
HTTP:STC:SAFARI:WEBKIT-RENDER

HTTP:STC:SCRIPT

HTTP:STC:SCRIPT:EVAL-JSOBFU
HTTP:STC:SCRIPT:FUNC-CNSTR-OBFU
HTTP:STC:SCRIPT:BROWSER-RECON
HTTP:STC:SCRIPT:BROWSER-RECON-1
HTTP:STC:SCRIPT:DOUBLE-BACKSLAS
HTTP:STC:SCRIPT:STRFMCC-MUL-BAS
HTTP:STC:SCRIPT:REBOTS-DOT-PHP
HTTP:STC:SCRIPT:TRNSFM-STR-OBF
HTTP:STC:SCRIPT:REPLACE-OBSF
HTTP:STC:SCRIPT:VBS-DL-ATTEMPT
HTTP:STC:SCRIPT:SVL-DBL-FREE
HTTP:STC:SCRIPT:UNESCAPE-HEX-OB
HTTP:STC:SCRIPT:HEAPLIB-OBJ
HTTP:STC:SCRIPT:FUNC-REASSIGN
HTTP:STC:SCRIPT:OBFUSCATED
HTTP:STC:SCRIPT:EVAL-GIF-JSOBF
HTTP:STC:SCRIPT:MULTI-CHAR
HTTP:STC:SCRIPT:HTML-SCRIPT
HTTP:STC:SCRIPT:NONALPHANUMERIC
HTTP:STC:SCRIPT:AV-MAGIC-EVADE1
HTTP:STC:SCRIPT:WEBEX-WRF-BOF1
HTTP:STC:SCRIPT:APACHE-XML-DOS
HTTP:STC:SCRIPT:PAYLOAD-SETUP
HTTP:STC:SCRIPT:FF-NAV-URI1
HTTP:STC:SCRIPT:JAVA-EVASION
HTTP:STC:SCRIPT:EDWARDS-PACKER
HTTP:STC:SCRIPT:GARBLE-JS-OBFUS
HTTP:STC:SCRIPT:JS-EK-ENC-OBF
HTTP:STC:SCRIPT:MALJS-NEMUCOD
HTTP:STC:SCRIPT:GRUNT-JJENCODER
HTTP:STC:SCRIPT:STUNNIX-PACKER
HTTP:STC:SCRIPT:JSOBF-PLUGINVER
HTTP:STC:SCRIPT:JS-RENAME
HTTP:STC:SCRIPT:JS-PACKER
HTTP:STC:SCRIPT:UNICODE-SLED
HTTP:STC:SCRIPT:JS-MYOBFUSCATE
HTTP:STC:SCRIPT:EVAL-OBFUSC
HTTP:STC:SCRIPT:JS-OBFUS-ROUTIN
HTTP:STC:SCRIPT:HEAPSPRAY
HTTP:STC:SCRIPT:JS-STRING-OBFS
HTTP:STC:SCRIPT:MATH-LIB
HTTP:STC:SCRIPT:JS-OB-EXPLOIT
HTTP:STC:SCRIPT:JS-OB-ROUTIN-1
HTTP:STC:SCRIPT:COOKIE-BOMB
HTTP:STC:SCRIPT:JS-OB-IFRAMER
HTTP:STC:SCRIPT:UUENCODED-EVAL
HTTP:STC:SCRIPT:JS-ARRAY-POST
HTTP:STC:SCRIPT:BASE64-ENCODED
HTTP:STC:SCRIPT:UNESCAPE-OBFUS
HTTP:STC:SCRIPT:MAL-FILE-HNDRCE
HTTP:STC:SCRIPT:MUL-OBJECT-TAGS
HTTP:STC:SCRIPT:MS-JS-OBFUS
HTTP:STC:SCRIPT:DIV-N-FUNC-OBFU
HTTP:STC:SCRIPT:JSEVAL-GEN-TECH
HTTP:STC:SCRIPT:DEFINATION-HEAP
HTTP:STC:SCRIPT:VB-REGX-ID
HTTP:STC:SCRIPT:VAR-HEAP-SHELL
HTTP:STC:SCRIPT:SPLIT-REVERSE
HTTP:STC:SCRIPT:MUL-TAG-RTF-OBJ
HTTP:STC:SCRIPT:CHAR-ENCODING
HTTP:STC:SCRIPT:FUNC-EVAL-OBFU
HTTP:STC:SCRIPT:RTRN-FUNC-OBFU
HTTP:STC:SCRIPT:CNSTR-QUOTE-OBF
HTTP:STC:SCRIPT:DOUBLE-BACKSLA1
HTTP:STC:SCRIPT:FUNC-RTN-OBFU
HTTP:STC:SCRIPT:PYTHON-RECVFROM
HTTP:STC:SCRIPT:CONSTRUCTOR-OBF
HTTP:STC:SCRIPT:MUL-BASE-OBFU
HTTP:STC:SCRIPT:JSVAR-REVALIGN

HTTP:STC:SRVRSP

HTTP:STC:SRVRSP:COMPRESSED
HTTP:STC:SRVRSP:403-FORBID
HTTP:STC:SRVRSP:IDC-PATH
HTTP:STC:SRVRSP:404-NOT-FOUND
HTTP:STC:SRVRSP:AUTH-RESP-OF

HTTP:STC:SSL

HTTP:STC:SSL:MD5-SIGNATURE-1
HTTP:STC:SSL:MD5-SIGNATURE

HTTP:STC:STREAM

HTTP:STC:STREAM:DIRSHOW-MJPEG
HTTP:STC:STREAM:AVI
HTTP:STC:STREAM:CONTENT-TYPE
HTTP:STC:STREAM:WMV
HTTP:STC:STREAM:FLV
HTTP:STC:STREAM:QT-IT-MEM
HTTP:STC:STREAM:FLASH-MEMORY
HTTP:STC:STREAM:QT-RESPONSE-BO
HTTP:STC:STREAM:QUICKTIME-BO
HTTP:STC:STREAM:REAL-MP4-MEM
HTTP:STC:STREAM:QT-M3U
HTTP:STC:STREAM:DIRSHOW-MJPEG1
HTTP:STC:STREAM:QT-MOV-IO
HTTP:STC:STREAM:QT-MOV-FILE-BO1
HTTP:STC:STREAM:DIRECTSHOW-MJPG
HTTP:STC:STREAM:QT-HREFTRACK
HTTP:STC:STREAM:QT-MOV-FILE-BOF
HTTP:STC:STREAM:MAL-MEDIA
HTTP:STC:STREAM:ASF-BOF
HTTP:STC:STREAM:QT-MPEG-PAD
HTTP:STC:STREAM:GDI-WMF-HEADER
HTTP:STC:STREAM:FFDSHOW-URL-OF
HTTP:STC:STREAM:DIRECTSHOW-MP3
HTTP:STC:STREAM:QT-DESC-ATOM
HTTP:STC:STREAM:MAL-AVI-RIFF
HTTP:STC:STREAM:CINEPAK-RCE
HTTP:STC:STREAM:VLC-REALINDEX1
HTTP:STC:STREAM:REALAUDIO-OF
HTTP:STC:STREAM:DIRECTX-MJPEG
HTTP:STC:STREAM:REAL-AVI
HTTP:STC:STREAM:SWF
HTTP:STC:STREAM:QT-MAL-SMIL
HTTP:STC:STREAM:REALPLAYER-QCP
HTTP:STC:STREAM:ASF-WMP
HTTP:STC:STREAM:REALPLAYER-MP3
HTTP:STC:STREAM:QT-FLASHPIX-OF
HTTP:STC:STREAM:REALMEDIA-PROC
HTTP:STC:STREAM:SHOCKWAVE-IO
HTTP:STC:STREAM:WINAMP-META-OF
HTTP:STC:STREAM:VLC-REALINDEX

HTTP:STC:SWF

HTTP:STC:SWF:MAL-SWF-OF
HTTP:STC:SWF:REAL-FLV1
HTTP:STC:SWF:HEAP-OF
HTTP:STC:SWF:OPENTYPE-FONT-OF1
HTTP:STC:SWF:CVE-2013-3362-MC
HTTP:STC:SWF:CVE-2014-0585-CE
HTTP:STC:SWF:PHPEXEC
HTTP:STC:SWF:RESOURCEMODULEURLS
HTTP:STC:SWF:AS-POOL
HTTP:STC:SWF:OPENTYPE-FONT-OF
HTTP:STC:SWF:STAGE3D
HTTP:STC:SWF:BYTEARRAY
HTTP:STC:SWF:SIZE-MIS
HTTP:STC:SWF:REAL-FLV
HTTP:STC:SWF:FLASH-DEFINEFONT
HTTP:STC:SWF:FLASH-SALIGN
HTTP:STC:SWF:REC-S-OF
HTTP:STC:SWF:KEY-PRESS-EVENT
HTTP:STC:SWF:FLASH-MEM-CORRUPT
HTTP:STC:SWF:HEADER-MEM-RCE
HTTP:STC:SWF:FLASHPLAYER-OF
HTTP:STC:SWF:COPYRAWDATATO
HTTP:STC:SWF:URL-SEC-DOM-RCE
HTTP:STC:SWF:TEXT-IOF
HTTP:STC:SWF:UNDEF-NS
HTTP:STC:SWF:ADOBE-FLASH-FILEBO
HTTP:STC:SWF:ACTIONTAG
HTTP:STC:SWF:CVE-2014-0510-MC
HTTP:STC:SWF:PLACEOBJX
HTTP:STC:SWF:SWAVE-TSAC-CHUNK
HTTP:STC:SWF:DEFSCENE-OF
HTTP:STC:SWF:ADOBE-COPYPIXEL-IO
HTTP:STC:SWF:MEM-DISC
HTTP:STC:SWF:SHARED-OBJ-UAF

HTTP:STC:VULN

HTTP:STC:VULN:CHEROKEE-0-4-17-1
HTTP:STC:VULN:APACHE-2-0-52
HTTP:STC:VULN:APACHE-1-3-28
HTTP:STC:VULN:WEBLOGIC-8-1
HTTP:STC:VULN:APACHE-1-3-26-31
HTTP:STC:VULN:OUTLOOK-XSRF
HTTP:STC:VULN:IMAIL-8-13
HTTP:STC:VULN:TAG-BDO

HTTP:STC:WINAMP

HTTP:STC:WINAMP:AU-OF1
HTTP:STC:WINAMP:ULTRAVOX-MSG
HTTP:STC:WINAMP:ID3V2-OVERFLOW
HTTP:STC:WINAMP:MAKI-SCRIPT-OF
HTTP:STC:WINAMP:MOD-HDR-OF
HTTP:STC:WINAMP:CDDA-OF
HTTP:STC:WINAMP:CDDA-OF3
HTTP:STC:WINAMP:M3U-BOF

HTTP:STREAM

HTTP:STREAM:AAJTAK-STREAM
HTTP:STREAM:FLV
HTTP:STREAM:STARTV-STREAM
HTTP:STREAM:YOUTUBE-REQ
HTTP:STREAM:VIDEO-CONTENT
HTTP:STREAM:QUICKTIME-CLIENT
HTTP:STREAM:GOOGLE-VIDEO
HTTP:STREAM:ITUNES-USERAGENT
HTTP:STREAM:MAGIX-OF

HTTP:TOMCAT

HTTP:TOMCAT:REAL-PATH-DISC
HTTP:TOMCAT:REAL-PATH-REQ
HTTP:TOMCAT:JSP-BUFFER
HTTP:TOMCAT:JSP-PAGE
HTTP:TOMCAT:JSP-COMMENTS
HTTP:TOMCAT:SOURCE-MAL-REQ
HTTP:TOMCAT:XPL-FILE-DISC
HTTP:TOMCAT:DIR-LIST-INFO-DISCL
HTTP:TOMCAT:JSP-DEC-INT-OF
HTTP:TOMCAT:AJP12-SHUTDOWN
HTTP:TOMCAT:DIR-TRAV
HTTP:TOMCAT:ADMIN-SCAN
HTTP:TOMCAT:SERVLET-DEVICE-DOS1
HTTP:TOMCAT:SERVLET-DEVICE-DOS
HTTP:TOMCAT:JSP-AS-HTML
HTTP:TOMCAT:URL-ENC-DIRTRAV
HTTP:TOMCAT:POLICY-BYPASS

HTTP:TUNNEL

HTTP:TUNNEL:CHAT-YIM
HTTP:TUNNEL:CHAT-AOL-IM
HTTP:TUNNEL:ALTNET-OVER-HTTP
HTTP:TUNNEL:PROXY
HTTP:TUNNEL:TELNET
HTTP:TUNNEL:HTTPTUNNEL-URL
HTTP:TUNNEL:SIP
HTTP:TUNNEL:CHAT-MSN-IM-SSL
HTTP:TUNNEL:REDUH
HTTP:TUNNEL:ANCHORFREE-CLIENT
HTTP:TUNNEL:SMTP
HTTP:TUNNEL:CHAT-MSN-IM

HTTP:UA

HTTP:UA:SKIPFISH
HTTP:UA:CURL
HTTP:UA:WGET
HTTP:UA:GOOGLEBOT
HTTP:UA:MOREOVER
HTTP:UA:MSN-BINGBOT
HTTP:UA:NUTCH
HTTP:UA:NSAUDITOR
HTTP:UA:AUTO-EMAIL-PRO
HTTP:UA:ATOMIC-EMAIL-HUNTER
HTTP:UA:EMAILSPIDER
HTTP:UA:DSURF
HTTP:UA:PBROWSE
HTTP:UA:MOBILE
HTTP:UA:PHP-BASE64-DECODE
HTTP:UA:CONTACTBOT-COLLECTOR
HTTP:UA:EXTRACTOR-PRO
HTTP:UA:EMAILSIPHON-COLLECTOR
HTTP:UA:EMAILWOLF-COLLECTOR
HTTP:UA:CRAZY-BROWSER
HTTP:UA:PHP-CODE-INJ
HTTP:UA:MALICIOUS-UA

HTTP:UNIX-CMD

HTTP:UNIX-CMD:UNIX-CMD-M-Z
HTTP:UNIX-CMD:UNIX-CMD-A-L
HTTP:UNIX-CMD:UNIX-GCC1

HTTP:UNIX-FILE

HTTP:UNIX-FILE:ETC-HOSTS-ALLOW
HTTP:UNIX-FILE:ETC-PASSWD

HTTP:WASD

HTTP:WASD:CONF-ACCESS
HTTP:WASD:DIR-TRAV

HTTP:WEBLOGIC

HTTP:WEBLOGIC:WEBROOT
HTTP:WEBLOGIC:ENCODING
HTTP:WEBLOGIC:BEAPACHE
HTTP:WEBLOGIC:CONSOLE-HELP-PORT
HTTP:WEBLOGIC:JSESSIONID
HTTP:WEBLOGIC:BEA-CONN-BOF
HTTP:WEBLOGIC:URL-REVEAL-SRC

HTTP:WEBSPHERE

HTTP:WEBSPHERE:SERVER-OF
HTTP:WEBSPHERE:VER-DOS

HTTP:WEBSTER

HTTP:WEBSTER:LONG-GET-REQ
HTTP:WEBSTER:DIR-TRAVERSAL

HTTP:WHATSUP

HTTP:WHATSUP:WEB-SQL-INJECT
HTTP:WHATSUP:DOS-DEV-DOS
HTTP:WHATSUP:INSTANCENAME-OF

HTTP:WIN-CMD

HTTP:WIN-CMD:ROOT.EXE

HTTP:XSS

HTTP:XSS:YOAST-WP
HTTP:XSS:NASA-TRACE
HTTP:XSS:WEB-VIEW-DOC-SCR-INJ
HTTP:XSS:MAILMAN-ADMIN
HTTP:XSS:CA-SITEMINDER-OLUNICDE
HTTP:XSS:HP-INTELLIGENT-MNGT
HTTP:XSS:MS-MULT-APPLICATION
HTTP:XSS:WP-YT-AUDIO
HTTP:XSS:HTW-XSS
HTTP:XSS:MS-CVE-2015-6170
HTTP:XSS:ANWIKI-XSS
HTTP:XSS:SUN-JAVA-CALENDAR
HTTP:XSS:IBM-RATIONAL-CLEARCASE
HTTP:XSS:JOOMLA-COM-RESMAN
HTTP:XSS:TOMCAT-JSP
HTTP:XSS:COLDFUSION-MX7
HTTP:XSS:CISCO-XSS
HTTP:XSS:CISCO-CSUSERCGIXSS
HTTP:XSS:ISA-AUTH-XSS
HTTP:XSS:WP-ESHOP
HTTP:XSS:APACHE-MOD-NEGOTIATION
HTTP:XSS:ORACLE-ISQLPLUS
HTTP:XSS:NOVELL-ZENWORKS-XSS
HTTP:XSS:WP-INLINE-GALLERY
HTTP:XSS:AXIS-M10-CAMERA1
HTTP:XSS:WP-LIVE-WIRE-THEME
HTTP:XSS:DRUPAL-CUMULAS
HTTP:XSS:FRONTPAGE-EXT
HTTP:XSS:AWAUCTIONSCRIPT-CMS
HTTP:XSS:HTML-SCRIPT-IN-HOST
HTTP:XSS:WP-UNIVERSAL-POST
HTTP:XSS:WP-SOCIALGRID
HTTP:XSS:WP-PLACESTER
HTTP:XSS:PACER-EDITION-EMAIL
HTTP:XSS:WP-GAZETTE-THEME
HTTP:XSS:WP-AJAX-CALENDAR
HTTP:XSS:IIS-ASP
HTTP:XSS:JOOMLA-CITY
HTTP:XSS:XOOPS-MULT
HTTP:XSS:MS-FOREFRONT-EXCEL-TBL
HTTP:XSS:MS-SCCM-REFLECTED
HTTP:XSS:E2-PHOTO-GALLERY
HTTP:XSS:LDAP-ACCOUNT-MGR
HTTP:XSS:WP-ZOTPRESS
HTTP:XSS:WP-WOOTHEMES
HTTP:XSS:MS-SCOM-WEB-CONSOLE
HTTP:XSS:INMAGIC-DBTWPUB
HTTP:XSS:WP-RATING-WIDGET
HTTP:XSS:ZEN-CART
HTTP:XSS:VBULLETIN-SORTORDER
HTTP:XSS:SYNDEO-CMS-ADDONS
HTTP:XSS:MC-CONTENT-MANAGER
HTTP:XSS:MS-W3WHO-XSS
HTTP:XSS:SHAREPOINT-EDITFORM
HTTP:XSS:TM-REQUEST-FORGERY
HTTP:XSS:PHPWEBSITE-PAGE-ID
HTTP:XSS:SYM-GATEWAY-PHP-PAGE
HTTP:XSS:VBULLETIN-SORT
HTTP:XSS:WP-AJAX-CATEGORY
HTTP:XSS:MS-IE-TOSTATICHTML
HTTP:XSS:MUL-RECORDPRESS
HTTP:XSS:MS-VSTWAC-TFS
HTTP:XSS:SYMANTEC-WG
HTTP:XSS:SHAREPOINT-THEMEWEB
HTTP:XSS:SHAREPOINT-WIZARDLIST
HTTP:XSS:HP-SMH-REDIRCTURL
HTTP:XSS:AXIS-M10-CAMERA
HTTP:XSS:WP-SERMON-BROWSER
HTTP:XSS:WP-STATS-DASHBOARD
HTTP:XSS:WP-PHOTORACER
HTTP:XSS:WP-PHOTO-ALBUM
HTTP:XSS:IBM-OPEN-ADMIN
HTTP:XSS:WP-DAILY-MAUI-PHOTO
HTTP:XSS:WP-AJAX-RECENT-POSTS
HTTP:XSS:CISCOWORKS-CSFHS-1
HTTP:XSS:ATUTOR-ACONTENT
HTTP:XSS:CMSQLITE-ID
HTTP:XSS:WP-IGIT-POSTS
HTTP:XSS:WP-COMICPRESS
HTTP:XSS:SHAREPOINT-LIST-XSS
HTTP:XSS:XOOPS-VIEW-PHOTOS-PHP
HTTP:XSS:AWAUCTIONSCRIPT-CMS2
HTTP:XSS:CISCO-SESM
HTTP:XSS:ADOBE-COLDF-SEARCHLOG
HTTP:XSS:SYM-IM-MANAGER
HTTP:XSS:MS-IE-CVE-2014-6328
HTTP:XSS:IE-CVE-2015-0070
HTTP:XSS:AWAUCTIONSCRIPT-CMS3
HTTP:XSS:IE7-XSS
HTTP:XSS:NAGIOS-XI-ALERT-CLOUD
HTTP:XSS:CPANEL-MODULES
HTTP:XSS:ASP-REQ-VALIDATION
HTTP:XSS:IBM-LOTUS-NOTES-TRAV
HTTP:XSS:IBM-LOTUS-DOMINO-XNSF
HTTP:XSS:SERVICE-CGI
HTTP:XSS:WP-LAZYEST-GALLERY
HTTP:XSS:WP-PHOTOSMASH-GAL
HTTP:XSS:WP-LOCAL-MARKET-EXP
HTTP:XSS:CISCOWORKS-CSFHS
HTTP:XSS:WP-FANCYBOX-PLUGIN
HTTP:XSS:MS-SHAREPOINT-PARAM
HTTP:XSS:MS-OWA-MUTIPLE
HTTP:XSS:X-FORWARDED-FOR-INJ
HTTP:XSS:SUSPICIOUS-SCAN
HTTP:XSS:HP-SEARCH-XSS
HTTP:XSS:ORACLE-REPORT-SVR
HTTP:XSS:DYNAMICAX-PORTAL-XSS
HTTP:XSS:SHAREPOINT-COMMAND
HTTP:XSS:IBM-LOTUS-SIMPLESEARCH
HTTP:XSS:CROOGO-CMS
HTTP:XSS:MS-LYNC-SERVER
HTTP:XSS:HTML-SCRIPT-IN-URL-PTH
HTTP:XSS:HTML-SCRIPT-HTTP-HDR
HTTP:XSS:MULTI-VENDOR
HTTP:XSS:CKEDITOR-POSTEDDATAPHP
HTTP:XSS:WORDPRESS-COMMENT
HTTP:XSS:WORDPRESS-COMMENTS-CE
HTTP:XSS:HDR-REFERRER
HTTP:XSS:ORACLE-BIEE-XSS
HTTP:XSS:NOVELL-QUICKFINDER
HTTP:XSS:SYMANTEC-EP-PARAM-XSS
HTTP:XSS:SHAREPOINT-XSS-2
HTTP:XSS:MS-REPORT-MANAGER
HTTP:XSS:ARBORNETWORKS-PEAKFLOW
HTTP:XSS:OUTLOOK-WEB
HTTP:XSS:BEA-ADMIN-CONSOLE
HTTP:XSS:TYPO3-LOCALURL-CMS
HTTP:XSS:NOVELL-GW-WEB-ACCESS
HTTP:XSS:IPLANET-ROOT
HTTP:XSS:AWAUCTIONSCRIPT-CMS1
HTTP:XSS:SHAREPOINT-CALLBACK
HTTP:XSS:HTML-SCRIPT-IN-UA
HTTP:XSS:WRDPRSS-SCRIPT-HEADER
HTTP:XSS:MS-FOREFRONT-DEFAULT
HTTP:XSS:HP-INSIGHT-ONLINE
HTTP:XSS:MAILMAN-OPTIONS
HTTP:XSS:MERCURY-BOARD
HTTP:XSS:MS-FOREFRONT-INFO-DISC
HTTP:XSS:OUTLOOK-WEB-ACCESS
HTTP:XSS:REALPLAYER-SMIL
HTTP:XSS:SHARE-XSS
HTTP:XSS:OMNIHTTPD-REDIR
HTTP:XSS:MS-IE-XSS-BYPASS
HTTP:XSS:WHITE-LABEL-CMS
HTTP:XSS:SHAREPOINT-XSS
HTTP:XSS:URL-IMG-XSS
HTTP:XSS:ORACLE-GLASSFISH
HTTP:XSS:HTML-SCRIPT-IN-AL
HTTP:XSS:OPENFIRE-USER-CREATE
HTTP:XSS:ROBOHELP-XSS
HTTP:XSS:SUBRION-CMS
HTTP:XSS:APACHE-SSI-XSS
HTTP:XSS:SHAREPOINT-USER
HTTP:XSS:HTML-SCRIPT-IN-POST
HTTP:XSS:FOREFRONT-SIGNURL
HTTP:XSS:OPENFIRE-SEARCH
HTTP:XSS:MS-CS
HTTP:XSS:HTML-SCRIPT-IN-AE
HTTP:XSS:PHPNUKE-BOOKMARKS
HTTP:XSS:CISCO-CSDC
HTTP:XSS:MS-REPORT-VIEWER
HTTP:XSS:HTML-SCRIPT-IN-COOKIE
HTTP:XSS:SHAREPOINT-INPLVIEW
HTTP:XSS:HTML-SCRIPT-IN-URL-VAR

HTTP:YAHOO

HTTP:YAHOO:ACTIVITY
HTTP:YAHOO:ATTACHMENT-UPLOAD
HTTP:YAHOO:ATTACHMENT-DOWNLOAD

ICMP

ICMP:MODEMS-ATH-COMMAND-DOS

ICMP:AUDIT

ICMP:AUDIT:RESP-WITHOUT-REQ
ICMP:AUDIT:REQUEST-RESND
ICMP:AUDIT:INVALID-TYPE
ICMP:AUDIT:WRONG-CHECKSUM
ICMP:AUDIT:INVALID-CODE
ICMP:AUDIT:ICMP-WITH-OPTIONS

ICMP:EXPLOIT

ICMP:EXPLOIT:FLOOD
ICMP:EXPLOIT:NON-ZERO-DATA-LEN
ICMP:EXPLOIT:DIFF-LEN-IN-RESP
ICMP:EXPLOIT:DIFF-LEN-IN-RESND
ICMP:EXPLOIT:LAN-SMURF
ICMP:EXPLOIT:MIP-ROUTE-OF
ICMP:EXPLOIT:ECHOK

ICMP:INFO

ICMP:INFO:ADDR-REQ
ICMP:INFO:TIMESTAMP
ICMP:INFO:INFORMATION
ICMP:INFO:ECHO-REQUEST
ICMP:INFO:ECHO-REPLY

ICMP6:AUDIT

ICMP6:AUDIT:INVALID-CHECKSUM
ICMP6:AUDIT:REQUEST-RESEND
ICMP6:AUDIT:RESP-WITHOUT-REQ
ICMP6:AUDIT:INVALID-TYPE
ICMP6:AUDIT:INVALID-CODE

ICMP6:EXPLOIT

ICMP6:EXPLOIT:DIFF-LEN-IN-RSD
ICMP6:EXPLOIT:DIFF-LEN-IN-RESP
ICMP6:EXPLOIT:FLOOD

IDENT

IDENT:GEWSE-FLOOD
IDENT:TINYIDENT-OF

IDENT:AUDIT

IDENT:AUDIT:RESPONSE
IDENT:AUDIT:NEST-REQ
IDENT:AUDIT:PORT-PAIR

IDENT:INVALID

IDENT:INVALID:EMPTY-LN
IDENT:INVALID:EOL
IDENT:INVALID:SENDMAIL-EXPL

IDENT:JIDENTD

IDENT:JIDENTD:IDENT-OF1

IDENT:OVERFLOW

IDENT:OVERFLOW:REPLY
IDENT:OVERFLOW:REQUEST-NUM
IDENT:OVERFLOW:REQUEST

IKE

IKE:FW1-OVERFLOW
IKE:INV-DER-LEN
IKE:SA-DELETE
IKE:SYMANTEC-ISAKMPD-DOS
IKE:KAME-RACOON-X509-CERT-VERIF
IKE:STRONGSWAN-CERTIFICATE-BO
IKE:OPENSWAN-DPD-NULL-PTR-DOS

IKE:DOS

IKE:DOS:CISCO-DOS
IKE:DOS:TCPDUMP-ID-UNDERFLOW
IKE:DOS:TCPDUMP-SPI-OVERFLOW
IKE:DOS:WIN2K-DOS
IKE:DOS:TCP-HUMP
IKE:DOS:ISAKMP-DOS-IPSEC
IKE:DOS:OPENBSD-ISAKMPD
IKE:DOS:ISAKMP-DOS

IKE:MALFORMED

IKE:MALFORMED:2MANY-PAYLOAD
IKE:MALFORMED:PACKET
IKE:MALFORMED:INV-PAYLOAD-TYPE
IKE:MALFORMED:INV-PAY-LEN

IMAP

IMAP:SET-QUOTA
IMAP:MER-SUBSCRIBE
IMAP:AUTH-OF
IMAP:LOTUS-CRAM

IMAP:AUDIT

IMAP:AUDIT:LOGIN-FAILED
IMAP:AUDIT:REQ-UNKNOWN-CMD
IMAP:AUDIT:REQ-INVALID-STATE
IMAP:AUDIT:COMMAND-FAILED
IMAP:AUDIT:REQ-BINARY-DATA
IMAP:AUDIT:IMAPS-CLEAR

IMAP:CYRUS

IMAP:CYRUS:FETCH-CMD
IMAP:CYRUS:PARTIAL-CMD
IMAP:CYRUS:LOGIN-OF
IMAP:CYRUS:PRELOG

IMAP:EXPLOIT

IMAP:EXPLOIT:NETMAIL-APPEND
IMAP:EXPLOIT:SUSPICIOUS-HEADER
IMAP:EXPLOIT:SUSPICIOUS-COMM
IMAP:EXPLOIT:CMD-DIR-TRSVR
IMAP:EXPLOIT:CMD-FORMAT-STRING
IMAP:EXPLOIT:DOMINO-IMAP-BO2

IMAP:FAILURE

IMAP:FAILURE:BRUTE-FORCE

IMAP:IPSWITCH

IMAP:IPSWITCH:CHAR-OF
IMAP:IPSWITCH:IMAIL-INFO
IMAP:IPSWITCH:DELETE-OF
IMAP:IPSWITCH:FETCH-OF
IMAP:IPSWITCH:STATUS-OF
IMAP:IPSWITCH:SEARCH-DATE

IMAP:OVERFLOW

IMAP:OVERFLOW:FLAG
IMAP:OVERFLOW:COMMAND
IMAP:OVERFLOW:PASS
IMAP:OVERFLOW:REFERENCE
IMAP:OVERFLOW:TAG
IMAP:OVERFLOW:LIT_LENGTH_OFLOW
IMAP:OVERFLOW:LINE
IMAP:OVERFLOW:MAILBOX
IMAP:OVERFLOW:USER
IMAP:OVERFLOW:IMAP4-LSUB-OF
IMAP:OVERFLOW:IMAP-LSUB-OF
IMAP:OVERFLOW:MERCUR-NTLMSSP
IMAP:OVERFLOW:SCO-IMAPD-UNO-OF
IMAP:OVERFLOW:MAILENABLE-ARG-OF
IMAP:OVERFLOW:BIN-SH
IMAP:OVERFLOW:WUIMAPD-PART-OF
IMAP:OVERFLOW:LINUX-X86-3
IMAP:OVERFLOW:MAILENABLE-OF
IMAP:OVERFLOW:LINUX-X86-2
IMAP:OVERFLOW:WUIMAPD-MBOX-OF
IMAP:OVERFLOW:MAILENABLE-APPEND
IMAP:OVERFLOW:MAILENABLE-BO
IMAP:OVERFLOW:MERCURY-MAIL-BO
IMAP:OVERFLOW:LITERAL-TOKEN
IMAP:OVERFLOW:MERCURY-LOGIN
IMAP:OVERFLOW:MAILENABLE-OF-3
IMAP:OVERFLOW:IMAP-CONT-OF
IMAP:OVERFLOW:LINUX-X86-1
IMAP:OVERFLOW:LIST-OF
IMAP:OVERFLOW:MDAEMON-MD5
IMAP:OVERFLOW:LINUX-X86-4
IMAP:OVERFLOW:LINUX-X86-5
IMAP:OVERFLOW:DOMINO-IMAP
IMAP:OVERFLOW:OL-IFRAME-EXEC
IMAP:OVERFLOW:MAILENABLE-OF-2

IMAP:REQERR

IMAP:REQERR:INVALID_LITERAL_LEN
IMAP:REQERR:REQ-INVALID-TAG
IMAP:REQERR:REQ-DUPLICATE-TAG
IMAP:REQERR:REQ-UNEXPECTED-ARG

IMAP:VULN

IMAP:VULN:CYRUS-2-1-11

IP

IP:ESP-RUNT
IP:SRC-ROUTE-OF
IP:IGMP-MS-DOS

IP:AUDIT

IP:AUDIT:HAS-IP-OPTIONS
IP:AUDIT:INVALID-TYPE

IP:EXPLOIT

IP:EXPLOIT:IP-TRACEROUTE
IP:EXPLOIT:SAME-SRC-DST

IP:INFO

IP:INFO:INVALID-DESTINATION
IP:INFO:INVALID-SOURCE

IP:OPTERR

IP:OPTERR:DUPLICATE
IP:OPTERR:INVALID-LENGTH
IP:OPTERR:INVALID-INFRAGMENT

IP:OVERFLOW

IP:OVERFLOW:OPTIONS

LDAP

LDAP:UNSUPPORTED_VERSION
LDAP:CONTROLS-MISMATCH
LDAP:BER-DOS
LDAP:LOTUS-DOMINO
LDAP:SIDVAULT-DOS
LDAP:KERIO-DOS
LDAP:OPENLDAP-2.2.23-DOS
LDAP:TIVOLI-OF
LDAP:COMMGATE-OF
LDAP:AD-LDAP-DOS
LDAP:SAMBALDAP-LIBLDB
LDAP:SUN-REQ-FS
LDAP:LSASS-HEAP-OF
LDAP:LOTUS-DN
LDAP:SUN-DIR-OF
LDAP:AD-AUTH-BYPASS
LDAP:MS-WINDOWS-AD-LDAP-DOS
LDAP:IMAIL-BOF
LDAP:OPENLDAP-RWM-DOS
LDAP:RECURSIVE-DOS
LDAP:SLAPD-OVERLAY-DOS
LDAP:EDIRECTORY-DOS
LDAP:IMAIL-BOF-1
LDAP:WIN-AUTH-SB2
LDAP:ORACLE-PREAUTH-DOS
LDAP:BERGET-NXT-DOS
LDAP:AD-CONVERT-ATT
LDAP:NA-PGP-KEYSERVER-OF
LDAP:MS-AD-QUERY-DOS

LDAP:AUDIT

LDAP:AUDIT:BIND_RESULT_FAILED
LDAP:AUDIT:ANONYMOUS_BIND

LDAP:EMPTY

LDAP:EMPTY:ATTRIB_ASSERT_EMPTY
LDAP:EMPTY:ATTRIBDESC_EMPTY
LDAP:EMPTY:ASSERT_EMPTY
LDAP:EMPTY:REFERRAL_EMPTY
LDAP:EMPTY:ATTRIBLIST_EMPTY
LDAP:EMPTY:ATTRIBVALUE_EMPTY
LDAP:EMPTY:EXTDRSP-RESP-EMPTY
LDAP:EMPTY:EXTDREQ-REQNM-EMPTY
LDAP:EMPTY:EXTDREQ-REQVAL-EMPTY
LDAP:EMPTY:MODIFYREQ_ADD_EMPTY
LDAP:EMPTY:EXTDRSP-RSPNM-EMPTY
LDAP:EMPTY:SRCHREQ_FTR_NULL
LDAP:EMPTY:SRCH_FILTER_EMPTY
LDAP:EMPTY:SRCH_RES_OBJ_EMPTY
LDAP:EMPTY:SRCH_RESREF_NONE
LDAP:EMPTY:SRCHREQ_FILTER_EMPTY
LDAP:EMPTY:SCHREQ-FTR-SSTR-NONE
LDAP:EMPTY:SRCHREQ_FTR_SSTR
LDAP:EMPTY:MODIFYREQ_PART_EMPTY
LDAP:EMPTY:MODREQ-ATTRIB-EMPTY
LDAP:EMPTY:SCHREQ_FILTER_EMPTY
LDAP:EMPTY:SRCHREQ_LOGOP_NOARGS
LDAP:EMPTY:ATTRIBVAL_LIST_EMPTY
LDAP:EMPTY:ADDREQ-ATTRIB-EMPTY
LDAP:EMPTY:DELREQ_EMPTY
LDAP:EMPTY:MODIFYREQ_EMPTY

LDAP:FAILED

LDAP:FAILED:ADD-RESULT-FAIL
LDAP:FAILED:COMPARE_RESULT_FAIL
LDAP:FAILED:DELETE-RESULT-FAIL
LDAP:FAILED:MODIFY-RESULT-FAIL
LDAP:FAILED:SEARCH-RESULT-FAIL
LDAP:FAILED:BRUTE-FORCE
LDAP:FAILED:MODDN-RESULT-FAIL

LDAP:FORMAT

LDAP:FORMAT:ENC-UNK-END-CHAR
LDAP:FORMAT:ENC_LEN_LEFT_ZEROS
LDAP:FORMAT:ENC_LEN_INDEFINITE
LDAP:FORMAT:ENC_INCORRECT_TAG
LDAP:FORMAT:ATTRIB-DESC-FMTERR
LDAP:FORMAT:DN_FMTERR

LDAP:INVALID

LDAP:INVALID:ENTRY_INVALID
LDAP:INVALID:SEARCH-ATTRIB-INV
LDAP:INVALID:SEARCH-BASEOBJ-INV
LDAP:INVALID:REQ-ATTRIBTYPE-INV
LDAP:INVALID:REFERRAL_INVALID
LDAP:INVALID:REQ-OPERATION-INV
LDAP:INVALID:ADDREQ-ENTRY-INV
LDAP:INVALID:ATTRIBTYPE_INVALID
LDAP:INVALID:MESGID-INVALID
LDAP:INVALID:MODDNREQ-ENTRY-INV
LDAP:INVALID:SRCH-DEREF-AL-INV
LDAP:INVALID:SEARCH-FILTER-INV
LDAP:INVALID:SRCHREQ_FLEN_INV
LDAP:INVALID:SRCH_RES_ATTR_INV
LDAP:INVALID:SRCH-SIZELIMIT-INV
LDAP:INVALID:SRCH-TIMELIMIT-INV
LDAP:INVALID:SRCH-TYPEONLY-INV
LDAP:INVALID:ENC_BOOLEAN
LDAP:INVALID:MODDNREQ-NWRDN-INV
LDAP:INVALID:REQ_OBJECT_INVALID
LDAP:INVALID:ENC_INTEGER_LEN
LDAP:INVALID:ENC_INVALID_LEN
LDAP:INVALID:SEARCH_SCOPE_INV
LDAP:INVALID:REQTYPE_INVALID
LDAP:INVALID:MODRDN-NULL-RDN

LDAP:OVERFLOW

LDAP:OVERFLOW:ATTRIB-DESC-OF
LDAP:OVERFLOW:ENCODING-INT-OF
LDAP:OVERFLOW:ENC_REPR_2LONG
LDAP:OVERFLOW:ENCODING-TAG-OF
LDAP:OVERFLOW:ENCODING-LEN-OF
LDAP:OVERFLOW:DN_TOO_LONG
LDAP:OVERFLOW:SEARCH-LEVELS-OF
LDAP:OVERFLOW:ENC-TAG-VAL-OF
LDAP:OVERFLOW:MESSAGE-TOO-LONG
LDAP:OVERFLOW:DC-MEM-LEAK-DOS
LDAP:OVERFLOW:REQ-OF
LDAP:OVERFLOW:MS-DIR-LEAK-MC
LDAP:OVERFLOW:MODRDN-UTF8-EXEC
LDAP:OVERFLOW:IBM-DOMINO
LDAP:OVERFLOW:IBM-LOTUS-DOMINO
LDAP:OVERFLOW:IMAIL-ASN-1

LPD

LPD:HUMMINGBIRD
LPD:MSF-CASCADE-JOB-REQ
LPD:ACTFAX-SERVER-BO
LPD:LDP-CMD-INJ
LPD:OPT-OF

LPR

LPR:WINDOWS-LPR-DOS
LPR:ARB-FILE-UNLINK

LPR:AUDIT

LPR:AUDIT:CMD-FAILED
LPR:AUDIT:PORT
LPR:AUDIT:RESPONSE
LPR:AUDIT:CMD
LPR:AUDIT:C-CMD

LPR:INVALID

LPR:INVALID:C-NAME
LPR:INVALID:C-EMPTY
LPR:INVALID:EOL
LPR:INVALID:EOF
LPR:INVALID:D-EMPTY
LPR:INVALID:D-NAME
LPR:INVALID:REQUEST
LPR:INVALID:CMD-TRUNC
LPR:INVALID:LINE

LPR:OVERFLOW

LPR:OVERFLOW:CFILE
LPR:OVERFLOW:C-JOB
LPR:OVERFLOW:C-INDENT
LPR:OVERFLOW:C-CLASS
LPR:OVERFLOW:C-TITLE
LPR:OVERFLOW:CFILE-LEN
LPR:OVERFLOW:C-FORMAT
LPR:OVERFLOW:C-FONT
LPR:OVERFLOW:C-LENGTH
LPR:OVERFLOW:C-MAIL
LPR:OVERFLOW:C-NAME
LPR:OVERFLOW:C-WIDTH
LPR:OVERFLOW:C-HOST
LPR:OVERFLOW:C-BANNER
LPR:OVERFLOW:D-LENGTH
LPR:OVERFLOW:D-NAME
LPR:OVERFLOW:DFILE
LPR:OVERFLOW:C-SOURCE
LPR:OVERFLOW:C-SYMLINK
LPR:OVERFLOW:LINE
LPR:OVERFLOW:C-USER
LPR:OVERFLOW:LPD-EXPLOIT

MISC

MISC:WINS-COMMENDLG
MISC:HTRAN-PROXY-CONNECT-FAILED
MISC:KERIO-AUTH-OF
MISC:LINUX-KERNEL-ISCSI-BO
MISC:LLMNR-REVERSE-LOOKUP
MISC:OPENAFS-RPC-BO
MISC:WINS-BOF
MISC:SHELLSHOCK
MISC:LIBREOFICE-IMPRESS-RSM-RCE

MISC:PDF

MISC:PDF:INTEGER-OVERFLOW

MS-RPC

MS-RPC:EPDUMP-SCAN
MS-RPC:EPDUMP-SCAN-2
MS-RPC:MSRPC-ISYSACTIVATE-RACE
MS-RPC:ATSVC-RUNDLL
MS-RPC:SAMR-ACCESS-DENIED
MS-RPC:SAMR-ACCESS-REQUEST
MS-RPC:NOOP-SLIDE-RPC-REQ
MS-RPC:ADVTC-DATACORESVC-OF
MS-RPC:WRKST-DOS
MS-RPC:INDX-SVC-ACTIVE
MS-RPC:DCERPC-DOS3
MS-RPC:ATSVC-BIND
MS-RPC:NETSRVRDSKENUM
MS-RPC:PGP-SRV-PTR
MS-RPC:TREND-MICRO-RPC
MS-RPC:LAN-WORM-SPREAD
MS-RPC:MSGQU-FRNAME
MS-RPC:EXCHANGE-MEM
MS-RPC:BROADWIN-BOF
MS-RPC:NETRLOGONGETDMNINF-NULL
MS-RPC:ADVTC-WEBVRPCS-BOF
MS-RPC:MSRPC-HIGRCE
MS-RPC:HOST-INTEGRATION-RCE
MS-RPC:NTLM-RPCSS-DOS
MS-RPC:SNORT-EVAL-BOF
MS-RPC:ARNUDP-RPC-DOS
MS-RPC:SPOOLER-DLL-LOAD
MS-RPC:DCE-RPC-DNSSVR
MS-RPC:LLSSRV-RCE
MS-RPC:MSDTC-DOS
MS-RPC:MESSENGER-POPUP
MS-RPC:DCE-RPC-UUID-BIND
MS-RPC:MSRPC-HIGRCE-1
MS-RPC:TRND-MICRO-RPC
MS-RPC:ADVTC-WEBVRPCS-SVC-BOF
MS-RPC:ADVTC-WEBSVC-BO
MS-RPC:ADVANTECH-WEBACCESS-BOF
MS-RPC:MAL-DNS
MS-RPC:ADVTC-DATACORESVC-BOF

MS-RPC:DCOM

MS-RPC:DCOM:SVRNAME-2LONG
MS-RPC:DCOM:REMACT-OBJNAME-OF
MS-RPC:DCOM:REMACT
MS-RPC:DCOM:REMACT-UDP
MS-RPC:DCOM:EXPLOIT-3
MS-RPC:DCOM:EXPLOIT-2
MS-RPC:DCOM:LONG-FILE-OF
MS-RPC:DCOM:EXPLOIT

MS-RPC:ERR

MS-RPC:ERR:FRAG-LEN-TOO-BIG
MS-RPC:ERR:COUNT-TOO-LARGE
MS-RPC:ERR:CL-PTYPE-IN-CO-PDU
MS-RPC:ERR:CL-PAYLOAD-NOT-EMPTY
MS-RPC:ERR:EPM-INV-OP-NUM
MS-RPC:ERR:EPM-WRONG-RHS-LEN
MS-RPC:ERR:CO-PTYPE-IN-CL-PDU
MS-RPC:ERR:EPM-INV-LHS-LEN
MS-RPC:ERR:INV-AUTH-LEN
MS-RPC:ERR:EPM-INV-NUM-ENTRIES
MS-RPC:ERR:INV-PTYPE
MS-RPC:ERR:WRONG-FRAG
MS-RPC:ERR:EPM-WRONG-LHS-LEN
MS-RPC:ERR:EPM-WRONG-TOWER-LEN
MS-RPC:ERR:EPM-INV-RHS-LEN
MS-RPC:ERR:FRAG-BIGGER-THAN-NEG
MS-RPC:ERR:EPM-INV-TOWER-LEN
MS-RPC:ERR:SHORT-MSG
MS-RPC:ERR:FRAG-LEN-TOO-SMALL
MS-RPC:ERR:LEN-CONFLICT
MS-RPC:ERR:INV-AUTH-PAD-LEN
MS-RPC:ERR:RESPONSE-NO-REQ

MS-RPC:EVASION

MS-RPC:EVASION:DCE-LARGE-FRAG-2
MS-RPC:EVASION:BUFFERED-REQ
MS-RPC:EVASION:BLIND-BIND-ACK2
MS-RPC:EVASION:DCERPC-SMALL-REQ
MS-RPC:EVASION:FRAG2-SMALL
MS-RPC:EVASION:LARGE-FRAG-2
MS-RPC:EVASION:BLIND-BIND-ACK-2
MS-RPC:EVASION:SMALL-REQ-FRAG
MS-RPC:EVASION:BUFFERED-REQUEST
MS-RPC:EVASION:LARGE-FRAG-1
MS-RPC:EVASION:SMALL-FRAG
MS-RPC:EVASION:MULTI-HEADER-1

MS-RPC:INV

MS-RPC:INV:REQUEST-FROM-SERVER
MS-RPC:INV:RESPONSE-FROM-CLIENT
MS-RPC:INV:DNS-SVC
MS-RPC:INV:NETDDE-SVC
MS-RPC:INV:NETWARE-SVC
MS-RPC:INV:SPOOLSS-SVC
MS-RPC:INV:DCOM-SVC
MS-RPC:INV:WKSTA-SVC
MS-RPC:INV:PNP-SVC
MS-RPC:INV:MQ-SVC
MS-RPC:INV:LLSSRV-SVC
MS-RPC:INV:SRV-SVC
MS-RPC:INV:RRAS-SVC

MS-RPC:LSASS

MS-RPC:LSASS:MAL-OPCODE
MS-RPC:LSASS:NETWARE-CIFS-OF
MS-RPC:LSASS:OVERSIZED-FRAG
MS-RPC:LSASS:NTLM-DOS
MS-RPC:LSASS:MAL-OPCODE-2

MS-RPC:OF

MS-RPC:OF:WKST-SVC-PIPE
MS-RPC:OF:MS-DNS-RPC
MS-RPC:OF:MSG-QUEUE-1
MS-RPC:OF:WEBCLIENT
MS-RPC:OF:SPOOLSS-1
MS-RPC:OF:WKST-SVC-BO
MS-RPC:OF:SPOOLSS-3
MS-RPC:OF:MSG-QUEUE-2
MS-RPC:OF:MSG-QUEUE-3
MS-RPC:OF:NETDDE-SHARE
MS-RPC:OF:SRV-SVC-1
MS-RPC:OF:MSDTC
MS-RPC:OF:MQSVC
MS-RPC:OF:NWSPOOL-OF
MS-RPC:OF:RRAS
MS-RPC:OF:LOC-SVC-1
MS-RPC:OF:LOC-SVC-2
MS-RPC:OF:SRV-SVC-2
MS-RPC:OF:MESSENGER-1

NDMP

NDMP:SHORT-MSG

NETBIOS:ACCESS

NETBIOS:ACCESS:IPC-1
NETBIOS:ACCESS:C-DRIVE
NETBIOS:ACCESS:D-DRIVE
NETBIOS:ACCESS:SAMBA-CLIENT
NETBIOS:ACCESS:ADMIN

NETBIOS:AUDIT

NETBIOS:AUDIT:ACTIVE_ERR
NETBIOS:AUDIT:NAME_ERROR
NETBIOS:AUDIT:INV_HDR
NETBIOS:AUDIT:NBNAME-RES-ADDR

NETBIOS:DIR

NETBIOS:DIR:CD-DOTDOTDOT
NETBIOS:DIR:CD-DOTDOT

NETBIOS:DOS

NETBIOS:DOS:RFPOISON
NETBIOS:DOS:RFPARALYZE

NETBIOS:NBDS

NETBIOS:NBDS:BAD_LABEL_FORMAT
NETBIOS:NBDS:EMPTY_UDP_MSG
NETBIOS:NBDS:SHORT_MSG
NETBIOS:NBDS:FRAG_TRANS_RESP
NETBIOS:NBDS:BE-SERVERNAME-OF
NETBIOS:NBDS:MS-PRINT-SPOOL-FMT

NETBIOS:NBDS:INVALID

NETBIOS:NBDS:INVALID:MSG_TYPE
NETBIOS:NBDS:INVALID:DGM_LEN
NETBIOS:NBDS:INVALID:1STLVL_ENC
NETBIOS:NBDS:INVALID:LABEL_LEN
NETBIOS:NBDS:INVALID:HDR_FLGS
NETBIOS:NBDS:INVALID:PROTO

NETBIOS:NBDS:OF

NETBIOS:NBDS:OF:MSG
NETBIOS:NBDS:OF:NAME

NETBIOS:NBNS

NETBIOS:NBNS:TYPE_UNKNOWN
NETBIOS:NBNS:S2C_QUERY
NETBIOS:NBNS:SHORT_MSG
NETBIOS:NBNS:CLASS-UNKNOWN
NETBIOS:NBNS:NAME_TOO_LONG
NETBIOS:NBNS:C2S_AA_FLAG
NETBIOS:NBNS:C2S_RESPONSE
NETBIOS:NBNS:EMPTY-UDP-MSG
NETBIOS:NBNS:POINTER_LOOP

NETBIOS:NBNS:INVALID

NETBIOS:NBNS:INVALID:FIRST-ENC
NETBIOS:NBNS:INVALID:HDR-Z
NETBIOS:NBNS:INVALID:HDR-OPCODE
NETBIOS:NBNS:INVALID:NAME-FLGS
NETBIOS:NBNS:INVALID:RRNB-FLG
NETBIOS:NBNS:INVALID:PTR
NETBIOS:NBNS:INVALID:HDR-CNT
NETBIOS:NBNS:INVALID:LABEL-LEN

NETBIOS:NBNS:RESCODE

NETBIOS:NBNS:RESCODE:SVR_FAIL
NETBIOS:NBNS:RESCODE:REFUSED
NETBIOS:NBNS:RESCODE:NOT_IMPLTD
NETBIOS:NBNS:RESCODE:FORMAT_ERR
NETBIOS:NBNS:RESCODE:CONFLICT

NETBIOS:OVERFLOW

NETBIOS:OVERFLOW:MAILSLOT
NETBIOS:OVERFLOW:LENGTH-OF
NETBIOS:OVERFLOW:ASN-1-DER-OF
NETBIOS:OVERFLOW:ASN-1-BER

NETBIOS:WINS

NETBIOS:WINS:UPDATE-OF
NETBIOS:WINS:WPADWINS
NETBIOS:WINS:REPLICATION-PTR
NETBIOS:WINS:ISATAP-INFO-DIS-1
NETBIOS:WINS:ISATAP-INFO-DIS
NETBIOS:WINS:REPLICATION-PTR-U
NETBIOS:WINS:SRV-NAME-OF

NFS

NFS:UTILS-TCP-CONN-DOS
NFS:FREEBSD-REDDIR-MEM-COR
NFS:MS-WINDOWS-NFS-NULL-DOS
NFS:CAP-MKNOD
NFS:MS-WINDOWS-NFS-NULL-DOS2
NFS:BSD-MOUNT-DOS
NFS:TRIPWIRE-FORMAT-STRING

NFS:AUDIT

NFS:AUDIT:REQ-DENIED
NFS:AUDIT:MKNOD
NFS:AUDIT:UNKNOWN-VER
NFS:AUDIT:INVALID-XID
NFS:AUDIT:ROOT-ACCESS

NFS:ERR

NFS:ERR:VERSION-MISMATCH
NFS:ERR:LARGE-CRED
NFS:ERR:LARGE-FH
NFS:ERR:LONG-FILENAME
NFS:ERR:LONG-PATHNAME
NFS:ERR:LONG-NETNAME
NFS:ERR:SHORT-READ
NFS:ERR:WRONG-DIR

NFS:INFO

NFS:INFO:UNKNOWN-PROG

NFS:INVALID

NFS:INVALID:INVALID-PROC
NFS:INVALID:INVALID-DIR
NFS:INVALID:INVALID-AMASK
NFS:INVALID:INVALID-RSTAT
NFS:INVALID:INVALID-HOW
NFS:INVALID:BAD-CRED-LEN
NFS:INVALID:INVALID-FILETYPE
NFS:INVALID:INVALID-CMODE
NFS:INVALID:INVALID-EOF
NFS:INVALID:BAD-VERF-CRED

NFS:OVERFLOW

NFS:OVERFLOW:BUF-OVERFLOW
NFS:OVERFLOW:LINUX-ACL-OF-DOS
NFS:OVERFLOW:LINUX-ACL-OF-DOS2
NFS:OVERFLOW:XLOG-1BYTE-OF

NNTP

NNTP:INTERNETNEWS-NULL-PATH-DOS

NNTP:AUDIT

NNTP:AUDIT:NESTED-REQ
NNTP:AUDIT:UNKNOWN-CMD
NNTP:AUDIT:NESTED-REPLY

NNTP:ERR

NNTP:ERR:INVALID-CMD

NNTP:INN

NNTP:INN:INND-OF1
NNTP:INN:INND-OF2

NNTP:NN

NNTP:NN:NN-FMTSTR1

NNTP:OVERFLOW

NNTP:OVERFLOW:LINE-OVERFLOW
NNTP:OVERFLOW:NNTP-XHDR
NNTP:OVERFLOW:XPAT-PATTERN
NNTP:OVERFLOW:INN-CONTROL-MSG
NNTP:OVERFLOW:OUTLOOK-NNTP-OF

NNTP:VULN

NNTP:VULN:ISC-2-2-2

NTP

NTP:PEER_STRATUM_INCOMPATI
NTP:CTL_ERR_RSP_SEEN
NTP:RECVD_UNEXPECTED_PKT
NTP:PASV_NOT_DISSOLVED
NTP:PEER_MODE_INCOMPAT
NTP:EXCEEDED_REF_CLKAGE
NTP:MODE_STRATUM_ALTERED
NTP:NTP-READVAR
NTP:TRAFFIC
NTP:CRYPTO-NAK-AUTH-BYPASS
NTP:MUL-NTP-DAEMON-AUTOKEY-BOF
NTP:PIDFILE-DRIFTFILE-OVERWRITE
NTP:MULTIPLE-STACK-OVERFLOW
NTP:MODE7-DOS
NTP:MONLIST-REQUEST
NTP:NTP-NAK-DOS
NTP:MONLIST-REQUEST-FLOOD

NTP:ERROR

NTP:ERROR:INVALID_MODE
NTP:ERROR:CTL_INV_PEER_SELECT
NTP:ERROR:DATA_FIELD_TOO_SHORT
NTP:ERROR:CTL_INV_CLKSTATUS
NTP:ERROR:SERVER_SYNCH_ALARM
NTP:ERROR:CTL_INV_PEER_STATUS
NTP:ERROR:CTL_INVALID_CLK_SRC
NTP:ERROR:CTL_INV_PEER_EVCODE
NTP:ERROR:CTL_INVALID_ERRCODE
NTP:ERROR:CTL_VAR_NAME_2LONG
NTP:ERROR:MSG_WITHIN_POLL_INTVL
NTP:ERROR:MAX_STRATUM_EXCEEDED
NTP:ERROR:MSG_TOO_SHORT
NTP:ERROR:CTL_INVALID_EVCODE
NTP:ERROR:CTL_INVALID_OPCODE
NTP:ERROR:CTL_VAR_VALUE_2LONG
NTP:ERROR:CTL_NONSTD_VAR_NAME
NTP:ERROR:INVALID_DISPERSION
NTP:ERROR:MSG_TOO_LONG

NTP:INVALID

NTP:INVALID:CTL_CLKERR_RPRTED
NTP:INVALID:CTL_DATA_MULTI_PKT
NTP:INVALID:TIMESTMP_NOT_MATCH

OS:AIX

OS:AIX:PDNSD-OF

OS:LINUXX86

OS:LINUXX86:BOOTP-OF
OS:LINUXX86:SCTP-CHUNKLESS
OS:LINUXX86:LPRNG-OF
OS:LINUXX86:NTPDX-OF
OS:LINUXX86:MOUNTD-OF-3
OS:LINUXX86:NTALKD-OF
OS:LINUXX86:MOUNTD-OF-1
OS:LINUXX86:POP2-OF-1
OS:LINUXX86:MOUNTD-OF-2
OS:LINUXX86:POP2-OF-2

OS:SCOX86

OS:SCOX86:CALSERVER-OF

OS:SOLARISX86

OS:SOLARISX86:NLPS-OF

P2P

P2P:UNIFS

P2P:ARES

P2P:ARES:UDP-PEER-CHECK
P2P:ARES:PEER-CONNECT-UDP
P2P:ARES:PEER-CONNECT-TCP

P2P:AUDIT

P2P:AUDIT:GNUTELLA-SVR-RESP
P2P:AUDIT:GNUTELLA-HDR-ATRB
P2P:AUDIT:GNUTELLA-PING-LEN
P2P:AUDIT:GNUTELLA-BYE-TTL
P2P:AUDIT:GNUTELLA-PONG-LEN
P2P:AUDIT:GNUTELLA-LINE
P2P:AUDIT:GNUTELLA-HTTP-GET
P2P:AUDIT:GNUTELLA-RTABLE-UPD
P2P:AUDIT:GNUTELLA-UNSUP-VER
P2P:AUDIT:GNUTELLA-MESSAGE
P2P:AUDIT:GNUTELLA-EOL
P2P:AUDIT:GNUTELLA-OK-RESP
P2P:AUDIT:GNUTELLA-MSG
P2P:AUDIT:GNUTELLA-PUSH-LEN
P2P:AUDIT:GNUTELLA-QUERY
P2P:AUDIT:GNUTELLA-TTL
P2P:AUDIT:GNUTELLA-SEARCH
P2P:AUDIT:SE-HUB-LOOK
P2P:AUDIT:SOFTETHER-SSH

P2P:BEARSHARE

P2P:BEARSHARE:UA
P2P:BEARSHARE:DJ-SERVICE
P2P:BEARSHARE:LOGIN
P2P:BEARSHARE:FILE-XFER
P2P:BEARSHARE:SEARCH

P2P:BITTORRENT

P2P:BITTORRENT:BT-ENCRYPTED
P2P:BITTORRENT:TRACKER-SCRAPE
P2P:BITTORRENT:TRACKER-QUERY
P2P:BITTORRENT:BT-SEARCH
P2P:BITTORRENT:HANDSHAKE
P2P:BITTORRENT:BT-TRACKER-DOS
P2P:BITTORRENT:CONTENT-TYPE
P2P:BITTORRENT:TRACKER-QUERY-2
P2P:BITTORRENT:KICKASSTORRENTS
P2P:BITTORRENT:DHT4
P2P:BITTORRENT:BITCOMET-CHUNK
P2P:BITTORRENT:DOT-TORRENT
P2P:BITTORRENT:UTORRENT-UDP
P2P:BITTORRENT:DHT
P2P:BITTORRENT:TRACKER-UDP
P2P:BITTORRENT:BTCLIENT-UA

P2P:DC

P2P:DC:HUB-LOGIN
P2P:DC:ACTIVE
P2P:DC:DNS-QUERY

P2P:EDONKEY

P2P:EDONKEY:S2C-PONG-RESPONSE
P2P:EDONKEY:CLIENT-DOS-ATK
P2P:EDONKEY:FILE-DOWNLOAD-REQ
P2P:EDONKEY:CLIENT-VER-CHECK
P2P:EDONKEY:FILE-SEARCH-REQ
P2P:EDONKEY:OTHER-SVR-INFO-REQ
P2P:EDONKEY:CLIENT-HELLO
P2P:EDONKEY:FILE-SHARES
P2P:EDONKEY:C2S-PING-BEACON
P2P:EDONKEY:PORT-53

P2P:EMULE

P2P:EMULE:PLUS-VER-CHECK
P2P:EMULE:DECODE16-OVERFLOW
P2P:EMULE:VERYCD
P2P:EMULE:KADEMLIA-KAD

P2P:FREENET

P2P:FREENET:CONNECTION

P2P:GNUCLEUSLAN

P2P:GNUCLEUSLAN:CONNECT
P2P:GNUCLEUSLAN:BROADCAST

P2P:GNUTELLA

P2P:GNUTELLA:CONNECT
P2P:GNUTELLA:CONNECTION-OK-V06
P2P:GNUTELLA:UDP-TRAFFIC
P2P:GNUTELLA:LIMEWIRE-DIR-TRANS
P2P:GNUTELLA:X-GNUTELLA
P2P:GNUTELLA:DOWNLOAD
P2P:GNUTELLA:FILE-XCH-TCP
P2P:GNUTELLA:URN-DOWNLOAD-REQ

P2P:GROKSTER

P2P:GROKSTER:GROKSTER

P2P:KAZAA

P2P:KAZAA:FILE-HASH
P2P:KAZAA:FILE-REQ
P2P:KAZAA:FILE-SEND
P2P:KAZAA:PEER-REQ
P2P:KAZAA:UDP-PROBE
P2P:KAZAA:WEB-CONN

P2P:LIMEWIRE

P2P:LIMEWIRE:FREEWIRE

P2P:MISC

P2P:MISC:XOLOX
P2P:MISC:GLUZ
P2P:MISC:IMESH
P2P:MISC:P2P-NETWORKING
P2P:MISC:PHEX
P2P:MISC:SOULSEEK
P2P:MISC:KUGOO-LOGIN
P2P:MISC:OPENFT
P2P:MISC:PEERENABLE
P2P:MISC:POCO-CONNECT
P2P:MISC:POCO-UDP
P2P:MISC:MUTE
P2P:MISC:100BAO
P2P:MISC:FREECAST
P2P:MISC:HOTLINE
P2P:MISC:KUGOO
P2P:MISC:APPLEJUICE
P2P:MISC:MANOLITO
P2P:MISC:PPLIVE-TRACKER-OFF-REQ
P2P:MISC:MEDIASEEK-PL-CLIENT
P2P:MISC:MANOLITO-DOWNLOAD
P2P:MISC:PPLIVE-HTTP-CLIENT-REQ

P2P:MLDONKEY

P2P:MLDONKEY:CLIENT-ACTIVE

P2P:MORPHEUS

P2P:MORPHEUS:MORPHEUS

P2P:NAPSTER

P2P:NAPSTER:UPLOAD-REQ-8888
P2P:NAPSTER:LOGIN-8888
P2P:NAPSTER:SERVER-LOGIN
P2P:NAPSTER:LOGIN-7777
P2P:NAPSTER:UPLOAD-REQ-7777
P2P:NAPSTER:USER-LOGIN-8888
P2P:NAPSTER:DATA-7777
P2P:NAPSTER:DATA-6666
P2P:NAPSTER:DATA-4444
P2P:NAPSTER:DATA-8888
P2P:NAPSTER:DATA-6699
P2P:NAPSTER:DATA-5555
P2P:NAPSTER:DOWNLOAD-7777
P2P:NAPSTER:DOWNLOAD-8888
P2P:NAPSTER:USER-LOGIN-7777

P2P:OVERNET

P2P:OVERNET:CONNECTED
P2P:OVERNET:PEER-DISCOVERY
P2P:OVERNET:KEEP-ALIVE
P2P:OVERNET:FILE-SHARES
P2P:OVERNET:KADEMILIA-OVERNET
P2P:OVERNET:CONNECT-REQ

P2P:SHAREAZA

P2P:SHAREAZA:CLIENT-ACTIVE

P2P:VUZE

P2P:VUZE:TIVO-DISCO-BEACON
P2P:VUZE:BIN-DHT
P2P:VUZE:USER-AGENT
P2P:VUZE:HTTP-CLIENT-MODE
P2P:VUZE:HTTP-RPC-ACTIVITY

P2P:WINMX

P2P:WINMX:CLIENT-VER-CHK-DNS
P2P:WINMX:CLIENT-VER-CHK
P2P:WINMX:CLIENT-MATCHMAKE-DNS
P2P:WINMX:CLIENT-NET-PRB-DNS
P2P:WINMX:SERVER-CONNECT-OK
P2P:WINMX:SERVER-SUPERNODE-LIST
P2P:WINMX:CLIENT-NET-PROBE
P2P:WINMX:DOWNLOAD

P2P:WINNY

P2P:WINNY:PEER-CONNECT

P2P:XUNLEI

P2P:XUNLEI:OVER-HTTP
P2P:XUNLEI:STARTUP
P2P:XUNLEI:QUERY
P2P:XUNLEI:MESSSAGE
P2P:XUNLEI:DOWNLOAD
P2P:XUNLEI:UDP

POP3

POP3:EXTERNAL_MESSAGE
POP3:EMAIL-SCRIPT
POP3:EUDORA-MAIL-CLIENT
POP3:APPLE-ICAL-PARAM-BO
POP3:APPLE-ICAL-ATTACH-DOS
POP3:MAL-LOTUS-APPLIX
POP3:SUSPICIOUS-HEADER
POP3:MS-OUTLOOK-EXP-MHTML-CE
POP3:SUSPICIOUS-COMM
POP3:MS-WORD-BULLET-MC
POP3:LOTUS-DOC-VIEWER
POP3:MS-OUTLOOK-2003-OBJ-SEC-BS
POP3:IBM-NOTES-PNG-OVF
POP3:POP-SCRIPT-TAG
POP3:OUTLOOK-OBJECT-TAG

POP3:AUDIT

POP3:AUDIT:INVALID-FILENAME
POP3:AUDIT:EMPTY-BOUNDARY
POP3:AUDIT:ILLEGAL-FILENAME
POP3:AUDIT:DUPLICATE-HEADER
POP3:AUDIT:REQ-INVALID-STATE
POP3:AUDIT:LOGIN-FAILED
POP3:AUDIT:REQ-UNKNOWN-CMD
POP3:AUDIT:REQ-NESTED-REQUEST
POP3:AUDIT:COMMAND-FAILED

POP3:DOS

POP3:DOS:WINGATE
POP3:DOS:MDAEMON-POP-DOS
POP3:DOS:INWEB-HELO-DOS
POP3:DOS:ULTRAISO-CUE-BO

POP3:ERROR

POP3:ERROR:UNFINISHED_MULTIPART
POP3:ERROR:BOUNDARY_MISSING
POP3:ERROR:PARTIAL_MESSAGE
POP3:ERROR:INVALID_BASE64_CHAR
POP3:ERROR:TOO_MANY_BOUNDARIES
POP3:ERROR:DUPLICATE_BOUNDARY
POP3:ERROR:ILLEGAL_MIME_ENCODE
POP3:ERROR:ILLEGAL_ENCODE

POP3:EXT

POP3:EXT:DOUBLE-EXTENSION
POP3:EXT:DOT-SCR
POP3:EXT:DOT-VBS
POP3:EXT:DOT-SHS
POP3:EXT:DOT-EXE
POP3:EXT:DOT-PIF
POP3:EXT:DOT-MDE
POP3:EXT:DOT-WSH
POP3:EXT:DOT-BAT
POP3:EXT:DOT-MSP
POP3:EXT:DOT-VBE
POP3:EXT:DOT-SCT
POP3:EXT:DOT-PCD
POP3:EXT:DOT-REG
POP3:EXT:DOT-VB
POP3:EXT:DOT-WSC
POP3:EXT:DOT-JSE
POP3:EXT:DOT-INS
POP3:EXT:DOT-CHM
POP3:EXT:DOT-ADE
POP3:EXT:DOT-ADP
POP3:EXT:DOT-CPL
POP3:EXT:DOT-CRT
POP3:EXT:DOT-OCX
POP3:EXT:DOT-MDB
POP3:EXT:DOT-386
POP3:EXT:DOT-LNK
POP3:EXT:DOT-BAS
POP3:EXT:DOT-INF
POP3:EXT:DOT-HTA
POP3:EXT:DOT
POP3:EXT:DOT-CMD
POP3:EXT:DOT-URL
POP3:EXT:DOT-MSC
POP3:EXT:DOT-ISP
POP3:EXT:DOT-JS
POP3:EXT:DOT-WSZ-WAL
POP3:EXT:DOT-COM
POP3:EXT:DOT-ZIP
POP3:EXT:DOT-HLP
POP3:EXT:DOT-MSI
POP3:EXT:DOT-WSF
POP3:EXT:DOT-GRP
POP3:EXT:DOT-WMF
POP3:EXT:DOT-HT

POP3:FAILURE

POP3:FAILURE:BRUTE-FORCE

POP3:OUTLOOK

POP3:OUTLOOK:LOCAL-LINK
POP3:OUTLOOK:HRALIGN-OF
POP3:OUTLOOK:CRAFTED-RESP
POP3:OUTLOOK:MHTML-CDI
POP3:OUTLOOK:TROUBLE-QUERY-OF
POP3:OUTLOOK:MULTIPLE-FROM
POP3:OUTLOOK:OL-IFRAME-EXEC

POP3:OVERFLOW

POP3:OVERFLOW:LINE
POP3:OVERFLOW:PASS
POP3:OVERFLOW:FILENAME2LONG
POP3:OVERFLOW:BOUNDARY_OVERFLOW
POP3:OVERFLOW:TXTLINE_2LONG
POP3:OVERFLOW:CONTENT_NAME
POP3:OVERFLOW:COMMAND
POP3:OVERFLOW:APOP
POP3:OVERFLOW:USER
POP3:OVERFLOW:BSD-OFLOW-1
POP3:OVERFLOW:LINUX-OFLOW
POP3:OVERFLOW:QPOP-OF2
POP3:OVERFLOW:QPOP-OF3
POP3:OVERFLOW:PCCILLIN-POP-OF
POP3:OVERFLOW:ERR-RPLY-OF
POP3:OVERFLOW:HTTP-LINK-OF
POP3:OVERFLOW:AXIGEN-FS
POP3:OVERFLOW:QPOP-OF4
POP3:OVERFLOW:BSD-OFLOW-2
POP3:OVERFLOW:SCO-POP3-OVERFLOW
POP3:OVERFLOW:CURL-LIBCURL-BO
POP3:OVERFLOW:EUDORA-URL-BOF

POP3:REQERR

POP3:REQERR:REQ-SYNTAX-ERROR
POP3:REQERR:REQ-MESSAGE-NUMBER
POP3:REQERR:REQ-BINARY-DATA

POP3:USER

POP3:USER:ROOT

PORTMAPPER

PORTMAPPER:GETADDR-RESP-MAL-UA

PORTMAPPER:AUDIT

PORTMAPPER:AUDIT:ROOT-ACCESS

PORTMAPPER:ERR

PORTMAPPER:ERR:WRONG-DIR
PORTMAPPER:ERR:LONG-NETNAME
PORTMAPPER:ERR:LARGE-CRED
PORTMAPPER:ERR:SHORT-READ

PORTMAPPER:INFO

PORTMAPPER:INFO:UNSET-PROC
PORTMAPPER:INFO:DUMP_PROC
PORTMAPPER:INFO:SET-PROC
PORTMAPPER:INFO:NULL-PROC
PORTMAPPER:INFO:CALLIT-PROC
PORTMAPPER:INFO:PORTMAP-DUMP

PORTMAPPER:INVALID

PORTMAPPER:INVALID:BAD-CRED-LEN
PORTMAPPER:INVALID:BAD-VERF-CRD

PROTOCOLS:PORT

PROTOCOLS:PORT:POP3
PROTOCOLS:PORT:FTP
PROTOCOLS:PORT:TELNET
PROTOCOLS:PORT:SIP
PROTOCOLS:PORT:SSH
PROTOCOLS:PORT:HTTP

PROTOCOLS:TRAFFIC

PROTOCOLS:TRAFFIC:NOT-SNMP
PROTOCOLS:TRAFFIC:NOT-DNS-TCP
PROTOCOLS:TRAFFIC:NOT-DNS-UDP
PROTOCOLS:TRAFFIC:NOT-DHCP
PROTOCOLS:TRAFFIC:NOT-IMAP
PROTOCOLS:TRAFFIC:NOT-TELNET
PROTOCOLS:TRAFFIC:NOT-HTTP
PROTOCOLS:TRAFFIC:NOT-FTP
PROTOCOLS:TRAFFIC:NOT-SMTP
PROTOCOLS:TRAFFIC:NOT-NTP
PROTOCOLS:TRAFFIC:NOT-SYSLOG
PROTOCOLS:TRAFFIC:NOT-SSH
PROTOCOLS:TRAFFIC:NOT-IKE
PROTOCOLS:TRAFFIC:NOT-POP3

RADIUS

RADIUS:ACSREQ_DISALLOWD_ATTR
RADIUS:ACSREQ_INV_NUM_ATTRS
RADIUS:MSG_TOO_SHORT
RADIUS:ACCCHAL_INV_NUM_ATTRS
RADIUS:ACC_ACC_DISALOWD_ATTR
RADIUS:INVALID_MSG_LENGTH
RADIUS:ACCREQ_ATTR_MISSING
RADIUS:ACCREQ_INV_NUM_ATTRS
RADIUS:ACCREJ_INV_NUM_ATTRS
RADIUS:INVALID_ATTR_LENGTH
RADIUS:ACCREJ_DISALLOWD_ATTR
RADIUS:ACCREQ_DISALLOWD_ATTR
RADIUS:INVALID_MSG_CODE
RADIUS:RADIUS-BRUTE-FORCE
RADIUS:ACCREP_DISALLOWD_ATTR
RADIUS:INCONSISTANT_LENGTH
RADIUS:ACCCHA_DISALLOWD_ATTR
RADIUS:MALFORMED_VENDOR_ATTR
RADIUS:ACC_ACCEPT_INV_NATTRS
RADIUS:INVALID_ATTR_TYPE
RADIUS:CLIENT-CERT-VERIF-BO
RADIUS:FS-INJ
RADIUS:USR-OF
RADIUS:TYPE-DOS
RADIUS:USR-AUTHENTICATION
RADIUS:MS-NPS-DOS
RADIUS:FREERADIUS-DOS

REXEC:AUDIT

REXEC:AUDIT:PARAM-NOT-OK
REXEC:AUDIT:ILL-ERR-PORT

REXEC:OVERFLOW

REXEC:OVERFLOW:USERNAME
REXEC:OVERFLOW:PASSWORD
REXEC:OVERFLOW:COMMAND

RLOGIN:AUDIT

RLOGIN:AUDIT:PARAM-NOT-OK
RLOGIN:AUDIT:REQ-ILLEGAL-PORT

RLOGIN:FAILURE

RLOGIN:FAILURE:LOGIN-FAILURE

RLOGIN:INFO

RLOGIN:INFO:RLOGIN-LOGIN

RLOGIN:OVERFLOW

RLOGIN:OVERFLOW:USERNAME
RLOGIN:OVERFLOW:TERMINAL
RLOGIN:OVERFLOW:LONG-ARGS

RLOGIN:REQERR

RLOGIN:REQERR:DATA-IN-1ST-LINE

RLOGIN:USER

RLOGIN:USER:USER-BIN
RLOGIN:USER:USER-ROOT
RLOGIN:USER:USER-ECHO
RLOGIN:USER:ROOT-ACCESS

RPC

RPC:XDR-INTEGER-OVERFLOW
RPC:NULL-TADDR2UADDR
RPC:PCNFSD-FS
RPC:WDB-AGENT
RPC:SOL-CDE-CALENDAR-MGR
RPC:CALL-IT-OF
RPC:SUN-SOLARIS-SADMIND-BO
RPC:KADMIND-KLOG
RPC:SUN-SOLARIS-SADMIND-ADM
RPC:RLPR-FS
RPC:KADMIND-RENAME
RPC:EMC-LEGATO-NW-OF
RPC:KADMIND-OF
RPC:YPUPDATED-CMD-INJ
RPC:RPCBIND-CALLIT-DOS
RPC:KRB5-LIB-OF
RPC:AUTOMOUNTD-OF

RPC:AUDIT

RPC:AUDIT:REQUEST-DENIED
RPC:AUDIT:GETPORT-FAILED
RPC:AUDIT:INVALID-DIR
RPC:AUDIT:REQ-INVALID-XID

RPC:FAILURE

RPC:FAILURE:UNSET-FAILED
RPC:FAILURE:CALLIT-FAILED
RPC:FAILURE:SET-FAILED

RPC:REQERR

RPC:REQERR:REQ-INVALID-PROC

RPC:RPC.CMSD

RPC:RPC.CMSD:RPC-CMSD-OVERFLOW

RPC:RPC.MOUNTD

RPC:RPC.MOUNTD:XLINK-IOF
RPC:RPC.MOUNTD:SHOWMOUNT-TCP
RPC:RPC.MOUNTD:SHOWMOUNT
RPC:RPC.MOUNTD:SHOWMOUNT-UDP
RPC:RPC.MOUNTD:LINUX-MOUNTD-OBO

RPC:RPC.SADMIND

RPC:RPC.SADMIND:ADM-METHOD-TRAV
RPC:RPC.SADMIND:SADMIND-OF

RPC:RPC.SNMPXDMID

RPC:RPC.SNMPXDMID:OVERFLOW

RPC:RPC.STATD

RPC:RPC.STATD:STATD-FMT-STR5
RPC:RPC.STATD:STATD-FMT-STR4
RPC:RPC.STATD:AUTOMOUNT-TLI
RPC:RPC.STATD:STATD-FMT-STR2
RPC:RPC.STATD:RPC-STATD-OF
RPC:RPC.STATD:STATD-FMT-STR1

RPC:RPC.TTDBSERVER

RPC:RPC.TTDBSERVER:TT-REAL-PATH
RPC:RPC.TTDBSERVER:TT-MAL-FS-2
RPC:RPC.TTDBSERVER:TT-MAL-FS
RPC:RPC.TTDBSERVER:TT-MAL-OF
RPC:RPC.TTDBSERVER:TT-MAL-FS-3

RPC:RPC.WALLD

RPC:RPC.WALLD:SYSLOG-FS
RPC:RPC.WALLD:WALLD-ERR-FTSTR-2

RPC:RWHOD

RPC:RWHOD:RWHOD-NULL-INJ

RSH:AUDIT

RSH:AUDIT:PARAM-OK
RSH:AUDIT:REQ-ILLEGAL-PORT
RSH:AUDIT:PARAM-NOT-OK
RSH:AUDIT:REQ-ILLEGAL-ERR-PORT

RSH:FAILURE

RSH:FAILURE:LOGIN-FAILURE

RSH:OVERFLOW

RSH:OVERFLOW:USERNAME
RSH:OVERFLOW:COMMAND
RSH:OVERFLOW:WINRSHD-OF

RSH:USER

RSH:USER:USER-ROOT
RSH:USER:USER-BIN
RSH:USER:USER-ECHO

RSYNC

RSYNC:EXCLUDE-OF
RSYNC:DIR-TRAV
RSYNC:CHUNK-OF

RTSP

RTSP:PLAY
RTSP:UBIQUITI-AIRCAM-BOF1
RTSP:SET-PARAMETER
RTSP:SETUP-HDR
RTSP:EMPTY-HEADER
RTSP:SETUP
RTSP:CVE-2013-2569-RCE
RTSP:HELIX-RN5AUTH
RTSP:UBIQUITI-AIRCAM-BOF
RTSP:VLC-BO
RTSP:DESCRIBE-BOF
RTSP:SETUP-EMPTY
RTSP:MS-MEDIA-PLAYER-MC
RTSP:MAL-RTSP
RTSP:REALNETWORKS-HELIX-DOS

RTSP:EXPLOIT

RTSP:EXPLOIT:INVALID-PORT

RTSP:OVERFLOW

RTSP:OVERFLOW:LINE-OF
RTSP:OVERFLOW:STREAMCOUNT
RTSP:OVERFLOW:LOADTEST-PW-OF
RTSP:OVERFLOW:TRANSPORT-OF
RTSP:OVERFLOW:DESCRIBE-OF
RTSP:OVERFLOW:RTSP-CONTENT

RTSP:REALSERVER

RTSP:REALSERVER:REAL-SETUP-OF2
RTSP:REALSERVER:REAL-SETUP-OF3
RTSP:REALSERVER:REAL-SETUP-OF4
RTSP:REALSERVER:MAL-HEADER
RTSP:REALSERVER:REAL-SETUP-OF1

RUSERS:AUDIT

RUSERS:AUDIT:UNKNOWN-VER
RUSERS:AUDIT:INVALID-XID
RUSERS:AUDIT:ROOT-ACCESS
RUSERS:AUDIT:REQ-DENIED

RUSERS:ERR

RUSERS:ERR:LONG-NETNAME
RUSERS:ERR:SHORT-READ
RUSERS:ERR:LARGE-CRED
RUSERS:ERR:WRONG-DIR

RUSERS:INFO

RUSERS:INFO:UNKNOWN-PROG

RUSERS:INVALID

RUSERS:INVALID:BAD-VERF-CRED
RUSERS:INVALID:INVALID-DIR
RUSERS:INVALID:INVALID-PROC
RUSERS:INVALID:BAD-CRED-LEN

RUSERS:OVERFLOW

RUSERS:OVERFLOW:HOST-OVERFLOW
RUSERS:OVERFLOW:USER-OVERFLOW
RUSERS:OVERFLOW:DEV-OVERFLOW

SCADA

SCADA:SIELCO-SISTEMI-WINLOG-BOF
SCADA:SIELCO-SISTEMI-WINLOG-BO1
SCADA:SIEMENS-SIMATIC-WINCC-BO
SCADA:EKTRON-CMS-XSLT-RCE
SCADA:WWSUITE
SCADA:KINGVIEW-HISTORYSRV-OC3
SCADA:SIEMENS-SIMATIC-S7-300
SCADA:SIEMENS-SIMATIC-CPU-RCE
SCADA:SIEMENS-CSSERVICE-BOF
SCADA:IOSERVER-INFO-DISCLSURE
SCADA:CITECT-OF
SCADA:MEASURESOFT-SCADAPRO-RCE
SCADA:DATAC-REALWIN-OF
SCADA:ICONICS-GENBROKER
SCADA:CODESYS-HEAP-OVF
SCADA:CODESYS-GATEWAY-SERVICE
SCADA:3S-CODESYS-GWS-DIRTRVRSL
SCADA:3S-CODESYS-DIR-TRAVERSAL
SCADA:CIP-UNAUTH-CMDEXEC
SCADA:ABB-MICROSCADA-BOF
SCADA:CODESYS-OPCODE03EF
SCADA:KINGVIEW-BOF
SCADA:SIELCO-SISTEMI-WINLOGPRO
SCADA:CODESYS-BO
SCADA:7T-INTERACTIVE-IGSS-OF
SCADA:CODESYS-MEM-ERR
SCADA:REALWIN
SCADA:SCHNEIDER-ELEC-INTER-BOF
SCADA:ABB-WSERVER-CMD-EXEC
SCADA:SIEMENS-TECNO-VRN-OF
SCADA:7T-INTERACTIVE-DC-OF
SCADA:CODESYS-HEAP-OVF-1
SCADA:SCHNEIDER-ELE-INT-BO
SCADA:SCHNIDER-DB-INFO-DIS
SCADA:WINLOG-TCP-OF
SCADA:SUNWAY-FORCECONTROL-OF
SCADA:SIEMENS-SIMATIC-HMILOAD
SCADA:DATAC-REALWIN-MULT-BOF
SCADA:YOKOGAWA-STACK-OF
SCADA:CODESYS-CONTROL-SERVICE
SCADA:WELLINTECH-KING-OF
SCADA:CODESYS-GATEWAY-DOS

SCADA:DNP3

SCADA:DNP3:WARM-RESTART
SCADA:DNP3:COLD-RESTART
SCADA:DNP3:RESPONSE-DOS
SCADA:DNP3:DISABLE-RESP
SCADA:DNP3:STOP
SCADA:DNP3:READ
SCADA:DNP3:BROADCAST
SCADA:DNP3:MISC-REQ
SCADA:DNP3:NON-DNP3
SCADA:DNP3:WRITE

SCADA:ICCP

SCADA:ICCP:INVALID-TPDU
SCADA:ICCP:BUFFER-SIZE
SCADA:ICCP:INVALID-VERSION
SCADA:ICCP:WRONG-DT-PARAMETER
SCADA:ICCP:WRONG-AB-PARAMETER
SCADA:ICCP:UNSUPPORTED-SERVICE
SCADA:ICCP:WRONG-FN-PARAMETER
SCADA:ICCP:CN-INVALID
SCADA:ICCP:REASON-CODE-LENGTH
SCADA:ICCP:WRONG-CN-PARA
SCADA:ICCP:UNSUPPORTED-TPDU
SCADA:ICCP:DISCONNECT-CODE
SCADA:ICCP:CN-INVALID-LENGTH

SCADA:IEC104

SCADA:IEC104:MALFORMED-MESSAGE
SCADA:IEC104:SESSION
SCADA:IEC104:INVALID-UDP-MSG
SCADA:IEC104:INVALID-START-TAG
SCADA:IEC104:SHORT-MSG
SCADA:IEC104:MESSAGE-TYPEU-FN
SCADA:IEC104:SESSION-ALT-PORT
SCADA:IEC104:MESSAGE-OVERFLOW
SCADA:IEC104:TYPE-I
SCADA:IEC104:TYPE-S
SCADA:IEC104:TYPE-U

SCADA:MODBUS

SCADA:MODBUS:TRAILING-DATA
SCADA:MODBUS:BAD-PROTO-ID
SCADA:MODBUS:UNDERFLOW
SCADA:MODBUS:INVALID-UNI-ID
SCADA:MODBUS:SHORT-PDU
SCADA:MODBUS:OVERLONG-PDU
SCADA:MODBUS:NOT-MODBUS
SCADA:MODBUS:TRI-COIL-DOS
SCADA:MODBUS:BUSY-EXCEPTION
SCADA:MODBUS:LISTEN-ONLY
SCADA:MODBUS:SLAVE-ID
SCADA:MODBUS:DOS
SCADA:MODBUS:CLEAR
SCADA:MODBUS:READ-ID
SCADA:MODBUS:LENGTH
SCADA:MODBUS:INVALID-HEADER
SCADA:MODBUS:WRITE
SCADA:MODBUS:READ
SCADA:MODBUS:INPUT-INT-OF
SCADA:MODBUS:OPC-SVR-HEAP-CORR
SCADA:MODBUS:GALIL-MODBUS-DOS

SCAN

SCAN:DARKD0RK3R-XSS
SCAN:ACUNETIX
SCAN:MFS-PROBE
SCAN:DARKD0RK3R-LFI
SCAN:W3AF
SCAN:BREAKINGPOINT-HTTP
SCAN:DIRBUSTER-UA
SCAN:PYSMBLIB
SCAN:MASSCAN-UA
SCAN:PHP-CGI-RCE-ACTIVITY
SCAN:OPENVAS-UA
SCAN:MUIEBLACKCAT-TOOL

SCAN:ADM

SCAN:ADM:FTP-SCAN

SCAN:AMAP

SCAN:AMAP:FTP-SCAN
SCAN:AMAP:SAP-R3-ON-SSH
SCAN:AMAP:SAP-R3-ON-HTTP
SCAN:AMAP:AMAP-USER
SCAN:AMAP:SAP-R3-ON-SMTP
SCAN:AMAP:SSL-SCAN

SCAN:APPDETECTIVE

SCAN:APPDETECTIVE:HTTPS
SCAN:APPDETECTIVE:USER-AGENT

SCAN:AUDIT

SCAN:AUDIT:NBSTAT-QUERY
SCAN:AUDIT:ARACHNI-WEB-SCANNER
SCAN:AUDIT:IKE-TOOL-SCAN

SCAN:CANVAS

SCAN:CANVAS:NETWORKER-3
SCAN:CANVAS:LINUXSNMP
SCAN:CANVAS:ESERV
SCAN:CANVAS:TIVOLI3
SCAN:CANVAS:INGRESS
SCAN:CANVAS:NOVELL2
SCAN:CANVAS:FEDORA4
SCAN:CANVAS:WORDMAIL3
SCAN:CANVAS:HELIUM-AGENT
SCAN:CANVAS:MAILENABLE
SCAN:CANVAS:HELIUM-AGENT-1
SCAN:CANVAS:HELIUM-AGENT-2

SCAN:CERBERUS

SCAN:CERBERUS:SMTP
SCAN:CERBERUS:FTP
SCAN:CERBERUS:HTTP

SCAN:CORE

SCAN:CORE:DNS-STD-QUERY
SCAN:CORE:EXPLOIT-UNPACK
SCAN:CORE:OPENSSH-CHANNEL
SCAN:CORE:JPEG-GDI-VGX-EXPLOIT
SCAN:CORE:AGENT-LOAD-WIN
SCAN:CORE:EXPLOIT-UNPACK-HTTP
SCAN:CORE:SQL-SERVER-HELLO
SCAN:CORE:IIS-ASP-CHUNKED
SCAN:CORE:MSRPC-WKSSVC
SCAN:CORE:NTPD-CTRL-MSG-OF
SCAN:CORE:MP-IE-ZONE-BYPASS
SCAN:CORE:TELNETD-LOGIN
SCAN:CORE:SAMBA-NTTRANS
SCAN:CORE:SAMBA-TRANS2

SCAN:CYBERCOP

SCAN:CYBERCOP:OS-PROBE-1
SCAN:CYBERCOP:OS-PROBE-2
SCAN:CYBERCOP:SMTP-EXPN
SCAN:CYBERCOP:SMTP-EHLO
SCAN:CYBERCOP:FINGER-REDIR
SCAN:CYBERCOP:FINGER-QUERY
SCAN:CYBERCOP:UDP-BOMB

SCAN:II

SCAN:II:IIS-ISAPI-ENUM
SCAN:II:ISAKMP-FLOOD
SCAN:II:TIQ-WMF-MAL-HEADER
SCAN:II:ALLAIRE-CF-OF

SCAN:ISS

SCAN:ISS:FTP-SCAN

SCAN:METASPLOIT

SCAN:METASPLOIT:LSASS
SCAN:METASPLOIT:VICTIM-PROFILE
SCAN:METASPLOIT:TWIKI-CONF-CMD
SCAN:METASPLOIT:METERPRETER-DLL
SCAN:METASPLOIT:JS-HEAPLIB
SCAN:METASPLOIT:EXECCOMMAND-UAF
SCAN:METASPLOIT:SMB-ACTIVE
SCAN:METASPLOIT:JAVA-APPLET
SCAN:METASPLOIT:APACHE-CHUNK-OF

SCAN:MISC

SCAN:MISC:QUERY
SCAN:MISC:SYN-FIN
SCAN:MISC:CAT-ETC-PASSWD-UDP
SCAN:MISC:IDP-TEST
SCAN:MISC:SVR-RES-S1024
SCAN:MISC:NULL
SCAN:MISC:MSTREAM-CLIENT-REQ
SCAN:MISC:MSTREAM-REP-12754
SCAN:MISC:NETCAT-DOEXEC-BO
SCAN:MISC:MSTREAM-REP-15104
SCAN:MISC:USER-LIST
SCAN:MISC:ADMROCKS-TCP
SCAN:MISC:ADMROCKS-UDP

SCAN:MISC:FTP

SCAN:MISC:FTP:FTP-MKD-DOT
SCAN:MISC:FTP:FTP-MKD
SCAN:MISC:FTP:OPENBSD-X86
SCAN:MISC:FTP:LOGXFR-OF2
SCAN:MISC:FTP:FREEBSD-FTPD-GLOB
SCAN:MISC:FTP:PPC-FS1
SCAN:MISC:FTP:REALPATH-OF1
SCAN:MISC:FTP:BSD-FTPD-MKD-OF
SCAN:MISC:FTP:LOGXFR-OF1
SCAN:MISC:FTP:PATH-LINUX-X86-1
SCAN:MISC:FTP:PATH-LINUX-X86-2
SCAN:MISC:FTP:REALPATH-OF2

SCAN:MISC:HTTP

SCAN:MISC:HTTP:MAINFRMST-PROBE
SCAN:MISC:HTTP:VTI-BIN-PROBE
SCAN:MISC:HTTP:LWGATE-PROBE
SCAN:MISC:HTTP:EDIT-DOC-ATTEMPT
SCAN:MISC:HTTP:POSTING-ATTEMPT
SCAN:MISC:HTTP:STORE-ACCESS
SCAN:MISC:HTTP:CPSHOST-DLL
SCAN:MISC:HTTP:TESTCOUNTER
SCAN:MISC:HTTP:SNORK-ACCESS
SCAN:MISC:HTTP:W2TVARS-PM-PROBE
SCAN:MISC:HTTP:ADMADM-EXE-PROBE
SCAN:MISC:HTTP:REQ-HTTP-CONF
SCAN:MISC:HTTP:NESSUS-HTTP
SCAN:MISC:HTTP:DIR-LISTING
SCAN:MISC:HTTP:WIN-ARGS-CMD
SCAN:MISC:HTTP:WIN-ARGS-BAT
SCAN:MISC:HTTP:SENDMESSAGE
SCAN:MISC:HTTP:SENDFORM-ACCESS
SCAN:MISC:HTTP:CYBERCOP-HTTP
SCAN:MISC:HTTP:CODE-ACCESS
SCAN:MISC:HTTP:WIN-RCMD
SCAN:MISC:HTTP:WIN-NC
SCAN:MISC:HTTP:WIN-PERL
SCAN:MISC:HTTP:UNIX-BIN-CSH
SCAN:MISC:HTTP:VIOLATION-ACCS
SCAN:MISC:HTTP:TILDA-ROOT
SCAN:MISC:HTTP:WIN-TELNET-EXE
SCAN:MISC:HTTP:WIN-CD..
SCAN:MISC:HTTP:SEARCH-VTS
SCAN:MISC:HTTP:DELETE-DOC
SCAN:MISC:HTTP:ADMIN-NSF-ACCESS
SCAN:MISC:HTTP:RWWWSH-ACCESS
SCAN:MISC:HTTP:BIGCONF-ACCESS
SCAN:MISC:HTTP:WEBDRIVER-ACCESS
SCAN:MISC:HTTP:MMSTDOD-PROBE
SCAN:MISC:HTTP:ADMIN
SCAN:MISC:HTTP:MINISTATS-ADM
SCAN:MISC:HTTP:WAIS-ACCESS
SCAN:MISC:HTTP:WWW-SQL-PROBE
SCAN:MISC:HTTP:CONT-HTM-PROBE
SCAN:MISC:HTTP:UPLOAD-PROBE
SCAN:MISC:HTTP:WEB-MAP-ACCESS
SCAN:MISC:HTTP:EXAMPLEAPP-PRB
SCAN:MISC:HTTP:FILES-ACCESS
SCAN:MISC:HTTP:EDIT-ACCESS
SCAN:MISC:HTTP:PERLSHOP-PROBE
SCAN:MISC:HTTP:ADMADM-HTM-PROBE
SCAN:MISC:HTTP:RESPONDER-ACCESS
SCAN:MISC:HTTP:MAILLIST-PROBE
SCAN:MISC:HTTP:WEBTRENDS-PROBE
SCAN:MISC:HTTP:INTRANET-REQ
SCAN:MISC:HTTP:BACKUP-REQ
SCAN:MISC:HTTP:NPH-PUBLISH
SCAN:MISC:HTTP:WEBSITEPRO
SCAN:MISC:HTTP:HTGROUP-ACCESS
SCAN:MISC:HTTP:SWEDITSERVLET
SCAN:MISC:HTTP:SCRIPTS-BROWSE
SCAN:MISC:HTTP:SITE-IISAMPLES
SCAN:MISC:HTTP:SRCADM-PROBE
SCAN:MISC:HTTP:WEBHITS-ACCESS
SCAN:MISC:HTTP:SRCH-HTM-PROBE
SCAN:MISC:HTTP:REPOST-ACCESS
SCAN:MISC:HTTP:AX-ADMIN-ACCESS
SCAN:MISC:HTTP:ENVIRON-CGI
SCAN:MISC:HTTP:FLEXFORM-PROBE
SCAN:MISC:HTTP:AXS-ACCESS
SCAN:MISC:HTTP:FILEMAIL-ACCESS
SCAN:MISC:HTTP:CSS-PROBE
SCAN:MISC:HTTP:MSDAC-PROBE
SCAN:MISC:HTTP:CFGWIZ-EXE-PROBE
SCAN:MISC:HTTP:MSPROXY-PROBE
SCAN:MISC:HTTP:START-STOP-DOS
SCAN:MISC:HTTP:CNF-PROBE
SCAN:MISC:HTTP:ADMCGI-EXE-PROBE
SCAN:MISC:HTTP:README-EML
SCAN:MISC:HTTP:ACHG-HTR-PROBE
SCAN:MISC:HTTP:QUERYHIT-ACCESS
SCAN:MISC:HTTP:PERL-PROBE
SCAN:MISC:HTTP:MEM-BIN-PROBE
SCAN:MISC:HTTP:MACHINEINFO
SCAN:MISC:HTTP:IIS-SAMPLES
SCAN:MISC:HTTP:ALIBABA
SCAN:MISC:HTTP:TEST-DOT-CGI
SCAN:MISC:HTTP:FORMHANDLER
SCAN:MISC:HTTP:VOIDEYE
SCAN:MISC:HTTP:QUID-PRO-QUO-LOG
SCAN:MISC:HTTP:SERVER-INFO
SCAN:MISC:HTTP:SEARCH97-VTS
SCAN:MISC:HTTP:HEAD
SCAN:MISC:HTTP:ADMIN-FILES
SCAN:MISC:HTTP:DAY5DATA-PROBE
SCAN:MISC:HTTP:TRACE
SCAN:MISC:HTTP:PUT
SCAN:MISC:HTTP:AUTH-ACCESS
SCAN:MISC:HTTP:IPLANET-GETPROP
SCAN:MISC:HTTP:WWWADM-ACCESS
SCAN:MISC:HTTP:CACHEMGR-ACCESS
SCAN:MISC:HTTP:WS-FTP-INI-ATMPT
SCAN:MISC:HTTP:IIS-NEWDSN
SCAN:MISC:HTTP:HTGREP-ACCESS
SCAN:MISC:HTTP:POST-QUERY-PROBE
SCAN:MISC:HTTP:VIEWCODE-ASP
SCAN:MISC:HTTP:DCFORUM-ACCESS
SCAN:MISC:HTTP:NETCAT-CMD
SCAN:MISC:HTTP:SHELL-ACCESS
SCAN:MISC:HTTP:MAN-SH-PROBE
SCAN:MISC:HTTP:TEST-PROBE
SCAN:MISC:HTTP:TEST-CGI-INFO
SCAN:MISC:HTTP:UPLOADER-EXE
SCAN:MISC:HTTP:CONTEXTADMIN
SCAN:MISC:HTTP:WIN-WSH
SCAN:MISC:HTTP:WIN-TFTP-EXE
SCAN:MISC:HTTP:ANNEX-DOS
SCAN:MISC:HTTP:SYNTXCHK-PROBE
SCAN:MISC:HTTP:FINGER-PROBE
SCAN:MISC:HTTP:HTW-ACCESS
SCAN:MISC:HTTP:CFAPPMAN-PROBE
SCAN:MISC:HTTP:WIN-C-SAMPLE
SCAN:MISC:HTTP:WEBCOM-EXE
SCAN:MISC:HTTP:ARCHITEXT-QUERY
SCAN:MISC:HTTP:SNIPPETS-PROBE

SCAN:MISC:TELNET

SCAN:MISC:TELNET:ETC-GROUP
SCAN:MISC:TELNET:CAT-ETC-INETD
SCAN:MISC:TELNET:APPEND-RHOSTS
SCAN:MISC:TELNET:CAT-ETC-PASSWD
SCAN:MISC:TELNET:STROBE
SCAN:MISC:TELNET:TELNET-PORT-25
SCAN:MISC:TELNET:APPEND-PASSWD
SCAN:MISC:TELNET:SU-ROOT
SCAN:MISC:TELNET:SU-BIN
SCAN:MISC:TELNET:TELNET-PORT-21
SCAN:MISC:TELNET:CD-USR-HIDDEN
SCAN:MISC:TELNET:ID
SCAN:MISC:TELNET:MKDIR
SCAN:MISC:TELNET:CD-DOT-DOT-DOT
SCAN:MISC:TELNET:CD-BIN-HIDDEN
SCAN:MISC:TELNET:CD-VAR-HIDDEN
SCAN:MISC:TELNET:XHOST-PLUS
SCAN:MISC:TELNET:CISCO
SCAN:MISC:TELNET:XHOST
SCAN:MISC:TELNET:VI-ETC-PASSWD
SCAN:MISC:TELNET:NC
SCAN:MISC:TELNET:VI-ETC-GROUP
SCAN:MISC:TELNET:SU-WRNG-GRP
SCAN:MISC:TELNET:NMAP
SCAN:MISC:TELNET:SHUTDOWN
SCAN:MISC:TELNET:REBOOT
SCAN:MISC:TELNET:TELNET-PORT-80

SCAN:NESSUS

SCAN:NESSUS:ISS-DIR-LISTING
SCAN:NESSUS:GLOBAL-ASA
SCAN:NESSUS:SMTP-SCAN
SCAN:NESSUS:DNS-SCAN
SCAN:NESSUS:TFTP-SCAN
SCAN:NESSUS:SSH
SCAN:NESSUS:HTTP-USER-AGENT
SCAN:NESSUS:NPH-PUBLISH-CGI
SCAN:NESSUS:SMB-SCAN
SCAN:NESSUS:COUNT-CGI

SCAN:NETECT

SCAN:NETECT:SMTP

SCAN:NEXPOSE

SCAN:NEXPOSE:SNMP-PROBE
SCAN:NEXPOSE:SQLD-PROBE
SCAN:NEXPOSE:TFTP-PROBE

SCAN:NIKTO

SCAN:NIKTO:USER-AGENT
SCAN:NIKTO:URL

SCAN:NMAP

SCAN:NMAP:FINGERPRINT
SCAN:NMAP:XMAS
SCAN:NMAP:NMAP-UDP-1
SCAN:NMAP:NSE-HTTP-UA

SCAN:PISS

SCAN:PISS:FTP-SCAN

SCAN:RETINA

SCAN:RETINA:FTP

SCAN:RPVS

SCAN:RPVS:XSS-URL

SCAN:RVSCAN

SCAN:RVSCAN:FTP

SCAN:SAINT

SCAN:SAINT:FTP-SCAN

SCAN:SATAN

SCAN:SATAN:FTP-SCAN

SCAN:SENTINEL

SCAN:SENTINEL:TELNET-SPOOF

SCAN:SSH-RESEARCH

SCAN:SSH-RESEARCH:ACTIVITY

SCAN:WEBTRENDS

SCAN:WEBTRENDS:UDP-PROBE

SCAN:XPROBE

SCAN:XPROBE:XPROBE-BADCODE

SCREENOS

SCREENOS:IDS_ICMP_TS_REQUEST
SCREENOS:IDS_ICMP_TS_REPLY
SCREENOS:IDS_ICMP_TIME_EXCEED
SCREENOS:IDS_TCP_NO_FLAG
SCREENOS:IDS_IP_OPT_RECORD
SCREENOS:IDS_ICMP_INFO_REQUEST
SCREENOS:IP_SOURCE_ROUTE
SCREENOS:UDP_FLOOD
SCREENOS:DENY_POLICY
SCREENOS:MULTI_AUTH_FAIL
SCREENOS:IDS_IP_UNKNOWN_PROT
SCREENOS:IDS_ICMP_ADDR_MSK_REP
SCREENOS:IDS_ICMP_ECHO_REQUEST
SCREENOS:IDS_ICMP_ECHO_REPLY
SCREENOS:IDS_COMPONENT
SCREENOS:IDS_SYN_FRAG
SCREENOS:IDS_IP_OPT_STREAM
SCREENOS:CONNECT_SME_PORT
SCREENOS:CONNECT_CMS_PORT
SCREENOS:IDS_IP_OPT_SSR
SCREENOS:IDS_ICMP_REDIRECT
SCREENOS:IDS_ICMP_SRC_QUENCH
SCREENOS:IDS_ICMP_HOST_UNREACH
SCREENOS:IDS_IP_OPT_TIMESTAMP
SCREENOS:IDS_IP_OPT_LSR
SCREENOS:IDS_ICMP_INFO_REPLY
SCREENOS:IDS_IP_OPT_SCHT
SCREENOS:IDS_IP_BLOCK_FRAG
SCREENOS:IDS_ICMP_FRAGMENT
SCREENOS:IDS_TCP_FIN_NO_ACK
SCREENOS:IDS_ICMP_ADDR_MSK_REQ
SCREENOS:IDS_ICMP_PARA_PROB

SHELLCODE

SHELLCODE:PREPENDENCODER-HTTP-1
SHELLCODE:PREPENDENCODER-HTTP
SHELLCODE:HEX-ASCII-HEAPS-CHAR
SHELLCODE:PREPENDENCODER-TCP

SHELLCODE:ACTIVE

SHELLCODE:ACTIVE:DECODER3-80-CL
SHELLCODE:ACTIVE:DCDR-1-UDP-CTS
SHELLCODE:ACTIVE:DECODER2-80-CL
SHELLCODE:ACTIVE:BIND-1-HTTP-CL
SHELLCODE:ACTIVE:REVERSE-80-CTS
SHELLCODE:ACTIVE:REVERSE-80-STC
SHELLCODE:ACTIVE:DCDR-1-TCP-STC
SHELLCODE:ACTIVE:BIND-1-TCP-CTS
SHELLCODE:ACTIVE:JS-ESCAPE
SHELLCODE:ACTIVE:BIND-1-SMB-STC
SHELLCODE:ACTIVE:DCDR-1-TCP-CTS
SHELLCODE:ACTIVE:BIND-1-TCP-STC
SHELLCODE:ACTIVE:BIND-1-SMB-CTS
SHELLCODE:ACTIVE:DECODER2-80-SV
SHELLCODE:ACTIVE:DECODER3-80-SV
SHELLCODE:ACTIVE:REVERSE-1-SMB
SHELLCODE:ACTIVE:DECODER1-80-CL
SHELLCODE:ACTIVE:DCDR-2-TCP-STC
SHELLCODE:ACTIVE:RVRS-1-UDP-CLT
SHELLCODE:ACTIVE:REVERSE-1-TCP
SHELLCODE:ACTIVE:BIND-1-UDP-CTS
SHELLCODE:ACTIVE:DCDR-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-2-TCP-CTS
SHELLCODE:ACTIVE:DCDR-3-TCP-CTS
SHELLCODE:ACTIVE:DCDR-2-UDP-CTS
SHELLCODE:ACTIVE:DCDR-3-UDP-CTS
SHELLCODE:ACTIVE:DECODER1-80-SV
SHELLCODE:ACTIVE:BIND-1-HTTP-SR
SHELLCODE:ACTIVE:BIND-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-3-TCP-STC
SHELLCODE:ACTIVE:DCDR-2-UDP-STC
SHELLCODE:ACTIVE:RVRS-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-3-UDP-STC
SHELLCODE:ACTIVE:JS-UNESCAPE

SHELLCODE:BSDX86

SHELLCODE:BSDX86:SHELL-2-HTTP
SHELLCODE:BSDX86:SHELL-1-HTTP

SHELLCODE:JS

SHELLCODE:JS:MAL-ABOUT
SHELLCODE:JS:FROMCHARCODE
SHELLCODE:JS:ACTIVEX-OBFUS
SHELLCODE:JS:JSOBFU-NEW
SHELLCODE:JS:MAL-UNESCAPE
SHELLCODE:JS:ASCII-HEX
SHELLCODE:JS:HEX-ESCAPE
SHELLCODE:JS:AVOID-UTF8-TOLOWER
SHELLCODE:JS:ALPHA-UPPER
SHELLCODE:JS:UNICODE-ENC
SHELLCODE:JS:OBFUSCATION

SHELLCODE:LINUX

SHELLCODE:LINUX:CHMDSDW-HTTP
SHELLCODE:LINUX:IPTABLES
SHELLCODE:LINUX:SYSKILL
SHELLCODE:LINUX:SSH-PORTFWD
SHELLCODE:LINUX:REBOOT
SHELLCODE:LINUX:ARMLE-STGR-80C
SHELLCODE:LINUX:ARMLE-STGR-80S
SHELLCODE:LINUX:CHMOD-ROOT-RWX
SHELLCODE:LINUX:UNLINK
SHELLCODE:LINUX:IPTABLES-H
SHELLCODE:LINUX:CHMOD-SHADOW
SHELLCODE:LINUX:UNLINK-HTTP
SHELLCODE:LINUX:ARMLE-STAGER

SHELLCODE:MIPS

SHELLCODE:MIPS:BE-LONGXOR-80C
SHELLCODE:MIPS:LE-LONGXOR-80C
SHELLCODE:MIPS:BE-BYTEXORI-80C
SHELLCODE:MIPS:LE-BYTEXORI-80S
SHELLCODE:MIPS:BE-BYTEXORI-80S
SHELLCODE:MIPS:BE-BYTEXORI-STC
SHELLCODE:MIPS:BE-BYTEXORI-CTS
SHELLCODE:MIPS:LE-LONGXOR-CTS
SHELLCODE:MIPS:BE-LONGXOR-CTS
SHELLCODE:MIPS:LE-BYTEXORI-CTS
SHELLCODE:MIPS:LE-LONGXOR-80S
SHELLCODE:MIPS:LE-LONGXOR-STC
SHELLCODE:MIPS:LE-BYTEXORI-STC
SHELLCODE:MIPS:BE-LONGXOR-80S
SHELLCODE:MIPS:LE-BYTEXORI-80C
SHELLCODE:MIPS:BE-LONGXOR-STC

SHELLCODE:MSF

SHELLCODE:MSF:FTENV-SMB2
SHELLCODE:MSF:PEXALPHANUM-CTS-1
SHELLCODE:MSF:DCX86-80S
SHELLCODE:MSF:GREENDAM
SHELLCODE:MSF:JAVA-APP
SHELLCODE:MSF:DCX86-UDP1
SHELLCODE:MSF:PROPSPRAY
SHELLCODE:MSF:DCX86-80C
SHELLCODE:MSF:DCX86-UDP2
SHELLCODE:MSF:GEN-FTP
SHELLCODE:MSF:DCX86-CTS
SHELLCODE:MSF:DCX86-STC
SHELLCODE:MSF:PEXCALL-CTS
SHELLCODE:MSF:PEXALPHANUM-CTS
SHELLCODE:MSF:PEXALPHANUM-STC
SHELLCODE:MSF:PEXCALL-STC
SHELLCODE:MSF:ALPHA2-GETEIP-CTS
SHELLCODE:MSF:ALPHA2-GETEIP-STC
SHELLCODE:MSF:JAVA-JAR
SHELLCODE:MSF:FTENV-SMB1

SHELLCODE:OSX

SHELLCODE:OSX:ARMLE-STAGER

SHELLCODE:PHP

SHELLCODE:PHP:SHELL-URI
SHELLCODE:PHP:BASE64-80C
SHELLCODE:PHP:BASE64-CTS
SHELLCODE:PHP:BASE64-STC
SHELLCODE:PHP:BASE64-80S
SHELLCODE:PHP:REVERSE-SHELL

SHELLCODE:PPC

SHELLCODE:PPC:LIN-GNRC-STGR-80C
SHELLCODE:PPC:LINUX-GNRC-STAGER
SHELLCODE:PPC:OSX-STAGER
SHELLCODE:PPC:AIX-STAGER
SHELLCODE:PPC:LIN-GNRC-STGR-80S
SHELLCODE:PPC:LONGXOR-CTS
SHELLCODE:PPC:LONGXOR-TAG-CTS
SHELLCODE:PPC:LONGXOR-80C
SHELLCODE:PPC:LONGXOR-TAG-80C
SHELLCODE:PPC:LONGXOR-TAG-STC
SHELLCODE:PPC:LONGXOR-80S
SHELLCODE:PPC:LONGXOR-STC
SHELLCODE:PPC:LONGXOR-TAG-80S

SHELLCODE:SPARC

SHELLCODE:SPARC:WRITE-EXIT
SHELLCODE:SPARC:BIN-KSH
SHELLCODE:SPARC:BSD-REVERSE-TCP
SHELLCODE:SPARC:BSD-BIND-TCP
SHELLCODE:SPARC:SOLARIS-STAGER
SHELLCODE:SPARC:LONGXORTAG-CTS
SHELLCODE:SPARC:LONGXORTAG-80C
SHELLCODE:SPARC:LONGXORTAG-STC
SHELLCODE:SPARC:LONGXORTAG-80S

SHELLCODE:WIN

SHELLCODE:WIN:SHELL-PROMPT
SHELLCODE:WIN:SHIKATAGANAI-21C
SHELLCODE:WIN:SHIKATA-GANAI-STC
SHELLCODE:WIN:PARTITION-FMT
SHELLCODE:WIN:SHIKATA-GANAI-CTS
SHELLCODE:WIN:7-SHUTDOWN
SHELLCODE:WIN:7-TASKMGR
SHELLCODE:WIN:SHIKATAGANAI-HTTP
SHELLCODE:WIN:SHIKATAGANAI-80S
SHELLCODE:WIN:7-EXPTERM
SHELLCODE:WIN:SMB-REM-EXEC2
SHELLCODE:WIN:SHIKATAGANAI-80C
SHELLCODE:WIN:SMB-REM-EXEC1

SHELLCODE:X64

SHELLCODE:X64:WIN-STAGER
SHELLCODE:X64:LINUX-REVERSE-80C
SHELLCODE:X64:LINUX-SHELL-BIND
SHELLCODE:X64:LIN-SHEL-BIND-80C
SHELLCODE:X64:LINUX-FIND-PORT
SHELLCODE:X64:LIN-SHEL-BIND-80S
SHELLCODE:X64:LINUX-REVERSE-80S
SHELLCODE:X64:LINUX-REVERSE-TCP
SHELLCODE:X64:WIN-STAGER-80C
SHELLCODE:X64:OSX-STAGER
SHELLCODE:X64:WIN-STAGER-80S
SHELLCODE:X64:XOR-CTS
SHELLCODE:X64:XOR-80C
SHELLCODE:X64:XOR-80S
SHELLCODE:X64:XOR-STC

SHELLCODE:X86

SHELLCODE:X86:JMPCALLADTIVE-80C
SHELLCODE:X86:NONALPHAUPPER-STC
SHELLCODE:X86:WIN-FIND-TAG-80S
SHELLCODE:X86:FNSTENV-CTS
SHELLCODE:X86:LINUX-BIND-80C
SHELLCODE:X86:FNSTENV-80C
SHELLCODE:X86:X86-NOOP1-80C
SHELLCODE:X86:X86-NOOP1-80S
SHELLCODE:X86:X90-NOOP-HTTP-HDR
SHELLCODE:X86:LIN-SHELL-REV-80S
SHELLCODE:X86:FNSTENV-80C-1
SHELLCODE:X86:ALPHA-GETEIP-80S3
SHELLCODE:X86:WIN-SHELL-XPFW
SHELLCODE:X86:X90-NOOP-STC
SHELLCODE:X86:WIN-SPEAK-PWNED
SHELLCODE:X86:WIN-REV-ORD-TCP
SHELLCODE:X86:WIN-NONX-TCP
SHELLCODE:X86:WIN-STAGER
SHELLCODE:X86:ALPHA-MIXED-80C
SHELLCODE:X86:LIN-REV-NONX-80S
SHELLCODE:X86:KADMIND-BOF
SHELLCODE:X86:LINUX-FND-TAG-80C
SHELLCODE:X86:BIN-SH-TRANSFER
SHELLCODE:X86:SPARC-NOOP
SHELLCODE:X86:BLOXOR-80S
SHELLCODE:X86:LINUX-FND-PRT-80C
SHELLCODE:X86:LIN-SHELL-REV-80C
SHELLCODE:X86:METERPRET-ESPIA2
SHELLCODE:X86:WIN-SPEAK-PWN-80S
SHELLCODE:X86:LIN-BIND-NONX-80S
SHELLCODE:X86:LIN-REV-IPV6-80S
SHELLCODE:X86:WIN-STAGER-80C
SHELLCODE:X86:LINUX-BIND-IPV6
SHELLCODE:X86:WIN-NONX-TCP-80S
SHELLCODE:X86:WIN-REV-ORD-80S
SHELLCODE:X86:LIN-REV-NONX-80C
SHELLCODE:X86:LINUX-REV-IPV6
SHELLCODE:X86:LIN-REV-IPV6-80C
SHELLCODE:X86:LINUX-BIND-NONX
SHELLCODE:X86:LINUX-FIND-TAG
SHELLCODE:X86:WIN-SPEAK-PWN-80C
SHELLCODE:X86:UNESCAPE-ENC
SHELLCODE:X86:ALPHA-GETEIP-80S1
SHELLCODE:X86:ALPHA-MIXED-CTS
SHELLCODE:X86:LINUX-REV-NONX
SHELLCODE:X86:PIECEMEAL
SHELLCODE:X86:PIECEMEAL1
SHELLCODE:X86:LIN-BIND-NONX-80C
SHELLCODE:X86:UNESCAPE-ENC1
SHELLCODE:X86:WIN-BIND-IPV6-80C
SHELLCODE:X86:METERPRET-ESPIA1
SHELLCODE:X86:LINUX-REVERSE-TCP
SHELLCODE:X86:METERPRETER-ESPIA
SHELLCODE:X86:SGI-NOOP
SHELLCODE:X86:LINUX-BIND-80S
SHELLCODE:X86:LINUX-FND-TAG-80S
SHELLCODE:X86:X86-NOOP1-STC
SHELLCODE:X86:LINUX-SHELL-REV
SHELLCODE:X86:BSD-BIND-TCP
SHELLCODE:X86:BSD-BIND-IPV6-TCP
SHELLCODE:X86:LINUX-FIND-PORT
SHELLCODE:X86:BSD-REV-IPV6
SHELLCODE:X86:BSD-FIND-PORT
SHELLCODE:X86:BSD-EXEC
SHELLCODE:X86:WIN-STAGER-80S
SHELLCODE:X86:BSD-FIND-TAG
SHELLCODE:X86:WIN-FIND-TAG
SHELLCODE:X86:WIN-NONX-TCP-80C
SHELLCODE:X86:BSD-REVERSE-TCP
SHELLCODE:X86:FNSTENV-80S
SHELLCODE:X86:OSX-REVERSE-TCP
SHELLCODE:X86:FNSTENV-STC
SHELLCODE:X86:OSX-FIND-PORT
SHELLCODE:X86:OSX-BIND-TCP
SHELLCODE:X86:SOLARIS-STAGER
SHELLCODE:X86:BSDI-STAGER
SHELLCODE:X86:WIN-FIND-TAG-80C
SHELLCODE:X86:LINUX-BIND-TCP
SHELLCODE:X86:ALPHA-GETEIP-80S2
SHELLCODE:X86:ALPHA-GETEIP-80S4
SHELLCODE:X86:UNICODE-MIXED-CTS
SHELLCODE:X86:BLOXOR-TCP-CTS
SHELLCODE:X86:WIN-REV-ORD-80C
SHELLCODE:X86:ALPHA-GETEIP-80S5
SHELLCODE:X86:WIN-SHLL-XPFW-80S
SHELLCODE:X86:ALPHA-GETEIP-80S6
SHELLCODE:X86:COUNTDOWN-80C
SHELLCODE:X86:NONALPHAUPPER-80C
SHELLCODE:X86:COUNTDOWN-CTS
SHELLCODE:X86:UNICODE-MIXED-80C
SHELLCODE:X86:BLOXOR-80C
SHELLCODE:X86:NONALPHAUPPER-CTS
SHELLCODE:X86:CONTEXT-TIME-80C
SHELLCODE:X86:SINGLSTATCBIT-80C
SHELLCODE:X86:CONTEXT-TIME-CTS
SHELLCODE:X86:UNICODE-UPPER-80C
SHELLCODE:X86:JMPCALLADTIVE-CTS
SHELLCODE:X86:CONTEXT-STAT-CTS
SHELLCODE:X86:CONTEXT-STAT-80C
SHELLCODE:X86:CONTEXT-CPUID-CTS
SHELLCODE:X86:SINGLSTATICBT-CTS
SHELLCODE:X86:CONTEXT-CPUID-80C
SHELLCODE:X86:COUNTDOWN-80S
SHELLCODE:X86:COUNTDOWN-STC
SHELLCODE:X86:AVD-UTF8-LWR-80S
SHELLCODE:X86:ALPHA-UPPER-80S
SHELLCODE:X86:ALPHA-MIXED-80S
SHELLCODE:X86:UNICODE-MIXED-80S
SHELLCODE:X86:ALPHA-UPPER-STC
SHELLCODE:X86:UNICODE-MIXED-STC
SHELLCODE:X86:AVD-UTF8TLWR-STC
SHELLCODE:X86:ALPHA-UPPER-80C
SHELLCODE:X86:ALPHA-MIXED-STC
SHELLCODE:X86:AVD-UTF8TLWR-CTS
SHELLCODE:X86:ADD-SUB-CTS
SHELLCODE:X86:LINUX-FND-PRT-80S
SHELLCODE:X86:ADD-SUB-80C
SHELLCODE:X86:LIN-BIND-IPV6-80C
SHELLCODE:X86:ALPHA-UPPER-CTS
SHELLCODE:X86:UNICODE-UPPER-STC
SHELLCODE:X86:ADD-SUB-80S
SHELLCODE:X86:LIN-BIND-IPV6-80S
SHELLCODE:X86:ADD-SUB-STC
SHELLCODE:X86:NONALPHAUPPER-80S
SHELLCODE:X86:FNSTENV-80S-1
SHELLCODE:X86:FNSTENV-CTS-1
SHELLCODE:X86:DWORD-ADITIVE-80S
SHELLCODE:X86:GETEIP-XOR-80C
SHELLCODE:X86:GETEIP-XOR-80S
SHELLCODE:X86:DWORD-ADITIVE-STC
SHELLCODE:X86:DWORD-ADITIVE-CTS
SHELLCODE:X86:UNICODE-UPPER-80S
SHELLCODE:X86:CONTEXT-CPUID-80S
SHELLCODE:X86:SINGLSTATCBIT-STC
SHELLCODE:X86:CONTEXT-CPUID-STC
SHELLCODE:X86:CONTEXT-STAT-80S
SHELLCODE:X86:CONTEXT-TIME-80S
SHELLCODE:X86:CONTEXT-TIME-STC
SHELLCODE:X86:CONTEXT-STAT-STC
SHELLCODE:X86:UNICODE-UPPER-CTS
SHELLCODE:X86:JMPCALLADTIVE-STC
SHELLCODE:X86:SINGLSTATCBIT-80S
SHELLCODE:X86:UDP-ENCODER
SHELLCODE:X86:FNSTENV-STC-1
SHELLCODE:X86:XOR-DWORD-80S
SHELLCODE:X86:GETEIP-XOR-STC
SHELLCODE:X86:DWORD-ADITIVE-80C
SHELLCODE:X86:XOR-DWORD-STC
SHELLCODE:X86:PEXALPHANUM-80S
SHELLCODE:X86:XOR-DWORD-80C
SHELLCODE:X86:XOR-DWORD-CTS
SHELLCODE:X86:BLOXOR-TCP-STC
SHELLCODE:X86:FLDZ-GET-EIP-STC
SHELLCODE:X86:BASE64-NOOP-80C
SHELLCODE:X86:FLDZ-GET-EIP-80S
SHELLCODE:X86:FLDZ-GET-EIP-80C
SHELLCODE:X86:FLDZ-GET-EIP-CTS
SHELLCODE:X86:BASE64-NOOP-STC
SHELLCODE:X86:BASE64-NOOP-CTS
SHELLCODE:X86:REVERS-CONECT-80C
SHELLCODE:X86:REVERS-CONECT-80S
SHELLCODE:X86:REVERS-CONECT-CTS
SHELLCODE:X86:PEXCALL-80S
SHELLCODE:X86:WIN32-ENUM-80C
SHELLCODE:X86:PEXCALL-80C
SHELLCODE:X86:BASE64-NOOP-80S
SHELLCODE:X86:ALPHA2-GETEIP-80C
SHELLCODE:X86:ALPHA2-GETEIP-80S
SHELLCODE:X86:REVERS-CONECT-STC
SHELLCODE:X86:WIN2K-2K3-CTS
SHELLCODE:X86:WIN32-ENUM-80S
SHELLCODE:X86:PEXALPHANUM-80C
SHELLCODE:X86:WIN32-ENUM-CTS
SHELLCODE:X86:WIN32-ENUM-STC
SHELLCODE:X86:GETEIP-XOR-CTS
SHELLCODE:X86:AVD-UTF8-LWR-80C
SHELLCODE:X86:JMPCALLADTIVE-80S
SHELLCODE:X86:X90-NOOP-CTS
SHELLCODE:X86:X90-NOOP-HTTP-REQ
SHELLCODE:X86:LINUX-BIND-MSF
SHELLCODE:X86:METASPLOIT-X86-EN
SHELLCODE:X86:MSF-X86-ADD-SUB
SHELLCODE:X86:ALPHA2-GETEIP-ENC
SHELLCODE:X86:ALPHA-GETEIP-80S7
SHELLCODE:X86:X86-NOOP1-CTS

SMB

SMB:REFLECTION
SMB:DUPLICATE-SESSION
SMB:NTLM-LOGIN-FAILED
SMB:CONNECT-FROM-LOCALHOST
SMB:NETDDE-SHARE-OF
SMB:SEARCH-OF
SMB:XTIERRPCPIPE
SMB:WIN-BROWSER-SERVICE-DOS
SMB:TIMBUKTU-PLUGHNT-COMMAND
SMB:MS-RAP-HEAP-OV
SMB:MS-ELS-LIB-LOAD
SMB:SMB20-NEG-DOS
SMB:FRAG-EXP-CODE
SMB:MS-WIN-VISTA-SP0-SMB-DOS
SMB:USER-CMD-INJ
SMB:MS-IE-IESHIMS-DLL-CE
SMB:NTLM-LOW-ENTROPY
SMB:MSSQL-DECLARE-EXEC
SMB:FRAG-MALICIOUS-PAYLOAD
SMB:HTTP-PAYLOAD
SMB:MS-WIN-2000-LANMAN-UDP-DOS
SMB:MS-WIN-2000-LANMAN-DOS
SMB:WINS-SNAME-REG
SMB:SMB-COPY-OF
SMB:ORACLE-JRE-INSECURE-LOAD
SMB:DCE-RPC-FRAG-EXP-PAYLOAD
SMB:DCE-RPC-FRAG-MAL-PAYLOAD
SMB:MS-RAP-DOS
SMB:SAMBA-SMB-PKT-PARS-BO
SMB:SAMBA-SID-PARS-BO-1
SMB:MS-WIN-SMB-PATH-BO
SMB:MS-WIN-SMB-PARS-MC
SMB:TRANS2ROOT-OF-2
SMB:MS-WINDOWS-FILE-RCE
SMB:WIN-BRIEFCASE-RCE
SMB:REPLY-ENCRYPTION-KEYS
SMB:CLIENT-MESSAGE-OF
SMB:MICROSOFT-LIB-LOADING-CE
SMB:INTERNET-PRINT-SVC-INT-OF
SMB:CORE-DLL-REQ-VIA-SMB
SMB:PNG-CHUNK-OF
SMB:MAILSLOT-OF
SMB:SAMBA-UNICODE-FLAGS2-DOS
SMB:VISIO-MFC71XXX-DLL-HIJACK
SMB:CLIENT-POOL-CORR
SMB:TRANS2ROOT-OF
SMB:OLEAUT32-WMF
SMB:SERVER-SVC-OF
SMB:DOUBLE-NEGO-RESP
SMB:SMB-SRV-NAME-DOS
SMB:MS-TELNET-INSECURE-LOADING
SMB:MAL-WIN-BRIEFCASE
SMB:MS-RAP-STACK-OV
SMB:TRANSACTION-RESPONSE-OF

SMB:AUDIT

SMB:AUDIT:NULL-NVE-LM
SMB:AUDIT:NT-LM-0.12
SMB:AUDIT:NULL-NVE-OS
SMB:AUDIT:NULL-DOMAIN
SMB:AUDIT:EXT-SEC-DISABLED
SMB:AUDIT:EXP-NEG
SMB:AUDIT:UNEXP-REQ
SMB:AUDIT:UNEXP-REP
SMB:AUDIT:LONG-ACCOUNT
SMB:AUDIT:UNK-CMD
SMB:AUDIT:DCERPC-UNEXPECTED-RSP
SMB:AUDIT:INV-PROTOCOL
SMB:AUDIT:UNK-DIALECT
SMB:AUDIT:NULL-ACCOUNT
SMB:AUDIT:UNK-SHDR-TYPE
SMB:AUDIT:OLD-VERSION
SMB:AUDIT:BRUTE-LOGIN

SMB:ENUM

SMB:ENUM:NAME-LOOKUP
SMB:ENUM:NETSESSION

SMB:ERROR

SMB:ERROR:MAL-MSG
SMB:ERROR:GRIND
SMB:ERROR:INV-MSG-LEN
SMB:ERROR:MULTI-HEADERS

SMB:EXPLOIT

SMB:EXPLOIT:NULL-FILENAME
SMB:EXPLOIT:NULL-PATH
SMB:EXPLOIT:NULL-SERVICE
SMB:EXPLOIT:REGISTRY-DOS
SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW
SMB:EXPLOIT:LANMAN-NUKE
SMB:EXPLOIT:WINBLAST-DOS
SMB:EXPLOIT:SMBDIE
SMB:EXPLOIT:TRANS2-MDL-CHUNK
SMB:EXPLOIT:MAL-JPEG-DL
SMB:EXPLOIT:GREENAPPLE-2
SMB:EXPLOIT:MSCOREDLL-LOAD
SMB:EXPLOIT:LINUX-TRANS2-OF
SMB:EXPLOIT:LLS-NAME
SMB:EXPLOIT:FOLDER-COM-EXEC
SMB:EXPLOIT:SMB2-ZERO-LEN-WRT
SMB:EXPLOIT:SRV-RENAME-CE
SMB:EXPLOIT:PRINT-SPOOL-BYPASS
SMB:EXPLOIT:MEDIAC-MCL-RCE
SMB:EXPLOIT:MS-2015-0096-CE
SMB:EXPLOIT:SMB1-CHAINING-MC
SMB:EXPLOIT:GREENAPPLE
SMB:EXPLOIT:MPLAYER-SAMI
SMB:EXPLOIT:SMB-MULTI-DOS2
SMB:EXPLOIT:DOT-JOB
SMB:EXPLOIT:WILD-FILE-DOS
SMB:EXPLOIT:SAMBA-DIR-TRAV
SMB:EXPLOIT:SMB-MULTI-DOS
SMB:EXPLOIT:FLASH-CHROME-BREAK
SMB:EXPLOIT:ISS-ACCOUNTNAME-OF
SMB:EXPLOIT:CVE-2015-0240-RCE
SMB:EXPLOIT:SMB-MULTI-DOS-1

SMB:EXT

SMB:EXT:DOT-ZIP

SMB:FILE

SMB:FILE:MS-WIN-ILL
SMB:FILE:EICAR-COPY
SMB:FILE:AUTORUN.INF-COPY
SMB:FILE:MS-INSECUR-LIB-LOAD
SMB:FILE:MS-OBJ-PACKAGER
SMB:FILE:WEB-VIEW-DOC-SCR-INJ
SMB:FILE:NAME-INV-CHARS
SMB:FILE:SANDWORM-RCE
SMB:FILE:CRAFTED-NAME-RCE
SMB:FILE:WIRESHARK-INSECUREPATH
SMB:FILE:DLL-TRANSFER

SMB:INFO

SMB:INFO:LANMAN-1.0
SMB:INFO:PCLAN-1.0
SMB:INFO:LANMAN-2.1
SMB:INFO:LANMAN-1.2X002
SMB:INFO:XENIX-CORE
SMB:INFO:MSNET-1.03
SMB:INFO:NEG-FAILED
SMB:INFO:WFWGRP-3.1A
SMB:INFO:NULL-GSS-TOKEN
SMB:INFO:DOT-EXE-FILE-XFER

SMB:NETBIOS

SMB:NETBIOS:INV-CGNAME-LEN
SMB:NETBIOS:INV-CGNAME-ENC
SMB:NETBIOS:INV-SNAME-LEN
SMB:NETBIOS:INV-CDNAME-LEN
SMB:NETBIOS:INV-CDNAME-ENC
SMB:NETBIOS:UNK-SHDR-FLAGS
SMB:NETBIOS:SHARE-LVL-SEC
SMB:NETBIOS:INV-SHDR-LEN
SMB:NETBIOS:RMT-REG-ACCESS
SMB:NETBIOS:NOVELL-TRAN-REQ-DOS
SMB:NETBIOS:RRAS-MEM-CORRUPTION
SMB:NETBIOS:WIN-RPC-UPNP-DOS
SMB:NETBIOS:WIN7-KERNEL-DOS
SMB:NETBIOS:GETPRINTERDATA-DOS

SMB:OF

SMB:OF:ACCOUNT-NAME-OVERFLOW
SMB:OF:DIALECT-INDEX-OVERFLOW
SMB:OF:SECUR-TOKEN-OVERFLOW
SMB:OF:PNP-OF
SMB:OF:NETCONMGR-DOS
SMB:OF:SPOOL-SVC-OF
SMB:OF:WKSSVC-CALL
SMB:OF:NETWARE-CLIENT-RPC
SMB:OF:SMB-INVALID-BUFFER
SMB:OF:RPC-PNP-OF
SMB:OF:CREATE-NEG-EOF
SMB:OF:TAPI-SVC-OF
SMB:OF:DFS-RESP
SMB:OF:INVALID-DATACOUNT
SMB:OF:SMB2-DOS-2
SMB:OF:RECV-RAW
SMB:OF:MS-SMB2-RES-DOS
SMB:OF:NWCW-INV-CALL
SMB:OF:MAL-QFILEPATHINFO
SMB:OF:MANGLING-FILE-OF
SMB:OF:RECV-RAW-BO
SMB:OF:LINUX-KERNEL-INT-OF
SMB:OF:SMB2-WRITE-OFFSET
SMB:OF:MS-BROWSER-ELECT
SMB:OF:SMB-IPC-OF
SMB:OF:CVE-2009-3676-DOS

SMB:SAMBA

SMB:SAMBA:NETDFS-OF
SMB:SAMBA:READ-NTTRANS-EA-LIST
SMB:SAMBA:ROOT-SYS
SMB:SAMBA:SETINFOPOLICY-HEAP
SMB:SAMBA:NMBD-BO
SMB:SAMBA:SPOOLSS-NOTIFY
SMB:SAMBA:IDL-PARSE-OOB
SMB:SAMBA:SYMLINK-INFODISC
SMB:SAMBA:LSALOOKUPSIDS
SMB:SAMBA:SID-QUOTA
SMB:SAMBA:SMBD-ANDX-INFINITE
SMB:SAMBA:DFSENUM-OF
SMB:SAMBA:SWAT-AUTH-DOS
SMB:SAMBA:NTRANS-RPLY

SMB:TOOLS

SMB:TOOLS:PSEXEC

SMTP

SMTP:SPAM-ADDRESS-EVASION
SMTP:AUTO-SPAM
SMTP:RCPT-CMD-INJ
SMTP:MSSQL-WORM-EMAIL
SMTP:SMTP-URI-INJ
SMTP:HTML-VAL-XSS
SMTP:REALPLAYER-WAV-BO
SMTP:SYM-NESTED-ZIP
SMTP:BANNER-CAPTURE
SMTP:INVALID-HELO
SMTP:SAGTUBE-DOS
SMTP:SPAM-ASSN-INJ
SMTP:SQWEBMAIL-EMAIL-HEADER-INJ
SMTP:SPAMASS-DOS
SMTP:IPSWITCH-REPLY-TO-OF
SMTP:FFSMOUNTFS-BOF
SMTP:FROM-FIELD-FS
SMTP:URL-LOC
SMTP:MS-OUTLOOK-EMAIL-RCE-1
SMTP:MS-WIN-SMTP-DOS
SMTP:SPAMASSASS-LM-DOS
SMTP:SHELLSHOCK
SMTP:IBM-LOTUS-INT-OVERFLOW
SMTP:RESP-SPOOF2
SMTP:NOVELL-GROUPWISE-BO
SMTP:MERCMAIL-AUTH-OF
SMTP:WP5-EMAIL
SMTP:MULTIPLE-HYD-BOF
SMTP:MS-XLS-BIFF-REC-RCE
SMTP:IBM-LOTUS-NOTES-XSS

SMTP:AUDIT

SMTP:AUDIT:EXTERNAL-MESG
SMTP:AUDIT:REQ-MISSING-HELLO
SMTP:AUDIT:REP-INVALID-REPLY
SMTP:AUDIT:COMMAND-FAILED
SMTP:AUDIT:REQ-INVALID-CMD-SEQ
SMTP:AUDIT:DUPLICATE-HEADER
SMTP:AUDIT:EMPTY-BOUNDARY
SMTP:AUDIT:ENCODE
SMTP:AUDIT:REQ-MISSING-RCPT-TO
SMTP:AUDIT:INVALID-FILENAME
SMTP:AUDIT:REQ-HDR-FLD-UNKNOWN
SMTP:AUDIT:REP-NESTED-REPLY
SMTP:AUDIT:ENCODE-MIME-TYPE
SMTP:AUDIT:MISSING-MAIL-FROM
SMTP:AUDIT:REQ-NESTED-REQUEST
SMTP:AUDIT:REQ-UNKNOWN-CMD
SMTP:AUDIT:REQ-BINARY-DATA
SMTP:AUDIT:REQ-BIN-DATA-3
SMTP:AUDIT:HIGH-VOLUME
SMTP:AUDIT:REQ-BIN-DATA-2

SMTP:COMMAND

SMTP:COMMAND:TURN
SMTP:COMMAND:VRFY
SMTP:COMMAND:EXPN
SMTP:COMMAND:HELP
SMTP:COMMAND:WIZ
SMTP:COMMAND:AV-INETSERV-DOS
SMTP:COMMAND:STARTTLS-CMD
SMTP:COMMAND:BDAT
SMTP:COMMAND:ETRN
SMTP:COMMAND:DEBUG

SMTP:DOS

SMTP:DOS:SMARTMAIL-DOS
SMTP:DOS:SENDMAIL-HEADERS-DOS
SMTP:DOS:OPENSSL-TLSRECORD
SMTP:DOS:GNU-MAILMAN-DATE-DOS
SMTP:DOS:GNU-SCRUBBER-UTF8-DOS
SMTP:DOS:EUDORA-MIME-DOS
SMTP:DOS:CLAM-TNEF-DOS
SMTP:DOS:OPENSSL-TLSRECORD-1
SMTP:DOS:MS-XL-2003-NULL-DOS
SMTP:DOS:CRAFTED-MX
SMTP:DOS:MS-MALWARE-ENGINE

SMTP:EMAIL

SMTP:EMAIL:HEADER-FROM-PIPE
SMTP:EMAIL:EUDORA-LONG-MSG-URL
SMTP:EMAIL:RELAY-ADDR-OF
SMTP:EMAIL:LOTUS-COLPALETTE-BO
SMTP:EMAIL:HEADER-TO-PIPE
SMTP:EMAIL:MAIL-FROM-PIPE
SMTP:EMAIL:REPLY-TO-PIPE
SMTP:EMAIL:IBM-LOTUS-NTS-WPD-BO
SMTP:EMAIL:RCPT-TO-PIPE
SMTP:EMAIL:EUDORA-SPOOF4
SMTP:EMAIL:EUDORA-SPOOF1
SMTP:EMAIL:RCPT-TO-DECODE
SMTP:EMAIL:EUDORA-SPOOF3

SMTP:EXCHANGE

SMTP:EXCHANGE:INV_BDAT_CMD
SMTP:EXCHANGE:INV_BDAT_SEC_LEN
SMTP:EXCHANGE:CMD_XEXCH50_2LONG
SMTP:EXCHANGE:SCT_XEXCH50_2LONG
SMTP:EXCHANGE:INVLD_XEXCH50_CMD
SMTP:EXCHANGE:MIME-MALF-ATTACH
SMTP:EXCHANGE:XLINK2_TOO_LONG
SMTP:EXCHANGE:AUTH-GUEST
SMTP:EXCHANGE:OWA-CSS
SMTP:EXCHANGE:CALENDAR-HEAP
SMTP:EXCHANGE:IMAP-DOS
SMTP:EXCHANGE:MULTI-MAILROUTE
SMTP:EXCHANGE:OWA-JSCRIPT
SMTP:EXCHANGE:MULTI-LONG-MAILRT
SMTP:EXCHANGE:EXCH-TNEF-BO
SMTP:EXCHANGE:MAL-VERB-XEXCH50
SMTP:EXCHANGE:ICAL-DOS
SMTP:EXCHANGE:MAILROUTE-OF

SMTP:EXPLOIT

SMTP:EXPLOIT:RELAY-ATTEMPT
SMTP:EXPLOIT:PINE-BOUNDARY
SMTP:EXPLOIT:SENDMAIL-IDENTEXEC
SMTP:EXPLOIT:RELAY-ATTEMPT-VAR
SMTP:EXPLOIT:EUDORA-URL-SPOOF
SMTP:EXPLOIT:MIME-TOOLS-EVADE
SMTP:EXPLOIT:KERIO-MS-FS
SMTP:EXPLOIT:EMAIL-ADDR-FS
SMTP:EXPLOIT:SUSPICIOUS-FROM
SMTP:EXPLOIT:SUSPICIOUS-TO
SMTP:EXPLOIT:DMAIL-FS
SMTP:EXPLOIT:SUSPICIOUS-COMM
SMTP:EXPLOIT:AUTH-BRUTE-FORCE
SMTP:EXPLOIT:AVI-RIGHT-CLICK
SMTP:EXPLOIT:MAL-AU-DOS
SMTP:EXPLOIT:JPXDECODE-RCE
SMTP:EXPLOIT:PINE-SLASHQUOTE
SMTP:EXPLOIT:EXIM-DOVECOT-RCE
SMTP:EXPLOIT:HCP-QUOTE-SCRIPT
SMTP:EXPLOIT:POSTFIX-AUTH-REUSE
SMTP:EXPLOIT:POSTFIX-AUT-REUSE1
SMTP:EXPLOIT:QT-PICT-FILE-MC
SMTP:EXPLOIT:GNUPG-INT-OF
SMTP:EXPLOIT:PINE-CHARSET-OF-1
SMTP:EXPLOIT:BITDEF-LOG

SMTP:EXT

SMTP:EXT:DOUBLE-EXTENSION
SMTP:EXT:DOT-SHS
SMTP:EXT:DOT-EXE
SMTP:EXT:DOT-VBS
SMTP:EXT:DOT-PIF
SMTP:EXT:DOT-SCR
SMTP:EXT:DOT-CMD
SMTP:EXT:DOT-BAT
SMTP:EXT:DOT-COM
SMTP:EXT:DOT-OCX
SMTP:EXT:DOT-MDE
SMTP:EXT:DOT-WSH
SMTP:EXT:DOT-WSF
SMTP:EXT:DOT-MSC
SMTP:EXT:DOT-MSI
SMTP:EXT:DOT-MSP
SMTP:EXT:DOT-PCD
SMTP:EXT:DOT-REG
SMTP:EXT:DOT-VB
SMTP:EXT:DOT-SCT
SMTP:EXT:DOT-WSC
SMTP:EXT:DOT-CRT
SMTP:EXT:DOT-JS
SMTP:EXT:DOT-MDB
SMTP:EXT:DOT-INF
SMTP:EXT:DOT-CHM
SMTP:EXT:DOT-HLP
SMTP:EXT:DOT-BAS
SMTP:EXT:DOT-JSE
SMTP:EXT:DOT-ADP
SMTP:EXT:DOT-ADE
SMTP:EXT:DOT-INS
SMTP:EXT:DOT-HTA
SMTP:EXT:DOT-ANI
SMTP:EXT:DOT
SMTP:EXT:FILE-AVI
SMTP:EXT:DOT-PPT
SMTP:EXT:DOT-386
SMTP:EXT:DOT-URL
SMTP:EXT:DOT-WSZ
SMTP:EXT:DOT-CPL
SMTP:EXT:DOT-ZIP
SMTP:EXT:DOT-ISP
SMTP:EXT:DIR-TRAV
SMTP:EXT:DOT-LNK
SMTP:EXT:DOT-WMF
SMTP:EXT:DOT-JOB
SMTP:EXT:DOT-GRP
SMTP:EXT:DOUBLE-EXTENSION-MIME
SMTP:EXT:DOT-HT

SMTP:IIS

SMTP:IIS:CDO-OF
SMTP:IIS:SSL-PCT-OF
SMTP:IIS:IIS-ENCAPS-RELAY

SMTP:INVALID

SMTP:INVALID:DUP-BOUNDARY
SMTP:INVALID:BOUNDARY-MISS
SMTP:INVALID:PARTIAL-MESG
SMTP:INVALID:UNFIN-MULTIPART
SMTP:INVALID:DUP-AUTH
SMTP:INVALID:2MANY-BOUNDARY
SMTP:INVALID:BASE64-CHAR

SMTP:MAILMAN

SMTP:MAILMAN:PASSWD-DISCLOSURE

SMTP:MAJORDOMO

SMTP:MAJORDOMO:COMMAND-EXEC

SMTP:MAL

SMTP:MAL:FIREFOX-HTML-URL-INJ
SMTP:MAL:SQM-CONTENT-XSS
SMTP:MAL:OUTLOOK-MAILTO-QUOT
SMTP:MAL:XSS-URL-IN-EMAIL
SMTP:MAL:DATA-SCHEME
SMTP:MAL:BMP-MAL-HEADER
SMTP:MAL:MALFORMED-WMF
SMTP:MAL:ANI-MAL-HEADER
SMTP:MAL:IBM-ATTACHMENT-VIEWER
SMTP:MAL:DOMINO-INOTES-XSS
SMTP:MAL:OUTLOOK-SHELL
SMTP:MAL:AIM-BO-URL
SMTP:MAL:JPEG-ATTACH-COMMENT-OF
SMTP:MAL:NOTES-INI-SMTP
SMTP:MAL:LOTUS-MIF-VIEWER
SMTP:MAL:WMF-MAL-HEADER
SMTP:MAL:EMAIL-URL-HIDING-ENC
SMTP:MAL:EXIM4-HEADER
SMTP:MAL:LOTUS-LZH-BOF
SMTP:MAL:NAV-ZIP-BOMB
SMTP:MAL:ANI-ATTACH
SMTP:MAL:LOTUS-APPLIX
SMTP:MAL:ACROBAT-UUEXEC
SMTP:MAL:MAL-ZIP-HDR
SMTP:MAL:MS-HSC-DVD-VLN
SMTP:MAL:LOTUS-DOC-VIEWER
SMTP:MAL:LOTUS-VIEWER
SMTP:MAL:LOTUS-MAILTO
SMTP:MAL:TBIRD-JAVASCRIPT
SMTP:MAL:NOTES-BIGMAIL-DOS
SMTP:MAL:LOTUS-WPD

SMTP:OUTLOOK

SMTP:OUTLOOK:DHTML-HANDLER-RACE
SMTP:OUTLOOK:OBJECT-TAG
SMTP:OUTLOOK:MMCN-EXEC
SMTP:OUTLOOK:VML-BOF
SMTP:OUTLOOK:TZID-OF
SMTP:OUTLOOK:RTF-PARSE
SMTP:OUTLOOK:LOCAL-LINK
SMTP:OUTLOOK:VEVENT-MEMCORRUPT
SMTP:OUTLOOK:MIME-PARSE-UAF
SMTP:OUTLOOK:W32-PARAM
SMTP:OUTLOOK:OBJECT-TAG-XML
SMTP:OUTLOOK:TNEF-INT-OF
SMTP:OUTLOOK:OSS-FILE
SMTP:OUTLOOK:HTML-NAME-OF
SMTP:OUTLOOK:OWA-XSS
SMTP:OUTLOOK:MHTML-CDI

SMTP:OVERFLOW

SMTP:OVERFLOW:BOUNDARY
SMTP:OVERFLOW:REPLY-LINE
SMTP:OVERFLOW:CONTENT-NAME
SMTP:OVERFLOW:EMAIL-USERNAME
SMTP:OVERFLOW:EMAIL-ADDRESS
SMTP:OVERFLOW:COMMAND-LINE
SMTP:OVERFLOW:FILENAME
SMTP:OVERFLOW:TOO-MANY-RCPT
SMTP:OVERFLOW:TEXT-LINE-OF
SMTP:OVERFLOW:EMAIL-DOMAIN
SMTP:OVERFLOW:LONGPARAM-STRBO3
SMTP:OVERFLOW:LONGPARAM-STRBO2
SMTP:OVERFLOW:TABS-EHLO-OF
SMTP:OVERFLOW:OUTLOOK-CERT-OF
SMTP:OVERFLOW:MHTML-OF
SMTP:OVERFLOW:SENDMAIL-MIME-OF
SMTP:OVERFLOW:SENDMAIL-CMT-OF2
SMTP:OVERFLOW:METAMAIL-HDR-FS2
SMTP:OVERFLOW:MS-WMF-OF
SMTP:OVERFLOW:METAMAIL-HDR-OF2
SMTP:OVERFLOW:NTLM-AUTH-OF
SMTP:OVERFLOW:HEADER-LINE-OF-1
SMTP:OVERFLOW:HEADER-LINE-OF
SMTP:OVERFLOW:IBM-BMP-COLOR
SMTP:OVERFLOW:SENDMAIL-CMT-OF1
SMTP:OVERFLOW:APPLE-PICT-MC
SMTP:OVERFLOW:MAILENABLE-BO

SMTP:REQERR

SMTP:REQERR:REQ-DUPLICATE-HELLO
SMTP:REQERR:REQ-SYNTAX-ERROR

SMTP:RESPONSE

SMTP:RESPONSE:BAD-RESPONSE
SMTP:RESPONSE:USER-UNKNOWN
SMTP:RESPONSE:RLY-ACC-DENIED
SMTP:RESPONSE:RLY-PBTED
SMTP:RESPONSE:PIPE-FAILED

SMTP:SENDMAIL

SMTP:SENDMAIL:DEBIAN-SASL-AUTH
SMTP:SENDMAIL:SENDMAIL-FF-OF
SMTP:SENDMAIL:ADDR-PRESCAN-ATK

SMTP:SERVER

SMTP:SERVER:OVERFLOW-WIN-X86

SMTP:VULN

SMTP:VULN:NOVELL-GROUPWISE-XSS
SMTP:VULN:IBM-LOTUS-GIF-PARS-CE
SMTP:VULN:CMAILSERVER
SMTP:VULN:MAILENABLE-FS
SMTP:VULN:MERCUR-3-3
SMTP:VULN:IMG-PARSE-BOF
SMTP:VULN:MERCUR-4-2
SMTP:VULN:GROUPWISE-IMG-OF
SMTP:VULN:EXIM-4-20

SNMP

SNMP:TRAP-DECODE-DOS
SNMP:FREEBSD-GETBULKRQST-BO
SNMP:SQUID-PROXY-ASN1-OF
SNMP:SNMPV3
SNMP:SNMPV1
SNMP:SNMPV2C
SNMP:SNMPV2U
SNMP:HMAC-AUTH-BYPASS
SNMP:FMT-STR-TCP
SNMP:HMAC-AUTH-BYPASS-EXPLOIT

SNMP:AUDIT

SNMP:AUDIT:OTHER-ERROR
SNMP:AUDIT:BAD-VALUE
SNMP:AUDIT:PRIVATE
SNMP:AUDIT:PUBLIC
SNMP:AUDIT:SET-REQUEST
SNMP:AUDIT:NO-SUCH-NAME
SNMP:AUDIT:UNKNOWN-VERSION

SNMP:COMMUNITY

SNMP:COMMUNITY:ZERO-LEN
SNMP:COMMUNITY:FORMAT-CHAR
SNMP:COMMUNITY:NULL-CHAR
SNMP:COMMUNITY:INTERNAL
SNMP:COMMUNITY:SURECOM-RTR
SNMP:COMMUNITY:ILMI
SNMP:COMMUNITY:OVERFLOW-1K
SNMP:COMMUNITY:AVAYA-DEFCOM1

SNMP:DANGEROUS

SNMP:DANGEROUS:JETDIRECT-PASS
SNMP:DANGEROUS:LINKSYS-WAP55AG
SNMP:DANGEROUS:SAMSUNG-PRINTERS

SNMP:DOS

SNMP:DOS:GETBULK
SNMP:DOS:CISCO-DOS
SNMP:DOS:WIN-DEL

SNMP:ENCODING

SNMP:ENCODING:MALFORMED-OID
SNMP:ENCODING:ZLEN-FOR-OID
SNMP:ENCODING:OIDVAL-TOO-BIG
SNMP:ENCODING:VALUE-MISSING
SNMP:ENCODING:ES-TOO-BIG
SNMP:ENCODING:EI-TOO-BIG
SNMP:ENCODING:NZLEN-FOR-NULL
SNMP:ENCODING:COUNTER-TOO-BIG
SNMP:ENCODING:TT-TOO-BIG
SNMP:ENCODING:IP-TOO-BIG
SNMP:ENCODING:GAUGE-TOO-BIG
SNMP:ENCODING:GET-BULK-REQ
SNMP:ENCODING:ZLEN-FOR-VALUE
SNMP:ENCODING:OID-TOO-LONG
SNMP:ENCODING:INT-TOO-BIG
SNMP:ENCODING:TLEN-TOO-BIG
SNMP:ENCODING:INVALID-MIBROOT

SNMP:ENUM

SNMP:ENUM:LM2-ACCESS
SNMP:ENUM:ORINOCO-INFO1

SNMP:ERROR

SNMP:ERROR:INVALID-MSG-FORMAT
SNMP:ERROR:CLIENT-RESPONSE
SNMP:ERROR:INVALID-RESPONSE
SNMP:ERROR:INVALID_TIMETICKS
SNMP:ERROR:INVALID_MAX_REPS
SNMP:ERROR:INV_NON_REPEATERS
SNMP:ERROR:INVALID_GAUGE_VALUE
SNMP:ERROR:INVALID_ESTATUS
SNMP:ERROR:INVALID-REQUEST
SNMP:ERROR:SERVER-REQUEST
SNMP:ERROR:MSG-TOO-SHORT

SNMP:INFO

SNMP:INFO:ERR_STAT_INCON_VAL
SNMP:INFO:ERROR_STATUS_GEN_ERR
SNMP:INFO:ERR_STAT_AUTH_ERROR
SNMP:INFO:ERR_STAT_INCON_NAME
SNMP:INFO:ERR_STATUS_WRG_LEN
SNMP:INFO:ERR_STAT_NO_ACCESS
SNMP:INFO:ERR_STAT_NO_CREAT
SNMP:INFO:ERR_STAT_RES_UNAVAIL
SNMP:INFO:ERR_STAT_WRG_ENC
SNMP:INFO:ERR_STAT_WRONG_VAL
SNMP:INFO:ERR_STAT_NOT_WRITABLE
SNMP:INFO:ERR_STAT_UNDO_FAILD
SNMP:INFO:ERR_STATUS_WRG_TYPE
SNMP:INFO:ERR_STAT_COMMIT_FAILD

SNMP:RESPONSE

SNMP:RESPONSE:READ-ONLY
SNMP:RESPONSE:TOO-BIG

SNMPTRAP:AUDIT

SNMPTRAP:AUDIT:UNKNOWN-VERSION
SNMPTRAP:AUDIT:PROXY-AGENT
SNMPTRAP:AUDIT:PUBLIC
SNMPTRAP:AUDIT:PRIVATE

SNMPTRAP:COMMUNITY

SNMPTRAP:COMMUNITY:NULL-CHAR
SNMPTRAP:COMMUNITY:ZERO-LEN
SNMPTRAP:COMMUNITY:FORMAT-CHAR
SNMPTRAP:COMMUNITY:OVERFLOW-1K

SNMPTRAP:ENCODING

SNMPTRAP:ENCODING:OID-TOO-LONG
SNMPTRAP:ENCODING:OVAL-TOO-BIG
SNMPTRAP:ENCODING:ZLEN-FOR-OID
SNMPTRAP:ENCODING:IP-TOO-BIG
SNMPTRAP:ENCODING:TT-TOO-BIG
SNMPTRAP:ENCODING:GAUGE-TOO-BIG
SNMPTRAP:ENCODING:MALFORMED-OID
SNMPTRAP:ENCODING:CNTR-TOO-BIG
SNMPTRAP:ENCODING:NZLEN-NULL
SNMPTRAP:ENCODING:ZLEN-VALUE
SNMPTRAP:ENCODING:TLEN-TOO-BIG
SNMPTRAP:ENCODING:INT-TOO-BIG
SNMPTRAP:ENCODING:INVALID-MROOT

SNMPTRAP:ERROR

SNMPTRAP:ERROR:INVALID-MSG-FMT
SNMPTRAP:ERROR:INV_TIMETICKS
SNMPTRAP:ERROR:INV_ERR_STAT
SNMPTRAP:ERROR:INV_ERRSTAT_LEN
SNMPTRAP:ERROR:INV_GAUGE_VAL
SNMPTRAP:ERROR:UNEXPECTED-REPLY
SNMPTRAP:ERROR:MSG-TOO-SHORT

SNMPTRAP:INFO

SNMPTRAP:INFO:STAT_RSUNAVAIL
SNMPTRAP:INFO:STAT_OTHER_ERR
SNMPTRAP:INFO:ERR_STAT_NO_ACC
SNMPTRAP:INFO:ERR_STAT_WRNG_LEN
SNMPTRAP:INFO:ERR_STAT_2BIG
SNMPTRAP:INFO:ERR_STAT_BAD_VAL
SNMPTRAP:INFO:STAT_INCON_NAME
SNMPTRAP:INFO:STAT_UNDO_FAIL
SNMPTRAP:INFO:STAT_WRNG_TYPE
SNMPTRAP:INFO:ERR_STAT_GEN_ERR
SNMPTRAP:INFO:ERR_STAT_AUTH_ERR
SNMPTRAP:INFO:STAT_INCON_VAL
SNMPTRAP:INFO:ERR_STAT_NO_NAME
SNMPTRAP:INFO:STAT_WRNG_VAL
SNMPTRAP:INFO:ERR_STAT_COM_FAIL
SNMPTRAP:INFO:ERR_STAT_NO_CREAT
SNMPTRAP:INFO:ERR_STAT_WRNG_ENC
SNMPTRAP:INFO:ERR_STAT_RD_ONLY
SNMPTRAP:INFO:ERR_STAT_NOT_WRIT

SPYWARE

SPYWARE:LIGATS

SPYWARE:AD

SPYWARE:AD:MEDIATICKETS
SPYWARE:AD:SPEDIABAR
SPYWARE:AD:MYWAYSEARCHBAR
SPYWARE:AD:WHENUSEARCH
SPYWARE:AD:CLIPGENIE
SPYWARE:AD:TRANSPONDERSTUB
SPYWARE:AD:ELITEBAR
SPYWARE:AD:ZAPSPOT
SPYWARE:AD:BROADCASTURBANTUNER
SPYWARE:AD:ATGAMES
SPYWARE:AD:KEENVALUE
SPYWARE:AD:CRAZYWINNINGS
SPYWARE:AD:MYDAILYHOROSCOPE
SPYWARE:AD:ISEARCH
SPYWARE:AD:WHENUWEATHERCAST
SPYWARE:AD:BARGAINBUDDY
SPYWARE:AD:PRAIZETOOLBAR
SPYWARE:AD:A9TOOLBAR
SPYWARE:AD:MONEYBAR
SPYWARE:AD:7FASST
SPYWARE:AD:CASINOONNET
SPYWARE:AD:BONZIBUD
SPYWARE:AD:CASHBACK
SPYWARE:AD:IGETNET
SPYWARE:AD:SHOPNAV
SPYWARE:AD:COMEDYPLANET
SPYWARE:AD:MYWEBSEARCHTOOLBAR
SPYWARE:AD:MIDADDLE
SPYWARE:AD:GABESTMEDIAPLAYER
SPYWARE:AD:HXDL
SPYWARE:AD:EZSEARCHBAR
SPYWARE:AD:WORDIQTOOLBAR
SPYWARE:AD:LINKSPIDERSEARCHBAR
SPYWARE:AD:HSADVISORTOOLBAR
SPYWARE:AD:NABAZATOOLBAR
SPYWARE:AD:KAZOOM
SPYWARE:AD:ASIAFINESTTOOLBAR
SPYWARE:AD:BLUBSTER-2X
SPYWARE:AD:MIRAGOSEARCHBAR
SPYWARE:AD:INEXPLORERTOOLBAR
SPYWARE:AD:WINFIXER2005
SPYWARE:AD:HOTOFFERS
SPYWARE:AD:HENBANG
SPYWARE:AD:AURORA
SPYWARE:AD:WINSYSBA
SPYWARE:AD:GROOWESEARCHBAR
SPYWARE:AD:MYSEARCHADROTATOR
SPYWARE:AD:SEARCHHIPPOTOOLBAR
SPYWARE:AD:SC-SEARCH-O-MATIC
SPYWARE:AD:ZTOOLBAR
SPYWARE:AD:NETSTER
SPYWARE:AD:ARESPREMIUM
SPYWARE:AD:EQISO
SPYWARE:AD:NEWWEB
SPYWARE:AD:ALLSUM
SPYWARE:AD:BORLAN
SPYWARE:AD:PPRICH
SPYWARE:AD:DOWNLOADER-G
SPYWARE:AD:WEBREDIR
SPYWARE:AD:CINMUS
SPYWARE:AD:YAYAD
SPYWARE:AD:MOKEAD
SPYWARE:AD:U88
SPYWARE:AD:IMNAMES
SPYWARE:AD:ROOGOO
SPYWARE:AD:ACTIVESEARCH
SPYWARE:AD:FAVSEARCH
SPYWARE:AD:WHENUSAVENOW
SPYWARE:AD:POWERZONE
SPYWARE:AD:ZENOSEARCH
SPYWARE:AD:VIEWPOINTMEDIA
SPYWARE:AD:COMTRYMUSICDL
SPYWARE:AD:VIRTUMONDE
SPYWARE:AD:ZUVIO
SPYWARE:AD:KOOLBAR
SPYWARE:AD:OFFEROPTIMIZER
SPYWARE:AD:GOLDENPALACECASINO
SPYWARE:AD:BTGRAB
SPYWARE:AD:BROWSERACCELERATOR
SPYWARE:AD:FREEWAREFILEBAR
SPYWARE:AD:YELLOWBRIDGETOOLBAR
SPYWARE:AD:HANSONELLISTOOLBAR
SPYWARE:AD:ZIPITFAST
SPYWARE:AD:STATIONRIPPER
SPYWARE:AD:ATLAS
SPYWARE:AD:PACIMEDIA
SPYWARE:AD:DIVXPRO
SPYWARE:AD:STARWARETOOLBAR
SPYWARE:AD:SPYWARENUKER
SPYWARE:AD:HOTBOTDESKBAR
SPYWARE:AD:APROPOSMEDIA
SPYWARE:AD:TOOLBARBROWSER
SPYWARE:AD:EZULA-TOPTEXT
SPYWARE:AD:TRELLIANTOOLBAR
SPYWARE:AD:ESYNDICATE
SPYWARE:AD:ALTAVISTATOOLBAR
SPYWARE:AD:ASKJEEVESTOOLBAR
SPYWARE:AD:AORNUM
SPYWARE:AD:ULTRABAR
SPYWARE:AD:GAMEBAR
SPYWARE:AD:TVZSEARCH
SPYWARE:AD:WHENU-CLOCKSYNC
SPYWARE:AD:BLOWSEARCH
SPYWARE:AD:WINPUP
SPYWARE:AD:EXACTSEARCH
SPYWARE:AD:PURITYSCAN
SPYWARE:AD:4ARCADEPBAR
SPYWARE:AD:ADULTLINKS
SPYWARE:AD:MINIBUG
SPYWARE:AD:IST-POWERSCAN
SPYWARE:AD:CALLINGHOME-BIZ
SPYWARE:AD:METAEUREKA
SPYWARE:AD:SMARTPOPS
SPYWARE:AD:SIDEFIND
SPYWARE:AD:MAPQUEST-TOOLBAR
SPYWARE:AD:WAREZP2P
SPYWARE:AD:SEEQTOOLBAR
SPYWARE:AD:BUNDLEWARE
SPYWARE:AD:FUNBUDDYICONS
SPYWARE:AD:CUSTOMTOOLBAR
SPYWARE:AD:BROADCASTPC
SPYWARE:AD:CRACKSPIDER
SPYWARE:AD:CASALEMEDIA
SPYWARE:AD:EXACTNAVISEARCH
SPYWARE:AD:DOWNLOADWARE
SPYWARE:AD:SEARCHITBAR
SPYWARE:AD:IST-ISTBAR
SPYWARE:AD:NETWORKESSENTIALS
SPYWARE:AD:DRIVECLEANER10111
SPYWARE:AD:WINANTIVIRUSPRO2007
SPYWARE:AD:ICOOLOADER25
SPYWARE:AD:COOPEN
SPYWARE:AD:PESTBOT
SPYWARE:AD:AVSYSTEMCARE
SPYWARE:AD:MALWARE_CRUSH_3_7
SPYWARE:AD:VROOMSEARCH
SPYWARE:AD:GOPHORIA010B
SPYWARE:AD:X-CON3.2.8
SPYWARE:AD:PARTYPOKER07
SPYWARE:AD:2005SEARCHLOADER
SPYWARE:AD:3WPLAYER_1_7
SPYWARE:AD:WINZIX-2-2-0
SPYWARE:AD:NETWORDAGENT
SPYWARE:AD:NETGUARDERWEBCLEANER
SPYWARE:AD:SYSTEM-DOCTOR
SPYWARE:AD:IEDEFENDER
SPYWARE:AD:CONTRA_VIRUS
SPYWARE:AD:MALWARE-ALARM
SPYWARE:AD:YOURPRIVACYGUARD
SPYWARE:AD:SPY_SHREDDER_2_1
SPYWARE:AD:NEW-DOT-NET
SPYWARE:AD:DOWNLOAD-ACCEL
SPYWARE:AD:VEGASPALMSCASINO
SPYWARE:AD:DOGPILETOOLBAR
SPYWARE:AD:SHOPATHOMESELECT
SPYWARE:AD:GIRAFATOOLBAR
SPYWARE:AD:ADBARS
SPYWARE:AD:HOTBAR
SPYWARE:AD:PEOPLEONPAGE
SPYWARE:AD:TOPICKS
SPYWARE:AD:VX2-LOCALNRD
SPYWARE:AD:LORDOFSEARCH
SPYWARE:AD:NICTECH-BM2
SPYWARE:AD:GAMESPY-ARCADE
SPYWARE:AD:SEPRO
SPYWARE:AD:PALTALK
SPYWARE:AD:ADTOOLS
SPYWARE:AD:URLBLAZE
SPYWARE:AD:TEOMA
SPYWARE:AD:POWERSTRIP
SPYWARE:AD:WUPD-MEDIAACCESS
SPYWARE:AD:SSSPIDER
SPYWARE:AD:FREEDOWNLOADMANAGER
SPYWARE:AD:DIYBAR
SPYWARE:AD:ADSTART
SPYWARE:AD:BESTOFFERS
SPYWARE:AD:EZTRACKS
SPYWARE:AD:WEBCPR
SPYWARE:AD:WINADISCOUNT
SPYWARE:AD:SNAPULTRASEARCH136
SPYWARE:AD:NETPUMPER126
SPYWARE:AD:ADCLICKER-EJ
SPYWARE:AD:2MFREEGAMES
SPYWARE:AD:EMPIREPOKER
SPYWARE:AD:ZAMINGO
SPYWARE:AD:WEBSEARCH
SPYWARE:AD:ACCESSIBILITYTOOLBAR
SPYWARE:AD:DESKTOPMEDIA
SPYWARE:AD:GOLDRIVIERACASINO
SPYWARE:AD:ZANGOTOOLBAR
SPYWARE:AD:GEOMUNDOSTOOLBAR
SPYWARE:AD:SIMBAR
SPYWARE:AD:IZITOTOOLBAR
SPYWARE:AD:EARTHLINKTOOLBAR
SPYWARE:AD:FREESCRATCHANDWIN
SPYWARE:AD:SUNSHINESPY_1_0
SPYWARE:AD:JILYIETOOLBAR
SPYWARE:AD:INSTANTBUZZ
SPYWARE:AD:ADULTP2P_1_5
SPYWARE:AD:VIRUSPROTECTPRO37
SPYWARE:AD:LIVEPROTECTION
SPYWARE:AD:ELITE_PROTECTOR
SPYWARE:AD:SUPERFASTMP3SEARCH
SPYWARE:AD:COMODOTOOLBAR
SPYWARE:AD:TARGETSAVER
SPYWARE:AD:DOWNLOADRECEIVER
SPYWARE:AD:DELFINMEDIAVIEWER
SPYWARE:AD:SUPERFISH
SPYWARE:AD:SUPERFISH-INSTALL
SPYWARE:AD:PRICE-FOUNTAIN

SPYWARE:BH

SPYWARE:BH:CWS-GONNASEARCH
SPYWARE:BH:NAVEXCEL
SPYWARE:BH:ISTSLOTCHBAR
SPYWARE:BH:COUPONBAR
SPYWARE:BH:INTERNETOPTIMIZER
SPYWARE:BH:CWS-CAMEUP
SPYWARE:BH:DAOSEARCH
SPYWARE:BH:2ND-THOUGHT
SPYWARE:BH:WISHBONE
SPYWARE:BH:YOURSITEBAR
SPYWARE:BH:123MANIA
SPYWARE:BH:ILOOKUP
SPYWARE:BH:BLAZEFIND
SPYWARE:BH:OEMJIBAR
SPYWARE:BH:ABLE2KNOWTOOLBAR
SPYWARE:BH:EXACTSEEK
SPYWARE:BH:SEARCHESSISTANT
SPYWARE:BH:ADTRAFFIC
SPYWARE:BH:CWSSTARTPAGE-2
SPYWARE:BH:NEED2FIND
SPYWARE:BH:MAPSTANTOOLBAR
SPYWARE:BH:FFINDER
SPYWARE:BH:VIPNETLINK
SPYWARE:BH:QMTOOLBAR
SPYWARE:BH:ABCSEARCH
SPYWARE:BH:COOLSEARCH
SPYWARE:BH:SEARCHNUGGET
SPYWARE:BH:DIGITALNAMES
SPYWARE:BH:FREECRUISE-TB
SPYWARE:BH:EXTREME-BIZ
SPYWARE:BH:8848
SPYWARE:BH:411WEBTOOLBAR
SPYWARE:BH:BAZOOKABAR
SPYWARE:BH:PROVENTACTICS35
SPYWARE:BH:SOSOTOOLBAR
SPYWARE:BH:EZGREETS-TOOLBAR
SPYWARE:BH:SOGOU
SPYWARE:BH:RICERCADOPPIA
SPYWARE:BH:SPOTON
SPYWARE:BH:THECOOLBAR
SPYWARE:BH:EXCITESEARCHBAR
SPYWARE:BH:QCBAR
SPYWARE:BH:CNSMIN-3721
SPYWARE:BH:NAVEXCEL-HELPER
SPYWARE:BH:ZEROPOPUP
SPYWARE:BH:STARTNOW
SPYWARE:BH:LOOKTHRUBAR
SPYWARE:BH:SEARCHFORIT
SPYWARE:BH:SIDESTEP
SPYWARE:BH:EXTRATOOLBAR10
SPYWARE:BH:WOWOK-MP3
SPYWARE:BH:RABIO42
SPYWARE:BH:MUSICSTARWARETOOL
SPYWARE:BH:ONESTEPSEARCH10118
SPYWARE:BH:MORPHEUS-TOOLBAR
SPYWARE:BH:3SEARCH
SPYWARE:BH:SBUHOTBAR484
SPYWARE:BH:IMESHMEDIABAR
SPYWARE:BH:SIDEFIND-1-0
SPYWARE:BH:PERSONALWEB
SPYWARE:BH:NEWDOTNETQUICKSEARCH
SPYWARE:BH:LOOKSTER
SPYWARE:BH:SCNTOOLBAR
SPYWARE:BH:CNNICUPDATE
SPYWARE:BH:LOOKQUICK
SPYWARE:BH:SEXYVIDEOSCREENSAVER
SPYWARE:BH:BLUEWAVEADULTLINK-TB
SPYWARE:BH:MYFUNCARDS
SPYWARE:BH:PHAZEBAR
SPYWARE:BH:DREAMBAR
SPYWARE:BH:SEARCH4TOP
SPYWARE:BH:GRALICWRAP
SPYWARE:BH:KOMPASS-TOOLBAR
SPYWARE:BH:KWORD-INTERKEY
SPYWARE:BH:HDT_BAR
SPYWARE:BH:PEOPLE_PAL_6_6
SPYWARE:BH:BAIDU_TOOLBAR_4_9_4
SPYWARE:BH:DEEPDO_TOOLBAR
SPYWARE:BH:SOFA_TOOLBAR
SPYWARE:BH:EZ_TRACKS_TOOLBAR
SPYWARE:BH:LOCATORSTOOLBAR
SPYWARE:BH:FUNWEBPRODUCTS
SPYWARE:BH:LYCOSSIDESEARCH
SPYWARE:BH:SWBAR-ADROAD-CPR
SPYWARE:BH:HITHOPPER
SPYWARE:BH:YELLOWPAGES
SPYWARE:BH:RX-TOOLBAR
SPYWARE:BH:MICROGRAMING
SPYWARE:BH:FREEZE-COM
SPYWARE:BH:IMESHBAR
SPYWARE:BH:SNAPTOOLBAR
SPYWARE:BH:SPYNOVA
SPYWARE:BH:DEALIO_TOOLBAR
SPYWARE:BH:GETMIRAR
SPYWARE:BH:YOKSUPERSEARCH
SPYWARE:BH:FLASHBAR
SPYWARE:BH:SEARCHSQUIRE
SPYWARE:BH:PUSHTOOLBAR
SPYWARE:BH:STUMBLEUPON
SPYWARE:BH:HOTBAR100368
SPYWARE:BH:ABOUTBLANK

SPYWARE:BP

SPYWARE:BP:MIRARTOOLBAR
SPYWARE:BP:NEWNET
SPYWARE:BP:MACHERSTOOLBAR
SPYWARE:BP:SMILEYCENTRAL
SPYWARE:BP:INTERNETMARKETINGBAR
SPYWARE:BP:RUSSIAN-SEARCHBAR
SPYWARE:BP:BAIGOO
SPYWARE:BP:BYDOU
SPYWARE:BP:UPLINK
SPYWARE:BP:IEPLUGIN
SPYWARE:BP:BROWSERACCELERATOR30
SPYWARE:BP:HAPPYTOFIND
SPYWARE:BP:DITTO_TOOLBAR
SPYWARE:BP:IECODEC
SPYWARE:BP:ZQUEST-COOKIE
SPYWARE:BP:BYSOO
SPYWARE:BP:WILDTANGENT
SPYWARE:BP:ETCETERASEARCH
SPYWARE:BP:COMETCURSOR

SPYWARE:DIALER

SPYWARE:DIALER:EASYDATES
SPYWARE:DIALER:YEAKNET
SPYWARE:DIALER:PLUGINACCESS
SPYWARE:DIALER:STRIPPLAYER
SPYWARE:DIALER:TIB-PORN-DIALER
SPYWARE:DIALER:IEACCESS

SPYWARE:DM

SPYWARE:DM:BRIDALBASICS
SPYWARE:DM:SLINKYSLATETOOLBAR
SPYWARE:DM:MYNAPSTER
SPYWARE:DM:TRUSTYFILES
SPYWARE:DM:ALEXA-TOOLBAR
SPYWARE:DM:POPULARSCREENSAVERS
SPYWARE:DM:KONTIKI
SPYWARE:DM:ALTNET-VAR1
SPYWARE:DM:DWN-ARL
SPYWARE:DM:WEBHANCER

SPYWARE:GM

SPYWARE:GM:ALBUMGALAXY
SPYWARE:GM:TWISTER
SPYWARE:GM:SAH-CASHBACK
SPYWARE:GM:SEARCHBOSS
SPYWARE:GM:SONYROOTKIT
SPYWARE:GM:SPYSHERIFF
SPYWARE:GM:ZANGO-EASY-MESSENGER
SPYWARE:GM:SPYWARELOCKED33
SPYWARE:GM:IOWAWEBDOWNLOADER
SPYWARE:GM:SPYDAWN
SPYWARE:GM:CHILDWEBGUARDIAN
SPYWARE:GM:MYSPACEBARIE
SPYWARE:GM:SPYWARESTORMER
SPYWARE:GM:SONGOOG
SPYWARE:GM:VIRTUALBOUNCER
SPYWARE:GM:DOTCOMTOOLBAR
SPYWARE:GM:UFIXER2007
SPYWARE:GM:EXPERTANTIVIRUS41
SPYWARE:GM:VMNTOOLBAR16
SPYWARE:GM:ERRORSAFE
SPYWARE:GM:NETCRAFTTOOLBAR
SPYWARE:GM:SPYWAREQUAKE
SPYWARE:GM:RELEVANTKNOWLEDGE
SPYWARE:GM:WEBSITELOGGER34
SPYWARE:GM:PCAST
SPYWARE:GM:TROJ-SPYWAD-X
SPYWARE:GM:EDONKEY2000

SPYWARE:KL

SPYWARE:KL:CODENAMEALVIN
SPYWARE:KL:XPCSPY-FTP
SPYWARE:KL:SPYLANTERNKEYLOGGER
SPYWARE:KL:ACTIVEKEYLOGGER
SPYWARE:KL:PERFECTKEYLOGGER-FTP
SPYWARE:KL:SPYOUTSIDE-SMTP
SPYWARE:KL:NETTRACK-SPY
SPYWARE:KL:007SPYSOFTWARE-FTP
SPYWARE:KL:WINTECTIVE
SPYWARE:KL:LTTLOGGER
SPYWARE:KL:BEEE
SPYWARE:KL:XP-ADVANCEDKEYLOGGER
SPYWARE:KL:MYBRKEYLOGGER
SPYWARE:KL:ELGOLF
SPYWARE:KL:PROAGENT
SPYWARE:KL:STARLOGGER
SPYWARE:KL:WINSPY
SPYWARE:KL:MASSCONNECT
SPYWARE:KL:FKWP-KEYLOGGER
SPYWARE:KL:ELITEKEYLOGGER
SPYWARE:KL:CAM2FTP
SPYWARE:KL:KGBKEYLOGGER
SPYWARE:KL:ACTIVEKEYLOGGERHOME
SPYWARE:KL:HACKERWACKER
SPYWARE:KL:WINFAMILYSAFETY
SPYWARE:KL:ARDAMAXKLOGGER28
SPYWARE:KL:APLUSKEYLOGGER
SPYWARE:KL:MG-SHADOW20
SPYWARE:KL:LOGIT10
SPYWARE:KL:ACTIVEKEYLOGGER_392
SPYWARE:KL:EMAILSPYMONITOR_6_9
SPYWARE:KL:LANTERNKEYLOGGER_6
SPYWARE:KL:ADVANCEDSPY_4
SPYWARE:KL:COMPUTERMONITOR_1_1
SPYWARE:KL:FINDNOT_GUARDOG
SPYWARE:KL:SMART_PC_KEYLOGGER
SPYWARE:KL:FEARLESSKEYSPY
SPYWARE:KL:STEALTHACTREPORTER
SPYWARE:KL:DREAMSCAPEKEYLOGGER
SPYWARE:KL:BOSSEVERYWARE
SPYWARE:KL:ACTIVITY-LOGGER
SPYWARE:KL:GURLWATCH
SPYWARE:KL:COMPUTERSPY
SPYWARE:KL:FARSIGHTER
SPYWARE:KL:ESURVEILLER
SPYWARE:KL:PC-PARENT
SPYWARE:KL:DESKTOPSCOUT
SPYWARE:KL:PCACTMONPRO
SPYWARE:KL:LITTLEWITCHKEYLOGGER
SPYWARE:KL:ADVCMPMONITOR
SPYWARE:KL:PAGKEYLOG
SPYWARE:KL:KEYSPY
SPYWARE:KL:NICESPY
SPYWARE:KL:ADVANCEDKEYLOGGER
SPYWARE:KL:GHOSTKEYLOGGER
SPYWARE:KL:ALLINONEKEYLOGGER
SPYWARE:KL:SPYTECTOR131
SPYWARE:KL:SYSTEMSURVEILLANCE
SPYWARE:KL:POWERSPY
SPYWARE:KL:EMAILSPYPRO
SPYWARE:KL:KEYSPYWARE
SPYWARE:KL:OVERSPY
SPYWARE:KL:STARR
SPYWARE:KL:PC-BLACK-BOX
SPYWARE:KL:SPYGRAPHICAPRO
SPYWARE:KL:COMPUTERMONITORKL
SPYWARE:KL:SSKC20
SPYWARE:KL:APOPHISSPY10
SPYWARE:KL:SUPREMESPY
SPYWARE:KL:BEYOND-KEYLOGGER-FTP
SPYWARE:KL:BASP-PRO-4
SPYWARE:KL:MSN-SPY-MONITOR
SPYWARE:KL:WIN32.REMOTEKEYLOG.B
SPYWARE:KL:BEYONDKEYLOGGER_SMTP
SPYWARE:KL:RADARSPY-10
SPYWARE:KL:SYSTEMSLEUTH
SPYWARE:KL:POWEREDKEYLOGGER-2-2
SPYWARE:KL:PERFECTKEYLOGGER168
SPYWARE:KL:KEYLOGGERKINGHOME32
SPYWARE:KL:SPYBUDDY372
SPYWARE:KL:WEBMAILSPY
SPYWARE:KL:WATCHDOG
SPYWARE:KL:ACESPY
SPYWARE:KL:EYESPYPRO
SPYWARE:KL:PCSENTINELSOFTWAREKL
SPYWARE:KL:007SPYSOFTWARE-SMTP
SPYWARE:KL:KEYLOGGERPRO
SPYWARE:KL:COMPUTERKEYLOGGER
SPYWARE:KL:ACTUALSPY
SPYWARE:KL:ARDAMAXKEYLOGGER
SPYWARE:KL:ACTIVITYMONITOR
SPYWARE:KL:SPYOUTSIDE-FTP
SPYWARE:KL:DESKTOPDETECTIVE
SPYWARE:KL:NETOBSERVE
SPYWARE:KL:ACTIVITYKEYLOGGER
SPYWARE:KL:SC-KEYLOG
SPYWARE:KL:NETVIZOR52
SPYWARE:KL:INWEBSITELOG24
SPYWARE:KL:SYS-KEYLOG-1-3
SPYWARE:KL:WINVESTIGATOR

SPYWARE:RAT

SPYWARE:RAT:DIEMSMUTTER
SPYWARE:RAT:PRORAT1-9-ICQ
SPYWARE:RAT:CIA1-22-ICQ
SPYWARE:RAT:CIA1-22-HTTP
SPYWARE:RAT:CIA1-22-FTP
SPYWARE:RAT:SPYAGENT
SPYWARE:RAT:STEALTHREDIR-TCP
SPYWARE:RAT:BUSCHTROMMEL1-22
SPYWARE:RAT:AIR
SPYWARE:RAT:SHNAPPZHTTPRAT
SPYWARE:RAT:ANALFTP
SPYWARE:RAT:MINIOBLIVION
SPYWARE:RAT:SNIPERNET
SPYWARE:RAT:BIFROSE
SPYWARE:RAT:REMOTER
SPYWARE:RAT:ROACH10-INITIALRESP
SPYWARE:RAT:ARCANUM-0-1-1
SPYWARE:RAT:PCACMEPRO
SPYWARE:RAT:STEALTHREDIR-FTP
SPYWARE:RAT:ANALRAPE-ICQ-NOTIFY
SPYWARE:RAT:FEAR2-0
SPYWARE:RAT:BOBO
SPYWARE:RAT:DATARAPE10F-GETPWD
SPYWARE:RAT:NETDEMON1-0
SPYWARE:RAT:REMOTE-ANYTHING
SPYWARE:RAT:OMERTA-V13
SPYWARE:RAT:NIGHTCREATURE
SPYWARE:RAT:MINIMO
SPYWARE:RAT:AQUA-0-2
SPYWARE:RAT:BADRAT1-1
SPYWARE:RAT:CYBERNETIC1-62
SPYWARE:RAT:FORCEDCONTROL
SPYWARE:RAT:MASTER
SPYWARE:RAT:EXCEPTION1-0-HTTP
SPYWARE:RAT:BEAST202-ICQ
SPYWARE:RAT:DSKLITE1-0-ICQ
SPYWARE:RAT:ABACAB-HTTP
SPYWARE:RAT:ERAZER-ICQ
SPYWARE:RAT:ASSASSIN1-1-HTTP
SPYWARE:RAT:CIA1-22-SMTP
SPYWARE:RAT:NEUROTICKAT1-3-ICQ
SPYWARE:RAT:HATREDFRIEND-TCP
SPYWARE:RAT:BIONET-TCP
SPYWARE:RAT:NETOPREMOTECONTROL
SPYWARE:RAT:ACIDHEAD
SPYWARE:RAT:HIDDENCAMERA
SPYWARE:RAT:ANTILAMER
SPYWARE:RAT:ACIDDROP
SPYWARE:RAT:SMALLUPLOADER
SPYWARE:RAT:REMOTEHAVOC
SPYWARE:RAT:COOLREMOTECONTROL
SPYWARE:RAT:ACTMONMONITORING
SPYWARE:RAT:THEEF-2.0-CGI
SPYWARE:RAT:THEEF-2-0-ICQ
SPYWARE:RAT:FADE1-0-HTTP
SPYWARE:RAT:FADE1-0-TCP
SPYWARE:RAT:INCOMMAND
SPYWARE:RAT:CIA1-3
SPYWARE:RAT:AMITIS
SPYWARE:RAT:BIONET
SPYWARE:RAT:HERMANUPLOADER-CTS
SPYWARE:RAT:PRORAT1-9
SPYWARE:RAT:HERMANUPLOADER-STC
SPYWARE:RAT:NTRC2000
SPYWARE:RAT:SOFTWARSHADOW-CTS
SPYWARE:RAT:BEAST20X-CTS
SPYWARE:RAT:FREAK
SPYWARE:RAT:BIONET405-STC
SPYWARE:RAT:HANUMAN
SPYWARE:RAT:CIA1-22
SPYWARE:RAT:BIONET405-CTS
SPYWARE:RAT:ROACH1-0-CTS
SPYWARE:RAT:SPECREM6-2-CTS
SPYWARE:RAT:LITTLEWITCHEXPLORER
SPYWARE:RAT:SNID-X2-1-2C-STC
SPYWARE:RAT:ROACH1-0-STC
SPYWARE:RAT:SPECREM6-2-STC
SPYWARE:RAT:TRAITOR21
SPYWARE:RAT:NETCONTROLTAKEOVER
SPYWARE:RAT:ANTIPC
SPYWARE:RAT:96MM
SPYWARE:RAT:RTB666
SPYWARE:RAT:COMA-STC
SPYWARE:RAT:BEAST202-STC
SPYWARE:RAT:REMOTECONTROL-17
SPYWARE:RAT:ALEXMESSOMALEX-CTS
SPYWARE:RAT:SNID-X2-1-2C-CTS
SPYWARE:RAT:ALEXMESSOMALEX-STC
SPYWARE:RAT:ASSASSIN-1-1STC
SPYWARE:RAT:KATUX2-0-SERVER
SPYWARE:RAT:COMA-CTS
SPYWARE:RAT:FERAT1-00-STC
SPYWARE:RAT:SKYRATSHOW
SPYWARE:RAT:NEUROTICKAT1-3-CTS
SPYWARE:RAT:FERAT1-00-CTS
SPYWARE:RAT:ASSASSIN1-1-CTS
SPYWARE:RAT:NEUROTICKAT1-3-STC
SPYWARE:RAT:HVLRAT-530-STC
SPYWARE:RAT:SCHWINDLER1-82-CTS
SPYWARE:RAT:GREEKHACKERS1-1-STC
SPYWARE:RAT:SCHWINDLER1-82-STC
SPYWARE:RAT:GREEKHACKERS1-1-CTS
SPYWARE:RAT:LANFILTRATOR-SIN
SPYWARE:RAT:SOFTWARSHADOW-STC
SPYWARE:RAT:LANFILTRATOR1-1-STC
SPYWARE:RAT:HVLRAT-530-CTS
SPYWARE:RAT:MINICOMMAND203-CTS
SPYWARE:RAT:MINICOMMAND203-STC
SPYWARE:RAT:STRIKER1-0
SPYWARE:RAT:XHX1-6
SPYWARE:RAT:AUTOCRAT
SPYWARE:RAT:EVILFTP
SPYWARE:RAT:JOKERSFTP
SPYWARE:RAT:WEBCAMTROJAN
SPYWARE:RAT:BSETROJAN
SPYWARE:RAT:BACKATTACK
SPYWARE:RAT:YAT1-3
SPYWARE:RAT:FAKE0-2
SPYWARE:RAT:FLUX
SPYWARE:RAT:CD-ROMTROJAN
SPYWARE:RAT:FREAK88DAS
SPYWARE:RAT:SCREENCONTROL10-CTS
SPYWARE:RAT:SCREENCONTROL10-STC
SPYWARE:RAT:A-311DEATH
SPYWARE:RAT:SMARTHACKUPLOADER
SPYWARE:RAT:LAMESPY
SPYWARE:RAT:REMOTESTORM1-2STC
SPYWARE:RAT:DIGITALUPLOAD
SPYWARE:RAT:REMOTESTORM1-2-CTS
SPYWARE:RAT:BOSSWATCHER
SPYWARE:RAT:PHOENIX2-1-28
SPYWARE:RAT:NETCONTROLE3-0
SPYWARE:RAT:WINSHELL
SPYWARE:RAT:SHITHEEP
SPYWARE:RAT:AMREMOTECLIENT1-1
SPYWARE:RAT:HANKYPANKY
SPYWARE:RAT:FATALWOUND
SPYWARE:RAT:BLUEFIRE-FTP
SPYWARE:RAT:SHNAPPZHTTPRAT-SMTP
SPYWARE:RAT:NETANGEL1-0-SIN
SPYWARE:RAT:BIONET-FTP
SPYWARE:RAT:FF-RAT-SRV-RSP
SPYWARE:RAT:FF-RAT-BIN-BEACON
SPYWARE:RAT:SERVEME
SPYWARE:RAT:PCSHARE
SPYWARE:RAT:SUPERRA
SPYWARE:RAT:SPYAGENT-FTP
SPYWARE:RAT:X2A
SPYWARE:RAT:SPYONE-1-0
SPYWARE:RAT:SUPERSPY
SPYWARE:RAT:SUPERVISORPLUS
SPYWARE:RAT:CHARON-1-0-3
SPYWARE:RAT:STATWIN
SPYWARE:RAT:RIX310
SPYWARE:RAT:DIGIWATCHER-2-32
SPYWARE:RAT:HUNTERGOP
SPYWARE:RAT:COOLCAT
SPYWARE:RAT:DSKLITE1-0
SPYWARE:RAT:SPYAGENT-ALERT
SPYWARE:RAT:FRAG-ROCK-2-0
SPYWARE:RAT:MITHRIL-1-45
SPYWARE:RAT:NCPH
SPYWARE:RAT:EXCEPTION1-0
SPYWARE:RAT:MINICOMMAND203-ICQ
SPYWARE:RAT:OMNIQUARD-IRC
SPYWARE:RAT:HORNET
SPYWARE:RAT:FORCE1-61
SPYWARE:RAT:ROBO-HACK1-2
SPYWARE:RAT:NEUROTICKITTEN
SPYWARE:RAT:BLUEFIRE
SPYWARE:RAT:NUCLEAR-RAT-6-21
SPYWARE:RAT:LANFILTRATOR1-1-CTS
SPYWARE:RAT:SPYAGENT-SMTP
SPYWARE:RAT:DWMREMOTECONTROL
SPYWARE:RAT:GH0ST

SPYWARE:TROJAN

SPYWARE:TROJAN:HATREDFIEND
SPYWARE:TROJAN:HELIOS-ICQNOTIFY
SPYWARE:TROJAN:DOWNLOADER-ARM
SPYWARE:TROJAN:CYN21
SPYWARE:TROJAN:ABWIZ-C
SPYWARE:TROJAN:BAC-GEN-E
SPYWARE:TROJAN:DOWNLOADER-YD
SPYWARE:TROJAN:SHARK232
SPYWARE:TROJAN:SPAM-MAXY
SPYWARE:TROJAN:UPNRUN-V10
SPYWARE:TROJAN:DOWNLOADER.AB
SPYWARE:TROJAN:HAVRAT1.1
SPYWARE:TROJAN:51D1B
SPYWARE:TROJAN:GENIE17
SPYWARE:TROJAN:BACKORIFICE2006
SPYWARE:TROJAN:BLUEEYE10B
SPYWARE:TROJAN:UNNAMED-BD
SPYWARE:TROJAN:AGENTWD
SPYWARE:TROJAN:BERSEK1.0
SPYWARE:TROJAN:APOFIS1.0
SPYWARE:TROJAN:CROSSBOW
SPYWARE:TROJAN:SNOWDOOR
SPYWARE:TROJAN:LOKITECH
SPYWARE:TROJAN:FALLINGSTAR
SPYWARE:TROJAN:OUTBREAK
SPYWARE:TROJAN:SINIQUE1-0
SPYWARE:TROJAN:3XBACKDOOR
SPYWARE:TROJAN:BLHOUSE
SPYWARE:TROJAN:HTTPRAT
SPYWARE:TROJAN:HALFLIFEJACKER
SPYWARE:TROJAN:G-SPOT
SPYWARE:TROJAN:SILENTSPY
SPYWARE:TROJAN:SANDESA-ICQNOTIF
SPYWARE:TROJAN:FKWP-WDOWNLOADER
SPYWARE:TROJAN:ACCESSREMOTEPC
SPYWARE:TROJAN:BIFROST121
SPYWARE:TROJAN:RADMIN30
SPYWARE:TROJAN:BANDOOK-1-35
SPYWARE:TROJAN:HOTMAILHACKER5
SPYWARE:TROJAN:THEEF210
SPYWARE:TROJAN:THEEF210FTP
SPYWARE:TROJAN:LITHIUM102
SPYWARE:TROJAN:DOWNLOADERDELF
SPYWARE:TROJAN:YURI-1-2
SPYWARE:TROJAN:TROYA_1_4
SPYWARE:TROJAN:EXPLOIT_1_4_5
SPYWARE:TROJAN:BAROK
SPYWARE:TROJAN:BACKLASH
SPYWARE:TROJAN:LETMERULE20-STC
SPYWARE:TROJAN:MOSUCKER3-0
SPYWARE:TROJAN:EVILGOAT
SPYWARE:TROJAN:SNAKETROJAN
SPYWARE:TROJAN:BRAINWIPER
SPYWARE:TROJAN:DACRYPTIC
SPYWARE:TROJAN:ERAZER
SPYWARE:TROJAN:MESSIAH2-0
SPYWARE:TROJAN:WEBDOWNLOADER
SPYWARE:TROJAN:AUTOSPY-STC
SPYWARE:TROJAN:LITTLEWITCH-CMD
SPYWARE:TROJAN:MYDEMISE
SPYWARE:TROJAN:OPTIXLITE
SPYWARE:TROJAN:LETMERULE20-CTS
SPYWARE:TROJAN:AUTOSPY-CTS
SPYWARE:TROJAN:THUZEROTOLERANCE
SPYWARE:TROJAN:DIMBUS
SPYWARE:TROJAN:HRAT
SPYWARE:TROJAN:ELFRAT
SPYWARE:TROJAN:FUNFACTORY-STC
SPYWARE:TROJAN:CLANDESTINE
SPYWARE:TROJAN:WOLLF
SPYWARE:TROJAN:PHANTOMFTP
SPYWARE:TROJAN:ERASER
SPYWARE:TROJAN:GWBOY
SPYWARE:TROJAN:COMANDO
SPYWARE:TROJAN:TEQUILABANDITA
SPYWARE:TROJAN:SINSTERLER
SPYWARE:TROJAN:HGZ
SPYWARE:TROJAN:NUCLEARUP
SPYWARE:TROJAN:SEED1-0
SPYWARE:TROJAN:NETANGEL1-0
SPYWARE:TROJAN:X-BKDR
SPYWARE:TROJAN:INIKILLER
SPYWARE:TROJAN:REVERSABLE
SPYWARE:TROJAN:ACROPOLIS
SPYWARE:TROJAN:HUE1-0
SPYWARE:TROJAN:ABACAB
SPYWARE:TROJAN:VOICESPY
SPYWARE:TROJAN:FUCKTROJAN
SPYWARE:TROJAN:RAD1-2-3
SPYWARE:TROJAN:NETSHADOW
SPYWARE:TROJAN:BANDOOK-V1-0
SPYWARE:TROJAN:ZSPYII0.99
SPYWARE:TROJAN:IEVA1.0
SPYWARE:TROJAN:ONLY1RAT
SPYWARE:TROJAN:ACIDSHIVERS
SPYWARE:TROJAN:ZZMM20
SPYWARE:TROJAN:DWNLDR-ARQ
SPYWARE:TROJAN:LAMERAT10
SPYWARE:TROJAN:WEBCENTER
SPYWARE:TROJAN:WINSHADOW30
SPYWARE:TROJAN:ABREMOTEPRO31
SPYWARE:TROJAN:LURKER11
SPYWARE:TROJAN:BOER
SPYWARE:TROJAN:WINEGGDROPSPRO
SPYWARE:TROJAN:ACESSOR20
SPYWARE:TROJAN:THEX-12
SPYWARE:TROJAN:YXNETSCREEN20
SPYWARE:TROJAN:YKW375
SPYWARE:TROJAN:SUNSHADOW-1-70
SPYWARE:TROJAN:POISONIVY212
SPYWARE:TROJAN:ONE
SPYWARE:TROJAN:X-DOOR
SPYWARE:TROJAN:NIRVANA-2.0
SPYWARE:TROJAN:TROLLA
SPYWARE:TROJAN:REVOPA
SPYWARE:TROJAN:OPTIXPRO132
SPYWARE:TROJAN:PSEUDORAT01B
SPYWARE:TROJAN:Y3K2K5
SPYWARE:TROJAN:COBRAUPLOADER
SPYWARE:TROJAN:FURAX10B3
SPYWARE:TROJAN:WINTERLOVE
SPYWARE:TROJAN:GLOBALKILLER-STC
SPYWARE:TROJAN:REMOTEHACK
SPYWARE:TROJAN:BLACKCURSE4
SPYWARE:TROJAN:DLOADERAGENT-TL
SPYWARE:TROJAN:WINICABRAS11
SPYWARE:TROJAN:DARKMOON-4-11
SPYWARE:TROJAN:ZALIVATOR142PRO
SPYWARE:TROJAN:HELIOS-3-1-STC
SPYWARE:TROJAN:CRASHCOOL-1-1
SPYWARE:TROJAN:EVADE1-1B
SPYWARE:TROJAN:SPYLPLY.A
SPYWARE:TROJAN:KMSNRAT100
SPYWARE:TROJAN:CROSSFIRESTROJAN
SPYWARE:TROJAN:TRAILOFDESTRUC20
SPYWARE:TROJAN:ZXSHELL

SPYWARE:UTIL

SPYWARE:UTIL:AMPLIFYTOOLBAR
SPYWARE:UTIL:COPERNICMETABAR
SPYWARE:UTIL:NUCLEARSCAN
SPYWARE:UTIL:WEBFERRET
SPYWARE:UTIL:SARIA
SPYWARE:UTIL:SPYBLOCS-EBLOCS
SPYWARE:UTIL:COPERNICAGENT
SPYWARE:UTIL:I2HUB
SPYWARE:UTIL:BOHAJER-DOWNLOADER
SPYWARE:UTIL:SPYWARESTRIKE
SPYWARE:UTIL:SPAMBLOCKERUTILITY
SPYWARE:UTIL:HIPPYNOTIFY20
SPYWARE:UTIL:SMARTBARXP

SSH

SSH:PACKET-WRITE-WAIT-BO
SSH:SYSAX-MULTI-SERVER-DOS
SSH:NON-STD-PORT
SSH:SYSAX-SERVER-DOS
SSH:PRAGMAFORT-KEY-OF
SSH:BRUTE-LOGIN
SSH:KBDINT-NEXT-DEV-POL-BYPAS-1
SSH:KBDINT-NEXT-DEV-POL-BYPASS
SSH:OPENSSH-MAXSTARTUP-DOS

SSH:AUDIT

SSH:AUDIT:UNEXPECTED-HEADER
SSH:AUDIT:SSH-V1

SSH:ERROR

SSH:ERROR:INVALID-PKT-TYPE
SSH:ERROR:COOKIE-MISMATCH
SSH:ERROR:MSG-TOO-SHORT
SSH:ERROR:MSG-TOO-LONG
SSH:ERROR:INVALID-HEADER

SSH:MISC

SSH:MISC:MAL-VERSION
SSH:MISC:EXPLOIT-CMDS-UNIX
SSH:MISC:UNIX-ID-RESP

SSH:OPENSSH

SSH:OPENSSH:BLOCK-DOS
SSH:OPENSSH:NOVEL-NETWARE
SSH:OPENSSH:GOODTECH-SFTP-BOF

SSH:OVERFLOW

SSH:OVERFLOW:SECURECRT-BOF
SSH:OVERFLOW:PUTTY-VER
SSH:OVERFLOW:FREESSHD-KEY-OF

SSL

SSL:SERVR-CERT-FAILS-VALIDATION
SSL:UNK-HANDSHAKE-TYPE
SSL:UNK-CHG-CPHR-SPEC-MSG
SSL:SERIAL-NUM-TOO-LONG
SSL:MSG-IN-WRONG-DIR
SSL:SESSION-ID-LEN-2BIG
SSL:ENC-LEN-VALUE-TOO-BIG
SSL:ENC-TAG-VALUE-TOO-BIG
SSL:CLNT-MSTR-KEY-OVERFLOW
SSL:CIPHER-SUITE-OVERFLOW
SSL:SESSION-KEY-REUSE-UNAVAIL
SSL:OPENSSL-TLS-HEARTBEAT
SSL:UNKNOWN-CIPHER-SUITE
SSL:COMPROMISEDCERT-DECTECTION
SSL:DHEEXP-512CPHR-LOGJAM-1
SSL:SSL-V3-BRUTE-FORCE
SSL:GNUTLS-ASN1-LENGTH-OF
SSL:HTTPS-UNIX-CMDS
SSL:HTTPS-UNIX-ID-RESP
SSL:AVAST-ANTIVIRUS-CERT-RCE
SSL:DEFAULT-PW
SSL:GNUTLS-TLS-RECORD-MC
SSL:TLS-BRUTE-FORCE
SSL:SYS-MGMT-HOMEP-CMD-INJ
SSL:OPENSSL-ECDH-DOS
SSL:SSL-V3-TRAFFC
SSL:MALFORMED-SCHANNEL-NEGO
SSL:SYMANTEC-EP-POLICY-BYPASS
SSL:OPENSSL-DTLS-MEMEXHTN_DOS
SSL:MOZ-SSLV2-CL
SSL:DTLS-DOS
SSL:NAGIOS-NRPE-CHKUSRS-CI
SSL:OPENSSL-TLSRECORD-DOS
SSL:UTN-USERFIRST-HARDWARE
SSL:SQUID-SSL-BUMP-DOS
SSL:OPENSSL-FLOOD
SSL:THC-SSL-DOS
SSL:OPENSSL-MEMLEAK-DOS
SSL:SSL-V3-TRAFFIC-CBS-ENC-ID
SSL:OPENSSL-DTLS-SRTP-DOS
SSL:EGO-GOV-FRAUD-CERTIFICATE
SSL:HP-DIAGNOSTICS-OF
SSL:GNUTLS-EXTRACT-DER-DOS
SSL:TURKTRUST-FRAUD-CERTIFICATE
SSL:SYMC-WEB-CMD-INJ
SSL:SSLSCAN-ACTIVITY
SSL:OPENSSL-DTLSCLIENTHELLO-DOS
SSL:DIGINOTAR-CERT-KEY-NEGO
SSL:OPENSSL-AES-NI-INTUDF
SSL:MS-WINDOWS-TLS-BYPASS
SSL:MS-SCHANNEL-RCE
SSL:OPENSSL-DTLS-DOS
SSL:OPENSSL-DTLS1-DOS
SSL:MCAFEE-EPOLICY-XML
SSL:CPHR-DOS
SSL:OPENSSL-SRP-BO
SSL:BEA-WEBLOGIC-DOS
SSL:OPENSSL-DO-SSL3-WRITE-DOS
SSL:SERVER-HELLO-SESSION-ID-OF
SSL:GNUTLS-HELLO-SESSION-ID-OF
SSL:MGM-CONSOLE-XSS
SSL:OPENSSL-DHE-DOS
SSL:EPO-XMLNTITY-INJ
SSL:MOZILLA-NSS-RSA-SIG-FORGERY
SSL:NOVELL-GROUPWISE-DIR-TRA
SSL:ALIEN-VAULT-OSSIM-SOAP-CE
SSL:OPENSSL-REC-HANDLING-DOS
SSL:OPENSSL-AES-NI-INTUDF2
SSL:APPLE-SSL-BYPASS-PROXY
SSL:GNUTLS-CERT-BYPASS
SSL:OPENSSL-ALT-CHAINS-CERT-FRG
SSL:OPENSSL-CHAINS-CERT-FORG
SSL:NOVELL-IMANAGER-DOS
SSL:NOVELL-ZENWORKS-UL
SSL:OPENSSL-ECDH-UAF
SSL:APPLE-SSL-BYPASS
SSL:GNUTLS-CERT-POLICY-BYPASS
SSL:OPENSSL-MITM-SEC-BYPASS
SSL:OPENSSL-TLS-DOS
SSL:APACHE-NIO-CONNECTOR-DOS
SSL:GNU-DER-PARSING-DOS
SSL:OPENSSL-TLS-DTLS-HEARTBEAT
SSL:OPENSSL-GET-KEY-EXCH-UAF
SSL:SLAPPER-WORM-PROBE
SSL:ALIEN-VAULT-SOAP-CE
SSL:ALIEN-VAULT-SOAP-REQUEST-CE
SSL:APACHE-MOD-SSL
SSL:OPENSSL-DTLS1-BOF
SSL:OPENSSL-HEARTBEAT-ALTERNATE
SSL:X509-CN-NULL-BYTE
SSL:OPENSSL-DTLS-REC-DOS

SSL:AUDIT

SSL:AUDIT:SESSION-KEY-REUSE
SSL:AUDIT:CERT-EXPIRED
SSL:AUDIT:KEY-RENEGOTIATION
SSL:AUDIT:TLS-V11-TRAFFIC
SSL:AUDIT:TLS-V12-TRAFFIC
SSL:AUDIT:TLS-V10-TRAFFIC
SSL:AUDIT:HTTP-OVER-SSL
SSL:AUDIT:NOT-SSL
SSL:AUDIT:CERT-BIT-LT-2048
SSL:AUDIT:RSA-EXPORT-CIPHER
SSL:AUDIT:SSL-V2-TRAFFIC
SSL:AUDIT:SSL-V3-TRAFFIC
SSL:AUDIT:DTLS-CLT-HELLO-FRAG
SSL:AUDIT:DHEEXP-512CPHR-LOGJAM
SSL:AUDIT:DHEEXP-512CPHRLOGJAM2

SSL:IIS

SSL:IIS:CERT-DOS

SSL:INVALID

SSL:INVALID:COMP-METH-LEN
SSL:INVALID:SVR-HELLO-FMT
SSL:INVALID:VALIDITY-FMT
SSL:INVALID:SESSION-ID-LEN
SSL:INVALID:CLIENT-HELLO
SSL:INVALID:COMP-METHOD
SSL:INVALID:CONTENT-TYPE
SSL:INVALID:MESSAGE-FMT
SSL:INVALID:CERT-CHAIN
SSL:INVALID:CERT-VERSION
SSL:INVALID:CIPHER-SPEC
SSL:INVALID:CERT-FORMAT
SSL:INVALID:CHALLENGE-LEN
SSL:INVALID:CIPHER-LEN
SSL:INVALID:SVR-HELLO-DATA
SSL:INVALID:CIPHER-SUITE
SSL:INVALID:LIBTASN1-DOS
SSL:INVALID:SVR-HELLO-DATA-1
SSL:INVALID:NULL-CERT
SSL:INVALID:SSL-INV-VER
SSL:INVALID:GNUTLS-RECORD-BO
SSL:INVALID:GNUTLS-RECORD-OF

SSL:OVERFLOW

SSL:OVERFLOW:SSL-KEY_ARG2
SSL:OVERFLOW:BEA-PLUGINS-CERT
SSL:OVERFLOW:SSL-KEY_ARG1
SSL:OVERFLOW:OPENSSL-SRP-CSUITE
SSL:OVERFLOW:ELLIPTIC-POLY-DOS
SSL:OVERFLOW:MSCRSFT-SCHANNL-CE
SSL:OVERFLOW:CIPHERS-OF
SSL:OVERFLOW:KEY-ARG-NO-ENTROPY
SSL:OVERFLOW:CIPHERS-OBO

SSL:VULN

SSL:VULN:OPENSSL-X509-DOS
SSL:VULN:KS-SSL-CERTVALIDATION
SSL:VULN:OPENSSL-HS-DOS
SSL:VULN:SYMANTEC-EP-PARAM-XSS
SSL:VULN:F5-ICONTROL-SOAP-CE
SSL:VULN:OPENSSL-PSS-PARAM
SSL:VULN:ASN1-TYPE-CMP-DOS
SSL:VULN:CVE-2015-0208-DOS
SSL:VULN:MOZILLA-NSS-REG
SSL:VULN:NOVELL-NETIQ-SB
SSL:VULN:NOVELL-FSFUI-UP2
SSL:VULN:HP-PROCURVE-SB
SSL:VULN:CVE-2015-0291-DOS
SSL:VULN:DTLS-DOUBLE-FREE-DOS

SYSLOG

SYSLOG:SYSLOG-CRAFTED-PKT
SYSLOG:CP-SYSLOGD-ESC
SYSLOG:PRI-PARSING-TCP-DOS
SYSLOG:PRI-PARSING-DOS
SYSLOG:WATCHER-PRO-DATE-XSS
SYSLOG:HP-MGMT-IMCSYSLOGDM-UAF

SYSLOG:AUDIT

SYSLOG:AUDIT:EMPTY-PRI
SYSLOG:AUDIT:INVALID-DAY
SYSLOG:AUDIT:INVALID-PRIORITY
SYSLOG:AUDIT:PACKET
SYSLOG:AUDIT:MISSING-TS
SYSLOG:AUDIT:INVALID-MONTH
SYSLOG:AUDIT:MISSING-PRI
SYSLOG:AUDIT:TIMESTAMP

SYSLOG:FAILURES

SYSLOG:FAILURES:MSG-TOO-SHORT
SYSLOG:FAILURES:UNEXP-REPLY
SYSLOG:FAILURES:EMPTY-MSG
SYSLOG:FAILURES:MSG-TOO-LONG

SYSLOG:FORMAT

SYSLOG:FORMAT:PRIORITY
SYSLOG:FORMAT:PRI-TOO-LONG

TCP:AMBIGUOUS

TCP:AMBIGUOUS:WSF-TOOBIG

TCP:AUDIT

TCP:AUDIT:S2C-PART-OUT-OF-WIN
TCP:AUDIT:OPT-UNSOL-TS
TCP:AUDIT:C2S-URG-DATA
TCP:AUDIT:S2C-SIMUL-SYN
TCP:AUDIT:S2C-LASTACK-ACK
TCP:AUDIT:UNKNOWN
TCP:AUDIT:S2C-FINRETR-BADSEQ
TCP:AUDIT:S2C-TIMEWAIT-ACK
TCP:AUDIT:S2C-SEG-OUT-OF-WIN
TCP:AUDIT:S2C-FIN-OUT-OF-WIN
TCP:AUDIT:S2C-FINWAIT2-FIN
TCP:AUDIT:S2C-TIMEWAIT-FIN
TCP:AUDIT:NONSYN-SACKPERM
TCP:AUDIT:BAD-SYN-NONSYN
TCP:AUDIT:S2C-FUTURE-ACK
TCP:AUDIT:OLD-SYNACK
TCP:AUDIT:UNSOL-SACKPERM
TCP:AUDIT:C2S-FUTURE-ACK
TCP:AUDIT:SYN-RTNS--BADWSF
TCP:AUDIT:SYN-RTNS-BADTS
TCP:AUDIT:UNSOL-WSF
TCP:AUDIT:DUP-SEQ-SEG-RETRANS
TCP:AUDIT:S2C-OLD-ESTB
TCP:AUDIT:S2C-RST-DATA
TCP:AUDIT:SYNSENT-RST
TCP:AUDIT:OPTIONS-UNNEGOT-TS
TCP:AUDIT:WRONG-CHECKSUM
TCP:AUDIT:C2S-OLD-ESTB
TCP:AUDIT:C2S-SEG-OUT-OF-WIN
TCP:AUDIT:C2S-TIMEWAIT-FIN
TCP:AUDIT:C2S-TIMEWAIT-ACK
TCP:AUDIT:C2S-LASTACK-ACK
TCP:AUDIT:C2S-RST-DATA
TCP:AUDIT:SYNSENT-NONSYN
TCP:AUDIT:S2C-SYN-RST
TCP:AUDIT:C2S-FINRETR-BADSEQ
TCP:AUDIT:OPT-UNSUP
TCP:AUDIT:SYN-RTNS-BADWIN
TCP:AUDIT:SYNRCVD-SYNACK
TCP:AUDIT:OPTIONS-UNNEGOT-SACK
TCP:AUDIT:C2S-CLOSED-ACK
TCP:AUDIT:SYN-RTNS-BADISS
TCP:AUDIT:OLD-3WH-ACK

TCP:C2S:AMBIG

TCP:C2S:AMBIG:C2S-SYN-DATA
TCP:C2S:AMBIG:SYN-RTNS--BADSACK
TCP:C2S:AMBIG:OLAP-MISMATCH

TCP:C2S:ERROR

TCP:C2S:ERROR:REASS-LOST-TRACK

TCP:C2S:EVASION

TCP:C2S:EVASION:C2S-URG-OUT-WIN
TCP:C2S:EVASION:C2S-ESTB-SYN

TCP:C2S:EXPLOIT

TCP:C2S:EXPLOIT:TCP-ZERO-PORT
TCP:C2S:EXPLOIT:C2S-URG-OVERLAP
TCP:C2S:EXPLOIT:URG-WO-FLG
TCP:C2S:EXPLOIT:RST-BRUTE-FORCE

TCP:C2S:FLAGSERROR

TCP:C2S:FLAGSERROR:DIRTY-SYN

TCP:C2S:INFO

TCP:C2S:INFO:C2S-FIN-OUT-OF-WIN

TCP:ERROR

TCP:ERROR:FLOW-MEMORY-EXCEEDED
TCP:ERROR:REASS-MEMORY-OVERFLOW

TCP:EXPLOIT

TCP:EXPLOIT:SOCKSTRESS

TCP:OPTERR

TCP:OPTERR:NONSYN-WSF
TCP:OPTERR:SHORT-READ
TCP:OPTERR:SYN-SACK
TCP:OPTERR:TOO-LONG
TCP:OPTERR:NONSYN-MSS
TCP:OPTERR:BAD-LENGTH
TCP:OPTERR:BAD-OPTION
TCP:OPTERR:ZERO-LENGTH
TCP:OPTERR:MS-ZERO-WINDOW-SIZE
TCP:OPTERR:MS-ORPHAN-CONNECTION

TCP:S2C:AMBIG

TCP:S2C:AMBIG:OLAP-MISMATCH

TCP:S2C:ERROR

TCP:S2C:ERROR:REASS-LOST-TRACK

TCP:S2C:EVASION

TCP:S2C:EVASION:S2C-URG-OUT-WIN
TCP:S2C:EVASION:S2C-ESTB-SYN

TCP:S2C:EXPLOIT

TCP:S2C:EXPLOIT:URG-WO-FLAGS
TCP:S2C:EXPLOIT:S2C-URG-OVERLAP

TCP:S2C:FLAGSERROR

TCP:S2C:FLAGSERROR:DIR-SYNACK

TCP:S2C:INFO

TCP:S2C:INFO:S2C-URG-DATA

TELNET:AUDIT

TELNET:AUDIT:USER
TELNET:AUDIT:REQ-SUBNEG-UNKNOWN

TELNET:CMD

TELNET:CMD:HALT
TELNET:CMD:CAT-ETC-PASSWD
TELNET:CMD:ALLIED-TELESIS-PRIV
TELNET:CMD:SCRIPT-TAGS-STREAM
TELNET:CMD:RAPIDHAMSTER-R2-TRAV

TELNET:DOS

TELNET:DOS:GAMSOFT
TELNET:DOS:TLNTSVR-EXE-DOS

TELNET:EXPLOIT

TELNET:EXPLOIT:RESOLV-HOST-CONF
TELNET:EXPLOIT:MIT-KERB-DASH-E
TELNET:EXPLOIT:SOL-AUTH-BYPASS
TELNET:EXPLOIT:MS-CREDENTIAL
TELNET:EXPLOIT:SUN-TELNETD-OF
TELNET:EXPLOIT:SGI-RLD
TELNET:EXPLOIT:LD-LIBRARY-PATH
TELNET:EXPLOIT:SOLARIS-LOGIN-OF
TELNET:EXPLOIT:LD-PRELOAD

TELNET:FAILURE

TELNET:FAILURE:BRUTE-FORCE
TELNET:FAILURE:EMP-CISCO-PWD
TELNET:FAILURE:WINDOWS
TELNET:FAILURE:LOGIN-INCORRECT
TELNET:FAILURE:LOGIN-FAILED
TELNET:FAILURE:NOT-ON-CONSOLE
TELNET:FAILURE:NON-NTLM
TELNET:FAILURE:GUEST
TELNET:FAILURE:PERM-DENIED

TELNET:NEGOT

TELNET:NEGOT:REQ-SUBNEG-FORMAT

TELNET:OVERFLOW

TELNET:OVERFLOW:SUBOPTION
TELNET:OVERFLOW:OPTION
TELNET:OVERFLOW:LOGIN-OF
TELNET:OVERFLOW:OPTIONS-REPLY
TELNET:OVERFLOW:YBSD-OF-CHECK
TELNET:OVERFLOW:LINEMODE-OF
TELNET:OVERFLOW:NEW-ENVIRON-OF
TELNET:OVERFLOW:SGI
TELNET:OVERFLOW:CCPROXY-HOST-OF
TELNET:OVERFLOW:BSD-ENCRY-KEYID
TELNET:OVERFLOW:ABSOLUTE-UK2-OF

TELNET:SVRRESP

TELNET:SVRRESP:MS-CLIENT-INFO

TELNET:USER

TELNET:USER:DEFAULT-PW
TELNET:USER:DEFAULT-PW-2
TELNET:USER:DEFAULT-PW-3
TELNET:USER:DEFAULT-PW-NORTEL
TELNET:USER:ROOT
TELNET:USER:AXIS-COPYRIGHT
TELNET:USER:DYNALINK-BACKDOOR
TELNET:USER:APC-BACKDOOR
TELNET:USER:DEFAULT-PW-3COM
TELNET:USER:DEFAULT-PW-4
TELNET:USER:EZSETUP
TELNET:USER:4DGIFTS
TELNET:USER:OUTOFBOX

TFTP

TFTP:MSG-TOO-SHORT
TFTP:MISSING-FILENAME
TFTP:MISSING-MODE
TFTP:EMPTY-FILENAME
TFTP:FILENAME-TOO-LONG
TFTP:FNAME-NOT-T2
TFTP:MSG-TOO-LONG
TFTP:NOVELL-ZENWORKS-DESK-CE
TFTP:WVFTP-OPTION-OF
TFTP:FS-FILE
TFTP:MRIS-ACCESS-VIOLATE
TFTP:MULT-SERVER-DOS
TFTP:SERVER-ERROR-BO
TFTP:TRANSPORT-BOF

TFTP:AUDIT

TFTP:AUDIT:WRITE-FAILED
TFTP:AUDIT:READ-FAILED
TFTP:AUDIT:C2S-UNEXP-DATA
TFTP:AUDIT:S2C-INVALID-OPCODE
TFTP:AUDIT:S2C-UNEXP-DATA
TFTP:AUDIT:C2S-UNEXP-ACK
TFTP:AUDIT:S2C-UNEXP-ACK
TFTP:AUDIT:C2S-INVALID-OPCODE

TFTP:DIRECTORY

TFTP:DIRECTORY:SOLAR-TFTP-TRVRS
TFTP:DIRECTORY:DOT-DOT
TFTP:DIRECTORY:ROOT
TFTP:DIRECTORY:REQ-FILE-DIR-TRV

TFTP:DOS

TFTP:DOS:LINUX-KERNEL

TFTP:FILE

TFTP:FILE:ADMIN-DLL
TFTP:FILE:PASSWD-MAKREC

TFTP:OPERATION

TFTP:OPERATION:FS-TFTP-OF
TFTP:OPERATION:GET
TFTP:OPERATION:WRITE

TFTP:OVERFLOW

TFTP:OVERFLOW:MODE-TOO-LONG
TFTP:OVERFLOW:SERVA-READ-REQ-BO

TFTP:REQUEST

TFTP:REQUEST:NULL-PTR

TIP

TIP:RECONNECT
TIP:INV-IDENTIFY-RESP

TROJAN

TROJAN:ROOTKIT-DL
TROJAN:EAGHOUSE
TROJAN:BLEEDING-LIFE-EK
TROJAN:PUSHDO-ACTIVITY
TROJAN:WALDEC-ACTIVITY
TROJAN:FAKE-AV-CO-CC
TROJAN:CAPFIRE4-CNC
TROJAN:CFM-UFO
TROJAN:WIPER-FLAME-UPDATE
TROJAN:GUPTACHAR-2.0
TROJAN:MITGLEIDER
TROJAN:HXDEF1.00
TROJAN:DYRE
TROJAN:PEACOMM-TROJAN
TROJAN:POISONIVY-CNC
TROJAN:WIPER-BACKDOOR-ACT
TROJAN:THE-RAT
TROJAN:ASPXSPY-ACTIVITY
TROJAN:SAKURA-BIN-DOWNLOAD
TROJAN:SAKURA-1.1-ARCH-REQ
TROJAN:GOZI-REG
TROJAN:PROFTPD-BACKDOOR
TROJAN:PROFTPD-BACKDOOR-BEACON
TROJAN:FISP-A-BOOTKIT
TROJAN:EQUATIONGRP-EQUATIONLASR
TROJAN:SAKURA-LANDING-REQ
TROJAN:OSX-DNS-CHANGER
TROJAN:DROIDDREAM
TROJAN:SAKURA-LANDING-OBFUS
TROJAN:DLINK-BACKDOOR
TROJAN:DEADBEEF-CNC
TROJAN:BACKDOOR-LEOUNCIA
TROJAN:BYTE-VERIFY-HTML
TROJAN:JECT.A
TROJAN:BOT-FEODO-ACTIVITY
TROJAN:ITSOKNOPROBLEMBRO-CNC
TROJAN:SYNFUL-KNOCK-CNC
TROJAN:SPYEYE-BEACON
TROJAN:EBURY-DNS-EXFILTRATION
TROJAN:R2D2
TROJAN:ALDIBOT-DETECTION
TROJAN:BEACON-C2-CNC
TROJAN:CVE-2013-3893-CNC
TROJAN:KRONOS-CNC-COMM
TROJAN:ZEROACCESS-BOTNET-P2P
TROJAN:ZMEU-BOT-SCAN
TROJAN:ENFAL-LURID-CNC
TROJAN:TAIDOOR-CNC
TROJAN:BLACKHOLE-KIT-URL-REQ
TROJAN:OPHIARU-BOTNET
TROJAN:APACHE-DARKLEECH
TROJAN:FAKE-MSIE-6.0-UA
TROJAN:ANDROID-SPAMSOLDIER-BOT
TROJAN:TINBA-CHECKIN-RQST
TROJAN:KAZY-BEACON
TROJAN:APT1-SSL-SUR
TROJAN:APT1-SSL-SERVER
TROJAN:APT1-SSL-YAHOO
TROJAN:APT1-SSL-WEBMAIL
TROJAN:APT1-SSL-VIRTUALLYTHERE
TROJAN:RUN-FOREST-RUN
TROJAN:SYNOLOCKER-ACTIVITY
TROJAN:APT1-SSL-EMAIL
TROJAN:APT1-SSL-MOON-NIGHT
TROJAN:APT1-SSL-NS
TROJAN:APT1-SSL-AOL
TROJAN:CITADEL-BEACON
TROJAN:HTRAN-UA
TROJAN:APT1-WEBC2-UGX-UA
TROJAN:APT1-SSL-IBM
TROJAN:APT1-SSL-NO-NAME
TROJAN:APT1-WEBC2-CLOVER-UA
TROJAN:PUSHDO-POST-CNC
TROJAN:UNKNOWN-BACKDOOR-KNOCK
TROJAN:W32-PARITE-CNC
TROJAN:APT1-SSL-LAME
TROJAN:APT1-SSL-ALPHA
TROJAN:APT1-WEBC2RAVE-TOSCTB-UA
TROJAN:WIPER-FLAME-POST-EXFIL
TROJAN:APT1-WEBC2-DIV-UA
TROJAN:SAFEPACK-PLUGIN-DETECT
TROJAN:SAKURA-BIN-LOAD-REQ
TROJAN:NIGHT-DRAGON-CC
TROJAN:MALVERTISING-CO-CC
TROJAN:ASPXSPY-CONNECT
TROJAN:BACKDOOR-BY-ZOMBIE
TROJAN:CDORKED-BACKDOOR
TROJAN:CDORKED-INFECTED-SERVER
TROJAN:EBURY-SSH-BACKDOOR
TROJAN:SIMPLE-PHP-BACKDOOR
TROJAN:BACKOFF-ACTIVITY
TROJAN:EQUATIONGRP-CRYPTOLIB
TROJAN:EQUATIONGRP-PRIVLIB
TROJAN:HTTP-ZEROACCESS-BOTNET
TROJAN:CRYPTOWALL
TROJAN:PITTY-TIGER-ACTIVITY
TROJAN:TESLACRYPT-CNC
TROJAN:NGRBOT-ACTIVITY
TROJAN:DUO-USB
TROJAN:SOFACY-MALICIOUS-REQUEST
TROJAN:SOFACY-CNC
TROJAN:OLDBAIT-CHOSTICK-CHECKIN

TROJAN:ADMW0RM

TROJAN:ADMW0RM:USER-LOGIN

TROJAN:AUTOPROXY

TROJAN:AUTOPROXY:INFECTED-HOST

TROJAN:BACKCONSTR

TROJAN:BACKCONSTR:FTP-PORT-OPEN
TROJAN:BACKCONSTR:FTP-ON
TROJAN:BACKCONSTR:CONNECTION

TROJAN:BACKDOOR

TROJAN:BACKDOOR:BANNER
TROJAN:BACKDOOR:PERL-SHELLBOT-S
TROJAN:BACKDOOR:PANDORA-DOS-CNC
TROJAN:BACKDOOR:MURCY-CNC
TROJAN:BACKDOOR:CHINACHOPPERCNC
TROJAN:BACKDOOR:GHOSTNET-CNC
TROJAN:BACKDOOR:DRIDEX-FEODO
TROJAN:BACKDOOR:SCREENOS-SSH
TROJAN:BACKDOOR:SCREENOS-PWD

TROJAN:BACKORIFICE

TROJAN:BACKORIFICE:BO2K-CONNECT
TROJAN:BACKORIFICE:WEB-SERVER
TROJAN:BACKORIFICE:EXECUTION
TROJAN:BACKORIFICE:BOPING
TROJAN:BACKORIFICE:CONN-REQ

TROJAN:CDK

TROJAN:CDK:PORT79
TROJAN:CDK:PORT15858

TROJAN:COREFLOOD

TROJAN:COREFLOOD:C-AND-C
TROJAN:COREFLOOD:TRACKER-REQ

TROJAN:DAGGER

TROJAN:DAGGER:SERVER-RES
TROJAN:DAGGER:CLIENT-CONNECT

TROJAN:DOLY

TROJAN:DOLY:SERVER-RES-V2
TROJAN:DOLY:SERVER-RES-V1
TROJAN:DOLY:COMMAND-V1

TROJAN:DONALDDICK

TROJAN:DONALDDICK:SERVER-RES

TROJAN:GATECRASHER

TROJAN:GATECRASHER:SERVER-RES
TROJAN:GATECRASHER:GC-PROBE

TROJAN:GIRLFRIEND

TROJAN:GIRLFRIEND:SERVER-RES

TROJAN:INFECTOR

TROJAN:INFECTOR:CLIENT-REQ
TROJAN:INFECTOR:SVR-RES

TROJAN:MISC

TROJAN:MISC:ROOTBEER-CLIENT
TROJAN:MISC:AOLADMIN-SRV-RESP
TROJAN:MISC:WEBSERVCT10
TROJAN:MISC:GHOST-SRV-RESP
TROJAN:MISC:NETTAXI-SRV-RESP
TROJAN:MISC:FRENZY-SRV-RESP
TROJAN:MISC:CHUPA-COMMAND
TROJAN:MISC:KONIK-CLIENT-REQ
TROJAN:MISC:UNDETECTED-SRV-RESP
TROJAN:MISC:SCHNECK-SERV-RESP
TROJAN:MISC:LITHIUM-SRV-RESP
TROJAN:MISC:LESZCZ-SRV-RESP
TROJAN:MISC:MASSAKER-SRV-RESP
TROJAN:MISC:TRUVA-SERV-RESP
TROJAN:MISC:CELINE-SRV-RESP
TROJAN:MISC:ASYLUM-COMMAND
TROJAN:MISC:BDDT-SRV-OK
TROJAN:MISC:BF-EVOLUTION-BANNER
TROJAN:MISC:BASICHELL-SRV-RESP
TROJAN:MISC:BACKAGE-COMMAND
TROJAN:MISC:BLACKANGEL-SRV-RESP
TROJAN:MISC:CGI-BUINET-SRV-RESP
TROJAN:MISC:DTR-BANNER
TROJAN:MISC:AMANDA-SRV-RESP
TROJAN:MISC:ECLYPSE-SRV-RESP
TROJAN:MISC:SCARAB-CONNECT
TROJAN:MISC:TRON-COMMAND
TROJAN:MISC:VOODOO-COMMAND
TROJAN:MISC:THING-SERV-RESP
TROJAN:MISC:TRANSSCOUT-CLIENTID
TROJAN:MISC:NETSILENCE-SRV-RESP
TROJAN:MISC:MOONPIE-SERV-RESP
TROJAN:MISC:NETRAIDER-SRV-RESP
TROJAN:MISC:NIRVANA-COMMAND
TROJAN:MISC:MICHAL-SRV-RESP
TROJAN:MISC:KIDTERROR-SRV-RESP
TROJAN:MISC:NETSPY-SRV-RESP
TROJAN:MISC:MAVERICKS-SRV-RESP
TROJAN:MISC:MOONPIE3-FTP-RESP
TROJAN:MISC:OBLIVION-SRV-RESP
TROJAN:MISC:NOKNOK-COMMAND
TROJAN:MISC:MOSUCKER-SERV-RESP
TROJAN:MISC:MOBLIVION-SERV-RESP
TROJAN:MISC:MEETLAMER-COMMAND
TROJAN:MISC:MNEAH-SERV-RESP
TROJAN:MISC:WINRAT10-TCP
TROJAN:MISC:ULTORS-SERV-RESP
TROJAN:MISC:VAGNCKER-SERV-RESP
TROJAN:MISC:UPLOADER-LOGIN-REQ
TROJAN:MISC:WANREMOTE-ADMIN
TROJAN:MISC:WINRAT12-TCP
TROJAN:MISC:WINCRASH10-SRV-RDY
TROJAN:MISC:WINMITE-SRV-RDY
TROJAN:MISC:WOW23-TCP
TROJAN:MISC:XANADU111-CON
TROJAN:MISC:WINCRASH
TROJAN:MISC:RULER-SERV-RESP
TROJAN:MISC:REMOTEHACK-SVR-RESP
TROJAN:MISC:PITFALL-SERV-RESP
TROJAN:MISC:PCINVADER-FTP-BANR
TROJAN:MISC:R3C-SERV-RESP
TROJAN:MISC:RPM-COMMAND
TROJAN:MISC:PROSIAK-SERV-RESP
TROJAN:MISC:PSYCHWARD-SRV-RESP
TROJAN:MISC:FLU-COMMAND
TROJAN:MISC:RUX-COMMAND
TROJAN:MISC:PCINVADER-COMMAND
TROJAN:MISC:REMOTEHACK-CLIENTID
TROJAN:MISC:OXON-COMMAND
TROJAN:MISC:PHASE-ZERO-SRV-RESP
TROJAN:MISC:PROJNEXT-SERV-RESP
TROJAN:MISC:PPORT-INFO-REQ
TROJAN:MISC:ONE-CLIENTID
TROJAN:MISC:RATHEAD-SRV-RESP
TROJAN:MISC:OSIRIS-SERV-RESP
TROJAN:MISC:SONOFPW-SERV-RESP
TROJAN:MISC:PHOENIX-SERV-RESP
TROJAN:MISC:R0XR4T-COMMAND
TROJAN:MISC:CYN-CLIENT-REQ
TROJAN:MISC:FILENAIL-REQUEST
TROJAN:MISC:GIRLFRIEND-SRV-RESP
TROJAN:MISC:GSPOT-COMMAND
TROJAN:MISC:CAFEINI-SERV-RESP
TROJAN:MISC:INTRUDER-RESPONSE
TROJAN:MISC:BLAZER-SERV-RESP
TROJAN:MISC:HACKWORLD-CMD
TROJAN:MISC:FBACKDOOR-SRV-RESP
TROJAN:MISC:CRACKDOWN-SRV-RESP
TROJAN:MISC:BLADERUNNER-RESP
TROJAN:MISC:GIFT-COMMAND
TROJAN:MISC:FE-SERV-RESP
TROJAN:MISC:HOSTCONTROL-RESP
TROJAN:MISC:BREACHPRO-CAP-REQ
TROJAN:MISC:INCOMMAND-SVR-VER
TROJAN:MISC:BREACH-SRV-RESP
TROJAN:MISC:FORE-SRV-RESP
TROJAN:MISC:DRAT-SRV-VERSION
TROJAN:MISC:INSANE-SRV-RESP
TROJAN:MISC:DANTON-SVR-RESP
TROJAN:MISC:DCONNECT
TROJAN:MISC:ULTIMATERAT
TROJAN:MISC:SCHOOLBUS-JOYBD
TROJAN:MISC:EXECUTOR-CMD
TROJAN:MISC:LEGUARDIEN
TROJAN:MISC:GLACIER
TROJAN:MISC:RADMIN-CMD
TROJAN:MISC:LAST2K-CONN
TROJAN:MISC:OPTIX-PRO-CONN
TROJAN:MISC:TROJAN-CIA
TROJAN:MISC:CYN-CLIENT-CONN
TROJAN:MISC:ILLUSION-1-0
TROJAN:MISC:ULTIMATE-RAT21
TROJAN:MISC:CRAZZYNET-SRV-RESP
TROJAN:MISC:MILLENIUM-SERV-RESP
TROJAN:MISC:NETTERROR-SRV-RESP
TROJAN:MISC:VAMPIRE-SRV-RESP
TROJAN:MISC:PRAYER-SERV-RESP
TROJAN:MISC:HELLZ-SRV-RESP
TROJAN:MISC:PITFALL-TELNET-ID
TROJAN:MISC:CONNECTION-RESP
TROJAN:MISC:MOONPIE-FTP-RESP
TROJAN:MISC:ULLYSSE
TROJAN:MISC:MWI-DOC-EXPKIT

TROJAN:MS-04-028

TROJAN:MS-04-028:TOOL-DOWNLOAD
TROJAN:MS-04-028:R-ADMIN-START
TROJAN:MS-04-028:BACKDOOR-LOGIN

TROJAN:MYDOOM

TROJAN:MYDOOM:MYDOOM-TROJAN
TROJAN:MYDOOM:AH-HTTP-INFECT
TROJAN:MYDOOM:S-IRC-BACKDOOR

TROJAN:NETBUS

TROJAN:NETBUS:SERVER-RES-12345
TROJAN:NETBUS:SERVER-RES-12346
TROJAN:NETBUS:CLT-GETINFO-12346
TROJAN:NETBUS:PRO-SERVER-RES
TROJAN:NETBUS:CLT-GETINFO-12345

TROJAN:NETDEVIL

TROJAN:NETDEVIL:NETDEVIL
TROJAN:NETDEVIL:NETDEVIL1-4
TROJAN:NETDEVIL:NETDEVIL-STC

TROJAN:NETMTROPOL

TROJAN:NETMTROPOL:CLI-REQ-5302
TROJAN:NETMTROPOL:CLI-REQ-5301

TROJAN:NETSPHERE

TROJAN:NETSPHERE:SVR-RES-HIGH
TROJAN:NETSPHERE:SVR-RES

TROJAN:PHASEZERO

TROJAN:PHASEZERO:SERVER-RES

TROJAN:PHATBOT

TROJAN:PHATBOT:CMD-CONNECT
TROJAN:PHATBOT:FTP-CONNECT

TROJAN:QAZ

TROJAN:QAZ:TCP25-CALLING-HOME
TROJAN:QAZ:CLIENT-LOGIN
TROJAN:QAZ:TCP139-SCAN

TROJAN:REMOTE-EXPLORER

TROJAN:REMOTE-EXPLORER:CONNECT

TROJAN:SATANS-BD

TROJAN:SATANS-BD:SERVER-RES

TROJAN:SUBSEVEN

TROJAN:SUBSEVEN:2.2-SERVER-RES
TROJAN:SUBSEVEN:SCAN
TROJAN:SUBSEVEN:SUBSEVEN
TROJAN:SUBSEVEN:SUBSEVEN-HTTP
TROJAN:SUBSEVEN:2.1.A-SRVR-RES

TROJAN:TELNET

TROJAN:TELNET:USER-HIDESOURCE
TROJAN:TELNET:USER-FRIDAY
TROJAN:TELNET:USER-REWT
TROJAN:TELNET:USER-LRKR0X
TROJAN:TELNET:USER-SATORI
TROJAN:TELNET:USER-HAX0R
TROJAN:TELNET:USER-HIDEPAK
TROJAN:TELNET:USER-R00T
TROJAN:TELNET:USER-BACKDOOR
TROJAN:TELNET:USER-WH00T
TROJAN:TELNET:USER-W00W00
TROJAN:TELNET:USER-D13HH

TROJAN:Y3K-RAT

TROJAN:Y3K-RAT:Y3K16-RAT-BANNER
TROJAN:Y3K-RAT:Y3K14-RAT-TCP

TROJAN:YAT

TROJAN:YAT:YAT-BANNER

UDP

UDP:ZERO-DATA
UDP:PORT-ZERO
UDP:SNORT-FRAG3-DETECTION
UDP:XTACACSD-BO
UDP:MS-WINDOWS-TCP-IP-CNTR

VIRUS

VIRUS:HERE-YOU-HAVE
VIRUS:BITCOIN-MINER-BOTNET

VIRUS:POP3

VIRUS:POP3:UUENCODED-DOT-VBS
VIRUS:POP3:EICAR-ATTACHMENT
VIRUS:POP3:NIMDA
VIRUS:POP3:SOBER-K

VIRUS:SMTP

VIRUS:SMTP:DOUBLE-EXTENSION
VIRUS:SMTP:NIMDA
VIRUS:SMTP:EICAR-ATTACHMENT
VIRUS:SMTP:EXE-IN-ZIP
VIRUS:SMTP:UUENCODED-DOT-VBS
VIRUS:SMTP:EXE-ATTACH-1
VIRUS:SMTP:LOCALHOST-HELO
VIRUS:SMTP:ZONEALARM-EXE
VIRUS:SMTP:ASPROX

VNC

VNC:SESSION
VNC:ULTRA-CLIENT-OF
VNC:QEMU-KVM-DOS
VNC:ULTRAVNC-CLIENT-AUTH-OF
VNC:GNOME-VINO-VNC-SERVER-DOS
VNC:CHICKEN-VNC-DOS
VNC:AUTH-BYPASS
VNC:LIBVNCSERVER-DIVBYZERO-DOS

VNC:AUDIT

VNC:AUDIT:AUTH-STATUS
VNC:AUDIT:CLIENT-BITPERPIXEL
VNC:AUDIT:ENCODING-TYPE
VNC:AUDIT:AUTH-SCHEME
VNC:AUDIT:CONNECT-FAIL
VNC:AUDIT:AUTH-FAILED
VNC:AUDIT:UNKNOWN-CLIENT-MSG
VNC:AUDIT:UNKNOWN-SERVER-MSG
VNC:AUDIT:SERVER-BITPERPIXEL

VNC:ERR

VNC:ERR:SVR-CUT-TOO-LONG
VNC:ERR:CONFLICT-HEXTILE-MASK
VNC:ERR:TOO-MANY-AUTH-FAIL
VNC:ERR:BRUTE-FORCE
VNC:ERR:CLNT-CUT
VNC:ERR:SVR-CUT-OVERFLOW
VNC:ERR:NO-AUTH-SCHEME

VNC:INVALID

VNC:INVALID:SERVER-RESPONSE
VNC:INVALID:SERVER-VERSION
VNC:INVALID:NAME-TOO-LONG
VNC:INVALID:CLIENT-VERSION
VNC:INVALID:CLIENT-REQUEST

VNC:OVERFLOW

VNC:OVERFLOW:AUTH-RESPONSE
VNC:OVERFLOW:AUTH-STATUS
VNC:OVERFLOW:CLIENT-INIT
VNC:OVERFLOW:CLIENT-CUT-TEXT
VNC:OVERFLOW:AUTH-CHALLENGE
VNC:OVERFLOW:REASON
VNC:OVERFLOW:NAME
VNC:OVERFLOW:SET-ENCODINGS
VNC:OVERFLOW:RSN-TOO-LONG
VNC:OVERFLOW:REALVNC-MSG-BO
VNC:OVERFLOW:SER-WRT-SCALNG-RCE

VOIP

VOIP:APPLE-FACETIME-REQ
VOIP:CISCO-UCM-OF
VOIP:ASTERISK-CS-OVERFLOW
VOIP:DIGIUM-ASTERISK-SECBYPASS
VOIP:SKINNY-DRV-DOS
VOIP:IAX-INT-OF
VOIP:ASTERISK-IAX2-DOS

VOIP:H225RAS

VOIP:H225RAS:REG-BAD-ID-CHAR
VOIP:H225RAS:URQ-DOS

VOIP:H225RAS:AUDIT

VOIP:H225RAS:AUDIT:UNKN-MESSAGE

VOIP:H225RAS:DOS

VOIP:H225RAS:DOS:RRQ
VOIP:H225RAS:DOS:ARQ
VOIP:H225RAS:DOS:LRQ

VOIP:H225SGN

VOIP:H225SGN:SETUP-NOTGRANT-IP
VOIP:H225SGN:SETUP-NOGRANT-PORT
VOIP:H225SGN:RELEASE-COMPLETE
VOIP:H225SGN:SETUP
VOIP:H225SGN:PROTO

VOIP:MGCP

VOIP:MGCP:INV-CHAR-HIGH
VOIP:MGCP:OVERLONG-UTF8
VOIP:MGCP:INVALID-HEX-LOW
VOIP:MGCP:UTF8-ERROR
VOIP:MGCP:LINE-OVERFLOW
VOIP:MGCP:INV-CHAR-LOW
VOIP:MGCP:INVALID-HEX-HIGH
VOIP:MGCP:DOUBLE-ENCODING

VOIP:MGCP:AUDIT

VOIP:MGCP:AUDIT:INV-TRANS-ID
VOIP:MGCP:AUDIT:INV-PARM-RM
VOIP:MGCP:AUDIT:UNKNOWN-METHOD
VOIP:MGCP:AUDIT:INV-CMD-HDR
VOIP:MGCP:AUDIT:INV-CALL-ID
VOIP:MGCP:AUDIT:INV-PARM-RD
VOIP:MGCP:AUDIT:INV-CONN-ID
VOIP:MGCP:AUDIT:INV-PARM-NAME
VOIP:MGCP:AUDIT:INV-IP-DOMAIN
VOIP:MGCP:AUDIT:INV-RSP-HDR
VOIP:MGCP:AUDIT:INV-EP-NAME

VOIP:MGCP:SDP

VOIP:MGCP:SDP:HEADER-RPT-ERR
VOIP:MGCP:SDP:HEADER-ORD-ERR
VOIP:MGCP:SDP:SYNTAX-ERROR
VOIP:MGCP:SDP:HEADER-UNK-ERR
VOIP:MGCP:SDP:INV-CI
VOIP:MGCP:SDP:INV-ORIGIN
VOIP:MGCP:SDP:MAL-HEADER
VOIP:MGCP:SDP:TIME-OF
VOIP:MGCP:SDP:MEDIA-PORT-OF
VOIP:MGCP:SDP:VERSION-OF

VOIP:MGMT

VOIP:MGMT:XPRESSA-HTTP-DOS
VOIP:MGMT:VICIDIAL-INFO-DISC

VOIP:RTP

VOIP:RTP:FLOW-START
VOIP:RTP:FLOW-START-VIDEO
VOIP:RTP:RTPFLOOD-DOS
VOIP:RTP:IAXFLOOD-DOS

VOIP:SIP

VOIP:SIP:SHORT-REQUEST
VOIP:SIP:OVERSIZED-UDP-MSG
VOIP:SIP:SECURITY-PAR-UFLOW
VOIP:SIP:SECURITY-PAR-ERR
VOIP:SIP:DOUBLE-ENCODING
VOIP:SIP:SECURITY-BAD-SCHEMA
VOIP:SIP:MALFORMED-PORT
VOIP:SIP:BRUTE-FORCE
VOIP:SIP:HAMMER
VOIP:SIP:SHORT-RESPONSE
VOIP:SIP:HEADER-UFLOW
VOIP:SIP:BRUTE-INV
VOIP:SIP:EMERGENCY-NUMBER
VOIP:SIP:EMERGENCY-PRIORITY
VOIP:SIP:UNKNOWN-DATA
VOIP:SIP:SQL-INJ
VOIP:SIP:SQL-CMD-2
VOIP:SIP:KEEP-ALIVE-2
VOIP:SIP:SQL-CMD-1
VOIP:SIP:BYE-AUTH
VOIP:SIP:ASTERISK-RTP-TYPE
VOIP:SIP:BIN-IN-AUTH-RESP
VOIP:SIP:SESSION-REQ
VOIP:SIP:UNK-SRV-RESP
VOIP:SIP:SRV-RESP-401
VOIP:SIP:SRV-RESP-400
VOIP:SIP:KEEP-ALIVE
VOIP:SIP:KEEP-ALIVE-3
VOIP:SIP:RESPR-INV-OPT-OF
VOIP:SIP:FMT-STR
VOIP:SIP:DIGIUM-ASTERISK-DOS
VOIP:SIP:INVITE-MSG-DOS
VOIP:SIP:CSCO-INVITE-DOS
VOIP:SIP:ASTERISK-UDPTL-BO
VOIP:SIP:ASTERISK-CHANNEL-DOS
VOIP:SIP:INVITEFLOOD-DOS
VOIP:SIP:TEARDOWN-BYE-DOS
VOIP:SIP:BT-RECON-SIPSCAN
VOIP:SIP:BT-RECON-ENUMIAX
VOIP:SIP:BT-RECON-SVMAP
VOIP:SIP:BT-RECON-SMAP
VOIP:SIP:ASTERISK-RES-DOS
VOIP:SIP:ASTERISK-SDP-MEDIA-DOS
VOIP:SIP:SIPSAK-OPTION-FLOOD
VOIP:SIP:CISCO-PHNE-MSG-SEQ-DOS
VOIP:SIP:WENGO-PHONE-DOS
VOIP:SIP:MULTI-TECH-INVITE-OF
VOIP:SIP:GS-EAVESDROP

VOIP:SIP:AUDIT

VOIP:SIP:AUDIT:UNK-METHOD
VOIP:SIP:AUDIT:MISSING-VERSION
VOIP:SIP:AUDIT:SYNTAX-ERROR
VOIP:SIP:AUDIT:INV-REQ-HEADER
VOIP:SIP:AUDIT:CONTENT-LENGTH
VOIP:SIP:AUDIT:NO-COLON
VOIP:SIP:AUDIT:EMPTY-HEADER-VAL
VOIP:SIP:AUDIT:INV-TERMINATION
VOIP:SIP:AUDIT:INVALID-RCODE
VOIP:SIP:AUDIT:UTF8-ERROR
VOIP:SIP:AUDIT:INV-CHARACTER
VOIP:SIP:AUDIT:INVALID-HEX-HIGH
VOIP:SIP:AUDIT:INVALID-HEX-LOW
VOIP:SIP:AUDIT:BAD-IPV6
VOIP:SIP:AUDIT:URI-ERROR
VOIP:SIP:AUDIT:BAD-IPV4
VOIP:SIP:AUDIT:INV-CHAR-LOW
VOIP:SIP:AUDIT:INV-REP-HEADER
VOIP:SIP:AUDIT:UNK-HEADER
VOIP:SIP:AUDIT:INV-CHAR-HIGH
VOIP:SIP:AUDIT:DUPLICATE-HEADER
VOIP:SIP:AUDIT:NOT-SIP
VOIP:SIP:AUDIT:INV-CONTACT
VOIP:SIP:AUDIT:INV-CONT-TYPE
VOIP:SIP:AUDIT:INV-CSEQ
VOIP:SIP:AUDIT:INV-FROM
VOIP:SIP:AUDIT:INV-URI
VOIP:SIP:AUDIT:SESSION-HIJACK
VOIP:SIP:AUDIT:TELEPRESENCE
VOIP:SIP:AUDIT:INV-INVITE-SRC
VOIP:SIP:AUDIT:INV-VIA-PROT-ID
VOIP:SIP:AUDIT:INV-PARA-VIA
VOIP:SIP:AUDIT:INV-CALL-ID
VOIP:SIP:AUDIT:DUPLICATE-INVITE

VOIP:SIP:LIMITS

VOIP:SIP:LIMITS:CONTACT-OF
VOIP:SIP:LIMITS:CALL-INFO-OF
VOIP:SIP:LIMITS:CONTENT-LEN-OF
VOIP:SIP:LIMITS:EXPIRES-OF
VOIP:SIP:LIMITS:CSEQ-OF
VOIP:SIP:LIMITS:FROM-OF
VOIP:SIP:LIMITS:CONTENT-TYPE-OF
VOIP:SIP:LIMITS:IN-REPLY-TO-OF
VOIP:SIP:LIMITS:MAX-FWRDS-OF
VOIP:SIP:LIMITS:SIP-NEG-CNT-LEN
VOIP:SIP:LIMITS:REJ-CONTACT-OF
VOIP:SIP:LIMITS:MIN-EXPIRES-OF
VOIP:SIP:LIMITS:REC-ROUTE-OF
VOIP:SIP:LIMITS:CALL-ID-OF
VOIP:SIP:LIMITS:REQ-DISPO-OF
VOIP:SIP:LIMITS:PRIORITY-OF
VOIP:SIP:LIMITS:CONT-ENC-OF
VOIP:SIP:LIMITS:PROX-AUTHRIZ-OF
VOIP:SIP:LIMITS:PROX-AUTH-OF
VOIP:SIP:LIMITS:ROUTE-OF
VOIP:SIP:LIMITS:RETRY-AFTER-OF
VOIP:SIP:LIMITS:ACC-CONTACT-OF
VOIP:SIP:LIMITS:ACC-ENC-OF
VOIP:SIP:LIMITS:ACC-OF
VOIP:SIP:LIMITS:ALLOW-OF
VOIP:SIP:LIMITS:PROX-REQ-OF
VOIP:SIP:LIMITS:ORGANIZATION-OF
VOIP:SIP:LIMITS:AUTHORIZ-OF
VOIP:SIP:LIMITS:ACC-LAN-OF
VOIP:SIP:LIMITS:AUTH-INFO-OF

VOIP:SIP:OVERFLOW

VOIP:SIP:OVERFLOW:MAX-FORWARD
VOIP:SIP:OVERFLOW:CHUNK-OF
VOIP:SIP:OVERFLOW:HEADER-OF
VOIP:SIP:OVERFLOW:LINE-OVERFLOW
VOIP:SIP:OVERFLOW:OVERLONG-UTF8
VOIP:SIP:OVERFLOW:USERNAME
VOIP:SIP:OVERFLOW:PORT-OF
VOIP:SIP:OVERFLOW:LINE-OF
VOIP:SIP:OVERFLOW:SECURITY-PAR
VOIP:SIP:OVERFLOW:METHOD
VOIP:SIP:OVERFLOW:FROM-OF
VOIP:SIP:OVERFLOW:T-38-SDP-OF
VOIP:SIP:OVERFLOW:QPOP-OF
VOIP:SIP:OVERFLOW:HDR-EXP-OF
VOIP:SIP:OVERFLOW:VIA-HOST-OF
VOIP:SIP:OVERFLOW:HDR-URI-OF
VOIP:SIP:OVERFLOW:SIPXTAPI-OF

VOIP:SIP:SDP

VOIP:SIP:SDP:HEADER-UNK-ERR
VOIP:SIP:SDP:HEADER-RPT-ERR
VOIP:SIP:SDP:SYNTAX-ERROR
VOIP:SIP:SDP:HEADER-ORD-ERR
VOIP:SIP:SDP:MAL-HEADER-CLT
VOIP:SIP:SDP:INV-CI
VOIP:SIP:SDP:MEDIA-PORT-OF
VOIP:SIP:SDP:VERSION-OF
VOIP:SIP:SDP:TIME-OF
VOIP:SIP:SDP:HDR-BOF
VOIP:SIP:SDP:MAL-HEADER-STC

VOIP:SKYPE

VOIP:SKYPE:SKYPE-ENCRYPTED
VOIP:SKYPE:INSTALL
VOIP:SKYPE:VERSION-CHECK
VOIP:SKYPE:LOGIN
VOIP:SKYPE:PROBE-1
VOIP:SKYPE:CONNECTION

VOIP:SMPP

VOIP:SMPP:NOKIA-SMS-MMS-DOS

WHOIS

WHOIS:INVALID_EOL
WHOIS:TUNNEL
WHOIS:UNEXPECTED-REPLY
WHOIS:REQUEST-TOO-LONG

WORM

WORM:COMMWARRIORB
WORM:LOVEGATE-INFECTED
WORM:WORM-BROPIA-F
WORM:CHOD.B
WORM:CHUNKED-WORM
WORM:DISTTRACK-USER-AGENT
WORM:DISTTRACK-CNC
WORM:DISTTRACK-PROPAGATION
WORM:AKAK-TRAFFIC
WORM:STATS-PHP-IFRAME
WORM:CRYPTO-RANSOM-CNC2
WORM:CRYPTO-RANSOM-CNC3
WORM:THE-MOON-LINKSYS
WORM:MINIFLAME-CNC
WORM:MARE-D-SCAN
WORM:BLACKHOLE-ACTIVITY
WORM:CRYPTOLOCKER-RACKETEER

WORM:AGOBOT

WORM:AGOBOT:PY-HTTP-PROP
WORM:AGOBOT:SASSER-FTP-OF

WORM:BAGLE

WORM:BAGLE:Q-HTTP
WORM:BAGLE:HTTP-BACKDOOR
WORM:BAGLE:AF-HTTP

WORM:BERBEW

WORM:BERBEW:KEYLOGGER-UPLOAD

WORM:BLASTER

WORM:BLASTER:BACKDOOR-CMD

WORM:CODERED

WORM:CODERED:INFECTION-ATTEMPT

WORM:CODERED-2

WORM:CODERED-2:INFECT-ATTEMPT

WORM:CONFICKER

WORM:CONFICKER:C-ACTIVITY
WORM:CONFICKER:C-ACTIVITY-2

WORM:DABBER

WORM:DABBER:B-BACKDOOR-CMD
WORM:DABBER:TFTP-TRANSFER
WORM:DABBER:SASSER-PROBE

WORM:EMAIL

WORM:EMAIL:SOBIG-DL-REQUEST

WORM:FIZZER

WORM:FIZZER:IRC-CHAN-1
WORM:FIZZER:IRC-CHAN-2

WORM:LOVGATE

WORM:LOVGATE:P-NET-SHARE-SPREAD
WORM:LOVGATE:BACKDOOR-LOGIN

WORM:MASLAN

WORM:MASLAN:IRC-BACKDOOR-CON

WORM:MIMAIL

WORM:MIMAIL:MIMAIL.A

WORM:MOFEI

WORM:MOFEI:MOFEI-B-PROPAGATION
WORM:MOFEI:MOFEI-BACKDOOR2
WORM:MOFEI:MOFEI-BACKDOOR3

WORM:MYTOB

WORM:MYTOB:ED-IRC

WORM:NACHI

WORM:NACHI:B-C-D-INFECT-ATTEMPT
WORM:NACHI:D-WEBDAV-ATK

WORM:NETSKY

WORM:NETSKY:V-SMTP-PROP

WORM:NIMDA

WORM:NIMDA:NIMDA-RICHED20
WORM:NIMDA:EMAIL-PROP
WORM:NIMDA:BIN-255-CMD
WORM:NIMDA:NIMDA-NWS
WORM:NIMDA:NIMDA-EML
WORM:NIMDA:SCRIPTS-C11C-CMD
WORM:NIMDA:SCRIPTS-ROOT
WORM:NIMDA:SCRIPTS-CMD
WORM:NIMDA:MSADC-ROOT

WORM:PHPINCLUDE

WORM:PHPINCLUDE:EXPLOIT
WORM:PHPINCLUDE:SEARCH-REQ

WORM:SANTY

WORM:SANTY:GOOGLE-SEARCH
WORM:SANTY:INFECT-ATTEMPT

WORM:SASSER

WORM:SASSER:A-D-F-SHELL-CMD
WORM:SASSER:FTP-SRV-OVERFLOW
WORM:SASSER:A-D-F-FTP-DL-5554

WORM:SDBOT

WORM:SDBOT:OH-BACKDOOR-COMMAND
WORM:SDBOT:DX-IRC-BEACON

WORM:SLAMMER

WORM:SLAMMER:INFECT-ATTEMPT

WORM:SLAPPER

WORM:SLAPPER:CINIK-SRC
WORM:SLAPPER:C-INFECT
WORM:SLAPPER:C2-INFEC
WORM:SLAPPER:AION-INFECT
WORM:SLAPPER:B-INFECT
WORM:SLAPPER:WORM-INFECT

WORM:SMB

WORM:SMB:DELODER-2
WORM:SMB:DELODER
WORM:SMB:BUGBEAR-B
WORM:SMB:W32-SLACKOR

WORM:SQL-SNAKE

WORM:SQL-SNAKE:MSSQL-REG-2
WORM:SQL-SNAKE:MSSQL-REG-3
WORM:SQL-SNAKE:MSSQL-REG-1

WORM:WITTY

WORM:WITTY:INFECT-ATTEMPT

WORM:ZAFI

WORM:ZAFI:D-BACKDOOR-UPL

X11

X11:XFS-SWAP-CHAR
X11:X11-XC-QUERY-SECURITY
X11:XFS-QUERYX

APP:ENCRYPTED-TRAFFIC-2

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is moderately strict, and is a compromise between false-positives and false-negatives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-1

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the least strict, and should catch the most traffic, but might trigger on non-encrypted traffic.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-3

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the most strict, and should create the fewest false positives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:HP-SAN-IQ-CMD-INJ

Description

This signature detects attempts to exploit a known vulnerability in the HP SAN iQ Appliance. A successful attack can lead to command injection within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361.

Affected Products

References

APP:GIOP-COMM

Description

This signature detects properly formatted GIOP communication. This signature triggers when your network is carrying Object Request Broker traffic.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:WINCOM-AUTH-BO

Description

This signature detects attempts to exploit a known vulnerability against WinComLPD. A successful attack allows attackers to execute arbitrary code with the privileges of the user running the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.

Affected Products

References

APP:NAV-ENT-WEB-OF

Description

This signature detects attempts to exploit a known vulnerability in Norton Antivirus Enterprise (NAV). A successful attack can lead to a stack overflow causing a denial of service or arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

An attacker could exploit the vulnerability to execute arbitrary code with System level privileges.

References

APP:JONDO-PROXY

Description

This signature detects the runtime behavior of Jondo Privacy Generator. Jondo is a proxy application that enables users to re-route communication through an encrypted pipe. This is usually used to bypass corporate network usage policies.

Severity

INFO

Group

APP

Supported By

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:LINUX-SCTP-FWD-TSN-BO

Description

This signature detects attempts to exploit a known vulnerability against Linux SCTP Handler. A successful exploit can lead to buffer overflow and remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.

Affected Products

References

APP:YOUSENDIT

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:RH-ICOMMERCE-ANYFILE

Description

This signature detects attempts to exploit a directory traversal vulnerability in Red Hat Interchange Commerce Servers. A successful directory traversal attack, can allow attackers to read any file on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A vulnerability has been reported for Interchange 4.8.5 and earlier. Reportedly, Interchange may disclose contents of files to attackers. The vulnerability occurs due to the placement of the 'doc' folder. Reportedly, the folder will be installed as follows: <INTERCHANGE_ROOT>/doc. This folder, by default, contains Interchange man pages. This vulnerability is only exploitable when the Interchange service runs in INET (Internet service) mode. An attacker may exploit this vulnerability to the contents of restricted files accessible to the Interchange process. It has been reported that this issue may be exploited through a '../' directory traversal sequence in a HTTP request to the vulnerable server.

Affected Products

References

APP:HP-DATA-PROTECTOR-MMD-BOF

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Manager MMD Service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability because of an access violation error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager A.06.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:IPSO-FILE-VIEW

Description

This signature detects attempts to exploit a known vulnerability in "Voyager", a Web GUI included with Nokia IP-boxes. IPSO 3.6-FCS6 and other versions are vulnerable. Attackers can use Voyager to instruct a CGI script to view the contents of arbitrary files on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It has been reported that Nokia IPSO does not properly handle some types of requests through Voyager. Because of this, an attacker with access to the interface may be able to view potentially sensitive information.

Affected Products

References

APP:HP-STORAGEWORKS-OPC22-BO

Description

This signature detects an attempt to exploit a known vulnerability against HP StorageWorks application. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:WINMAIL-PATH-DIS

Description

This signature detects attempts to access a vulnerable Winmail module. A successful exploit can allow attackers to obtain information about the server's internal structure.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:COLDFUSIONMX-ACC

Description

This signature detects attempts to access the fileprobe.cfm. With default settings, Macromedia ColdFusion MX will return an error message containing the full path of the ColdFusion software. Versions 6.x are vulnerable.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A vulnerability has been reported for Macromedia ColdFusion MX that may reveal the physical path information to attackers. When certain malformed URL requests are received by the server, an error message is returned containing the full path of the ColdFusion installation.

Affected Products

References

APP:VMS-8.3.5-CMD-EXE

Description

This signature detects an attempt to redirect the flow of the VisNetic MailServer administration interface. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:MOZY-ACTY

Description

This signature detects the activity of the Mozy Backup Client. Mozy is an on-line file backup service provided by Berkeley Data Systems.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:GOOG-PICASA

Description

This signature detects the activity of the Google Picasa Client. Picasa is a photo repository, editing, and uploading client by Google Inc.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:PEER2MAIL

Description

This signature detects the Peer2Mail application. Peer2Mail allows files to be stored on a mail server as e-mail attachments for later retrieval from another computer. This can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:HP-LOADRUNNER-RCE

Description

This signature detects attempts to exploit a known vulnerability against HP LoadRunner. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.

Affected Products

References

APP:WINPRICE

Description

This signature detects activity of the WinPrice client, an application made by Quatrain (http://www.katren.ru) for purchasing prescription drugs over the Internet. This activity may be illegal in your area.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:OPENVIEW-STORAGE-BO

Description

This signature detects an attempt to exploit a Buffer Overflow vulnerability against HP Open View Storage. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:CHKPOINT-FW-INFO-DISC

Description

This signature detects attempts to exploit an information disclosure vulnerability in Checkpoint Firewall WebUI. Due to insufficient sanitization of user input, attackers can gain access to arbitrary files on the targeted system.

Severity

MEDIUM

Group

APP

Supported By

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:EMC-NSRINDEXD-BO

Description

This signature detects attempts to exploit a known vulnerability in EMC NetWorker. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.

Affected Products

References

APP:VCENTER-JMX-RCE

Description

This signature detects attempts to exploit a known vulnerability against VMware vCenter Server. The vulnerability is due to a lack of enforced authentication in the default configuration (in wrapper.conf). A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.

Affected Products

References

APP:FEDORA-DIR-SER-INFO-LEAK

Description

This signature detects an information disclosure attack against the Fedora directory service. Fedora Directory Server 1.0.2 DSGW is vulnerable to an information leakage that can allow an attacker to retrieve multiples files on the system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:CHROME-ENGINE-4-DOS

Description

This signature detects attempts to exploit a known vulnerability in the Chrome Engine 4. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Chrome Engine 4 is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected server, resulting in denial-of-service conditions. Chrome Engine version 4 is vulnerable; other versions may also be affected.

Affected Products

References

APP:EMC-DATA-PROTECTION-DOS

Description

This signature detects attempts to exploit a known vulnerability against EMC Data Protection Advisor. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:VCENTER-JMX-RCE2

Description

This signature detects attempts to exploit a known vulnerability against VMware vCenter Server. The vulnerability is due to a lack of enforced authentication in the default configuration (in wrapper.conf). A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.

Affected Products

References

APP:FREEPBX-ARI-DOS

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Asterisk Recording Interface (ARI) webui. A malformed request can result in a denial of service of the Web interface.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The Asterisk Recording Interface is prone to the following issues: 1. Multiple security bypass vulnerabilities. 2. A cross-site request-forgery vulnerability. 3. A cross-site scripting vulnerability. Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Affected Products

References

APP:SOLARWINDS-LOG-EVENT-MANAGR

Description

A policy bypass vulnerability exists in SolarWinds Log and Event Manager. A remote attacker can exploit this vulnerability to access the database with administrator privileges. Once accessed, the attacker can read and write information in the database.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL.

Affected Products

References

APP:CLAMAV-UPX-OF-HTTP

Description

This signature detects attempts to exploit a known vulnerability in ClamAV. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

ClamAV is prone to a remote buffer-overflow vulnerability. This condition occurs when the program processes malformed UPX-compressed executables. Successful exploitation may result in the execution of arbitrary code in the context of the application.

Affected Products

References

APP:SITEMINDER-AUTH-REDIR

Description

This signature detects attempts to exploit a known vulnerability in Netegrity's Siteminder application. Attackers can send a maliciously formatted hyperlink designed to trick users into believing they are logging into their Siteminder server. Instead, the hyperlink redirects the user's authentication information to a server under the attacker's control, enabling the attacker to obtain the user's login information.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:RETRO-CL-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC Retrospect Client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Dantz Retrospect Backup Client is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

Affected Products

References

APP:VINZANT-ARCHTCTR-AUTHWKNESS

Description

This signature detects Architectural Authentication Weakness attempts on Vinzant Global ECS Agent. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:HP-INSIGHT-MANAGER-RCE

Description

This signature detects attempts to exploit a known vulnerability against Hewlett-Packard Insight Manager. A successful exploit can lead to the remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:ZEND-SERVER-JAVA-RCE

Description

This signature detects attempts to exploit a known vulnerability against Zend Server Java Bridge. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Zend Server is prone to a remote code-execution vulnerability in the Zend Java Bridge component. Successful exploits can allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

References

APP:HP-LEFTHAND-HYDRA-PING-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP LeftHand Virtual SAN Appliance. A successful attack can lead to a heap overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513.

Affected Products

References

APP:HP-LEFTHAND-HYDRA-DIAG-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP LeftHand Virtual SAN Appliance. A successful attack can lead to a heap overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511.

Affected Products

References

APP:SVN-DATE-SERVE

Description

This signature detects attempts to exploit a known vulnerability in the Subversion Svnserve. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

References

APP:HP-MEDIA-SIGN-IN-NAME-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations SignInName Parameter. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Media Operations is prone to a remote denial-of-service vulnerability that occurs because of a NULL-pointer dereference error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Media Operations 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:MCAFEE-FIREWALL-RCE

Description

This signature detects attempts to exploit a known vulnerability against McAfee Firewall. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

McAfee Firewall Reporter is prone to an authentication-bypass vulnerability. Successfully exploiting this issue will allow attackers to point the 'cgisess' cookie value to an arbitrary file that exists on the server, bypassing certain security restrictions. This issue may allow websites to bypass certain security restrictions and gain access to potentially sensitive information. This issue was introduced in McAfee Firewall Reporter 5.1.0.6

Affected Products

References

APP:APPLE-MACOSX-ODP-RCE

Description

This signature detects attempts to exploit a known vulnerability against Apple Mac OS X. A successful attack can lead to arbitrary code execution. Failed exploit attempts could trigger a denial of service condition on the targeted system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Directory Service in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted message.

Affected Products

References

APP:WEBSENSE-FAV-BYPASS

Description

This signature detects attempts to exploit a known security-bypass vulnerability against multiple Websense products. A successful exploit may allow attackers unauthorized access to a victim's system where they could download, view, or manipulate files.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Multiple Websense products are prone to an authentication-bypass vulnerability. Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access. The following Websense products are affected: Websense Web Security Gateway Anywhere 7.6 Websense Web Security Gateway 7.6 Websense Web Security 7.6 Websense Web Filter 7.6

Affected Products

References

APP:FLEXERA-FLEXNET-BO

Description

This signature detects attempts to exploit a known vulnerability in FlexNet Publisher License Server. Successful exploitation could possibly allow execution of arbitrary code in the security context of system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:PEERCAST-FS

Description

This signature detects attempts to exploit a known vulnerability against PeerCast. A format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code through format strings sent in a URL.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

PeerCast is affected by a remote format string vulnerability. The vulnerability arises when the server attempts to handle a malformed HTTP GET request. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access. PeerCast 0.1211 and prior versions are affected by this issue.

Affected Products

References

APP:LANDESK-OF

Description

This signature detects attempts to exploit a known vulnerability in LANDesk Management Suite. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

LANDesk Management Suite is prone to a remote stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue would result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects LANDesk Management Suite 8.7; prior versions may also be affected.

Affected Products

References

APP:MERCURY-BOF

Description

This signature detects attempts to exploit a known vulnerability in the Mercury Mail Transport System product. The vulnerability is created by the lack of proper enforcement of maximum allowable length of user supplied data. A malicious unauthenticated attacker can exploit this vulnerability, which can result in a stack buffer overflow leading to arbitrary code execution on the target host.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Mercury Mail is prone to a remote buffer-overflow vulnerability in its mailbox name service. This issue occurs because the application fails to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM privileges in the context of the affected server process. Mercury Mail 4.01b is affected; other versions may also be affected.

Affected Products

References

APP:HP-DATA-PROTECTOR-OP-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:EMBARCADERO-CONNECT-OF

Description

This signature detects attempts to exploit a known vulnerability against Embarcadero InterBase. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Embarcadero InterBase XE is prone to a stack-based buffer-overflow vulnerability. Successful exploits will allow attackers to execute arbitrary code with SYSTEM privileges. Failed exploit attempts will result in a denial-of-service condition. A successful attack will completely compromise affected computers.

Affected Products

References

APP:FLASH-RTMP-RESP

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Adobe Flash Player is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following versions are affected: Adobe Flash Player 11.2.202.233 and prior versions for Windows, Mac OS and Linux operating systems Adobe Flash Player 11.1.115.7 and prior versions for Android 4.x Adobe Flash Player 11.1.111.8 and prior versions for Android 3.x and 2.x

Affected Products