Juniper Networks

Index

APP

APP:ENCRYPTED-TRAFFIC-1
APP:ENCRYPTED-TRAFFIC-3
APP:ENCRYPTED-TRAFFIC-2
APP:NAV-ENT-WEB-OF
APP:HP-SAN-IQ-CMD-INJ
APP:WINCOM-AUTH-BO
APP:GIOP-COMM
APP:JONDO-PROXY
APP:LINUX-SCTP-FWD-TSN-BO
APP:YOUSENDIT
APP:HP-FAULTDOWNLOADSERVLET
APP:IPSO-FILE-VIEW
APP:HP-DATA-PROTECTOR-MMD-BOF
APP:NOVELL-SECURITY-BYPASS
APP:HP-STORAGEWORKS-OPC22-BO
APP:HP-DATA-PRTCTR-OPCODE
APP:HP-DATA-PRTCTR-OP267-BO
APP:HPE-DATA-PROTECT-USR-BO
APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC
APP:COLDFUSIONMX-ACC
APP:HP-DATA-PRTCTR-OP28-11
APP:WINMAIL-PATH-DIS
APP:VMS-8.3.5-CMD-EXE
APP:PEER2MAIL
APP:WINPRICE
APP:GOOG-PICASA
APP:MOZY-ACTY
APP:OPENVIEW-STORAGE-BO
APP:FEDORA-DIR-SER-INFO-LEAK
APP:CHKPOINT-FW-INFO-DISC
APP:FREEPBX-ARI-DOS
APP:CHROME-ENGINE-4-DOS
APP:EMC-NSRINDEXD-BO
APP:EMC-DATA-PROTECTION-DOS
APP:CLAMAV-UPX-OF-HTTP
APP:SITEMINDER-AUTH-REDIR
APP:RETRO-CL-BO
APP:HP-INSIGHT-MANAGER-RCE
APP:VIDEOSPIRIT-OF
APP:ZEND-SERVER-JAVA-RCE
APP:HP-MEDIA-SIGN-IN-NAME-DOS
APP:MCAFEE-FIREWALL-RCE
APP:HP-DATA-PRTCTR-EXEC_CMD-RCE
APP:SVN-DATE-SERVE
APP:MCAFEE-AM-INPUT
APP:VINZANT-ARCHTCTR-AUTHWKNESS
APP:HP-PROTECTOR-DIR-TRAV
APP:FLEXERA-FLEXNET-BO
APP:WEBSENSE-FAV-BYPASS
APP:APPLE-MACOSX-ODP-RCE
APP:FLASH-RTMP-RESP
APP:EMBARCADERO-CONNECT-OF
APP:SYMANTEC-ENDPOINT-XSS
APP:PEERCAST-FS
APP:HP-DATA-PROTECTOR-OP-DOS
APP:HP-DATA-PROTECTOR-DOS
APP:HP-DATA-PRTCTR-EXEC_CMD-BO
APP:QUEST-BIG-BRO-FD
APP:EMC-ALPHASTOR-LIB-BOF
APP:WEBSENSE-TRITON-RCE
APP:HP-DATA-PRTCTR-OP211-264
APP:RDP-BRUTE-FORCE
APP:MAL-AFP-DSI-REQ
APP:SPREECOMMERCE-RCE
APP:HP-MGMT-TFTP-DATA-OF
APP:MCAFEE-EPOLICY-XSS
APP:YOUSENDIT-ENCRYPTED
APP:HP-PROCURVE-FILE-UPLOAD
APP:BAKBON-NETVAULT-HEAP-OF
APP:HPLOADRUNNER-XDR-BO
APP:HP-PROCRVE-MANAGER-CE
APP:HP-DATA-PRTCTR-RDS-DOS
APP:HP-DATA-PRTCTR-EXEC-BAR-CE
APP:DISKPULSE-GETSERVERINFO-OF
APP:POSTFIX-GREYLISTD-OF
APP:KINDLE-BROWSER-NPAPI-RCE
APP:EMC-DOS
APP:TRACKERCAM-OF
APP:SQUID-BUMP-DOS
APP:HP-PROCURVE-FILE-UPLD-SSL
APP:BOMBER-BO
APP:INTERSYSTEMS-CACHE-OF
APP:CHKPOINT-FW-WEBUI-REDIRECT
APP:APPLE-SIRI
APP:FCKEDITOR-RCE-UPLOAD
APP:MERCURY-PH-BO
APP:VCENTER-JMX-RCE2
APP:VCENTER-JMX-RCE
APP:VERITAS-ADMIN-BO
APP:CUPS-GIF-BO
APP:HP-MGMT-UAM-BO
APP:QNX-QCONN-CMDEXEC
APP:HP-INTELLIGENT-INFO-DISC
APP:IA-WEBMAIL-OF
APP:MIT-KERBEROS-5-POLICY-DOS
APP:HP-OPENVIEW-DTPRTCTR-BO
APP:DIGIUM-ASTERISK-MGR-CMDEXEC
APP:DIGIUM-ASTERISK-SKINNY-DOS
APP:HP-STORAGEWORKS-CIFS
APP:FREEPBX-RECORDING-RCE
APP:HP-MGMT-DBMAN-OF
APP:DISTCC-EXEC
APP:HP-PROCRVE-SNAC-FILE-UPLD
APP:BIGANT-USV-BOF
APP:HTTPD-MODLOG-COOKIE
APP:DIGIUM-IAX2-POKE-DOS
APP:EMC-NETWORKER-NSRD-BO
APP:INDUSOFT-WEBSTUDIO-RCE
APP:CAIN-ABEL-CISCO-IOS-BOF
APP:BLUECOAT-AAA-OF
APP:MCAFEE-ORCH-BO
APP:AVAYA-CCRWEBCLIENT-RCE
APP:HP-DATA-PROTECTOR-SQL
APP:VMWARE-VCENTER-CHARGEBACK
APP:INDUSOFT-WEB-STUDIO-RCE
APP:REALNETWORKS-HELIXSRV-DOS
APP:SIEMENS-SIMATIC-WINCC-BO
APP:EMC-NETWORKER-NSRINDEXD-OF
APP:NOVELL-EDIR-LEN-DOS
APP:2WIRE-DSL-VULN
APP:ASTIUM-PBX-DOS
APP:HP-PROCURVE-BYPASS
APP:WIRESHARK-LWRES
APP:SUPERSCOUT-USERDB
APP:HP-MGMT-FILE-UPLOAD
APP:RH-ICOMMERCE-ANYFILE
APP:WINMEDIASRV-RCE
APP:HPIM-SOM-EUACCNT-BYPASS
APP:APPLE-CUPS-PNG-FILTER-OF
APP:ISCSI-TARGET-FMT-STR
APP:HP-DATA-PRTCTR-DBSERVER-BO
APP:HP-DIAGNOSTICS-OF
APP:VMWARE-SPRING-CLASSLOADER
APP:HP-SM-RCE
APP:HP-OPNVIEWSTORAGE-BOF
APP:BLUECOAT-BCAAA-BOF
APP:HP-OPNVW-STORAGE-DATA-BO
APP:HP-NNM-HLEN-BOF
APP:MCAFEE-DLP-MGR-INFO-DISCL
APP:ACCELLION-FILE-TRANSFER
APP:CUPS-IPP-RCE
APP:GTS-WAP-PASSDISC
APP:TROLLTECH-QT-BMP-OF
APP:SUN-JAVA-SYSCAL-TZID-DOS
APP:HP-LOGIN-BOF
APP:SUN-JAVA-SERVER-ADMIN-DOS
APP:FREEPBX-FILE-UPLOAD
APP:YOUNGZSOFT-CONNECT
APP:NTOP-WEB-FS1
APP:SAFENET-VPN-OF
APP:GIMP-SCRIPTFU-OF
APP:HP-ACMSERVLETDOWNLOAD
APP:DELL-OPENMANAGE-BO
APP:HP-PROCURVE-FUPLOAD-SSL
APP:HP-MGMT-IMG-OF
APP:MCAFEE-WR-JBOSS-RCE
APP:WEBSENSE-PROXY-BYPASS
APP:MEDIAWIKI-RCE
APP:HP-SYS-IPRANGE-OF
APP:HP-DATA-PRTCTR-OP-27
APP:GE-PROFICY-RT-DIRTRAVERSAL
APP:EMC-PACKT-INJ-COM-EXEC
APP:DIGIUM-IAX2-DOS
APP:VLC-RTSP-PLUGIN-BO
APP:ASTERISK-REG-SIPREQ-DOS
APP:HP-LEFTHAND-VIRT-SAN
APP:MCAFEE-AM-INPUT-SSL
APP:HP-SYS-RCE
APP:HP-DATA-PROC-NEW-FOLDER
APP:VMAUTH-FS
APP:QEMU-VNC-SETPIXEL-PTR-DEREF
APP:HP-AIO-BO
APP:REDIS-GETNUM-IO
APP:FLEXNET-SERVER-BO
APP:WEBSENS-TRITON-RCE
APP:EMC-NSRINDEXD-DOS
APP:SBS-TRAINING-OF2
APP:XEROX-DS-SQ-INJ
APP:EMC-DATAPROTECTION-NULL-DOS
APP:OSSIM-COMMAND-EXEC
APP:BRG-MAIL-US-PASS
APP:OBSERVICED-OF
APP:ASUS-WRT-INFOSVR-COMND-EXEC
APP:EMC-ALPHA-BO
APP:PERSISTENT-COMMAND-EXEC
APP:SQUID-HTTPVER-DOS
APP:HP-DATA-PRTCTR-OP215-263
APP:HP-LOADRUNNER-BO
APP:SQUID-SNMPHANDLEUDP-CE
APP:EMC-APLHASTORE-FMTSTR
APP:EMC-REPLICATION-MGR-CMD-EXE
APP:HP-DATA-PRTCTR-OP1091-305
APP:HP-MGMT-SOM-SDFILE
APP:HP-STORAGEWORKS-BO
APP:ASTERISK-PJSIP-MODULE-DOS
APP:ALTN-WORLDCLIENT-MEM
APP:HP-DATA-PRTCTR-OP260-BO
APP:EMC-AUTOSTART-BOF
APP:SVN-PROTOCOL-STRING-OF
APP:FREEBSD-BSPATCH-RCE
APP:SVN-DATE-OF
APP:HP-SITESCOPE-CMD-INJ
APP:WSDAPI-OF
APP:HP-PM-EXP-DATA-LOGS
APP:HP-DATA-PRTCTR-OP235-BO
APP:HP-INTELLI-MGMT-TFTP-BO
APP:HP-DBARCHIVE-GIOP-BO
APP:ADOBE-CF-DIR-TRAV
APP:AFP-LEN-OF
APP:INDUSOFT-WEB-STUDIO-BO
APP:HP-STORAGEWORKS-BOF
APP:HP-DATA-PROTECTOR-DTBCLS-OF
APP:MS-SNBASE
APP:NETSUPPORT-MANAGER-BO
APP:HP-REPORTIMGSERVLET
APP:IPMI-CIPHER-ZERO
APP:SUNPROXY
APP:ZLIB-COMPRES-LIB-DOS
APP:HP-LEFTHAND-HYDRA-INFO-DISC
APP:HP-DATA-PROTECTOR-SIGN-DOS
APP:FLEXERA-FLXNETPUB-IMGRD-BO
APP:HP-DATA-PRTCTR-MULTI-OP-OF
APP:NOW-SMS-OF
APP:NOW-SMS-OF-MSF
APP:LINUX-SCTP-FWD-TSN-BO2
APP:CONEXANT-LOGIN
APP:LANDESK-QIP-HEAL
APP:HP-LIPS-HSSPD
APP:OBSERVICED-BOF
APP:ISCSI-TARGET-OF
APP:BIGANT-SERVER-FILE-UPLOAD
APP:HP-LASERJET-EWS-XSS
APP:VMWARE-ISAPI-DOS
APP:HP-SYS-MANGMNT-CMD-INJ
APP:NOVELL-NET-FTP-DEL-CMD-OF
APP:INVISIONIX-RS-RFI
APP:HP-MGMT-CENTER-BO
APP:MCAFEE-EPOLICY-SQLI
APP:BIGANT-SCH-CMD-BOF
APP:EMC-ALPHASTOR-BOF
APP:HP-INODEMNGCHECKER-EXE-BOF
APP:HP-LEFTHAND-HYDRA-PING-OF
APP:HP-PWR-MGR-DIR-TRAV
APP:SOPHOS-WEBAPP-CMDEXEC
APP:NAV-ENT-WEB-OF-2
APP:MCAFEE-DIR-TRAVERSAL
APP:VMWARE-OVF-FMTSTR
APP:HP-DATA-PRTCTR-OPCODES
APP:SOPHOS-WEBAPP-CMDEXEC-SSL
APP:ROCKET-SERVERGRAPH-CE
APP:UNIVERSAL-CMDB-AXIS2-RCE
APP:EIQ-LM-OF
APP:SOLARWINDS-LOG-EVENT-MANAGR
APP:HP-DATA-PRTCTR-OP45-46
APP:ICECAST-BOF
APP:HP-DATA-PROTECTOR-GET-SQL
APP:LENOVO-RCE-UPLOAD
APP:LANDESK-THINKMGT-DIRTRVRSAL
APP:EMC-ALPHASTORE-CMDEXEC
APP:SECURECRT-CONF
APP:HP-DATA-PRTCTR-OP227-BO
APP:HP-DATA-PRTCTR-OP259-BO
APP:SCOHELP-OF1
APP:FREEPBX-CALLMENUM
APP:HP-DATA-PRTCTR-OP1092-BO
APP:RIM-BLACKBERRY-DOS
APP:HP-DATA-PRTCTR-OP234-BO
APP:CLAMAV-UPX-OF-SMTP
APP:AGENTX-RECEIVE-INT-OF
APP:SQUID-HTCP-DOS
APP:FLASH-SRV-DOS
APP:POSTFIX-IPV6-RELAYING-ISSUE
APP:HP-LEFTHAND-HYDRA-DIAG-OF
APP:SENTINEL-LM-OF
APP:BAKBON-NETVAULT-INT-OF
APP:ADOBE-COLDFUSION-WEBSOCKET
APP:HORDE-WEBMAIL-CSRF
APP:MCAFEE-ORCHESTRATOR-FS
APP:MS-SMS-DOS
APP:HP-INTELL-MGMT-CENTER-CE
APP:HPE-EXECBAR-OVERFLOW
APP:EMC-CMCNE-INFO-DISC
APP:MSDOTNET-CVE-2014-1806
APP:HP-VIRTUAL-SAN
APP:JBOSS-JMX-AUTH-BYPASS
APP:HP-MGMT-TFTP-MODE-RCE
APP:EMC-NETWORKER-BYPASS
APP:HP-DATA-PROTECTOR-FIN-SQL
APP:HP-DATA-PROTECTOR-REQ-SQL
APP:HP-DATA-PRTCTR-OP42-DIR-TRV
APP:HP-ICTDOWNLOADSERVLET
APP:ABB-NETSCANHOST-OF
APP:BORLAND-STARTEAM
APP:SOLARWINDS-VMACC-CE
APP:REPLISTOR-DOS
APP:ISC-BIND-LWRESD-DOS
APP:MS-SNABASE-EXE-DOS
APP:DIGIUM-ASTERISK-COOKIE-OF
APP:LANDESK-OF
APP:MERCURY-BOF
APP:HP-DATA-PRTCTR-EXEC_SETUP
APP:VMWARE-ESX-SOAP-DOS
APP:HP-LOADRUNNER-RCE
APP:HP-LOADRUNNER-SSL
APP:MCAFEE-EPOLICY-XML
APP:DIGIUM-ASTERISK-OF
APP:SOPHOS-WA-PWD-CHG-SSL
APP:SOPHOS-WA-PWD-CHG
APP:ADOBE-FLASH-RTMP-RCE
APP:HP-MGMT-BIMS-FILE-UPLOAD
APP:CPANEL-RESETPASS
APP:POSTFIX-GLD-FS
APP:CDE-DTSPCD-OF
APP:LIBGTOP-FMT-STR
APP:AGENTX-RECEIVE-OF
APP:MCAFEE-AM-INFO-DISC-SSL

APP:AI

APP:AI:PARTIAL-MATCH
APP:AI:NO-MATCH
APP:AI:PROTOCOL-MISMATCH

APP:AMANDA

APP:AMANDA:AMANDA-ROOT-OF2
APP:AMANDA:AMANDA-ROOT-OF1

APP:APT-WWW-PROXY

APP:APT-WWW-PROXY:AWPLOG-DOS

APP:ARKEIA

APP:ARKEIA:AGENT-CONFIG
APP:ARKEIA:DEFAULT-PASSWORD
APP:ARKEIA:AGENT-ACCESS
APP:ARKEIA:DEFAULT-ADMIN-PW
APP:ARKEIA:TYPE-77-OF

APP:BORLAND

APP:BORLAND:VISIBROKER

APP:CA

APP:CA:RPC-MSG-OF-2
APP:CA:ETRUST-ID-KEY-DOS
APP:CA:IGATEWAY-CNT-LEN-OF
APP:CA:LOG-SEC-BOF
APP:CA:LIC-GETCONFIG-OF-CLT
APP:CA:LIC-PUTOLF-OF
APP:CA:LIC-GCR-OF-SVR
APP:CA:IGATEWAY-DEBUG
APP:CA:CONSOLE-LOGIN-OVERFLOW
APP:CA:LIC-GETCONFIG-OF-SVR
APP:CA:LIC-GCR-OF-CLT
APP:CA:LIC-GETCONFIG-OF2
APP:CA:ALERT-SRV-OF
APP:CA:RPC-MSG-OF
APP:CA:PRODUCT-DISC-BOF
APP:CA:MESSAGE-QUEUE-HEAP
APP:CA:LIC-COMMAND-OF
APP:CA:RPC-MSG-BO
APP:CA:DBASVR-POINT
APP:CA:DBA-SVR-POINT
APP:CA:IGATEWAY-BOF

APP:CA:ARCSRV

APP:CA:ARCSRV:RPC-MEMRCORRUPT
APP:CA:ARCSRV:RPC-MEMCORRUPT
APP:CA:ARCSRV:CALOGGERD-BO
APP:CA:ARCSRV:METHD-EXPOSURE
APP:CA:ARCSRV:MEDIASERVER-BO1
APP:CA:ARCSRV:LGSERVER-CMDNAME
APP:CA:ARCSRV:BCK-MSG
APP:CA:ARCSRV:DIRTRAV
APP:CA:ARCSRV:FILE-UPLOAD
APP:CA:ARCSRV:HSM-OF
APP:CA:ARCSRV:GWT-INFO-DISC
APP:CA:ARCSRV:XDR-PARSING-BO
APP:CA:ARCSRV:MAILSLOT-OF
APP:CA:ARCSRV:UA-OF
APP:CA:ARCSRV:CAMEDIASRV
APP:CA:ARCSRV:BME-OP-117
APP:CA:ARCSRV:CAMEDIASRV-UDP
APP:CA:ARCSRV:RPC-TAPE-ENG
APP:CA:ARCSRV:D2D-AXIS2-RCE
APP:CA:ARCSRV:SQLOF
APP:CA:ARCSRV:TCP-BOF
APP:CA:ARCSRV:TAPE-OP-207
APP:CA:ARCSRV:SQLOF-1
APP:CA:ARCSRV:PORTMAPPER-2
APP:CA:ARCSRV:PORTMAPPER-1
APP:CA:ARCSRV:PORTMAPPER-3
APP:CA:ARCSRV:UNICENTERAGENT-2
APP:CA:ARCSRV:PORTMAPPER-4
APP:CA:ARCSRV:PORTMAPPER-6
APP:CA:ARCSRV:LGSERVER-HSHAKE
APP:CA:ARCSRV:PORTMAPPER
APP:CA:ARCSRV:LG-SERVER-RCE
APP:CA:ARCSRV:LGSERVER-AUTH-USR
APP:CA:ARCSRV:TAPE-ENGINE-DOS
APP:CA:ARCSRV:BCK-MESSAGE
APP:CA:ARCSRV:BCKUP-AUTHSRV-CE
APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS
APP:CA:ARCSRV:MOBILE
APP:CA:ARCSRV:BACKUP-CMD-EXEC
APP:CA:ARCSRV:LOGGERD-DOS
APP:CA:ARCSRV:TAPE-ENGNE-DOS
APP:CA:ARCSRV:BRIGHTSTOR-BKP-BO
APP:CA:ARCSRV:METHOD-EXPOSURE
APP:CA:ARCSRV:LGSERVER-AUTH
APP:CA:ARCSRV:MEDIASERVER-BO
APP:CA:ARCSRV:DISCSRV-DOS
APP:CA:ARCSRV:UNICENTERAGENT-OF

APP:CISCO

APP:CISCO:ACS-FS
APP:CISCO:CISCO-EPNM-DESERIAL
APP:CISCO:CISCO-EPNM-DESERIAL-1
APP:CISCO:ACS-OF
APP:CISCO:LAN-MGMT-SOL-RCE
APP:CISCO:VIDEO-SURVEILANCE-LFI
APP:CISCO:VIDEO-SURVEILANCE-XSS
APP:CISCO:SECUREACS-AUTH-BYPASS
APP:CISCO:FW-SCCP-DOS
APP:CISCO:CNS-NETWORK-DOS
APP:CISCO:ASA-IKE-BO
APP:CISCO:REGISTRAR-AUTH-BYPASS
APP:CISCO:NX-OS-PRIV-ESC
APP:CISCO:SECURITY-AGENT-CE

APP:CITRIX

APP:CITRIX:AG-CMD-INJ
APP:CITRIX:STEAM-OF
APP:CITRIX:PROVISIONING-OPCODE
APP:CITRIX:PROVISIONINGSERV-UF
APP:CITRIX:XENAPP-XML-RCE
APP:CITRIX:META-IMA-AUTH
APP:CITRIX:STREAMPROCESS-BOF
APP:CITRIX:NSEPACOM-BOF
APP:CITRIX:AGENT-OF
APP:CITRIX:AGENT-OF-2
APP:CITRIX:IMA-BO
APP:CITRIX:AGENT-OF-1

APP:CUPS

APP:CUPS:HPGL-PC-OF
APP:CUPS:COMMAND-CHAR
APP:CUPS:APPLE-DOSELECT
APP:CUPS:CGI-ADMIN-OF
APP:CUPS:TEXTTOPS-OF
APP:CUPS:CUPS-JOBS-EXP
APP:CUPS:JBIG2-SYMBOLDICTIONARY
APP:CUPS:GIF-READ-LZW-OF

APP:CVS

APP:CVS:CVS-AUTHOR-OF
APP:CVS:DIR-OVERFLOW
APP:CVS:ARGUMENTX-CMD
APP:CVS:EXCESSIVE-MAX-DOTDOT
APP:CVS:CVS-FILE-INFO
APP:CVS:ENTRY-TAG-OF

APP:ESIGNAL

APP:ESIGNAL:OVERFLOW-EXPLOIT

APP:ETHEREAL

APP:ETHEREAL:TCP-80-DOS
APP:ETHEREAL:TCPDUMP-ISAKMP-DOS
APP:ETHEREAL:NETFLOW-OF
APP:ETHEREAL:EIGRP-OF-STC
APP:ETHEREAL:IGAP-ACCT-OF
APP:ETHEREAL:DISTCC-OF
APP:ETHEREAL:3G-A11-B0F
APP:ETHEREAL:EIGRP-OF-CLT

APP:EXCHANGE

APP:EXCHANGE:EMSMDB32-DOS

APP:GAME

APP:GAME:CS-CONNECT
APP:GAME:COD4-CONNECT
APP:GAME:CS-S-CONNECT
APP:GAME:XBOX-DASHBOARD
APP:GAME:XBOX-LIVE-MARKETPLACE
APP:GAME:XBOX-KERBEROS-LOGIN
APP:GAME:XBOX-HTTP-ACCESS
APP:GAME:UT3-QUERY
APP:GAME:STEAM-LOGIN
APP:GAME:EAD-LOGIN
APP:GAME:UT2004-QUERY
APP:GAME:STARDOCK-IMPULSE
APP:GAME:STEAM-URI
APP:GAME:WII-ACTIVITY
APP:GAME:DIRECTPLAY-PLAYER-DOS
APP:GAME:WOW-REALM
APP:GAME:DIRECTPLAY-NULL-PTR
APP:GAME:SOURCE-QUERY
APP:GAME:DIABLO3
APP:GAME:WORDS-WITH-FRIENDS
APP:GAME:UNREAL-GAMESPY-QP-BOF
APP:GAME:XBOX-LIVE
APP:GAME:PS-APPLICATIONS
APP:GAME:PS-COMMUNITY
APP:GAME:PS-CHAT
APP:GAME:PS-UPDATE
APP:GAME:WOW-LOGIN
APP:GAME:DIRECTPLAY-DOS
APP:GAME:MEDAL-OF-HONOR-BO

APP:GAUNTLET

APP:GAUNTLET:GAUNTLET-URL-OF

APP:HPOV

APP:HPOV:NNM-SNMP-HOST
APP:HPOV:NNMRPTCONFIG-EXE-OF
APP:HPOV:OMNILNET-NULL
APP:HPOV:OVTRACE
APP:HPOV:OVALARMSRV-OF
APP:HPOV:NNM-BO
APP:HPOV:OVALARMSRV-DOS
APP:HPOV:OVALARMSRV-FMT-STR
APP:HPOV:REQ_SEV_CHANGE-DOS
APP:HPOV:NODE-MGR-NNMRPTCONFIG
APP:HPOV:NNM-DISPLAYWIDTH-BOF
APP:HPOV:HPOPSMGT-OF
APP:HPOV:HP-DPBC-OF
APP:HPOV:OMNIBACK-II-ACE
APP:HPOV:CMD-INJ
APP:HPOV:NNM-OVLAUNCH-BO
APP:HPOV:OMNIINET-OF
APP:HPOV:OALARM-LANG-OF
APP:HPOV:NNM-HTTP-REQUEST
APP:HPOV:OVDLL-OVBUILDPATH-BOF
APP:HPOV:INT-MGMT-CTR-INFO-DIS
APP:HPOV:INT-MGMT-CTR-DIRTRAV
APP:HPOV:NNM-RADIA-NOTIFY
APP:HPOV:NNMRPTCONG-TEMPL
APP:HPOV:NNM-LOGIN-BOF
APP:HPOV:NNM-OVW-MSG
APP:HPOV:NNM-RPING-BOF
APP:HPOV:OID-OF
APP:HPOV:NNM-HTTP-OF
APP:HPOV:NNM-GETNNMDATA-OF
APP:HPOV:NNM-OVALARM-IO
APP:HPOV:NNM-SNMP-BOF
APP:HPOV:NNM-XSS
APP:HPOV:SDPM-HEAP-BOF
APP:HPOV:NNM-EXECVP-NC-OF
APP:HPOV:OPE-AGENT-CODA-BO-1
APP:HPOV:OPE-AGENT-CODA-BO
APP:HPOV:OVJAVALOCALE-OF
APP:HPOV:PERFORMANCE-INSIGHT
APP:HPOV:DEMANDPOLL-FMT-STR
APP:HPOV:NNMI-BO
APP:HPOV:NNMRPTCONFIG-EXE-BOF
APP:HPOV:OVALARMSRV-DOS2
APP:HPOV:SNMPVIEWER-APP-OF
APP:HPOV:UNAUTH-FILE-UPLOAD
APP:HPOV:NNM-EVTCOR-CMD-INJ
APP:HPOV:OVWEBSNMPSRV-OF

APP:IBM

APP:IBM:SET-ENVIRONMENT-BOF
APP:IBM:INFORMIX-LIBRPC-DLL-BOF
APP:IBM:TIVOLI-FASTBACK-OF
APP:IBM:TIVOLI-PRO-MGR-BO
APP:IBM:OPCODE-1330-CMD-INJ
APP:IBM:SYMPHONY-SOAP-BOF
APP:IBM:TSM-NODE-NAME-OF
APP:IBM:WCM-XPATH-INJ
APP:IBM:FORMVIEWER-XFDL-BOF
APP:IBM:SYS-DIRECTOR-DLL-LOAD
APP:IBM:DB2-KUDDB2-DOS
APP:IBM:TIVOLI-OF
APP:IBM:BLADECENTER-DOS
APP:IBM:DIRECTOR-AGENT-DOS
APP:IBM:TIVOLI-FASTBACK-SER-RCE
APP:IBM:TEALEAF-PCA-CMDEXEC
APP:IBM:SOLIDDB-DOS
APP:IBM:COGNOS-TM1-BOF
APP:IBM:TIV-SM-CAD
APP:IBM:TIVOLI-FASTBACK-RCE
APP:IBM:TIVOLI-FASTBACK-BOF
APP:IBM:TIVOLI-OP4115-BO
APP:IBM:IDS-LIBRPC
APP:IBM:TSM-RCE
APP:IBM:DOMINO-BYPASS-1
APP:IBM:TSM-CVE-2015-0119-BO
APP:IBM:TME-AGENT
APP:IBM:DIRECTOR-CIM-DOS
APP:IBM:TSM-SIGN-ON-OF
APP:IBM:LDAP-MODIFYREQUEST-BO
APP:IBM:DOMINO-BYPASS
APP:IBM:WS-APPSRV-RCE2
APP:IBM:WS-APPSRV-RCE
APP:IBM:LOTUS-NOTES-HTML-OF
APP:IBM:BLADECENTER-INFO
APP:IBM:INFORMIX-EXPLAIN-BOF
APP:IBM:TIV-SCHEDULEPARAM-XSS
APP:IBM:BLADECENTER-AMM-CSRF
APP:IBM:TIV-DS-IBMSLAPD-EXE
APP:IBM:TSM-CLIENT-OF
APP:IBM:INFORMIX-DBINFO-BOF
APP:IBM:TIV-OP1329-BOF
APP:IBM:TIV-OP1331-CMDINJ
APP:IBM:INFORMIX-CMD-OF
APP:IBM:INFORMIX-EXPLAIN
APP:IBM:COGNOS-BACKDOOR
APP:IBM:TIVOLI-MAN-HEAP
APP:IBM:FXCLI-EXECBO
APP:IBM:TIVOLI-FASTBACK-OP-BO
APP:IBM:TIV-OP1339-CMDINJ
APP:IBM:TIVOLI-SRV-OP1301
APP:IBM:TIVOLI-SRV-OP1335

APP:INGRES

APP:INGRES:DB-COMP-BO
APP:INGRES:DB-COMM-SVR-OF

APP:IPSWITCH

APP:IPSWITCH:LOGGING-SVC-DOS

APP:KERBEROS

APP:KERBEROS:DOS-TCP
APP:KERBEROS:EXCESSIVE-ERRORS
APP:KERBEROS:XREALM-DOS
APP:KERBEROS:KRB5-MITM-DES
APP:KERBEROS:KRB5-DOS
APP:KERBEROS:INV-TOKEN-DOS-TCP
APP:KERBEROS:MS-KERB-ASN-BIT
APP:KERBEROS:DBLFREE
APP:KERBEROS:MIT-KRB5-KDC-DOS
APP:KERBEROS:BLDPRINCIPAL-VA2
APP:KERBEROS:CHKSUM-PRIV-ESC
APP:KERBEROS:DBLFREE-2
APP:KERBEROS:KDC-NULL-DOS
APP:KERBEROS:KDC-AUTH-DOS
APP:KERBEROS:GSS-ZERO-TOKEN
APP:KERBEROS:SPNEGO-5-DOS
APP:KERBEROS:MS-WIN-2000-DOMAIN
APP:KERBEROS:DOS
APP:KERBEROS:KBR-DOS-TCP-2
APP:KERBEROS:BLDPRINCIPAL-VA1
APP:KERBEROS:READ-MSG-DOS
APP:KERBEROS:MULTI-REALM-DOS
APP:KERBEROS:PREP-REPROCESS-REQ
APP:KERBEROS:XREALM-KDC-DOS
APP:KERBEROS:MIT-KRB5-DOS
APP:KERBEROS:KPASSWD-UDP-DOS
APP:KERBEROS:KERB-NULL-POINTER
APP:KERBEROS:INV-TOKEN-DOS-UDP

APP:MDAEMON

APP:MDAEMON:MDCONFIG-VER
APP:MDAEMON:SEND-OF
APP:MDAEMON:FORM2RAW-OF
APP:MDAEMON:LIST-OF

APP:MISC

APP:MISC:JRE-PACK200-OF
APP:MISC:SIMENS-GIGAST-DOS
APP:MISC:MS-ACTIVE-DIR-RCE
APP:MISC:SPLASHTOP-DOS
APP:MISC:PXESERVICE-UDP
APP:MISC:OP5-APP-TIMESTAMP
APP:MISC:BIGANT-IM-ANTSERVER-OF
APP:MISC:ACTFAX-BO
APP:MISC:DIASOFT-EXECCMD-CE
APP:MISC:PIGEON-DOS
APP:MISC:UNISYS-BIS
APP:MISC:DOMINO-MGR-FS
APP:MISC:GITORIOUS-RCE
APP:MISC:AVIRA-ANTIVIR
APP:MISC:OP5-APP-PASSWORD
APP:MISC:ALIENVALT-BAKUP-COM-RE
APP:MISC:WSHARK-ENTTEC-BO
APP:MISC:NETVAULT-SD-DOS
APP:MISC:HEARTBEAT-OF
APP:MISC:ARCSERVE-GETBACKUP
APP:MISC:TVMOBILI-DOS
APP:MISC:EMC-AS-INSECUREOPS
APP:MISC:DSM-SLICEUPLOAD-RCE
APP:MISC:SAMSUNG-SWIFTKEY-RCE
APP:MISC:APACHE-SVN-IO
APP:MISC:GOOGLE-EARTH
APP:MISC:ENTERASYS-NETSIGHT-BOF
APP:MISC:ESIGNAL-WINSIG-BO
APP:MISC:REDHAT-JBOSS-JNDI
APP:MISC:AVID-MEDIA-OF
APP:MISC:ZABBIX-AGENT-RCE
APP:MISC:GUESTBOOK-CGI
APP:MISC:AVAYA-WINPDM
APP:MISC:SPREE-SEARCH-CMD-EXE
APP:MISC:DOGFOOD-RCE
APP:MISC:UPLUS-FTP-WEB-OF
APP:MISC:ACTFAX-BO-HTTP
APP:MISC:TANNE-FMT-STR
APP:MISC:HP-SITESCOPE-DIR-TRAV
APP:MISC:HP-SITESCOPE-SOAP
APP:MISC:SIELCO-SISTEMI-WINLOG
APP:MISC:ZABBIX-SQLI
APP:MISC:HP-SITESCOPE-LOADFILE
APP:MISC:HP-OA-HEALTH-BO
APP:MISC:F-SECURE-WEB-BO
APP:MISC:SYNERGY-CLPBRD-OF
APP:MISC:LCDPROC-BOF
APP:MISC:YEALINK-IP-PHONE-BO
APP:MISC:YEALINK-IP-PHONE-CSRF
APP:MISC:D-LINK-SEC-BYPASS
APP:MISC:HP-SSC-APIMONITORIMPL
APP:MISC:SAP-NETWEAVER-SOAP-RCE
APP:MISC:HP-AUTOKEYLIB-RCE
APP:MISC:SAMSUNG-ALLSHARE-DOS
APP:MISC:SOPHOS-WEBAPP-RCE
APP:MISC:HP-RADIO-CLI-MEMCP
APP:MISC:HP-DATA-PROTECTOR-TRAV
APP:MISC:ENDIAN-PRX-CMDEXEC2
APP:MISC:HP-INODE-BO
APP:MISC:HP-SITESCOPE-CE
APP:MISC:CVE-2014-0549-RTMP-MC
APP:MISC:MS-WIN-SMB-SER-DOS-1
APP:MISC:MS-WIN-SMB-RENAME-DOS
APP:MISC:NOVELL-NETWARE-FUNC-OF
APP:MISC:SCHNEIDER-ELE-MGR-BO
APP:MISC:HP-MERCURY-BOF
APP:MISC:FARONICS-DFE-RCE
APP:MISC:ACROREAD-XML-URL
APP:MISC:SAMSUNG-TV-SERVER-DOS
APP:MISC:MULTI-VENDORS-OF
APP:MISC:MUL-DOS-UDP
APP:MISC:FUJITSU-WEB-DIR-TRAV
APP:MISC:MUL-MEMCP-1
APP:MISC:MUL-MEMCP-2
APP:MISC:SCHNEIDER-SQLI-RCE
APP:MISC:MULTIPLE-RCE
APP:MISC:MUL-DOS
APP:MISC:MUL-PRDCTS-CMD-EXEC
APP:MISC:MULTI-VENDORS-BOF
APP:MISC:MUL-VENDORS-ID
APP:MISC:OBJ-OBJDB-BO
APP:MISC:NEC-EXPCLU-BO
APP:MISC:APACHE-QPID-SESS-DOS
APP:MISC:HP-AUTOKEYLIB-CE
APP:MISC:SAM-ACTQ-MULTI
APP:MISC:APACHE-QPID-SEQSET-DOS
APP:MISC:EZHOMETECH-EZSERVER-BO
APP:MISC:ARCSERVE-BKUP
APP:MISC:SAMSUNG-TV-BD-DOS
APP:MISC:ZABBIC-NODE-PROCESS-CE
APP:MISC:ZEND-XMLRPC-INFO-DISC
APP:MISC:NVIDIA-MTL-RAY-DLL-INJ
APP:MISC:ZEND-SERVER-CE
APP:MISC:EMC-AUTOSTART-NULLBYTE
APP:MISC:AUTONOMY-CONN-TYPE-13
APP:MISC:CNTWR-FV-GIF-LZWMCS-MC
APP:MISC:QUEST-NETVAULT-DOS
APP:MISC:XEROX-MFP-COMND-EXEC
APP:MISC:CLEARSCADA-OPF-PARSE
APP:MISC:SERCOMM-DEVICE-RCE
APP:MISC:BIGANT-DDNF-BO
APP:MISC:GANGLIA-METE-BOF
APP:MISC:CITADEL-BO
APP:MISC:APPLE-CUPS-PNG-OF-1
APP:MISC:KADMIN-4-OF
APP:MISC:LCDPROC-TEST-FUNC-FS
APP:MISC:SAMSUNG-NET-I-WARE-DOS
APP:MISC:AV-USM-DESER-RCE
APP:MISC:ADOBE-RTMP-UAF
APP:MISC:ZIMBRA-COLLAB-INFODISC
APP:MISC:NAGIOS-NRPE-CHKUSRS-CI
APP:MISC:MCAFEE-EPOL-ORCH
APP:MISC:SCHNEIDER-INDUSOFT-RCE
APP:MISC:NAGIOS-NRPE-CE
APP:MISC:HICP-HOSTNAME
APP:MISC:FREEBSD-MBUF-DOS
APP:MISC:SCHNEIDER-ACCUTECH-B0
APP:MISC:ACTMQ-SHUTDN-CMD

APP:NOVELL

APP:NOVELL:NETWARE-XNFS-BO
APP:NOVELL:GRPWISE-HOST-RCE
APP:NOVELL:HTTP-NOVELL-REDIRECT
APP:NOVELL:IMONITOR-OF
APP:NOVELL:EDIRECTORY-DOS
APP:NOVELL:REPORTER-AGENT
APP:NOVELL:IMANAGER-FILE-UPLOAD
APP:NOVELL:GROUPWISE-ADDRESSBK
APP:NOVELL:GROUPWISE-CLIENT-BO
APP:NOVELL:ZENWORKS-FHIPCND-EXE
APP:NOVELL:ZENWORKS-MGT-UPLOAD
APP:NOVELL:GROUPWISE-ADDRESS
APP:NOVELL:IMANAGER-ARB-UPLOAD
APP:NOVELL:NMAP-NETMAIL-STOR
APP:NOVELL:MESSENGER-LOGIN
APP:NOVELL:MSNGR-CREATESEARCH
APP:NOVELL:GROUPWISEIA-ICAL-DOS
APP:NOVELL:REMOTE-MGR-DOS
APP:NOVELL:MESSENGER-SERVER-BOF
APP:NOVELL:REPORTER-FSFUI
APP:NOVELL:CASA-PAM-BOF
APP:NOVELL:ZENWORKS-DIR-TRVRS
APP:NOVELL:ZENWORKS-DIR-TRAV
APP:NOVELL:EDIRECTORY-ME-OF
APP:NOVELL:INTERNET-AGENT-BOF
APP:NOVELL:NDS-IO
APP:NOVELL:ZENWORKS-TFTPD-RCE
APP:NOVELL:ZENWORKS-PREBOOT-SVC
APP:NOVELL:ZENWORKS-MGMT-DIR
APP:NOVELL:MESSENGER-DOS
APP:NOVELL:PREBOOT-POLICY-BO
APP:NOVELL:NETIQ-EDIR-BOF
APP:NOVELL:GWMGR-INFODISC
APP:NOVELL:IMANAGER-TREE-NAME
APP:NOVELL:RECORD-TAG-BOF
APP:NOVELL:EDIR-HEADER-DOS
APP:NOVELL:ZENWORKS-ZFHIPCND-OF
APP:NOVELL:ZENWORKS-MOBILE-LFI
APP:NOVELL:ZENWORKSCM-DIRTRVRSL
APP:NOVELL:MESSENGER-BOF
APP:NOVELL:EDIR-PLUGIN-OF
APP:NOVELL:DIS-PRINT-SRV
APP:NOVELL:ZENWORKS-AGENT-OF
APP:NOVELL:ZENWORKS-LG-DIR-TRAV
APP:NOVELL:GROUPWISE-MAILTO-BO
APP:NOVELL:ZENWORKS-MSG-DLL-OF
APP:NOVELL:IPRINT-ATTRIB-BO
APP:NOVELL:REPORTER-VOL
APP:NOVELL:REPORTER-SRS
APP:NOVELL:ZENWORKS-CONFMGR-BO
APP:NOVELL:XNFS-NLM
APP:NOVELL:REPORTER-AGENT-BOF
APP:NOVELL:GROUPWISE-WA
APP:NOVELL:GWCLIENT-BOF
APP:NOVELL:IMANAGER-CREATE-BO
APP:NOVELL:ZENWORKS-CONTENT-LEN
APP:NOVELL:EDIR-CONTENT-LEN-OF

APP:ORACLE

APP:ORACLE:BUSINESS-FLSHSVC-RCE
APP:ORACLE:OUTSIDE-IN-FLASHPIX
APP:ORACLE:WEBLOGIC-SRV-RCE
APP:ORACLE:WEBLOGIC-CMD-EXEC
APP:ORACLE:JAVA-RMI-RCE
APP:ORACLE:OUTSIDE-JPEG2-CRG
APP:ORACLE:OUTSIDEIN-MET-HOVF
APP:ORACLE:CLNT-SYS-ANLZR-FL-UP
APP:ORACLE:WEBUI-CMD-INJ
APP:ORACLE:SYSTEM-ARRAYCOPY-RCE
APP:ORACLE:RAPID-WEBSRV-XSS
APP:ORACLE:SBAS-AUTH-BYPASS
APP:ORACLE:OOXML-TAG
APP:ORACLE:GOLDENGATE-SOAP-OF
APP:ORACLE:RHINOSCRIPT-BYPASS
APP:ORACLE:OHS-PROXY-BYPASS
APP:ORACLE:MEMCACHED-PLUGIN
APP:ORACLE:OUTSIDE-JPEG2-CODCOC
APP:ORACLE:WEBCACHE-INSECURE2
APP:ORACLE:WEBCACHE-INSECURE
APP:ORACLE:WEBCACHE-METHOD-OF
APP:ORACLE:VIRTUAL-AGT-CMDIJ-HS
APP:ORACLE:VIRTUAL-AGENT-CMDINJ
APP:ORACLE:WEBLOGIC-FILE-UPLOAD
APP:ORACLE:SECURE-BACKUP-INJ
APP:ORACLE:SQL-QUERY-DIR-TRAV
APP:ORACLE:REPORT-CMD-INJ

APP:PCANYWHERE

APP:PCANYWHERE:STARTUP
APP:PCANYWHERE:LOGIN-ADMIN
APP:PCANYWHERE:HOST-SERVICES
APP:PCANYWHERE:SERVER-DOS
APP:PCANYWHERE:LOGIN-PASSWD-BO
APP:PCANYWHERE:LOGIN-FAILURE

APP:PPTP

APP:PPTP:POPTOP-OF
APP:PPTP:MICROSOFT-PPTP
APP:PPTP:PPTP-UNK-CTRL

APP:PROXY

APP:PROXY:SQUID-HOST-HDR-BYPASS
APP:PROXY:SQUID-ACCEPT-LANG-DOS
APP:PROXY:SQUID-WCCP-BO
APP:PROXY:SQUID-WCCP-DOS
APP:PROXY:SQUID-PROXY-CACHE
APP:PROXY:SQUID-SSLBUMP-CERT

APP:QT-SERVER

APP:QT-SERVER:DESCRIBE-DOS
APP:QT-SERVER:DEV-URL-DOS
APP:QT-SERVER:PARSE-XML-CGI-RCE

APP:REAL

APP:REAL:SERVER-DOS
APP:REAL:PLAYER-MAL-META-FILE
APP:REAL:HELIX-URL-OF
APP:REAL:HTML-PARSING-DOS
APP:REAL:MAL-FLV-FILE
APP:REAL:REAL-MPG-WIDTH
APP:REAL:PLAYER-SMIL-OF
APP:REAL:RMP-FILE-OF
APP:REAL:IVR-OF-1
APP:REAL:IVR-OF
APP:REAL:PLAYER-MAL-SKIN
APP:REAL:PLAYER-FILE-SEC-BYPASS
APP:REAL:PLAYER-INVALID-CHUNK
APP:REAL:REALTEXT-ERR-OF
APP:REAL:NEG-CONT-LEN
APP:REAL:SMIL-WALLCLOCK-OF
APP:REAL:PLAYER-FORMAT-STRING
APP:REAL:VIDPLIN-DLL
APP:REAL:RAM-FILE-OF
APP:REAL:HELIX-NTLM-OF

APP:REMOTE

APP:REMOTE:TEAMVIEWER-URL-MODE
APP:REMOTE:RDP-CONNECT
APP:REMOTE:TIMBUKTU-CONNECT
APP:REMOTE:TEAMVIEWER-HTTP
APP:REMOTE:LOGMEIN
APP:REMOTE:TEAMVIEWER
APP:REMOTE:GOTOMYPC-CONN-TEST
APP:REMOTE:RDP-HEAP-BO
APP:REMOTE:GOTOMYPC
APP:REMOTE:NETTRANSPORT-DM
APP:REMOTE:RDP-HEAP-OF
APP:REMOTE:RDP-MEM-OBJ
APP:REMOTE:RDP-RCE
APP:REMOTE:TIMBUKTU-AUTH-OF
APP:REMOTE:MS-WIN-RDP-RCE
APP:REMOTE:MS-RDP-ACTIVEX-RCE
APP:REMOTE:CVE-2015-2373-RCE
APP:REMOTE:RDP-DOS

APP:RWHOISD

APP:RWHOISD:RWHOISD-FS

APP:SAP

APP:SAP:NETWEAVER-DOS
APP:SAP:NETWEAVER-DIAGI-DOS
APP:SAP:IGS-OF
APP:SAP:NETWEAVER-SOAP-RCE
APP:SAP:MSG-SRV-GRP
APP:SAP:NETWEAVER-MSG-RCE
APP:SAP:3DVIS-FLIC-BO
APP:SAP:WEB-SRV-OF
APP:SAP:NETWEAVER-BO
APP:SAP:CONFIGSERVLET-CMD-EXEC
APP:SAP:3DM-FILE-BOF
APP:SAP:BIS-LIC-MGR-BOF
APP:SAP:WEBAS-DOS
APP:SAP:INT-GRAPHICS-PARAMS-XSS
APP:SAP:NETWEAVER-MSG-SERVER-B0
APP:SAP:SYBASE-ESPPARSE-DOS

APP:SHOUTCAST

APP:SHOUTCAST:ICY-OVERFLOW

APP:SNORT

APP:SNORT:GARBAGE-PACKET
APP:SNORT:REPORT-RCE
APP:SNORT:DCE-RPC-DOS
APP:SNORT:BACKORIFICE-DOS
APP:SNORT:BACKORIFICE-BOF

APP:SOCKS

APP:SOCKS:SMTP-PROXY-HTTP

APP:SYMC

APP:SYMC:WORKSPACE-RCE
APP:SYMC:ALTIRIS-DS-SQL-INJ
APP:SYMC:VRTSWEB-EXEC
APP:SYMC:VERITAS-VXSVC-BO
APP:SYMC:WEB-GATEWAY-CSRF
APP:SYMC:NETBACKUP-CMD-EXEC
APP:SYMC:AV-AHS-DOS
APP:SYMC:AMS-PIN-OF
APP:SYMC:AMS-MODEM-STRING-OF
APP:SYMC:MESSAGING-DIR-TRAV
APP:SYMC:IM-MGR-INJ
APP:SYMC:AGENT-RM-CMD
APP:SYMC:WEB-GW-PWD-CHG
APP:SYMC:WORKSPACE-FILE-UPLOAD
APP:SYMC:IM-MGR-ADM-INJ
APP:SYMC:SCAN-ENG-AUTH-BYPASS
APP:SYMC:AMS-HNDLRSVC-RCE
APP:SYMC:BACKUP-EXEC
APP:SYMC:MESSAGING-SSH-PASSWORD
APP:SYMC:ALERT-MGT-1
APP:SYMC:ENCRYPTED-CMD-EXEC
APP:SYMC:AMS-SEND-ALERT-ACK-OF
APP:SYMC:AV-INTEL-ALERT
APP:SYMC:WG-PBCONTROL
APP:SYMC:IM-MGR-WEB-UI-INJ
APP:SYMC:ALERT-MGT-FILE-TRNS
APP:SYMC:LIVE-UPDATE-SEC-BYPASS
APP:SYMC:MESSAGING-SAVE.DO-CSRF
APP:SYMC:BLOCKED-PHP-SQLI
APP:SYMC:XFERWAN-OF
APP:SYMC:WEB-GATEWAY-OS-CMD-INJ
APP:SYMC:ALERT-MGT
APP:SYMC:AV-MGT-SVC-BOF
APP:SYMC:LUA-HTML-INJ
APP:SYMC:MGM-CONSOLE-XSS

APP:TMIC

APP:TMIC:TMREGCHANGE
APP:TMIC:SP-CREATEBIND-OF
APP:TMIC:SP-EARTHAGENT-OF
APP:TMIC:SP-CREATE-BIND-OF
APP:TMIC:CTRLMGR-CHUNKED
APP:TMIC:CONTROL-MANAGER-CMD
APP:TMIC:OFFICESCAN-PW-OF
APP:TMIC:SP-EARTH-AGENT-OF
APP:TMIC:OFFICESCAN-AUTH
APP:TMIC:INTERSCAN-XSS

APP:TUN

APP:TUN:TOR-2
APP:TUN:TOR-1
APP:TUN:TOR-3
APP:TUN:TEREDO-INFO
APP:TUN:GPRS-TUNNEL
APP:TUN:GRE-TUNNEL
APP:TUN:ESP-TUNNEL
APP:TUN:ANCHORFREE-VPN-UDP
APP:TUN:PACKETIX-VPN-CONNECT
APP:TUN:IPV6-OVER-IPV4
APP:TUN:ANCHORFREE-VPN-SSL
APP:TUN:ESP-OVER-UDP
APP:TUN:TOR-EXIT-HOSTHEADER
APP:TUN:TEREDO-TUNNEL
APP:TUN:ANCHORFREE-VPN-TCP
APP:TUN:TIC-LOGIN
APP:TUN:6TO4-TUNNEL

APP:UPNP

APP:UPNP:LIBUPNP-ROOT-DSN-BOF
APP:UPNP:LIBUPNP-UUID-BOF
APP:UPNP:APPLE-MDNS
APP:UPNP:MS-UPNP
APP:UPNP:MINIUPNPD-DOS
APP:UPNP:LIBUPNP-DSN-BOF
APP:UPNP:DLINK-SEARCH-NOTIFY

APP:VERITAS

APP:VERITAS:NB-VMD-OF2
APP:VERITAS:REG-WRITE-2
APP:VERITAS:COMMAND-CHAIN
APP:VERITAS:NETBACKUP-VNETD
APP:VERITAS:VERITAS-NULL-PTR
APP:VERITAS:NB-VMD-OF
APP:VERITAS:NETBCKP-CMD-EXEC
APP:VERITAS:CLIENT-AUTH-OF
APP:VERITAS:AGENT-NAME-OF
APP:VERITAS:VERITAS-FILE-DUMP
APP:VERITAS:NETBACKUP-FS
APP:VERITAS:MAL-REQUEST-DOS
APP:VERITAS:REG-WRITE
APP:VERITAS:NETBACKUP-BPCD

APP:WHATSUP

APP:WHATSUP:IPSWITCH-DIR-TRV

APP:WINAMP

APP:WINAMP:CAF-OF
APP:WINAMP:MP4-MC
APP:WINAMP:AVI-STREAM-BO
APP:WINAMP:MIDI-FILE-OF
APP:WINAMP:AMF-BO
APP:WINAMP:RIFF-INFO
APP:WINAMP:CDA-DEV-NAME-OF

APP:WMP

APP:WMP:DSHOW-BIGCHUNK-HTTP
APP:WMP:DSHOW-BIGCHUNK-SMB
APP:WMP:DSHOW-BIGCHUNK-SMTP

APP:XDMCP

APP:XDMCP:DTLOGIN-DBL-FREE

CHARGEN

CHARGEN:ECHO-DOS
CHARGEN:TRAFFIC

CHARGEN:EXPLOIT

CHARGEN:EXPLOIT:UNEXPECTED-REQ

CHAT

CHAT:POPO-CHAT-LOGIN
CHAT:OOVOO-ACTIVITY
CHAT:APPLE-IMESSAGE-CONNECTION
CHAT:MS-LYNC-2010-CE
CHAT:STEAM-FRIENDS

CHAT:AIM

CHAT:AIM:CLOSE-CONNECTION
CHAT:AIM:FILE-SEND
CHAT:AIM:SERVER-READY
CHAT:AIM:MESSAGE-RECEIVE
CHAT:AIM:LOGIN-ATTEMPT
CHAT:AIM:MESSAGE-SEND
CHAT:AIM:FILE-GET
CHAT:AIM:HTTP-PROXY
CHAT:AIM:TUNNEL
CHAT:AIM:TOC
CHAT:AIM:HTTPS-LOGIN
CHAT:AIM:FILE-EXE
CHAT:AIM:LINK-EXEC

CHAT:AIM:OVERFLOW

CHAT:AIM:OVERFLOW:AWAY-FS
CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY
CHAT:AIM:OVERFLOW:TRILLIAN-XML
CHAT:AIM:OVERFLOW:TRILIN-XML-BO

CHAT:AUDIT

CHAT:AUDIT:IRC-CMD
CHAT:AUDIT:IRC-CMD-CHR

CHAT:AUDIT:AIM

CHAT:AUDIT:AIM:MSG-HEADER
CHAT:AUDIT:AIM:TLV-LEN-OVFLW
CHAT:AUDIT:AIM:MSG-TOO-SHORT
CHAT:AUDIT:AIM:INVALID-TLV
CHAT:AUDIT:AIM:INV-TLV-LEN
CHAT:AUDIT:AIM:MSG-TOO-BIG

CHAT:AUDIT:MSN

CHAT:AUDIT:MSN:CMD
CHAT:AUDIT:MSN:PHONE-NUM
CHAT:AUDIT:MSN:MSN-USER-NAME
CHAT:AUDIT:MSN:URL
CHAT:AUDIT:MSN:GROUP-NAME
CHAT:AUDIT:MSN:MSG
CHAT:AUDIT:MSN:MSG-2LONG
CHAT:AUDIT:MSN:USER-STATE
CHAT:AUDIT:MSN:IP-PORT

CHAT:AUDIT:YMSG

CHAT:AUDIT:YMSG:USERNAME
CHAT:AUDIT:YMSG:OFLOW-RESP-CRPT
CHAT:AUDIT:YMSG:OFLOW-URL
CHAT:AUDIT:YMSG:URL
CHAT:AUDIT:YMSG:MSG-SIZE
CHAT:AUDIT:YMSG:USER-NAME
CHAT:AUDIT:YMSG:STATUS-CODE
CHAT:AUDIT:YMSG:CHATRM-MSG
CHAT:AUDIT:YMSG:OFLOW-COOKIE
CHAT:AUDIT:YMSG:INV-GROUP-NAME
CHAT:AUDIT:YMSG:FILE-NAME
CHAT:AUDIT:YMSG:EVENT-CODE
CHAT:AUDIT:YMSG:OFLOW-PASSWD
CHAT:AUDIT:YMSG:MAIL-SUBJECT
CHAT:AUDIT:YMSG:INV-STAT-CODE
CHAT:AUDIT:YMSG:MSG-TOO-BIG
CHAT:AUDIT:YMSG:BUD-LST
CHAT:AUDIT:YMSG:BUDY-LIST
CHAT:AUDIT:YMSG:DATA-TYPE
CHAT:AUDIT:YMSG:OFLOW-GRP-NAME
CHAT:AUDIT:YMSG:MEMBER-NAME
CHAT:AUDIT:YMSG:VALUE
CHAT:AUDIT:YMSG:MAIL-SNDR-ADDR
CHAT:AUDIT:YMSG:CRYPT-PASSWD
CHAT:AUDIT:YMSG:MSG
CHAT:AUDIT:YMSG:CONTACT-NAME
CHAT:AUDIT:YMSG:CONF-MSG
CHAT:AUDIT:YMSG:GROUP-NAME
CHAT:AUDIT:YMSG:MAIL-SNDR-NAME
CHAT:AUDIT:YMSG:SENDER
CHAT:AUDIT:YMSG:CHATROOM-NAME
CHAT:AUDIT:YMSG:RECIPIENT
CHAT:AUDIT:YMSG:CONF-NAME
CHAT:AUDIT:YMSG:CONF-INVIT
CHAT:AUDIT:YMSG:BUD-NAME
CHAT:AUDIT:YMSG:CHALLENGE
CHAT:AUDIT:YMSG:ACTIVITY-SIZE
CHAT:AUDIT:YMSG:RESP-CRYPT
CHAT:AUDIT:YMSG:OFLOW-CHALNG
CHAT:AUDIT:YMSG:CONF-HOST
CHAT:AUDIT:YMSG:MAIL-ADDR
CHAT:AUDIT:YMSG:CHAT-NAME-OF
CHAT:AUDIT:YMSG:OFLOW-CONF-MSG
CHAT:AUDIT:YMSG:ACTIVITY
CHAT:AUDIT:YMSG:BUD-LIST
CHAT:AUDIT:YMSG:WEBCAM-KEY
CHAT:AUDIT:YMSG:SEPARATOR
CHAT:AUDIT:YMSG:OFLOW-CONF-NAME
CHAT:AUDIT:YMSG:COOKIE
CHAT:AUDIT:YMSG:MESSAGE-SEND
CHAT:AUDIT:YMSG:MESSAGE-RECEIVE
CHAT:AUDIT:YMSG:FILE-SEND
CHAT:AUDIT:YMSG:FILE-SEND-HTTP

CHAT:GADU-GADU

CHAT:GADU-GADU:BANNER
CHAT:GADU-GADU:CLIENT-REQ
CHAT:GADU-GADU:DISCOVER

CHAT:GOOGLE

CHAT:GOOGLE:GTALK-STARTUP
CHAT:GOOGLE:GTALK-CALL
CHAT:GOOGLE:SEND-HTTP
CHAT:GOOGLE:START
CHAT:GOOGLE:GTALK-SSL
CHAT:GOOGLE:GTALK-PHONE-SESSION
CHAT:GOOGLE:TALKGADGET
CHAT:GOOGLE:TALKGADGET-ACTIVITY
CHAT:GOOGLE:JABBER
CHAT:GOOGLE:JABBER-SSL

CHAT:ICQ

CHAT:ICQ:FILE-RECEIVE
CHAT:ICQ:FILE-SEND
CHAT:ICQ:ISS-BLACKICE-OF

CHAT:IRC

CHAT:IRC:RATBOX-MCAPAB-DOS
CHAT:IRC:SRV-RESPONSE
CHAT:IRC:SSN-CLEARTEXT
CHAT:IRC:NICK
CHAT:IRC:UNREALRCD-BACKDOOR
CHAT:IRC:LOIC-HIVE-LOGIN
CHAT:IRC:MIRC-PRIVMSG
CHAT:IRC:COLLOQUY-DOS
CHAT:IRC:COLLOQUY-INVITE-FS
CHAT:IRC:CC-NUMBER

CHAT:IRC:BOTNET

CHAT:IRC:BOTNET:AGOBOT-CMD
CHAT:IRC:BOTNET:DOWNLOAD-CMD
CHAT:IRC:BOTNET:SDBOT-CMD
CHAT:IRC:BOTNET:RA1NX-BOT-CE
CHAT:IRC:BOTNET:W3TW0RK-RCE

CHAT:IRC:INVALID

CHAT:IRC:INVALID:ARGS
CHAT:IRC:INVALID:NUM-REPLY
CHAT:IRC:INVALID:MSG
CHAT:IRC:INVALID:PREFIX
CHAT:IRC:INVALID:NULL-CHAR
CHAT:IRC:INVALID:FORMAT-STR

CHAT:IRC:OVERFLOW

CHAT:IRC:OVERFLOW:NUM-REPLY
CHAT:IRC:OVERFLOW:USERNAME
CHAT:IRC:OVERFLOW:CHANNEL
CHAT:IRC:OVERFLOW:LINE
CHAT:IRC:OVERFLOW:NICK
CHAT:IRC:OVERFLOW:PASSWORD
CHAT:IRC:OVERFLOW:OPENBSD-DOS
CHAT:IRC:OVERFLOW:XCHAT-SOCKS

CHAT:JABBER

CHAT:JABBER:JABBER-XTRAF
CHAT:JABBER:JABBER-CTRAF
CHAT:JABBER:NIMBUZZ
CHAT:JABBER:UNAME-OF

CHAT:MSN

CHAT:MSN:POINT-TO-POINT
CHAT:MSN:ACCESS
CHAT:MSN:INVITE-SEND
CHAT:MSN:LOGIN-ATTEMPT
CHAT:MSN:INVITE-RECV
CHAT:MSN:BRIDGE
CHAT:MSN:GIF-OVERFLOW
CHAT:MSN:PIDGIN-MSN-IO

CHAT:MSN:HTTP

CHAT:MSN:HTTP:CALL
CHAT:MSN:HTTP:LOGIN
CHAT:MSN:HTTP:CHAT
CHAT:MSN:HTTP:MSNFTP-INVITE

CHAT:MSN:INVALID

CHAT:MSN:INVALID:MSN-VID-FRAME
CHAT:MSN:INVALID:PNG-HEIGHT
CHAT:MSN:INVALID:PNG-WIDTH

CHAT:QQ

CHAT:QQ:QQ-CONNECT-TCP
CHAT:QQ:QQ-CONNECT

CHAT:YIM

CHAT:YIM:XSS
CHAT:YIM:HTTP-FILE-TRANSFER
CHAT:YIM:YAHOO-HTTP-PROXY
CHAT:YIM:DOUBLE-EXT
CHAT:YIM:FILE-TRANSFER
CHAT:YIM:LONG-FILE-NAME
CHAT:YIM:LOGIN-ATTEMPT
CHAT:YIM:HTTP-TUNNEL

CHAT:YIM:OVERFLOW

CHAT:YIM:OVERFLOW:SPOOFED-NAME

DB

DB:INGRES-UUID_FROM_CHAR-OF
DB:INGRESDB-IIDBMS-OF
DB:FIREBIRD-XDR-DOS
DB:FIREBIRD-USER-BO
DB:IBM-SOLIDDB-AUTH-BYPASS
DB:SALESLOGIX-DISC
DB:IBM-SOLIDDB-ROWNUM
DB:SOLIDDB-LOG-FS
DB:SAPDB-WEB-OF
DB:IBM-SOLIDBD-WHERE-DOS
DB:SOLIDDB-DOS
DB:FIREBIRD-DOS
DB:BORLAND-MSG-BO
DB:MONGODB-NATIVEHELPER-RCE

DB:DB2

DB:DB2:JDBC-OF
DB:DB2:XML-QUERY-OF
DB:DB2:CONNECT-DOS
DB:DB2:IBM-DAS-BOF
DB:DB2:DB2-DOS
DB:DB2:INVALID-DATA-STREAM-DOS
DB:DB2:SQL-REPEAT-OF
DB:DB2:HS-DOS

DB:IB

DB:IB:CONNECT-BOF
DB:IB:BORLAND-INTERBASE-BOF

DB:MS-SQL

DB:MS-SQL:SQLMON-EMPTY-PKT
DB:MS-SQL:SQLMON-PING-DOS
DB:MS-SQL:PREAUTH-OVERFLOW
DB:MS-SQL:SQLMON-MDAC-OFLOW
DB:MS-SQL:MSSQL-LGN-BRUTE-FORCE
DB:MS-SQL:NULL-PSWRD
DB:MS-SQL:SQLMON-HEAP-OFLOW
DB:MS-SQL:SQLMON-MALFORM-DOS
DB:MS-SQL:SQLMON-STACK-OFLOW
DB:MS-SQL:COMMAND-BO
DB:MS-SQL:PWD-CHANGE
DB:MS-SQL:XP_CMDSHELL-SMB
DB:MS-SQL:XP_CMDSHELL-TDS
DB:MS-SQL:XP-DIRTREE1
DB:MS-SQL:USER-ADD
DB:MS-SQL:LOGIN-FAILURE
DB:MS-SQL:X-RAY-SCANNER
DB:MS-SQL:SA-LOGIN
DB:MS-SQL:WINCC-DEFAULT-PASS
DB:MS-SQL:DOS1
DB:MS-SQL:REPLWRITETIVARBIN-DB
DB:MS-SQL:TDS-FRAG-FLOOD
DB:MS-SQL:CONVERT-OF
DB:MS-SQL:STOR-PROC-PRIV-UPGRD
DB:MS-SQL:2000-SP_START_JOB
DB:MS-SQL:INSERT-CMD-BOF
DB:MS-SQL:HELLO-OF
DB:MS-SQL:PWD-ENCRYPT
DB:MS-SQL:TDS-FRAG-LEN-ZERO
DB:MS-SQL:MAL-INSERT
DB:MS-SQL:TDI-OVERFLOW

DB:MYSQL

DB:MYSQL:LOGIN-NO-PSWD
DB:MYSQL:LOGIN-OVERLONG-USER
DB:MYSQL:LOGIN-OVERLONG-PSWD
DB:MYSQL:LOGIN-NO-USER
DB:MYSQL:SHORT-MSG
DB:MYSQL:AUTHENTICATION-BYPASS
DB:MYSQL:MAXDB-WEBDAV-OF
DB:MYSQL:MYSQL-DATE-FS
DB:MYSQL:MYSQL-PFIELD-TYPE
DB:MYSQL:ROOT-USER
DB:MYSQL:LOGIN-FAILED
DB:MYSQL:MYSQL-LDAP-DOS
DB:MYSQL:SINGLE-ROW-DOS
DB:MYSQL:SELECT-SUB-DOS
DB:MYSQL:YASSL-HELLO-BO
DB:MYSQL:MYSQL-IFDOS
DB:MYSQL:MS-DOS-NAMES-DOS
DB:MYSQL:COMMANDS-BO
DB:MYSQL:LOGIN-INFO-DISCLOSURE
DB:MYSQL:MYSQL-PASSWORD-OF
DB:MYSQL:BENCHMARK-DOS
DB:MYSQL:LONG-FUNC
DB:MYSQL:UPDATEXML-DOS
DB:MYSQL:WIN-RCE
DB:MYSQL:WINDOWS-REMOTE-ROOT
DB:MYSQL:MOF-EXEC
DB:MYSQL:FS-REQUEST
DB:MYSQL:COM-FIELD-LIST-BO
DB:MYSQL:PROC-ANALYSE-DOS
DB:MYSQL:IN-NULL-ARG-DOS
DB:MYSQL:EXTRACT-VAL-RCE
DB:MYSQL:SSL-OF
DB:MYSQL:UNIQ-SET-COL-JOIN-DOS
DB:MYSQL:GRANT-FILE-BO
DB:MYSQL:MAXDB-CMD
DB:MYSQL:ORACLE-XPATH-DOS
DB:MYSQL:COMTABLEDUMP-OF
DB:MYSQL:MAXDB-WEB-OF
DB:MYSQL:MAXDB-GET-OF
DB:MYSQL:CLIENT-BOF
DB:MYSQL:GEOMETRY-INT-OVF
DB:MYSQL:BRUTE-FORCE
DB:MYSQL:CREATE-FUNCTION
DB:MYSQL:MYSQL-USE-DOS
DB:MYSQL:CREATE-TABLE
DB:MYSQL:USER-ENUMERATION
DB:MYSQL:UPDATEXML
DB:MYSQL:ZERO-LEN-PW
DB:MYSQL:AUTH-BYPASS
DB:MYSQL:MAXDB-SERVER-OF

DB:ORACLE

DB:ORACLE:VULN-VER-10.1.0.1
DB:ORACLE:VULN-VER-9.2.0.4
DB:ORACLE:PITRIG-TRUNC-DROP
DB:ORACLE:APPDET-CONNECT
DB:ORACLE:USERNAME-DUMP
DB:ORACLE:REPORTS-XML-DISC
DB:ORACLE:DECLARE-EXEC
DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO
DB:ORACLE:AS-EMCHARTBEAN-TRAV
DB:ORACLE:DBMS-ASSERT
DB:ORACLE:WAREHOUSE-BUILDER
DB:ORACLE:INSECURE-TNS-LISTENER
DB:ORACLE:WORKSPACE-MGR-INJ
DB:ORACLE:TIMES-TEN-HTTP-DOS
DB:ORACLE:OSB-NDMP-OF
DB:ORACLE:EVTDUMP
DB:ORACLE:WEBLOGIC-SERVER
DB:ORACLE:XDB-PITRIG-SQLINJ
DB:ORACLE:INVALID-LOGIN
DB:ORACLE:LINK-BOF
DB:ORACLE:METAFILE-PARSER-DOS
DB:ORACLE:CREATE_TABLES-INJ
DB:ORACLE:XML-SCHEMA-OF
DB:ORACLE:SEARCH-P-GROUPS
DB:ORACLE:EMANAGEMENT-BOF
DB:ORACLE:ODCITABLESTART-OF
DB:ORACLE:SDO_CS-TRANS-OF
DB:ORACLE:GRANT-TYPE-ACCESS-INJ
DB:ORACLE:SDO-CODE-AUTH-BYPASS
DB:ORACLE:SDO_TOPO_DROP_FTBL
DB:ORACLE:FUSION-XLS-IO
DB:ORACLE:CREATE-VIEW
DB:ORACLE:ORACLE-DSI
DB:ORACLE:ROLLBACKWORKSPACE
DB:ORACLE:LOGIN-BYPASS
DB:ORACLE:COMPILER-ACL
DB:ORACLE:XDB-DROPMETADATA
DB:ORACLE:EXP-APP-WEBCACHE
DB:ORACLE:DBMS-CDC-PUBLISH-INJ
DB:ORACLE:SQL-PLUS-LOAD-UIX
DB:ORACLE:ORACLE-SQL-BOF
DB:ORACLE:STRCONV-BOF
DB:ORACLE:LOGIN-CMD-INJ

DB:ORACLE:DBMS

DB:ORACLE:DBMS:OPMN-LOG-FMT-STR
DB:ORACLE:DBMS:VAL-REMOTE-INJ
DB:ORACLE:DBMS:JVM-EXP-PERMS
DB:ORACLE:DBMS:AQELM-OF
DB:ORACLE:DBMS:CDC-AQJM-UNSAFE
DB:ORACLE:DBMS:EXPORT-EXTENSION
DB:ORACLE:DBMS:CORE-DOS
DB:ORACLE:DBMS:JVM-SYS-CMD
DB:ORACLE:DBMS:METADATA-UNSAFE
DB:ORACLE:DBMS:OUTPUT-TO-JAVA
DB:ORACLE:DBMS:EXPORT-EXTN2
DB:ORACLE:DBMS:SUB_NAME-SQL-INJ
DB:ORACLE:DBMS:EXPORT-PRIV
DB:ORACLE:DBMS:EXP-EXT-UNSAFE

DB:ORACLE:PASSWD

DB:ORACLE:PASSWD:JONES
DB:ORACLE:PASSWD:ORDPLUGINS
DB:ORACLE:PASSWD:SYS
DB:ORACLE:PASSWD:ADAMS
DB:ORACLE:PASSWD:ORDSYS
DB:ORACLE:PASSWD:TRACESVR
DB:ORACLE:PASSWD:CTXSYS
DB:ORACLE:PASSWD:SYSTEM
DB:ORACLE:PASSWD:SCOTT
DB:ORACLE:PASSWD:CLARK
DB:ORACLE:PASSWD:BLAKE
DB:ORACLE:PASSWD:OUTLN
DB:ORACLE:PASSWD:ORDCOMMON
DB:ORACLE:PASSWD:AURORA
DB:ORACLE:PASSWD:MDSYS
DB:ORACLE:PASSWD:DBSNMP

DB:ORACLE:SYS

DB:ORACLE:SYS:LT-FINDRICSET
DB:ORACLE:SYS:MDSYS-SDO-LRS
DB:ORACLE:SYS:LT-WORKSPACE
DB:ORACLE:SYS:LPXFSMSAX-NAME-BO
DB:ORACLE:SYS:KUPW-WORKER
DB:ORACLE:SYS:KUPVFT-UNSAFE
DB:ORACLE:SYS:PBSDE-INIT-OF

DB:ORACLE:TNS

DB:ORACLE:TNS:OVERFLOW_MSG
DB:ORACLE:TNS:MALFORMED-IP
DB:ORACLE:TNS:MALFORMED-PORT
DB:ORACLE:TNS:UNK-COMMAND
DB:ORACLE:TNS:SHORT_MSG
DB:ORACLE:TNS:RDBMS-DOS
DB:ORACLE:TNS:INTERMEDIA-DOS
DB:ORACLE:TNS:DBMS-OF
DB:ORACLE:TNS:LOOP-DOS
DB:ORACLE:TNS:ORACLE-PRIVESC
DB:ORACLE:TNS:DOS
DB:ORACLE:TNS:OF
DB:ORACLE:TNS:BEQ-BYPASS
DB:ORACLE:TNS:ACC-CONTROL-BP
DB:ORACLE:TNS:SERVICE-AUTH
DB:ORACLE:TNS:UNSAFE-CMD
DB:ORACLE:TNS:AUTH-SESSKEY-OF-2
DB:ORACLE:TNS:INTERMEDIA-DOS-1
DB:ORACLE:TNS:CMD-EXEC
DB:ORACLE:TNS:TABLEFUNC-ASOWN
DB:ORACLE:TNS:AUTH-SESSKEY
DB:ORACLE:TNS:AUTH-SESSKEY-OF-1
DB:ORACLE:TNS:SERVICE-NAME-OF
DB:ORACLE:TNS:TRACE-OF

DB:POSTGRESQL

DB:POSTGRESQL:SET-ROLE-BYPASS
DB:POSTGRESQL:LINUX-DBLINK-RCE
DB:POSTGRESQL:POSTGRE-DBSEC-BP
DB:POSTGRESQL:DBA-AUTH-BYPASS
DB:POSTGRESQL:SUBSTRING-OF
DB:POSTGRESQL:DATETIME-BO-1
DB:POSTGRESQL:CACHEW-OF
DB:POSTGRESQL:DATETIME-BO
DB:POSTGRESQL:DBNAME-CLIFLAGINJ
DB:POSTGRESQL:GEO-OPS-PATH-IN

DB:SYBASE

DB:SYBASE:OPEN-SERVER-CE
DB:SYBASE:OPEN-SERVER-MC
DB:SYBASE:MOBILINK-BO

DDOS

DDOS:LOIC-ANONYMOUS-HTTP
DDOS:JAVALOIC-TWITTER
DDOS:HOIC-HTTP-METHOD
DDOS:LOIC-TCP-METHOD
DDOS:LOIC-UDP-METHOD
DDOS:DIRTJUMPER
DDOS:LONGCAT
DDOS:LOIC-HTTP-METHOD
DDOS:JAVALOIC-TCP-METHOD
DDOS:LOIC-WEB
DDOS:JAVALOIC-UDP-METHOD

DDOS:SHAFT

DDOS:SHAFT:AGENT-TO-HANDLER
DDOS:SHAFT:HANDLER-TO-AGENT
DDOS:SHAFT:CLIENT-TO-HANDLER
DDOS:SHAFT:AGENT-TO-HANDLER-PKT

DDOS:TRIN00

DDOS:TRIN00:DAEMON-CMD-SHI
DDOS:TRIN00:DAEMON-CMD-XYZ
DDOS:TRIN00:MASTER-CMD-MSIZE
DDOS:TRIN00:DAEMON-CMD
DDOS:TRIN00:MASTERPW-DEFLT-WIN
DDOS:TRIN00:MASTERPW-DEF-STRTUP
DDOS:TRIN00:MASTER-CMD-DOS
DDOS:TRIN00:MASTERPW-DEF-KDIE
DDOS:TRIN00:MASTERPW-DEF-REMOTE
DDOS:TRIN00:MASTER-CMD-MDIE
DDOS:TRIN00:DAEMON-TO-MASTER-1
DDOS:TRIN00:MASTER-CMD-MPING
DDOS:TRIN00:DAEMON-TO-MSTR2-PKT
DDOS:TRIN00:MASTER-PROMPT
DDOS:TRIN00:DAEMON-TO-MSTR1-PKT
DDOS:TRIN00:MASTER-CMD-MDOS
DDOS:TRIN00:DAEMON-TO-MASTER-2
DDOS:TRIN00:MASTER-CMD-KILLDEAD

DDOS:TRINITY

DDOS:TRINITY:DEFAULT-PW

DHCP

DHCP:ISC-ZERO-LEN-DOS

DHCP:AUDIT

DHCP:AUDIT:CLI-HWADDR-NOT-T2
DHCP:AUDIT:CLI-HW-MISMATCH
DHCP:AUDIT:INV-SVR-SRC-PORT
DHCP:AUDIT:UNK-OPCODE
DHCP:AUDIT:BOOT-FNAME-NOT-T2
DHCP:AUDIT:UNK-HW-TYPE
DHCP:AUDIT:INV-CLI-SRC-PORT
DHCP:AUDIT:SVRNAME-NOT-T2
DHCP:AUDIT:MISS-MAGIC-COOKIE

DHCP:ERROR

DHCP:ERROR:INV-MAGIC-COOKIE
DHCP:ERROR:INV-MSG-TYPE
DHCP:ERROR:INV-HW-LEN

DHCP:EXPLOIT

DHCP:EXPLOIT:MSG-TOO-SHORT
DHCP:EXPLOIT:SOLARIS-EXEC
DHCP:EXPLOIT:HOSTNAME-HTML

DHCP:OPT

DHCP:OPT:TCP-DEF-TTL-ZERO
DHCP:OPT:BAD-HOSTNAME
DHCP:OPT:IFMTU-TOO-SMALL
DHCP:OPT:LEASE-TIME-ZERO
DHCP:OPT:MAX-MSG-SIZE-2-SMALL
DHCP:OPT:DEF-TTL-ZERO
DHCP:OPT:MAX-DGM-SZ-2-SMALL
DHCP:OPT:INV-OPT-VAL
DHCP:OPT:INV-NB-NODE-TYPE
DHCP:OPT:MISSING-EOO
DHCP:OPT:INV-OPT-LEN
DHCP:OPT:LOG-BUF-OVERFLOW
DHCP:OPT:ISC-DHCPD-MMS-DOS
DHCP:OPT:MS-OPT-OF
DHCP:OPT:DHCPD-PKT-SIZE-BO

DHCP:RQST

DHCP:RQST:ISC-DOS

DHCP:SERVER

DHCP:SERVER:FMT-STR
DHCP:SERVER:ISC-FORMAT-STRING
DHCP:SERVER:ISC-CMD-INJ
DHCP:SERVER:ISC-DUID-BO
DHCP:SERVER:ISC-PACKET-PRO-DOS
DHCP:SERVER:ISC-DHCPD-BO
DHCP:SERVER:ISC-PACKET-DOS
DHCP:SERVER:ISC-DHCLIENT-BOF-1
DHCP:SERVER:GNU-BASH-CMD-EXE
DHCP:SERVER:ISC-PACKET-DOS-1
DHCP:SERVER:ISC-MAL-CLID
DHCP:SERVER:ISC-DHCLIENT-BOF
DHCP:SERVER:ISC-DISCOVER-DOS

DISCARD

DISCARD:TRAFFIC

DISCARD:EXPLOIT

DISCARD:EXPLOIT:UNEXPECTED-REP

DISCARD:INFO

DISCARD:INFO:ASCEND-DISCARD

DNS

DNS:TOO-MANY-ERRORS
DNS:ISC-INSIST-DOS
DNS:ISC-BIND-DOS
DNS:PDNS-AUTHSERV-DOS
DNS:POWERDNS-NAMESRVR-UDP-DOS
DNS:WPADREG
DNS:BIND-DELEGATION-HANDLNG-DOS
DNS:SAMBA-DNS-REPLY-FLAG-DOS
DNS:BIND-RRSIG-DOS-2
DNS:BIND-RRSIG-DOS
DNS:TRAFFIC-TCP
DNS:TRAFFIC-UDP
DNS:ISC-BIND-PACKAGE-DOS
DNS:NGINX-RESOLVER-DOS
DNS:BIND-DBC-ASSERT-DOS
DNS:BIND9-ASSERT-DOS
DNS:RRSIG-QUERY
DNS:BIND-NXT-OVERFLOW2
DNS:CRAFTED-MX
DNS:ISC-BIND-EDNS-OPT-DOS
DNS:BIND-RRSIG-QUERY-DOS
DNS:PHP-PARSERR-HEAP-BO
DNS:REQUEST-RRTYPE-ANY
DNS:SQUID-DNS-RESPONSE-SPOOF
DNS:RESP-SPOOF
DNS:RESOLVER-BO
DNS:NEGANY
DNS:MICROSOFT-DNS-DOS
DNS:ISC-BIND-REGEX-DOS
DNS:SQUID-DNS-DOS
DNS:WORDPRESS-SOAK-SOAK-MALWARE
DNS:SYMANTEC-DNS-RESPONSE-DOS
DNS:ISC-BIND9-DOS
DNS:ISC-BIND-RRSIG-DOS
DNS:SYMANTEC-CACHE-POIS
DNS:ISC-BIND-TKEY-DOS
DNS:MUL-VEND-TXT-BOF
DNS:BIND-NXT-OVERFLOW4
DNS:BIND-NXT-OVERFLOW1
DNS:BIND-NXT-OVERFLOW3
DNS:MS-FOREFRONT-RCE
DNS:POWERDNS-NAMSRVR-TCP-DOS
DNS:SQUID-DNS-DOS-1
DNS:MS-ISA-CE
DNS:MS-ANY-QUERY-SPOOFING
DNS:ISATAPREG
DNS:MAILENABLE-SPF
DNS:DYNAMICUPDATE
DNS:GNUTLS-DANE-BOF
DNS:ISC-BIND-DNSSEC-DOS
DNS:SYMANTEC-DNS-POISIONING

DNS:AUDIT

DNS:AUDIT:OPT-NMB-EXCEEDED
DNS:AUDIT:REP-S2C-QUERY
DNS:AUDIT:CLASS-UNKNOWN
DNS:AUDIT:INVALID-Z
DNS:AUDIT:TYPE-UNKNOWN
DNS:AUDIT:RCODE-REFUSED
DNS:AUDIT:RCODE-FORMAT-ERROR
DNS:AUDIT:QCLASS-UNEXP
DNS:AUDIT:TYPE-OBSOLETE
DNS:AUDIT:TYPE-ALL
DNS:AUDIT:TYPE-EXPERIMENTAL
DNS:AUDIT:RCODE-NAME-ERROR
DNS:AUDIT:TYPE-NON-1035
DNS:AUDIT:REQ-ANSWERS-IN-QUERY
DNS:AUDIT:REQ-C2S-RESPONSE
DNS:AUDIT:REQ-INVALID-HDR-RA
DNS:AUDIT:INVALID-RCODE
DNS:AUDIT:CLASS-NON-IN
DNS:AUDIT:REP-QTYPE-UNEXPECTED
DNS:AUDIT:MISMATCHING-AN-CNAME
DNS:AUDIT:REP-MISMATCHING-AN
DNS:AUDIT:RCODE-NOT-IMPL
DNS:AUDIT:REP-MISMATCHING-QD
DNS:AUDIT:AAAA-RR
DNS:AUDIT:Z-RESERVED-OPT
DNS:AUDIT:UNASSIGNED-OPCODE

DNS:EXPLOIT

DNS:EXPLOIT:PNTRS-PERNAME-EXCD
DNS:EXPLOIT:EMPTY-UDP-MSG
DNS:EXPLOIT:REQUEST-SHORT-MSG
DNS:EXPLOIT:EXPLOIT-BIND9-RT
DNS:EXPLOIT:POINTER-LOOP
DNS:EXPLOIT:TRANSPOOF-2
DNS:EXPLOIT:BIND-ADDSOA
DNS:EXPLOIT:BIND-KEYPARSE-DOS
DNS:EXPLOIT:ISC-BIND-DNS64-RPZ
DNS:EXPLOIT:MAL-TXT-REC
DNS:EXPLOIT:ISC-BIND-RDATA-DOS
DNS:EXPLOIT:BIND-MULT-RRSET
DNS:EXPLOIT:BIND-MULT-RRSET2
DNS:EXPLOIT:BIND-OPENPGPKEY-DOS
DNS:EXPLOIT:LIBCVE-2015-7547BO2
DNS:EXPLOIT:CLIBCVE-2015-7547BO
DNS:EXPLOIT:SQUID-PROXY-PTR-DOS
DNS:EXPLOIT:SQUID-PROXY-DOS

DNS:FAILURE

DNS:FAILURE:RCODE_NOTZONE
DNS:FAILURE:RCODE_NOTAUTH

DNS:HEADERERROR

DNS:HEADERERROR:INVALID-OPCODE

DNS:INFO

DNS:INFO:RCODE-SERVER-FAILURE
DNS:INFO:TYPE-AXFR
DNS:INFO:OVERSIZED_ADV_PAYLOAD
DNS:INFO:RCODE-BADVERS
DNS:INFO:XFER-BAD
DNS:INFO:XFER-GOOD

DNS:OVERFLOW

DNS:OVERFLOW:TOO-LONG-TCP-MSG
DNS:OVERFLOW:INVALID-POINTER
DNS:OVERFLOW:NAME-TOO-LONG
DNS:OVERFLOW:OPT-OVERFLOW
DNS:OVERFLOW:NXT-OVERFLOW
DNS:OVERFLOW:INVALID-LABEL-LEN
DNS:OVERFLOW:SIG-OVERFLOW
DNS:OVERFLOW:OPT-DOS
DNS:OVERFLOW:SPARC-TCP
DNS:OVERFLOW:SCO-NAMED2-OF1
DNS:OVERFLOW:TXTRECORD-1
DNS:OVERFLOW:SCO-NAMED2-OF2
DNS:OVERFLOW:NOOP-RQUERY
DNS:OVERFLOW:HOSTNAME-OF
DNS:OVERFLOW:GNU-C-GLIBC
DNS:OVERFLOW:EXIM-DECODE-BO2
DNS:OVERFLOW:TFTPD32
DNS:OVERFLOW:TXTRECORD
DNS:OVERFLOW:TRANSPOOF-3
DNS:OVERFLOW:TCP-RESPONSE
DNS:OVERFLOW:SYMANTEC-CNAME
DNS:OVERFLOW:ADM-TCP
DNS:OVERFLOW:SYMNTEC-CNAME
DNS:OVERFLOW:BAD-CHAR-UDP
DNS:OVERFLOW:DNS-ATMA-SIZE-OF

DNS:QUERY

DNS:QUERY:VERSION-QUERY
DNS:QUERY:NULL-QUERY
DNS:QUERY:BIND-IQUERY-BO
DNS:QUERY:HOSTNAME
DNS:QUERY:AUTHORS
DNS:QUERY:ISC-BIND-NSEC3-DOS
DNS:QUERY:WIN-DNS-SERVER-SPOOF
DNS:QUERY:ENC-STATUS-SPOOF
DNS:QUERY:SYMC-DNS-CACHE

DNS:REPERR

DNS:REPERR:NAPRT-IOF
DNS:REPERR:NULL-RDATA-LEN

DNS:REQUEST

DNS:REQUEST:SUN-JRE-DOS

DNS:TUNNEL

DNS:TUNNEL:NULL-RECORD
DNS:TUNNEL:IODINE
DNS:TUNNEL:DNS2TCP
DNS:TUNNEL:OZYMANDNS
DNS:TUNNEL:I2P-DNS-QUERY
DNS:TUNNEL:SHORT-TTL

DOS

DOS:EMULE-DOS
DOS:LINUX-COOKIE-ECHO-DOS
DOS:FREEBSD-ROUTED-DAEMON
DOS:SLOWHTTPTEST-TOOL
DOS:MULTIVENDOR-TCP-TIMESTAMP
DOS:UPNP-CHARGEN-DOS
DOS:DELL-NETVAULT-DOS

DOS:APPLICATION

DOS:APPLICATION:DOS
DOS:APPLICATION:MS-HIS-UDP
DOS:APPLICATION:MS-HIS-TCP

DOS:IP

DOS:IP:LINUX-KERNEL-OOTB
DOS:IP:LINUX-KERNEL-NF-DOS
DOS:IP:LINUX-DCCP-DOS
DOS:IP:LINUX-CHUNKINIT-DOS
DOS:IP:LIN-KERNEL-SKACK-DOS
DOS:IP:ASCONF-CHUNK-PARSE
DOS:IP:PGM
DOS:IP:IGMP-OVERSIZE
DOS:IP:CISCO-IOS-NHRP
DOS:IP:FRAGMENT
DOS:IP:LINUX-CHUNKINIT-DOS-1
DOS:IP:LINUX-KERNEL-INIT
DOS:IP:IGMP-LINUX
DOS:IP:CHARGEN-BOMB

DOS:NETDEV

DOS:NETDEV:LINKSYS-GOZILA-DOS2
DOS:NETDEV:HP-LCD-MOD-9001
DOS:NETDEV:WEBJET-FW-INFOLEAK
DOS:NETDEV:WEBJET-HTS-DOT
DOS:NETDEV:WEBJET-WRITETOFILE
DOS:NETDEV:LINKSYS-GOZILA-DOS3
DOS:NETDEV:CISCO-SYSLOG-DOS
DOS:NETDEV:ASCEND-KILL2
DOS:NETDEV:CISCO-HTTPD-DOS
DOS:NETDEV:D-LINK-DNS-320
DOS:NETDEV:NORTEL-MARLIN
DOS:NETDEV:CATALYST-SSH-DOS
DOS:NETDEV:NETWORK-3COM-DOS
DOS:NETDEV:ASCEND-KILL
DOS:NETDEV:LIVINGSTON
DOS:NETDEV:CISCO-5000
DOS:NETDEV:HP-LCD-MOD-9100
DOS:NETDEV:CISCO-TELNET-BOF1
DOS:NETDEV:CISCO-IPMOBILITY
DOS:NETDEV:CISCO-SWIPE
DOS:NETDEV:CISCO-SUNND
DOS:NETDEV:ROUTEFINDER-VPN-DOS
DOS:NETDEV:CISCO-PIM

DOS:WINDOWS

DOS:WINDOWS:MS-RDP-PATTERN-DOS
DOS:WINDOWS:HTTP-SYS
DOS:WINDOWS:WINNUKE-NETBIOS
DOS:WINDOWS:ISCSI-TARGET

ECHO

ECHO:CHARGEN-DOS

ECHO:AUDIT

ECHO:AUDIT:LINE

ECHO:EXPLOIT

ECHO:EXPLOIT:SERVER-NO-RESPONSE
ECHO:EXPLOIT:MISMATCHING-REPLY

FINGER:AUDIT

FINGER:AUDIT:REQ-WRONG-FORMAT

FINGER:BACKDOOR

FINGER:BACKDOOR:CMD-ROOTSH

FINGER:DOS

FINGER:DOS:BOMB

FINGER:EXPLOIT

FINGER:EXPLOIT:REDIRECTION
FINGER:EXPLOIT:NULL-BYTE
FINGER:EXPLOIT:DOT-AT-HOST
FINGER:EXPLOIT:ACCOUNT-ENUM
FINGER:EXPLOIT:ZERO-AT-HOST
FINGER:EXPLOIT:PIPE

FINGER:OVERFLOW

FINGER:OVERFLOW:LINE

FINGER:REPLYERROR

FINGER:REPLYERROR:BIN-DATA

FINGER:REQERR

FINGER:REQERR:UNEXP-LINE
FINGER:REQERR:REQ-BINARY-DATA
FINGER:REQERR:BIN-HOST

FINGER:USER

FINGER:USER:SLASH-FILE
FINGER:USER:ROOT
FINGER:USER:SEARCH

FTP

FTP:VSFTPD-BACKDOOR
FTP:CISCO-VPN-ACCESS
FTP:CURL-OF-BANNER
FTP:FORMAT-STRING-IN-CMD
FTP:FREEFLOAT-CMD-BO
FTP:PHP-FILE-UPLOAD
FTP:SYMLINKS-WGET-INPT-VALID
FTP:SHELLSHOCK
FTP:TRIPWIRE-FORMAT-STRING

FTP:AUDIT

FTP:AUDIT:REP-NESTED-REPLY
FTP:AUDIT:REQ-NESTED-REQUEST
FTP:AUDIT:REQ-UNKNOWN-CMD
FTP:AUDIT:LOGIN-FAILED
FTP:AUDIT:REQ-INVALID-CMD-SEQ
FTP:AUDIT:REP-INVALID-REPLY
FTP:AUDIT:COMMAND-FAILED
FTP:AUDIT:REP-BINARY-DATA
FTP:AUDIT:REQ-BINARY-DATA
FTP:AUDIT:BINARY-DATA-FOLDER

FTP:COMMAND

FTP:COMMAND:FTP-FS-COMMAND
FTP:COMMAND:PLATFTP-CD-DOS
FTP:COMMAND:3CDAEMON-PATH-DISCL
FTP:COMMAND:WS-FTP-REST
FTP:COMMAND:SYMLINK
FTP:COMMAND:GET-CMD-DIR-TRAV
FTP:COMMAND:SLIMFTP-LIST
FTP:COMMAND:SITE-CMD-INJ
FTP:COMMAND:GET-CMD-DIR-TRAV-2
FTP:COMMAND:PUT-CMD-DIR-TRAV
FTP:COMMAND:VICFTPS-DOS
FTP:COMMAND:CTRL-CHAR
FTP:COMMAND:MULTIPLE-CMD-DIRTRA
FTP:COMMAND:WINFTP-LIST-CMD-BO
FTP:COMMAND:MALICIOUS-CHARS
FTP:COMMAND:STOR-RHOSTS
FTP:COMMAND:SITE-EXEC
FTP:COMMAND:MULTIPLE-OF
FTP:COMMAND:WS_FTP-CMD-BO

FTP:DIRECTORY

FTP:DIRECTORY:FTP-REQ-DIR-TRAV
FTP:DIRECTORY:DOT-DOT
FTP:DIRECTORY:DOT-PCT-20-DOT
FTP:DIRECTORY:CISCOFTP-OF
FTP:DIRECTORY:TILDE-ROOT

FTP:DOS

FTP:DOS:NULL-CRED
FTP:DOS:FTPDMIN-LIST-CMD
FTP:DOS:VSFTPD-CONNECTION
FTP:DOS:GOOGLE-CHROME-DOS
FTP:DOS:MACOSX-FTPD
FTP:DOS:MUL-FTP-DOS
FTP:DOS:VSFTPD-STAT
FTP:DOS:MS-IIS-WILDCARD
FTP:DOS:GEN-GLOB-DOS
FTP:DOS:XM-NLST-NEG

FTP:EXPLOIT

FTP:EXPLOIT:ILLEGAL-PORT
FTP:EXPLOIT:BOUNCE-ATTACK
FTP:EXPLOIT:SYNTAX-ERROR
FTP:EXPLOIT:WIN32-WFTPD-BOF
FTP:EXPLOIT:GLFTPD-KAKAKA
FTP:EXPLOIT:TYPSOFT-DOS
FTP:EXPLOIT:OPENFTPD-MSG-FS
FTP:EXPLOIT:WSFTP-FMT-STR
FTP:EXPLOIT:VERMILLION-PORT-OF
FTP:EXPLOIT:MOD-INCLUDE-BOF
FTP:EXPLOIT:LEAPFTP-CLI-BO
FTP:EXPLOIT:FTPBIN-WRITEABLE
FTP:EXPLOIT:CA-FTP-LIST-PASV
FTP:EXPLOIT:ZYXEL-CONF-GET

FTP:EXT

FTP:EXT:DOT-PDF
FTP:EXT:DOT-EXEC

FTP:FILE

FTP:FILE:SPACE.ASP
FTP:FILE:STOR
FTP:FILE:RETR
FTP:FILE:FREEFLOAT-AUTH-BYPASS

FTP:LUKEMFTP

FTP:LUKEMFTP:URG-RELOGIN

FTP:MS-FTP

FTP:MS-FTP:IIS7-5-DOS
FTP:MS-FTP:MSFTPSVC-DOS
FTP:MS-FTP:MSFTPSVC-EXEC
FTP:MS-FTP:IIS-BOF
FTP:MS-FTP:MSFTPSVC-DOS-1
FTP:MS-FTP:STAT-GLOB

FTP:OVERFLOW

FTP:OVERFLOW:SITESTRING-2-LONG
FTP:OVERFLOW:LINE-TOO-LONG
FTP:OVERFLOW:USERNAME-2-LONG
FTP:OVERFLOW:PASS-TOO-LONG
FTP:OVERFLOW:PATH-TOO-LONG
FTP:OVERFLOW:GUILDFTP-HEAP
FTP:OVERFLOW:K4FTP-OF1
FTP:OVERFLOW:WFTPD-SIZE
FTP:OVERFLOW:PCMAN-STOR-BOF
FTP:OVERFLOW:S2C-PATH-OF
FTP:OVERFLOW:FREEFLOAT-MULTICMD
FTP:OVERFLOW:EASY-FTP-OF
FTP:OVERFLOW:FREE-FTPD-PASS
FTP:OVERFLOW:REST-INT-OF
FTP:OVERFLOW:MS-IE-FTP-RES-MC
FTP:OVERFLOW:CMD-NOOP-SLED
FTP:OVERFLOW:WINFTP-DATA-OF
FTP:OVERFLOW:MUL-FTP-MKDOF
FTP:OVERFLOW:ASCII-WRITE
FTP:OVERFLOW:CMD-OF
FTP:OVERFLOW:OPENBSD-FTPD-GLOB
FTP:OVERFLOW:TYPSOFT-SERVER
FTP:OVERFLOW:SAMI-LIST-CMND-BO
FTP:OVERFLOW:UPLUS-MULTI-CMDS
FTP:OVERFLOW:PATH-LINUX-X86-3
FTP:OVERFLOW:WUBSD-SE-RACE
FTP:OVERFLOW:XLINK-CLIENT
FTP:OVERFLOW:WFTPD-MKD-OVERFLOW

FTP:PABLO-FTP

FTP:PABLO-FTP:FORMAT-STRING

FTP:PASSWORD

FTP:PASSWORD:BRUTE-FORCE
FTP:PASSWORD:H0TB0X
FTP:PASSWORD:WH00T
FTP:PASSWORD:PLUS
FTP:PASSWORD:SATORI
FTP:PASSWORD:ROOT
FTP:PASSWORD:LRKR0X
FTP:PASSWORD:COMMON-PASSWD
FTP:PASSWORD:USER-DICT
FTP:PASSWORD:DEFAULT-USERNM-PW
FTP:PASSWORD:FTPPASS-BLUESKIES

FTP:PROFTP

FTP:PROFTP:SIZE-DOS2
FTP:PROFTP:REMOTE-FILE-COPY
FTP:PROFTP:USER-DOS
FTP:PROFTP:OFF-BY-ONE
FTP:PROFTP:MOD-SQL-HEAP-OF
FTP:PROFTP:PROFTP-FS-MKDIR
FTP:PROFTP:PPC-FS2
FTP:PROFTP:OVERFLOW1

FTP:REQERR

FTP:REQERR:REQ-MISSING-ARGS
FTP:REQERR:REQ-TOO-MANY-ARGS
FTP:REQERR:GNULS-WIDTH-DOS

FTP:RPLERR

FTP:RPLERR:CUTEFTP-OF

FTP:SERVU

FTP:SERVU:STOU-DOS
FTP:SERVU:CHMOD-OVERFLOW
FTP:SERVU:RNTO-TRAV
FTP:SERVU:LIST-OVERFLOW
FTP:SERVU:MDTM-OVERFLOW

FTP:USER

FTP:USER:FORMAT-STRING
FTP:USER:ACFTP-BAD-LOGIN
FTP:USER:ANONYMOUS
FTP:USER:IRIX-DEF-ACCT
FTP:USER:ROOT
FTP:USER:FREEBSD-OFF-BY-ONE-MC

FTP:VULN

FTP:VULN:SERV-U-FTP-5-0-0-6
FTP:VULN:WS-FTP-4-0-2
FTP:VULN:SERV-U-FTP-2-6
FTP:VULN:SERV-U-FTP-4-2
FTP:VULN:WS-FTP-5-0-4
FTP:VULN:SERVU-FTP-BO

FTP:WS-FTP

FTP:WS-FTP:CPWD
FTP:WS-FTP:WS-FTP-COMM-OF
FTP:WS-FTP:WS-FTP-COMM-OF-1

FTP:WU-FTP

FTP:WU-FTP:SETPROCTITLE
FTP:WU-FTP:SITE-OF
FTP:WU-FTP:IREPLY-FS
FTP:WU-FTP:FTPD-BSD-X86
FTP:WU-FTP:WUFTPD-FMT-STR
FTP:WU-FTP:LINUX-OF
FTP:WU-FTP:OFFBYONE-BOF
FTP:WU-FTP:GLOBARG

GOPHER

GOPHER:IE-GOPHER-OF

GOPHER:INVALID

GOPHER:INVALID:EOL
GOPHER:INVALID:PORT
GOPHER:INVALID:DOC-TYPE
GOPHER:INVALID:NST-REQ
GOPHER:INVALID:TRUNC-LINE

GOPHER:OVERFLOW

GOPHER:OVERFLOW:DISPLAY
GOPHER:OVERFLOW:HOST
GOPHER:OVERFLOW:SELECTOR
GOPHER:OVERFLOW:LINE

HTTP

HTTP:INFO-LEAK-SSN
HTTP:INFO-LEAK-CC
HTTP:TOO-MANY-PARAMETERS
HTTP:SCRIPT-INJ-EXP-99
HTTP:JAVA-RHINO-SCRIPTING
HTTP:JOOMLA-CMS-ACE
HTTP:CVE-2014-6332-EXP-04
HTTP:WECON-LEVISTUDIO-BO
HTTP:EMBEDDED-IFRAME-REDIR
HTTP:SUSP-HDR-REDRCT-EXP-80
HTTP:MAL-REDIRECT-EXP-79
HTTP:EK-ANGLER-URI-STRUCT
HTTP:EK-MUL-SUCCESSFUL-REDIR1
HTTP:WORDPRESS-W3PLUGIN-RCE1
HTTP:INTEGARD-PASSWORD-BOF
HTTP:SCRIPT-INJ-EXP-84
HTTP:RUBYONRAILS-XMLYAML-RCE1
HTTP:LOCALHOST-ON-INTERNET1
HTTP:EK-KAIXIN-LANDING-PAGE1
HTTP:GD-GRAPHICS-PNG1
HTTP:SUSP-HDR-REDRCT-EXP-101
HTTP:SUSP-HDR-REDRCT-EXP-47
HTTP:MALICIOUS-SESSION-COOKIE
HTTP:JAVA-UPDATE-RCE
HTTP:EK-FIESTA-PD
HTTP:SUN-WEBDAV-FD
HTTP:SCRIPT-INJ-EXP-81
HTTP:MAL-REDIRECT-EXP-49
HTTP:TRENDMICRO-CTRLMGR-SQLINJ
HTTP:ISAPI-RSA-WEB
HTTP:SCRIPT-INJ-EXP-48
HTTP:SCRIPT-INJ-EXP-102
HTTP:SUSP-HDR-REDRCT-EXP-59
HTTP:EK-UNKNOWN-SCRIPT-INJ
HTTP:EK-IMPACT-LP
HTTP:PVT-EK-LNDPG4
HTTP:NOVELL-NETIQ-EVAL-POLBYPAS
HTTP:CVE-2015-2442-RCE
HTTP:SUSP-HDR-REDRCT-EXP-50
HTTP:MONGOOSE-HTTPD-URI-OF
HTTP:EK-ZUPONCIC-LP
HTTP:SCRIPT-INJ-EXP-60
HTTP:REMOTE-URL-IN-VAR
HTTP:MAL-REDIRECT-EXP-85
HTTP:GONGDA-EK-LAND-PG2
HTTP:MAL-REDIRECT-EXP-52
HTTP:CVE-2015-2448-RCE
HTTP:SUSP-HDR-REDRCT-EXP-92
HTTP:TELE-EK-DL4
HTTP:SCRIPT-INJ-EXP-51
HTTP:MULTI-EK-PAYLOAD-CALC3
HTTP:EMBED-IFRAMEINJ-TOOL
HTTP:SUSP-HDR-REDRCT-EXP-53
HTTP:MUL-EK-SILVERLIGHT-DL
HTTP:JAVA-UNCOMP-JAR
HTTP:HITMAN-EK-PAYLOAD
HTTP:MUL-EK-PAYLOAD-DL
HTTP:EK-GONGDA-LP
HTTP:EK-ANGLER-LP-1
HTTP:EK-ANGLER-LP
HTTP:EK-ANGLER-LP4
HTTP:NUCLEAR-OUTBOUND-PR
HTTP:BLEEDINGLIFE-EK-OB1
HTTP:COTTONCASTLE-EK-DL
HTTP:CRITX-EK
HTTP:BLEEDINGLIFE-EK-OB
HTTP:EK-ANGLER-FLASH-DOWNLOAD5
HTTP:EK-NUCLEAR-LP3
HTTP:EK-ANGLER-LP5
HTTP:EK-CK-MAL-JS-PACKER
HTTP:EK-SCANBOX-ENUM
HTTP:EK-ANGLER-LP-DETECTED
HTTP:MAGENTO-PAR-AUTH-BYPASS
HTTP:GOON-EK-LP
HTTP:OPENX-AD-SERVER-PHP-CE
HTTP:EK-ANGLER-LP2
HTTP:MAL-REDIRECT-EXP-97
HTTP:MUL-EXPLOIT-KIT-INFO-EXE
HTTP:EK-GONDAD-PLUGIN
HTTP:XDOMAINXML
HTTP:YOUNGZSOFT-MAILCOM-BO
HTTP:WEBDAV-FS
HTTP:NUCLEAR-OUTBOUND-CONN
HTTP:EASYLAN-REG-BOF
HTTP:DFIND-PROBE
HTTP:EK-TOPIC-OUTBOUND-C2
HTTP:MAL-REDIRECT-EXP-103
HTTP:SWEETORANGE-EK-DL
HTTP:SAP-MGT-CON-OSEXEC
HTTP:SUSP-HDR-REDRCT-EXP-86
HTTP:EK-STYX-LP-3
HTTP:NEUTRINO-EK-REDIR
HTTP:EK-DOTKACHEF-ZEROACCESS
HTTP:SCRIPT-INJ-EXP-75
HTTP:HIMAN-EK-DL
HTTP:CVE-2015-2557-RCE
HTTP:CVE-2014-0288-RCE
HTTP:CVE-2014-0287-RCE
HTTP:SAKURA-EK-REDIR
HTTP:EK-MAGNITUDE-IE-REQ
HTTP:X2O-EK-LN-PAGE
HTTP:CVE-2014-1815-RCE
HTTP:SONICWALL-GMS-RCE1
HTTP:CVE-2015-0099-RCE
HTTP:EK-STYX-LP4
HTTP:CVE-2015-0063-RCE
HTTP:CVE-2015-0053-RCE
HTTP:MAL-REDIRECT-EXP-76
HTTP:CVE-2014-6347-RCE
HTTP:EK-FLASHPACK-MAL-DOWNLOAD
HTTP:CVE-2014-6369-RCE
HTTP:EK-CRIMEBOSS-RA
HTTP:EK-BLACKHOLE-V2-LP1
HTTP:EK-CRIMEBOSS-JED
HTTP:CVE-2015-0019-RCE
HTTP:CVE-2015-312-RCE
HTTP:EK-CRIMEBOSS-DA
HTTP:EK-FLASHPACK-JAVA-V6
HTTP:SUSP-HDR-REDRCT-EXP-71
HTTP:EK-CRIMEBOSS-PEXEC
HTTP:MAL-REDIRECT-EXP-70
HTTP:CVE-2015-0081-RCE
HTTP:CVE-2014-2795-RCE
HTTP:CVE-2014-1802-RCE
HTTP:LIGHTSOUT-EK-HDR
HTTP:SKYPE-EZPMUTILS
HTTP:CVE-2014-1795-RCE
HTTP:IFRAME-EK-REDIR5
HTTP:EK-STYX-OUT-CONN
HTTP:IFRAME-EK-REDIR4
HTTP:CVE-2014-4141-RCE
HTTP:CVE-2014-0282-RCE
HTTP:CVE-2014-0283-RCE
HTTP:EK-CRITX-EXECUT-REQ
HTTP:CVE-2015-2513-RCE
HTTP:HELLO-EK-XP
HTTP:IFRAME-EK-REDIR3
HTTP:ASC-TIMETABLES-SUBJECT-BOF
HTTP:EK-STYX-LP
HTTP:LIGHTSOUT-EK-DL
HTTP:EK-CRITX-PR
HTTP:IFRAME-EK-REDIR6
HTTP:SUN-JAVA-SYSTEM-WEBDAV-OF
HTTP:CVE-2011-0033-RCE
HTTP:EK-NUCLEAR-ADOBE-FLASH-1
HTTP:MAILCHIMP-PLUGIN-PHP-CE
HTTP:STATIC-SERVER-BOF
HTTP:SCRIPT-INJ-EXP-93
HTTP:DLINK-CMD-RCE
HTTP:EK-NUCLEAR-ORACLE-JAVA-1
HTTP:G01PACK-EK-REDIR
HTTP:INFINITY-EK-LP1
HTTP:EK-DOTKACHEF-REDIR
HTTP:MAL-URL-REQUEST-2
HTTP:EK-MUL-LP-SS
HTTP:EK-DRIVEBY-DWNLD
HTTP:EK-GLAZUNOV-OUT-JNLP
HTTP:SYMANTEC-EP-POLICY-BYPAS
HTTP:EK-NUCLEAR-OUT-JAR-REQ
HTTP:EK-CRIMEPACK-DR
HTTP:MUL-EK-XOR
HTTP:MULTI-EK-PAYLOAD-CALC
HTTP:X2O-EK-LAND-PG3
HTTP:EK-ELEANORE-PR
HTTP:ANGLER-EK-LP1
HTTP:APPLE-SAFARI-BYPASS
HTTP:INFINITY-EK-PAYLOAD-DL
HTTP:SCRIPT-INJ-EXP-87
HTTP:WIRESHARK-MPEG-BOF1
HTTP:MUL-EK-IFRAME
HTTP:EK-HELLO-LIGHTOUT-LP
HTTP:X2O-EK-LAND-PG
HTTP:MAL-URL-REQUEST-1
HTTP:SUSP-HDR-REDRCT-EXP-77
HTTP:HITMAN-EK-LP-FLASH
HTTP:EK-SAKURA-JAR
HTTP:RANDOMIZATION-ENCODIN4
HTTP:MAL-REDIRECT-EXP-100
HTTP:EK-SAKURA-PDF-DOWN
HTTP:JENKINS-XSTREAM-EXEC
HTTP:MAL-URL-REQUEST-3
HTTP:EK-DOLOMALO
HTTP:EK-SAKURA-LT
HTTP:EK-SWEET-ORANGE-LP4
HTTP:RANDOMIZATION-ENCODIN2
HTTP:HITMAN-EK-POST
HTTP:EK-IFRAMER-INJ-SS
HTTP:STYX-EK-PE-DL
HTTP:SOLARWINDS-AUTH-BYPASS
HTTP:RANDOMIZATION-ENCODIN3
HTTP:APPLE-QUICKTIME-MC
HTTP:FIREFOX-XDOMAIN-INFODISC
HTTP:SAKURA-EK-EXP-DL
HTTP:MULTI-EK-PAYLOAD-CONTACTS2
HTTP:SCRIPT-INJ-EXP-105
HTTP:EK-SAKURA-JAR-DOWN-DET
HTTP:GLAZUNOV-EK-DL
HTTP:SUSP-HDR-REDRCT-EXP-104
HTTP:SAKURA-EK-OUT
HTTP:REGIN-CNC-TRAFFIC
HTTP:TELETUBBIES-EK-2
HTTP:TELETUBBIES-EK2
HTTP:WP-FGALLERY-MAL-FILE-POST
HTTP:SAKURA-EK-PAYLOAD-DL
HTTP:EASYLAN-REG-BOF1
HTTP:EK-ANGLER-JAVA1
HTTP:HP-PRINTER-INFO-DISCLOSUR1
HTTP:CVE-2013-2551-EXP-18
HTTP:MULTI-EK-PAYLOAD-ABOUT5
HTTP:HITMAN-EK-PAYLOAD2
HTTP:EK-MIULT-LP-SS
HTTP:MS-LYNC-SERVER-RCE
HTTP:EK-TELETUBBIES-SEC
HTTP:GOON-EK-EXE
HTTP:SYBASE-AGSOAP-EXE-BOF
HTTP:EK-CRITX-JAVA-REQ
HTTP:EK-CRITX-REDIRECT
HTTP:CVE-2014-6332-RCE
HTTP:GOON-EK-LP1
HTTP:CVE-2015-0085-RCE
HTTP:DOURAN-ARB-FILE-DL
HTTP:SPL2-EK-LP
HTTP:MONKEY-HTTPD-BO
HTTP:ORACLE-JRE-INSECURE-LOAD
HTTP:SPL2-EK-DL
HTTP:MICROSOFT-ASPNET-POST-DOS
HTTP:OFFICESCAN-CGIRECVFILE
HTTP:CVE-2013-2551-RCE
HTTP:ADVANTECH-DASHBRD-FILEUPLD
HTTP:TELE-EK-DL5
HTTP:GLAZUNOV-EK-LP
HTTP:HITMAN-PAYLOAD-EK
HTTP:MAL-REDIRECT-EXP-88
HTTP:MAGNITUDE-EK-RDIR
HTTP:TELE-EK-DL3
HTTP:CVE-2014-0515-RCE
HTTP:MULTIPLE-WEBSER-INFO-LEAK
HTTP:CVE-2014-4132-RCE
HTTP:UBIQUITI-AIROS-CE
HTTP:ALTNWADMIN
HTTP:EFS-FILE-SERVER-BO
HTTP:HP-PRINTER-INFO-DISCLOSURE
HTTP:EK-ANGLE-EXPLOIT-DWNLD
HTTP:TELE-EK-DL9
HTTP:LIBREOFFICE-INTEGR-UNDRFLW
HTTP:ISA-AUTH-BYPASS
HTTP:BH-COOL-EK-LAND-PG
HTTP:EK-CRIMEBOSS-CONN
HTTP:EXPLOIT-KIT-REDIRECTION-PG
HTTP:CVE-2014-4137-RCE
HTTP:HTTP-INVALID-PORT-VALUE
HTTP:SPRING-XMLENTITY-INFODISC
HTTP:TELE-EK-DL10
HTTP:EK-ANGLER-FLASH
HTTP:MUL-EXPLOIT-KIT-CALC-EXE
HTTP:BH-COOL-EK-LANDPG
HTTP:EK-ANGLER-FLASH-EXPLOIT
HTTP:EK-NUCLEAR-FLASH-DWNLD
HTTP:TELE-EK-DL8
HTTP:EK-REDKIT-OBFUS-PE
HTTP:SYSAX-SERVER-BOF
HTTP:TELE-EK-DL7
HTTP:CVE-2014-6327-RCE
HTTP:EK-KAIXIN-ATTACK
HTTP:TELE-EK-DL6
HTTP:WP-FGALLERY-MAL-FILE-HOST
HTTP:BLACKLIST-URI-TONGJI
HTTP:EK-ANGLER-IE-SHELLCODE
HTTP:MAMBO-MYSQL-INF-DISCLOSURE
HTTP:CNT-IFRAME-RDIR
HTTP:EK-ASTRUM-DWNLD-REQ
HTTP:EK-CK-LANDING-PAGE
HTTP:ALTN-SG-OF
HTTP:COTTONCASTLE-EK
HTTP:EK-NUCLEAR-JAR-DWNLD
HTTP:CVE-2014-4082-RCE
HTTP:BLEEDINGLIFE-EK
HTTP:EK-SCANBOX-ENUM-CD
HTTP:ANGLER-EK-LP
HTTP:DARKLEECH-IFRAME
HTTP:EK-ANGLER-JAVA-SHELLCODE
HTTP:CRITX-EK-LP1
HTTP:EK-ANGLER-FLASH-SHELLCODE
HTTP:MICROFOCUS-NETIQ-AB
HTTP:MAL-REDIRECT-EXP-106
HTTP:CVE-2014-4087-RCE
HTTP:MS-IE-MHTMLFILE-DOS
HTTP:EK-SCANBOX-EXFILTRATION
HTTP:EK-HANJUAN-LP
HTTP:ALLATORI-JAVA-OBFUSCATOR
HTTP:EK-NUCLEAR-LP-DETECTION
HTTP:EK-HANJUAN-ER
HTTP:CVE-2014-0285-RCE
HTTP:BLIFE-EK-MODCALL
HTTP:EK-DOTKACHEF-INBOUND-JAVA
HTTP:CVE-2010-0248-RCE
HTTP:EK-STYX-LANDPAGE
HTTP:EK-SAKURA-EXP-REQ
HTTP:WINAMP-SKIN-DOWNLOAD
HTTP:EK-SWEETORANGE-LANDPAGE
HTTP:INOUT-ARTICLE-BASE-CSRF
HTTP:MAL-REDIRECT-EXP-61
HTTP:EK-IMPACT-LANDPAGE
HTTP:MAL-REDIRECT-EXP-94
HTTP:CVE-2014-0284-RCE
HTTP:HP-INSIGHT-DIAGNOSTICS-LFI
HTTP:BLIFE-MODCALL-4
HTTP:EK-FLIM-PE-DOWNLOAD
HTTP:LAYTON-HELPBOX-AUTH-BYPASS
HTTP:ORACLE-ID-MANAGER-REDIREC1
HTTP:EK-REDKIT-LP-1
HTTP:EK-CRIX-JAVA-ED
HTTP:EK-CRITX-PDF
HTTP:VLC-ABC-FILE-BOF
HTTP:EK-IFRAMER-INJECTION-SS
HTTP:EK-CRITX-DA
HTTP:NAGIOS-GRAPHEXPLORE-CMDINJ
HTTP:SUSP-HDR-REDRCT-EXP-107
HTTP:EK-KAIXIN-ATTACK-VECTOR
HTTP:HTTP_PROXY-ATTACK
HTTP:ADOBE-INDESIGN-SOAP-RCE
HTTP:ACMS-ASSETS-INFODISC
HTTP:EK-NAILED-FIREFOX
HTTP:EK-KAIXIN-JAVA-CLS-DL
HTTP:EK-NEUTRINO-LP-2
HTTP:EK-NEUTRINO-LP-3
HTTP:OPENMEDIAVAULT-AUTHEN-ACE
HTTP:CVE-2014-6337-RCE
HTTP:EK-CRIMEBOSS-JO
HTTP:EK-CRIMEBOSS-SETUP
HTTP:CRITX-EK-OB
HTTP:CVE-2014-0297-RCE
HTTP:EK-CRIMEBOSS-SL
HTTP:CVE-2014-0302-RCE
HTTP:CVE-2014-6343-RCE
HTTP:EK-CRIMEBOSS-JAVA-ED
HTTP:CVE-2014-0312-RCE
HTTP:JABBER-SERVER-BYPASS
HTTP:CVE-2014-4094-RCE
HTTP:EK-FLASHPACK-LP
HTTP:MANAGENGINE-EVTLG-INF-DISC
HTTP:MACROCHECK-DOCUMENT
HTTP:EK-FLASHPACK-PLUGIN-DET
HTTP:EK-NAILED-LANDING-S2
HTTP:SUN-DIGEST-OF
HTTP:EK-CRIMEPACK-CPA
HTTP:EK-NUCLEAR-LP
HTTP:RUBY-GEM-SEMICOLON
HTTP:EK-NAILED-IE
HTTP:EK-NAILED-RHINO
HTTP:CVE-2015-2524-PE
HTTP:FTP-ACTIVEX-CE
HTTP:CVE-2014-4127-RCE
HTTP:EK-NEUTRINO-LP
HTTP:EK-PROPACK-OUTBOUND-CONN
HTTP:EK-RAWIN-OUTBOUND-JAVA-RET
HTTP:VMWARE-VSPHERE-DOS
HTTP:EK-STAMP-MAL-PYLOAD-DL
HTTP:LOCALHOST-ON-INTERNET
HTTP:EK-STYX-LP1
HTTP:EK-STAMP-LP
HTTP:SPL2-SILVERLIGHT-PLUG
HTTP:EK-ELEANORE-EFR
HTTP:EK-MAGNITUDE-JNLP-REQ
HTTP:JOOMLA-WEBRING-RFI
HTTP:CVE-2014-4140-RCE
HTTP:EK-PORTABLE-EXEC-BAD-DOS
HTTP:FOXIT-FF-URL-STG-BO
HTTP:EK-REDKIT-LP
HTTP:EK-ANGLER-OUT-URL
HTTP:EK-MAGNITUDE-FONT-FILE-REQ
HTTP:EK-STYX-MAL-REDIR
HTTP:SCRIPT-INJ-EXP-54
HTTP:TELE-EK-DL
HTTP:EK-SAKURA-REDIR-STRUCT
HTTP:EK-SAKURA-LP-REC
HTTP:EK-SWEETORAANGE-LP
HTTP:STYX-EK-DL
HTTP:EK-NEUTRINO-OUT-PLUGIN
HTTP:EK-NUCLEAR-PDF-REQ
HTTP:EK-STYX-JORG
HTTP:CLANSPHERE-COOKIE-LFI
HTTP:EK-ANGLER-DOWNLOAD
HTTP:EK-X20-POST-JAVA-EXPLOIT
HTTP:WORDPRESS-W3PLUGIN-RCE
HTTP:EK-NUCLEAR-IE-VULN-REQ
HTTP:RESIN-INFO-DISCLOSURE
HTTP:WIPER-SHAMOON-FILE-DWNLD
HTTP:KORE-EK-JSEXPL-DL
HTTP:EK-UNKNOWN-MAL-S1
HTTP:CVE-2015-1699-RCE
HTTP:CVE-2015-1727-RCE
HTTP:EK-SWEET-ORANGE-JAR-LP
HTTP:PARALLEL-PLESK-RCE
HTTP:EK-SWEET-ORANGE-LP
HTTP:REAL-DESCBO
HTTP:EK-NUCLEAR-POST-JAVA-COMP
HTTP:EK-NUCLEAR-ORACLE-JAVA
HTTP:EK-MUL-PAYLOAD-DOWN-1
HTTP:GOON-EK-ENC-DL
HTTP:EK-CRITX-LANDING-PAGE
HTTP:HELLO-EK
HTTP:EK-HELLSPAWN-LP
HTTP:HANJUAN-EK
HTTP:EK-MULTIPLE-OUTBOUND
HTTP:CVE-2015-1671-RCE
HTTP:EK-NUCLEAR-MS-IE-VULN
HTTP:EK-MAGNITUDE-JAVA
HTTP:EXPLOIT-KIT-STYX-PLU
HTTP:EK-CRIMEBOSS-PEDA
HTTP:EK-CRIMEBOSS-SA
HTTP:EK-MULTIPLE-REDIRECTION-GT
HTTP:EK-NEUTRINO-RP-2
HTTP:EK-MAGNITUDE-ORACLE
HTTP:MANAGENGINE-APP
HTTP:GOON-EK-BIN
HTTP:EK-REDKIT-LP-REDIRECTION
HTTP:AVIRA-SECURE-BCKUP-REG-BOF
HTTP:EK-CRIMEPACK-PDF
HTTP:BROWSER-WINDOW-INJECTION
HTTP:VLCFS
HTTP:EXPLOIT-KIT-CRITX-JAVA-V6
HTTP:EXPLOIT-KIT-PROPACK
HTTP:ROBOHELP-SQL-INJ
HTTP:EK-GONGDA-RP
HTTP:EK-MAGNITUDE-LANDING-PG
HTTP:EXPLOIT-KIT-REDKIT
HTTP:CVE-2014-0286-RCE
HTTP:EXPLOIT-KIT-JAR-DOWNLOAD
HTTP:EMC-DPA-EJBSERVLET-RCE
HTTP:EK-NUCLEAR-OUTBOUND-REQ
HTTP:DLINK-DIR605L-CAPTCHA-BOF
HTTP:ESTSOFT-ALZIP-MIM-BO1
HTTP:EK-ORACLE-JAVA-DWNLD
HTTP:CVE-2015-1730-RCE
HTTP:EXPLOIT-KIT-CONTACTS-EXE
HTTP:FOXIT-PNG-PDF-BO1
HTTP:FORTINET-HELLO-MSG-BOF
HTTP:HITMAN-EK-OUT
HTTP:EK-NUCLEAR-PD
HTTP:EK-CRITX-PG-REDIRECT
HTTP:EK-NEUTRINO-RP
HTTP:EK-NUCLEAR-PDF-REQUEST
HTTP:NGINX-CHUNKED-BO1
HTTP:CVE-2015-1733-RCE
HTTP:MS-WINDOWS-X509-DOS
HTTP:HELLO-EK-3
HTTP:HELLO-EK-PAYLOAD
HTTP:EK-SIBHOST
HTTP:EK-SWEET-ORANGE-STRUCT-LP
HTTP:JOOMLA-MEDIAMGR-FILEUPLOAD
HTTP:EK-CRITX-PDF-REQ
HTTP:EK-TELETUBBIES-SEC-PAYLOAD
HTTP:EK-NAILED-LP-SS
HTTP:FIREFOX-IDN-SPOOF
HTTP:EK-DOTKACHEF-LP
HTTP:SCRIPT-INJ-EXP-72
HTTP:GLPI-INSTALLPHP-RCE
HTTP:BLEEDINGLIFE-EK-FLASH
HTTP:EK-TELETUBBIES-PAYLOAD-1
HTTP:CRITX-EK-FLA
HTTP:EK-ELEANORE-PDF-PR
HTTP:EK-REDKIT-JAVA-EXPLOIT
HTTP:EK-REDKIT-LP-REDIR
HTTP:EK-STYX-JOVF
HTTP:EK-DOTKACHEF-RMAYANA
HTTP:EK-MULT-JAVA-PAYLOAD
HTTP:EK-PROPACK-REQUEST
HTTP:EK-REDKIT-ENC-BIN
HTTP:EK-DOTKACHEF-JAVA
HTTP:EK-IMPACT-STAMP-LP
HTTP:EK-FLASHPACK-JAVA-V7
HTTP:MAL-REDIRECT-EXP-73
HTTP:EK-MULT-PAYLOAD-INFO
HTTP:EK-NAILED-FLASH
HTTP:EK-TOPIC-OUTBOUND-C4
HTTP:EK-TOPIC-OUTBOUND-C3
HTTP:EK-UNKNOWN-MAL-HOSTILE
HTTP:EK-ANGLER-FLASH-DWNLD
HTTP:EK-ANGLER-BIN-DWNLD
HTTP:EK-SWEET-ORANGE-LP-URI
HTTP:BACKDOOR-UPATRE-UA
HTTP:EK-TOPIC-OUTBOUND-C1
HTTP:SUSP-HDR-REDRCT-EXP-62
HTTP:EK-POST-COMPRO-TASKKILL
HTTP:SWF-CVE-2014-0503-RCE
HTTP:EK-BLEEDING0LIFE-MOD-CALL2
HTTP:EK-POST-COMPRO-STRREV
HTTP:EK-PHOENIX-POST
HTTP:CVE-2014-1765-RCE
HTTP:WIRELURKER-VRUPDATE
HTTP:EK-CRITX-REDIRECTION-PAGE
HTTP:RMAYANA-EK-OBFTECH
HTTP:EK-WHITEHOLE-LP
HTTP:CA-XOSOFT-XOSOAP
HTTP:AUTOCAD-FAS-FILE-EXEC
HTTP:WIRELURKER-SNUPLOAD
HTTP:EK-STYX-REDIRECTION-PAGE
HTTP:EK-BLEEDINGLIFE-MOD
HTTP:EK-BLEEDINGLIFE-MOD-CALL
HTTP:ZENOSS-VER-CHECK-RCE
HTTP:CVE-2014-1775-RCE
HTTP:KORE-EL-PAYLOAD-OUT
HTTP:EK-SUSPICIOUS-REV-SHELL
HTTP:EK-SUSPICIOUS-TASKKILL
HTTP:EK-SET-JAVA-APPLET-LOAD
HTTP:EXPLOIT-KIT-STYX-EXE
HTTP:EXPLOIT-KIT-JAR-REDIRECT
HTTP:HITMAN-EK-OUTBOUND
HTTP:CVE-2014-0309-RCE
HTTP:EXPLOIT-KIT-JAVA-USR-AGENT
HTTP:EK-FAKE-TRANS-REDIRECT
HTTP:CVE-2014-1755-RCE
HTTP:EK-NUCLEAR-LP1
HTTP:HIMAN-EK-DL-2
HTTP:EK-NAILED-JMXBEAN
HTTP:MAL-REDIRECT-EXP-82
HTTP:IFRAME-EK-REDIR
HTTP:SUSP-HDR-REDRCT-EXP-83
HTTP:EK-SUSPICIOUS-FILESYSOBJ
HTTP:EK-SWEETORANGE-LP
HTTP:NGINX-RQST-URI-SECBYPASS
HTTP:IFRAMER-INJ-DETECTION
HTTP:ESTSOFT-ALZIP-MIM-BO
HTTP:BH-DLEECH-EK-LANDPG
HTTP:BLIFE-EK-MODCALL1
HTTP:OSSIM-COMMAND-EXEC
HTTP:C99-SHELL-BACKDOOR
HTTP:CONTENTKEEPER-BENETOOL-CE
HTTP:EK-BLEEDINGLIFE-MOD-CAL
HTTP:MANAGENGINE-INF-DISC
HTTP:RANDOMIZATION-ENCODIN1
HTTP:MANAGENGINE-POL-BYPASS
HTTP:BLIFE-EK-MODCALL3
HTTP:UNUSUAL-REFERER
HTTP:WIRESHARK-MPEG-BOF
HTTP:EK-BLEEDINGLIFE-MOD-CALL11
HTTP:EK-BLEEDINGLIFE-MOD-CALL8
HTTP:EK-BLEEDINGLIFE-MOD-CALL9
HTTP:MICROSYS-BASE64-BO
HTTP:NEUTRINO-EK-PLUGDET-PG
HTTP:SOLARWINDS-POLICYBYPASS
HTTP:WP-FGALLERY-MAL-FILE-HOST1
HTTP:EK-MUL-JAR-FILE-DROPPED
HTTP:EK-RED-DOT-LP1
HTTP:LEXMARK-LIB-FILE-DIR-TRAV
HTTP:CVE-2010-3335-RCE
HTTP:EXPLOIT-KIT-JDB-LP
HTTP:EXPLOIT-KIT-JDB-LP1
HTTP:CVE-2014-2824-RCE
HTTP:EK-RED-DOT-EXE-RETRI
HTTP:EK-FLASH-DWNLD
HTTP:DLINK-AUTHENTICATION-BO
HTTP:TREND-MICRO-IWSVA-CMDI
HTTP:EK-SWEET-ORANGE-LP2
HTTP:EK-ANGLER-OBFU-FLASH1
HTTP:IMAGEMAGICK-COMM-INJ
HTTP:CARBERP-BACKDOOR-RCE
HTTP:MULTI-EK-LAND-PAGE
HTTP:EK-ZUPONCIC-ORACLE-JAVA
HTTP:MULTI-EK-REDIR-PAGF
HTTP:CVE-2014-2801-RCE
HTTP:IFRAMER-EK-EMBEDJS
HTTP:MAXTHON-HISTORY-XSS
HTTP:MANAGENGINE-EVENTLOG-CSRF
HTTP:EK-SWEET-ORANGE-LP3
HTTP:SUSP-HDR-REDRCT-EXP-74
HTTP:EK-BLACKHOLE-LP
HTTP:NEUTRINO-FLASH
HTTP:ADOBE-FLASHPLYR-PRIV-ESC1
HTTP:EK-NUCLEAR-OUTBOUND
HTTP:SUSPICIOUS-EXE-DOWNLOAD
HTTP:EK-NECLEAR-OBFU-FILE
HTTP:MICROSOFT-ASPNET-POST-DOS1
HTTP:LIGHTSOUT-EK-1
HTTP:SUSP-HDR-REDRCT-EXP-65
HTTP:MAL-REDIRECT-EXP-64
HTTP:IFRAMER-IFRAMEINJ-EK
HTTP:SUSP-HDR-REDRCT-EXP-68
HTTP:EK-NUCLEAR-SPOOFED-HOST
HTTP:SCRIPT-INJ-EXP-63
HTTP:EK-ANGLER-RELAY
HTTP:EK-MUL-SUCCESSFUL-REDIR
HTTP:PVT-EK-LANDPG3
HTTP:EK-NGLER-BROWSER-VER
HTTP:GONGDA-EK-REQ1
HTTP:LIGHTSOUT-EK-2
HTTP:ATLASIAN-JIRA-DIR-TRAVER
HTTP:SCRIPT-INJ-EXP-66
HTTP:INTELLITAMPER-DEFER-BO1
HTTP:FOXIT-PNG-PDF-BO11
HTTP:SQUID-HEADER-VALUE-DOS
HTTP:GONG-DA-EK-JAVAREQ
HTTP:EK-REDKIT-LP2
HTTP:TRENDMICRO-FMT-STR
HTTP:SCRIPT-INJ-EXP-69
HTTP:MICROSOFT-IE-USEAFTERFREE
HTTP:EK-COTTONCASTLE-DECRYPT-OR
HTTP:WIRELURKER-VRUPDATE1
HTTP:EVIL-REDIRECT-EK
HTTP:EK-FIESTA-REDIRECTION
HTTP:FOXIT-PNG-PDF-BO
HTTP:EK-NUCLEAR-OUTBOUND-STR
HTTP:EK-MUL-PE-DOWNLOAD
HTTP:REDKIT-EK-5DIGIT-REQ
HTTP:CVE-2015-1666-RCE
HTTP:SUSP-HDR-REDRCT-EXP-95
HTTP:WINAMP-WLZ-BO1
HTTP:EK-ANGLER-OUTBOUND-URL
HTTP:EK-FLASHPACK-SAFE-CRITX
HTTP:KORE-EK-LANDPG-3
HTTP:CRITX-EK-JAVA-EXPL-REQ
HTTP:EK-NUCLEAR-FLASH-FILE1
HTTP:EK-COTTONCASTLE-JAVA-OC
HTTP:SCADA-WEB-INTERFACE-DOS
HTTP:EK-UNIX-BACKDOOR-CDORKED
HTTP:KORE-EK-LANDPG
HTTP:CVE-2014-4080-RCE
HTTP:EVIL-REDIRECTOR
HTTP:SCRIPT-INJ-EXP-108
HTTP:EK-URI-MALREQ
HTTP:EK-NUCLEAR-LP2
HTTP:EK-COTTONCASTLE-FLASH-OC
HTTP:EK-STAMP-PE-DOWNLOAD
HTTP:EK-FLASHPACK-SAFE-JAR
HTTP:EK-RIG-DGA-REQ
HTTP:CRIMEBOSS-EK-OUTCONN3
HTTP:CRIMEBOSS-EK-REDIR2
HTTP:CVE-2010-3972-RCE
HTTP:EK-BLEEDINGLIFE-MOD-C12
HTTP:SOFOSFO-EK-PLUGIN
HTTP:SUN-DIGEST-OF1
HTTP:SAKURA-EK-PAY
HTTP:EK-DOTKACHEF-MAL-CAMP
HTTP:ADOBE-INDESIGN-SOAP-RCE1
HTTP:MAMBO-MYSQL-INF-DISCLOSUR1
HTTP:EK-COTTONCASTLE-JAVA-CONN
HTTP:NUCLEAR-EK-BIN-DL
HTTP:PVR-EK-LANDPG
HTTP:EK-ANGLER-FLASH-DOWNLOAD3
HTTP:HPEV-RCI
HTTP:REDKIT-EK-PAYLOAD
HTTP:CVE-2011-0042-RCE
HTTP:REDKIT-EK-5DIGIT-APPLET
HTTP:CVE-2015-0309-RCE
HTTP:FORTINET-HELLO-MSG-DOS
HTTP:SOLARWINDS-POLICYBYPASS1
HTTP:EK-FLIM-LP
HTTP:REDKIT-EK-JAVACLASS-REQ
HTTP:CRIMEPACK-EK-LANDPG
HTTP:MS-DOT-NET-HEAP-CORRUPT
HTTP:CVE-2011-0036-RCE
HTTP:EMBED-IFRAME-REDIR-EK2
HTTP:GOON-INFIN-EK-IFRAME
HTTP:EK-RIG-MS-SILVERLIGHT-REQ
HTTP:EK-ANGLER-LP3
HTTP:MUL-EK-EXE
HTTP:CVE-2014-4124-RCE
HTTP:PVT-EK-OUTBOUND-REQ
HTTP:SYMANTEC-EP-POLICY-BYPAS1
HTTP:REDKIT-EK-MULTI-REQS
HTTP:STAMP-EK-LP
HTTP:STAMP-EK-JAR
HTTP:CRIMEBOSS-EK-OUTCONN
HTTP:EK-NUCLEAR-LAND-PG
HTTP:CVE-2015-1709-RCE
HTTP:MS-MDAC-RCE1
HTTP:CVE-2011-0032-RCE
HTTP:STAMP-EK-BIN
HTTP:CVE-2011-0035-RCE
HTTP:CVE-2015-1753-RCE
HTTP:CRITX-EK-PDF-DL
HTTP:PCAP-FORMATSTR-GENERIC
HTTP:DRUPAL-CODER-RCE
HTTP:REGIN-CNC-TRAFFIC1
HTTP:EK-BLEEDINGLIFE-MOD-CALL10
HTTP:CVE-2014-6360-RCE
HTTP:EK-NUCLEAR-JAVA-REQ
HTTP:EXPLOIT-KIT-CRITX-JAVA-V7
HTTP:SUSP-HDR-REDRCT-EXP-56
HTTP:CVE-2011-0101-RCE
HTTP:CVE-2014-6357-RCE
HTTP:EXPLOIT-KIT-CRITX-PDF
HTTP:EK-NUCLEAR-MS-SILVERLIGH
HTTP:EK-ANGLER-JAVA-REQ
HTTP:CRITX-EK-JAVA-DL
HTTP:MAL-REDIRECT-EXP-55
HTTP:INFINITY-EK-LP
HTTP:REALTEK-MEDIAPLAYER-PLA-B1
HTTP:KASPERSKY-URI-PARSING-DOS1
HTTP:CRITX-EK-PE-DL
HTTP:MUL-EXPLOIT-KIT-ABOUT-EXE
HTTP:CVE-2014-6349-RCE
HTTP:GOOGLE-SKETCHUP-BMP-BO
HTTP:EK-HELLSPAWN-JAVA-REQ
HTTP:EK-NUCLEAR-ORACLE-JAR-FILE
HTTP:SIBHOST-EK-JAR-DL
HTTP:ADOBE-FLASHPLYR-PRIV-ESC
HTTP:EK-NUCLEAR-PAYLOAD-REQ
HTTP:ANGLER-EK-RD
HTTP:NEUTRINO-EK-SB
HTTP:JDB-EK-LANDPAGE
HTTP:SCRIPT-INJ-EXP-57
HTTP:EK-ANGLER-JAVA
HTTP:EK-SCANBOX-EXFILTER1
HTTP:ANGLER-EK-RD1
HTTP:LANDESK-REMOTE-FILE-INC
HTTP:CVE-2011-0029-RCE
HTTP:CVE-2014-6375-RCE
HTTP:CVE-2014-6329-RCE
HTTP:MAL-REDIRECT-EXP-58
HTTP:REDKIT-EK-LANDPG4
HTTP:NETBSD-TNFTP-CE
HTTP:EK-MULTIPLE-FLASH
HTTP:SCRIPT-INJ-EXP-78
HTTP:PFSENSE-ZONE-CSS
HTTP:CVE-2014-6364-RCE
HTTP:SQUID-BUMP-DOS
HTTP:MS-TELNET-INSECURE-LOADING
HTTP:DIGIUM-ASTERISK-BO1
HTTP:MAXTHON-HISTORY-XSS1
HTTP:NAGIOS-CONFMGR-SQLINJ
HTTP:JAVA-JSP-SRC-CODE-DISC1
HTTP:SCRIPT-INJ-EXP-42
HTTP:GD-GRAPHICS-PNG
HTTP:CVE-2011-0978-RCE
HTTP:CVE-2011-0098-RCE
HTTP:TDS-REDIR-EK
HTTP:SUSP-HDR-REDRCT-EXP-44
HTTP:INTEGARD-VERSION-CHECK1
HTTP:CVE-2014-6332-MAL-2
HTTP:CVE-2011-0979-RCE
HTTP:PHPWIKI-PLOTICUS-ACE1
HTTP:CVE-2014-0515-EXP-32
HTTP:CVE-2014-6332-EXP-31
HTTP:MAL-REDIRECT-EXP-43
HTTP:CVE-2015-0038-RCE
HTTP:JAVAUA-PE-DL-EK
HTTP:VLCFS1
HTTP:NTOP-BASIC-AUTHORIZATION1
HTTP:REDKIT-EK-JAVA-EXPLOIT-DL
HTTP:SCRIPT-INJ-EXP-96
HTTP:CVE-2015-0042-RCE
HTTP:CVE-2013-2551-EXP-33
HTTP:RUBY-GEM-SEMICOLON1
HTTP:AVIRA-SECURE-BCKUP-REG-BO1
HTTP:PFSENSE-ZONE-CSS1
HTTP:MULTIPLE-WEBSER-INFO-LEAK1
HTTP:SPRING-XMLENTITY-INFODISC1
HTTP:SCRIPT-INJ-EXP-45
HTTP:CVE-2013-2551-EXP-36
HTTP:CVE-2014-6332-EXP-34
HTTP:BH2-EK-URL-STRUCT
HTTP:RESIN-INFO-DISCLOSURE1
HTTP:CRIMEBOSS-EK-JAVA-DL2
HTTP:CVE-2015-0039-RCE
HTTP:W3C-AMAYA-BOF1
HTTP:CVE-2014-6332-EXP-40
HTTP:EK-ANGLER-LP-2
HTTP:C99-SHELL-BACKDOOR1
HTTP:EK-ANGLER-RELAY-TRAFFIC
HTTP:CVE-2014-0515-EXP-38
HTTP:CVE-2014-0515-EXP-35
HTTP:MULTI-EK-32ALPHA-REQ
HTTP:CVE-2013-2551-EXP-39
HTTP:ADOBE-ROBOHELP-FILE-UPLOA1
HTTP:HP-INSIGHT-DIAGNOSTICS-LF1
HTTP:UNUSUAL-REFERER1
HTTP:NGINX-RQST-URI-SECBYPASS1
HTTP:FORTINET-HELLO-MSG-DOS1
HTTP:INTEGARD-PASSWORD-BOF1
HTTP:SAP-MGT-CON-OSEXEC1
HTTP:WIRESHARK-MPEG-BOF11
HTTP:NOVELL-NETIQ-MOD-POLBYPAS1
HTTP:WIRELURKER-SNUPLOAD1
HTTP:SUSP-HDR-REDRCT-EXP-41
HTTP:CVE-2014-0515-INFCT-21
HTTP:CVE-2013-2551-SUSP-19
HTTP:CVE-2013-3912-RCE
HTTP:MS-WIN-FOLDER-GUID-CE1
HTTP:WIPER-SHAMOON-FILE-DWNLD1
HTTP:FTP-ACTIVEX-CE1
HTTP:ACMS-ASSETS-INFODISC1
HTTP:MANAGENGINE-APP1
HTTP:OFFICESCAN-CGIRECVFILE1
HTTP:MS-WINDOWS-HYPERLINK-BO1
HTTP:ROBOHELP-SQL-INJ1
HTTP:ULTRAVNC-VNCLOG-BO1
HTTP:DLL-REQ-VIA-WEBDAV1
HTTP:MS-DOT-NET-XAML-RCE1
HTTP:EK-ANGLER-LANDING-PG
HTTP:CVE-2015-0045-RCE
HTTP:EK-SWEETORANGE-OC
HTTP:WHITEHOLE-EK-JAVA-DL
HTTP:JAVA-EXPRESS-HTML-INJ1
HTTP:HP-SITESCOPE-INF-DISC1
HTTP:VMWARE-VSPHERE-DOS1
HTTP:MAGNITUDE-EK-LAND
HTTP:FIREFLY-MEDIA-SERVER-DOS1
HTTP:MS-IE-MEMORY-CORRUPTION1
HTTP:DLL-REQ-VIA-WEBDAV
HTTP:SUN-GLASSFISH-AUTH-BP1
HTTP:FOXIT-FF-URL-STG-BO1
HTTP:EMC-DPA-EJBSERVLET-RCE1
HTTP:TRENDMICRO-CTRLMGR-SQLINJ1
HTTP:ADOBE-FLASH-PLAYER-BO
HTTP:IFRAME-EK-REDIR7
HTTP:XAMPP-REQUEST-FORGERY1
HTTP:IESHIMS-DLL-HIJACK1
HTTP:MUL-EXPLOIT-KIT-README-EXE
HTTP:APPLE-SGI-BOF1
HTTP:EK-FIESTA-ADOBE-DWNLD
HTTP:BROWSER-WINDOW-INJECTION1
HTTP:MS-DOT-NET-HEAP-CORRUPT1
HTTP:ALTNWADMIN11
HTTP:MS-TELNET-INSECURE-LOADIN1
HTTP:EK-FIESTA-FLASH-DWLD
HTTP:EK-FIESTA-JAVA-DWNLD
HTTP:STYX-EK-LP2
HTTP:GOOGLE-SKETCHUP-BMP-BO1
HTTP:CVE-2015-1652-RCE
HTTP:MS-IE-MHTMLFILE-DOS1
HTTP:MANAGENGINE-INF-DISC1
HTTP:XNVIEW-MBM-FILE-BO1
HTTP:SYSAX-SERVER-BOF1
HTTP:MICROSOFT-WORKS-WKSSS-BO1
HTTP:XML-EXTERNAL-ENTITY-INJ1
HTTP:EK-FIESTA-SILVERLIGHT-DWLD
HTTP:ORACLE-ID-MANAGER-REDIRECT
HTTP:CVE-2014-0299-RCE
HTTP:EK-RIG-OUTBOUND-COM
HTTP:MS-IE-MEMORY-CORRUPTION
HTTP:CVE-2014-0306-RCE
HTTP:SONICWALL-GMS-RCE
HTTP:EK-RIG-OUTBOUND-COM-1
HTTP:CVE-2014-8967-RCE
HTTP:SONICWALL-GMS-RCE-2
HTTP:JENKINS-CI-SERVER-CE
HTTP:CVE-2014-0515-INFCT-42
HTTP:CVE-2014-6332-MAL-41
HTTP:ULTRAVNC-VNCLOG-BO
HTTP:MAL-REDIRECT-EXP-67
HTTP:RUBYONRAILS-XMLYAML-RCE
HTTP:SCRIPT-INJ-EXP-90
HTTP:SUSP-HDR-REDRCT-EXP-89
HTTP:RUBYONRAILS-JSONYAML-RCE
HTTP:XML-EXTERNAL-ENTITY-INJ
HTTP:CVE-2013-2551-SUSP-52
HTTP:CVE-2013-2551-SUSP-64
HTTP:CVE-2013-2551-SUSP-37
HTTP:CVE-2014-0515-INFCT-30
HTTP:CVE-2014-6332-MAL-26
HTTP:CVE-2014-6332-MAL-29
HTTP:CVE-2014-0515-INFCT-15
HTTP:CVE-2014-6332-MAL-35
HTTP:CVE-2013-2551-SUSP-28
HTTP:CVE-2014-0515-INFCT-27
HTTP:CVE-2013-2551-SUSP-25
HTTP:CVE-2014-6332-MAL-23
HTTP:CVE-2014-6332-EXP-07
HTTP:CVE-2014-6332-MAL-59
HTTP:CVE-2014-0515-INFCT-60
HTTP:CVE-2013-2551-EXP-13
HTTP:CVE-2014-6332-MAL-62
HTTP:CVE-2014-6332-MAL-65
HTTP:CVE-2014-6332-EXP-05
HTTP:CVE-2013-2551-SUSP-58
HTTP:CVE-2014-0515-INFCT-57
HTTP:CVE-2014-0515-INFCT-54
HTTP:CVE-2014-6332-EXP-06
HTTP:CVE-2014-0515-INFCT-63
HTTP:CVE-2014-6332-MAL-56
HTTP:CVE-2013-2551-SUSP-55
HTTP:CVE-2014-6332-EXP-01
HTTP:CVE-2013-2551-EXP-15
HTTP:CVE-2014-6332-MAL-53
HTTP:CVE-2013-2551-SUSP-61
HTTP:CVE-2013-2551-EXP-14
HTTP:CVE-2014-6332-EXP-08
HTTP:CVE-2014-6332-EXP-03
HTTP:CVE-2014-6332-EXP-09
HTTP:CVE-2014-0515-INFCT-18
HTTP:CVE-2014-0515-INFCT-3
HTTP:CVE-2014-6332-MAL-5
HTTP:CVE-2014-0515-INFCT-9
HTTP:CVE-2014-6332-MAL-8
HTTP:CVE-2013-2551-SUSP-7
HTTP:CVE-2014-0515-INFCT-6
HTTP:CVE-2013-2551-SUSP-4
HTTP:CVE-2014-6332-MAL-50
HTTP:CVE-2014-6332-MAL-44
HTTP:CVE-2014-0515-INFCT-48
HTTP:CVE-2013-2551-SUSP-49
HTTP:CVE-2014-6332-MAL-47
HTTP:CVE-2014-0515-INFCT-51
HTTP:CVE-2013-2551-SUSP-43
HTTP:CVE-2014-0515-INFCT-33
HTTP:CVE-2013-2551-SUSP-46
HTTP:CVE-2013-2551-EXP-12
HTTP:CVE-2014-6332-MAL-17
HTTP:CVE-2013-2551-SUSP-13
HTTP:CVE-2013-2551-EXP-19
HTTP:CVE-2014-6332-MAL-32
HTTP:CVE-2014-6332-MAL-14
HTTP:CVE-2014-0515-INFCT-45
HTTP:CVE-2014-0515-INFCT-24
HTTP:CVE-2014-0515-EXP-26
HTTP:CVE-2014-0515-EXP-22
HTTP:CVE-2013-2551-EXP-16
HTTP:CVE-2014-0515-EXP-25
HTTP:CVE-2014-0515-EXP-23
HTTP:CVE-2013-2551-EXP-17
HTTP:CVE-2014-6332-MAL-20
HTTP:CVE-2014-6332-EXP-11
HTTP:CVE-2014-0515-EXP-27
HTTP:CVE-2013-2551-SUSP-31
HTTP:CVE-2014-6332-EXP-02
HTTP:EITEST-REDIR-EK
HTTP:VMTURBO-OS-COMM-INJ
HTTP:INOUT-ARTICLE-BASE-CSRF1
HTTP:PHPWIKI-PLOTICUS-ACE
HTTP:CVE-2014-6332-MAL-11
HTTP:CVE-2013-2551-SUSP-10
HTTP:CVE-2014-0515-INFCT-39
HTTP:CVE-2013-2551-SUSP-40
HTTP:CVE-2013-2551-SUSP-16
HTTP:CVE-2014-6332-MAL-38
HTTP:CVE-2014-0515-INFCT-12
HTTP:CVE-2014-0515-INFCT-36
HTTP:CVE-2013-2551-SUSP-22
HTTP:CVE-2013-2551-SUSP-34
HTTP:CVE-2014-0515-EXP-28
HTTP:CVE-2014-0515-EXP-24
HTTP:CVE-2013-2551-SUSP-1
HTTP:CVE-2014-0515-EXP-20
HTTP:CVE-2014-6332-EXP-30
HTTP:CVE-2014-6332-EXP-10
HTTP:MS-WIN-FOLDER-GUID-CE
HTTP:GONG-DA-EK-LP
HTTP:LIGHTHTTPD-CONNECTION-DOS
HTTP:DIGIUM-ASTERISK-BO
HTTP:SUSP-HDR-REDRCT-EXP-98
HTTP:EK-ANGLER-OUTBOUND-COMM
HTTP:ANGLER-EXPKIT-URI
HTTP:MAL-REDIRECT-EXP-46
HTTP:CLAMAV-ENCRYPT-PDF-MC
HTTP:NGINX-CHUNKED-BO
HTTP:CLAMAV-ENCRYPT-PDF-MC2
HTTP:EK-RIG-OUT-COMMUNICATION
HTTP:APPLE-SGI-BOF
HTTP:EK-KAIXIN-LANDING-PAGE
HTTP:SUN-GLASSFISH-AUTH-BP
HTTP:WEBSRV-BO-4096
HTTP:MAL-CNC-SRVREQ
HTTP:MS-DOT-NET-XAML-RCE
HTTP:MS-WORDPERFECT-BOF
HTTP:TREND-MICRO-RESTCMDI
HTTP:MS-DOT-NET-HEAP-CORRUPT-1
HTTP:JAVA-UA-EXE-DL
HTTP:LIBGD-HEAP-BO
HTTP:SCRIPT-INJ-EXP-111
HTTP:MS-DOT-NET-HEAP-CORRUPT-2
HTTP:MALJS-REDIR-EK
HTTP:TM-IWSVA-CI
HTTP:MAL-REDIRECT-EXP-91
HTTP:LONGTAIL-JW-XSS
HTTP:TMCM-INFO-DISC
HTTP:IESHIMS-DLL-HIJACK
HTTP:LIBGD-GD2GETHEADER-IO
HTTP:MS-VBSCRIPT-UAF-RCE
HTTP:RUBYONRAILS-JSONYAML-RCE1
HTTP:ELASTICSEARCH-REST-ACE
HTTP:EK-ANGLER-FLASH-REQ
HTTP:NNMRPTCONFIG-EXE-RCE
HTTP:HP-SITESCOPE-INF-DISC
HTTP:MS-WINDOWS-HYPERLINK-BO
HTTP:ADOBE-ROBOHELP-FILE-UPLOAD
HTTP:JAVA-UPDATE-RCE1
HTTP:SUSP-HDR-REDRCT-EXP-110
HTTP:EK-RED-SIMPLETDS-GO
HTTP:DLINK-DIR605L-CAPTCHA-BOF1
HTTP:TREND-MICRO-IWSVA-CONFCMDI
HTTP:STATIC-SERVER-BOF1
HTTP:NOVELL-NETIQ-MOD-POLBYPAS
HTTP:MAL-REDIRECT-EXP-109
HTTP:EK-ANGLER-XTEA-ENYCP-BIN
HTTP:JABBER-SERVER-BYPASS1
HTTP:MAL-REDIRECT-EXP-112
HTTP:APPLE-QT-TTD-BO
HTTP:MS-OUTLOOK-2003-OBJ-SEC-SB

HTTP:3COM

HTTP:3COM:LOG-CLEAN
HTTP:3COM:CONF-DOWNLOAD
HTTP:3COM:ADMIN-LOGOUT
HTTP:3COM:OFFICECONNECT
HTTP:3COM:3COM-PASS-LEAK

HTTP:AGORA

HTTP:AGORA:POSTGRES65
HTTP:AGORA:AUTH
HTTP:AGORA:DBACCESS

HTTP:APACHE

HTTP:APACHE:WWWPASSWD-FILE-DISC
HTTP:APACHE:USER-ENUM
HTTP:APACHE:MOD-CACHE-DOS-STC
HTTP:APACHE:SERVER-MOD-STATS-BO
HTTP:APACHE:STRUTS-XSLT-FI
HTTP:APACHE:INV-HEADER-DOS
HTTP:APACHE:STRUTS-URL-DOS
HTTP:APACHE:MOD-NTLM-BOF1
HTTP:APACHE:ENCODED-DIRTRAV
HTTP:APACHE:WIN32BATCH
HTTP:APACHE:REWRITE-OF
HTTP:APACHE:HTGREP-HDR
HTTP:APACHE:COUCHDB-UUID-DOS
HTTP:APACHE:MYFACES-DIR-TRAV
HTTP:APACHE:STRUTS2-COOKIE-OGNL
HTTP:APACHE:MOD-CACHE-DOS
HTTP:APACHE:SOLR-FILE-DISC
HTTP:APACHE:SERVER-STATUS-PROBE
HTTP:APACHE:STRUTS2-OGNL-CE
HTTP:APACHE:MOD-PROXY-SECBYPASS
HTTP:APACHE:HTTPD-MODLOG-COOKIE
HTTP:APACHE:WEBDAV-PROPFIND
HTTP:APACHE:MODRPAF-XFWD-DOS
HTTP:APACHE:CONTINUUM-CMD-INJ
HTTP:APACHE:PHP-DOS
HTTP:APACHE:STRUTS-RCE
HTTP:APACHE:STRUTS2-PI-RCE
HTTP:APACHE:ROLLER-OGNL-RCE
HTTP:APACHE:APR-PSPRINTF-MC
HTTP:APACHE:STRUTS-OGNL-CMDEXEC
HTTP:APACHE:MOD-TCL-FS
HTTP:APACHE:STRUTS2-OGNL-INJ
HTTP:APACHE:APACHE-CHUNKREQ-DOS
HTTP:APACHE:MOD-CACHE-DOS-CLT
HTTP:APACHE:STRUTS-URIREDIRECT
HTTP:APACHE:STRUTS-URI-CMDEXEC
HTTP:APACHE:MOVE-DIRTRAV
HTTP:APACHE:STRUTS-RST-DMI-EXEC
HTTP:APACHE:FILTER-DISPATCHER
HTTP:APACHE:DAV-SVN-HEAP-OVRFLW
HTTP:APACHE:MODPHP-UPLOAD-HOF
HTTP:APACHE:MODPROXY-AJP-DOS
HTTP:APACHE:SCALP
HTTP:APACHE:XSPACE
HTTP:APACHE:NOSEJOB
HTTP:APACHE:CAMEL-XSLT-JCE
HTTP:APACHE:HTTP-SERVER-MOD-DOS
HTTP:APACHE:STRUTS-CI-SECBYPASS
HTTP:APACHE:MOD-ISAPI-RCE1
HTTP:APACHE:RESIN-WEB-INF
HTTP:APACHE:STRUTS2DMI-RCE
HTTP:APACHE:STRUTS-OGNL-CE
HTTP:APACHE:WILDCARD-CMD-EXEC
HTTP:APACHE:STRUTS-INCLUDPARAMS
HTTP:APACHE:STRUTS-SKILLNAME-CE
HTTP:APACHE:HTTPD-ERROR-400
HTTP:APACHE:RPC-RAVE-INFO-DISC
HTTP:APACHE:MOD-REWRITE-CMD-EXE
HTTP:APACHE:MOD-DAV-MERGE-DOS
HTTP:APACHE:APR-DOS
HTTP:APACHE:APACHE-NIO-DOS
HTTP:APACHE:AXIS-SOAP-DOS
HTTP:APACHE:REV-PROXY-EXPLOIT
HTTP:APACHE:FILEUPLOAD-CNT-TYPE
HTTP:APACHE:MOD-LOG-CONFIG-DOS
HTTP:APACHE:SERVER-MODPROXY-DOS
HTTP:APACHE:STRUTS-SECBYPASS
HTTP:APACHE:MOD-ISAPI-RCE
HTTP:APACHE:BYTE-RANGE-LEAK
HTTP:APACHE:RANGE-DOS
HTTP:APACHE:LDAPFS
HTTP:APACHE:LONG-HEADER-DOS
HTTP:APACHE:APR-UTIL-LIB-DOS

HTTP:AUDIT

HTTP:AUDIT:LENGTH-OVER-2048
HTTP:AUDIT:URL
HTTP:AUDIT:INV-HTTP-VER
HTTP:AUDIT:LENGTH-OVER-1024
HTTP:AUDIT:LENGTH-OVER-256
HTTP:AUDIT:LENGTH-OVER-512
HTTP:AUDIT:TOO-MANY-HEADERS
HTTP:AUDIT:LENGTH-OVER-4096
HTTP:AUDIT:LENGTH-OVER-8192
HTTP:AUDIT:REQ-LONG-UTF8CODE
HTTP:AUDIT:MALICIOUS-FILE-DL-4
HTTP:AUDIT:MALICIOUS-FILE-DL-3
HTTP:AUDIT:MALICIOUS-FILE-DL-5
HTTP:AUDIT:GENERIC-FMT-STR
HTTP:AUDIT:ROBOTS.TXT
HTTP:AUDIT:NULL-HREF
HTTP:AUDIT:UNWISE-CHAR
HTTP:AUDIT:HTTP-VER-1.0
HTTP:AUDIT:HTTP-1.0-HOST-HEADER
HTTP:AUDIT:BINARY-IN-URLENCODE
HTTP:AUDIT:CHUNKED-TRANSFER
HTTP:AUDIT:PDF-SCIIHEXDECODE
HTTP:AUDIT:ACMS-FLV-URLSPOOF
HTTP:AUDIT:UNKNOWN-VERB
HTTP:AUDIT:PDF-SCIIHEXDECODE1
HTTP:AUDIT:FW1-SCHEME-OF
HTTP:AUDIT:MALICIOUS-FILE-DL-2
HTTP:AUDIT:MALICIOUS-FILE-DL
HTTP:AUDIT:MALICIOUS-FILE-DL-1

HTTP:BADBLUE

HTTP:BADBLUE:PROXY-RELAY
HTTP:BADBLUE:MFC-ISAPI-CMD-OF
HTTP:BADBLUE:INVALID-GET-DOS

HTTP:BARRACUDA

HTTP:BARRACUDA:PREV-EXEC

HTTP:BIGBROTHER

HTTP:BIGBROTHER:INFO-DISCLOSURE

HTTP:BROWSER

HTTP:BROWSER:ICQ
HTTP:BROWSER:MOZILLA-DBKEYRANGE
HTTP:BROWSER:POLICY-BYPASS
HTTP:BROWSER:FIREFOX-DATA-URI
HTTP:BROWSER:CHROME-JS-ENG-MC
HTTP:BROWSER:URI-OBFUSCATION

HTTP:CGI

HTTP:CGI:MAGENTO-API-RCE
HTTP:CGI:MONALBUM
HTTP:CGI:AXIS-EXEC
HTTP:CGI:AXIS-ACCOUNT
HTTP:CGI:CHETCPASSWD-OF
HTTP:CGI:REF-CMD-INJECT
HTTP:CGI:FAXSURVEY-REMOTE-EXEC
HTTP:CGI:LIBCGI-RFP-OVERWRITE
HTTP:CGI:IKONBOARD-BADCOOKIE
HTTP:CGI:STORE-ATTEMPT
HTTP:CGI:SOJOURN-FILE-VIEW
HTTP:CGI:SOFTCART
HTTP:CGI:HASSAN-DIR-TRAVERSAL
HTTP:CGI:WAYBOARD-FILE-DISCLSR
HTTP:CGI:INFOSRCH-REMOTE-EXEC
HTTP:CGI:ALLAIRE-SHELL-ATTEMPT
HTTP:CGI:CVSWEB-CGI-SEMICOLON
HTTP:CGI:EXTROPIA-DIR-TRAVERSAL
HTTP:CGI:EXCITE-AT-ADMIN-CGI
HTTP:CGI:SMARTSEARCH-EXEC
HTTP:CGI:CPANEL5-GB-EXEC
HTTP:CGI:EASYNEWS-ADMIN1
HTTP:CGI:MONALBUM-INFO
HTTP:CGI:USERONLINE-LOGLEAK
HTTP:CGI:SITESEARCHER-EXEC
HTTP:CGI:EMUMAIL-INFO-LEAK
HTTP:CGI:LIBCGI-TUXBR-OF1
HTTP:CGI:BOOZT-CGI-OF
HTTP:CGI:TEXIS-INFOPROBE
HTTP:CGI:NAGIOS-HISTORY-PRM-BO
HTTP:CGI:MAIL-FORM-ACCESS
HTTP:CGI:GROUNDWORK-MONITOR-CE
HTTP:CGI:FORMMAIL-VULN
HTTP:CGI:HTDIG-INCLUSION
HTTP:CGI:VIRTUAL-VISION-TRVRSL
HTTP:CGI:GLIMPSE-PIPE
HTTP:CGI:UBNT-AIROS-CMD-INJ
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
HTTP:CGI:APPLE-QT-FILEDISC1
HTTP:CGI:WEBPALS-EXEC
HTTP:CGI:YABB-DIR-TRAVERSAL
HTTP:CGI:ROADS-FILE-DISCLOSURE
HTTP:CGI:WEBSCADA3
HTTP:CGI:EMAIL-VIRTUAL-APP
HTTP:CGI:TWIKI-MAKETEXT-RCE
HTTP:CGI:LANDSK-UPLOAD-RCE
HTTP:CGI:GLIMPSE-PIPE1
HTTP:CGI:WEBSCADA
HTTP:CGI:MAGENTO-RCE
HTTP:CGI:ZEN-LB-CMD-EXEC
HTTP:CGI:QUIKSTORE-CFG-ACCESS
HTTP:CGI:CTEK-SKYROUTER-EXEC
HTTP:CGI:AWC-XSL-CMD-INJ
HTTP:CGI:TWIKI-REV-CMD-INJ
HTTP:CGI:CYBEROFFICE-DB-REQUEST
HTTP:CGI:BATCH-PIPE
HTTP:CGI:NAGIOS-XI-AUTODISC-CMD
HTTP:CGI:TECHNOTE-MAIN-DCLSR
HTTP:CGI:CAREY-COMMERCE-DIR-TRV
HTTP:CGI:LITESERV-CGI-DISC
HTTP:CGI:SUNPS-IRUNBOOK
HTTP:CGI:ZAMFOO-CMD-INJ
HTTP:CGI:SCRUTINIZER-CE
HTTP:CGI:SUPERMICRO-BOF
HTTP:CGI:MOVABLE-TYPE-UPGRADE
HTTP:CGI:GENERIC-WEB-APP-CE
HTTP:CGI:AWSTATS
HTTP:CGI:NAGIOS-CMD-INJ
HTTP:CGI:APM-ACC-BYPASS
HTTP:CGI:LISTSERV-BO
HTTP:CGI:DLINK-ROUTER-CMD-INJ
HTTP:CGI:KORWEBLOG-PATHDISC
HTTP:CGI:EASY-MB-PRINT
HTTP:CGI:ME-DESKTOP-CENT-ADMIN
HTTP:CGI:ORACLE-RPT-INFOLEAK
HTTP:CGI:ANYFORM-SEMICOLON
HTTP:CGI:SPIDERSALES
HTTP:CGI:NULL-ENCODING
HTTP:CGI:CDOMAINFREE-RMT-EXEC
HTTP:CGI:NAGIOS-CORE-DOS
HTTP:CGI:TWIKI-SEARCH-CMD-EXEC
HTTP:CGI:TWIKI-VIEW-EXEC
HTTP:CGI:TEST-CGI
HTTP:CGI:BASH-INJECTION-URL
HTTP:CGI:BASH-INJECTION-HEADER
HTTP:CGI:BASH-CODE-INJECTION
HTTP:CGI:SHELLSHOCK
HTTP:CGI:RSA-AGENT-BOF
HTTP:CGI:BUGZILLA-SEMICOLON
HTTP:CGI:ALTAVISTA-TRAVERSAL
HTTP:CGI:OFFICESCAN-CGI-BO
HTTP:CGI:MS-OFFICE-URL-BOF
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE
HTTP:CGI:INCLUDER-EXEC

HTTP:CGI:BUGZILLA

HTTP:CGI:BUGZILLA:PRIV-UP

HTTP:CGI:PERL

HTTP:CGI:PERL:DUMPENV-PROBE
HTTP:CGI:PERL:WEBHINT-CMD-INJ

HTTP:CHKP

HTTP:CHKP:AUTH-HDR-BOF
HTTP:CHKP:AUTH-FMT-STR

HTTP:CISCO

HTTP:CISCO:UNIFIED-XSS-2
HTTP:CISCO:SERVLETEXEC
HTTP:CISCO:WIFI-AUTH-DOS
HTTP:CISCO:CISCOWORKS-DIR-TRAV
HTTP:CISCO:PROCESSIMAGESAVE-FU
HTTP:CISCO:LINKSYS-CMD-INJ
HTTP:CISCO:LINKSYS-CODE-INJ
HTTP:CISCO:LINKSYS-WRT54GL-CSRF
HTTP:CISCO:LINKSYS-WRT54GL-XSS
HTTP:CISCO:IOS-ADMIN-ACCESS
HTTP:CISCO:WIFI-CONTROLLER-DOS
HTTP:CISCO:SCANNER-PROBE
HTTP:CISCO:CONTROLLER-CSRF
HTTP:CISCO:UNIFIED-XSS
HTTP:CISCO:CATALYST-ARB-CMD
HTTP:CISCO:IOS-HTML-INJ
HTTP:CISCO:LINKSYS-APPLY-RCE
HTTP:CISCO:SOURCE-CODE-DISC
HTTP:CISCO:FILEUPLOADSERVLET
HTTP:CISCO:ASA-VPN-SEC-BYPASS
HTTP:CISCO:CUCM-DIR-TRAV
HTTP:CISCO:MARS-JMX
HTTP:CISCO:DOWNLOADSERVLET-FU
HTTP:CISCO:CSUSERCGI-BOF

HTTP:CISCO:VOIP

HTTP:CISCO:VOIP:STREAM-ID-DOS
HTTP:CISCO:VOIP:STREAM-ID-REQ
HTTP:CISCO:VOIP:PORT-INFO-DOS1
HTTP:CISCO:VOIP:PORT-INFO-DOS

HTTP:COBALT

HTTP:COBALT:SEC-REQ-PROBE-2
HTTP:COBALT:SERVICE-DOS
HTTP:COBALT:SEC-REQ-PROBE
HTTP:COBALT:CONF-DIR-TRAV

HTTP:COLDFUSION

HTTP:COLDFUSION:CFCACHE-MAP
HTTP:COLDFUSION:GETFILE-PROBE
HTTP:COLDFUSION:CF-CLASS-DWLD
HTTP:COLDFUSION:ENV-VAR-OW
HTTP:COLDFUSION:ADMIN-PROBE
HTTP:COLDFUSION:CFIDE-AUTHBYPAS
HTTP:COLDFUSION:CFM-FILE
HTTP:COLDFUSION:XML-CMD-INJ
HTTP:COLDFUSION:CVE-2013-3336
HTTP:COLDFUSION:HEADER-LOG-OF

HTTP:CYCLADES

HTTP:CYCLADES:SAVEUSER-PRIV
HTTP:CYCLADES:CONSOLE-CON

HTTP:DIR

HTTP:DIR:TRAVERSE-DIRECTORY
HTTP:DIR:NOVELL-ZENWORKS
HTTP:DIR:HTTP-REQ-URL
HTTP:DIR:APACHE-OPENMEETINGS
HTTP:DIR:HTTP-HOST-HDR
HTTP:DIR:REPRISE-EDIT-IFPROCESS
HTTP:DIR:WP-UNGALLERY-LFD
HTTP:DIR:MNGE-ENGINE-FILE-DLD
HTTP:DIR:HTTP-COOKIE-HDR
HTTP:DIR:MESMP-DIR-TRAV
HTTP:DIR:ORACLE-HYPERION-TRAV
HTTP:DIR:DLINK-DNS-DIR-TRAV
HTTP:DIR:HTTP-ACCEPT-LANG
HTTP:DIR:HTTP-AUTH-HDR
HTTP:DIR:VISUALMINING-NETCHARTS
HTTP:DIR:CA-ERWIN-WEB-PORTAL
HTTP:DIR:HTTP-CONTENT-MD5
HTTP:DIR:HTTP-ACCEPT-ENCODING
HTTP:DIR:HTTP-REFERER-HDR
HTTP:DIR:HTTP-UA-HDR
HTTP:DIR:HTTP-CONT-TYPE
HTTP:DIR:HTTP-ACCEPT-HDR
HTTP:DIR:MUL-VEN-DIR-TRAV
HTTP:DIR:ADMIN-PATH-TRAVERSAL
HTTP:DIR:MANAGEENGINE
HTTP:DIR:WINACE-DIR-TRVRS
HTTP:DIR:CISCO-PRIME-DATA-ID
HTTP:DIR:ZIMBRA-SERVER-LDAP
HTTP:DIR:CRYSTAL-REPORTS
HTTP:DIR:ORACLE-APP-TEST-SUITE
HTTP:DIR:NOVELL-GROUPWSE-DIRTRA
HTTP:DIR:MS-SHAREPOINT
HTTP:DIR:MANAGEENGINE-DIR-TRA
HTTP:DIR:APJS-PORTAL-DIRTRAV
HTTP:DIR:TRAV-ENCODED
HTTP:DIR:BARRACUDA-DIRTRAV
HTTP:DIR:NOVELL-ZENWORKS-TRAV
HTTP:DIR:HP-LOADRUNNER-EMU
HTTP:DIR:HTTP-REQUEST-HDR
HTTP:DIR:PARAMETER-TRAVERSE-1
HTTP:DIR:HTTP-REQUEST-HDR-1
HTTP:DIR:PARAMETER-TRAVERSE
HTTP:DIR:ENDECA-ETLSERVER-DT
HTTP:DIR:ORACLE-INFO-DISCOVERY

HTTP:DOMINO

HTTP:DOMINO:POST-DOS2
HTTP:DOMINO:USERNAME-DISCOVERY
HTTP:DOMINO:INFO-LEAK
HTTP:DOMINO:CSP-SRC-DISCLOSURE
HTTP:DOMINO:REDIR-BOF
HTTP:DOMINO:HPRAGENTNAME-BOF
HTTP:DOMINO:NSF-PASSWORD-BYPASS
HTTP:DOMINO:NSF-DIR-TRAVERSAL
HTTP:DOMINO:ACCEPT-LANG-OF
HTTP:DOMINO:HASH-DUMPER
HTTP:DOMINO:INFO-LEAK-1
HTTP:DOMINO:SAMETIME-URL-OF

HTTP:DOS

HTTP:DOS:HAPROXY-REQDENY
HTTP:DOS:SLOW-HEADER-DOS
HTTP:DOS:HULK-DOS
HTTP:DOS:HTTPKILLER-KEEPALIVE
HTTP:DOS:GOLDENEYE-DOS
HTTP:DOS:DRUPAL-XMLRPC-TAGS
HTTP:DOS:MUL-VENDORS
HTTP:DOS:SAFARI-FILE-DOWNLOAD
HTTP:DOS:MUL-PRODUCTS
HTTP:DOS:MICROSOFT-HTTP-SYS-2
HTTP:DOS:MIT-KERBEROS-5-POLICY
HTTP:DOS:APACHE-TOMCAT-CHUNKED
HTTP:DOS:APACHE-TOMCAT-CHUNKED2
HTTP:DOS:SQUID-HDR-RANGE
HTTP:DOS:DRUPAL-XML-RPC-IEE
HTTP:DOS:SCHNEIDER-EXPRT-SCADA
HTTP:DOS:DOMSHTTPD-BO
HTTP:DOS:NOOP-SLED-REQ-MALF
HTTP:DOS:LAN-MSG-DOS
HTTP:DOS:APACHE-COPY-MOVE
HTTP:DOS:PHP-UPLOAD

HTTP:EXPLOIT

HTTP:EXPLOIT:AMBIG-CONTENT-LEN
HTTP:EXPLOIT:BRUTE-FORCE
HTTP:EXPLOIT:BRUTE-SEARCH
HTTP:EXPLOIT:SLASH-EVASION
HTTP:EXPLOIT:SWS-NO-LINEFEED
HTTP:EXPLOIT:VAR-RESPONSE-SPLIT
HTTP:EXPLOIT:SMALL-FIRST-DATA
HTTP:EXPLOIT:PI3WEB-USERS
HTTP:EXPLOIT:SYM-FILEUPLOAD
HTTP:EXPLOIT:XERVER-NULL-INJ
HTTP:EXPLOIT:REDMINE-CMD-EXEC
HTTP:EXPLOIT:WEBSTER-URL-OF
HTTP:EXPLOIT:FP2K-ASP-UPLOAD
HTTP:EXPLOIT:BIN-IN-AUTH-BASIC
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
HTTP:EXPLOIT:AMBIG-CONTENT-LEN1
HTTP:EXPLOIT:D-LINK-ADMIN-PW
HTTP:EXPLOIT:HOST-RANDOM-2
HTTP:EXPLOIT:MS-DOS-DEV
HTTP:EXPLOIT:HOST-RANDOM-3
HTTP:EXPLOIT:HOST-RANDOM-4
HTTP:EXPLOIT:MAL-LNK
HTTP:EXPLOIT:HOST-RANDOM-1
HTTP:EXPLOIT:IE-SAVE-AS-HIDE
HTTP:EXPLOIT:MAL-LNK1
HTTP:EXPLOIT:URI-RANDOM-HOST
HTTP:EXPLOIT:MS-TCPSTACK-URLDOS
HTTP:EXPLOIT:HOST-RANDOM-5
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
HTTP:EXPLOIT:GENERIC-EVASION-AT
HTTP:EXPLOIT:ILLEGAL-HOST-CHR-1
HTTP:EXPLOIT:XITAMI-HEAD-DOS
HTTP:EXPLOIT:D-LINK-ADMIN-PW1
HTTP:EXPLOIT:SQLXML-ISAPI-OF
HTTP:EXPLOIT:WEBMIN-FS-INT
HTTP:EXPLOIT:DNSCHANGER-EK

HTTP:EXT

HTTP:EXT:FILE-EXT-IN-DIR
HTTP:EXT:DOT-PPT
HTTP:EXT:DOT-RPT
HTTP:EXT:SCR
HTTP:EXT:DOT-UNSAFE
HTTP:EXT:DOT-VML
HTTP:EXT:METAFILE
HTTP:EXT:HTRSRCFRAG
HTTP:EXT:DOT-PIF
HTTP:EXT:DOT-RAT
HTTP:EXT:SCR3
HTTP:EXT:DOT-GRP
HTTP:EXT:DOT-JOB
HTTP:EXT:DOT-LNK
HTTP:EXT:RAT-SVR-PUSH
HTTP:EXT:DOT-HLP
HTTP:EXT:DOT-XUL
HTTP:EXT:DOT-CHM

HTTP:FRONTPAGE

HTTP:FRONTPAGE:FRM-RES-PROBE
HTTP:FRONTPAGE:AUTH-PWD-PROBE
HTTP:FRONTPAGE:ADMIN.PWD-REQ
HTTP:FRONTPAGE:SERVICE.PWD-REQ
HTTP:FRONTPAGE:AUTHOR-PWD-INFO
HTTP:FRONTPAGE:DOS-NAME-DOS

HTTP:GMAIL

HTTP:GMAIL:FILE-UPLOAD
HTTP:GMAIL:FILE-DOWNLOAD

HTTP:HOTMAIL

HTTP:HOTMAIL:LIVE-ATTACH
HTTP:HOTMAIL:EXE-DOWNLOAD
HTTP:HOTMAIL:FILE-DOWNLOAD
HTTP:HOTMAIL:LIVE-ACTIVITY
HTTP:HOTMAIL:FILE-UPLOAD
HTTP:HOTMAIL:ZIP-DOWNLOAD

HTTP:IIS

HTTP:IIS:FILE-LIST-ATTEMPT
HTTP:IIS:CMDSHELL-ATTEMPT
HTTP:IIS:EXAIR-DOS
HTTP:IIS:ASN-1-BOF
HTTP:IIS:MFC-EXT-OF
HTTP:IIS:ENUMDSN-ATTEMPT
HTTP:IIS:ODATA-PROTOCOL-DOS
HTTP:IIS:JET-DB-VBA-REMOTE-EXEC
HTTP:IIS:SAM-DOWNLOAD-ATTEMPT
HTTP:IIS:ADMIN-PROBE
HTTP:IIS:PERL-0A-ATTEMPT
HTTP:IIS:REGREAD-ATTEMPT
HTTP:IIS:SITE-SERVER-FILE-UPLD
HTTP:IIS:FP30REG-CSS1
HTTP:IIS:HDR-EVASION
HTTP:IIS:MSADC-PROBE
HTTP:IIS:MALFORMED-EXT-DATA
HTTP:IIS:MSADC-VBBO-ACCESS
HTTP:IIS:SCHANNEL-IMPROPER-CERT
HTTP:IIS:ASPX-DOS
HTTP:IIS:X-SITE-SCRIPT
HTTP:IIS:INDEX-SERVER-SQLQHIT
HTTP:IIS:TILDE-INFO-DISC
HTTP:IIS:MALFORMED-HTR-REQUEST
HTTP:IIS:IIS-BYPASS
HTTP:IIS:IIS-DISC
HTTP:IIS:ISM.DLL-FILENAME
HTTP:IIS:PERC-2E-ASP
HTTP:IIS:SENSEPOST.EXE
HTTP:IIS:IIS-AUTH-BYPASS
HTTP:IIS:ASP-SEARCH-PROBE
HTTP:IIS:IIS-6-7-AUTH-BYPASS
HTTP:IIS:ADFS-MAL-HEADER
HTTP:IIS:SHAREPOINT-XSS
HTTP:IIS:SHAREPOINT-MUL-XSS
HTTP:IIS:ASP-FORMS-DISCLOSURE
HTTP:IIS:ASN.1-BIT-STRING
HTTP:IIS:ASP-RCE
HTTP:IIS:SHAREPOINT-PRIV-ESC
HTTP:IIS:4-INTERNAL-IP-DISC
HTTP:IIS:HTR-OF-2
HTTP:IIS:ASPNET-DISCLOSURE
HTTP:IIS:SOURCE-CODE-DISC
HTTP:IIS:PBSERVER-PARAM-OF
HTTP:IIS:HEADER-HOST-DOS
HTTP:IIS:SHAREPOINT-DOS
HTTP:IIS:DIR-BYPASS
HTTP:IIS:ISAPI-IDQ-OVERFLOW
HTTP:IIS:SERVERVARIABLES-INFO
HTTP:IIS:SHARE-ID4
HTTP:IIS:LOCALHOST-SPOOF
HTTP:IIS:CGI-BIN-CMD-EXE
HTTP:IIS:SHARE-ID2
HTTP:IIS:SHARE-ID3
HTTP:IIS:HTW-CROSS-SITE
HTTP:IIS:MDAC-RDS
HTTP:IIS:ASPNET-DOS
HTTP:IIS:WEB-CONFIG-INFO-LEAK
HTTP:IIS:ASP-SHOWCODE
HTTP:IIS:TRACK-REQUEST
HTTP:IIS:IISCHECK-PROBE
HTTP:IIS:IIS-EXT-BYPASS
HTTP:IIS:PROPFIND
HTTP:IIS:ASP-PAGE-BOF
HTTP:IIS:INT-OVERFLOW-DOS
HTTP:IIS:IIS-ADS-BYPASS
HTTP:IIS:SAMPLE-ACCESS
HTTP:IIS:SHAREPOINT-CONVERT
HTTP:IIS:ASP-NET-MVC-SEC-BYPASS
HTTP:IIS:SHARE-ID1
HTTP:IIS:HTR-OVERFLOW
HTTP:IIS:ASPX-URL-1
HTTP:IIS:COLDFUSION-INFOLEAK
HTTP:IIS:IIS-HTR-CHUNKED
HTTP:IIS:ASP-DOT-NET-BACKSLASH
HTTP:IIS:DOT-NET-SERVER-DOS
HTTP:IIS:MDAC-RDS-2
HTTP:IIS:ASP-NET-FORM-REDIRECT
HTTP:IIS:SP-SCRIPTRESX-XSS
HTTP:IIS:UNC-PATH-DISC
HTTP:IIS:INDEX-SERVER-SRC-CODE
HTTP:IIS:SHAREPOINT-2010-XSS
HTTP:IIS:ASP-DOT-NET-VSTATE
HTTP:IIS:ISAPI-PRINTER-OVERFLOW
HTTP:IIS:MS-RD-WEB-ACCESS-XSS
HTTP:IIS:MS-SHAREPOINT-DOS
HTTP:IIS:IIS-HILIGHT-BYPASS
HTTP:IIS:ASPX-URL
HTTP:IIS:ASP-CHUNKED-OF
HTTP:IIS:DLL-URL-REQ
HTTP:IIS:REP-PARAM-REQ-DOS
HTTP:IIS:REQ-HDR-BO
HTTP:IIS:NSIISLOG-OF
HTTP:IIS:NSIISLOG-CHUNKED-POST
HTTP:IIS:FASTCGI
HTTP:IIS:MDAC-DATASTUB
HTTP:IIS:IISADMPWD-PROXY-PASSWD
HTTP:IIS:ISAPI-IDA-OVERFLOW
HTTP:IIS:FPCOUNT-OVERFLOW
HTTP:IIS:AD-SERVER-CONFIG
HTTP:IIS:DATA-DISCLOSURE
HTTP:IIS:BAT-AMP

HTTP:IIS:CMS

HTTP:IIS:CMS:MAL-CMS-REQ-2
HTTP:IIS:CMS:MAL-CMS-REQ

HTTP:IIS:ENCODING

HTTP:IIS:ENCODING:SINGLE-DIG-1
HTTP:IIS:ENCODING:SINGLE-DIG-2
HTTP:IIS:ENCODING:PERC-PERC-2
HTTP:IIS:ENCODING:PERC-PERC-1
HTTP:IIS:ENCODING:PERC-PERC-3
HTTP:IIS:ENCODING:UNICODE-BP
HTTP:IIS:ENCODING:UNICODE

HTTP:IIS:WEBDAV

HTTP:IIS:WEBDAV:MALFORMED-REQ1
HTTP:IIS:WEBDAV:XML-HANDLER-DOS
HTTP:IIS:WEBDAV:SEARCH-OF
HTTP:IIS:WEBDAV:WINDOWS-SHELL
HTTP:IIS:WEBDAV:MALFORMED-REQ2
HTTP:IIS:WEBDAV:COMMAND-OF
HTTP:IIS:WEBDAV:REQ-DISCLO
HTTP:IIS:WEBDAV:AUTH-BYPASS

HTTP:INFLATE

HTTP:INFLATE:TYPE-MISMATCH
HTTP:INFLATE:OVERFLOW

HTTP:INFO

HTTP:INFO:REQ-NO-CONTENT-LENGTH
HTTP:INFO:YOUTUBE
HTTP:INFO:MWS-SEARCH-OF1
HTTP:INFO:RESIN-DEV-WEBROOT
HTTP:INFO:XEROX-DS-INFO
HTTP:INFO:TMICRO-PROXY-REQ
HTTP:INFO:SPIDER-ROBOT
HTTP:INFO:FARK
HTTP:INFO:FACEBOOK
HTTP:INFO:MS-UPDATE
HTTP:INFO:HTML5-CONTENT
HTTP:INFO:OFFLINE-CACHING-HTML5
HTTP:INFO:HTTPPOST-GETSTYLE
HTTP:INFO:YOUTUBE-APP
HTTP:INFO:NULL-AUTH
HTTP:INFO:CHARSET-ASCII
HTTP:INFO:AUTH-NEGOTIATE
HTTP:INFO:HTML5-CONTENT1
HTTP:INFO:FACEBOOK1
HTTP:INFO:IDN-HOSTNAME

HTTP:INFO-LEAK

HTTP:INFO-LEAK:MISS-DATE
HTTP:INFO-LEAK:MISS-ETAG
HTTP:INFO-LEAK:MISSG-RANGE-206
HTTP:INFO-LEAK:MULT-SPACES-ST
HTTP:INFO-LEAK:PROXY-AUTH-OF
HTTP:INFO-LEAK:EXPECT-OVERFLOW
HTTP:INFO-LEAK:NO-SP-AFTER-FLD
HTTP:INFO-LEAK:SPACE-IN-CON-LEN
HTTP:INFO-LEAK:MISSING-WWW-AUTH
HTTP:INFO-LEAK:MISSG-PROXY-AUT
HTTP:INFO-LEAK:LOCATION-OF
HTTP:INFO-LEAK:MISSING-RES-CODE
HTTP:INFO-LEAK:MULT-TRANS-ENC
HTTP:INFO-LEAK:EXT-ASCII-CH
HTTP:INFO-LEAK:MISSG-EXPT-100
HTTP:INFO-LEAK:MISSG-LOCATN-3XX
HTTP:INFO-LEAK:WWW-AUTH-OVFLOW
HTTP:INFO-LEAK:FOLDING-HEADER
HTTP:INFO-LEAK:BAD-REASON-PHRS
HTTP:INFO-LEAK:SPACE-AFT-CHUNK
HTTP:INFO-LEAK:HTTP-VERSION-NT
HTTP:INFO-LEAK:RANGE-OVERFLOW
HTTP:INFO-LEAK:JOOMLA-SQLREPORT
HTTP:INFO-LEAK:POLYCOM
HTTP:INFO-LEAK:DOT-NET-CODE
HTTP:INFO-LEAK:NSCONFIG
HTTP:INFO-LEAK:NETGEAR-CONFLEAK
HTTP:INFO-LEAK:SALESCART-DB
HTTP:INFO-LEAK:WFCHAT3
HTTP:INFO-LEAK:HTPASSWD-REQUEST
HTTP:INFO-LEAK:LAYTON-TECH
HTTP:INFO-LEAK:ORACLE-SQL
HTTP:INFO-LEAK:SELENA-WEBSTORE
HTTP:INFO-LEAK:CUTENEWS
HTTP:INFO-LEAK:WFCHAT
HTTP:INFO-LEAK:WIN-INI
HTTP:INFO-LEAK:COFFEECUP
HTTP:INFO-LEAK:ASP-WEB-CONFIG
HTTP:INFO-LEAK:F-SECURE-MANAGER
HTTP:INFO-LEAK:GOAHEAD-PERM
HTTP:INFO-LEAK:BUGZILLA-DISC
HTTP:INFO-LEAK:BOOT-INI
HTTP:INFO-LEAK:WORDPRES-GAZETTE
HTTP:INFO-LEAK:WFCHAT4
HTTP:INFO-LEAK:WEB-INF-DOT
HTTP:INFO-LEAK:WFCHAT8
HTTP:INFO-LEAK:LIVE-WIRE
HTTP:INFO-LEAK:WFCHAT7
HTTP:INFO-LEAK:WFCHAT6
HTTP:INFO-LEAK:WFCHAT5
HTTP:INFO-LEAK:WFCHAT2
HTTP:INFO-LEAK:WP-DBM-CFG
HTTP:INFO-LEAK:SSN-CLEARTEXT
HTTP:INFO-LEAK:D-LINK-MUL
HTTP:INFO-LEAK:GOOGLEMAP-PLUGIN
HTTP:INFO-LEAK:CC-CLEAR-VAR
HTTP:INFO-LEAK:BARRACUDADRIVE1
HTTP:INFO-LEAK:MULTIPLE-VENDORS
HTTP:INFO-LEAK:HTACCESS
HTTP:INFO-LEAK:BANNERMATIC
HTTP:INFO-LEAK:CART32-INFO-LEAK
HTTP:INFO-LEAK:IBM-FP-SERLET
HTTP:INFO-LEAK:SNOOP-DISLOSURE
HTTP:INFO-LEAK:MS-IE-MOUSE-MVMT
HTTP:INFO-LEAK:HP-SITESCOPE
HTTP:INFO-LEAK:BOOT-INI-TCP
HTTP:INFO-LEAK:F5-BIG-IP-XML
HTTP:INFO-LEAK:DVR-VS-PWD-DISC
HTTP:INFO-LEAK:DVR-VS-LOG-DISC
HTTP:INFO-LEAK:ASP-ORACLE-PAD
HTTP:INFO-LEAK:MS-PKCS-INFODISC
HTTP:INFO-LEAK:ZYXEL-PRESTIGE
HTTP:INFO-LEAK:HTTP-SHARE-ENUM
HTTP:INFO-LEAK:NET-INFO-DISC
HTTP:INFO-LEAK:IIS-FILE-ACCESS
HTTP:INFO-LEAK:HP-LASERJET-PRO
HTTP:INFO-LEAK:CHECK-POINT-MUL
HTTP:INFO-LEAK:JETY-SRV-RESP
HTTP:INFO-LEAK:NETGEAR-MUL
HTTP:INFO-LEAK:WP-MUL-PLUGINS
HTTP:INFO-LEAK:CONCRETE5
HTTP:INFO-LEAK:MUL-VENDORS-1
HTTP:INFO-LEAK:NOVELL-ZENWORKS
HTTP:INFO-LEAK:SHAREPOINT-INFO
HTTP:INFO-LEAK:DS-STORE
HTTP:INFO-LEAK:MS-VISIO-XML1
HTTP:INFO-LEAK:DOT-NET-CODE1
HTTP:INFO-LEAK:WFCHAT1
HTTP:INFO-LEAK:VIGNETTE-DIAG
HTTP:INFO-LEAK:WFCHAT9
HTTP:INFO-LEAK:CA-TOTAL-DEFENSE
HTTP:INFO-LEAK:TOSTATICHTML-API
HTTP:INFO-LEAK:MS-VISIO-XML
HTTP:INFO-LEAK:HP-APISITESCOPE
HTTP:INFO-LEAK:REDHAT-JBOSS
HTTP:INFO-LEAK:VIGNETTE-LEAK-2
HTTP:INFO-LEAK:PHP-PROXIMA
HTTP:INFO-LEAK:VIGNETTE-LEAK
HTTP:INFO-LEAK:JBOSS-JSP-SRC

HTTP:INVALID

HTTP:INVALID:NON-STAND-W-SPACE
HTTP:INVALID:HDR-FIELD
HTTP:INVALID:INVLD-AUTH-CHAR
HTTP:INVALID:BAD-CONTENT-LENGTH
HTTP:INVALID:CHUNK-HEADER
HTTP:INVALID:DUPLICATE-HEADER
HTTP:INVALID:MISSING-REQ
HTTP:INVALID:MSNG-HTTP-VER
HTTP:INVALID:HOST_HEADER_S2C
HTTP:INVALID:UNEXPECTCHAR
HTTP:INVALID:INVLD-AUTH-LEN
HTTP:INVALID:STATUS-CODE
HTTP:INVALID:GZIP-TRANSACTION
HTTP:INVALID:EXPECT
HTTP:INVALID:VAR-NEG-LG
HTTP:INVALID:HTTP-RESPONSE-CODE
HTTP:INVALID:CHUNK-EVASION

HTTP:IRIX

HTTP:IRIX:CGI-BIN-WRAP
HTTP:IRIX:CGI-BIN-REMOTE-EXEC

HTTP:LHTTPD

HTTP:LHTTPD:HOST-DOT-DOT-SLASH
HTTP:LHTTPD:GET-BOF
HTTP:LHTTPD:FCGI-HEADER-OF
HTTP:LHTTPD:HOST-DOT-DOT-SLASH1

HTTP:LINUX

HTTP:LINUX:RPM-QUERY
HTTP:LINUX:DD-WRT-MGMT-GUI
HTTP:LINUX:REDHAT-ACCEPT-LANG

HTTP:MISC

HTTP:MISC:MULTPLE-EK-JAR-DOWNLD
HTTP:MISC:BLUECOAT-LICENSE
HTTP:MISC:BLUECOAT-ADMIN
HTTP:MISC:MOBY-LENGTH-DOS
HTTP:MISC:POSTER-SW-PUI-FILE-OF
HTTP:MISC:AVAILABLEMEDIA-REQ
HTTP:MISC:WWWACL-PROBE
HTTP:MISC:WEBWEAVER-DDP
HTTP:MISC:COGENT-SERVER-CMD-INJ
HTTP:MISC:SINAPSI-CMD-INJ
HTTP:MISC:RAS-CFG
HTTP:MISC:XOOPS-WEBROOT
HTTP:MISC:MOODLOGIC-CLIENT
HTTP:MISC:MS-USERS-PWD-INFO-DIS
HTTP:MISC:SUPERMICRO-LOGIN-BO
HTTP:MISC:NG-WG602-BACKDOOR
HTTP:MISC:EMULIVE-ADMIN
HTTP:MISC:X-MICRO-WLAN-PASSWORD
HTTP:MISC:LINBIT-LINBOX-BYPASS
HTTP:MISC:DLINK-CAMERA-VIDEO-BY
HTTP:MISC:ZENOSS-CMD-EXEC
HTTP:MISC:MOTOROLA-WR850
HTTP:MISC:MUTINY-5-EDITDOCUMENT
HTTP:MISC:KEYFOCUS-KF-DIRTRAV
HTTP:MISC:WESTERN-DIGITAL-LFI
HTTP:MISC:SAMSNG-DVR-COOKI-AUTH
HTTP:MISC:NODEJS-DOS
HTTP:MISC:APPLE-MAPS-APP
HTTP:MISC:MS-IIS-DOS
HTTP:MISC:TM-INTERSCAN-DIR-TRAV
HTTP:MISC:WAPP-PARAM-SEC2
HTTP:MISC:ZENOSS-CE
HTTP:MISC:ENDIAN-PRX-CMDEXEC
HTTP:MISC:COREL-PDF-FUSION-XPS
HTTP:MISC:NETCHARTS-SER-RCE
HTTP:MISC:DLINK-CE
HTTP:MISC:MUTINY-CMD-INJ
HTTP:MISC:WIN-MOVIE-MAKER-DOS
HTTP:MISC:ABYSS-HDR-DOS
HTTP:MISC:RAILS-ROUTING4
HTTP:MISC:DLINK-CMD-INJECTION
HTTP:MISC:JENKINS-CONSOLE-CE
HTTP:MISC:WIRESHARK-LUA-RCE
HTTP:MISC:OPENFILER-NETWORKCARD
HTTP:MISC:UPTIME-MONTRN-PHP-RCE
HTTP:MISC:MS-USERS-PWD-INFO-DI1
HTTP:MISC:WIRESHARK-DECT-OF
HTTP:MISC:SPAM-TO-PHP-REDIR
HTTP:MISC:ALIEN-VAULT-OSSIM-CE
HTTP:MISC:PHPWIKI-SHELL-CE
HTTP:MISC:ZOPE-CMD-RCE
HTTP:MISC:BLUECOAT-HOST-HDR-OF
HTTP:MISC:SQUID-PROXY-GOPHER-RP
HTTP:MISC:RAILS-ROUTING2
HTTP:MISC:RAILS-ROUTING3
HTTP:MISC:MULTIPLE-PRODCT-CSRF
HTTP:MISC:JIGSAW-DEV-DOS1
HTTP:MISC:XEROX-4595-COPIER
HTTP:MISC:AV-INVALID-CHKSUM
HTTP:MISC:DLINK-CAPTCHA-BO
HTTP:MISC:GRAPHITE-RCE
HTTP:MISC:WEEVELY
HTTP:MISC:ASTIUM-PBX-PHP-CE
HTTP:MISC:SONICWALL-AUTH-BYPAS
HTTP:MISC:AWSTATS-EXEC
HTTP:MISC:UBIQUITI-AIROS-CE
HTTP:MISC:BUFFALO-LINK-INFO
HTTP:MISC:MINIUPNPD-SOAP-ACTION
HTTP:MISC:LIFESIZE-ROOM-SEC-BY
HTTP:MISC:MULTI-ANTIVIRUS-ASCII
HTTP:MISC:MONOWALL-CSRF
HTTP:MISC:D-LINK-DAP-1160
HTTP:MISC:D-LINK-DIR-615-PASSWD
HTTP:MISC:DLINK-INFO-DISCLOSURE
HTTP:MISC:SQUID-DNS-REPLIES
HTTP:MISC:DVR-VS-RCE
HTTP:MISC:DLINK-OS-CMD-INJ
HTTP:MISC:ALCATEL-OMNIPCX-RCE
HTTP:MISC:CVSTRAC-FILEDIFF-RCE
HTTP:MISC:COPPERMINE-SQL-INJ
HTTP:MISC:BELKIN-ROUTER-UPLOAD
HTTP:MISC:TP-LINK-TD-8817-CSRF
HTTP:MISC:IBM-JAVA-UTF8-BYPASS
HTTP:MISC:WEB-BBS-CE
HTTP:MISC:ALCATEL-OMNIPCX-CE
HTTP:MISC:FREEPBX-CFG-CODE-EXEC
HTTP:MISC:WEBUI-COMMAND-EXEC
HTTP:MISC:MS-XML-SIG-VAL-DOS
HTTP:MISC:BEETEL-TC1-450-CSRF
HTTP:MISC:MANAGEENGINE-APPS
HTTP:MISC:ADOBE-COLDFUSION-HTML
HTTP:MISC:AV-INVALID-CHKSUM1
HTTP:MISC:NETGEAR-CMD-INJ
HTTP:MISC:AA-COOKIE-PARAM-RCE
HTTP:MISC:DLINK-CAMERA-CMD-INJ
HTTP:MISC:MS-MOVIE-MAKER-OCX
HTTP:MISC:MANAGE-ENGNE-ADMIN-AC
HTTP:MISC:TOPTOOLS-HPNST-DOS
HTTP:MISC:SONICWALL-AUTH-BYPASS
HTTP:MISC:HP-RELEASE-CONTROL
HTTP:MISC:MULTI-PRDCTS-CSRF-1
HTTP:MISC:MUL-VENDORS-CSRF
HTTP:MISC:WAPP-SUSP-FILEUL1
HTTP:MISC:MULTIPLE-VENDORS-UAF
HTTP:MISC:MUTI-PROD-COMND-EXEC
HTTP:MISC:MULTIPLE-VENDORS-CSRF
HTTP:MISC:MANAGEENGINE-PRIV-ESC
HTTP:MISC:SEAGATE-NAS-RCE
HTTP:MISC:MULTPLE-PRDCTS-RCE
HTTP:MISC:MULTIPLE-PRODUCT-CSRF
HTTP:MISC:SNORT-URICNTNT-EVASON
HTTP:MISC:MULTPLE-PRODUCT-CSRF
HTTP:MISC:MULTIPLE-VENDORS-RCE
HTTP:MISC:WAVELINK-HDR-PARSE-BO
HTTP:MISC:MULTIPLE-PRDCT-CSRF
HTTP:MISC:FILE-DOWNLOAD
HTTP:MISC:PHPMOADMIN-RCE
HTTP:MISC:SPLUNK-CUSTOM-APP-CE
HTTP:MISC:WORDPRESS-PHP-ACE
HTTP:MISC:WAPP-PARAM-SEC1
HTTP:MISC:MUL-AUTH-BYPASS
HTTP:MISC:PRDCTS-COMMAND-INJ
HTTP:MISC:PRDCTS-COMMAND-EXEC
HTTP:MISC:MUL-VEND-IMPRO-ACCESS
HTTP:MISC:XENEO-WEBREQ-DOS
HTTP:MISC:WAPP-PARAM-SEC3
HTTP:MISC:CHASYS-BO
HTTP:MISC:JBOSS-SEAM-EL-RCE
HTTP:MISC:DLINK-INFOCGI-BO
HTTP:MISC:LETTERBOX-RCE
HTTP:MISC:IRFVIEW-JP2-BO
HTTP:MISC:GSM-SIMEDIT-BO
HTTP:MISC:CUTEZIP-BO
HTTP:MISC:DLINK-EXSHEL-PARAM-CE
HTTP:MISC:WING-FTP-COMMNAD-EXEC
HTTP:MISC:APSTRUTS-DEV-EXEC
HTTP:MISC:OPENPLI-CE
HTTP:MISC:SPRING-HEADER-INJ
HTTP:MISC:LIFESIZE-ROOM-CMD-INJ
HTTP:MISC:MLTPLE-TABLE-INFO-DIS
HTTP:MISC:APPLE-CUPS-RCE
HTTP:MISC:MS-FOREFRONT-DOS
HTTP:MISC:EPO-XMLENTITY-INJ
HTTP:MISC:SAVANT-WEBSERVER-BOF
HTTP:MISC:MAC-COMM-EXEC
HTTP:MISC:WINDOWS-DLL-LOAD-CE
HTTP:MISC:DLINK-COOKI-HANDLN-BO
HTTP:MISC:CVE-2013-3214-AB
HTTP:MISC:WINRAR-FILENM-SPOOF
HTTP:MISC:ZPANEL-HTPASWD-MOD-CE
HTTP:MISC:EDOC-UPLOAD-PHP-CE
HTTP:MISC:PANDORA-SERVICE-CE
HTTP:MISC:WINDOWS-GREENDAM-BO
HTTP:MISC:DOLIBARR-ERP-COMM-INJ
HTTP:MISC:FRITZ-SEC-BYPASS-CE
HTTP:MISC:RUBY-RAILS-SECRET-RCE
HTTP:MISC:MANAGEENGINE-FILE-UP
HTTP:MISC:ESF-PFSENSE-RCE
HTTP:MISC:REAL-RMP-TRAV
HTTP:MISC:NEOTERIS-IVE-BF
HTTP:MISC:SEAGATE-NAS-RCE1
HTTP:MISC:MAPLE-MAPLET-CMD-EXEC
HTTP:MISC:MAYA-EO-VIDEO-BO1
HTTP:MISC:GE-GEFEBT-CE
HTTP:MISC:CVE-2014-6332-RCE
HTTP:MISC:MANAGENGINE-EVNTLG-CE
HTTP:MISC:NGINX-ENCODED-DOS
HTTP:MISC:CVE-2014-6332-BOF
HTTP:MISC:JOOMLA-UNSER-CE
HTTP:MISC:SYMANTEC-COMMAND-EXEC
HTTP:MISC:CVE-2015-5718-BO
HTTP:MISC:MOODLE-RCE
HTTP:MISC:MCAFFEE-SRV-HDR
HTTP:MISC:REDR-ACROFORM-MC-1
HTTP:MISC:RAILS-ROUTING1
HTTP:MISC:ARRIS-VAP-RCE
HTTP:MISC:SHAMBALA-DOS1
HTTP:MISC:COOL-EXKIT-JAR-DL
HTTP:MISC:EZGUESTBOOK
HTTP:MISC:EK-REDKIT-JAR-DOWNLD
HTTP:MISC:DYNDNSUPDATE
HTTP:MISC:MS-IIS-DOS-1
HTTP:MISC:ES-GROOVY-CODEEXEC
HTTP:MISC:HP-SYS-IPRANGE-OF
HTTP:MISC:GE-PULSENET-RCE
HTTP:MISC:WP-IMG-UPLOAD
HTTP:MISC:HP-PROCURVE-RESET
HTTP:MISC:FLASH-CVE-2014-0554
HTTP:MISC:DLINK-IP-CAMERA-ID
HTTP:MISC:IBM-CRDIT-LMT-BYPAS
HTTP:MISC:BLKIN-PARAM-HNDLNG-CE
HTTP:MISC:AVIRA-MGNT-HEADER-BOF
HTTP:MISC:SPLUNK-MAPPY-RCE
HTTP:MISC:F5-ICONTROL-SOAP-CE
HTTP:MISC:IBM-CONSOLE-FILE-READ
HTTP:MISC:NG-ARB-FLUPLOAD
HTTP:MISC:GE-MDS-PULSENET
HTTP:MISC:REPRISE-DOIT-TRAV
HTTP:MISC:IE-CVE-2013-2551-RCE
HTTP:MISC:GITLIST-URI-REQ-CE
HTTP:MISC:ALIENVAULT-OSSIM-CE
HTTP:MISC:NEG-CTN-LENGTH-CLT
HTTP:MISC:CVE-2014-6332-OF
HTTP:MISC:OPENSIS-PARAM-PHP-INJ
HTTP:MISC:IE-CVE-2013-2551-RCE1
HTTP:MISC:MS-OWA-URL-REDIR
HTTP:MISC:NEG-CTN-LENGTH-STC
HTTP:MISC:NGINX-CHUNK-TRANS-DOS
HTTP:MISC:NGINX-CHUNK-TRANSDOS2
HTTP:MISC:DB-POMER-AMP-BO
HTTP:MISC:FORTIGATE-CSRF
HTTP:MISC:MS-SHARE-POINT-RCE
HTTP:MISC:HP-OPENVIEW-CE
HTTP:MISC:RAILS-ROUTING
HTTP:MISC:GITLAB-SH-EXEC
HTTP:MISC:FREEPBX-AUTH-BYPASS
HTTP:MISC:EK-HIMAN-JAVA
HTTP:MISC:HASTYMAIL-CMD-INJ
HTTP:MISC:APPLE-INSTALLER-FS
HTTP:MISC:ERS-VIEWER-BO
HTTP:MISC:VISNETIC-DOS

HTTP:NCSA

HTTP:NCSA:PHF-EXEC
HTTP:NCSA:NPH-TEST-CGI

HTTP:NETGEAR

HTTP:NETGEAR:DG834G-DEBUG-MODE
HTTP:NETGEAR:DGN1000B-SETUP-RCE
HTTP:NETGEAR:NETGEAR-PRO-SAFE

HTTP:NETSCAPE

HTTP:NETSCAPE:ENTERPRISE-DOS
HTTP:NETSCAPE:INDEX-DISCLOSURE

HTTP:NOVELL

HTTP:NOVELL:REPORTER-AGENT
HTTP:NOVELL:DHOST-BOF
HTTP:NOVELL:DHOST-URI-BOF
HTTP:NOVELL:GROUPWISE-IMG-BOF
HTTP:NOVELL:EDIR-ACCEPT-LANG-OF
HTTP:NOVELL:EDIR-DHOST
HTTP:NOVELL:GROUPWISE-CSS
HTTP:NOVELL:ACT-PARAM-ID
HTTP:NOVELL:ZENWORKS-RTRLET-COM
HTTP:NOVELL:GROUPWISE-CSS-2
HTTP:NOVELL:FILENAME-PARAM-DT
HTTP:NOVELL:EDIRECTORY-SOAP
HTTP:NOVELL:WEBACC-MODIFY
HTTP:NOVELL:ZENWORKS-INFODISC
HTTP:NOVELL:TEAMING-UPLOAD
HTTP:NOVELL:NETMAIL-WEBADMIN
HTTP:NOVELL:GROUPWISE-NETAGT-BO
HTTP:NOVELL:IMANAGER-TOMCAT-BOF

HTTP:ORACLE

HTTP:ORACLE:SOAP-ACCESS1
HTTP:ORACLE:APP-SERVER-BYPASS
HTTP:ORACLE:SERVER-FORMS-CE
HTTP:ORACLE:APEX-HASH
HTTP:ORACLE:JNLP-CODE-EXEC
HTTP:ORACLE:SSO-ACCESS
HTTP:ORACLE:SBA-CMD-INJ
HTTP:ORACLE:GLASSFISH-REST
HTTP:ORACLE:OWA-UTIL-INFO-DISC
HTTP:ORACLE:OUTSIDEIN-MET-BOF1
HTTP:ORACLE:CONF-ACCESS
HTTP:ORACLE:GLASSFISH-MUL-XSS
HTTP:ORACLE:9I-APP-SERVER-DOS
HTTP:ORACLE:ENDECA-SERVER-RCE
HTTP:ORACLE:OUTSIDE-IN-MSACCESS
HTTP:ORACLE:ORACLE9I-INFO-LEAK
HTTP:ORACLE:DEMANTRA-FILEACCESS
HTTP:ORACLE:XML-SIG-SPOOFING
HTTP:ORACLE:SOAP-CONF
HTTP:ORACLE:OS-2-METAFILE-BOF
HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO
HTTP:ORACLE:OUTSIDEIN-MET-BOF
HTTP:ORACLE:CHAR-CONV-VULN
HTTP:ORACLE:PARADOX-DB-DOS
HTTP:ORACLE:GLASSFISH-BYPASS
HTTP:ORACLE:COREL-DRAW-BO
HTTP:ORACLE:OUTSIDE-PRDOX-BO2
HTTP:ORACLE:REPORTS-RCE
HTTP:ORACLE:JAVA-SERVICELOADER
HTTP:ORACLE:OUTSIDEIN-CORELDRAW
HTTP:ORACLE:WEBCENTER-SITES-RF
HTTP:ORACLE:GENERIC-SIGNATUR-MC
HTTP:ORACLE:BACKUP-AUTH-BYPASS
HTTP:ORACLE:BACKUP-CMD-INJ
HTTP:ORACLE:ISQLPLUS-OF
HTTP:ORACLE:LOGIN-COOKIES-INJ
HTTP:ORACLE:COPYFILE-DIR-TRAV
HTTP:ORACLE:DATAINT-ACTIVEX-MC
HTTP:ORACLE:SRV-OPMN-FS
HTTP:ORACLE:EVNTPRO-DIR-TRAV

HTTP:OVERFLOW

HTTP:OVERFLOW:CONTENT-OVERFLOW
HTTP:OVERFLOW:CONTENT-ENCODING
HTTP:OVERFLOW:SET-COOKIE
HTTP:OVERFLOW:TRANSFER-ENCODING
HTTP:OVERFLOW:SERVER
HTTP:OVERFLOW:ACCEPT-LANGUAGE
HTTP:OVERFLOW:CONTENT-LOCATION
HTTP:OVERFLOW:ACCEPT-ENCODING
HTTP:OVERFLOW:CONNECTION
HTTP:OVERFLOW:CONTENT-LANGUAGE
HTTP:OVERFLOW:CONTENT-LENGTH
HTTP:OVERFLOW:ACCEPT
HTTP:OVERFLOW:REFERER
HTTP:OVERFLOW:AUTHORIZATION
HTTP:OVERFLOW:CONTENT-MD5
HTTP:OVERFLOW:USER-AGENT
HTTP:OVERFLOW:CONTENT-RANGE
HTTP:OVERFLOW:HEADER
HTTP:OVERFLOW:CHUNK-OVERFLOW
HTTP:OVERFLOW:VERB-OVERFLOW
HTTP:OVERFLOW:COOKIE
HTTP:OVERFLOW:HOST
HTTP:OVERFLOW:CHUNK-LEN-OFLOW
HTTP:OVERFLOW:URL-OVERFLOW
HTTP:OVERFLOW:INV-CHUNK-LEN
HTTP:OVERFLOW:CHUNKS-TOO-SMALL
HTTP:OVERFLOW:CONTENT-TYPE
HTTP:OVERFLOW:AUTH-OVFLW
HTTP:OVERFLOW:HTTPDX-GET-URL-OF
HTTP:OVERFLOW:NULLHTTPD-ROOT-OF
HTTP:OVERFLOW:HTTPDX-POST-BOF
HTTP:OVERFLOW:WSHELL-CGIC
HTTP:OVERFLOW:ATP-HTTPD-OF
HTTP:OVERFLOW:WEBC-REQ-OF
HTTP:OVERFLOW:SERVU-SESSION
HTTP:OVERFLOW:COREHTTP-URI
HTTP:OVERFLOW:BLACK-ICE-BOF
HTTP:OVERFLOW:HTTPDX-URL
HTTP:OVERFLOW:SYBASE-WEBCONSOLE
HTTP:OVERFLOW:AUTH-OVERFLOW
HTTP:OVERFLOW:D-LINK-HNAP-BO
HTTP:OVERFLOW:SAVANT
HTTP:OVERFLOW:IMAGEMAGICK-EXIF
HTTP:OVERFLOW:OVWEBHELP-BO
HTTP:OVERFLOW:WEBDAV-JAVASYSTEM
HTTP:OVERFLOW:LINKSYS-APPLY
HTTP:OVERFLOW:PI3WEB-SLASH-OF
HTTP:OVERFLOW:EVOCAM-WEBSRV-GET
HTTP:OVERFLOW:XITAMIIFMOD
HTTP:OVERFLOW:IMAGEMAGICK-SGI
HTTP:OVERFLOW:MALICIOUS-HOST
HTTP:OVERFLOW:MS-W3WHO-OF
HTTP:OVERFLOW:MS-IE-URL-BOF
HTTP:OVERFLOW:SENKAS-KALIBRI-BO
HTTP:OVERFLOW:MUL-VENDORS-BO
HTTP:OVERFLOW:STATUS-CODE-OF
HTTP:OVERFLOW:MULTIPLE-PRODUCTS
HTTP:OVERFLOW:GSM-SIM-UTILITY
HTTP:OVERFLOW:IRFANVIEW-PLUGIN
HTTP:OVERFLOW:JESKOLA-BUZZ
HTTP:OVERFLOW:ACDSEE-PRO-IMAGE
HTTP:OVERFLOW:CAM2PC
HTTP:OVERFLOW:XNVIEW-IMAGE-FILE
HTTP:OVERFLOW:EXPRESSVIEW
HTTP:OVERFLOW:SIMPLE-WEB-SRV-BO
HTTP:OVERFLOW:MAIL-ENABLE-AUTH
HTTP:OVERFLOW:MISSING-VER-BO
HTTP:OVERFLOW:JANA-PRXY-OF1
HTTP:OVERFLOW:LIBYAML-SCANNER
HTTP:OVERFLOW:MULTIWEB-REQOF
HTTP:OVERFLOW:METHOD-GENRC-OF
HTTP:OVERFLOW:RSA-WEB-OF
HTTP:OVERFLOW:HP-POWERMAN-OF
HTTP:OVERFLOW:MS-HTTP-SERVICES
HTTP:OVERFLOW:SAMBAR-SEARCH
HTTP:OVERFLOW:ACROBATX-HEAP
HTTP:OVERFLOW:ACROBATX-NULL
HTTP:OVERFLOW:OPENVIEW-NNM-BO
HTTP:OVERFLOW:GAZTEK-HTTPD-OF

HTTP:OWA

HTTP:OWA:LOGIN-REDIR

HTTP:PASSWD

HTTP:PASSWD:COMMON

HTTP:PHP

HTTP:PHP:SQUIRRELMAIL-AUTH
HTTP:PHP:CACTI-RRD-AUTH-BYPASS
HTTP:PHP:BZOPEN-OF
HTTP:PHP:FAMILY-CONN-CMS-RCE
HTTP:PHP:WP-GLOBAL-INFO-DISC
HTTP:PHP:PINEAPP-LIVELOG-RCE
HTTP:PHP:SPL-OBJECT-UNSERIALIZE
HTTP:PHP:ALEXPHP-INCLUDE
HTTP:PHP:VBULLETIN-CODE-EXEC
HTTP:PHP:PHPSPLOIT-POSTEXP
HTTP:PHP:COOLFORUM-INJ
HTTP:PHP:GIF-HEADER-EVASION
HTTP:PHP:EXOOPS-FD
HTTP:PHP:FORMMAIL-INCLUDE
HTTP:PHP:WP-XML-RPC-PINGBACK-RQ
HTTP:PHP:FORMMAIL-SCRIPTROOT
HTTP:PHP:PHPRPC-EXEC
HTTP:PHP:MANTIS-ARB-EXEC1
HTTP:PHP:PHPINFO-QUERY
HTTP:PHP:PHPINFO-SERVER
HTTP:PHP:RUNCMS-FILE-UP
HTTP:PHP:ZIPARCHIVE-IO
HTTP:PHP:TIKIWIKI-FORM
HTTP:PHP:PHP-FILE-INCL
HTTP:PHP:ULTIMATE-FUN-BOOK-RFI
HTTP:PHP:WP-INCLUDES-ACCESS
HTTP:PHP:LOKWABB-PRIVM3
HTTP:PHP:PHPPASS-BYPASS
HTTP:PHP:PAGETOOL-SQL-INJ
HTTP:PHP:YABBSE-PKG-EXEC
HTTP:PHP:ACONTENT-AUTH-BYPASS
HTTP:PHP:LOKWABB-PRIVM2
HTTP:PHP:WP-XML-RPC-PINGBACK-PP
HTTP:PHP:LOKWABB-PRIVM
HTTP:PHP:COOLFORUM-SRC-DISC
HTTP:PHP:DFORUM-PHP-INC
HTTP:PHP:DOTBR-PHP-EXEC
HTTP:PHP:PMACHINE-PATH-DISC
HTTP:PHP:CEDRIC-EMAIL-PHPINC2
HTTP:PHP:LOG-INSERT
HTTP:PHP:WORDPRESS-UPLOAD
HTTP:PHP:PHPFORUM-INC
HTTP:PHP:CDF-INFINITE-LOOP-DOS
HTTP:PHP:WP-XMLRPC-BRUTE
HTTP:PHP:JOOMLA-DIR-TRAV
HTTP:PHP:WORDPRESS-SPEED-RCE
HTTP:PHP:MLOG-SCREEN
HTTP:PHP:DOTBR-INFO-LEAK
HTTP:PHP:IBM-PROVENTIA-RFI
HTTP:PHP:SITEMAN-USER
HTTP:PHP:GLOSSWORD-FILE-UPLOAD
HTTP:PHP:GAPICMS-DIRDEPTH-INC
HTTP:PHP:REMOTE-FILE-INCL
HTTP:PHP:QDPM-FILE-UPLOAD
HTTP:PHP:CEDRIC-EMAIL-PHPINC1
HTTP:PHP:PHPMYNEWS-FILE-ACCESS
HTTP:PHP:POSTNUKE-CMD-EXEC
HTTP:PHP:OABOARD-RFI
HTTP:PHP:TAX-DRAWIMAGE-RCE
HTTP:PHP:WEBCAL-INC
HTTP:PHP:CACTI-RDD-LOCAL-SCRIPT
HTTP:PHP:EXIFF-THUMBNAIL-BOF
HTTP:PHP:WP-FOXYPRESS-FILE-UP
HTTP:PHP:MAMBO-PATH-INCL
HTTP:PHP:VWAROOT-INCLUDE
HTTP:PHP:WEBMIN-TARGET
HTTP:PHP:AWSTATS-SORT
HTTP:PHP:WP-MRKPLC-UPLOADIFY
HTTP:PHP:VAMCART-FU
HTTP:PHP:SYM-WG-FILE-UP
HTTP:PHP:PHPROJEKT-INC
HTTP:PHP:OPEN-FLASH-CHART-RCE
HTTP:PHP:MEDIAWIKI-RCE
HTTP:PHP:XODA-FILE-UPLOAD
HTTP:PHP:PHPMYNEWS-INCLUDE
HTTP:PHP:FILE-INCL-DL
HTTP:PHP:WP-DOUPLOAD-FU
HTTP:PHP:WP-README-SCAN
HTTP:PHP:TAR-FILE-PTR
HTTP:PHP:AJAXPLORER-RCE
HTTP:PHP:CMSQLITE-LFI
HTTP:PHP:PHAR-PARSE-TARFILE-ID
HTTP:PHP:PINE-APP-CMD-INJE
HTTP:PHP:WAN-EMULATOR-CE
HTTP:PHP:PACER-CMS-FILE-DELETE1
HTTP:PHP:STUNSHELL-RCE
HTTP:PHP:PINEAPP-CMD-INJ
HTTP:PHP:JOOMLA-COM-PHOCADL-LF1
HTTP:PHP:PHPADSNEW-RFI1
HTTP:PHP:WORDPRESS-SPELCHECK-FI
HTTP:PHP:NARCISSUS-CMD-EXE
HTTP:PHP:SUGARCRM-CE
HTTP:PHP:JOOMLA-LOC-FILE
HTTP:PHP:COMPACTCMS-ENGINE-RFI
HTTP:PHP:PACER-EDITION-CMS-LFI
HTTP:PHP:WP-IS-HUMAN-CMD-INJ
HTTP:PHP:XML-HEAP-MEM-CORR
HTTP:PHP:EXTPLORER-FILE-UPLOAD
HTTP:PHP:WEBSVN-CMD-INJ
HTTP:PHP:PACER-CMS-FILE-DELETE
HTTP:PHP:JOOMLA-XCLONER
HTTP:PHP:PHPSECUREPAGE-RFI4
HTTP:PHP:WORDPRESS-MUL-FL-GAL
HTTP:PHP:WORDPRESS-MUL-GND-ALBM
HTTP:PHP:PACER-EDITION-CMS-LFI1
HTTP:PHP:WEBTESTER-CMD-EXE
HTTP:PHP:PHPSECUREPAGE-RFI3
HTTP:PHP:WORDPRESS-OPS-LFI
HTTP:PHP:BACULA-WEB-REPORT
HTTP:PHP:N-CMS-PAGE-LFI
HTTP:PHP:CONSTRUCTR-CMS-MUL
HTTP:PHP:CMD-COMMAND-EXEC
HTTP:PHP:724CMS-LFI
HTTP:PHP:JOOMLA-FILE-LISTER
HTTP:PHP:TINYWEBGALLERY-LFI
HTTP:PHP:FORMAT-OF
HTTP:PHP:OPENEMR-GLOBALS-AB
HTTP:PHP:HTML-SPCL-CHARS
HTTP:PHP:WP-JQUERY-MEGAMENU-LFI
HTTP:PHP:JOOMLA-ADMIN-SCAN
HTTP:PHP:OSCOMMERCE-ADMIN
HTTP:PHP:MYBB-BACKDOOR
HTTP:PHP:CORE-INT-OF-CE
HTTP:PHP:EXIF-HEADER
HTTP:PHP:PINEAPP-COMMAND-INJ
HTTP:PHP:PROJECTPIER-FILE-UP
HTTP:PHP:WP-GLOBAL-CONT-CE
HTTP:PHP:WHMCS-LFI
HTTP:PHP:SSL-CERT-SEC-BYPASS
HTTP:PHP:PHPESCSHELL
HTTP:PHP:INVISION-IPS-COMM
HTTP:PHP:DRUPAL-RESTWS-CE
HTTP:PHP:VS-NEWS-RFI1
HTTP:PHP:PMACHINE-INCLUDE
HTTP:PHP:EASYPHP-CODETESTER-RCE
HTTP:PHP:AWACTSCRPT-CMS-FILE-UP
HTTP:PHP:CMD-INJ-UA
HTTP:PHP:DRIES-BUYTRT-DRUPAL-ID
HTTP:PHP:CHARTS-RCE
HTTP:PHP:JOOMLA-COM-COLLECTOR
HTTP:PHP:PHPSECUREPAGE-RFI
HTTP:PHP:BITRIX-SITE-MGR-CS
HTTP:PHP:MOODLE-TEX-FILTER-RCE
HTTP:PHP:SCHEDULEIT-RCE
HTTP:PHP:MANTIS-ARB-EXEC2
HTTP:PHP:WP-GRAND-FLASH-ALBUM
HTTP:PHP:WP-GRAND-FLASH
HTTP:PHP:TIKIWIKI-JHOT
HTTP:PHP:PINE-APP-CMD-INJ
HTTP:PHP:ACAL-AUTH-BYPASS
HTTP:PHP:VBULLETIN-IMPEX-INC
HTTP:PHP:BEAUTIFIER-RFI
HTTP:PHP:VS-NEWS-RFI
HTTP:PHP:WP-BRUTE-FORCE-LOGIN
HTTP:PHP:SABDRIMER-RFI
HTTP:PHP:PHP-CGI-CMD-LINE-RCE
HTTP:PHP:WMNEWS-RFI
HTTP:PHP:DBGUESTBOOK-DBSBASE
HTTP:PHP:4IMAGES-RFI
HTTP:PHP:HPE-HPEINC-RFI
HTTP:PHP:WEBID-FILE-DISCLOSURE
HTTP:PHP:CMD-INJ
HTTP:PHP:BITWEAVER-LFI
HTTP:PHP:CAUPOSHOP-LFI
HTTP:PHP:427BB-AUTH-BYPASS
HTTP:PHP:EGROUPWARE-FI
HTTP:PHP:KIETU-HIT-INCLUDE
HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD
HTTP:PHP:XOOPS-BANNERS-LFI
HTTP:PHP:JOOMLA-JOOMTOUCH-LFI
HTTP:PHP:INTERPHOTO-IPLANG-LFI
HTTP:PHP:ZEBRAFEEDS-RFI
HTTP:PHP:FREENEWS-PHP-INC1
HTTP:PHP:REDHAT-PIRANHA-PASSWD
HTTP:PHP:ULTIMATE-PHP-CODE-EXEC
HTTP:PHP:OPEN-EDUCATION-SYS-RFI
HTTP:PHP:STRIP-TAGS-XSS
HTTP:PHP:BHARAT-MEDIARATTA-RFI
HTTP:PHP:WP-WPTOUCH-REDIRECT
HTTP:PHP:WP-ANNOUNCES-RFI
HTTP:PHP:JOOMLA-OBSUGGEST-LFI
HTTP:PHP:JOOMLA-JE-STORY-LFI
HTTP:PHP:JOOMLA-COM-PHOCADL-LFI
HTTP:PHP:JOOMLA-JMSFILESELL-LFI
HTTP:PHP:ZONEMINDER-SERVER-CE
HTTP:PHP:WP-ACF-ABSPATH-RFI
HTTP:PHP:WORDPRESS-WPCUSTOM-LFI
HTTP:PHP:OPENSSL-X509-CERT-MC
HTTP:PHP:PFSENSE-SNORT-INFO-DIS
HTTP:PHP:EXIF-HEADER1
HTTP:PHP:WP-SLIDER-REV-AFD
HTTP:PHP:AKARRU-SOCIAL-RFI
HTTP:PHP:XAMPP-FILE-WRITE
HTTP:PHP:CLAROLINE-INCLUDE
HTTP:PHP:V0PCR3W-WEB-SHELL-RCE
HTTP:PHP:JOOMLA-COM-PHOCADL-LF3
HTTP:PHP:HORDE-HREF-BACKDOOR
HTTP:PHP:YABBSE-PKG-EXEC4
HTTP:PHP:GESTART-RFI
HTTP:PHP:YABBSE-PKG-EXEC7
HTTP:PHP:COOLPHP-DIRTRAV
HTTP:PHP:SYM-WG-FILE-DOWN-DEL
HTTP:PHP:PHPSECUREPAGE-RFI2
HTTP:PHP:YABBSE-PKG-EXEC8
HTTP:PHP:LIBMAGIC-PE-RCE
HTTP:PHP:YABBSE-PKG-EXEC6
HTTP:PHP:CACTI-CONFIG-INC
HTTP:PHP:CACTI-RRD-FILE-INC
HTTP:PHP:YABBSE-PKG-EXEC5
HTTP:PHP:EXIF-NULL-DEREFERENCE
HTTP:PHP:WP-FILE-UPLOAD
HTTP:PHP:WP-PROPERTY-RCE
HTTP:PHP:SPHPBLOG-PW-DOWNLOAD
HTTP:PHP:PHP-CORE-UAF
HTTP:PHP:FILEINFO-DOS
HTTP:PHP:OPENI-CMS-RFI
HTTP:PHP:LIBMAGIC-CDF-FILE-DOS
HTTP:PHP:JOOMLA-PHP-OBJ-INJ
HTTP:PHP:REDHAT-PIRANHA-PASSWD1
HTTP:PHP:PHPSECUREPAGE-RFI7
HTTP:PHP:PHPSECUREPAGE-RFI5
HTTP:PHP:OPEN-REALITY-XSS-SQLI
HTTP:PHP:RAXNET-CACTI-RCE
HTTP:PHP:SYM-GW-LFI
HTTP:PHP:PHPSECUREPAGE-RFI9
HTTP:PHP:PHPSECUREPAGE-RFI8
HTTP:PHP:FTP-GENLIST-ACE
HTTP:PHP:APACHE-RQST-HEADER-BO
HTTP:PHP:SQUIRRELMAIL-AUTH1
HTTP:PHP:REGISTER-VARIABLE-CE
HTTP:PHP:HORDE-HREF-BACKDOOR1
HTTP:PHP:YABBSE-PKG-EXEC1
HTTP:PHP:WP-SIMPLE-ADS-MGR-MUL
HTTP:PHP:SYMC-WEB-CMD-INJ
HTTP:PHP:PHPBOOK-CODE-INJECTION
HTTP:PHP:EMPIRE-CMS-RFI
HTTP:PHP:SEARCHBLOX-REQ-ID
HTTP:PHP:ARDEACORE-RFI
HTTP:PHP:FLASHCHAT-RFI
HTTP:PHP:GLOBALS-INJ
HTTP:PHP:YABBSE-PKG-EXEC9
HTTP:PHP:YABBSE-PKG-EXEC2
HTTP:PHP:YABBSE-PKG-EXEC3
HTTP:PHP:FTP-GENLIST-IO
HTTP:PHP:PHPSECUREPAGE-RFI6
HTTP:PHP:GHOST-GLIBC-WP
HTTP:PHP:COPPERMINE-RCE
HTTP:PHP:PHPWEB-REMOTE-FILE
HTTP:PHP:MEMORY-LIMIT-CE
HTTP:PHP:HORDE-EVAL
HTTP:PHP:SQUIRRELMAIL
HTTP:PHP:TSEP-COLORSWITCH-RFI
HTTP:PHP:BLACKBOARD-INC
HTTP:PHP:CVE-2015-2331-BO
HTTP:PHP:YABBSE-SSI-INCLUDE
HTTP:PHP:JOOMLA-COM-PHOCADL-LF2
HTTP:PHP:JOOMLA-COM-PHOCADL-LF4
HTTP:PHP:PHPSECUREPAGE-RFI1
HTTP:PHP:MYSQL-COMMANDER-RFI
HTTP:PHP:PHPZIPURL
HTTP:PHP:BASE-RFI
HTTP:PHP:WOLTAB-SQL-INJ
HTTP:PHP:MIDICART-DB
HTTP:PHP:AINS-AD-FUNDUM-RFI
HTTP:PHP:ACGVCLICK-RFI
HTTP:PHP:MYNEWSGROUPS-RFI
HTTP:PHP:DBGUESTBOOK-DBSBASE1
HTTP:PHP:PHPLIB-REMOTE-EXEC
HTTP:PHP:ESF-PFSENSE-COM-INJ
HTTP:PHP:PHP-XML-CMD
HTTP:PHP:PHP-QUOT-PRINT-ENCODE
HTTP:PHP:SDNTOJEWISH-FUNC-OF
HTTP:PHP:WORDPRESS-USER-INJ
HTTP:PHP:PHP-NEWS-FILE-INC
HTTP:PHP:BASILIC-CMD-EXE
HTTP:PHP:FREE-FILE-HOSTING-RFI
HTTP:PHP:PHAR_SET_INODE-FUNC-BO
HTTP:PHP:DATEINTERVAL-DOS
HTTP:PHP:NUUO-DBGCMD-INJECTION
HTTP:PHP:MEDIAWIKI-SCRIPT-INSER
HTTP:PHP:INVISION-IPBOARD-CE
HTTP:PHP:ACTIVIST-BASE-RFI
HTTP:PHP:EXPLOIT-KIT-ACTIV
HTTP:PHP:UPLOAD-LOCATION
HTTP:PHP:EXIF-HEADER-INT-OF
HTTP:PHP:NETWORK-WEATHERMAP-LFI
HTTP:PHP:SYM-WG-IPCHANG
HTTP:PHP:PODCAST-FILE-INCL
HTTP:PHP:FORM-DOS
HTTP:PHP:EXIF-NULL-PTR-DEREF
HTTP:PHP:WORDPRESS-COOKIE-INJ
HTTP:PHP:TIKIWIKI-CMD-EXEC
HTTP:PHP:PHP-CAL-FILE-INC
HTTP:PHP:SILENT-STORM-ADMIN
HTTP:PHP:ULTIMATE-PHP-BOARD
HTTP:PHP:SAVEWEB-PORTAL-RFI
HTTP:PHP:SITE-ASSISTANT-RFI

HTTP:PHP:GALLERY

HTTP:PHP:GALLERY:EMBED-AUTH
HTTP:PHP:GALLERY:EMBED-AUTH-VAR
HTTP:PHP:GALLERY:HTTP-VARS

HTTP:PHP:PHORUM

HTTP:PHP:PHORUM:READ-ACCESS
HTTP:PHP:PHORUM:RESPONSE-SPLIT
HTTP:PHP:PHORUM:REMOTE-EXEC
HTTP:PHP:PHORUM:ADMIN-PW-CHG

HTTP:PHP:PHPBB

HTTP:PHP:PHPBB:DL-SQL-INJ
HTTP:PHP:PHPBB:PM-SQL-USER
HTTP:PHP:PHPBB:SEARCH-DOS
HTTP:PHP:PHPBB:PROFILE-ADD-DOS
HTTP:PHP:PHPBB:LANG-EXEC
HTTP:PHP:PHPBB:UID-SQL-INJECT
HTTP:PHP:PHPBB:SELECT-FISH
HTTP:PHP:PHPBB:PROOTPATH-INJ
HTTP:PHP:PHPBB:PRIV-DEL
HTTP:PHP:PHPBB:SEARCH-INJECT
HTTP:PHP:PHPBB:AVATAR-PATH-INC
HTTP:PHP:PHPBB:UID-SQL-INJECT1
HTTP:PHP:PHPBB:AVATAR-UPLOAD
HTTP:PHP:PHPBB:AUTH-BYPASS
HTTP:PHP:PHPBB:HIGHLIGHT-EXEC

HTTP:PHP:PHPMYADMIN

HTTP:PHP:PHPMYADMIN:BACKDOOR-CE
HTTP:PHP:PHPMYADMIN:SVR-PARAM
HTTP:PHP:PHPMYADMIN:FMT-OPTION
HTTP:PHP:PHPMYADMIN:SERVERDB
HTTP:PHP:PHPMYADMIN:SETUP-SCAN
HTTP:PHP:PHPMYADMIN:GOTO-RFI
HTTP:PHP:PHPMYADMIN:LOCALFILE
HTTP:PHP:PHPMYADMIN:PREG-REPLAC
HTTP:PHP:PHPMYADMIN:SVR-PARAM1

HTTP:PHP:PHPNEWS

HTTP:PHP:PHPNEWS:SQL-SENDTO

HTTP:PHP:PHPNUKE

HTTP:PHP:PHPNUKE:PRIV-ESC
HTTP:PHP:PHPNUKE:VIEWADMIN
HTTP:PHP:PHPNUKE:DELADMIN
HTTP:PHP:PHPNUKE:SID-SQL-INJECT
HTTP:PHP:PHPNUKE:QR-SQL-INJECT
HTTP:PHP:PHPNUKE:BOOKMARK-SQL
HTTP:PHP:PHPNUKE:PATH-DISC1
HTTP:PHP:PHPNUKE:PATH-DISC2
HTTP:PHP:PHPNUKE:ADMIN-GUESS
HTTP:PHP:PHPNUKE:CID-SQL-INJECT
HTTP:PHP:PHPNUKE:DOWNLD-SQL-INJ
HTTP:PHP:PHPNUKE:MODULES-DOS
HTTP:PHP:PHPNUKE:4NALBUM-INC

HTTP:PHP:THATWARE

HTTP:PHP:THATWARE:THATFILE-INC
HTTP:PHP:THATWARE:ARTLIST-INC
HTTP:PHP:THATWARE:CONFIG-INC
HTTP:PHP:THATWARE:AUTH-INC

HTTP:PKG

HTTP:PKG:CART32-CLI-DIS
HTTP:PKG:VWALL-FTPSAV-DLL
HTTP:PKG:EWAVE-SERVLET-DOS
HTTP:PKG:EZMALL-LOG-ORDER-ACCSS
HTTP:PKG:OFFICESCAN-JDKRQNOTIFY
HTTP:PKG:DNSTOOLS-AUTH-BYPASS
HTTP:PKG:TUXEDO-DOS
HTTP:PKG:MOUNTAIN-WEBCART-DISC
HTTP:PKG:ANACONDA-DIR-TRAVERSAL
HTTP:PKG:WEBGAIS-REMOTE-EXEC
HTTP:PKG:WEBMIN-FAKE-SESSION
HTTP:PKG:ALLAIRE-JRUN-DOS
HTTP:PKG:WEBMIN-SHOWCGI-CMDEXEC
HTTP:PKG:SALESLOGIC-UNAUTH-ADMN
HTTP:PKG:SUPERSCOUT-USERLIST
HTTP:PKG:DB4WEB-FILE-ACCESS
HTTP:PKG:TUXEDO-INIFILE
HTTP:PKG:CARELLO-VBEXEC
HTTP:PKG:ICQ-WEBFRONT-DOS-2
HTTP:PKG:WEBMIN-BRUTE
HTTP:PKG:WEBMIN-FILEDISC
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-1
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-2
HTTP:PKG:MS-JET-VBA
HTTP:PKG:CART32-ADM-PW-CHG
HTTP:PKG:SALESLOGIX-AUTH-BYPASS

HTTP:PROXY

HTTP:PROXY:SQUID-ESI-BO
HTTP:PROXY:SQUID-AT-AT
HTTP:PROXY:HTTP-PROXY-GET
HTTP:PROXY:CAW-URI-RES
HTTP:PROXY:SQUID-CACHE-UPDATE
HTTP:PROXY:PSOPROXY-OF
HTTP:PROXY:SQUID-TRACE
HTTP:PROXY:SQUID-DOS
HTTP:PROXY:WINGATE-OF
HTTP:PROXY:SQUID-RES-DOS
HTTP:PROXY:SQUID-STRLISTGETITEM
HTTP:PROXY:SQUID-FTP
HTTP:PROXY:SQUID-SQSN-HDR-POISN
HTTP:PROXY:SQUID-NTLM-OF
HTTP:PROXY:WPAD-CONNECTION
HTTP:PROXY:SQUID-NULL-PTR
HTTP:PROXY:SQUID-PROXY-ESI-DOS
HTTP:PROXY:PROXYPRO-GET

HTTP:PROXY:ANON

HTTP:PROXY:ANON:CGIPROXY
HTTP:PROXY:ANON:CONCEAL-WS
HTTP:PROXY:ANON:PROXY-2
HTTP:PROXY:ANON:PROXY-1
HTTP:PROXY:ANON:FOXY-FILTER
HTTP:PROXY:ANON:PHPROXY

HTTP:PROXY:LIST

HTTP:PROXY:LIST:PROXYFIND
HTTP:PROXY:LIST:PUBWEBPROXIES

HTTP:REQERR

HTTP:REQERR:REQ-INVALID-FORMAT
HTTP:REQERR:REQ-MISSING-HOST
HTTP:REQERR:DOUBLE-ENCODE
HTTP:REQERR:REQ-MALFORMED-URL
HTTP:REQERR:BIN-DATA-CONT-LOC
HTTP:REQERR:BIN-DATA-ACC-ENC
HTTP:REQERR:FS-HOST
HTTP:REQERR:BIN-DATA-CONT-LANG
HTTP:REQERR:BIN-DATA-CONT-ENC
HTTP:REQERR:BIN-DATA-ACCEPT
HTTP:REQERR:HEADER-INJECT
HTTP:REQERR:BIN-DATA-AUTH
HTTP:REQERR:NULL-IN-HEADER
HTTP:REQERR:MALFORMED-AUTH
HTTP:REQERR:INV-HTTP-VERSION
HTTP:REQERR:URL-LF-CR
HTTP:REQERR:POST-MISSING-DATA
HTTP:REQERR:INV-IPV6-HOST-HDR
HTTP:REQERR:URL-VAR-FS
HTTP:REQERR:BIN-DATA-HEADER
HTTP:REQERR:REQ-INJECTION

HTTP:SAVANT

HTTP:SAVANT:GET-PERCENT
HTTP:SAVANT:GET-DOT1

HTTP:SQL

HTTP:SQL:NOVEL-ZENWORKS
HTTP:SQL:NOVELL-ZENWORKS
HTTP:SQL:HEADER-CON-DISPOSITION

HTTP:SQL:INJ

HTTP:SQL:INJ:MANGENG-SYNCMONITR
HTTP:SQL:INJ:IS_SRVROLEMEMBER
HTTP:SQL:INJ:JOOMLA-FOTO
HTTP:SQL:INJ:JOOMLA-AVRELOADED
HTTP:SQL:INJ:OSCOM
HTTP:SQL:INJ:JOOMLA-COMHOSPITAL
HTTP:SQL:INJ:JOOMLA-NEWSSEARCH
HTTP:SQL:INJ:JOOMLA-CBCONTACT
HTTP:SQL:INJ:JOOMLA-CONTROLLER
HTTP:SQL:INJ:TOLINET-AGENCIA-ID
HTTP:SQL:INJ:HEADER-3
HTTP:SQL:INJ:HEADER-2
HTTP:SQL:INJ:SFX-SQLI
HTTP:SQL:INJ:WAITFOR-DELAY
HTTP:SQL:INJ:SYNERGY-SW
HTTP:SQL:INJ:HTTP-REQ-HDR-1
HTTP:SQL:INJ:PHPTOPSITES
HTTP:SQL:INJ:MYSHOP
HTTP:SQL:INJ:FACTO-CMS
HTTP:SQL:INJ:JOOMLA-COMTEAM1
HTTP:SQL:INJ:PANGOLIN
HTTP:SQL:INJ:AUTHID
HTTP:SQL:INJ:TIVOLI-USER-UPDATE
HTTP:SQL:INJ:CONVERT-INJ-OF
HTTP:SQL:INJ:SQLMAP-ACTIVITY
HTTP:SQL:INJ:IMP
HTTP:SQL:INJ:YABSOFT-GALLERY-ID
HTTP:SQL:INJ:OMNISTAR-MAILER
HTTP:SQL:INJ:AUTO-TRANS
HTTP:SQL:INJ:SYMC-BLOCKED-PHP
HTTP:SQL:INJ:JOOMLA-COM-JCE
HTTP:SQL:INJ:SINAPSI-ESOLAR
HTTP:SQL:INJ:WP-AJAX-CATEGORY9
HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM
HTTP:SQL:INJ:MAIAN-WEBLOG
HTTP:SQL:INJ:JOOMLA-FILTERORDER
HTTP:SQL:INJ:MNG-ENG-SECMNG-PLS
HTTP:SQL:INJ:WP-AJAX-CATEGORY8
HTTP:SQL:INJ:WP-UNIVERSAL-POST
HTTP:SQL:INJ:OVERSIZE-STATEMENT
HTTP:SQL:INJ:JOOMLA-COMTEAM
HTTP:SQL:INJ:MAMBO-COM-DOCMAN
HTTP:SQL:INJ:WP-MEDIA-LIBRARY
HTTP:SQL:INJ:JOOMLA-MAPLOCATOR
HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK
HTTP:SQL:INJ:JOOMLA-RESTAURANTE
HTTP:SQL:INJ:JOOMLA-CALCBUILDER
HTTP:SQL:INJ:JOOMLA-COM-SHOP
HTTP:SQL:INJ:CA-TOTAL-DEFENSE
HTTP:SQL:INJ:WP-SERMON-BROWSER
HTTP:SQL:INJ:GLOBAL-VAR
HTTP:SQL:INJ:4IMAGES-DETAIL-PHP
HTTP:SQL:INJ:JOOSTINA
HTTP:SQL:INJ:WP-STARSRATEBOX
HTTP:SQL:INJ:KUBELABS-PHPDUG
HTTP:SQL:INJ:TEDE-SIMPLIFICADO
HTTP:SQL:INJ:JOOMLA-QUESTION
HTTP:SQL:INJ:JOOMLA-ALLCINEVID
HTTP:SQL:INJ:JOOMLA-JUICY-PICID
HTTP:SQL:INJ:JOOMLA-FAQ-BOOK
HTTP:SQL:INJ:MANAGENGINE-SRC
HTTP:SQL:INJ:MANAGENGINE-JSON
HTTP:SQL:INJ:JOOMLA-COM-CLAN
HTTP:SQL:INJ:WORDPRESS-WP-FRM
HTTP:SQL:INJ:COVER-VISION-ID
HTTP:SQL:INJ:WP-SYMPOSIUM
HTTP:SQL:INJ:DH-MLM-LOGIN-PHP
HTTP:SQL:INJ:S9Y-SERENDIPITY2
HTTP:SQL:INJ:MYSCHOOL
HTTP:SQL:INJ:SYNDEO-CMS-USRNAME
HTTP:SQL:INJ:NULLBYTE-COMMENT
HTTP:SQL:INJ:HAVIJ-UA
HTTP:SQL:INJ:WP-ECOMMERCE
HTTP:SQL:INJ:S9Y-SERENDIPITY3
HTTP:SQL:INJ:WP-PHOTORACER
HTTP:SQL:INJ:CHAR-ENCODE
HTTP:SQL:INJ:USER-ADD
HTTP:SQL:INJ:CHAR
HTTP:SQL:INJ:MS-SQL-TABLE-NAME
HTTP:SQL:INJ:WP-AJAX-CATEGORY
HTTP:SQL:INJ:MS-SQL-FUNCTIONS
HTTP:SQL:INJ:UNION-SELECT
HTTP:SQL:INJ:COMPARISON
HTTP:SQL:INJ:POSTNUKE
HTTP:SQL:INJ:WP-MULTIPLE
HTTP:SQL:INJ:DECLARE-EXEC
HTTP:SQL:INJ:INTO-OUTFILE
HTTP:SQL:INJ:CA-EXPORTREPORT
HTTP:SQL:INJ:HEADER-REFERRER
HTTP:SQL:INJ:JOOMLA-MORFEOSHOW
HTTP:SQL:INJ:JOOMLA-COM-CCBOARD
HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL
HTTP:SQL:INJ:F5-BIGIP-11.2.0
HTTP:SQL:INJ:NULL-NULL-NULL
HTTP:SQL:INJ:CONVERT
HTTP:SQL:INJ:HEADER-1
HTTP:SQL:INJ:HEADER-COOKIE
HTTP:SQL:INJ:JOOMLA-VIRTUEMART
HTTP:SQL:INJ:SLRWINDS-STORG-MGR
HTTP:SQL:INJ:PL-SQL
HTTP:SQL:INJ:XPCMDSHELL
HTTP:SQL:INJ:WP-EVENTS-MGR
HTTP:SQL:INJ:DELL-SONICWALL
HTTP:SQL:INJ:AGENT-ADMIN
HTTP:SQL:INJ:MYSQL-PRIV-ESCAL
HTTP:SQL:INJ:BIT5-BLOG
HTTP:SQL:INJ:VERSION-DETECT
HTTP:SQL:INJ:SYMANTEC-IM
HTTP:SQL:INJ:S9Y-SERENDIPITY
HTTP:SQL:INJ:ORACLE-WEBCENTER
HTTP:SQL:INJ:SLASH-STAR
HTTP:SQL:INJ:VENOM-BOARD
HTTP:SQL:INJ:WP-SUPER-CAPTCHA
HTTP:SQL:INJ:WP-GD-STAR-RATING
HTTP:SQL:INJ:WEBID-BLIND-SQL
HTTP:SQL:INJ:COMMENT
HTTP:SQL:INJ:EXEC-MASTER
HTTP:SQL:INJ:WP-FBCONNECTOR
HTTP:SQL:INJ:SCOZNET-ADMINNAME
HTTP:SQL:INJ:JOOMLA-AD-DJ
HTTP:SQL:INJ:ACCEPT-LANG-HDR-3
HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY
HTTP:SQL:INJ:SYSOBJECTS
HTTP:SQL:INJ:MYSQL-BINLOG-DOS
HTTP:SQL:INJ:MYSQL-TABLE-NAME
HTTP:SQL:INJ:WP-AJAX-CATEGORY5
HTTP:SQL:INJ:FORUM-LIVRE
HTTP:SQL:INJ:MANAGEENGINER-RCE
HTTP:SQL:INJ:ALTER-MYSQL
HTTP:SQL:INJ:MANAGE-ENGINE-SM
HTTP:SQL:INJ:OPMNGR-AGENT-SQL
HTTP:SQL:INJ:SELECT-SUB-DOS
HTTP:SQL:INJ:WP-AJAX-CATEGORY6
HTTP:SQL:INJ:CMD-CHAIN-1
HTTP:SQL:INJ:UA-HDR-2
HTTP:SQL:INJ:ACCEPT-HDR-2
HTTP:SQL:INJ:CONT-TYPE-HDR-3
HTTP:SQL:INJ:ACCEPT-HDR-1
HTTP:SQL:INJ:REFERER-HDR-3
HTTP:SQL:INJ:ACCEPT-LANG-HDR-1
HTTP:SQL:INJ:CONT-MD5-HDR-2
HTTP:SQL:INJ:CONT-MD5-HDR-1
HTTP:SQL:INJ:REQ-URL-3
HTTP:SQL:INJ:CONT-MD5-HDR-3
HTTP:SQL:INJ:HTTP-HOST-HDR-1
HTTP:SQL:INJ:REQ-VAR-3
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-3
HTTP:SQL:INJ:REFERER-HDR-2
HTTP:SQL:INJ:ACCEPT-LANG-HDR-2
HTTP:SQL:INJ:REQ-URL-2
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-1
HTTP:SQL:INJ:CONT-TYPE-HDR-2
HTTP:SQL:INJ:REQ-URL-1
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-2
HTTP:SQL:INJ:UA-HDR-1
HTTP:SQL:INJ:MULTI-VENDORS-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-1
HTTP:SQL:INJ:UA-HDR-3
HTTP:SQL:INJ:HTTP-HOST-HDR-2
HTTP:SQL:INJ:COOKIE-HDR-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-3
HTTP:SQL:INJ:PARALLEL-PLESK
HTTP:SQL:INJ:CONT-TYPE-HDR-1
HTTP:SQL:INJ:RESPONSE-PAGE
HTTP:SQL:INJ:REFERER-HDR-1
HTTP:SQL:INJ:HTTP-HOST-HDR-3
HTTP:SQL:INJ:HTTP-REQ-HDR-2
HTTP:SQL:INJ:COOKIE-HDR-3
HTTP:SQL:INJ:HTTP-REQ-HDR-3
HTTP:SQL:INJ:REQ-VAR-2
HTTP:SQL:INJ:COOKIE-HDR-1
HTTP:SQL:INJ:ACCEPT-HDR-3
HTTP:SQL:INJ:CONCAT-FUNC-CALL
HTTP:SQL:INJ:ASCII-FUNC-CALL
HTTP:SQL:INJ:SELECT-CONCAT-STAT
HTTP:SQL:INJ:SOLARWINDS
HTTP:SQL:INJ:CHR-FUNC-CALL
HTTP:SQL:INJ:HP-LOADR-GETREPORT
HTTP:SQL:INJ:WP-AJAX-CATEGORY3
HTTP:SQL:INJ:CONCAT
HTTP:SQL:INJ:PROC-GENERIC
HTTP:SQL:INJ:REQ-VAR-1
HTTP:SQL:INJ:AND-NUMBER-EQUALS
HTTP:SQL:INJ:TIVOLI-USER-UPDAT1
HTTP:SQL:INJ:WP-AJAX-CATEGORY7
HTTP:SQL:INJ:CMD-IN-URL
HTTP:SQL:INJ:WP-AJAX-CATEGORY2
HTTP:SQL:INJ:TOLINET-AGNCIA-I11
HTTP:SQL:INJ:OMNISTAR-MAILER1
HTTP:SQL:INJ:WP-SQL
HTTP:SQL:INJ:GENERIC
HTTP:SQL:INJ:S9Y-SERENDIPITY1
HTTP:SQL:INJ:WP-AJAX-CATEGORY1
HTTP:SQL:INJ:JOOMLA-COM-JCE1
HTTP:SQL:INJ:CISCO-UCM
HTTP:SQL:INJ:MANAGENGINE-IT360
HTTP:SQL:INJ:MANAGENGINE-RUNQRY
HTTP:SQL:INJ:WS2000
HTTP:SQL:INJ:S9Y-SERENDIPITY4
HTTP:SQL:INJ:VERSION-DETECT1
HTTP:SQL:INJ:WP-AJAX-CATEGORY4
HTTP:SQL:INJ:ACTIVECAMPAIGN
HTTP:SQL:INJ:CA-TOTAL-UNCWS
HTTP:SQL:INJ:BIZTALK
HTTP:SQL:INJ:INSERT-VALUES
HTTP:SQL:INJ:DRUPAL-DATABASE
HTTP:SQL:INJ:ADMENTOR-ADMIN
HTTP:SQL:INJ:MANAGENGINE-OPMANG
HTTP:SQL:INJ:BTTLXEFORUM
HTTP:SQL:INJ:MERCURY-UA
HTTP:SQL:INJ:SOLARWINDS-SQL-INJ
HTTP:SQL:INJ:RUBY-ON-RAILS
HTTP:SQL:INJ:REQ-VAR-4
HTTP:SQL:INJ:WORD-CIRCLE-SQL
HTTP:SQL:INJ:MULTI-VENDORS-1
HTTP:SQL:INJ:CMD-CHAIN-2
HTTP:SQL:INJ:WORDPRESS-ID
HTTP:SQL:INJ:IISPROTECT
HTTP:SQL:INJ:REMOTE-EXEC
HTTP:SQL:INJ:L-FORUM

HTTP:STC

HTTP:STC:ACUNETIX-EXT-DOMAIN-BO
HTTP:STC:MPG123-STEREO-OF
HTTP:STC:SYMANTEC-AV-STACK
HTTP:STC:CVE-2016-0184-RCE
HTTP:STC:CVE-2014-6332-ARRAYS
HTTP:STC:EVIL-REDIRECTOR
HTTP:STC:LOTUS-CAI-URI
HTTP:STC:CVE-2015-2507-CE
HTTP:STC:CVE-2015-6175-PE
HTTP:STC:CVE-2015-6171-PE
HTTP:STC:CVE-2015-2524-PE
HTTP:STC:NTP-DECODENETNUM-AF
HTTP:STC:CVE-2016-0124-RCE
HTTP:STC:X11-OVERSIZE-FONT
HTTP:STC:WMP-AU-DOS
HTTP:STC:CVE-2016-0123-RCE
HTTP:STC:DNAME-RRSIG-DOS
HTTP:STC:CVE-2015-6174-PE
HTTP:STC:CVE-2015-6160-CE
HTTP:STC:MS-CVE-2015-2527-CE
HTTP:STC:CVE-2015-2528-PE
HTTP:STC:MS-VISUALSTUD-BOF
HTTP:STC:CVE-2016-3246-RCE
HTTP:STC:CVE-2016-3244-MC
HTTP:STC:BLACKBERRY-SVR-DOS
HTTP:STC:HEX-OBFUS-PERCENT-ENC
HTTP:STC:CVE-2016-3250-DOS
HTTP:STC:CVE-2015-2484-FD
HTTP:STC:CVE-2015-2545-UAF
HTTP:STC:CACHETIME
HTTP:STC:CVE-2016-3274-REDIR
HTTP:STC:ADVANTECH-WEBACCESS
HTTP:STC:AUTODESK-GIF-BO
HTTP:STC:XMPLAY-ASX
HTTP:STC:IBM-IIM-URI-EXEC
HTTP:STC:AV-MAGIC-EVADE
HTTP:STC:CVE-2015-6164-CSS
HTTP:STC:CVE-2015-6140-CE
HTTP:STC:CVE-2016-0061-CE
HTTP:STC:CVE-2016-0033-DOS
HTTP:STC:EDGE-CVE-2016-3264-CE
HTTP:STC:JSXX-OBFS-JS
HTTP:STC:OSX-UPDATE
HTTP:STC:SKYPE4COM
HTTP:STC:CVE-2015-2513-RCE
HTTP:STC:RPM-CPIO-HDR-BOF
HTTP:STC:HEADER-UTF7
HTTP:STC:FILE-UTF7
HTTP:STC:OBJ-FILE-BASE64
HTTP:STC:APPLE-MIME-TYPE-BOF
HTTP:STC:CVE-2016-0147-CE
HTTP:STC:CVE-2016-0157-RCE
HTTP:STC:CVE-2016-0158-UXSS
HTTP:STC:SYMC-RARENGINE-RCE
HTTP:STC:CHAR-CONFLICT
HTTP:STC:INTERWOVEN-WORKDOC-XSS
HTTP:STC:CVE-2016-0024-RCE
HTTP:STC:GOOGLE-APP-MAILTO
HTTP:STC:REPRISE-PARAM-PARSE-BO
HTTP:STC:CVE-2015-6066-UAF
HTTP:STC:CVE-2016-0155-RCE
HTTP:STC:MALFORMED-RESPONSE1
HTTP:STC:DOTNET-FRAMEWORK-RCE
HTTP:STC:CVE-2016-0161-RCE
HTTP:STC:WINDOWS-FAX-COVER
HTTP:STC:DIRECT-AVI-WAV-PARSE-1
HTTP:STC:FIREPHP-COMMAND-EXEC
HTTP:STC:MS-FOREFRONT-RCE
HTTP:STC:HIDDEN-IFRAME
HTTP:STC:DAVREDIR
HTTP:STC:SUSPICIOUS-JS-FUNC
HTTP:STC:DOTNET-BUFF-ALLOC4
HTTP:STC:CSS-STATUS-BAR-SPOOF1
HTTP:STC:DOT-NET-ARRAY-RCE
HTTP:STC:MS-WINDOWS-FILE-BOF
HTTP:STC:WIN32KSYS-MEM
HTTP:STC:ITUNES-HANDLER-OF
HTTP:STC:RESIZE-DOS
HTTP:STC:MS-OFFICE-WRITEAV-RCE
HTTP:STC:CVE-2016-0012-MC
HTTP:STC:ITUNES-PL
HTTP:STC:HHP-PARA-OF
HTTP:STC:OLE-SHELL1
HTTP:STC:M3U-VLC-SMB-LINK
HTTP:STC:SEARCH-LINK
HTTP:STC:SCHNEIDER-CFG-FILE-BO1
HTTP:STC:EVIL-JAVASCRIPT-INJECT
HTTP:STC:ENCODED-DOC-WRITE
HTTP:STC:SUSPICIOUS-WEB-SERVER
HTTP:STC:CVE-2015-6143-CE
HTTP:STC:APPLE-MUL-KERNEL-DOS
HTTP:STC:SUSPICIOUS-HYD
HTTP:STC:DOTNET-BUFF-ALLOC3
HTTP:STC:APPENDED-MAL-JS
HTTP:STC:DOTNET-BUFF-ALLOC2
HTTP:STC:DIRECTSHOW-AVI-EXEC1
HTTP:STC:SUSPICIOUS-JS-ALPHA
HTTP:STC:HIDDEN-IFRAME-2
HTTP:STC:SUSPICIOUS-JS-EVASION
HTTP:STC:CVE-2015-0058-PRIV
HTTP:STC:BROWSER-FLOAT-STYLE-MC
HTTP:STC:GNU-ARBITRARY-FILE
HTTP:STC:WIN-SHELLHNDL1
HTTP:STC:CVE-2015-2554-PE
HTTP:STC:JS-DATA-SCHEME
HTTP:STC:CSS-STATUS-BAR-SPOOF
HTTP:STC:WIN-SHELLHNDL
HTTP:STC:CVE-2015-6135-CE
HTTP:STC:CVE-2015-6168-RCE
HTTP:STC:SILVERLIGHT-MEM-CORR
HTTP:STC:CVE-2015-6049-CE
HTTP:STC:ADVANTEC-WEBACSES-BOF
HTTP:STC:VAR-EQUALS-REDIRECT
HTTP:STC:DOTNET-BUFF-ALLOC6
HTTP:STC:DOTNET-BUFF-ALLOC8
HTTP:STC:WMF-FILE-DOS
HTTP:STC:DOTNET-BUFF-ALLOC5
HTTP:STC:DOTNET-BUFF-ALLOC7
HTTP:STC:FILE-UPLOAD
HTTP:STC:MS-WORD-INDEX-MC
HTTP:STC:ADVANTEC-INP-PARAM-RCE
HTTP:STC:SKYPE-URI-HANDLER
HTTP:STC:WINHELP32-MSGBOX-RCE
HTTP:STC:MS-JSCRIPT-ENGINE-RCE
HTTP:STC:DOTNET-BUFF-ALLOC9
HTTP:STC:DOUBLE-ENC-DEAN-EDW
HTTP:STC:MS-DOTNET-NAMESPACE-BO
HTTP:STC:MS-DIRECTSHOW-GIF-RCE
HTTP:STC:MHTML-CDI
HTTP:STC:GOOGLE-SKETCHUP-PICT
HTTP:STC:WEBEX-WRF-BOF
HTTP:STC:FF-SRIALIZE-STREAM-UAF
HTTP:STC:PAJAX-RCE
HTTP:STC:DATA-SCHEME
HTTP:STC:RHINO-HDR-OF
HTTP:STC:MS-FRONTPAGE-INFO-DISC
HTTP:STC:VLC-ABC-HOVF
HTTP:STC:WEBKIT-FLOAT-TYPE-RCE
HTTP:STC:OLE-AUTO-RCE
HTTP:STC:CVE-2015-0062-PRIV
HTTP:STC:GOOGLE-CHROME-UAF
HTTP:STC:CPTEXIMG2D-IO
HTTP:STC:CVE-2015-6130-CE
HTTP:STC:CANVAS-BABYBOTTLE-GZIP
HTTP:STC:QT-RTSP-LINK-OF
HTTP:STC:DOTNET-SERIALIZATION
HTTP:STC:MS-WIN-JPEG-PARSE-IDIS
HTTP:STC:OLE-SHELL
HTTP:STC:DOTNET-BUFF-ALLOC
HTTP:STC:NOVEL-CLIENT-NMX-BOF
HTTP:STC:CVE-2016-0051-DOS
HTTP:STC:MSA-SPOOF
HTTP:STC:DESKTOP-INI-CODE-EXE
HTTP:STC:DOT-NET-RCE
HTTP:STC:GIT-CLIENT-CE
HTTP:STC:HHP-BINARY
HTTP:STC:CVE-2016-0058-RCE
HTTP:STC:CVE-2015-1724-BO
HTTP:STC:SAP-SQL-ALIAS-BOF
HTTP:STC:PHP-DATE-TIME-OBJ-RCE
HTTP:STC:ABOUT-JAVASCRIPT
HTTP:STC:SCHNEIDER-CFG-FILE-BO
HTTP:STC:TOMCAT-CHUNKED-REQ-DOS
HTTP:STC:M3U-VLC-SMB-LINK-1
HTTP:STC:MCAFEE-FILE-NAME-OF
HTTP:STC:MSXML-CVE-2015-1646-SB
HTTP:STC:CLAMAV-UPX-DECODE-DOS
HTTP:STC:CVE-2015-1677-ID
HTTP:STC:CVE-2015-1699-RCE
HTTP:STC:FOXIT-GOTOR-BO
HTTP:STC:SILVERLIGHT-RCE
HTTP:STC:APPLE-QUICKTIME-CE
HTTP:STC:IE-INDEX
HTTP:STC:MS-XML-RCE
HTTP:STC:EMBED-SRC-OF
HTTP:STC:MS-OFFICE-WRITEAV-RCE1
HTTP:STC:CVE-2015-6103-RCE
HTTP:STC:CVE-2015-1722-KERNL-PE
HTTP:STC:MS-CVE-2014-4121-RCE
HTTP:STC:CVE-2015-1768-PE
HTTP:STC:CVE-2015-1727-RCE
HTTP:STC:CVE-2015-1723-CE
HTTP:STC:NOTES-INI
HTTP:STC:MIRC-URI-OF
HTTP:STC:URI-INJ
HTTP:STC:CVE-2016-0038-RCE
HTTP:STC:FAX-COVER-MC
HTTP:STC:SILVERLIGHT-INFO-DISC
HTTP:STC:MS-OBJ-PACKAGER
HTTP:STC:SAFARI-IE-RCE
HTTP:STC:CVE-2016-0046-RCE
HTTP:STC:CVE-2015-6097-RCE
HTTP:STC:WMF-FILE-DOS1
HTTP:STC:DOTNET-BUFF-ALLOC1
HTTP:STC:CVE-2015-6088-RCE
HTTP:STC:WHSC-RCE
HTTP:STC:APPLE-RTSP-DOS
HTTP:STC:UNZIP-EXTRA-FIELD-BO
HTTP:STC:IE-STREAM-HDR
HTTP:STC:MEM-COR-EDGE
HTTP:STC:DIRECTSHOW-AVI-EXEC
HTTP:STC:HP-LOADRUNNER-RCE
HTTP:STC:TELNET-URL-OPTS
HTTP:STC:MS-OFFICE-XP-HTML-LINK
HTTP:STC:ADVANTEC-INP-PARAM-RC1
HTTP:STC:PHP-DATE-TIME-OBJ-UAF
HTTP:STC:ORBIT-DL-URL
HTTP:STC:BROWSER-DISPLAY-BOX-MC
HTTP:STC:CANVAS-BABYBOTTLE
HTTP:STC:CVE-2016-0003-RCE
HTTP:STC:SOAPUI-WSDL-WADL-CE
HTTP:STC:TRIMBL-NAV-BMP-HOVF
HTTP:STC:APPLE-QTIME-ENOF-OF
HTTP:STC:CVE-2016-0191-RCE
HTTP:STC:RSS-FEED-CODE-INJ
HTTP:STC:MICROSOFT-GDI-TIFF-RCE
HTTP:STC:APPLE-QTIME-DREF-BO
HTTP:STC:IMGMAGIC-EPMRL-FL-DEL
HTTP:STC:PIWIGO-LOCALFILES-CSRF
HTTP:STC:DOTNET-XML-SIG-SPOOF
HTTP:STC:DOT-NET-REFLECTION
HTTP:STC:WINHELP32-OF2
HTTP:STC:WIN-CCL-BOF
HTTP:STC:ORACLE-ENDECA-CSRF
HTTP:STC:CHTSKDIC
HTTP:STC:QTIME-TEXTBOX-MEMC
HTTP:STC:WECON-HEAP-OVERRUN
HTTP:STC:MS-OFFICE-FILE-BOF
HTTP:STC:OFFCE-CVE-2015-1760-CE
HTTP:STC:CVE-2015-0076-INF-DSC
HTTP:STC:MS-WINDOWS-FILE-RCE
HTTP:STC:APPLE-CFNETWORK-DOS
HTTP:STC:ON-BEFORE-UNLOAD
HTTP:STC:MS-CVE-2015-2435-CE
HTTP:STC:SOCKET-CONNECT-BO
HTTP:STC:COREL-WP-BOF
HTTP:STC:MSXML-XSLT-RCE
HTTP:STC:SUSP-SILVERLIGHT-XAP
HTTP:STC:SILVERLIGHT-CE
HTTP:STC:CURL-COOKIE-PATH-RCE
HTTP:STC:NDROID-BROW-SAME-ORIGN
HTTP:STC:NAV-REDIR
HTTP:STC:ADVANTECH-WEBACCES-BOF
HTTP:STC:APPLE-ICHAT
HTTP:STC:MS-WORD-CVE-2013-1325
HTTP:STC:DOTNET-WINFORMS-RCE
HTTP:STC:HPJ-OPTIONS
HTTP:STC:DIRECTX-AVI-WAV-PARSE
HTTP:STC:WLW-INFO-DISC
HTTP:STC:BROWSER-RUBY-BLOCK
HTTP:STC:WIRESHARK-INSECUREPATH
HTTP:STC:FF-NAV-URI
HTTP:STC:PPT-CRAFTED-PATH
HTTP:STC:PPT-LONGNAME
HTTP:STC:APPLE-QUIKTME-CE
HTTP:STC:MS-CVE-2015-2460-CE
HTTP:STC:SBS-TRAIN
HTTP:STC:SAFARI-MALFRMD-URI-DOS
HTTP:STC:W32-PARAM-HTTP
HTTP:STC:CSS-RELOADED
HTTP:STC:SILVERLIGHT-MEM-COR
HTTP:STC:AV-GATEWAY-BYPASS
HTTP:STC:WGET-REDIRECT

HTTP:STC:ACTIVEX

HTTP:STC:ACTIVEX:BACKDOORS
HTTP:STC:ACTIVEX:ADODB-CONNECT
HTTP:STC:ACTIVEX:EBAY
HTTP:STC:ACTIVEX:VERYPDF
HTTP:STC:ACTIVEX:MCA-VTRACE
HTTP:STC:ACTIVEX:GRPWISE-GIXMIM
HTTP:STC:ACTIVEX:HPUPDATE
HTTP:STC:ACTIVEX:BSTORM-WINGRPH
HTTP:STC:ACTIVEX:HP
HTTP:STC:ACTIVEX:DELL-WEBCAM
HTTP:STC:ACTIVEX:CISCO-ASMC
HTTP:STC:ACTIVEX:MW6-MAXICODE
HTTP:STC:ACTIVEX:SYMFAX
HTTP:STC:ACTIVEX:MW6-AZTEC-BO
HTTP:STC:ACTIVEX:THREEDIFY-BOF
HTTP:STC:ACTIVEX:WINDVD7
HTTP:STC:ACTIVEX:LIVE-MSG
HTTP:STC:ACTIVEX:PESTPATROL
HTTP:STC:ACTIVEX:UBISOFT-UPLAY
HTTP:STC:ACTIVEX:MS-AGENT-LIB1
HTTP:STC:ACTIVEX:CVE-2015-0016
HTTP:STC:ACTIVEX:ROXIO-CINEPL
HTTP:STC:ACTIVEX:HP-PROTECT-DAM
HTTP:STC:ACTIVEX:SPEECH-API
HTTP:STC:ACTIVEX:UNITRONICS-COR
HTTP:STC:ACTIVEX:CODEBASE
HTTP:STC:ACTIVEX:CODEBASE-2
HTTP:STC:ACTIVEX:MSO-DATASRC
HTTP:STC:ACTIVEX:AXIS-MEDIA-BO
HTTP:STC:ACTIVEX:UNCOMMON-AX
HTTP:STC:ACTIVEX:DLINK-DCS-5605
HTTP:STC:ACTIVEX:VLOG-OPLC-ACTX
HTTP:STC:ACTIVEX:QUEST-PNLLMCLI
HTTP:STC:ACTIVEX:CVE-2016-0113
HTTP:STC:ACTIVEX:TRENDNET
HTTP:STC:ACTIVEX:MOROVIA-BARCOD
HTTP:STC:ACTIVEX:IE-ECENTREX
HTTP:STC:ACTIVEX:SAM-CONNECTDDN
HTTP:STC:ACTIVEX:HPQUTIL
HTTP:STC:ACTIVEX:MAL-CON-2
HTTP:STC:ACTIVEX:NOVELL-CLIENT
HTTP:STC:ACTIVEX:QUEST-INTRUST
HTTP:STC:ACTIVEX:ASK-COM
HTTP:STC:ACTIVEX:EASYMAIL
HTTP:STC:ACTIVEX:DERIVO
HTTP:STC:ACTIVEX:MCFE-OVERWRITE
HTTP:STC:ACTIVEX:SAP-IRRFC-OF
HTTP:STC:ACTIVEX:QUEST-TOAD-DBA
HTTP:STC:ACTIVEX:GOMPLAYER
HTTP:STC:ACTIVEX:WINIMGLOG
HTTP:STC:ACTIVEX:GATEWAYX
HTTP:STC:ACTIVEX:RWSO
HTTP:STC:ACTIVEX:OLE-AUTO
HTTP:STC:ACTIVEX:MACINSTALL
HTTP:STC:ACTIVEX:MITSUBISHI
HTTP:STC:ACTIVEX:SCHNEIDER-PROC
HTTP:STC:ACTIVEX:SAP-BEXGLOBAL
HTTP:STC:ACTIVEX:REAL-PLAYER
HTTP:STC:ACTIVEX:QUEST-RCE
HTTP:STC:ACTIVEX:EASEWE-FTP
HTTP:STC:ACTIVEX:JETAUDIO-DIR
HTTP:STC:ACTIVEX:HP-XUPLOAD-OCX
HTTP:STC:ACTIVEX:EDRAW-LIC-NAME
HTTP:STC:ACTIVEX:ISSYMBOL
HTTP:STC:ACTIVEX:DELL-INFO-DISC
HTTP:STC:ACTIVEX:LEADTOOLS
HTTP:STC:ACTIVEX:DRM-MSNETOBJ
HTTP:STC:ACTIVEX:CRYSTAL-SEARCH
HTTP:STC:ACTIVEX:ISIS-AFP-BO
HTTP:STC:ACTIVEX:CHILLKAT-CRYPT
HTTP:STC:ACTIVEX:CISCO-CSD-WEB
HTTP:STC:ACTIVEX:GE-HISTORIAN
HTTP:STC:ACTIVEX:SAMSUNG-BACKUP
HTTP:STC:ACTIVEX:SOLARWINDS-BO
HTTP:STC:ACTIVEX:IMAGE-VIEWER
HTTP:STC:ACTIVEX:REAL-GAMEHOUSE
HTTP:STC:ACTIVEX:HP-APP-LIFE
HTTP:STC:ACTIVEX:MS-IE-WMS1
HTTP:STC:ACTIVEX:HP-MERC-CLR1
HTTP:STC:ACTIVEX:IBM-SPSS-EXHTM
HTTP:STC:ACTIVEX:IMESH-IMWEBCON
HTTP:STC:ACTIVEX:SOPCAST-CNAME
HTTP:STC:ACTIVEX:SAMSUNG-NET-I
HTTP:STC:ACTIVEX:CAPICOM
HTTP:STC:ACTIVEX:MAPGUIDE-LAYER
HTTP:STC:ACTIVEX:MOXA-PFILENAME
HTTP:STC:ACTIVEX:IBM-RATIONAL
HTTP:STC:ACTIVEX:LTOCXTWAINU
HTTP:STC:ACTIVEX:MS-OWC-RCE
HTTP:STC:ACTIVEX:EDRAW-OFF-BOF
HTTP:STC:ACTIVEX:GESTEC-ELONFMT
HTTP:STC:ACTIVEX:WONDERWARE
HTTP:STC:ACTIVEX:INST-SHLD-FO
HTTP:STC:ACTIVEX:VIELIB
HTTP:STC:ACTIVEX:AVAYA-ONE-X
HTTP:STC:ACTIVEX:AURIGMAIMG
HTTP:STC:ACTIVEX:PHOTOBASIC-AX
HTTP:STC:ACTIVEX:ALADDIN
HTTP:STC:ACTIVEX:EBCRYPT-PRNG
HTTP:STC:ACTIVEX:SAM-SMARTVIEW
HTTP:STC:ACTIVEX:BARCODEWIZ
HTTP:STC:ACTIVEX:DECISIONTOOLS
HTTP:STC:ACTIVEX:MSCOMM32
HTTP:STC:ACTIVEX:DELL-SCANNER
HTTP:STC:ACTIVEX:FLASH9D-CSS
HTTP:STC:ACTIVEX:PRO-SOFTNET
HTTP:STC:ACTIVEX:CYGNICON
HTTP:STC:ACTIVEX:SAP-CRSTL-RPT
HTTP:STC:ACTIVEX:MS-DEBUGDIAG4
HTTP:STC:ACTIVEX:ORA-AUTOVUE
HTTP:STC:ACTIVEX:IBMINTS-INT-OF
HTTP:STC:ACTIVEX:LIVE-WRITER
HTTP:STC:ACTIVEX:CHILKAT-FTP2
HTTP:STC:ACTIVEX:AXVLC
HTTP:STC:ACTIVEX:MCFEE-MCINSCTL
HTTP:STC:ACTIVEX:MS-WIN-MSGR
HTTP:STC:ACTIVEX:TM-HOUSECALL
HTTP:STC:ACTIVEX:SYMC-NAVCOMUI
HTTP:STC:ACTIVEX:TEECHARTPRO-OF
HTTP:STC:ACTIVEX:HPVIRTUAL
HTTP:STC:ACTIVEX:REAL-IEFRAME
HTTP:STC:ACTIVEX:PCVUE-SCADA
HTTP:STC:ACTIVEX:RKD-BARCODE
HTTP:STC:ACTIVEX:WEBVIEWER3D3
HTTP:STC:ACTIVEX:IBM-VSVIEW6
HTTP:STC:ACTIVEX:EMC-KEYHELP
HTTP:STC:ACTIVEX:SUNWAY
HTTP:STC:ACTIVEX:STARUML
HTTP:STC:ACTIVEX:WEBVIEWER3D4
HTTP:STC:ACTIVEX:ABB-CWGRAPH3D
HTTP:STC:ACTIVEX:WEBGATE-WESPM
HTTP:STC:ACTIVEX:YAHOO-CD-PLY
HTTP:STC:ACTIVEX:LINKSYS
HTTP:STC:ACTIVEX:EDRAW-VIEWER
HTTP:STC:ACTIVEX:MCAFEE-MYCIO
HTTP:STC:ACTIVEX:TM-OS
HTTP:STC:ACTIVEX:AOL-PHOBOS
HTTP:STC:ACTIVEX:BENNET-TEC
HTTP:STC:ACTIVEX:SAPGUI-AX
HTTP:STC:ACTIVEX:SAP-WEBBVIEWER
HTTP:STC:ACTIVEX:DOM-INOTES-WEB
HTTP:STC:ACTIVEX:CLSID-OBFUS
HTTP:STC:ACTIVEX:ADESK-AX
HTTP:STC:ACTIVEX:HUSDAWG
HTTP:STC:ACTIVEX:VLOGIC-MEMCP
HTTP:STC:ACTIVEX:SQLVDIR-DLL
HTTP:STC:ACTIVEX:AWINGSOFT
HTTP:STC:ACTIVEX:AURIGMA
HTTP:STC:ACTIVEX:SKINCRAFTER-OF
HTTP:STC:ACTIVEX:ZENWORKS
HTTP:STC:ACTIVEX:YAHOO-RCE
HTTP:STC:ACTIVEX:VISAGESFT-PDF
HTTP:STC:ACTIVEX:DBPOWERAMP
HTTP:STC:ACTIVEX:FACEBOOK-PHOTO
HTTP:STC:ACTIVEX:IMAGESHACK
HTTP:STC:ACTIVEX:NETCRAFT
HTTP:STC:ACTIVEX:ADVANCED-FILE
HTTP:STC:ACTIVEX:HONEYWELL-TEMA
HTTP:STC:ACTIVEX:MSCOMCTL-OCX1
HTTP:STC:ACTIVEX:WIBUKEY-RT-BO
HTTP:STC:ACTIVEX:JBOX
HTTP:STC:ACTIVEX:CYME-POWER-ENG
HTTP:STC:ACTIVEX:ULTRAOFFIC
HTTP:STC:ACTIVEX:TUMBLEWEED
HTTP:STC:ACTIVEX:FLASH-PLY-NULL
HTTP:STC:ACTIVEX:AOL-AMPX
HTTP:STC:ACTIVEX:SONY-PCOMP-BOF
HTTP:STC:ACTIVEX:SYMC-CLIPROXY
HTTP:STC:ACTIVEX:MOVIE-PLAYER
HTTP:STC:ACTIVEX:MAGNETOSOFT-OV
HTTP:STC:ACTIVEX:MAGNETOSOFT-OF
HTTP:STC:ACTIVEX:VMWARE
HTTP:STC:ACTIVEX:ORACLE-SIEBEL
HTTP:STC:ACTIVEX:MITSUBISHI-V3
HTTP:STC:ACTIVEX:LIQUIDXML-MULT
HTTP:STC:ACTIVEX:VISBASIC6-AX-1
HTTP:STC:ACTIVEX:SAP-GUI-TABONE
HTTP:STC:ACTIVEX:MAGNETOSOFT
HTTP:STC:ACTIVEX:HYLEOS
HTTP:STC:ACTIVEX:ICONICS-WEBHMI
HTTP:STC:ACTIVEX:MAGNETO-ICMP
HTTP:STC:ACTIVEX:ACCESS-CORRUPT
HTTP:STC:ACTIVEX:ORBIT-DWNLDR
HTTP:STC:ACTIVEX:ADODB
HTTP:STC:ACTIVEX:SYNACTISPDF-BO
HTTP:STC:ACTIVEX:NATIONAL-INST
HTTP:STC:ACTIVEX:CITRIX-NSEPA
HTTP:STC:ACTIVEX:LIVE-PROFILE
HTTP:STC:ACTIVEX:MSACCESS-AX
HTTP:STC:ACTIVEX:BROADWIN
HTTP:STC:ACTIVEX:GOMPLAYER5
HTTP:STC:ACTIVEX:GOMPLAYER6
HTTP:STC:ACTIVEX:KASP-AX
HTTP:STC:ACTIVEX:MSXML2-MEMCORR
HTTP:STC:ACTIVEX:HP-SPRINTER
HTTP:STC:ACTIVEX:SYGATE-SSHELP
HTTP:STC:ACTIVEX:SAMSNG-KIES
HTTP:STC:ACTIVEX:ISOVIEW-BOF
HTTP:STC:ACTIVEX:HP-OPOS-DRIVER
HTTP:STC:ACTIVEX:CLEARQUEST-OLE
HTTP:STC:ACTIVEX:IBM-TIVOLI
HTTP:STC:ACTIVEX:ORACLE-SSSPLT
HTTP:STC:ACTIVEX:FLEXERA-ISGRID
HTTP:STC:ACTIVEX:LPVIEWER
HTTP:STC:ACTIVEX:WEBVIEWER3D2
HTTP:STC:ACTIVEX:MSXML-INFODISC
HTTP:STC:ACTIVEX:DOM-TYPE
HTTP:STC:ACTIVEX:REVEALTRANS
HTTP:STC:ACTIVEX:GOMPLAYER8
HTTP:STC:ACTIVEX:VS05-INJ
HTTP:STC:ACTIVEX:MS-MDAC
HTTP:STC:ACTIVEX:REAL-IERPCTL
HTTP:STC:ACTIVEX:HONEYWELL-EBI
HTTP:STC:ACTIVEX:WORD-VIEWER
HTTP:STC:ACTIVEX:HPSUPPORT
HTTP:STC:ACTIVEX:GOMPLAYER9
HTTP:STC:ACTIVEX:MDAC-DATASPACE
HTTP:STC:ACTIVEX:DEV-TOOL
HTTP:STC:ACTIVEX:IEMOUSE-IMGTAG
HTTP:STC:ACTIVEX:XMLHTTP
HTTP:STC:ACTIVEX:DATA-ANALYSIS
HTTP:STC:ACTIVEX:UNITONICS-OPLC
HTTP:STC:ACTIVEX:WMEX
HTTP:STC:ACTIVEX:IE-POPUP
HTTP:STC:ACTIVEX:VMWARE-FS
HTTP:STC:ACTIVEX:PANASONIC-API
HTTP:STC:ACTIVEX:MSCOMCTL-OCX
HTTP:STC:ACTIVEX:HNYWLL-OPOS
HTTP:STC:ACTIVEX:MW6-BARCODE
HTTP:STC:ACTIVEX:EASYMAIL-EXP
HTTP:STC:ACTIVEX:YMAILATTACH-OF
HTTP:STC:ACTIVEX:GOMPLAYER7
HTTP:STC:ACTIVEX:IBM-ACCESS
HTTP:STC:ACTIVEX:JNPR-SSL-VPN
HTTP:STC:ACTIVEX:IBM-SPSS-MRAB
HTTP:STC:ACTIVEX:SIEMENS-SOLID
HTTP:STC:ACTIVEX:WEBGATE-WESP
HTTP:STC:ACTIVEX:SOLARWINDS
HTTP:STC:ACTIVEX:ORACLE-FILEC
HTTP:STC:ACTIVEX:SETHTMLFILE
HTTP:STC:ACTIVEX:HP-RCE
HTTP:STC:ACTIVEX:MCKESSON
HTTP:STC:ACTIVEX:ELECTRIC-PELCO
HTTP:STC:ACTIVEX:ORACLE-CROPROJ
HTTP:STC:ACTIVEX:UBISOFT
HTTP:STC:ACTIVEX:URLMON-DLL
HTTP:STC:ACTIVEX:XML-CORE-3-0
HTTP:STC:ACTIVEX:SAMSUNG-VIEWER
HTTP:STC:ACTIVEX:SAPI-DLL
HTTP:STC:ACTIVEX:QUICKTIME-BOF
HTTP:STC:ACTIVEX:VB-TLBINF32
HTTP:STC:ACTIVEX:ALTIRIS
HTTP:STC:ACTIVEX:MS-DOS
HTTP:STC:ACTIVEX:AGILENT-INSERT
HTTP:STC:ACTIVEX:OFFICE-OCX
HTTP:STC:ACTIVEX:REAL-PLR-RPAU
HTTP:STC:ACTIVEX:CA-XMLSECDB
HTTP:STC:ACTIVEX:IE-DA
HTTP:STC:ACTIVEX:HTMLSAFHLP
HTTP:STC:ACTIVEX:MS-IE-WMS
HTTP:STC:ACTIVEX:UUSEE-UUPLAYER
HTTP:STC:ACTIVEX:HP-LOADRUNER
HTTP:STC:ACTIVEX:IRFILEIOSRVC
HTTP:STC:ACTIVEX:ORACLE-RCE
HTTP:STC:ACTIVEX:HP-SPRINTR-BOF
HTTP:STC:ACTIVEX:ORACLE-TTF16
HTTP:STC:ACTIVEX:MS-OWC-BOF
HTTP:STC:ACTIVEX:RDP-UNSAFE-AX
HTTP:STC:ACTIVEX:EMV-PIXTOOLS
HTTP:STC:ACTIVEX:CO-FLEXGRID
HTTP:STC:ACTIVEX:GOMPLAYER1
HTTP:STC:ACTIVEX:JRE-DNSRESOLVE
HTTP:STC:ACTIVEX:IBM-LOTUS-QIKR
HTTP:STC:ACTIVEX:HHCTRL-IMAGE
HTTP:STC:ACTIVEX:CTSUENG-OCX
HTTP:STC:ACTIVEX:HP-AUDIO-REC
HTTP:STC:ACTIVEX:QTPLUGINX
HTTP:STC:ACTIVEX:MS-IE-COM-RCE
HTTP:STC:ACTIVEX:CISCO-WVC200
HTTP:STC:ACTIVEX:IETAB-AX
HTTP:STC:ACTIVEX:CISCO-VPN
HTTP:STC:ACTIVEX:NTR-BOF
HTTP:STC:ACTIVEX:ICONICS-WEBHM1
HTTP:STC:ACTIVEX:HPIS-DATA-MGR
HTTP:STC:ACTIVEX:MS-DEBUGDIAG1
HTTP:STC:ACTIVEX:INDUSOFT-ISSY1
HTTP:STC:ACTIVEX:SASCAM-WEBCAM1
HTTP:STC:ACTIVEX:REAL-IEFRAME1
HTTP:STC:ACTIVEX:DATASRCCTL
HTTP:STC:ACTIVEX:ADDCOLUMN
HTTP:STC:ACTIVEX:WFILESTRING
HTTP:STC:ACTIVEX:BORLAND-TCHAR1
HTTP:STC:ACTIVEX:PERSITS-UPLOA1
HTTP:STC:ACTIVEX:MS-SQLDMO
HTTP:STC:ACTIVEX:WEBVIEWER3D1
HTTP:STC:ACTIVEX:WIN2K-AX
HTTP:STC:ACTIVEX:IENIPP
HTTP:STC:ACTIVEX:KVIEW-KCHARTX1
HTTP:STC:ACTIVEX:SNAPVIEW-RCE
HTTP:STC:ACTIVEX:EASYMAIL-LEAK
HTTP:STC:ACTIVEX:BACKWEB-LIA
HTTP:STC:ACTIVEX:GUI-CM-CTRLS
HTTP:STC:ACTIVEX:ATUCFOBJ-DLL
HTTP:STC:ACTIVEX:NORTON-SYMSPAM
HTTP:STC:ACTIVEX:SCHNEIDER-ELEC
HTTP:STC:ACTIVEX:HXVZ
HTTP:STC:ACTIVEX:ADVANTECH-WEB
HTTP:STC:ACTIVEX:MSGSC-DLL
HTTP:STC:ACTIVEX:NETIQ-BO
HTTP:STC:ACTIVEX:TRIEDITDOC
HTTP:STC:ACTIVEX:IBM-C1SIZER
HTTP:STC:ACTIVEX:MS-OWC
HTTP:STC:ACTIVEX:MS-AGENT-LIB
HTTP:STC:ACTIVEX:BAOFENG-BO
HTTP:STC:ACTIVEX:WMI-ADMIN
HTTP:STC:ACTIVEX:VLC-PLY-RCE
HTTP:STC:ACTIVEX:PVCAL
HTTP:STC:ACTIVEX:ORACLE-DOC-CAP
HTTP:STC:ACTIVEX:TOM-SAMYER-GET
HTTP:STC:ACTIVEX:MS-DEBUGDIAG2
HTTP:STC:ACTIVEX:MS-DEBUGDIAG3
HTTP:STC:ACTIVEX:EASEWE-FTP3
HTTP:STC:ACTIVEX:MCAFEE-FREESCN
HTTP:STC:ACTIVEX:NSKEY-DLL
HTTP:STC:ACTIVEX:CRYSTAL-PRINT
HTTP:STC:ACTIVEX:YAHOO-AUDIO
HTTP:STC:ACTIVEX:SOFTARTISANS
HTTP:STC:ACTIVEX:MICRO-FOCUS
HTTP:STC:ACTIVEX:ATTACHMATE-REF
HTTP:STC:ACTIVEX:GOMPLAYER4
HTTP:STC:ACTIVEX:JVIEWPRO
HTTP:STC:ACTIVEX:ORACLE-DATAINT
HTTP:STC:ACTIVEX:FLEXERA
HTTP:STC:ACTIVEX:AXIS-CAMERA
HTTP:STC:ACTIVEX:ORACLE-DSCXB
HTTP:STC:ACTIVEX:OLEAUTO32
HTTP:STC:ACTIVEX:ISUSWEB
HTTP:STC:ACTIVEX:TM-ISP-2010
HTTP:STC:ACTIVEX:MSVIDCTL-2
HTTP:STC:ACTIVEX:OFFICEVIEW-DOS
HTTP:STC:ACTIVEX:KAZAA-ALTNET
HTTP:STC:ACTIVEX:IE-CCRP
HTTP:STC:ACTIVEX:NOVELL-RCE
HTTP:STC:ACTIVEX:SAMSUNG-CNC
HTTP:STC:ACTIVEX:SCHNEIDER
HTTP:STC:ACTIVEX:2X-APPLICATION
HTTP:STC:ACTIVEX:JAVA-DTK
HTTP:STC:ACTIVEX:SHELL-APP
HTTP:STC:ACTIVEX:RICHTXT
HTTP:STC:ACTIVEX:ORCLE-WEBCENTR
HTTP:STC:ACTIVEX:IBM-SPSS
HTTP:STC:ACTIVEX:VFP6R
HTTP:STC:ACTIVEX:OWC
HTTP:STC:ACTIVEX:DAXCTLE
HTTP:STC:ACTIVEX:BB-LOAD
HTTP:STC:ACTIVEX:ADOBE-DL-MGR
HTTP:STC:ACTIVEX:PROCLIMA-F1BV
HTTP:STC:ACTIVEX:CITRIX-GATEWAY
HTTP:STC:ACTIVEX:COM-OBJ
HTTP:STC:ACTIVEX:HP-EASYPRINTER
HTTP:STC:ACTIVEX:DOC-CAPTURE-BO
HTTP:STC:ACTIVEX:ICQPHONE-EXEC
HTTP:STC:ACTIVEX:C6-URL-DL
HTTP:STC:ACTIVEX:IPSWITCH-IMAIL
HTTP:STC:ACTIVEX:MSVIDCTL-1
HTTP:STC:ACTIVEX:DATA-ACTIVEBAR
HTTP:STC:ACTIVEX:MS-ICARDIE
HTTP:STC:ACTIVEX:SNOOPYCTRL
HTTP:STC:ACTIVEX:YSHORTCUT
HTTP:STC:ACTIVEX:EBOOK-FLIP
HTTP:STC:ACTIVEX:SONICWALL-VPN
HTTP:STC:ACTIVEX:SAM-DVMR
HTTP:STC:ACTIVEX:AKAMAI-DM
HTTP:STC:ACTIVEX:VULN-DHTML
HTTP:STC:ACTIVEX:ASUS-NETSWITCH
HTTP:STC:ACTIVEX:PDWIZARD
HTTP:STC:ACTIVEX:WINZIP-CMDLINE
HTTP:STC:ACTIVEX:CA-ETRUST
HTTP:STC:ACTIVEX:SYMC-APPSTEAM
HTTP:STC:ACTIVEX:NOVELL-GRPWISE
HTTP:STC:ACTIVEX:SIEMENS-WINCC
HTTP:STC:ACTIVEX:HP-SW-UPDATE
HTTP:STC:ACTIVEX:SAMSUNG-KIES
HTTP:STC:ACTIVEX:MSMASK32-OCX
HTTP:STC:ACTIVEX:IBM-INOTES-BOF
HTTP:STC:ACTIVEX:ORACLE-DQ-TRLM
HTTP:STC:ACTIVEX:HP-EASY-XML
HTTP:STC:ACTIVEX:WKIMGSRV
HTTP:STC:ACTIVEX:MCAFEE-VT
HTTP:STC:ACTIVEX:VIDEOCALL
HTTP:STC:ACTIVEX:SONY-WIFIMAN
HTTP:STC:ACTIVEX:WMP-SCRIPT
HTTP:STC:ACTIVEX:WELLINTECH
HTTP:STC:ACTIVEX:ADVANTECH-BOF
HTTP:STC:ACTIVEX:ADVANTECH-OF
HTTP:STC:ACTIVEX:TROUBLE-QUERY
HTTP:STC:ACTIVEX:CA-WEBSCAN-AX
HTTP:STC:ACTIVEX:CA-PSFORMX-AX
HTTP:STC:ACTIVEX:KVIEW-KCHARTXY
HTTP:STC:ACTIVEX:WFICA

HTTP:STC:ADOBE

HTTP:STC:ADOBE:CVE-2016-0933-CE
HTTP:STC:ADOBE:CVE-2016-0947-CE
HTTP:STC:ADOBE:CVE-2016-0945-CE
HTTP:STC:ADOBE:CVE-2016-0934-CE
HTTP:STC:ADOBE:CVE-2016-0946-CE
HTTP:STC:ADOBE:CVE-2015-5550-CE
HTTP:STC:ADOBE:CVE-2014-0534-SB
HTTP:STC:ADOBE:CVE-2015-3096-SB
HTTP:STC:ADOBE:PDF-SPELL-MC
HTTP:STC:ADOBE:CVE-2015-4431-CE
HTTP:STC:ADOBE:CVE-2016-0940-CE
HTTP:STC:ADOBE:CVE-2016-0944-CE
HTTP:STC:ADOBE:CVE-2015-5091-CE
HTTP:STC:ADOBE:CVE-2016-0943-CE
HTTP:STC:ADOBE:CVE-2016-0941-CE
HTTP:STC:ADOBE:CVE-2016-0938-CE
HTTP:STC:ADOBE:CVE-2016-0936-CE
HTTP:STC:ADOBE:CVE-2015-5089-CE
HTTP:STC:ADOBE:CVE-2016-1039-CE
HTTP:STC:ADOBE:CVE-2016-1037-CE
HTTP:STC:ADOBE:FLASH-OOB-MC
HTTP:STC:ADOBE:FLASH-DEFINE-TAG
HTTP:STC:ADOBE:CVE-2016-1097-CE
HTTP:STC:ADOBE:CVE-2016-0939-CE
HTTP:STC:ADOBE:FLASH-STAGE3D
HTTP:STC:ADOBE:SWF-FLASH-OF
HTTP:STC:ADOBE:FLASH-MP3-TAG-CE
HTTP:STC:ADOBE:CVE-2015-5096-CE
HTTP:STC:ADOBE:CVE-2013-3355-CE
HTTP:STC:ADOBE:CVE-2013-3354-CE
HTTP:STC:ADOBE:CVE-2015-5576-C1
HTTP:STC:ADOBE:FLASHPLYR-HEAPOF
HTTP:STC:ADOBE:FLASH-PLAYER-XSS
HTTP:STC:ADOBE:CVE-2016-1072-CE
HTTP:STC:ADOBE:READER-WIDGET
HTTP:STC:ADOBE:TRUETYPE-OF
HTTP:STC:ADOBE:CS-NULL-POINTER
HTTP:STC:ADOBE:READER-CID-FONT
HTTP:STC:ADOBE:FLASHPLR-NULL-MC
HTTP:STC:ADOBE:CVE-2016-1090-CE
HTTP:STC:ADOBE:CVE-2015-5564-CE
HTTP:STC:ADOBE:CVE-2016-1080-CE
HTTP:STC:ADOBE:CVE-2016-4116-CE
HTTP:STC:ADOBE:CVE-2016-1048-CE
HTTP:STC:ADOBE:2014-0515-CE2
HTTP:STC:ADOBE:CVE-2016-1111-CE
HTTP:STC:ADOBE:CVE-2016-1100-CE
HTTP:STC:ADOBE:CVE-2016-1092-CE
HTTP:STC:ADOBE:CVE-2016-1073-CE
HTTP:STC:ADOBE:CVE-2016-1099-CE
HTTP:STC:ADOBE:CVE-2016-1059-CE
HTTP:STC:ADOBE:FLASH-MATRX3D-IO
HTTP:STC:ADOBE:CVE-2016-1109-CE
HTTP:STC:ADOBE:CVE-2016-1074-CE
HTTP:STC:ADOBE:CVE-2016-1060-CE
HTTP:STC:ADOBE:CVE-2016-1065-CE
HTTP:STC:ADOBE:CVE-2015-3129-CE
HTTP:STC:ADOBE:CVE-2016-1063-CE
HTTP:STC:ADOBE:CVE-2015-3125-ID
HTTP:STC:ADOBE:CVE-2016-1042-CE
HTTP:STC:ADOBE:CVE-2016-1043-CE
HTTP:STC:ADOBE:CVE-2016-1071-CE
HTTP:STC:ADOBE:CVE-2016-1066-CE
HTTP:STC:ADOBE:2014-0515-CE1
HTTP:STC:ADOBE:CVE-2016-1069-CE
HTTP:STC:ADOBE:CVE-2016-1049-CE
HTTP:STC:ADOBE:CVE-2016-1096-CE
HTTP:STC:ADOBE:PDF-CATALOG
HTTP:STC:ADOBE:READER-UAF
HTTP:STC:ADOBE:CVE-2016-1056-CE
HTTP:STC:ADOBE:CVE-2016-1040-CE
HTTP:STC:ADOBE:CVE-2016-1082-CE
HTTP:STC:ADOBE:CVE-2016-1108-CE
HTTP:STC:ADOBE:CVE-2016-1078-CE
HTTP:STC:ADOBE:CVE-2016-1110-CE
HTTP:STC:ADOBE:CVE-2016-1017-CE
HTTP:STC:ADOBE:CVE-2015-3053-CE
HTTP:STC:ADOBE:CVE-2016-1046-CE
HTTP:STC:ADOBE:FLASH-FLV-MEM
HTTP:STC:ADOBE:CVE-2016-1106-CE
HTTP:STC:ADOBE:CVE-2015-3046-CE
HTTP:STC:ADOBE:CVE-2015-3052-CE
HTTP:STC:ADOBE:CVE-2015-3064-CE
HTTP:STC:ADOBE:CVE-2014-0531-MC
HTTP:STC:ADOBE:CVE-2016-1107-CE
HTTP:STC:ADOBE:CVE-2016-1047-CE
HTTP:STC:ADOBE:CVE-2016-1076-CE
HTTP:STC:ADOBE:PS-PNG-BO
HTTP:STC:ADOBE:CVE-2016-1055-CE
HTTP:STC:ADOBE:CVE-2016-1079-CE
HTTP:STC:ADOBE:CVE-2016-4108-CE
HTTP:STC:ADOBE:CVE-2015-3070-CE
HTTP:STC:ADOBE:FLASH-AS-MEM-DOS
HTTP:STC:ADOBE:CVE-2015-3072-CE
HTTP:STC:ADOBE:CVE-2015-3062-CE
HTTP:STC:ADOBE:CVE-2015-3084-CE
HTTP:STC:ADOBE:CVE-2015-3086-CE
HTTP:STC:ADOBE:CVE-2016-1062-CE
HTTP:STC:ADOBE:CVE-2016-1094-CE
HTTP:STC:ADOBE:PDF-HEAP-RCE
HTTP:STC:ADOBE:CVE-2016-1064-CE
HTTP:STC:ADOBE:FLASH-PLY-BYPASS
HTTP:STC:ADOBE:CVE-2015-3091-CE
HTTP:STC:ADOBE:CVE-2015-3085-VB
HTTP:STC:ADOBE:CVE-2016-0993-CE
HTTP:STC:ADOBE:CVE-2016-0990-CE
HTTP:STC:ADOBE:CVE-2016-4207-CE
HTTP:STC:ADOBE:CVE-2015-3088-BO
HTTP:STC:ADOBE:CVE-2016-1085-CE
HTTP:STC:ADOBE:CVE-2016-0094-CE
HTTP:STC:ADOBE:CVE-2015-3092-CE
HTTP:STC:ADOBE:CVE-2016-1001-CE
HTTP:STC:ADOBE:CVE-2016-1009-CE
HTTP:STC:ADOBE:CVE-2016-0994-CE
HTTP:STC:ADOBE:CVE-2016-0995-CE
HTTP:STC:ADOBE:CVE-2016-0988-CE
HTTP:STC:ADOBE:CVE-2015-8655-CE
HTTP:STC:ADOBE:CVE-2015-3093-CE
HTTP:STC:ADOBE:CVE-2016-0963-CE
HTTP:STC:ADOBE:CVE-2016-0961-CE
HTTP:STC:ADOBE:CVE-2016-0991-CE
HTTP:STC:ADOBE:CVE-2016-0986-DS
HTTP:STC:ADOBE:CVE-2016-0962-CE
HTTP:STC:ADOBE:CVE-2016-0960-CE
HTTP:STC:ADOBE:CVE-2016-0987-CE
HTTP:STC:ADOBE:CVE-2016-1045-CE
HTTP:STC:ADOBE:CONVFILTER-UAF
HTTP:STC:ADOBE:CVE-2016-1088-CE
HTTP:STC:ADOBE:NETMONITOR-UAF
HTTP:STC:ADOBE:CVE-2016-4117-CE
HTTP:STC:ADOBE:PDF-JBIG2DECODE
HTTP:STC:ADOBE:CVE-2015-5105-CE
HTTP:STC:ADOBE:CVE-2016-1058-CE
HTTP:STC:ADOBE:CVE-2016-1105-CE
HTTP:STC:ADOBE:FLASH-NULL-PTR
HTTP:STC:ADOBE:CVE-2016-1095-CE
HTTP:STC:ADOBE:CVE-2014-9159-BO
HTTP:STC:ADOBE:CVE-2016-0931-CE
HTTP:STC:ADOBE:CVE-2016-0932-CE
HTTP:STC:ADOBE:CVE-2016-0935-CE
HTTP:STC:ADOBE:U3D-TEXTURE-BOF1
HTTP:STC:ADOBE:TEXTLINE-OB-CE1
HTTP:STC:ADOBE:CVE-2015-0301-MC
HTTP:STC:ADOBE:SWF-INVALID-OBF1
HTTP:STC:ADOBE:ACROBAT-JS-XRF
HTTP:STC:ADOBE:CVE-2015-312-RCE
HTTP:STC:ADOBE:CVE-2015-0306-MC
HTTP:STC:ADOBE:READER-10.1.4-MC
HTTP:STC:ADOBE:CVE-2015-0093-CE
HTTP:STC:ADOBE:CVE-2015-5108-BO
HTTP:STC:ADOBE:GETANNOTS-RCE
HTTP:STC:ADOBE:FLASH-FIREFOX
HTTP:STC:ADOBE:PDF-ICC-PRODESC
HTTP:STC:ADOBE:PDF-JS-METHOD
HTTP:STC:ADOBE:PDF-OPENACTION
HTTP:STC:ADOBE:READER-NULL-PTR
HTTP:STC:ADOBE:PDF-GOTO-XSS
HTTP:STC:ADOBE:2015-0310-REGMCP
HTTP:STC:ADOBE:CVE-2014-8452-SB
HTTP:STC:ADOBE:READER-ICC-RCE1
HTTP:STC:ADOBE:CVE-2014-8440-ID
HTTP:STC:ADOBE:FLASH-DYN-SCRIPT
HTTP:STC:ADOBE:PARSE-FLOAT-BOF1
HTTP:STC:ADOBE:CVE-2015-7625-CE
HTTP:STC:ADOBE:CVE-2015-7627-CE
HTTP:STC:ADOBE:CVE-2015-7631-CE
HTTP:STC:ADOBE:CVE-2015-5540-CE
HTTP:STC:ADOBE:CVE-2015-5558-CE
HTTP:STC:ADOBE:CVE-2014-9161-CE
HTTP:STC:ADOBE:PDF-UNI-3D
HTTP:STC:ADOBE:WRITE-CONFUSION
HTTP:STC:ADOBE:PDF-U3D-BO
HTTP:STC:ADOBE:CVE-2014-0588-CE
HTTP:STC:ADOBE:CVE-2015-0302-ID
HTTP:STC:ADOBE:CVE-2015-5109-CE
HTTP:STC:ADOBE:CVE-2015-3050-CE
HTTP:STC:ADOBE:PDF-CCITT
HTTP:STC:ADOBE:PDF-URI-OACTION
HTTP:STC:ADOBE:PDF-FIELDDIR
HTTP:STC:ADOBE:CVE-2014-0493-C1
HTTP:STC:ADOBE:CVE-2015-3122-C1
HTTP:STC:ADOBE:CVE-2015-5133-C1
HTTP:STC:ADOBE:CVE-2016-4200-CE
HTTP:STC:ADOBE:CVE-2015-5126-CE
HTTP:STC:ADOBE:CVE-2015-0307-DS
HTTP:STC:ADOBE:CVE-2014-0565-MC
HTTP:STC:ADOBE:CVE-2015-3102-SB
HTTP:STC:ADOBE:CVE-2015-5541-CE
HTTP:STC:ADOBE:PDF-PRINTSEPS-2
HTTP:STC:ADOBE:CVE-2015-5567-CE
HTTP:STC:ADOBE:FLASH-INVOP
HTTP:STC:ADOBE:CVE-2015-7633-CE
HTTP:STC:ADOBE:READER-FILE-DOS
HTTP:STC:ADOBE:CVE-2014-8453-CE
HTTP:STC:ADOBE:FLASH-ARGCOUNT
HTTP:STC:ADOBE:AUD-SESSFILE
HTTP:STC:ADOBE:FLASH-INT-OVF
HTTP:STC:ADOBE:CVE-2015-7629-CE
HTTP:STC:ADOBE:DIRECTOR-FILE-M1
HTTP:STC:ADOBE:CVE-2016-4173-CE
HTTP:STC:ADOBE:DEFINEFONT
HTTP:STC:ADOBE:SWF-ACTIONIF-DO
HTTP:STC:ADOBE:CVE-2016-4188-CE
HTTP:STC:ADOBE:FLV-FILE-DOS
HTTP:STC:ADOBE:CVE-2016-4223-CE
HTTP:STC:ADOBE:CVE-2015-3080-CE
HTTP:STC:ADOBE:CVE-2015-7632-CE
HTTP:STC:ADOBE:PDF-JAVASCRIPT
HTTP:STC:ADOBE:PDF-XML-XSS
HTTP:STC:ADOBE:PDF-CLUT
HTTP:STC:ADOBE:PDF-MAL-JPEG
HTTP:STC:ADOBE:CVE-2015-7628-PE
HTTP:STC:ADOBE:FLASH-RUNTIME
HTTP:STC:ADOBE:CVE-2016-4179-CE
HTTP:STC:ADOBE:PDF-GLYPH-OF
HTTP:STC:ADOBE:PDF-FREETYPE
HTTP:STC:ADOBE:CVE-2015-3098-CE
HTTP:STC:ADOBE:CVE-2015-8640-CE
HTTP:STC:ADOBE:READER-BMP
HTTP:STC:ADOBE:CVE-2015-5134-CE
HTTP:STC:ADOBE:CVE-2015-5132-CE
HTTP:STC:ADOBE:CVE-2016-4198-MC
HTTP:STC:ADOBE:CVE-2015-5560-CE
HTTP:STC:ADOBE:CVE-2016-4191-MC
HTTP:STC:ADOBE:WRTE-WAT-WHRE-CE
HTTP:STC:ADOBE:CVE2014-8456-DOS
HTTP:STC:ADOBE:CVE-2016-4204-MC
HTTP:STC:ADOBE:CVE-2015-5547-CE
HTTP:STC:ADOBE:CVE-2015-5548-CE
HTTP:STC:ADOBE:CVE-2016-4175-MC
HTTP:STC:ADOBE:CVE-2016-4206-CE
HTTP:STC:ADOBE:ACROFORM-MEM
HTTP:STC:ADOBE:CVE-2016-4195-CE
HTTP:STC:ADOBE:CVE-2015-5551-CE
HTTP:STC:ADOBE:CVE-2015-3089-CE
HTTP:STC:ADOBE:CVE-2015-5129-CE
HTTP:STC:ADOBE:CFF-OF
HTTP:STC:ADOBE:CVE-2015-5555-CE
HTTP:STC:ADOBE:CVE-2015-5543-CE
HTTP:STC:ADOBE:PDF-LAUNCH-CMD
HTTP:STC:ADOBE:CVE-2015-5539-CE
HTTP:STC:ADOBE:READER-BMP-COLOR
HTTP:STC:ADOBE:SWF-GRADIENTFIL2
HTTP:STC:ADOBE:CVE-2014-0539-CE
HTTP:STC:ADOBE:CVE-2013-5331-CE
HTTP:STC:ADOBE:FLASH-ARGREST
HTTP:STC:ADOBE:U3D-CLODMESH-MC
HTTP:STC:ADOBE:SWF-APPLY-FUNC
HTTP:STC:ADOBE:FLASH-ACTIONIF
HTTP:STC:ADOBE:PARSE-FLOAT-BOF
HTTP:STC:ADOBE:MAL-PSD
HTTP:STC:ADOBE:SWF-GRADIENTFILL
HTTP:STC:ADOBE:CAM-RAW-PLUGIN
HTTP:STC:ADOBE:READER-DCT
HTTP:STC:ADOBE:CVE-2015-5588-CE
HTTP:STC:ADOBE:READER-BPROTECT
HTTP:STC:ADOBE:PDF-BITDEF-OF1
HTTP:STC:ADOBE:CVE-2015-6678-CE
HTTP:STC:ADOBE:SWF-INVALID-OBF
HTTP:STC:ADOBE:CVE-2015-5133-CE
HTTP:STC:ADOBE:CROSS-SEC-BYPASS
HTTP:STC:ADOBE:CVE-2015-5574-CE
HTTP:STC:ADOBE:SWF-UNVRSL-XSS
HTTP:STC:ADOBE:FLASH-ACTIVEX-MC
HTTP:STC:ADOBE:CVE-2013-0622-SB
HTTP:STC:ADOBE:FLASH-BITMAPDATA
HTTP:STC:ADOBE:ACROBAT-BMP-HEAD
HTTP:STC:ADOBE:CVE-2015-5544-CE
HTTP:STC:ADOBE:CVE-2016-4251-MC
HTTP:STC:ADOBE:SWF-MAL-AS
HTTP:STC:ADOBE:READER-PICT-RLE
HTTP:STC:ADOBE:CVE-2015-5587-CE
HTTP:STC:ADOBE:CVE-2015-5582-SF
HTTP:STC:ADOBE:CVE-2015-5556-CE
HTTP:STC:ADOBE:CVE-2015-8645-CE
HTTP:STC:ADOBE:SWF-FLASH-BOF
HTTP:STC:ADOBE:CVE-2015-6676-CE
HTTP:STC:ADOBE:CVE-2015-6679-CE
HTTP:STC:ADOBE:DOMAIN-MEM-RCE
HTTP:STC:ADOBE:PDF-EVASIVE-FF
HTTP:STC:ADOBE:CVE-2015-5570-CE
HTTP:STC:ADOBE:CVE-2015-5575-CE
HTTP:STC:ADOBE:CVE-2016-4255-UF
HTTP:STC:ADOBE:FLASH-FILEREF-BO
HTTP:STC:ADOBE:FLASH-XSRF
HTTP:STC:ADOBE:PDF-JPXDECODE
HTTP:STC:ADOBE:CVE-2016-4203-MC
HTTP:STC:ADOBE:CVE-2016-4224-MC
HTTP:STC:ADOBE:READER-FORM-UAF
HTTP:STC:ADOBE:CVE-2015-5562-CE
HTTP:STC:ADOBE:CVE-2016-4230-UF
HTTP:STC:ADOBE:CVE-2015-5573-CE
HTTP:STC:ADOBE:CVE-2016-4249-OF
HTTP:STC:ADOBE:FLASH-SETSLOT
HTTP:STC:ADOBE:SWF-OPENTYPE-CFF
HTTP:STC:ADOBE:CVE-2015-5578-CE
HTTP:STC:ADOBE:PS-TIFF-BOF
HTTP:STC:ADOBE:TRUETYPE-FONT-CE
HTTP:STC:ADOBE:READER-INFODISC
HTTP:STC:ADOBE:ACROBAT-U3D-BO
HTTP:STC:ADOBE:PDF-JPEG-FILE-CE
HTTP:STC:ADOBE:SWF-NEWFUNC1
HTTP:STC:ADOBE:SWF-SEC-BYPASS
HTTP:STC:ADOBE:CVE-2016-4208-ID
HTTP:STC:ADOBE:CVE-2015-4452-CE
HTTP:STC:ADOBE:ACROBAT-GLYPH-MC
HTTP:STC:ADOBE:SWF-XLS-MALF
HTTP:STC:ADOBE:ACROBAT-IFF-OF
HTTP:STC:ADOBE:ACROBAT-PCX-OF
HTTP:STC:ADOBE:SWF-MAL-AS-OF
HTTP:STC:ADOBE:PDF-COOLTYPE-RCE
HTTP:STC:ADOBE:FLASH-XDOMAIN
HTTP:STC:ADOBE:CVE-2016-4202-ID
HTTP:STC:ADOBE:PDF-BITDEF-OF
HTTP:STC:ADOBE:CVE-2016-4185-ID
HTTP:STC:ADOBE:CVE-2016-4226-ID
HTTP:STC:ADOBE:CVE-2016-1012-CE
HTTP:STC:ADOBE:CVE-2016-4229-CE
HTTP:STC:ADOBE:CVE-2016-4199-CE
HTTP:STC:ADOBE:CVE-2016-4228-CE
HTTP:STC:ADOBE:CVE-2016-4178-SB
HTTP:STC:ADOBE:CVE-2016-4232-ID
HTTP:STC:ADOBE:CVE-2016-4182-CE
HTTP:STC:ADOBE:CVE-2016-4174-UA
HTTP:STC:ADOBE:CVE-2016-4177-ID
HTTP:STC:ADOBE:CVE-2016-4197-ID
HTTP:STC:ADOBE:CVE-2016-4252-ID
HTTP:STC:ADOBE:CVE-2014-8440-CE
HTTP:STC:ADOBE:CVE-2016-0996-CE
HTTP:STC:ADOBE:FLASH-TYPE-CONF
HTTP:STC:ADOBE:CVE-2016-4196-CE
HTTP:STC:ADOBE:CVE-2016-1011-UF
HTTP:STC:ADOBE:ILLUSTRATOR-MC
HTTP:STC:ADOBE:CVE-2016-4248-UF
HTTP:STC:ADOBE:CVE-2016-4231-MC
HTTP:STC:ADOBE:PDF-BITDEF-OF-1
HTTP:STC:ADOBE:CVE-2016-4201-CE
HTTP:STC:ADOBE:CVE-2016-0989-CE
HTTP:STC:ADOBE:CVE-2015-8652-CE
HTTP:STC:ADOBE:CVE-2016-4176-CE
HTTP:STC:ADOBE:CVE-2016-1006-UF
HTTP:STC:ADOBE:CVE-2016-4225-CE
HTTP:STC:ADOBE:CVE-2016-4227-CE
HTTP:STC:ADOBE:CVE-2016-4205-CE
HTTP:STC:ADOBE:CVE-2016-1013-UF
HTTP:STC:ADOBE:CVE-2015-8643-CE
HTTP:STC:ADOBE:CVE-2015-8649-CE
HTTP:STC:ADOBE:ACROBAT-GETICON
HTTP:STC:ADOBE:READER-PLUGIN4
HTTP:STC:ADOBE:READER-PLUGIN2
HTTP:STC:ADOBE:READER-JP2K-BO
HTTP:STC:ADOBE:TTF-HANDLING
HTTP:STC:ADOBE:CVE-2010-0195-CE
HTTP:STC:ADOBE:READER-MC-RCE
HTTP:STC:ADOBE:CVE-2010-0197-MC
HTTP:STC:ADOBE:READER-OOB-WRITE
HTTP:STC:ADOBE:READER-PLUGIN3
HTTP:STC:ADOBE:FLSHPLYR-INFDISC
HTTP:STC:ADOBE:READER-PLUGIN6
HTTP:STC:ADOBE:BMP-HEADER
HTTP:STC:ADOBE:READER-PLUGIN9
HTTP:STC:ADOBE:JPEG-FILE-OF
HTTP:STC:ADOBE:CVE-2015-8635-CE
HTTP:STC:ADOBE:READER-PLUGIN5
HTTP:STC:ADOBE:CVE-2016-1018-BO
HTTP:STC:ADOBE:CVE-2016-1005-CE
HTTP:STC:ADOBE:CVE-2016-4192-CE
HTTP:STC:ADOBE:CVE-2016-1015-CE
HTTP:STC:ADOBE:CVE-2016-1019-CE
HTTP:STC:ADOBE:CVE-2016-4222-CE
HTTP:STC:ADOBE:CVE-2016-1016-UF
HTTP:STC:ADOBE:CVE-2015-8460-CE
HTTP:STC:ADOBE:READER-WRITAV-CE
HTTP:STC:ADOBE:CVE-2014-8449-CE
HTTP:STC:ADOBE:FLASH-INT-OV
HTTP:STC:ADOBE:CVE-2015-8639-CE
HTTP:STC:ADOBE:READER-TTF-DESC
HTTP:STC:ADOBE:CVE-2015-5579-DS
HTTP:STC:ADOBE:CVE-2015-8644-CE
HTTP:STC:ADOBE:REVOKED-CERT
HTTP:STC:ADOBE:CVE-2015-8646-CE
HTTP:STC:ADOBE:CVE-2015-8634-CE
HTTP:STC:ADOBE:WEIGHTVECTOR
HTTP:STC:ADOBE:SWF-UAF-JS
HTTP:STC:ADOBE:READER-IT
HTTP:STC:ADOBE:CVE-2015-8638-CE
HTTP:STC:ADOBE:U3D-TEXTURE-BOF
HTTP:STC:ADOBE:DLMGR-AOM-OF
HTTP:STC:ADOBE:CVE-2013-5325-CE
HTTP:STC:ADOBE:FLASH-INT-DOS
HTTP:STC:ADOBE:CVE-2015-0313-ID
HTTP:STC:ADOBE:FLATEDECODE-BO
HTTP:STC:ADOBE:PDF-UAC-HANDLE
HTTP:STC:ADOBE:CVE-2015-0330-CE
HTTP:STC:ADOBE:CVE-2015-8651-CE
HTTP:STC:ADOBE:SWF-LINUX-AS
HTTP:STC:ADOBE:FLASH-MP4LOAD-BO
HTTP:STC:ADOBE:XFIR-RECORD
HTTP:STC:ADOBE:SWF-MAL-FILE
HTTP:STC:ADOBE:FLASH-MC
HTTP:STC:ADOBE:FLASH-CVE15-0308
HTTP:STC:ADOBE:SWF-DEFINEFUNC2
HTTP:STC:ADOBE:PDF-TJ-OBJECT
HTTP:STC:ADOBE:CVE2015-0309-RCE
HTTP:STC:ADOBE:PDF-COMPACT
HTTP:STC:ADOBE:CVE-2015-0323-CE
HTTP:STC:ADOBE:SWF-BUTTON
HTTP:STC:ADOBE:SWF-ACTIONSET
HTTP:STC:ADOBE:SWF-SETTARGET
HTTP:STC:ADOBE:PDF-GDI-OBJ-RCE
HTTP:STC:ADOBE:PDF-DESC-FONTS
HTTP:STC:ADOBE:PDF-EMBEDDEDFILE
HTTP:STC:ADOBE:CVE-2015-0317-CE
HTTP:STC:ADOBE:READER-PLUGIN7
HTTP:STC:ADOBE:JS-CE
HTTP:STC:ADOBE:CVE-2013-3352-CE
HTTP:STC:ADOBE:CVE-2016-1083-ID
HTTP:STC:ADOBE:2013-5065-PDF
HTTP:STC:ADOBE:FLASH-BO
HTTP:STC:ADOBE:READER-PLUGIN8
HTTP:STC:ADOBE:READER-HYBRID-BY
HTTP:STC:ADOBE:CVE-2015-0303-SB
HTTP:STC:ADOBE:CVE-2016-1093-CE
HTTP:STC:ADOBE:CVE-2016-1041-CE
HTTP:STC:ADOBE:CVE-2015-8650-CE
HTTP:STC:ADOBE:CVE-2016-1084-CE
HTTP:STC:ADOBE:CVE-2015-8647-CE
HTTP:STC:ADOBE:CVE-2013-5330-MC
HTTP:STC:ADOBE:CVE-2016-1038-CE
HTTP:STC:ADOBE:CVE-2016-1098-CE
HTTP:STC:ADOBE:DOMAIN-MEMORY
HTTP:STC:ADOBE:MAL-IFF
HTTP:STC:ADOBE:PDF-3D-WH
HTTP:STC:ADOBE:CVE-2016-1086-CE
HTTP:STC:ADOBE:CVE-2016-1068-CE
HTTP:STC:ADOBE:CVE-2016-1075-CE
HTTP:STC:ADOBE:CVE-2014-0497-MC
HTTP:STC:ADOBE:READER-ICC-RCE
HTTP:STC:ADOBE:CVE-2015-0322-CE
HTTP:STC:ADOBE:PDF-EBUK-FORMSTR
HTTP:STC:ADOBE:CVE-2015-8636-CE
HTTP:STC:ADOBE:CVE-2016-1070-CE
HTTP:STC:ADOBE:CVE-2016-1044-CE
HTTP:STC:ADOBE:PDF-UAF-RCE
HTTP:STC:ADOBE:CVE-2013-5324-MC
HTTP:STC:ADOBE:BMP-INT-OVF
HTTP:STC:ADOBE:CVE-2015-0326-DS
HTTP:STC:ADOBE:WRTE-WAT-WHRE-C1
HTTP:STC:ADOBE:LIBTIF-FETCHDATA
HTTP:STC:ADOBE:CVE-2016-1061-CE
HTTP:STC:ADOBE:FLASH-MAL-ACTION
HTTP:STC:ADOBE:READER-API-CE
HTTP:STC:ADOBE:PS-CS4-MULTI-BO1
HTTP:STC:ADOBE:CVE-2016-1054-ID
HTTP:STC:ADOBE:CVE-2016-1081-MC
HTTP:STC:ADOBE:CVE-2015-3059-CE
HTTP:STC:ADOBE:READER-HEAP-OVF
HTTP:STC:ADOBE:CVE-2016-1104
HTTP:STC:ADOBE:CVE-2016-1053-ID
HTTP:STC:ADOBE:CVE-2016-1051-CE
HTTP:STC:ADOBE:JS-API-CE
HTTP:STC:ADOBE:CVE-2016-1050-CE
HTTP:STC:ADOBE:CVE-2016-1077-CE
HTTP:STC:ADOBE:CVE-2015-8459-CE
HTTP:STC:ADOBE:CVE-2013-5332-CE
HTTP:STC:ADOBE:CVE-2014-0537-CE
HTTP:STC:ADOBE:MEM-PTR-LEAK
HTTP:STC:ADOBE:CVE-2013-3357-MC
HTTP:STC:ADOBE:CVE-2015-8641-CE
HTTP:STC:ADOBE:CVE-2015-3051-CE
HTTP:STC:ADOBE:CVE-2016-1116-CE
HTTP:STC:ADOBE:CVE-2016-0937-CE
HTTP:STC:ADOBE:MEMLK-2014-0542
HTTP:STC:ADOBE:CVE-2015-3056-MC
HTTP:STC:ADOBE:CVE-2016-1102-CE
HTTP:STC:ADOBE:CVE-2015-8648-CE
HTTP:STC:ADOBE:CVE-2015-8642-CE
HTTP:STC:ADOBE:CVE-2015-3055-CE
HTTP:STC:ADOBE:CVE-2015-3054-CE
HTTP:STC:ADOBE:CVE-2015-3077-CE
HTTP:STC:ADOBE:CVE-2015-3081-BP
HTTP:STC:ADOBE:CVE-2015-3079-SB
HTTP:STC:ADOBE:CVE-2015-3076-CE
HTTP:STC:ADOBE:CVE-2016-1052-CE
HTTP:STC:ADOBE:CVE-2015-3087-CE
HTTP:STC:ADOBE:CVE-2014-0555-BO
HTTP:STC:ADOBE:CVE-2015-5104-CE
HTTP:STC:ADOBE:CVE-2015-3074-CE
HTTP:STC:ADOBE:CVE-2015-5086-CE
HTTP:STC:ADOBE:ACROBAT-JPEG2000
HTTP:STC:ADOBE:FLASH-INFODISC
HTTP:STC:ADOBE:FLASH-CVE15-0304
HTTP:STC:ADOBE:CVE-2014-0518-CE
HTTP:STC:ADOBE:TEXTLINE-OB-CE
HTTP:STC:ADOBE:SHOCKWAVE-3D-OF
HTTP:STC:ADOBE:CVE-2015-5090-CE
HTTP:STC:ADOBE:CVE-2015-4448-CE
HTTP:STC:ADOBE:CVE-2015-5100-CE
HTTP:STC:ADOBE:CVE-2015-5545-CE
HTTP:STC:ADOBE:CVE-2014-0550-BO
HTTP:STC:ADOBE:CVE-2016-1103
HTTP:STC:ADOBE:CVE-2016-1101-CE
HTTP:STC:ADOBE:PDF-JS-EXECUTION
HTTP:STC:ADOBE:CVE-2015-5113-CE
HTTP:STC:ADOBE:FLV-APPENDBYTES
HTTP:STC:ADOBE:FLASH-PLAYER-AIR
HTTP:STC:ADOBE:CVE-2015-5095-CE
HTTP:STC:ADOBE:CVE-2014-0548-PB
HTTP:STC:ADOBE:EMBED-OBJ-MIME
HTTP:STC:ADOBE:PDF-U3D-CLOD
HTTP:STC:ADOBE:READER-DOTRANGE
HTTP:STC:ADOBE:CVE-2014-0574-CE
HTTP:STC:ADOBE:PDF-JS-FILE
HTTP:STC:ADOBE:CVE-2015-5087-CE
HTTP:STC:ADOBE:CVE-2015-5102-CE
HTTP:STC:ADOBE:CVE-2016-1087-CE
HTTP:STC:ADOBE:2014-0557-RCE
HTTP:STC:ADOBE:CVE-2014-0553-MC
HTTP:STC:ADOBE:CVE-2016-1067-CE
HTTP:STC:ADOBE:CVE-2014-0580-SB
HTTP:STC:ADOBE:CVE-2014-0556-BO
HTTP:STC:ADOBE:CVE-2015-0328-CE
HTTP:STC:ADOBE:CVE-2015-0305-MC
HTTP:STC:ADOBE:READER-JS-RCE
HTTP:STC:ADOBE:CVE-2015-0329-CE
HTTP:STC:ADOBE:SWF-TYPE-CONFUS
HTTP:STC:ADOBE:CVE-2015-0321-CE
HTTP:STC:ADOBE:CVE-2015-0319-CE
HTTP:STC:ADOBE:CVE-2015-0324-CE
HTTP:STC:ADOBE:CVE-2015-3041-CE
HTTP:STC:ADOBE:CVE-2015-0356-CE
HTTP:STC:ADOBE:CVE-2015-0316-CE
HTTP:STC:ADOBE:CVE-2015-0314-BO
HTTP:STC:ADOBE:CVE-2015-0318-CE
HTTP:STC:ADOBE:CVE-2015-0325-CE
HTTP:STC:ADOBE:CVE-2015-0320-CE
HTTP:STC:ADOBE:CVE-2014-0517-CE
HTTP:STC:ADOBE:CVE-2015-0315-CE
HTTP:STC:ADOBE:CVE-2015-0091-CE
HTTP:STC:ADOBE:FLASHPLR-FILE-MC
HTTP:STC:ADOBE:CVE-2015-0087-ID
HTTP:STC:ADOBE:CVE-2015-0089-ID
HTTP:STC:ADOBE:CVE-2015-0092-CE
HTTP:STC:ADOBE:CVE-2015-0348-CE
HTTP:STC:ADOBE:CVE-2015-0090-CE
HTTP:STC:ADOBE:CVE-2015-0338-CE
HTTP:STC:ADOBE:CVE-2015-0341-CE
HTTP:STC:ADOBE:CVE-2015-0337-PB
HTTP:STC:ADOBE:CVE-2015-0335-CE
HTTP:STC:ADOBE:CVE-2015-0333-MC
HTTP:STC:ADOBE:CVE-2015-0358-CE
HTTP:STC:ADOBE:CVE-2015-0360-MC
HTTP:STC:ADOBE:CVE-2015-0352-MC
HTTP:STC:ADOBE:CVE-2015-0349-CE
HTTP:STC:ADOBE:CVE-2015-0350-MC
HTTP:STC:ADOBE:JBIG2-SYMBOL-RCE
HTTP:STC:ADOBE:CVE-2015-0342-CE
HTTP:STC:ADOBE:CVE-2015-0334-CE
HTTP:STC:ADOBE:CVE-2015-0339-CE
HTTP:STC:ADOBE:CVE-2015-0353-CE
HTTP:STC:ADOBE:CVE-2015-0340-CE
HTTP:STC:ADOBE:CVE-2015-0327-CE
HTTP:STC:ADOBE:CVE-2015-0347-CE
HTTP:STC:ADOBE:SHOCKWAVE-RCSL
HTTP:STC:ADOBE:CVE-2015-3044-ID
HTTP:STC:ADOBE:RMAS-RCE
HTTP:STC:ADOBE:CVE-2015-0355-MC
HTTP:STC:ADOBE:CVE-2015-0351-MC
HTTP:STC:ADOBE:CVE-2015-0357-CE
HTTP:STC:ADOBE:CVE-2015-3040-ID
HTTP:STC:ADOBE:CVE-2015-0354-MC
HTTP:STC:ADOBE:CVE-2015-0359-MC
HTTP:STC:ADOBE:CVE-2015-0346-CE
HTTP:STC:ADOBE:CVE-2015-3038-MC
HTTP:STC:ADOBE:CVE-2015-3042-CE
HTTP:STC:ADOBE:CVE-2015-5565-CE
HTTP:STC:ADOBE:CVE-2015-3043-CE
HTTP:STC:ADOBE:CVE-2015-5130-CE
HTTP:STC:ADOBE:READER-CRASH
HTTP:STC:ADOBE:CVE-2009-3791-MC
HTTP:STC:ADOBE:CVE-2009-2985-MC
HTTP:STC:ADOBE:FLASH-PL-JPEG-OF
HTTP:STC:ADOBE:CVE-2010-2873-CE
HTTP:STC:ADOBE:DIRECTOR-FILE-MC
HTTP:STC:ADOBE:CVE-2015-5131-CE
HTTP:STC:ADOBE:FLASH-OP
HTTP:STC:ADOBE:PDF-COLORS-INT
HTTP:STC:ADOBE:CVE-2015-3120-CE
HTTP:STC:ADOBE:FLASH-SNATIVE
HTTP:STC:ADOBE:CVE-2015-8438-CE
HTTP:STC:ADOBE:READER-U3D
HTTP:STC:ADOBE:SWF-XSFORGE
HTTP:STC:ADOBE:PHOTOSHOP-ASSET
HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC
HTTP:STC:ADOBE:SWF-DMNMEM-CP
HTTP:STC:ADOBE:SWF-DMNMEM-CP1
HTTP:STC:ADOBE:PM-FONT-OF
HTTP:STC:ADOBE:PDF-UNIVERSAL3D
HTTP:STC:ADOBE:CVE-2015-8446-CE
HTTP:STC:ADOBE:CVE-2015-8448-CE
HTTP:STC:ADOBE:FLASH-MP4-NULL
HTTP:STC:ADOBE:CVE-2015-8445-CE
HTTP:STC:ADOBE:CVE-2015-5568-CE
HTTP:STC:ADOBE:CVE-2015-4451-CE
HTTP:STC:ADOBE:CVE-2015-8442-CE
HTTP:STC:ADOBE:CVE-2015-5576-CE
HTTP:STC:ADOBE:CVE-2009-1862-CE
HTTP:STC:ADOBE:THUMBNAIL-RCE1
HTTP:STC:ADOBE:FLASH-AS3-INT-OV
HTTP:STC:ADOBE:FLASH-DYN-CALC
HTTP:STC:ADOBE:FLASH-AS2-OF
HTTP:STC:ADOBE:FLASH-SEQUENCE
HTTP:STC:ADOBE:SWF-EVENTLISTEN
HTTP:STC:ADOBE:CVE-2015-8437-CE
HTTP:STC:ADOBE:PDF-UTILPRINTF
HTTP:STC:ADOBE:SHKWV-LINGO-BOF
HTTP:STC:ADOBE:FP-CASI-MC
HTTP:STC:ADOBE:PDF-PICT-HEAP-OF
HTTP:STC:ADOBE:ACROBAT-PICT-IMG
HTTP:STC:ADOBE:SWF-MAL-AS-RCE
HTTP:STC:ADOBE:CVE-2014-9160-CE
HTTP:STC:ADOBE:2014-8439-RCE
HTTP:STC:ADOBE:CVE-2015-8418-CE
HTTP:STC:ADOBE:CVE-2015-8435-CE
HTTP:STC:ADOBE:CVE-2015-8444-CE
HTTP:STC:ADOBE:SWF-2015-5572-SB
HTTP:STC:ADOBE:CVE-2015-8457-CE
HTTP:STC:ADOBE:CVE-2015-8449-CE
HTTP:STC:ADOBE:CVE-2015-8450-CE
HTTP:STC:ADOBE:CVE-2015-8060-CE
HTTP:STC:ADOBE:CVE-2015-8443-CE
HTTP:STC:ADOBE:CVE-2015-8407-CE
HTTP:STC:ADOBE:CVE-2015-8436-CE
HTTP:STC:ADOBE:CVE-2015-8447-CE
HTTP:STC:ADOBE:CVE-2015-8414-CE
HTTP:STC:ADOBE:CVE-2015-8048-CE
HTTP:STC:ADOBE:DC-2015-5097-CE
HTTP:STC:ADOBE:PDF-FLATEDECODE
HTTP:STC:ADOBE:READER-PLUGIN1
HTTP:STC:ADOBE:CVE-2015-8419-CE
HTTP:STC:ADOBE:CVE-2014-9162-ID
HTTP:STC:ADOBE:PDF-EXT-OF
HTTP:STC:ADOBE:CVE-2013-5329-CE
HTTP:STC:ADOBE:CVE-2014-8459-MC
HTTP:STC:ADOBE:CVE-2014-9158-MC
HTTP:STC:ADOBE:CVE-2015-4447-CE
HTTP:STC:ADOBE:CVE-2014-8441-MC
HTTP:STC:ADOBE:CVE-2015-5580-CE
HTTP:STC:ADOBE:CVE-2014-8458-MC
HTTP:STC:ADOBE:CVE-2014-8461-MC
HTTP:STC:ADOBE:READER-DOS
HTTP:STC:ADOBE:CVE-2014-8455-UF
HTTP:STC:ADOBE:CVE-2015-8439-CE
HTTP:STC:ADOBE:CVE-2014-8443-MC
HTTP:STC:ADOBE:SWF-NEWFUNC
HTTP:STC:ADOBE:SWF-IN-PDF
HTTP:STC:ADOBE:PDF-OBFUSCATION
HTTP:STC:ADOBE:PDF-COOLTYPE-BO
HTTP:STC:ADOBE:READER-INFO-DISC
HTTP:STC:ADOBE:CVE-2015-5125-CE
HTTP:STC:ADOBE:CVE-2015-3078-DS
HTTP:STC:ADOBE:FLASH-RCE
HTTP:STC:ADOBE:CVE-2015-5581-CE
HTTP:STC:ADOBE:SWF-DEFINEFONT4
HTTP:STC:ADOBE:SWF-UNC-JUMP
HTTP:STC:ADOBE:CVE-2015-8408-CE
HTTP:STC:ADOBE:CVE-2015-5093-CE
HTTP:STC:ADOBE:CVE-2015-5546-CE
HTTP:STC:ADOBE:PDF-CIDFONT
HTTP:STC:ADOBE:PDF-UUEXEC
HTTP:STC:ADOBE:CVE-2014-0559-BO
HTTP:STC:ADOBE:PDF-LIBTIFF
HTTP:STC:ADOBE:FLASH-PLAYER-BO
HTTP:STC:ADOBE:CVE-2014-0511-BO
HTTP:STC:ADOBE:FLASH-BMD-SCROLL
HTTP:STC:ADOBE:FLASH-INFO-DISC
HTTP:STC:ADOBE:CVE-2014-0493-CE
HTTP:STC:ADOBE:CVE-2014-0538-UF
HTTP:STC:ADOBE:CVE-2014-0545-MC
HTTP:STC:ADOBE:CVE-2014-0522-MC
HTTP:STC:ADOBE:CVE-2014-0512-CE
HTTP:STC:ADOBE:CVE-2014-0524-MC
HTTP:STC:ADOBE:FLASHPLYR-SBYPAS
HTTP:STC:ADOBE:MEMLK-2014-0543
HTTP:STC:ADOBE:FLASHPLR-NUL-MC3
HTTP:STC:ADOBE:READR-ACROBAT-BO
HTTP:STC:ADOBE:CVE-2014-0523-CE
HTTP:STC:ADOBE:CVE-2014-0520-CE
HTTP:STC:ADOBE:SWF-INFO-DISC
HTTP:STC:ADOBE:CVE-2014-0499-MC
HTTP:STC:ADOBE:ACROBAT-U3D-RCE
HTTP:STC:ADOBE:CVE-2015-3047-CE
HTTP:STC:ADOBE:FLASH-AS3-MC
HTTP:STC:ADOBE:READER-DCT-NULL
HTTP:STC:ADOBE:CVE-2014-0554
HTTP:STC:ADOBE:SWF-JPG-OF
HTTP:STC:ADOBE:MEMDSC-2014-0552
HTTP:STC:ADOBE:CVE-2015-7655-CE
HTTP:STC:ADOBE:CVE-2014-0558-CE
HTTP:STC:ADOBE:CVE-2014-0544-MC
HTTP:STC:ADOBE:CVE-2015-7653-CE
HTTP:STC:ADOBE:CVE-2014-0547-MC
HTTP:STC:ADOBE:CVE-2014-0586-CE
HTTP:STC:ADOBE:FLASH-REGEX-DOS
HTTP:STC:ADOBE:CVE-2014-0577-CE
HTTP:STC:ADOBE:CVE-2014-0567-OF
HTTP:STC:ADOBE:CVE-2014-0584-CE
HTTP:STC:ADOBE:CVE-2014-0568-SE
HTTP:STC:ADOBE:CVE-2014-0564-MC
HTTP:STC:ADOBE:CVE-2014-0574-MC
HTTP:STC:ADOBE:CVE-2014-0587-MC
HTTP:STC:ADOBE:CVE-2014-0576-CE
HTTP:STC:ADOBE:READER-INT-OF
HTTP:STC:ADOBE:READER-MAL-PDF
HTTP:STC:ADOBE:XFIR-PAMI
HTTP:STC:ADOBE:CVE-2015-5584-CE
HTTP:STC:ADOBE:XFIR-KEY
HTTP:STC:ADOBE:CVE-2016-4136
HTTP:STC:ADOBE:CVE-2016-4149
HTTP:STC:ADOBE:CVE-2016-4155-CE
HTTP:STC:ADOBE:CVE-2016-4142
HTTP:STC:ADOBE:CVE-2015-7651-CE
HTTP:STC:ADOBE:SWF-REMOTE-MC
HTTP:STC:ADOBE:CVE-2015-7659-CE
HTTP:STC:ADOBE:MAL-BMP
HTTP:STC:ADOBE:TOOLBUTTON-UAF
HTTP:STC:ADOBE:READER-STACK-EXH
HTTP:STC:ADOBE:PDF-DRAWIMG
HTTP:STC:ADOBE:CVE-2015-5557-CE
HTTP:STC:ADOBE:CVE-2016-4154-CE
HTTP:STC:ADOBE:CVE-2015-5092-CE
HTTP:STC:ADOBE:CVE-2015-5088-CE
HTTP:STC:ADOBE:CVE-2016-4147-CE
HTTP:STC:ADOBE:CVE-2016-4143-CE
HTTP:STC:ADOBE:SWF-MEM-COR
HTTP:STC:ADOBE:CVE-2016-4132-CE
HTTP:STC:ADOBE:CVE-2014-4671
HTTP:STC:ADOBE:CVE-2016-4146-CE
HTTP:STC:ADOBE:CVE-2016-4152
HTTP:STC:ADOBE:CVE-2015-7654-CE
HTTP:STC:ADOBE:CVE-2015-7663-CE
HTTP:STC:ADOBE:CVE-2015-7652-CE
HTTP:STC:ADOBE:CVE-2015-7657-CE
HTTP:STC:ADOBE:CVE-2016-4133-CE
HTTP:STC:ADOBE:CVE-2016-4141-CE
HTTP:STC:ADOBE:CVE-2016-4144-CE
HTTP:STC:ADOBE:CVE-2016-4151-CE
HTTP:STC:ADOBE:CVE-2016-4137-CE
HTTP:STC:ADOBE:POSTSCRIPT-RCE
HTTP:STC:ADOBE:CVE-2014-8451-ID
HTTP:STC:ADOBE:CVE-2016-4139-CE
HTTP:STC:ADOBE:CVE-2014-8447-MC
HTTP:STC:ADOBE:CVE-2016-4156-CE
HTTP:STC:ADOBE:CVE-2016-4138-CE
HTTP:STC:ADOBE:CVE-2015-5559-CE
HTTP:STC:ADOBE:CVE-2015-6682-CE
HTTP:STC:ADOBE:CVE-2016-4148-CE
HTTP:STC:ADOBE:CVE-2016-4153-CE
HTTP:STC:ADOBE:CVE-2016-4150-CE
HTTP:STC:ADOBE:READER-XSLT-BO
HTTP:STC:ADOBE:CVE-2015-7660-UF
HTTP:STC:ADOBE:CVE-2014-8460-BO
HTTP:STC:ADOBE:CVE-2014-9165-UA
HTTP:STC:ADOBE:THUMBNAIL-RCE
HTTP:STC:ADOBE:CVE-2016-4135-CE
HTTP:STC:ADOBE:CVE-2016-4171-CE
HTTP:STC:ADOBE:CVE-2016-4121-CE
HTTP:STC:ADOBE:CVE-2015-5549-CE
HTTP:STC:ADOBE:SWF-POINTOBJ
HTTP:STC:ADOBE:CVE-2015-5106-CE
HTTP:STC:ADOBE:BYTEARRAY-UAF
HTTP:STC:ADOBE:CVE-2009-3959-OF
HTTP:STC:ADOBE:CVE-2016-0982-CE
HTTP:STC:ADOBE:CVE-2016-0974-CE
HTTP:STC:ADOBE:CVE-2016-0979-CE
HTTP:STC:ADOBE:CVE-2016-0971-CE
HTTP:STC:ADOBE:CVE-2016-0975-CE
HTTP:STC:ADOBE:CVE-2016-0976-CE
HTTP:STC:ADOBE:CVE-2016-0959-CE
HTTP:STC:ADOBE:CVE-2016-0972-CE
HTTP:STC:ADOBE:CVE-2016-0973-CE
HTTP:STC:ADOBE:CVE-2015-5553-CE
HTTP:STC:ADOBE:PDF-XFAFRM-OVRFL
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT
HTTP:STC:ADOBE:CVE-2015-5123-UF
HTTP:STC:ADOBE:CVE-2016-0968-CE
HTTP:STC:ADOBE:CVE-2016-0967-CE
HTTP:STC:ADOBE:CVE-2016-0964-CE
HTTP:STC:ADOBE:CVE-2016-0983-CE
HTTP:STC:ADOBE:PHOTOSHOP-TIF-OF
HTTP:STC:ADOBE:CVE-2013-3353
HTTP:STC:ADOBE:CVE-2015-8042-UF
HTTP:STC:ADOBE:SWF-MEM-CORR
HTTP:STC:ADOBE:READER-FILE-RCE
HTTP:STC:ADOBE:READER-FONT-OF
HTTP:STC:ADOBE:CVE-2010-2202-MC
HTTP:STC:ADOBE:PDF-JS-HIDE
HTTP:STC:ADOBE:CVE-2015-3106-CE
HTTP:STC:ADOBE:CVE-2015-3100-CE
HTTP:STC:ADOBE:CVE-2015-3099-ID
HTTP:STC:ADOBE:CVE-2015-3103-CE
HTTP:STC:ADOBE:CVE-2015-3108-CE
HTTP:STC:ADOBE:CVE-2015-3107-CE
HTTP:STC:ADOBE:CVE-2015-3104-CE
HTTP:STC:ADOBE:CVE-2016-0970-CE
HTTP:STC:ADOBE:PDF-PRINTSEPS
HTTP:STC:ADOBE:CVE-2015-5123-CE
HTTP:STC:ADOBE:CVE-2016-0985-CE
HTTP:STC:ADOBE:CVE-2016-0984-CE
HTTP:STC:ADOBE:CVE-2016-0969-CE
HTTP:STC:ADOBE:CVE-2016-0978-CE
HTTP:STC:ADOBE:CVE-2016-0966-CE
HTTP:STC:ADOBE:CVE-2016-0977-CE
HTTP:STC:ADOBE:CVE-2016-0981-CE
HTTP:STC:ADOBE:CVE-2016-0965-CE
HTTP:STC:ADOBE:FLASH-PLAYER-BOF
HTTP:STC:ADOBE:PDF-JS-NEWPLAYER
HTTP:STC:ADOBE:PDF-ICC-RCE
HTTP:STC:ADOBE:CVE-2015-3090-CE
HTTP:STC:ADOBE:CVE-2015-5552-CE
HTTP:STC:ADOBE:CVE-2015-5554-CE
HTTP:STC:ADOBE:TEXT-NETCONNECT
HTTP:STC:ADOBE:PDF-FONT
HTTP:STC:ADOBE:CVE-2015-3114-ID
HTTP:STC:ADOBE:MAL-FLV-BOF
HTTP:STC:ADOBE:FLASH-PLAYER-MP4
HTTP:STC:ADOBE:CVE-2014-9150-SB
HTTP:STC:ADOBE:FLASH-PLY-RCE
HTTP:STC:ADOBE:CVE-2015-4430-CE
HTTP:STC:ADOBE:CVE-2014-0506-UF
HTTP:STC:ADOBE:XFIR-TSAC
HTTP:STC:ADOBE:READER-PRC
HTTP:STC:ADOBE:READER-SECBYPASS
HTTP:STC:ADOBE:CVE-2015-5085-CE
HTTP:STC:ADOBE:2014-0515-CE4
HTTP:STC:ADOBE:SHOCKWAVE-OOB
HTTP:STC:ADOBE:2014-0515-CE3
HTTP:STC:ADOBE:CVE-2014-0515-BO
HTTP:STC:ADOBE:CVE-2015-5098-CE
HTTP:STC:ADOBE:CVE-2015-3132-UF
HTTP:STC:ADOBE:CVE-2015-3117-CE
HTTP:STC:ADOBE:CVE-2015-3118-CE
HTTP:STC:ADOBE:AUD-TRKM
HTTP:STC:ADOBE:CVE-2015-5115-OB
HTTP:STC:ADOBE:CVE-2015-4449-CE
HTTP:STC:ADOBE:CVE-2016-4215-BR
HTTP:STC:ADOBE:TSAC-STRING
HTTP:STC:ADOBE:XFIR-PAMI-RCE
HTTP:STC:ADOBE:XFIR-RCSL
HTTP:STC:ADOBE:PDF-UNICODED-SC
HTTP:STC:ADOBE:READER-WKT-BO
HTTP:STC:ADOBE:CVE-2015-2417-CE
HTTP:STC:ADOBE:CVE-2015-3122-CE
HTTP:STC:ADOBE:CVE-2015-3126-CE
HTTP:STC:ADOBE:CVE-2015-3128-CE
HTTP:STC:ADOBE:CVE-2015-3133-DS
HTTP:STC:ADOBE:ACROBAT-URL-DF
HTTP:STC:ADOBE:CVE-2015-4429-CE
HTTP:STC:ADOBE:CVE-2015-3119-CE
HTTP:STC:ADOBE:XFIR-PAMM-MEM
HTTP:STC:ADOBE:CVE-2015-3134-BO
HTTP:STC:ADOBE:CVE-2015-4433-CE
HTTP:STC:ADOBE:CVE-2015-3123-CE
HTTP:STC:ADOBE:CVE-2014-0578-CE
HTTP:STC:ADOBE:CVE-2015-3130-CE
HTTP:STC:ADOBE:CVE-2015-3121-CE
HTTP:STC:ADOBE:CVE-2015-3124-CE
HTTP:STC:ADOBE:CVE-2015-3127-UF
HTTP:STC:ADOBE:CVE-2015-4446-CE
HTTP:STC:ADOBE:CVE-2015-4441-CE
HTTP:STC:ADOBE:CVE-2015-4435-CE
HTTP:STC:ADOBE:ACROFORM-NULL-CE
HTTP:STC:ADOBE:JS-TERMINATE-UAF
HTTP:STC:ADOBE:CVE-2015-5107-CE
HTTP:STC:ADOBE:CVE-2014-0521
HTTP:STC:ADOBE:PS-CS4-MULTI-BO
HTTP:STC:ADOBE:CVE-2014-8450-CE
HTTP:STC:ADOBE:CVE-2015-3116-CE
HTTP:STC:ADOBE:READER-JAVA-CE
HTTP:STC:ADOBE:CVE-2015-5563-UF
HTTP:STC:ADOBE:MUL-JS-API-CE
HTTP:STC:ADOBE:CVE-2015-5561-CE
HTTP:STC:ADOBE:XFIR-LNAM
HTTP:STC:ADOBE:CVE2014-0532-RCE
HTTP:STC:ADOBE:CVE-2014-0533-XS

HTTP:STC:ATL

HTTP:STC:ATL:SHOCKWAVE
HTTP:STC:ATL:CISCO-UNITY
HTTP:STC:ATL:MSOFFICE-AX
HTTP:STC:ATL:OWC
HTTP:STC:ATL:DIRECTSHOW

HTTP:STC:BT

HTTP:STC:BT:FDM-TORRENT-BOF

HTTP:STC:CHROME

HTTP:STC:CHROME:JS-MSGBOX-DOS1
HTTP:STC:CHROME:EXECCMD-UAF
HTTP:STC:CHROME:RESPONSE-MC
HTTP:STC:CHROME:RESPONSE-MC1
HTTP:STC:CHROME:ID-ATTR-OBJ-UAF
HTTP:STC:CHROME:MUTATIONOBS-UAF
HTTP:STC:CHROME:DOM-UAF
HTTP:STC:CHROME:MUL-FILE-TYPE
HTTP:STC:CHROME:V8-ARRAY-OOB
HTTP:STC:CHROME:RANGE-BLUR-MC
HTTP:STC:CHROME:RESPONSE-MC2
HTTP:STC:CHROME:ARRAY-INTOVF
HTTP:STC:CHROME:RESPONSE-MC3
HTTP:STC:CHROME:WEBKIT-OO
HTTP:STC:CHROME:IFRAME-VIDEO-MC
HTTP:STC:CHROME:TABLE-CSS-MC
HTTP:STC:CHROME:LOCATION-UAF
HTTP:STC:CHROME:AWSNAP-DOS
HTTP:STC:CHROME:JS-MSGBOX-DOS
HTTP:STC:CHROME:CLPBRD-DATA-MC
HTTP:STC:CHROME:BUG-REPORT-CE
HTTP:STC:CHROME:STALE-PTR
HTTP:STC:CHROME:TABLE-CSS-MC1
HTTP:STC:CHROME:V8-JS-OOB
HTTP:STC:CHROME:PEPPER-PLGN-UAF
HTTP:STC:CHROME:LIST-INSIDE-COL
HTTP:STC:CHROME:BUG-REPORT-CE1
HTTP:STC:CHROME:GURL-XO-BYPASS1
HTTP:STC:CHROME:OBJ-BFRLOAD-UAF
HTTP:STC:CHROME:SVG-DSTRCTR-UAF
HTTP:STC:CHROME:NOTIFY-IWD-UAF
HTTP:STC:CHROME:SVG-ELMNT-UAF
HTTP:STC:CHROME:GURL-XO-BYPASS
HTTP:STC:CHROME:TEMPLTE-DOM-UAF

HTTP:STC:CLSID:ACTIVEX

HTTP:STC:CLSID:ACTIVEX:ORADC2
HTTP:STC:CLSID:ACTIVEX:INTUIT
HTTP:STC:CLSID:ACTIVEX:SWCTL
HTTP:STC:CLSID:ACTIVEX:LEN-AX
HTTP:STC:CLSID:ACTIVEX:MDSAUTH
HTTP:STC:CLSID:ACTIVEX:AX-86
HTTP:STC:CLSID:ACTIVEX:AX-92
HTTP:STC:CLSID:ACTIVEX:AX-91
HTTP:STC:CLSID:ACTIVEX:AX-90
HTTP:STC:CLSID:ACTIVEX:AX-14
HTTP:STC:CLSID:ACTIVEX:AX-42
HTTP:STC:CLSID:ACTIVEX:AX-38
HTTP:STC:CLSID:ACTIVEX:AX-120
HTTP:STC:CLSID:ACTIVEX:AX-89
HTTP:STC:CLSID:ACTIVEX:YAHOO-IM
HTTP:STC:CLSID:ACTIVEX:FPOLE
HTTP:STC:CLSID:ACTIVEX:VBTOVSI
HTTP:STC:CLSID:ACTIVEX:AX-94
HTTP:STC:CLSID:ACTIVEX:HP-AX
HTTP:STC:CLSID:ACTIVEX:HTML-HP2
HTTP:STC:CLSID:ACTIVEX:LENOVO
HTTP:STC:CLSID:ACTIVEX:YVERINFO
HTTP:STC:CLSID:ACTIVEX:XMLCORE
HTTP:STC:CLSID:ACTIVEX:SONICAX
HTTP:STC:CLSID:ACTIVEX:SHELLAPP
HTTP:STC:CLSID:ACTIVEX:HP-MODEM
HTTP:STC:CLSID:ACTIVEX:AX-149
HTTP:STC:CLSID:ACTIVEX:OUACTR
HTTP:STC:CLSID:ACTIVEX:ACROPDF
HTTP:STC:CLSID:ACTIVEX:VERI-AX
HTTP:STC:CLSID:ACTIVEX:BB-PURE
HTTP:STC:CLSID:ACTIVEX:CTX-ICA
HTTP:STC:CLSID:ACTIVEX:HRTBEAT
HTTP:STC:CLSID:ACTIVEX:MACRO-A2
HTTP:STC:CLSID:ACTIVEX:SONY-XCP
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ
HTTP:STC:CLSID:ACTIVEX:EXECHAND
HTTP:STC:CLSID:ACTIVEX:VMWARE
HTTP:STC:CLSID:ACTIVEX:AX-102
HTTP:STC:CLSID:ACTIVEX:AX-116
HTTP:STC:CLSID:ACTIVEX:AX-115
HTTP:STC:CLSID:ACTIVEX:AX-110
HTTP:STC:CLSID:ACTIVEX:AX-111
HTTP:STC:CLSID:ACTIVEX:AX-118
HTTP:STC:CLSID:ACTIVEX:AX-126
HTTP:STC:CLSID:ACTIVEX:AX-129
HTTP:STC:CLSID:ACTIVEX:AX-138
HTTP:STC:CLSID:ACTIVEX:AX-133
HTTP:STC:CLSID:ACTIVEX:AX-127
HTTP:STC:CLSID:ACTIVEX:AX-131
HTTP:STC:CLSID:ACTIVEX:AX-130
HTTP:STC:CLSID:ACTIVEX:AX-134
HTTP:STC:CLSID:ACTIVEX:AX-105
HTTP:STC:CLSID:ACTIVEX:AX-103
HTTP:STC:CLSID:ACTIVEX:AX-107
HTTP:STC:CLSID:ACTIVEX:AX-121
HTTP:STC:CLSID:ACTIVEX:AX-145
HTTP:STC:CLSID:ACTIVEX:AX-142
HTTP:STC:CLSID:ACTIVEX:AX-143
HTTP:STC:CLSID:ACTIVEX:AX-135
HTTP:STC:CLSID:ACTIVEX:AX-146
HTTP:STC:CLSID:ACTIVEX:DXSDK
HTTP:STC:CLSID:ACTIVEX:AX-123
HTTP:STC:CLSID:ACTIVEX:AX-122
HTTP:STC:CLSID:ACTIVEX:MACRO-A3
HTTP:STC:CLSID:ACTIVEX:AX-139
HTTP:STC:CLSID:ACTIVEX:VML-AX
HTTP:STC:CLSID:ACTIVEX:MAGVIEW
HTTP:STC:CLSID:ACTIVEX:AX-108
HTTP:STC:CLSID:ACTIVEX:AX-02
HTTP:STC:CLSID:ACTIVEX:JINIT-AX
HTTP:STC:CLSID:ACTIVEX:AX-88
HTTP:STC:CLSID:ACTIVEX:CREATEOB
HTTP:STC:CLSID:ACTIVEX:RFCGUI
HTTP:STC:CLSID:ACTIVEX:AX-151
HTTP:STC:CLSID:ACTIVEX:TREND-AX
HTTP:STC:CLSID:ACTIVEX:VANTAGEX
HTTP:STC:CLSID:ACTIVEX:HTML-HLP
HTTP:STC:CLSID:ACTIVEX:MOTIVE
HTTP:STC:CLSID:ACTIVEX:AX-106
HTTP:STC:CLSID:ACTIVEX:ORADC
HTTP:STC:CLSID:ACTIVEX:AX-100
HTTP:STC:CLSID:ACTIVEX:AX-104
HTTP:STC:CLSID:ACTIVEX:AX-87
HTTP:STC:CLSID:ACTIVEX:AX-109
HTTP:STC:CLSID:ACTIVEX:AX-113
HTTP:STC:CLSID:ACTIVEX:AX-112
HTTP:STC:CLSID:ACTIVEX:NESSCAN
HTTP:STC:CLSID:ACTIVEX:MACRO-A1
HTTP:STC:CLSID:ACTIVEX:AX-125
HTTP:STC:CLSID:ACTIVEX:AX-124
HTTP:STC:CLSID:ACTIVEX:AX-117
HTTP:STC:CLSID:ACTIVEX:AX-114
HTTP:STC:CLSID:ACTIVEX:NESSCAN1
HTTP:STC:CLSID:ACTIVEX:MACRO-AX
HTTP:STC:CLSID:ACTIVEX:AX-136
HTTP:STC:CLSID:ACTIVEX:AX-132
HTTP:STC:CLSID:ACTIVEX:AX-93
HTTP:STC:CLSID:ACTIVEX:AX-119
HTTP:STC:CLSID:ACTIVEX:AX-141
HTTP:STC:CLSID:ACTIVEX:AX-137
HTTP:STC:CLSID:ACTIVEX:AX-140
HTTP:STC:CLSID:ACTIVEX:WH32-OF
HTTP:STC:CLSID:ACTIVEX:AX-97
HTTP:STC:CLSID:ACTIVEX:AX-101
HTTP:STC:CLSID:ACTIVEX:AX-98
HTTP:STC:CLSID:ACTIVEX:AX-99
HTTP:STC:CLSID:ACTIVEX:AX-21
HTTP:STC:CLSID:ACTIVEX:AX-07
HTTP:STC:CLSID:ACTIVEX:AX-31
HTTP:STC:CLSID:ACTIVEX:AX-32
HTTP:STC:CLSID:ACTIVEX:AX-30
HTTP:STC:CLSID:ACTIVEX:AX-36
HTTP:STC:CLSID:ACTIVEX:AX-40
HTTP:STC:CLSID:ACTIVEX:AX-37
HTTP:STC:CLSID:ACTIVEX:AX-05
HTTP:STC:CLSID:ACTIVEX:AX-39
HTTP:STC:CLSID:ACTIVEX:AX-16
HTTP:STC:CLSID:ACTIVEX:AX-06
HTTP:STC:CLSID:ACTIVEX:AX-12
HTTP:STC:CLSID:ACTIVEX:AX-45
HTTP:STC:CLSID:ACTIVEX:AX-49
HTTP:STC:CLSID:ACTIVEX:MACRO-A4
HTTP:STC:CLSID:ACTIVEX:AX-51
HTTP:STC:CLSID:ACTIVEX:AX-52
HTTP:STC:CLSID:ACTIVEX:AX-59
HTTP:STC:CLSID:ACTIVEX:AX-50
HTTP:STC:CLSID:ACTIVEX:AX-48
HTTP:STC:CLSID:ACTIVEX:AX-128
HTTP:STC:CLSID:ACTIVEX:AX-68
HTTP:STC:CLSID:ACTIVEX:AX-80
HTTP:STC:CLSID:ACTIVEX:AX-79
HTTP:STC:CLSID:ACTIVEX:AX-66
HTTP:STC:CLSID:ACTIVEX:AX-71
HTTP:STC:CLSID:ACTIVEX:AX-67
HTTP:STC:CLSID:ACTIVEX:AX-69
HTTP:STC:CLSID:ACTIVEX:AX-70
HTTP:STC:CLSID:ACTIVEX:AX-74
HTTP:STC:CLSID:ACTIVEX:AX-85
HTTP:STC:CLSID:ACTIVEX:AX-20
HTTP:STC:CLSID:ACTIVEX:AX-22
HTTP:STC:CLSID:ACTIVEX:AX-18
HTTP:STC:CLSID:ACTIVEX:AX-19
HTTP:STC:CLSID:ACTIVEX:INC-AX
HTTP:STC:CLSID:ACTIVEX:AX-29
HTTP:STC:CLSID:ACTIVEX:AX-27
HTTP:STC:CLSID:ACTIVEX:AX-09
HTTP:STC:CLSID:ACTIVEX:AX-08
HTTP:STC:CLSID:ACTIVEX:AX-10
HTTP:STC:CLSID:ACTIVEX:AX-24
HTTP:STC:CLSID:ACTIVEX:AX-147
HTTP:STC:CLSID:ACTIVEX:EPO-SM
HTTP:STC:CLSID:ACTIVEX:AX-23
HTTP:STC:CLSID:ACTIVEX:AX-28
HTTP:STC:CLSID:ACTIVEX:AX-26
HTTP:STC:CLSID:ACTIVEX:AOL-AX
HTTP:STC:CLSID:ACTIVEX:AX-25
HTTP:STC:CLSID:ACTIVEX:PAVPZ
HTTP:STC:CLSID:ACTIVEX:AX-17
HTTP:STC:CLSID:ACTIVEX:AX-47
HTTP:STC:CLSID:ACTIVEX:AX-46
HTTP:STC:CLSID:ACTIVEX:AX-11
HTTP:STC:CLSID:ACTIVEX:AX-15
HTTP:STC:CLSID:ACTIVEX:AX-41
HTTP:STC:CLSID:ACTIVEX:AX-44
HTTP:STC:CLSID:ACTIVEX:AX-13
HTTP:STC:CLSID:ACTIVEX:AX-34
HTTP:STC:CLSID:ACTIVEX:AX-01
HTTP:STC:CLSID:ACTIVEX:AX-33
HTTP:STC:CLSID:ACTIVEX:AX-43
HTTP:STC:CLSID:ACTIVEX:AX-35
HTTP:STC:CLSID:ACTIVEX:AX-64
HTTP:STC:CLSID:ACTIVEX:AX-62
HTTP:STC:CLSID:ACTIVEX:AX-61
HTTP:STC:CLSID:ACTIVEX:AX-144
HTTP:STC:CLSID:ACTIVEX:AX-60
HTTP:STC:CLSID:ACTIVEX:MCAFEE
HTTP:STC:CLSID:ACTIVEX:AX-56
HTTP:STC:CLSID:ACTIVEX:AX-55
HTTP:STC:CLSID:ACTIVEX:AX-57
HTTP:STC:CLSID:ACTIVEX:AX-54
HTTP:STC:CLSID:ACTIVEX:AX-58
HTTP:STC:CLSID:ACTIVEX:AX-53
HTTP:STC:CLSID:ACTIVEX:AX-76
HTTP:STC:CLSID:ACTIVEX:AX-65
HTTP:STC:CLSID:ACTIVEX:AX-77
HTTP:STC:CLSID:ACTIVEX:AX-75
HTTP:STC:CLSID:ACTIVEX:AX-72
HTTP:STC:CLSID:ACTIVEX:AX-78
HTTP:STC:CLSID:ACTIVEX:AX-73
HTTP:STC:CLSID:ACTIVEX:AX-63
HTTP:STC:CLSID:ACTIVEX:NAVOPTS
HTTP:STC:CLSID:ACTIVEX:OSCAN8
HTTP:STC:CLSID:ACTIVEX:SAP-AX
HTTP:STC:CLSID:ACTIVEX:SYM-FWAX
HTTP:STC:CLSID:ACTIVEX:INOTES6W
HTTP:STC:CLSID:ACTIVEX:SYM-SS
HTTP:STC:CLSID:ACTIVEX:WSH
HTTP:STC:CLSID:ACTIVEX:AX-153
HTTP:STC:CLSID:ACTIVEX:DLMGR
HTTP:STC:CLSID:ACTIVEX:DXTLIPI
HTTP:STC:CLSID:ACTIVEX:NCT-AX
HTTP:STC:CLSID:ACTIVEX:AX-83
HTTP:STC:CLSID:ACTIVEX:AX-84
HTTP:STC:CLSID:ACTIVEX:AX-82

HTTP:STC:DL

HTTP:STC:DL:CVE-2016-0174-CE
HTTP:STC:DL:WORD-MAL-INDEX
HTTP:STC:DL:QT-PICT-FILE-MC
HTTP:STC:DL:XLS-FIELD-MC
HTTP:STC:DL:MS-CVE-2015-2549-CE
HTTP:STC:DL:VISIO-VSD-MEMCP
HTTP:STC:DL:MS-GDI-OUTBOUND-OBA
HTTP:STC:DL:GSTREAMER-QT-OF
HTTP:STC:DL:GIF-AND-PHPFUNC
HTTP:STC:DL:REMOTE-DNS-CHANGE
HTTP:STC:DL:WORD-DPENDGROUP
HTTP:STC:DL:WORD-MEM-CORR1
HTTP:STC:DL:GIMP-XWD-BO
HTTP:STC:DL:CVE-2015-1642-RCE
HTTP:STC:DL:OPEN-TYPE-RCE11
HTTP:STC:DL:OTF-2015-2462-CE
HTTP:STC:DL:ONENOTE-INFO-DISC1
HTTP:STC:DL:CVE-2016-0170-CE
HTTP:STC:DL:MS-VISIO-DXF-BO
HTTP:STC:DL:CVE-2016-0176-CE
HTTP:STC:DL:CVE-2016-0126-MC
HTTP:STC:DL:CVE-2016-0171-UAF
HTTP:STC:DL:CVE-2016-0173-CE
HTTP:STC:DL:CVE-2016-0175-ID
HTTP:STC:DL:CVE-2016-0178-RCE
HTTP:STC:DL:CVE-2015-6131-RCE
HTTP:STC:DL:4XM-VULNS
HTTP:STC:DL:VIDEOLAN-VLC-SWF-CE
HTTP:STC:DL:CVE-2015-6127-RCE
HTTP:STC:DL:ORACLE-LOTUS-123
HTTP:STC:DL:CVE-2016-0196-PRIV
HTTP:STC:DL:CVE-2015-6118-CE
HTTP:STC:DL:CVE-2016-0172-RCE
HTTP:STC:DL:CVE-2016-0180-CE
HTTP:STC:DL:CVE-2015-6040-RCE
HTTP:STC:DL:CVE-2016-0101-RCE
HTTP:STC:DL:CVE-2016-0121-RCE
HTTP:STC:DL:DOT-NET-WEB-PROXY
HTTP:STC:DL:KINGVIEW-LOGFILE-BO
HTTP:STC:DL:MS-TTF-PARSING
HTTP:STC:DL:CVE-2015-6128-CE
HTTP:STC:DL:CVE-2015-6177-CE
HTTP:STC:DL:VLC-MEDIA-PLY-BO1
HTTP:STC:DL:VLC-TY-BO1
HTTP:STC:DL:OFFICEART-PROP
HTTP:STC:DL:CVE-2015-2432-RCE
HTTP:STC:DL:CVE-2016-0091-RCE
HTTP:STC:DL:WORD-REC-LEN-OF1
HTTP:STC:DL:AVI-LIST-OF
HTTP:STC:DL:WORD-FONT1
HTTP:STC:DL:CVE-2015-2463-RCE
HTTP:STC:DL:XLS-BUFF-OR
HTTP:STC:DL:CVE-2016-0134-RCE
HTTP:STC:DL:CVE-2015-2459-CE
HTTP:STC:DL:CVE-2016-0118-RCE
HTTP:STC:DL:SOPHOS-MAL-VISIO1
HTTP:STC:DL:REAL-SWF-BOF1
HTTP:STC:DL:SANDWORM-RCE1
HTTP:STC:DL:XLW-MEM-CORR
HTTP:STC:DL:SOPHOS-ZIPDOS1
HTTP:STC:DL:CVE-2015-2429-CE
HTTP:STC:DL:EMF-IMG-FILE-RCE
HTTP:STC:DL:MS-PUB-MC
HTTP:STC:DL:CVE-2015-2525-PRIV
HTTP:STC:DL:QT-EMBED-JS
HTTP:STC:DL:HELP-IMG-HEAP
HTTP:STC:DL:CVE-2016-0127-CE
HTTP:STC:DL:CVE-2016-0151-PRIV
HTTP:STC:DL:CVE-2015-1698-RCE
HTTP:STC:DL:ACE-BO
HTTP:STC:DL:PPT-FF-BOF1
HTTP:STC:DL:OFF-GDI-HOF1
HTTP:STC:DL:NETOP-DWS-BOF1
HTTP:STC:DL:CVE-2015-6124-RCE
HTTP:STC:DL:MS-OFFICE-PICT-MC1
HTTP:STC:DL:CVE-2015-2431-CE
HTTP:STC:DL:MS-PP-PRESENT-RCE1
HTTP:STC:DL:MS-PUB-RCE1
HTTP:STC:DL:OSX-GIF-BANDPROC
HTTP:STC:DL:MAL-MPEG-41
HTTP:STC:DL:CVE-2015-2546-UAF
HTTP:STC:DL:MAL-MEDIA-RCE1
HTTP:STC:DL:MSHTML-HELP1
HTTP:STC:DL:LIBREOFFICE-UAF
HTTP:STC:DL:MSDOTNET-FUNC-PTR1
HTTP:STC:DL:XLS-ARR-INDEX
HTTP:STC:DL:EICAR1
HTTP:STC:DL:CVE-2016-3282-RCE
HTTP:STC:DL:CVE-2016-0048-CE
HTTP:STC:DL:APPLE-QT-MOV-DOS1
HTTP:STC:DL:CVE-2015-6133-CE
HTTP:STC:DL:ACE-BO1
HTTP:STC:DL:CVE-2016-3254-LPE
HTTP:STC:DL:CVE-2016-3279-CE
HTTP:STC:DL:CVE-2016-3281
HTTP:STC:DL:CVE-2015-2464-RCE
HTTP:STC:DL:MEDIA-CENTR-LINK-CE
HTTP:STC:DL:XLS-SHEET-NAME
HTTP:STC:DL:CVE-2016-3249-LPE
HTTP:STC:DL:MS-GDI-WMF-OF
HTTP:STC:DL:XLS-SERIES-TYPE-RC1
HTTP:STC:DL:CVE-2016-3283-RCE
HTTP:STC:DL:EMF-EMR-INT
HTTP:STC:DL:XLS-NULL-PTR1
HTTP:STC:DL:XLS-INT-OR1
HTTP:STC:DL:CVE-2016-3280-CE
HTTP:STC:DL:VISILOGIC-VLP-BO
HTTP:STC:DL:PDF-FILE
HTTP:STC:DL:WINRAR-FILE
HTTP:STC:DL:ZIP-FILE
HTTP:STC:DL:BZIP2-FILE
HTTP:STC:DL:CVE-2015-6106-RCE
HTTP:STC:DL:MS-WMF-PARSE
HTTP:STC:DL:CVE-2015-2523-RCE
HTTP:STC:DL:CVE-2015-2510-RCE
HTTP:STC:DL:CVE-2016-3251-PRIV
HTTP:STC:DL:CVE-2016-3284-RCE
HTTP:STC:DL:CVE-2016-3239-PE
HTTP:STC:DL:CVE-2015-6173-PRIV
HTTP:STC:DL:CVE-2016-3252-PE
HTTP:STC:DL:CVE-2015-6172-CE
HTTP:STC:DL:CVE-2015-6132-PRIV
HTTP:STC:DL:OFFICE-MAL-PUB1
HTTP:STC:DL:SE-GP-PRO-EX
HTTP:STC:DL:VML-GRADIENT
HTTP:STC:DL:AVI-LIST-OF1
HTTP:STC:DL:CVE-2016-0041-CE
HTTP:STC:DL:CVE-2014-6357-RCE
HTTP:STC:DL:CVE-2014-6360-RCE
HTTP:STC:DL:OO-WORD-TABLE
HTTP:STC:DL:CYTEL-CRSOVR-CYB-BO
HTTP:STC:DL:WINAMP-MAL-PLS
HTTP:STC:DL:MS-WIN-VERIFY-TRUST
HTTP:STC:DL:TRUETYPE-PARSE2
HTTP:STC:DL:AOL-DESKTOP-RTX-BOF
HTTP:STC:DL:WORD-CMAJ
HTTP:STC:DL:WPS-HEAP-OF
HTTP:STC:DL:XLS-MERGECELLS-OF
HTTP:STC:DL:MS-GDI-EMF
HTTP:STC:DL:PAGEMAKER-OF
HTTP:STC:DL:REAL-SWF-BOF
HTTP:STC:DL:OTF-DOS1
HTTP:STC:DL:MP4-FILE-BOF
HTTP:STC:DL:XLS-DATA-INIT
HTTP:STC:DL:WEBEX-ATDL-BOF
HTTP:STC:DL:MS-OFFICE-STRING1
HTTP:STC:DL:PPT-OFFICEART1
HTTP:STC:DL:APPLE-QT-H264-BOF1
HTTP:STC:DL:AVISOFT-DTV-PLF-BO
HTTP:STC:DL:INFORMIX-NFX
HTTP:STC:DL:XBM-BO
HTTP:STC:DL:APPLE-PLS-FILE-BOF
HTTP:STC:DL:CVE-2016-0018-RCE
HTTP:STC:DL:RTF-LISTID-UAF
HTTP:STC:DL:EXCEL-REC-TYPE
HTTP:STC:DL:MS-OBJ-PACKAGER-RC1
HTTP:STC:DL:WP5-FILE
HTTP:STC:DL:VLC-TY-BO
HTTP:STC:DL:CVE-2016-0165-CE
HTTP:STC:DL:CAB-VULNS1
HTTP:STC:DL:VLC-MATROSKA
HTTP:STC:DL:LIBXML2-ENTRY-NAME1
HTTP:STC:DL:XLS-OFFICE-DRAWING
HTTP:STC:DL:CVE-2016-0006-PRIV
HTTP:STC:DL:MS-OFFICE-DOC-MC
HTTP:STC:DL:CVE-2016-0139-RCE
HTTP:STC:DL:MS-MEDIA-DVR
HTTP:STC:DL:CVE-2016-0015-RCE
HTTP:STC:DL:XLS-OBJ-RECORD
HTTP:STC:DL:CVE-2016-0007-PRIV
HTTP:STC:DL:WORD-ARRAY-DATA
HTTP:STC:DL:XLS-HFPICTURE-REC
HTTP:STC:DL:MAL-XRL
HTTP:STC:DL:CVE-2016-0010-RCE
HTTP:STC:DL:FF-SAME-ORIG-SB
HTTP:STC:DL:ORACLE-JPEG-QCD-OF
HTTP:STC:DL:SWF-ACTIONPUSH
HTTP:STC:DL:CVE-2016-0145-RCE
HTTP:STC:DL:CVE-2016-0035-UAF
HTTP:STC:DL:OPEN-TYPE-RCE1
HTTP:STC:DL:VISIO-INVALID-ROW1
HTTP:STC:DL:CVE-2016-0122-RCE
HTTP:STC:DL:COOLPDF-READER-BO
HTTP:STC:DL:CVE-2016-0153-MC
HTTP:STC:DL:SWF-ACTIONCONSTPOOL
HTTP:STC:DL:PPT-OFFART-ATOM-RCE
HTTP:STC:DL:CVE-2016-0135-DOS
HTTP:STC:DL:MAL-WAV-FILE
HTTP:STC:DL:CVE-2016-0020-PRIV
HTTP:STC:DL:MS-READER-MC
HTTP:STC:DL:CCMPLAYER-M3U-OF
HTTP:STC:DL:XLS-SERIES
HTTP:STC:DL:AVI-MMAKER
HTTP:STC:DL:XL-CVE-2013-1315
HTTP:STC:DL:WMF-IO
HTTP:STC:DL:MS-OFFICE-XL-MC
HTTP:STC:DL:PPT-SHAPES-MEM
HTTP:STC:DL:XLS-SERIES-TYPE-RCE
HTTP:STC:DL:CVE-2016-0014-RCE
HTTP:STC:DL:APPLE-QT-VR-TRCK-OF
HTTP:STC:DL:MAL-VBP
HTTP:STC:DL:CVE-2015-0080-ID
HTTP:STC:DL:VLC-MEDIAPLAYER-RCE
HTTP:STC:DL:VIDEOLAN-VLC-PNG-CE
HTTP:STC:DL:CVE-2015-2557-RCE
HTTP:STC:DL:OFFICE-MSO
HTTP:STC:DL:RTF-MISMATCH
HTTP:STC:DL:LOTUS-DOC-VIEWER
HTTP:STC:DL:JAVA-FILEDIALOG-BOF
HTTP:STC:DL:APPLE-QT-H264-OF
HTTP:STC:DL:XLS-OBJ-BIFF
HTTP:STC:DL:APPLE-QT-JPEG-OF3
HTTP:STC:DL:OO-EMF
HTTP:STC:DL:OPENOFFICE-TIFF-OF
HTTP:STC:DL:WORD-BOF
HTTP:STC:DL:XLS-WRITEAV
HTTP:STC:DL:MS-OFFICE-EXCEL-RCE
HTTP:STC:DL:XLS-BOUNDSHEET
HTTP:STC:DL:CYBERLINK-LIST-OF
HTTP:STC:DL:PUB-PLC
HTTP:STC:DL:ACDSEE-XPM-COLOR
HTTP:STC:DL:ULTRAISO-CUE
HTTP:STC:DL:MPLAYER-CALLOC
HTTP:STC:DL:MS-GDI-INT-OVF
HTTP:STC:DL:OTF-GLYPH
HTTP:STC:DL:MAL-PLF
HTTP:STC:DL:PUB-TEXTBOX1
HTTP:STC:DL:KINGSOFT-FONT-BO
HTTP:STC:DL:MAL-MDB
HTTP:STC:DL:OTF-FONT-SIZE
HTTP:STC:DL:XORG-PCF-BO
HTTP:STC:DL:OPENOFFICE-CSV-DOS2
HTTP:STC:DL:CVE-2015-0054-PRIV
HTTP:STC:DL:IMAGIC-GIF-BO
HTTP:STC:DL:MS-WIN-HLP-MC
HTTP:STC:DL:QT-PANORAMA-ATOM1
HTTP:STC:DL:PUB-PLC3
HTTP:STC:DL:MS-PUBLISHER-RCE
HTTP:STC:DL:NUANCE-LAUNCH
HTTP:STC:DL:WEBEX-ATDL-OF
HTTP:STC:DL:XLS-VBOBJ-RCE
HTTP:STC:DL:SHOCKWAVE-3D-RCE
HTTP:STC:DL:WORD-STYLE-EXEC
HTTP:STC:DL:OPENOFFICE-CSV-DOS3
HTTP:STC:DL:CLAMAV-CHM-DOS
HTTP:STC:DL:XLS-MAL-OBJ
HTTP:STC:DL:FAT-MEDIAPLAYER-RCE
HTTP:STC:DL:MP3-WM-MEM
HTTP:STC:DL:CVE-2016-0016-RCE
HTTP:STC:DL:A-PDF-RCE
HTTP:STC:DL:QTPICT-REC-BO
HTTP:STC:DL:PPT-MS-OGRAPH
HTTP:STC:DL:AOL-RTX
HTTP:STC:DL:MAL-WEBEX-WRF
HTTP:STC:DL:OPENOFFICE-CSV-DOS4
HTTP:STC:DL:QP-S3M-OF
HTTP:STC:DL:MS-WORD-MEM-CORR
HTTP:STC:DL:ASTONSOFT-DBR-BO
HTTP:STC:DL:MS-WORD-XST-BOF
HTTP:STC:DL:XLS-FORMAT-ARRAY
HTTP:STC:DL:GNOME-RC4-BO
HTTP:STC:DL:OFFICE-PICT-MC
HTTP:STC:DL:XLS-BIN-OF
HTTP:STC:DL:FOXIT-READER-ESCAPE
HTTP:STC:DL:MINI-STREAM-PLS-OF
HTTP:STC:DL:PDFXCHANGE-AX
HTTP:STC:DL:GALAN-BO
HTTP:STC:DL:PEAZIP-CINJ
HTTP:STC:DL:CVE-2016-0022-RCE
HTTP:STC:DL:CVE-2016-0055-MC
HTTP:STC:DL:VISIO-OBJ-TAG
HTTP:STC:DL:XLS-REPT
HTTP:STC:DL:DIRECTSHOW-QUICK-MC
HTTP:STC:DL:MSPUBLISHER-OBJ
HTTP:STC:DL:APPLE-DMG-VOLNAME
HTTP:STC:DL:COM-CLSID-DLL
HTTP:STC:DL:XLS-CF-BIFF
HTTP:STC:DL:WORKS-WPS-OF
HTTP:STC:DL:WORD-FONT
HTTP:STC:DL:XLS-MS-OGRAPH
HTTP:STC:DL:PPT-2000-BOF
HTTP:STC:DL:CVE-2016-0015-CE-1
HTTP:STC:DL:XLS-WINDOW2
HTTP:STC:DL:FFMPEG-READ-OF
HTTP:STC:DL:JRE-APPLET2CLASS-LD
HTTP:STC:DL:EMF-OF
HTTP:STC:DL:CLAMAV-PE-INT
HTTP:STC:DL:EXESCOPE-FILE-BO
HTTP:STC:DL:ISPVM-SYS-XCF-BOF
HTTP:STC:DL:MPEG4-3IVX-FILE
HTTP:STC:DL:WORD-RTF-CONTROL
HTTP:STC:DL:ACDSEE-XBM-WIDTH
HTTP:STC:DL:XLS-LINKED-LIST
HTTP:STC:DL:VISIO-DXF-RCE
HTTP:STC:DL:REAL-3GP-FILE-MC
HTTP:STC:DL:VLC-MP4-BOF
HTTP:STC:DL:PROSHOW-PSH-FILE-OF
HTTP:STC:DL:MS-EXCEL-OBJ-MC
HTTP:STC:DL:MS-EXCEL-TXOOBJ-MC
HTTP:STC:DL:PUB-INDEXLIMITS
HTTP:STC:DL:SYM-AV-RAR-BO
HTTP:STC:DL:WORD-SPRM-MEM
HTTP:STC:DL:VLC-MEDIA-PLY-BO
HTTP:STC:DL:REAL-3G2-WRITEAV-MC
HTTP:STC:DL:EICAR-2
HTTP:STC:DL:XLS-FRTWRAPPER1
HTTP:STC:DL:DS-ATOM-TABLE1
HTTP:STC:DL:PPT-VIEWER-MEMALLOC
HTTP:STC:DL:QT-COLOR-ATOM1
HTTP:STC:DL:OO-RTF
HTTP:STC:DL:PPT-SOUND-OBJ-OF
HTTP:STC:DL:WORD-TEXTBOX
HTTP:STC:DL:NETOP-DWS-BOF
HTTP:STC:DL:WORD-RTF-MEM
HTTP:STC:DL:QT-JVTCOMPENCODE1
HTTP:STC:DL:QT-UDTA-ATOM1
HTTP:STC:DL:LIBSNDFILE-PAF-OF
HTTP:STC:DL:IRFANVIEW-RLE-DC-BO
HTTP:STC:DL:MS-OFFICE-EXCEL-MC
HTTP:STC:DL:QT-PDAT1
HTTP:STC:DL:MS-PICTURE-MGR-AV
HTTP:STC:DL:QT-TOQTPOINTER
HTTP:STC:DL:MAL-RMF-GM
HTTP:STC:DL:MS-PAINT-BMP-MC
HTTP:STC:DL:VLC-SWF-RCE
HTTP:STC:DL:CVE-2015-2550-PRIV
HTTP:STC:DL:XENORATE-XPL-BOF
HTTP:STC:DL:SOPHOS-RAR-VMSF-RGB
HTTP:STC:DL:LOTUS-URL-RCE
HTTP:STC:DL:MS-WIN-MOVIE-MKR-MC
HTTP:STC:DL:IRFANVIEW-IMXCF-OF
HTTP:STC:DL:MPG123-HEAP-OF
HTTP:STC:DL:SOPHOS-RAR-FILTER
HTTP:STC:DL:DIRECTPLAY-HEAP-OF
HTTP:STC:DL:VISIWAVE-SITE-BOF
HTTP:STC:DL:APPLE-QT-QTIF-DOS
HTTP:STC:DL:MINI-STREAM-ASX-BOF
HTTP:STC:DL:XLS-SHEET-OBJ
HTTP:STC:DL:QT-FPX-IO1
HTTP:STC:DL:WMP-DVR-MS
HTTP:STC:DL:OO-OLE
HTTP:STC:DL:QT-STSC-ATOM-MC1
HTTP:STC:DL:MS-OFFICE-WORD-BO
HTTP:STC:DL:MS-DOC-STREAM-CE1
HTTP:STC:DL:PPT-TXMASTERSTYLE
HTTP:STC:DL:WORD-STRING
HTTP:STC:DL:WORD-STSH-RCE
HTTP:STC:DL:PPT-VIEWER-MEMALLO1
HTTP:STC:DL:EXCEL-UAF-RCE
HTTP:STC:DL:MPLAYER-SAMI
HTTP:STC:DL:MS-DOC-STREAM-CE
HTTP:STC:DL:CVE-2015-6122-CE
HTTP:STC:DL:XLS-FILTER-REC
HTTP:STC:DL:REALPLAYER-SWF-BO
HTTP:STC:DL:SOPHOS-ZIPDOS
HTTP:STC:DL:MS-PNG-IMG-CE
HTTP:STC:DL:REALPLY-URL-BOF
HTTP:STC:DL:PPT-TXMASTERSTYLE1
HTTP:STC:DL:APPLE-QT-FTAB-ATOM
HTTP:STC:DL:SOPHOS-PDF-FILE-OF
HTTP:STC:DL:SOPHOS-CAB-FILE-OF
HTTP:STC:DL:MS-OPEN-FONT-FILE
HTTP:STC:DL:DOCX-ACCESS-RCE1
HTTP:STC:DL:ZIP-FOR-MEDIA
HTTP:STC:DL:PPT-TEXTBYTESATM-BO
HTTP:STC:DL:AVAST-LHA1
HTTP:STC:DL:CVE-2015-0063-RCE
HTTP:STC:DL:VISIO-UMLSTRING
HTTP:STC:DL:MS-OFFICE-2010-RCE
HTTP:STC:DL:XLS-MDXTUPLE-BIFF
HTTP:STC:DL:ASF-DF
HTTP:STC:DL:XLS-DBORPARAMQRY
HTTP:STC:DL:CVE-2015-2477-CE
HTTP:STC:DL:MS-WORD-BULLET
HTTP:STC:DL:ONENOTE-INFO-DISC
HTTP:STC:DL:XLS-MDSXET-REC
HTTP:STC:DL:CVE-2015-0003-PRIV
HTTP:STC:DL:XLS-FILE-HNDL
HTTP:STC:DL:CVE-2015-2469-CE
HTTP:STC:DL:MS-PP-PRESENT-RCE
HTTP:STC:DL:OFF-GDI-HOF
HTTP:STC:DL:VBA-MEM-CORRUPT
HTTP:STC:DL:MS-PUB-RCE
HTTP:STC:DL:OPENSSL-CMS-FILE
HTTP:STC:DL:XLS-DATA-RECORD
HTTP:STC:DL:XLS-CHART-OBJ
HTTP:STC:DL:MS-OFFICE-STRING
HTTP:STC:DL:MS-CVE-2014-6356-CE
HTTP:STC:DL:WORD-LINK-OBJ
HTTP:STC:DL:APPLE-QT-MOV-DOS
HTTP:STC:DL:WIN-EXE-DOWNLOAD
HTTP:STC:DL:URSOFT-W32DASM-BOF
HTTP:STC:DL:OTF-FONT-INT
HTTP:STC:DL:MS-GDI32-POLYLINE
HTTP:STC:DL:OFFICEART-RCE
HTTP:STC:DL:CISCO-FORMAT-PLY-MC
HTTP:STC:DL:GOGLE-STGEFRIGHT-CE
HTTP:STC:DL:PPT-SCRIPT
HTTP:STC:DL:XLS-MSOFBTOPT
HTTP:STC:DL:WORD-CLSID
HTTP:STC:DL:MAL-WRI
HTTP:STC:DL:OFFICE-PCT
HTTP:STC:DL:OO-WORD-TABLE1
HTTP:STC:DL:CVE-2015-2387-CE
HTTP:STC:DL:AVI-MMAKER1
HTTP:STC:DL:MSHTML-DBLFREE
HTTP:STC:DL:FONT-HANDLING-CE
HTTP:STC:DL:OTF-INDEX-RCE
HTTP:STC:DL:WORD-BOOKMARK-OF
HTTP:STC:DL:OFFICE-MAL-PUB
HTTP:STC:DL:FAX-EDITOR-RCE
HTTP:STC:DL:WIRELURKER-DOWNLOAD
HTTP:STC:DL:ULTRAISO-CUE2
HTTP:STC:DL:MS-MPEG-LAYER-3-DOS
HTTP:STC:DL:DS-ATOM-TABLE
HTTP:STC:DL:CAB-VULNS
HTTP:STC:DL:MS-NET-ASLR-BYPASS
HTTP:STC:DL:XLS-2015-2375-ID
HTTP:STC:DL:ULTRAISO-CUE3
HTTP:STC:DL:WORD-SECTION-OF1
HTTP:STC:DL:XLS-SERIES6
HTTP:STC:DL:XLS-SERIES3
HTTP:STC:DL:ULTRAISO-CUE4
HTTP:STC:DL:XLS-SERIES7
HTTP:STC:DL:CVE-2015-2367-SB
HTTP:STC:DL:MS-PAINT-DOS
HTTP:STC:DL:DLL-PLANTING-CE
HTTP:STC:DL:MSCOMCTL-ACTIVEX
HTTP:STC:DL:MS-FOREFRONT-CUP
HTTP:STC:DL:MSPROJECT-MEM
HTTP:STC:DL:CVE-2015-2378-CE
HTTP:STC:DL:XLS-SERIES2
HTTP:STC:DL:CVE-2015-1675-RCE
HTTP:STC:DL:CVE-2015-2370-PRIV
HTTP:STC:DL:CVE-2015-2366-PE
HTTP:STC:DL:SUSPICIOUS-FILE
HTTP:STC:DL:MS-VISIO-OBJ-MC
HTTP:STC:DL:VISIO-COMPRESSION
HTTP:STC:DL:XLS-SERIES4
HTTP:STC:DL:WORD-IND
HTTP:STC:DL:CVE-2015-2365-PRIV
HTTP:STC:DL:CVE-2016-0092-RCE
HTTP:STC:DL:PPT-UNK-ANI
HTTP:STC:DL:MS-XL-ROW-REC-BO
HTTP:STC:DL:MS-OFFICE-BAD-INDEX
HTTP:STC:DL:XLS-INDEX
HTTP:STC:DL:WIN-MEDIA-PLY-MC
HTTP:STC:DL:CVE-2015-0064-RCE
HTTP:STC:DL:MS-WORDPAD-DOS
HTTP:STC:DL:MSHTML-HELP
HTTP:STC:DL:CVE-2015-2426-BOF
HTTP:STC:DL:XLS-OBJECTLINK
HTTP:STC:DL:XLS-BIFF-MC
HTTP:STC:DL:VISIO-INVALID-ROW
HTTP:STC:DL:XLS-SERIES9
HTTP:STC:DL:XLS-INV-DRAW
HTTP:STC:DL:MULTIMEDIA-JUKEBOX
HTTP:STC:DL:WMF-HEAPOF
HTTP:STC:DL:GNU-TAR-PAX-BOF
HTTP:STC:DL:CVE-2016-0117-RCE
HTTP:STC:DL:AVI-DL-MEM
HTTP:STC:DL:XLS-PALETTE
HTTP:STC:DL:CVE-2016-0008-CE
HTTP:STC:DL:WORDPAD-BO
HTTP:STC:DL:WORD-SMART-TAGS
HTTP:STC:DL:VISIO-BOF
HTTP:STC:DL:VISIO-OBJ-HEADER
HTTP:STC:DL:XLS-SERIES5
HTTP:STC:DL:PPT-FB1-ATOM-OF3
HTTP:STC:DL:CVE-2016-0021-RCE
HTTP:STC:DL:PPT-NOTES-MC
HTTP:STC:DL:OFF-GDI-RCD-TYPE
HTTP:STC:DL:MS-CVE-2015-2553-CE
HTTP:STC:DL:CVE-2016-0056-RCE
HTTP:STC:DL:EXCEL-SST
HTTP:STC:DL:MSEXCEL-VBMACRO-RCE
HTTP:STC:DL:CVE-2015-0065-RCE
HTTP:STC:DL:CVE-2016-0042-RCE
HTTP:STC:DL:CVE-2015-0084-SB
HTTP:STC:DL:MAL-MPEG-4
HTTP:STC:DL:CVE-2015-0086-RCE
HTTP:STC:DL:XLS-PIC-REC-MC
HTTP:STC:DL:CVE-2016-0059-ID
HTTP:STC:DL:MAL-AVI-FILE
HTTP:STC:DL:MAL-WIN-BRIEFCASE-1
HTTP:STC:DL:MULTIPLE-MAL-FILE
HTTP:STC:DL:CVE-2015-0085-RCE
HTTP:STC:DL:QT-TEXML-BOF
HTTP:STC:DL:MAL-PNG-FILE
HTTP:STC:DL:XLS-MAL-REC-MC
HTTP:STC:DL:CVE-2015-0094-ID
HTTP:STC:DL:CVE-2015-0078-PRIV
HTTP:STC:DL:WNDPROC-INFO-DISC
HTTP:STC:DL:VISIO-OBJ-CONFUSION
HTTP:STC:DL:OFFICE-VBA-UAF
HTTP:STC:DL:CVE-2015-0332-CE
HTTP:STC:DL:CVE-2015-1644-PRIV
HTTP:STC:DL:OBF-PE-DL
HTTP:STC:DL:MAL-M3U
HTTP:STC:DL:APPLE-QT-TEXML
HTTP:STC:DL:DIRECTX-SAMI
HTTP:STC:DL:MAL-MEDIA-RCE
HTTP:STC:DL:CVE-2015-3048-RCE
HTTP:STC:DL:VCF-SHELLEXECUTE
HTTP:STC:DL:MUL-FILES-WITH-PDF
HTTP:STC:DL:QT-FLIPFILETYPE
HTTP:STC:DL:CVE-2015-1681-DOS
HTTP:STC:DL:CVE-2015-1676-ID
HTTP:STC:DL:RTF-PARSE-RCE
HTTP:STC:DL:VISIO-INV-VERSION
HTTP:STC:DL:CVE-2015-1674-SB
HTTP:STC:DL:XLS-DRAWING-REC
HTTP:STC:DL:QT-UDTA-ATOM
HTTP:STC:DL:WORD-REC-LEN-OF
HTTP:STC:DL:QT-SMIL-FILEHAND
HTTP:STC:DL:XLS-VERSIONINFO
HTTP:STC:DL:CVE-2015-1650-RCE
HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC
HTTP:STC:DL:APPLE-QT-RNET-OF
HTTP:STC:DL:APPLE-QT-TARGA-BO
HTTP:STC:DL:CVE-2015-1770-CE
HTTP:STC:DL:CVE-2016-3233-CE
HTTP:STC:DL:MS-EXPLORER-URL-OF
HTTP:STC:DL:MIXERSEQUENCER-RCE
HTTP:STC:DL:CVE-2015-1721-PRIV
HTTP:STC:DL:JS-VAR-OBFUS
HTTP:STC:DL:WIN-CHM-DETECTION
HTTP:STC:DL:MSOFFICE-MSODLL-MC
HTTP:STC:DL:CVE-2016-3216-RCE
HTTP:STC:DL:ASF-SR
HTTP:STC:DL:CVE-2015-1678-ID
HTTP:STC:DL:APPLE-QT-H264-BOF
HTTP:STC:DL:NODEJS-YAML-CE
HTTP:STC:DL:MAL-OGG-FILE
HTTP:STC:DL:CVE-2011-1985-CE
HTTP:STC:DL:FREETYPE-TYPE1
HTTP:STC:DL:ACDSEE-XPM-VALUES
HTTP:STC:DL:WEBEX-ATAS
HTTP:STC:DL:XLS-IMDATA
HTTP:STC:DL:JRE-ZIP-READCEN
HTTP:STC:DL:XLS-XF-BIFF
HTTP:STC:DL:VS-XML-INFO
HTTP:STC:DL:XLS-SXLI-MC
HTTP:STC:DL:DOCX-ACCESS-RCE
HTTP:STC:DL:XLS-MOD-BYTES
HTTP:STC:DL:JVM-READMABCURVE1
HTTP:STC:DL:XLS-SST
HTTP:STC:DL:XLS-SCENARIO
HTTP:STC:DL:PPT-OFFICEART
HTTP:STC:DL:XLS-FORMULA-BIFF
HTTP:STC:DL:DBP-FILE-BOF
HTTP:STC:DL:CVE-2016-0054-RCE
HTTP:STC:DL:WIN-GDI-METAFILE
HTTP:STC:DL:APPLE-QT-IMAGE-MC
HTTP:STC:DL:MSDOTNET-FUNC-PTR
HTTP:STC:DL:EXCEL-FEAT11
HTTP:STC:DL:MAL-PLS
HTTP:STC:DL:XLS-XISPARENT
HTTP:STC:DL:MS-FON-FILE-RCE
HTTP:STC:DL:QT-COLOR-TABLE
HTTP:STC:DL:PPT-OEP-ATOM-INV
HTTP:STC:DL:MPP-MEM-VAL
HTTP:STC:DL:XLS-LBL-RECORD
HTTP:STC:DL:CLAMAV-INT
HTTP:STC:DL:CVE-2015-2456-CE
HTTP:STC:DL:MS-WORDPAD-DOS1
HTTP:STC:DL:PPT-SLIDEATOM1
HTTP:STC:DL:XLS-SERIES1
HTTP:STC:DL:CVE-2015-1725-PRIV
HTTP:STC:DL:ORACLE-JPEG-QCD-OF2
HTTP:STC:DL:CVE-2015-1726-CE
HTTP:STC:DL:CVE-2015-1728-CE
HTTP:STC:DL:CVE-2015-1719-PRIV
HTTP:STC:DL:CVE-2015-2360-PRIV
HTTP:STC:DL:SANDWORM-RCE
HTTP:STC:DL:CRYSTAL-RPT-OLE
HTTP:STC:DL:CVE-2015-6104-RCE
HTTP:STC:DL:CVE-2015-2520-RCE
HTTP:STC:DL:MAL-AIFF
HTTP:STC:DL:WJ-CVE-2015-1696-CE
HTTP:STC:DL:MS-WIN-DOTNET-RCE
HTTP:STC:DL:CLAMAV-UPX-FILE-MC
HTTP:STC:DL:MIDICONTROLEVENT
HTTP:STC:DL:CVE-2016-0053-RCE
HTTP:STC:DL:CVE-2016-0052-RCE
HTTP:STC:DL:WNDPROC-INFO-DISC1
HTTP:STC:DL:MOZILLA-WAV-BOF
HTTP:STC:DL:APPLE-QT-OBJI
HTTP:STC:DL:QT-FPX-IO
HTTP:STC:DL:MS-OFFICE-BAD-INDE1
HTTP:STC:DL:SWF-ACTIONPUSH1
HTTP:STC:DL:WINASM-STUDIO-BOF1
HTTP:STC:DL:CVE-2016-3308-PE
HTTP:STC:DL:XLS-WORKSPACE-IDX
HTTP:STC:DL:CVE-2016-3203-RCE
HTTP:STC:DL:XLS-SELECTION
HTTP:STC:DL:MAL-MOV1
HTTP:STC:DL:OPENOFFICE-CSV-DOS1
HTTP:STC:DL:ULTRAISO-CUE1
HTTP:STC:DL:MS-VB-VB6STKIT1
HTTP:STC:DL:PPT-PRINTER-REC-OF
HTTP:STC:DL:GZIP-LHZ
HTTP:STC:DL:MS-OFFICE-2007-MC
HTTP:STC:DL:WORD-PPAX
HTTP:STC:DL:QT-PDAT
HTTP:STC:DL:WIN-MAL-COMP-FILE
HTTP:STC:DL:QUICKTIME-PAINTPOLY
HTTP:STC:DL:MS-MEDIA-DECOMP
HTTP:STC:DL:CVE-2015-2521-RCE
HTTP:STC:DL:CVE-2015-1673-PE
HTTP:STC:DL:APPLE-QT-FLIC-BO
HTTP:STC:DL:CVE-2014-6333-MC
HTTP:STC:DL:XLS-AXISPARENT
HTTP:STC:DL:APPLE-QT-JPEG-OF
HTTP:STC:DL:XLS-NULL-PTR
HTTP:STC:DL:MSOFFICE-MSO-RCE
HTTP:STC:DL:IRFANVIEW-MC
HTTP:STC:DL:VISIO-MAL-DXF
HTTP:STC:DL:CVE-2015-1695-RCE
HTTP:STC:DL:JVM-READMABCURVE
HTTP:STC:DL:WORD-DPPOLYCOUNT
HTTP:STC:DL:ORBIT-DOWNLOADER-OF
HTTP:STC:DL:TRUETYPE-PARSE
HTTP:STC:DL:XLS-SXSTREAMID
HTTP:STC:DL:OUTLOOK-CE
HTTP:STC:DL:MS-WORKS-BO
HTTP:STC:DL:OTF-NULL-PTR
HTTP:STC:DL:CVE-2015-3083-CE
HTTP:STC:DL:QT-FLASHPIX-BOF
HTTP:STC:DL:LIBPNG-TRAN-CHLT-BO
HTTP:STC:DL:CGM-IMG-BOF
HTTP:STC:DL:WORD-SPRMTDIAGLINE
HTTP:STC:DL:IDEAL-SERVER-OF
HTTP:STC:DL:MAL-WMV-MEDIA
HTTP:STC:DL:WORD-RTF-RCE
HTTP:STC:DL:XLS-SERIES8
HTTP:STC:DL:WORD-CONV-INT-OF
HTTP:STC:DL:XNVIEW-PCT-FILE-BOF
HTTP:STC:DL:WJ-2015-1697-CE
HTTP:STC:DL:CVE-2013-3893-DROP
HTTP:STC:DL:ESIGNAL-MUL-FILE-OF
HTTP:STC:DL:XLS-HEAP-OF
HTTP:STC:DL:OTF-CFF-RCE
HTTP:STC:DL:MS-PUBLISHER-MC
HTTP:STC:DL:MS-HELP-CNT-BO
HTTP:STC:DL:PPT-PP7-MC1
HTTP:STC:DL:XLS-SXSTREAMID1
HTTP:STC:DL:XLS-RTWINDOW1
HTTP:STC:DL:XLS-FNGROUPNAME
HTTP:STC:DL:CVE-2015-6107-CE
HTTP:STC:DL:XLS-SXVIEW-REC
HTTP:STC:DL:PPT-PP7-MC
HTTP:STC:DL:ONENOTE-INFO-DISC2
HTTP:STC:DL:VISIO-TYPE-CONF
HTTP:STC:DL:WORDPAD-FONT-CONV
HTTP:STC:DL:EXCEL-SERIES
HTTP:STC:DL:CVE-2015-1649-RCE
HTTP:STC:DL:WORD-DOC-BOF
HTTP:STC:DL:WORD-LISTOVERRIDE
HTTP:STC:DL:CVE-2015-1651-RCE
HTTP:STC:DL:CVE-2015-2555-CE
HTTP:STC:DL:MS-CVE-2015-2558-CE
HTTP:STC:DL:MS-NET-CLILOADER-MC
HTTP:STC:DL:CVE-2014-1776-SHELL
HTTP:STC:DL:QT-PV-GIF
HTTP:STC:DL:SOPHOS-MAL-VISIO
HTTP:STC:DL:LIBXML2-ENTRY-NAME
HTTP:STC:DL:CVE-2015-1739-CE
HTTP:STC:DL:JAVA-SB-RES
HTTP:STC:DL:ARJ-BO
HTTP:STC:DL:MAL-ASX-OF
HTTP:STC:DL:CVE-2016-3201-RCE
HTTP:STC:DL:MAL-MIC-BICLRUSED
HTTP:STC:DL:MS-FONTMATRIX
HTTP:STC:DL:DOC-FIB
HTTP:STC:DL:XLS-HFPICT
HTTP:STC:DL:CVE-2016-0025-UAF
HTTP:STC:DL:CVE-2016-3221-PRIV
HTTP:STC:DL:CVE-2015-6102-RCE
HTTP:STC:DL:CVE-2015-6123-RCE
HTTP:STC:DL:CVE-2016-0126-RCE
HTTP:STC:DL:CVE-2016-3220-RCE
HTTP:STC:DL:CVE-2015-6113-RCE
HTTP:STC:DL:CVE-2016-3218-PRIV
HTTP:STC:DL:TM-AV-PM-CI
HTTP:STC:DL:XLS-FEATHEADER
HTTP:STC:DL:WORD-SPRMTSETBRC
HTTP:STC:DL:CVE-2016-3219-RCE
HTTP:STC:DL:CVE-2016-0183-ID
HTTP:STC:DL:CVE-2016-0140-ID
HTTP:STC:DL:CVE-2015-6098-BO
HTTP:STC:DL:CVE-2015-6093-RCE
HTTP:STC:DL:CVE-2015-6094-RCE
HTTP:STC:DL:CVE-2015-6100-RCE
HTTP:STC:DL:CVE-2015-6096-CE
HTTP:STC:DL:CVE-2015-2478-PE
HTTP:STC:DL:CVE-2015-6038-RCE
HTTP:STC:DL:MAL-HLP-CHM
HTTP:STC:DL:APPLE-QT-MJPEG-OF
HTTP:STC:DL:WORD-WEBAPPS-RCE
HTTP:STC:DL:CVE-2015-6092-RCE
HTTP:STC:DL:CVE-2015-6101-RCE
HTTP:STC:DL:XLS-MAL-RTD-REC
HTTP:STC:DL:CVE-2015-6091-RCE
HTTP:STC:DL:OFFICE-BO-RCE
HTTP:STC:DL:MS-WMF-DOS
HTTP:STC:DL:APPLE-ITUNES-IO
HTTP:STC:DL:CVE-2015-2455-CE
HTTP:STC:DL:MAL-WIN-BRIEFCASE-2
HTTP:STC:DL:OO-XPMREAD-OF
HTTP:STC:DL:MPLAYER-TWINVQ-BO
HTTP:STC:DL:BITDEFEND-SCRIPT
HTTP:STC:DL:WINVERIFY-TRUST
HTTP:STC:DL:GIMP-XWD-HEAP-BO
HTTP:STC:DL:MPLAYER-DEMUXER
HTTP:STC:DL:OLE-STRUCTURE-RCE
HTTP:STC:DL:XLS-SXVIEW
HTTP:STC:DL:MS-CVE-2015-0097-CE
HTTP:STC:DL:CVE-2016-3231-PRIV
HTTP:STC:DL:MS-CVE-2015-0096-CE
HTTP:STC:DL:QT-PANORAMA-ATOM
HTTP:STC:DL:IRFANVIEW-TIF-DC-BO
HTTP:STC:DL:EICAR
HTTP:STC:DL:WORDPAD-PRL
HTTP:STC:DL:EOT-IO
HTTP:STC:DL:QUO-ESIGNAL-BOF
HTTP:STC:DL:WORD-MEM-CORR
HTTP:STC:DL:CVE-2016-0080-CE
HTTP:STC:DL:XLS-PUB-REC
HTTP:STC:DL:CVE-2016-0168-ID
HTTP:STC:DL:LIBFLAC-PIC-DESC
HTTP:STC:DL:DOT-NET-INFO-DISC
HTTP:STC:DL:CLAMAV-UPX-BO
HTTP:STC:DL:CVE-2015-1671-RCE
HTTP:STC:DL:VISIO-VSD-MEM
HTTP:STC:DL:AVAST-LHA
HTTP:STC:DL:APPLE-ITUNES-BOF
HTTP:STC:DL:PPT-FF-BOF
HTTP:STC:DL:MS-OBJ-PACKAGER-RCE
HTTP:STC:DL:LIBFLAC-VORBIS-CMT
HTTP:STC:DL:PAC-DESIGNER-BO
HTTP:STC:DL:CVE-2014-6335-RCE
HTTP:STC:DL:CVE-2014-6364-RCE
HTTP:STC:DL:WORD-SECTION-OF
HTTP:STC:DL:CVE-2015-1683-UAF
HTTP:STC:DL:NET-CVE-2015-1672
HTTP:STC:DL:CVE-2015-1743-RCE
HTTP:STC:DL:WORD-MAL-DOC
HTTP:STC:DL:LOTUS-LZH-BOF
HTTP:STC:DL:QEMU-FLOPPY-DISK-OF
HTTP:STC:DL:OFFICE-CGM
HTTP:STC:DL:WEBEX-RECORD-ATAS
HTTP:STC:DL:CVE-2015-1759-RCE
HTTP:STC:DL:XLS-SLK-PICTURE-RCE
HTTP:STC:DL:WORD-FILE-MEM
HTTP:STC:DL:MFC-DOC-TITLE
HTTP:STC:DL:PANDA-ZOO-BO
HTTP:STC:DL:XLS-INT-OR
HTTP:STC:DL:CVE-2015-2467-CE
HTTP:STC:DL:MS-PPT-2007-MC
HTTP:STC:DL:OPEN-TYPE-RCE
HTTP:STC:DL:PDF-PRINTSEPS
HTTP:STC:DL:VISIO-FREED
HTTP:STC:DL:XLS-NAMED-GRAPH
HTTP:STC:DL:PUB-OPY
HTTP:STC:DL:QT-CRGN-ATOM
HTTP:STC:DL:OTF-INF-LOOP
HTTP:STC:DL:CVE-2014-6361-RCE
HTTP:STC:DL:WORD-SMARTTAG
HTTP:STC:DL:LIBFLAC-PIC-TYPE
HTTP:STC:DL:PPT-EXTTIMENODE
HTTP:STC:DL:CVE-2016-3313-CE
HTTP:STC:DL:XLS-SST-REC-MC
HTTP:STC:DL:CVE-2016-3311-PRIV
HTTP:STC:DL:CVE-2015-2376-CE
HTTP:STC:DL:DOC-2015-2379-CE
HTTP:STC:DL:DOC-2015-2380-CE
HTTP:STC:DL:CVE-2015-2377-UAF
HTTP:STC:DL:QT-COLOR-ATOM
HTTP:STC:DL:XLS-WORKSPACE-DES
HTTP:STC:DL:OFFICE-BMP-HEADER
HTTP:STC:DL:MS-EMF-PARSE
HTTP:STC:DL:XLS-XML-ZIP
HTTP:STC:DL:MSWMM-OF
HTTP:STC:DL:CLAMAV-MEW-PACKED
HTTP:STC:DL:XLS-SHRFMLA
HTTP:STC:DL:AV-CAB-HEADER
HTTP:STC:DL:CSOUND-GETNUM-BOF
HTTP:STC:DL:MS-OFFICE-PICT-MC
HTTP:STC:DL:GOOGLE-PICASA-OVF
HTTP:STC:DL:XLS-FILE-IMPORT
HTTP:STC:DL:QT-STSD-ATOMS
HTTP:STC:DL:MCAF-LHA-OF
HTTP:STC:DL:WMP-SKIN-DECOMP
HTTP:STC:DL:WMP-SKIN-PARSE
HTTP:STC:DL:MS-DIRECTSHOW-RCE
HTTP:STC:DL:RTF-FPARSE-RCE
HTTP:STC:DL:CVE-2016-3316-ID
HTTP:STC:DL:ACCESS-MEM-CORR
HTTP:STC:DL:CVE-2016-3304-CE
HTTP:STC:DL:WPD-WP3-TABLE-BO
HTTP:STC:DL:XLS-BIFF-REC-RCE
HTTP:STC:DL:XLS-PIVOT
HTTP:STC:DL:CISCO-WEBEX-ATDL
HTTP:STC:DL:XLS-SET-FONT
HTTP:STC:DL:COLORMGMT-PATHNAME
HTTP:STC:DL:QT-JVTCOMPENCODE
HTTP:STC:DL:MAL-WOFF
HTTP:STC:DL:QT-STSC-ATOM-MC
HTTP:STC:DL:XLS-MBOF
HTTP:STC:DL:PUB-TEXTBOX
HTTP:STC:DL:QUICKTIME-QTVR-BOF
HTTP:STC:DL:OTF-BO
HTTP:STC:DL:PDF-U3D-CLOD
HTTP:STC:DL:WORD-STYLESHEET-MEM
HTTP:STC:DL:XLS-FRTWRAPPER
HTTP:STC:DL:WORD-GLOBAL-INDEX
HTTP:STC:DL:VLC-XSPF-MEM
HTTP:STC:DL:PPT-FB1-ATOM-OF
HTTP:STC:DL:OLE-ART-INV
HTTP:STC:DL:CVE-2015-2415-RCE
HTTP:STC:DL:MAL-VISIO
HTTP:STC:DL:MS-ACCESS-MEM-CORR
HTTP:STC:DL:XLS-WOPT
HTTP:STC:DL:APPLE-PICT
HTTP:STC:DL:MSSQL-BACKUP-MEM
HTTP:STC:DL:XLS-SXDB
HTTP:STC:DL:EPS-DSC-BOF
HTTP:STC:DL:CVE-2015-1682-RCE
HTTP:STC:DL:MS-RICHEDIT-RCE
HTTP:STC:DL:MAL-MOVIEMAKER
HTTP:STC:DL:CLAMAV-JPEG-DOS
HTTP:STC:DL:XLS-COLUMN-RECORD
HTTP:STC:DL:APPLEQT-MP4-CE
HTTP:STC:DL:SEARCHMS-EXEC
HTTP:STC:DL:COOLPLAYER-PLAYLIST
HTTP:STC:DL:PPT-SLIDEATOM
HTTP:STC:DL:MS-WORKS9-RTF
HTTP:STC:DL:MSHTML-HELP-1
HTTP:STC:DL:WPD-BO
HTTP:STC:DL:CVE-2016-3318-RCE
HTTP:STC:DL:APPLE-QT-JPEG-2000
HTTP:STC:DL:PPT-LEGACY-FMT-OF
HTTP:STC:DL:MS-VISUAL-BASIC-BOF
HTTP:STC:DL:CVE-2016-3317-CE
HTTP:STC:DL:CVE-2015-2470-BO
HTTP:STC:DL:CVE-2016-3301-MC
HTTP:STC:DL:WORD-SPRMDEFTABLE
HTTP:STC:DL:CVE-2016-3234-CE
HTTP:STC:DL:VISIO-VSD-ICON
HTTP:STC:DL:QUICKTIME-PNSIZE
HTTP:STC:DL:CVE-2016-3310-PE
HTTP:STC:DL:SYMANTEC-AV-DOS
HTTP:STC:DL:CVE-2016-3309-RCE
HTTP:STC:DL:PPTVIEWER-DRAWSHAPE
HTTP:STC:DL:XLS-RTWINDOW
HTTP:STC:DL:VIDEOLAN-WAV-IO
HTTP:STC:DL:MS-OFFICE-RCE
HTTP:STC:DL:MS-THEME-RCE
HTTP:STC:DL:QT-PV-OF
HTTP:STC:DL:CVE-2015-2461-CE
HTTP:STC:DL:CVE-2015-2458-CE
HTTP:STC:DL:OTF-DOS
HTTP:STC:DL:LIBAV-LZO-IO

HTTP:STC:HSC

HTTP:STC:HSC:HCP-QUOTE-SCRIPT
HTTP:STC:HSC:MS-HSC-URL-VLN

HTTP:STC:IE

HTTP:STC:IE:GETMARKUPPTR-UAF
HTTP:STC:IE:RCDSET-UAF
HTTP:STC:IE:IE-TGVAL-DOS
HTTP:STC:IE:CREATETEXTRANGE-2
HTTP:STC:IE:9-10-MC
HTTP:STC:IE:CVE-2016-0169-CE
HTTP:STC:IE:WSZ-EXEC
HTTP:STC:IE:INFINITE-ARRAY
HTTP:STC:IE:CVE-2016-0193-CE
HTTP:STC:IE:TITLE-ELM-CHG
HTTP:STC:IE:CVE-2015-2548-RCE
HTTP:STC:IE:CVE-2016-0112-UAF
HTTP:STC:IE:CVE-2015-0655-RCE
HTTP:STC:IE:CVE-2015-6047-CE
HTTP:STC:IE:JS-MEM-CORR
HTTP:STC:IE:MDAO-RCE1
HTTP:STC:IE:10-CVE2014-2804-UAF
HTTP:STC:IE:JS-OOB-WINDOW1
HTTP:STC:IE:CVE-2016-0186-CE
HTTP:STC:IE:CVE-2015-0054-RCE
HTTP:STC:IE:VTABLE-RCE
HTTP:STC:IE:CVE-2014-4134-MC1
HTTP:STC:IE:MS-IE-MEM-RCE1
HTTP:STC:IE:CVE-2014-4126-MC1
HTTP:STC:IE:CVE-2016-0194-ID
HTTP:STC:IE:CVE-2014-4140-CE1
HTTP:STC:IE:CVE-2016-0185-CE
HTTP:STC:IE:CVE-2015-0068-UAF
HTTP:STC:IE:CVE-2015-6141-RCE
HTTP:STC:IE:9-10-MEM-CORRUPTION
HTTP:STC:IE:UAF-RCE
HTTP:STC:IE:CVE-2015-6148-UAF
HTTP:STC:IE:CVE-2015-6136-UAF
HTTP:STC:IE:FLASH-UAF
HTTP:STC:IE:CVE-2015-6151-UAF
HTTP:STC:IE:BGSOUND-TAG
HTTP:STC:IE:CODE-EXECUTION
HTTP:STC:IE:CVE-2016-0110-RCE
HTTP:STC:IE:CVE-2016-0104-RCE
HTTP:STC:IE:IE-LOCAL-FORMAT
HTTP:STC:IE:CVE-2015-6146-RCE
HTTP:STC:IE:CACHE-EXTERNAL
HTTP:STC:IE:CVE-2016-0108-RCE
HTTP:STC:IE:CVE-2014-1762-MC1
HTTP:STC:IE:ONUNLOAD-MEM
HTTP:STC:IE:FRAME-FLOOD
HTTP:STC:IE:CVE-2015-6152-RCE
HTTP:STC:IE:CVE-2012-6502-INFO
HTTP:STC:IE:MEM-CORR-UAF
HTTP:STC:IE:HTA-CONTENT-TYPE
HTTP:STC:IE:CQUOTES-OBJECT-CE
HTTP:STC:IE:CVE-2016-0107-CE
HTTP:STC:IE:CVE-2015-6156-RCE
HTTP:STC:IE:CVE-2016-0103-RCE
HTTP:STC:IE:CVE-2015-2451-CE
HTTP:STC:IE:CVE-2015-0018-UAF
HTTP:STC:IE:CVE-2015-0039-RCE
HTTP:STC:IE:CVE-2015-0021-CE
HTTP:STC:IE:CVE-2015-1658-RCE
HTTP:STC:IE:OLE-AUTO
HTTP:STC:IE:IFRAME-SMB
HTTP:STC:IE:EDGE-ARR-BUFF-TRAN
HTTP:STC:IE:CVE-2016-3240-RCE
HTTP:STC:IE:CVE-2013-3910-UAF
HTTP:STC:IE:IFRAME-FILE
HTTP:STC:IE:CVE-2013-3911-MC
HTTP:STC:IE:IE-FTP-CMD
HTTP:STC:IE:CVE-2016-3277-RCE
HTTP:STC:IE:CVE-2016-3259-RCE
HTTP:STC:IE:CVE-2016-3243-CE
HTTP:STC:IE:CVE-2013-3153-MC
HTTP:STC:IE:CVE-2016-3241-RCE
HTTP:STC:IE:MAL-JPEG1
HTTP:STC:IE:MHTML-REDIR1
HTTP:STC:IE:CVE-2015-0048-RCE
HTTP:STC:IE:CVE-2013-3914-MC
HTTP:STC:IE:CVE-2016-3261-CE
HTTP:STC:IE:CVE-2015-6157-RCE
HTTP:STC:IE:CVE-2015-1625-RCE
HTTP:STC:IE:SAME-ORI-SEC-BYPASS
HTTP:STC:IE:CVE-2016-3276-CE
HTTP:STC:IE:IE-IMG-INF-DOS
HTTP:STC:IE:CVE-2015-2498-CE
HTTP:STC:IE:CVE-2016-0072-RCE
HTTP:STC:IE:CVE-2015-2487-CE
HTTP:STC:IE:CVE-2015-2483-ID
HTTP:STC:IE:HTML-OBJ-MEM-CRPTN
HTTP:STC:IE:MMCN-EXEC
HTTP:STC:IE:CVE-2008-2256-MC
HTTP:STC:IE:CVE-2016-3242-CE
HTTP:STC:IE:HTML-RELOAD-CORRUP1
HTTP:STC:IE:CVE-2016-0063-CE
HTTP:STC:IE:CVE-2015-2486-RCE
HTTP:STC:IE:CVE-2015-6159-RCE
HTTP:STC:IE:CVE-2015-2493-UAF
HTTP:STC:IE:CVE-2013-3871-MC
HTTP:STC:IE:CVE-2016-0071-CE
HTTP:STC:IE:CVE-2015-2441-RCE
HTTP:STC:IE:HRALIGN-OF
HTTP:STC:IE:CVE-2015-1623-MC
HTTP:STC:IE:IE-MEM-CORR
HTTP:STC:IE:CVE-2015-1627-PRIV
HTTP:STC:IE:VML-AFTERFREE
HTTP:STC:IE:EVENT-HANDLER-RCE
HTTP:STC:IE:POINTER-AFTERFREE
HTTP:STC:IE:PRINT-PREVIEW-CE1
HTTP:STC:IE:ONUNLOAD
HTTP:STC:IE:MAL-VB-JSCRIPT
HTTP:STC:IE:TOSTATICHTML
HTTP:STC:IE:DEV-TOOLBAR-RCE
HTTP:STC:IE:CVE-2015-1626-RCE
HTTP:STC:IE:MAL-JPEG
HTTP:STC:IE:MEMCORRUPT2
HTTP:STC:IE:INSELM-UAF
HTTP:STC:IE:CROSS-FRAME-SCRIPT
HTTP:STC:IE:CVE-2016-0005-PB
HTTP:STC:IE:CVE-2016-0166-UAF
HTTP:STC:IE:MHTML-HREF-OF1
HTTP:STC:IE:CVE-2016-0154-CE
HTTP:STC:IE:TOSTATIC-DISC
HTTP:STC:IE:CACHE-CREATERANGE
HTTP:STC:IE:UTF8-DECODE-OF1
HTTP:STC:IE:9-MAL-HTML-DOS
HTTP:STC:IE:TIF-DND1
HTTP:STC:IE:CVE-2016-0164-UAF
HTTP:STC:IE:CVE-2014-0267-MC1
HTTP:STC:IE:CVE-2014-4086-UAF1
HTTP:STC:IE:HTML-HELP-ZONE-BP1
HTTP:STC:IE:CACHED-OBJ-RCE
HTTP:STC:IE:CVE-2016-0034-RCE
HTTP:STC:IE:10-UAF1
HTTP:STC:IE:CVE-2015-1659-RCE
HTTP:STC:IE:CVE-2015-1660-RCE
HTTP:STC:IE:SYSMON-DOS
HTTP:STC:IE:IE11-HEAPSPRAY-W81
HTTP:STC:IE:CVE-2015-1652-RCE
HTTP:STC:IE:7-LOC-DATA-URI-DOS
HTTP:STC:IE:CVE-2016-0136-RCE
HTTP:STC:IE:CVE-2016-0159-RCE
HTTP:STC:IE:HTA-CONTENT-TYPE1
HTTP:STC:IE:CVE-2013-3207-UAF
HTTP:STC:IE:OBJ-MGMT-MC
HTTP:STC:IE:HTML-RELOAD-CORRUPT
HTTP:STC:IE:OBJECT-TAG-XML1
HTTP:STC:IE:CVE-2016-0156-MC
HTTP:STC:IE:OBJCT-PROCESSING-CE
HTTP:STC:IE:EVENT-LISTENER-RCE
HTTP:STC:IE:LAYOUT-GRID
HTTP:STC:IE:CELEMENT-RCE
HTTP:STC:IE:VML-RCE
HTTP:STC:IE:WMP-SKIN-EXEC
HTTP:STC:IE:CMSHTMLED-UAF
HTTP:STC:IE:CLONENODE-RCE
HTTP:STC:IE:CVE-2013-3917-UAF
HTTP:STC:IE:MARKUP-POINTER-RCE
HTTP:STC:IE:SCROLL-EVENT-RCE
HTTP:STC:IE:STYLEOBJ-MEM
HTTP:STC:IE:EXECCOMMAND-RCE
HTTP:STC:IE:DND-IMG
HTTP:STC:IE:XMLDOM-INFODISC
HTTP:STC:IE:RES-URI-INFODISC
HTTP:STC:IE:CVE-2013-3873-MC
HTTP:STC:IE:CVE-2015-2450-UAF
HTTP:STC:IE:CVE-2014-0263-MC
HTTP:STC:IE:CVE-2013-5056-UAF
HTTP:STC:IE:TABLE-LAYOUT
HTTP:STC:IE:CLEMENT-UAF
HTTP:STC:IE:IE-HCP-DELETE
HTTP:STC:IE:HTML-OB-MEM
HTTP:STC:IE:AUTH-REFLECTION
HTTP:STC:IE:CSS-OF
HTTP:STC:IE:ONENOTE-URL
HTTP:STC:IE:COL-SPAN
HTTP:STC:IE:SAMEID-RCE
HTTP:STC:IE:MAL-DATASTREAM
HTTP:STC:IE:LOCATION-X-DOMAIN
HTTP:STC:IE:LAYOUT-UAF
HTTP:STC:IE:INSERTROW-RCE
HTTP:STC:IE:IE-2016-0067-RCE
HTTP:STC:IE:XML-PARSER-RCE
HTTP:STC:IE:FOLDER-COM-EXEC
HTTP:STC:IE:USERDATA
HTTP:STC:IE:ONLOAD-EVT-RCE
HTTP:STC:IE:TIME-RCE
HTTP:STC:IE:MHTML-REDIR
HTTP:STC:IE:HTML-LAYOUT-CE
HTTP:STC:IE:INV-CSSARR
HTTP:STC:IE:ANIMATEMOTION
HTTP:STC:IE:CVE-2015-1745-UAF
HTTP:STC:IE:COMPINST-OF
HTTP:STC:IE:FULLMEM-RELOAD2
HTTP:STC:IE:XML-RCE
HTTP:STC:IE:EMBED-MC
HTTP:STC:IE:OBJ-PARSING-UAF
HTTP:STC:IE:CVE-2016-0068-CE
HTTP:STC:IE:IE-2016-0062-RCE
HTTP:STC:IE:IEFRAME
HTTP:STC:IE:CVE-2015-0030-UAF
HTTP:STC:IE:CVE-2015-0053-RCE
HTTP:STC:IE:CACHE-SMDIALOG
HTTP:STC:IE:CVE-2015-0035-UAF
HTTP:STC:IE:MHTML-REDIR-INFO
HTTP:STC:IE:CVE-2013-3874-UAF
HTTP:STC:IE:SAMEID-RCE1
HTTP:STC:IE:CTREENODE-UAF
HTTP:STC:IE:XML-HANDLE-EXEC1
HTTP:STC:IE:NESTED-OBJECT-TAG
HTTP:STC:IE:URL-FILE-BOF1
HTTP:STC:IE:CVE-2013-5047-UAF
HTTP:STC:IE:ANTIXSS-INFO-DISC
HTTP:STC:IE:UAF-ARBITRARY-CE
HTTP:STC:IE:CVE-2015-1717-CE
HTTP:STC:IE:COL-TAG-CACHE
HTTP:STC:IE:CVE-2015-0037-CE
HTTP:STC:IE:CVE-2015-1710-CE
HTTP:STC:IE:9-MEMCORRUPT-DOS
HTTP:STC:IE:EOT-WEBFONTS-DL1
HTTP:STC:IE:USE-AFTER-FREE
HTTP:STC:IE:CVE-2013-3189-MC
HTTP:STC:IE:OBJECTS-MC
HTTP:STC:IE:SETCAPTURE-UAF
HTTP:STC:IE:CSS-PROPERTY-METHOD
HTTP:STC:IE:DEL-TABLE
HTTP:STC:IE:CVE-2014-1815-UAF1
HTTP:STC:IE:MERGE-ATTRIB
HTTP:STC:IE:MS-IE-MEM-RCE
HTTP:STC:IE:CVE-2015-1713-SB
HTTP:STC:IE:CVE-2015-0038-RCE
HTTP:STC:IE:CVE-2015-0050-CE
HTTP:STC:IE:CVE-2015-0067-UAF
HTTP:STC:IE:CVE-2015-2502-CE
HTTP:STC:IE:CVE-2014-6347-MC
HTTP:STC:IE:XSLT-MC
HTTP:STC:IE:UNINIT-LAYOUT
HTTP:STC:IE:CVE-2014-6368-RCE
HTTP:STC:IE:CVE-2015-0099-RCE
HTTP:STC:IE:CVE-2015-6059-ID
HTTP:STC:IE:NULL-OBJ-RCE
HTTP:STC:IE:CFORMELEMENT-RCE
HTTP:STC:IE:10-CVE-2014-0275-MC
HTTP:STC:IE:CVE-2015-1708-UAF
HTTP:STC:IE:CVE-2015-0069-INFO
HTTP:STC:IE:7-10-MEM-CORRUPTION
HTTP:STC:IE:ONRESIZE-UAF
HTTP:STC:IE:MOUSE-MOVE-MEM
HTTP:STC:IE:URI-INFODISC
HTTP:STC:IE:CMARKUPBEHAVIOR-UAF
HTTP:STC:IE:HTML-OBJECTS-MC
HTTP:STC:IE:REMOVECHILD-UAF
HTTP:STC:IE:CVE-2013-5051-MC
HTTP:STC:IE:8-CTREENODE-UAF
HTTP:STC:IE:TABLECELL-INFO-DISC
HTTP:STC:IE:ONREADYSTATE
HTTP:STC:IE:IE-8-DOM-UN-MEM
HTTP:STC:IE:OBJHAN-ERR-UAF
HTTP:STC:IE:CVE-2015-0019-RCE
HTTP:STC:IE:JSON-ARRAY-INFO-DIS
HTTP:STC:IE:MS-TIME-DLL
HTTP:STC:IE:INCOMPLETE-EM
HTTP:STC:IE:CVE-2013-3199-CE
HTTP:STC:IE:VTABLE-CODE-EXEC
HTTP:STC:IE:OBJECT-TAG-XML
HTTP:STC:IE:10-UAF-MC
HTTP:STC:IE:CVE-2015-0022-UAF
HTTP:STC:IE:INSECURE-OBJDEL-UAF
HTTP:STC:IE:DHTML-OBJ-MC
HTTP:STC:IE:9-UAF-CE
HTTP:STC:IE:9-UNINITVARS-UAF
HTTP:STC:IE:CVE-2014-0284-MC
HTTP:STC:IE:6-7-UAF-RCE
HTTP:STC:IE:COLLECTGARBAGE-B64
HTTP:STC:IE:UAF-MC-RCE
HTTP:STC:IE:IEXDOM-INFO
HTTP:STC:IE:CSS-MEMORY-CORRUPT
HTTP:STC:IE:SHOWHELP
HTTP:STC:IE:CVE-2015-0020-CE
HTTP:STC:IE:COBJECT-ELE-UAF
HTTP:STC:IE:MEM-CORRUPT-RCE
HTTP:STC:IE:CVE-2013-3845-UAF
HTTP:STC:IE:HTML-XSS
HTTP:STC:IE:CVE-2015-0055-CE
HTTP:STC:IE:CVE-2015-0043-RCE
HTTP:STC:IE:CVE-2013-3885-UAF
HTTP:STC:IE:8-10-MEM-CORRUPTION
HTTP:STC:IE:OBJECT-CODE-EXEC
HTTP:STC:IE:INP-ELNT-OBJCT-RCE
HTTP:STC:IE:CVE-2014-0283-MC
HTTP:STC:IE:CVE-2013-3916-RCE
HTTP:STC:IE:UNINIT-MEM-CORR
HTTP:STC:IE:UNISCRIBE-FNPS-MC
HTTP:STC:IE:CVE-2014-4138-CE
HTTP:STC:IE:WINCVE-2014-4113-PE
HTTP:STC:IE:BOUNDELEMENTS
HTTP:STC:IE:IMPROPER-REF
HTTP:STC:IE:TABLES-MEMCORRUPT
HTTP:STC:IE:TIME-ELEMENT
HTTP:STC:IE:SELECT-ELEMENT
HTTP:STC:IE:APPLYELEMENT-UAF
HTTP:STC:IE:STYLESHEET-OF
HTTP:STC:IE:8-10-MEM-CORR
HTTP:STC:IE:MSWEBDVD-NPA
HTTP:STC:IE:CVE-2015-6048-UAF
HTTP:STC:IE:TABLE-POSWIDTH-MC
HTTP:STC:IE:CLIP-MEM
HTTP:STC:IE:TIF-DND
HTTP:STC:IE:CCARET-UAF
HTTP:STC:IE:CDISPNODE-UAF
HTTP:STC:IE:ANCHOR-URL-SPOOF
HTTP:STC:IE:CVE-2015-6046-RCE
HTTP:STC:IE:DOM-OBJ-MC
HTTP:STC:IE:9-UAF-MEM-CORR
HTTP:STC:IE:CVE-2014-4126-MC
HTTP:STC:IE:CSHADOW-RCE
HTTP:STC:IE:CVE-2013-5048-MC
HTTP:STC:IE:SETSLICE-OF
HTTP:STC:IE:CVE-2015-1662-RCE
HTTP:STC:IE:CVE-2015-2390-UAF
HTTP:STC:IE:CVE-2015-6053-UAF
HTTP:STC:IE:CVE-2014-0274-MC
HTTP:STC:IE:CVE-2015-2515-UAF
HTTP:STC:IE:CVE-2013-3208-UAF
HTTP:STC:IE:8-CVE-2014-0278-MC
HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY
HTTP:STC:IE:CVE-2014-0269-MC
HTTP:STC:IE:CVE-2013-3115-MC
HTTP:STC:IE:CVE-2014-0312-RCE
HTTP:STC:IE:CVE-2014-0324-MC
HTTP:STC:IE:CVE-2014-0314-MC
HTTP:STC:IE:HISTORY-GO-MC
HTTP:STC:IE:CVE-2015-0029-UAF
HTTP:STC:IE:MALFORMED-URI-BO
HTTP:STC:IE:CVE-2015-1706-UAF
HTTP:STC:IE:CVE-2015-1712-RCE
HTTP:STC:IE:CVE-2015-1686-ID
HTTP:STC:IE:CVE-2015-1688-SB
HTTP:STC:IE:WMP-BMP-OF-1
HTTP:STC:IE:CVE-2015-1685-RCE
HTTP:STC:IE:CVE-2015-1711-UAF
HTTP:STC:IE:CVE-2015-1714-UAF
HTTP:STC:IE:CVE-2015-1718-UAF
HTTP:STC:IE:CVE-2015-1709-RCE
HTTP:STC:IE:ADDRBOOK-OBJ-DOS
HTTP:STC:IE:IEUNMEM
HTTP:STC:IE:9-10-OBJERR-UAF
HTTP:STC:IE:CVE-2013-3188-MC
HTTP:STC:IE:10-OBJDEL-UAF
HTTP:STC:IE:6.0-FOR-LOOP-DOS
HTTP:STC:IE:CVE-2016-0002-CE
HTTP:STC:IE:IFRAME-MEM-CORR
HTTP:STC:IE:INFOBAR-DOWNLOAD
HTTP:STC:IE:INST-ENG-INT-OF
HTTP:STC:IE:CVE-2013-3194-UAF
HTTP:STC:IE:CVE-2016-0111-CE
HTTP:STC:IE:CVE-2014-6347-RCE
HTTP:STC:IE:CVE-2014-6339-MC
HTTP:STC:IE:8-OBJ-MC
HTTP:STC:IE:IESTYLE-OBJ
HTTP:STC:IE:CVE-2014-1753-MC
HTTP:STC:IE:CVE-2016-0105-RCE
HTTP:STC:IE:CVE-2014-6351-UAF
HTTP:STC:IE:FULLMEM-RELOAD
HTTP:STC:IE:CVE-2016-0109-RCE
HTTP:STC:IE:CVE-2014-1815-UAF
HTTP:STC:IE:OBJECT-OF
HTTP:STC:IE:CVE-2015-6055-CE
HTTP:STC:IE:CVE-2014-6366-CE
HTTP:STC:IE:CVE-2014-1804-UAF
HTTP:STC:IE:DEL-OBJ-REF
HTTP:STC:IE:CVE-2015-0044-RCE
HTTP:STC:IE:CVE-2014-1755-MC
HTTP:STC:IE:CVE-2016-0114-UAF
HTTP:STC:IE:XSS-FILTER-DISC
HTTP:STC:IE:VML-VGX-BOF
HTTP:STC:IE:CVE-2015-2402-SB
HTTP:STC:IE:TITLE-BAR-URI
HTTP:STC:IE:CVE-2016-0106-RCE
HTTP:STC:IE:CVE-2013-5049-MC
HTTP:STC:IE:9-MC-RCE
HTTP:STC:IE:CVE-2013-3875-MC
HTTP:STC:IE:EOT-WEBFONTS-DL
HTTP:STC:IE:MSRAT-NAME-OF-SVR
HTTP:STC:IE:CVE-2013-3912-RCE
HTTP:STC:IE:10-OBJ-DEL-UAF
HTTP:STC:IE:CACHE-CLIPDATA
HTTP:STC:IE:CVE-2015-0026-UAF
HTTP:STC:IE:XML-HANDLE-EXEC
HTTP:STC:IE:TEXT-HELP-ZONE-BP
HTTP:STC:IE:WMP-BMP-OF-3
HTTP:STC:IE:OBJERR-UAF
HTTP:STC:IE:CVE-2014-6355-IDISC
HTTP:STC:IE:CVE-2015-6052-RCE
HTTP:STC:IE:6-11-UAF
HTTP:STC:IE:6-10-USE-AFTER-FREE
HTTP:STC:IE:CVE-2014-1766-UAF
HTTP:STC:IE:9-USE-AFTER-FREE
HTTP:STC:IE:ASLR-BYPASS-RCE
HTTP:STC:IE:CVE-2016-0064-RCE
HTTP:STC:IE:SMEORIGIN-BYPASS
HTTP:STC:IE:CVE-2014-1800-UAF
HTTP:STC:IE:CVE-2014-1805-MC
HTTP:STC:IE:9-UAF-RCE
HTTP:STC:IE:10-MEM-CORRUPTION
HTTP:STC:IE:CVE-2015-1666-RCE
HTTP:STC:IE:ATTR-RM-RCE
HTTP:STC:IE:CVE-2015-2448-RCE
HTTP:STC:IE:10-OBJECT-MC
HTTP:STC:IE:CTREEPOS-RCE
HTTP:STC:IE:CVE-2015-0081-RCE
HTTP:STC:IE:SLAYOUTRUN-UAF
HTTP:STC:IE:CVE-2015-1661-ID
HTTP:STC:IE:CVE-2015-1668-RCE
HTTP:STC:IE:CVE-2015-0042-RCE
HTTP:STC:IE:SCROL-INTO-VIEW-UAF
HTTP:STC:IE:XML-MIME-CORRUPT
HTTP:STC:IE:RANGE-OBJ-HNDLNG-ID
HTTP:STC:IE:PAGE-UPDATE-RACE
HTTP:STC:IE:CVE-2015-0045-RCE
HTTP:STC:IE:CVE-2015-2490-CE
HTTP:STC:IE:UAF-MC
HTTP:STC:IE:CVE-2016-0200-UAF
HTTP:STC:IE:MS-IE-UAF
HTTP:STC:IE:CVE-2014-2787-MC
HTTP:STC:IE:SELECT-EMPTY
HTTP:STC:IE:USE-AFTR-FREE
HTTP:STC:IE:TREE-POS-OBJECT-RCE
HTTP:STC:IE:9-MEM-CORR
HTTP:STC:IE:COMPRESSED-URL
HTTP:STC:IE:VML-MEM-CORRUPTION
HTTP:STC:IE:CVE-2015-6084-RCE
HTTP:STC:IE:CVE-2015-6087-CE
HTTP:STC:IE:CVE-2014-4129-MC
HTTP:STC:IE:CVE-2015-6064-UAF
HTTP:STC:IE:CVE-2015-6068-CE
HTTP:STC:IE:CVE-2014-4094-UAF
HTTP:STC:IE:CVE-2014-4082-MC
HTTP:STC:IE:CVE-2014-4086-UAF
HTTP:STC:IE:X-DOMAIN-INFO
HTTP:STC:IE:CVE-2016-0060-RCE
HTTP:STC:IE:CVE-2014-4089-UAF
HTTP:STC:IE:OBJ-DEL-UAF
HTTP:STC:IE:UAF-MEM-COR
HTTP:STC:IE:CVE-2015-2485-CE
HTTP:STC:IE:MEM-LEAK
HTTP:STC:IE:SCRIPT-STCK-EXH
HTTP:STC:IE:OPTION-ELEMENT-RCE
HTTP:STC:IE:8-OBJECT-MC
HTTP:STC:IE:UNSAFE-MEM-OPER-UAF
HTTP:STC:IE:DOC-MARKUP-RCE
HTTP:STC:IE:10-INT-OVF
HTTP:STC:IE:MS-UAF-MC
HTTP:STC:IE:CVE-2015-6077-UAF
HTTP:STC:IE:CVE-2014-4128-MC
HTTP:STC:IE:HTML-TAG-MC
HTTP:STC:IE:MULTI-ACTION
HTTP:STC:IE:CVE-2015-6081-RCE
HTTP:STC:IE:CVE-2015-6080-CE
HTTP:STC:IE:CVE-2014-4095-UAF
HTTP:STC:IE:CVE-2015-6079-CE
HTTP:STC:IE:CVE-2015-6078-UAF
HTTP:STC:IE:CVE-2015-6071-CE
HTTP:STC:IE:CVE-2014-4123-CE
HTTP:STC:IE:CVE-2014-6373-UAF
HTTP:STC:IE:DESIGNMODE-INFO1
HTTP:STC:IE:CVE-2014-6348-UAF
HTTP:STC:IE:ZONE-SPOOF-2
HTTP:STC:IE:CVE-2014-4124-CE
HTTP:STC:IE:CVE-2014-4127-MC
HTTP:STC:IE:CVE-2015-1705-UAF
HTTP:STC:IE:TABLE-SPAN-CORRUPT
HTTP:STC:IE:UAF-MEM-CORR
HTTP:STC:IE:CVE-2015-1766-RCE
HTTP:STC:IE:CVE-2014-4134-MC
HTTP:STC:IE:CVE-2015-6089-RCE
HTTP:STC:IE:CVE-2015-6076-RCE
HTTP:STC:IE:CVE-2014-4133-CE
HTTP:STC:IE:CVE-2014-4057-MC
HTTP:STC:IE:10-OBJHANDLING-UAF
HTTP:STC:IE:FREED-OBJECT
HTTP:STC:IE:CVE-2013-3209-UAF
HTTP:STC:IE:CVE-2014-4063-UAF
HTTP:STC:IE:CVE-2014-6323-ID
HTTP:STC:IE:CVE-2014-4080-UAF
HTTP:STC:IE:VML-NUM-BOF
HTTP:STC:IE:REDIRECT-MC
HTTP:STC:IE:CVE-2015-6085-UAF
HTTP:STC:IE:CVE-2016-3289-CE
HTTP:STC:IE:CVE-2015-6082-RCE
HTTP:STC:IE:CVE-2015-6072-RCE
HTTP:STC:IE:CVE-2015-6073-UAF
HTTP:STC:IE:CVE-2015-6075-CE
HTTP:STC:IE:CVE-2014-6346-INFO
HTTP:STC:IE:CVE-2014-6350-CE
HTTP:STC:IE:CVE-2014-6329-RCE
HTTP:STC:IE:CVE-2014-6327-MC
HTTP:STC:IE:XML-DISCLOSE1
HTTP:STC:IE:REDIM-PRESERVE-DOS4
HTTP:STC:IE:CVE-2014-6332-ID
HTTP:STC:IE:HFS-CVE-2014-6332
HTTP:STC:IE:CVE-2015-6065-RCE
HTTP:STC:IE:CVE-2015-2500-CE
HTTP:STC:IE:IE-REFRESH-OF
HTTP:STC:IE:REDIM-PRESERVE-DOS
HTTP:STC:IE:IE-HEADER-XDOM-INFO
HTTP:STC:IE:CTABLE-RCE
HTTP:STC:IE:CVE-2014-6353-UAF
HTTP:STC:IE:CVE-2014-6369-UAF
HTTP:STC:IE:CVE-2014-6376-RCE
HTTP:STC:IE:CVE-2015-1624-RCE
HTTP:STC:IE:CVE-2014-6374-RCE
HTTP:STC:IE:CVE-2014-6369-RCE
HTTP:STC:IE:CVE-2015-2492-RCE
HTTP:STC:IE:PRINT-PREVIEW-CE
HTTP:STC:IE:XML-HMAC-BYPASS
HTTP:STC:IE:CVE-2015-2482-CE
HTTP:STC:IE:CVE-2015-2501-CE
HTTP:STC:IE:COMWINDOWPROXY-UAF
HTTP:STC:IE:CVE-2015-1657-ID
HTTP:STC:IE:IFRAME-HTA
HTTP:STC:IE:CVE-2015-2443-RCE
HTTP:STC:IE:XML-DISCLOSE
HTTP:STC:IE:CHAN-SCRIPT
HTTP:STC:IE:UNINIT-CORRUPT
HTTP:STC:IE:CVE-2015-2452-CE
HTTP:STC:IE:XML-ELEMENT-RCE
HTTP:STC:IE:CVE-2014-0272-MC
HTTP:STC:IE:IE-MHT-REDIRECT
HTTP:STC:IE:HELPCTR-CODE-EX
HTTP:STC:IE:HTML-LAYOUT
HTTP:STC:IE:CVE-2014-0311-UAF
HTTP:STC:IE:CVE-2014-0322-UAF
HTTP:STC:IE:CVE-2014-0313-BOF
HTTP:STC:IE:CVE-2015-2442-RCE
HTTP:STC:IE:CVE-2015-2425-CE
HTTP:STC:IE:TOSTATIC-XSS
HTTP:STC:IE:ANIMATION-RCE
HTTP:STC:IE:JS-LOCATION-ASSIGN
HTTP:STC:IE:CSS-XSS
HTTP:STC:IE:GOPHER-IMGTAG
HTTP:STC:IE:CVE-2013-3908-DISC
HTTP:STC:IE:HDRLOC-MSITS
HTTP:STC:IE:JS-MC
HTTP:STC:IE:LOCAL-WEB-FOLDER
HTTP:STC:IE:CVE-2014-0281-MC
HTTP:STC:IE:CVE-2014-0282-UAF
HTTP:STC:IE:8-CVE-2014-0279-MC
HTTP:STC:IE:DIRECTX-SAMI-BO
HTTP:STC:IE:CVE-2015-6042-UAF
HTTP:STC:IE:CVE-2014-0273-MC
HTTP:STC:IE:CVE-2014-0277-MC
HTTP:STC:IE:FILE-EXT-SPOOF
HTTP:STC:IE:CVE-2015-6154-CE
HTTP:STC:IE:CVE-2015-6150-CE
HTTP:STC:IE:CVE-2014-0302-MC
HTTP:STC:IE:CVE-2014-0306-RCE
HTTP:STC:IE:CVE-2014-0310-MC
HTTP:STC:IE:CVE-2015-6158-CE
HTTP:STC:IE:CVE-2014-0267-MC
HTTP:STC:IE:11-CVE-2014-0304-MC
HTTP:STC:IE:CVE-2014-0297-MC
HTTP:STC:IE:CVE-2014-0305-MC
HTTP:STC:IE:CVE-2014-0286-MC
HTTP:STC:IE:CVE-2014-0287-MC
HTTP:STC:IE:CVE-2014-0309-MC
HTTP:STC:IE:CVE-2014-0289-MC
HTTP:STC:IE:CVE-2014-0290-MC
HTTP:STC:IE:CVE-2014-0288-MC
HTTP:STC:IE:CVE-2014-0299-RCE
HTTP:STC:IE:CVE-2015-6153-CE
HTTP:STC:IE:CVE-2015-6142-CE
HTTP:STC:IE:MSRAT-NAME-OF-SVR2
HTTP:STC:IE:UNINIT-DOM
HTTP:STC:IE:CVE-2014-0270-UAF
HTTP:STC:IE:CVE-2014-0285-MC
HTTP:STC:IE:CVE-2015-6149-CE
HTTP:STC:IE:CVE-2015-6147-CE
HTTP:STC:IE:CVE-2016-0199-RCE
HTTP:STC:IE:7-CVE-2014-1752-RCE
HTTP:STC:IE:CVE-2014-0276-MC
HTTP:STC:IE:CSS-RACE-CE
HTTP:STC:IE:CVE-2015-6083-CE
HTTP:STC:IE:EVENT-HANDLER-MC
HTTP:STC:IE:CVE-2014-1785-UAF
HTTP:STC:IE:CVE-2014-1802-MC
HTTP:STC:IE:CVE-2014-1797-UAF
HTTP:STC:IE:CENTER-ELE-RCE
HTTP:STC:IE:CVE-2015-6050-CE
HTTP:STC:IE:CVE-2014-1762-MC
HTTP:STC:IE:CVE-2016-3211-RCE
HTTP:STC:IE:CVE-2014-1775-UAF
HTTP:STC:IE:DHTML-HANDLER-RACE
HTTP:STC:IE:DHTML-HANDLER-RACE1
HTTP:STC:IE:CVE-2014-1789-MC
HTTP:STC:IE:CVE-2014-1772-MC
HTTP:STC:IE:CVE-2014-0298-UAF
HTTP:STC:IE:DIALOG-MANIP
HTTP:STC:IE:STYLESHEET-MC
HTTP:STC:IE:CVE-2015-1622-RCE
HTTP:STC:IE:CVE-2014-2799-UAF
HTTP:STC:IE:CVE-2014-2797-MC
HTTP:STC:IE:CVE-2014-2795-MC
HTTP:STC:IE:LOCAL-ACCESS-DAT
HTTP:STC:IE:REDIM-PRESERVE-DOS1
HTTP:STC:IE:IE-FTP-SCRIPTING
HTTP:STC:IE:CVE-2016-3210-RCE
HTTP:STC:IE:CREATETEXTRANGE
HTTP:STC:IE:CVE-2014-2801-MC
HTTP:STC:IE:TEXTRANGE-OBJ
HTTP:STC:IE:CVE-2014-2823-UAF
HTTP:STC:IE:CVE-2016-3205-CE
HTTP:STC:IE:CVE-2014-2824-BO
HTTP:STC:IE:CVE-2014-4140-CE
HTTP:STC:IE:HTML-HELP-ZONE-BP
HTTP:STC:IE:REDIM-PRESERVE-DOS2
HTTP:STC:IE:CPASTECOMMAND
HTTP:STC:IE:WIN-ADO-EXEC
HTTP:STC:IE:CVE-2016-3213-RCE
HTTP:STC:IE:CVE-2016-0189-ACE
HTTP:STC:IE:CVE-2014-4081-UAF
HTTP:STC:IE:CVE-2014-4084-UAF
HTTP:STC:IE:CVE-2015-6070-RCE
HTTP:STC:IE:LETTER-STYLE-UAF
HTTP:STC:IE:CVE-2016-3215-CE
HTTP:STC:IE:DOCUMENT-RCE
HTTP:STC:IE:CSS-PSEUDO-UAF
HTTP:STC:IE:CVE-2014-4065-UAF
HTTP:STC:IE:CVE-2014-4087-UAF
HTTP:STC:IE:CSS-XDOM-DISC
HTTP:STC:IE:ONBEFORECOPY-UAF
HTTP:STC:IE:CVE-2014-6344-UAF
HTTP:STC:IE:MSRAT-NAME-OF2
HTTP:STC:IE:CVE-2014-6345-INFO
HTTP:STC:IE:SPOF-STATUS-BAR-URL
HTTP:STC:IE:IE-MSHTML-OF
HTTP:STC:IE:CVE-2016-0102-RCE
HTTP:STC:IE:IFRAME-NAME-OF
HTTP:STC:IE:CVE-2016-0192-RCE
HTTP:STC:IE:CVE-2014-4143-MC
HTTP:STC:IE:CVE-2014-4141-MC
HTTP:STC:IE:XML-MEM-COR
HTTP:STC:IE:EUC-JP-XSS
HTTP:STC:IE:CVE-2014-4137-MC
HTTP:STC:IE:REDIM-PRESERVE-DOS3
HTTP:STC:IE:CVE-2016-0187-UAF
HTTP:STC:IE:CVE-2014-6332-URLEN
HTTP:STC:IE:CVE-2014-4092-UAF
HTTP:STC:IE:CVE-2014-4088-UAF
HTTP:STC:IE:JSCRIPT9-CE
HTTP:STC:IE:CVE-2014-4132-MC
HTTP:STC:IE:CVE-2015-6086-SB
HTTP:STC:IE:CVE-2014-6343-UAF
HTTP:STC:IE:CVE-2014-6349-CE
HTTP:STC:IE:CVE-2014-6342-MEMCP
HTTP:STC:IE:CVE-2014-6341-UAF
HTTP:STC:IE:CVE-2014-6369-MC
HTTP:STC:IE:CVE-2016-3222-RCE
HTTP:STC:IE:CVE-2016-3198-CE
HTTP:STC:IE:CVE-2014-6375-RCE
HTTP:STC:IE:CVE-2014-6330-MC
HTTP:STC:IE:CVE-2015-0025-RCE
HTTP:STC:IE:CVE-2014-6332-HEX
HTTP:STC:IE:2014-6340-INFO-DIS
HTTP:STC:IE:CVE-2014-6337-UAF
HTTP:STC:IE:ONROWSINSERTED-RCE
HTTP:STC:IE:CVE-2016-3212-RCE
HTTP:STC:IE:DHTML-CCR-INV-OBJ
HTTP:STC:IE:EVENT-INVOKE
HTTP:STC:IE:ZONE-SPOOF
HTTP:STC:IE:CVE-2016-3206-RCE
HTTP:STC:IE:CVE-2015-2491-RCE
HTTP:STC:IE:HTML-TIME
HTTP:STC:IE:ONBEFORE-DEACTIVATE
HTTP:STC:IE:IE-ACTIVEX-DRCTANI1
HTTP:STC:IE:HTML-OBJECTS
HTTP:STC:IE:URL-FILE-BOF
HTTP:STC:IE:CVE-2015-1748-RCE
HTTP:STC:IE:JS-INFO-DISC
HTTP:STC:IE:FRAME-INJ
HTTP:STC:IE:OE-MSHTML-OF
HTTP:STC:IE:LOC-SPOOF
HTTP:STC:IE:INVALID-LAYOUT
HTTP:STC:IE:SELECT-ELEMENT-RCE
HTTP:STC:IE:CHTML-UAF
HTTP:STC:IE:CVE-2016-3207-RCE
HTTP:STC:IE:MARQUEE-STYLE
HTTP:STC:IE:CIR-REF
HTTP:STC:IE:CVE-2014-1795-UAF
HTTP:STC:IE:MDAC-CACHESIZE-OF
HTTP:STC:IE:ACCESS-BYPASS-ID
HTTP:STC:IE:CVE-2015-1753-RCE
HTTP:STC:IE:MSIE-OBJ-UAF
HTTP:STC:IE:HTML-OBJ-MC
HTTP:STC:IE:ADDRBAR-SPOOF-2
HTTP:STC:IE:VML-FILL-BOF
HTTP:STC:IE:CVE-2015-6134-RCE
HTTP:STC:IE:CVE-2014-2820-UAF
HTTP:STC:IE:CVE-2015-1737-UAF
HTTP:STC:IE:LSGETTRAILINFO-UAF
HTTP:STC:IE:PASTEHTML-RCE
HTTP:STC:IE:CMARKUP-UAF
HTTP:STC:IE:URI-REDIRECTION
HTTP:STC:IE:ZONE-BYPASS
HTTP:STC:IE:CVE-2015-1731-CE
HTTP:STC:IE:CVE-2015-1732-UAF
HTTP:STC:IE:CVE-2015-1741-RCE
HTTP:STC:IE:CVE-2015-1687-RCE
HTTP:STC:IE:CVE-2015-1744-CE
HTTP:STC:IE:CVE-2015-1730-RCE
HTTP:STC:IE:XFRAME-REST-BYPASS
HTTP:STC:IE:CVE-2015-1740-UAF
HTTP:STC:IE:CVE-2015-1735-UAF
HTTP:STC:IE:WRITE-WAT-WHERE-UAF
HTTP:STC:IE:CVE-2015-1736-RCE
HTTP:STC:IE:INSERT-ADJACENT-RCE
HTTP:STC:IE:CVE-2015-1742-RCE
HTTP:STC:IE:CVE-2015-0056-MC
HTTP:STC:IE:CVE-2015-1751-RCE
HTTP:STC:IE:CVE-2015-1634-RCE
HTTP:STC:IE:CVE-2015-1750-UAF
HTTP:STC:IE:CVE-2015-1755-UAF
HTTP:STC:IE:LAYOUT-RCE
HTTP:STC:IE:CVE-2016-3199-CE
HTTP:STC:IE:CVE-2015-0100-UAF
HTTP:STC:IE:CVE-2015-0032-RCE
HTTP:STC:IE:UTF8-DECODE-OF
HTTP:STC:IE:CDO-IN-HEADER
HTTP:STC:IE:GETELEMENT-CACHE
HTTP:STC:IE:EVENT-HANDLER-INFO
HTTP:STC:IE:EXEC-CMD-FILE-SPOOF
HTTP:STC:IE:CVE-2015-2384-RCE
HTTP:STC:IE:UNCLOSED-DIV-UAF
HTTP:STC:IE:10-OBJECT-RCE
HTTP:STC:IE:CVE-2014-8967-RCE
HTTP:STC:IE:CVE-2015-0040-RCE
HTTP:STC:IE:JS-VBS-DECODE-OF
HTTP:STC:IE:CVE-2014-0271-MC
HTTP:STC:IE:CROSS-DOMAIN-INFO
HTTP:STC:IE:MHTML-REDIRECT
HTTP:STC:IE:9-NULL-BYTE-DISC
HTTP:STC:IE:LOCAL-CNT-INJ
HTTP:STC:IE:MHTML-REDIR-JS
HTTP:STC:IE:PNG-IMAGE-BO
HTTP:STC:IE:JIS-CHAR-INFO-DISC
HTTP:STC:IE:CVE-2012-1877-CE
HTTP:STC:IE:DHTML-OBJ-CORRUPT
HTTP:STC:IE:DEREF-OBJ-ACCESS
HTTP:STC:IE:MHTML-INFO-DISC
HTTP:STC:IE:CVE-2014-0307-MC
HTTP:STC:IE:OBJECT-HANDLNG-RCE
HTTP:STC:IE:CVE-2008-4258-MC
HTTP:STC:IE:OBJECT-PROCESING-CE
HTTP:STC:IE:DESIGNMODE-INFO
HTTP:STC:IE:CVE-2015-1767-UAF
HTTP:STC:IE:CVE-2015-2383-UAF
HTTP:STC:IE:ERROR-HANDLER
HTTP:STC:IE:CVE-2016-3303-RCE
HTTP:STC:IE:MHTML-XDOM
HTTP:STC:IE:CVE-2015-0049-RCE
HTTP:STC:IE:8-UAF-RCE
HTTP:STC:IE:TYPE-CONFUSION-RCE
HTTP:STC:IE:6-10-MEM-CORRUPTION
HTTP:STC:IE:MSRAT-NAME-OF
HTTP:STC:IE:CLONE-REF-CORRUPT
HTTP:STC:IE:CVE-2015-1729-UAF
HTTP:STC:IE:CVE-2016-3326-UAF
HTTP:STC:IE:CONT-LOC-ZON-BYPASS
HTTP:STC:IE:COLORBALANCE
HTTP:STC:IE:CSRSS-HE-MSG
HTTP:STC:IE:OBJECT-OF1
HTTP:STC:IE:CSS-HEAP
HTTP:STC:IE:CVE-2014-1791-UAF
HTTP:STC:IE:COPY-PASTE-INFODISC
HTTP:STC:IE:2014-1751-MEM-CORR
HTTP:STC:IE:CSS-IMPORT
HTTP:STC:IE:SETEXP-REFCOUNT
HTTP:STC:IE:OVERLAP-TAGS
HTTP:STC:IE:DOM-CACHE-CORRUPT
HTTP:STC:IE:CVE-2013-5052-MC
HTTP:STC:IE:EOTF-LZCOMP-OF
HTTP:STC:IE:CVE-2015-2414-RCE
HTTP:STC:IE:CVE-2015-2413
HTTP:STC:IE:GRAPHICS-EOP-CE
HTTP:STC:IE:CVE-2015-2408-UAF
HTTP:STC:IE:CVE-2015-2388-UAF
HTTP:STC:IE:CVE-2015-2412-SB
HTTP:STC:IE:CVE-2015-2411-UAF
HTTP:STC:IE:CVE-2015-2404-RCE
HTTP:STC:IE:CVE-2015-2397-UAF
HTTP:STC:IE:CVE-2015-2391-RCE
HTTP:STC:IE:CVE-2015-2406-RCE
HTTP:STC:IE:CVE-2015-2403-UAF
HTTP:STC:IE:MSAPP-TASK
HTTP:STC:IE:URL-HIDING-ENC
HTTP:STC:IE:SHELL-WEB-FOLDER
HTTP:STC:IE:CVE-2015-0051-SB
HTTP:STC:IE:DRAG-DROP-MOD
HTTP:STC:IE:CVE-2015-2421-ID
HTTP:STC:IE:CVE-2015-2389-UAF
HTTP:STC:IE:HTML-SANITZ
HTTP:STC:IE:MEM-CORR
HTTP:STC:IE:10-UAF
HTTP:STC:IE:CVE-2016-3319-RCE
HTTP:STC:IE:CFLATMARKUPPOINTER
HTTP:STC:IE:CRAFTED-WEB-CE
HTTP:STC:IE:CVE-2015-1733-RCE
HTTP:STC:IE:CVE-2015-2422-UAF
HTTP:STC:IE:OBJECT-MC
HTTP:STC:IE:CVE-2016-3327-ID
HTTP:STC:IE:ONMOVE-RCE
HTTP:STC:IE:CVE-2014-0303-MC
HTTP:STC:IE:CVE-2016-3293-CE
HTTP:STC:IE:SAVE-HISTORY-UAF
HTTP:STC:IE:SSL-PROXY-DIS
HTTP:STC:IE:CVE-2015-1691-UAF
HTTP:STC:IE:CVE-2015-2372-UAF
HTTP:STC:IE:CVE-2015-1738-UAF
HTTP:STC:IE:CVE-2016-3322-CE
HTTP:STC:IE:CVE-2016-3288-UAF
HTTP:STC:IE:CVE-2016-3321-ID
HTTP:STC:IE:CVE-2016-3290-CE
HTTP:STC:IE:GOOGLEBAR-FILE
HTTP:STC:IE:FULLMEM-RELOAD3
HTTP:STC:IE:CVE-2014-1765-RCE
HTTP:STC:IE:MAL-GIF-DOS

HTTP:STC:IMG

HTTP:STC:IMG:NOT-GIF
HTTP:STC:IMG:NOT-BMP
HTTP:STC:IMG:PNG-NAME-ERROR
HTTP:STC:IMG:NOT-PNG
HTTP:STC:IMG:PNG-TRNS-ERROR
HTTP:STC:IMG:PNG_IHDR_INVAL_LEN
HTTP:STC:IMG:BMP-OVERFLOW
HTTP:STC:IMG:OVERLARGE-BMP
HTTP:STC:IMG:MALFORMED-JPEG
HTTP:STC:IMG:JPEG-BAD-LENGTH
HTTP:STC:IMG:PNG-IHDR-BAD-PAR
HTTP:STC:IMG:PNG-PLTE-ERROR
HTTP:STC:IMG:JPEG-UNDERRUN
HTTP:STC:IMG:NOT-JPEG
HTTP:STC:IMG:MALFORMED-BMP
HTTP:STC:IMG:BMP-BAD-PARAMETER
HTTP:STC:IMG:GIF-BAD-PARAMETER
HTTP:STC:IMG:PNG_CHUNK_OVERFLOW
HTTP:STC:IMG:BMP-WIDTH-OF
HTTP:STC:IMG:OFFEND-GG
HTTP:STC:IMG:OFFEND-TG
HTTP:STC:IMG:PNG-IO
HTTP:STC:IMG:OFFICE-FLASHPIX
HTTP:STC:IMG:BMP-HEADER-UF
HTTP:STC:IMG:MAL-EMF
HTTP:STC:IMG:MAL-EMF-2
HTTP:STC:IMG:OFFICE-MAL-TIFF3
HTTP:STC:IMG:KODAK-TIFF
HTTP:STC:IMG:PNG-TEXT
HTTP:STC:IMG:XP-MAL-TIFF
HTTP:STC:IMG:JPEG-HEIGHT-OF
HTTP:STC:IMG:PICT-POLY-UF
HTTP:STC:IMG:GOOGLE-SKETCH-BMP
HTTP:STC:IMG:JDK-ICC
HTTP:STC:IMG:PICT-UNCOMP-UF
HTTP:STC:IMG:PNG-WIDTH
HTTP:STC:IMG:OFFICE-FLASHPIX21
HTTP:STC:IMG:MS-GIFGDI-OF
HTTP:STC:IMG:ICO-SIZE-OF
HTTP:STC:IMG:MS-BMP-OF
HTTP:STC:IMG:ANI-FILE-DOS
HTTP:STC:IMG:JPEG-WIDTH-OF1
HTTP:STC:IMG:LIBPNG-CHUNK-OV
HTTP:STC:IMG:KODAK-TIFF1
HTTP:STC:IMG:MALFORMED-EMF-TAG1
HTTP:STC:IMG:BMP-HDR-IO
HTTP:STC:IMG:PHP-AS-GIF
HTTP:STC:IMG:EMF-DOWNLOAD
HTTP:STC:IMG:JPEGDECODERAW-FUNC
HTTP:STC:IMG:ANI-BLOCK-STR23
HTTP:STC:IMG:OFFICE-MAL-TIF
HTTP:STC:IMG:EXE-IN-IMAGE
HTTP:STC:IMG:MAL-WMF-REC-OF
HTTP:STC:IMG:JPEG-WIDTH-OF
HTTP:STC:IMG:TIFF-BOF
HTTP:STC:IMG:WMF-MAL-HEADER
HTTP:STC:IMG:WMF-DOWNLOAD
HTTP:STC:IMG:NO-JPG-GIF-PNG-BMP
HTTP:STC:IMG:JAVA-GIF-MEM
HTTP:STC:IMG:SUN-JAVA-PNG-BOF
HTTP:STC:IMG:MS-OFFICE-GIF
HTTP:STC:IMG:OFFICE-FLASHPIX1
HTTP:STC:IMG:JPEG-SCRIPT
HTTP:STC:IMG:MALFORMED-EMF-TAG
HTTP:STC:IMG:WMF-METASPLOIT
HTTP:STC:IMG:WMP-BMP-OF
HTTP:STC:IMG:EXE-FOR-IMG-TYPE
HTTP:STC:IMG:WMF-METASPLOIT-GZ
HTTP:STC:IMG:WMF-METASPLOIT2
HTTP:STC:IMG:PNG-CHUNK-OF
HTTP:STC:IMG:ANI-BLOCK-STR2
HTTP:STC:IMG:PAINT-JPEG-OF
HTTP:STC:IMG:EXE-FOR-IMAGE
HTTP:STC:IMG:WMF-MALFORMED
HTTP:STC:IMG:WMF-SETPALETTE
HTTP:STC:IMG:WPG-HEAP-OVF
HTTP:STC:IMG:LIBPNG-ROWS
HTTP:STC:IMG:TFF-THUNDER
HTTP:STC:IMG:TARGA-IMG-HEAP1
HTTP:STC:IMG:OFFICE-FLASHPIX2
HTTP:STC:IMG:TARGA-IMG-HEAP
HTTP:STC:IMG:JPEG-MAL-MARKER
HTTP:STC:IMG:PNG-HEIGHT

HTTP:STC:IMG:JPEG

HTTP:STC:IMG:JPEG:WIN-COLOR
HTTP:STC:IMG:JPEG:WIN-COLOR1

HTTP:STC:JAVA

HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC
HTTP:STC:JAVA:TRUE-TYPE-FONT-OF
HTTP:STC:JAVA:GIF-MEMCORRUPT1
HTTP:STC:JAVA:IBM-CLASS-RCE
HTTP:STC:JAVA:PRVDR-SKLTON-SB1
HTTP:STC:JAVA:TYPECONF
HTTP:STC:JAVA:HOTSPOT-BCODE-RCE
HTTP:STC:JAVA:JPEGIMAGE-OF
HTTP:STC:JAVA:RUNTIME-ENV-BO
HTTP:STC:JAVA:CLAS-VERIFY-ABORT
HTTP:STC:JAVA:IMGLIB-LOOKUPBYTE
HTTP:STC:JAVA:MIXERSEQ-OF
HTTP:STC:JAVA:JAR-FILE-DOWNLOAD
HTTP:STC:JAVA:JNLP-CHARSET-OF
HTTP:STC:JAVA:SETDIFFICM-BOF
HTTP:STC:JAVA:SIGVERIFY-BYPASS
HTTP:STC:JAVA:APPLET-RCE1
HTTP:STC:JAVA:APPLET-CLASS-FILE
HTTP:STC:JAVA:WEBSTART
HTTP:STC:JAVA:FINAL-FIELD-OW
HTTP:STC:JAVA:APPLET-REFLECTRCE
HTTP:STC:JAVA:PRVDR-SKLTON-SB
HTTP:STC:JAVA:BASICSERVICEIMPL
HTTP:STC:JAVA:LOOKUPBYTEBI-MC
HTTP:STC:JAVA:ORACLE-IMGLIB-OVF
HTTP:STC:JAVA:MORT-LIGATURE-BO
HTTP:STC:JAVA:FONT-PARSING
HTTP:STC:JAVA:GSUB-TABLE-BO
HTTP:STC:JAVA:JMX-FINDCLASS-RCE
HTTP:STC:JAVA:NXT-UPDTE-RA
HTTP:STC:JAVA:JRE-MEM-DISC
HTTP:STC:JAVA:APPLET-RCE
HTTP:STC:JAVA:PHANTOM-OBJ-RCE
HTTP:STC:JAVA:ATOMIC-SB-BREACH
HTTP:STC:JAVA:GETSOUNDBANK-OF
HTTP:STC:JAVA:SIGNED-APPLET-CE
HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC
HTTP:STC:JAVA:JAVA-VM-ARGS-OF
HTTP:STC:JAVA:SHORT-COMPONENT
HTTP:STC:JAVA:JAVADEPLOY-RCE
HTTP:STC:JAVA:MAL-JNLP-FILE
HTTP:STC:JAVA:CONCHASHMAP
HTTP:STC:JAVA:IMG-INTEGER-MC
HTTP:STC:JAVA:STOREIMG-ARRAY-BO
HTTP:STC:JAVA:JNDI-BYPASS
HTTP:STC:JAVA:SETPIXEL-INF-DISC
HTTP:STC:JAVA:JAR-PROCESS-OF
HTTP:STC:JAVA:ORA-BYTECODE-CE
HTTP:STC:JAVA:METHODHANDLE
HTTP:STC:JAVA:JMXMBEAN-RCE
HTTP:STC:JAVA:FONT-PROCESSING
HTTP:STC:JAVA:GIF-MEMCORRUPT
HTTP:STC:JAVA:IBM-RMI-PROXY-RCE
HTTP:STC:JAVA:SQL-DRIVERMANAGER
HTTP:STC:JAVA:SEC-SLIDER-BYPASS
HTTP:STC:JAVA:SANDBOX-BYPASS
HTTP:STC:JAVA:JPEGIMGEWRITER-MC
HTTP:STC:JAVA:GSUB-BOF
HTTP:STC:JAVA:IMG-SETPIXELS-OF
HTTP:STC:JAVA:JNLP-OF
HTTP:STC:JAVA:FONT-HANDLNG-BO
HTTP:STC:JAVA:BEAST-WEBSOCKET
HTTP:STC:JAVA:IBM-CLASS-LDR-RCE
HTTP:STC:JAVA:DOCBASE-BOF
HTTP:STC:JAVA:PACK200-INT
HTTP:STC:JAVA:TYPE1-FONT
HTTP:STC:JAVA:JAVASE-LIBCALL-CE
HTTP:STC:JAVA:JAX-WS-RCE

HTTP:STC:MOZILLA

HTTP:STC:MOZILLA:SVG-IN-XBL-UAF
HTTP:STC:MOZILLA:WGL-BUFFERDATA
HTTP:STC:MOZILLA:FIREBURN
HTTP:STC:MOZILLA:SHAREDWORK-UAF
HTTP:STC:MOZILLA:URLBAR-RCE
HTTP:STC:MOZILLA:FF2-DIR-TRAV
HTTP:STC:MOZILLA:ONKEYDOWN-FU
HTTP:STC:MOZILLA:FIREFOX-DOS
HTTP:STC:MOZILLA:FIREFOX-NSTREE
HTTP:STC:MOZILLA:FF-REMOTE-MC
HTTP:STC:MOZILLA:SVG-DATA
HTTP:STC:MOZILLA:TITLE-OF
HTTP:STC:MOZILLA:MOZ-BINDING
HTTP:STC:MOZILLA:ICONURL-JS
HTTP:STC:MOZILLA:SSL-ICON
HTTP:STC:MOZILLA:OGG-VORBIS
HTTP:STC:MOZILLA:OBJ-TYPE-CURR
HTTP:STC:MOZILLA:CANVAS-BO
HTTP:STC:MOZILLA:IFRAME-STYLE
HTTP:STC:MOZILLA:SVG-RCE
HTTP:STC:MOZILLA:OGG-VORBIS1
HTTP:STC:MOZILLA:LAYOUT-HEAP-OF
HTTP:STC:MOZILLA:XUL-FRAMETREE
HTTP:STC:MOZILLA:MAL-REG-EX
HTTP:STC:MOZILLA:XUL-DLL-DOS
HTTP:STC:MOZILLA:SOAPPARAM-OF
HTTP:STC:MOZILLA:FF-IMG-TAG-DOS
HTTP:STC:MOZILLA:DOMNODEREMOVED
HTTP:STC:MOZILLA:QUERYINT-OF
HTTP:STC:MOZILLA:TABLE-FRAMES
HTTP:STC:MOZILLA:XML-MEM-CORR
HTTP:STC:MOZILLA:LAYOUT-MC
HTTP:STC:MOZILLA:XUL-NULL-MENU
HTTP:STC:MOZILLA:MOZ-GRID-DOS
HTTP:STC:MOZILLA:FF-PLUGINSPAGE
HTTP:STC:MOZILLA:FIRE-FAVICON
HTTP:STC:MOZILLA:INNER-HTML-DOS
HTTP:STC:MOZILLA:MESA-TEXIMG2D
HTTP:STC:MOZILLA:ARRAY-DANGLE
HTTP:STC:MOZILLA:CLEARTEXTRUN
HTTP:STC:MOZILLA:ADDON-RCE
HTTP:STC:MOZILLA:LOOKUP-MEM-CO1
HTTP:STC:MOZILLA:SVG-CODE-INJ
HTTP:STC:MOZILLA:FIREFLASH
HTTP:STC:MOZILLA:DEFINESETTER
HTTP:STC:MOZILLA:CONSTRUCTFRAME
HTTP:STC:MOZILLA:EVENT-DLOAD
HTTP:STC:MOZILLA:MOZ-TAG-ORDER1
HTTP:STC:MOZILLA:FF-ARRAY-SLICE
HTTP:STC:MOZILLA:CHROME-PRIVESC
HTTP:STC:MOZILLA:PROPTAB-MEM
HTTP:STC:MOZILLA:DOMSVGLNGTH
HTTP:STC:MOZILLA:FIREFOX-ENG-MC
HTTP:STC:MOZILLA:SVG-XML-INT-OF
HTTP:STC:MOZILLA:JIT-ESCAPE-MC
HTTP:STC:MOZILLA:HTML-JS-DOS
HTTP:STC:MOZILLA:FF-WYCIWYG
HTTP:STC:MOZILLA:FF-XSL-TRANS
HTTP:STC:MOZILLA:HOST-MAL-IDN
HTTP:STC:MOZILLA:XSLT-FILE-DOS
HTTP:STC:MOZILLA:SVG-CLIPPATH
HTTP:STC:MOZILLA:LOCATION-HOST
HTTP:STC:MOZILLA:MOZ-TAG-ORDER
HTTP:STC:MOZILLA:MOZ-FLOAT-OF
HTTP:STC:MOZILLA:READYSTATE-UAF
HTTP:STC:MOZILLA:REDUCE-RIGHT
HTTP:STC:MOZILLA:TYPE-OBJ-RCE1
HTTP:STC:MOZILLA:FIREUNICODE
HTTP:STC:MOZILLA:ARGMNT-FUNC-CE
HTTP:STC:MOZILLA:FF-SELECT-UAF
HTTP:STC:MOZILLA:SIDEBAR
HTTP:STC:MOZILLA:STR-RPLACE-MEM
HTTP:STC:MOZILLA:FF-ADDR-SPOOF1
HTTP:STC:MOZILLA:FF-IMG-TAG-DO1
HTTP:STC:MOZILLA:CSSVALUE-MEM
HTTP:STC:MOZILLA:FIREFOX-INPUT
HTTP:STC:MOZILLA:NSCSSVALUE-OF
HTTP:STC:MOZILLA:SHELL
HTTP:STC:MOZILLA:ONUNLOAD-SSL
HTTP:STC:MOZILLA:DOC-WRITE-MC
HTTP:STC:MOZILLA:NNTP-URL1
HTTP:STC:MOZILLA:STR-REPLACE
HTTP:STC:MOZILLA:TABLE-BG-UAF
HTTP:STC:MOZILLA:OVERFLOW-EVENT
HTTP:STC:MOZILLA:JS-EVAL
HTTP:STC:MOZILLA:NONASCII-LINK
HTTP:STC:MOZILLA:NNTP-URL
HTTP:STC:MOZILLA:FF-COMPARTMENT
HTTP:STC:MOZILLA:XRAYWRAPPER-SB
HTTP:STC:MOZILLA:FRAME-COMMENT
HTTP:STC:MOZILLA:NAV-OBJ-EXEC
HTTP:STC:MOZILLA:FF-TOSOURCE
HTTP:STC:MOZILLA:FF-DEL-OBJ-REF
HTTP:STC:MOZILLA:XBL-METHD-EVAL
HTTP:STC:MOZILLA:URL-SHRTCUT
HTTP:STC:MOZILLA:PARAM-OF
HTTP:STC:MOZILLA:FIREFOX-XPCOM
HTTP:STC:MOZILLA:DUP-LOC-HEADER
HTTP:STC:MOZILLA:WRAPPED-JAVA
HTTP:STC:MOZILLA:XUL-TREE
HTTP:STC:MOZILLA:FIREFOX-MC
HTTP:STC:MOZILLA:MCHANNEL-UAF
HTTP:STC:MOZILLA:FF-INFO
HTTP:STC:MOZILLA:MAL-SVG-INDEX
HTTP:STC:MOZILLA:TYPE-OBJ-RCE
HTTP:STC:MOZILLA:OFFSET-MEM-COR
HTTP:STC:MOZILLA:PKCS11-RCE
HTTP:STC:MOZILLA:XBL-TAG-RM
HTTP:STC:MOZILLA:GIF89A-EXT
HTTP:STC:MOZILLA:PLUGIN-ACL
HTTP:STC:MOZILLA:JSCRIPT-CLIP
HTTP:STC:MOZILLA:FIRESEARCH
HTTP:STC:MOZILLA:IFRAME-SRC

HTTP:STC:NORTON

HTTP:STC:NORTON:NAV-AX-DOS
HTTP:STC:NORTON:LAUNCHURL-HTTP

HTTP:STC:OPERA

HTTP:STC:OPERA:OPERA-CONFIG
HTTP:STC:OPERA:GIF-PROC-MC
HTTP:STC:OPERA:GETIMAGEDATA-MC
HTTP:STC:OPERA:TELNET-URI
HTTP:STC:OPERA:SVG-ANIMATION
HTTP:STC:OPERA:ALERTBOX-BOVF
HTTP:STC:OPERA:DOCUMENT-WRITE
HTTP:STC:OPERA:SVG-CLIPPATH-MC
HTTP:STC:OPERA:FILE-URL-OF

HTTP:STC:OUTLOOK

HTTP:STC:OUTLOOK:SHELL-PROFILE
HTTP:STC:OUTLOOK:WABFILE
HTTP:STC:OUTLOOK:WAB-BOF
HTTP:STC:OUTLOOK:WAB-BOF1
HTTP:STC:OUTLOOK:MAILTO-QUOT-CE
HTTP:STC:OUTLOOK:WABFILE-STC
HTTP:STC:OUTLOOK:OUTLOOK-PRF

HTTP:STC:SAFARI

HTTP:STC:SAFARI:WEBKIT-FREE-CE
HTTP:STC:SAFARI:DISK-URI
HTTP:STC:SAFARI:WEBKIT-RANGEOBJ
HTTP:STC:SAFARI:CONSOLE-LOG-FS
HTTP:STC:SAFARI:IOS-JS-ARY-RCE
HTTP:STC:SAFARI:RUNIN-UAF
HTTP:STC:SAFARI:FILE-URI
HTTP:STC:SAFARI:X-MAN-PAGE-RCE5
HTTP:STC:SAFARI:WEBKIT-SVG-MARK
HTTP:STC:SAFARI:CMD-INJECTION
HTTP:STC:SAFARI:XML-INFI-RECUR
HTTP:STC:SAFARI:WEBKIT-COLUMN
HTTP:STC:SAFARI:WEBKIT-1ST-LTR
HTTP:STC:SAFARI:WEBKIT-MENU-MEM
HTTP:STC:SAFARI:WEBKIT-AFREE
HTTP:STC:SAFARI:FLOAT-BOF
HTTP:STC:SAFARI:WEBKIT-TITLE
HTTP:STC:SAFARI:PARENT-CLOSE
HTTP:STC:SAFARI:X-MAN-PAGE-RCE9
HTTP:STC:SAFARI:X-MAN-PAGE-RCE6
HTTP:STC:SAFARI:X-MAN-PAGE-RCE4
HTTP:STC:SAFARI:X-MAN-PAGE-RCE3
HTTP:STC:SAFARI:X-MAN-PAGE-RCE1
HTTP:STC:SAFARI:X-MAN-PAGE-RCE2
HTTP:STC:SAFARI:X-MAN-PAGE-RCE7
HTTP:STC:SAFARI:CHILD-REMOVAL
HTTP:STC:SAFARI:SSH-URI
HTTP:STC:SAFARI:X-MAN-PAGE-RCE8
HTTP:STC:SAFARI:CHARSET-XFORM
HTTP:STC:SAFARI:WEBKIT-ELEMENTS
HTTP:STC:SAFARI:IMG-USE-FREE
HTTP:STC:SAFARI:WEBKIT-LIBXSLT
HTTP:STC:SAFARI:CONT-EDITABLE
HTTP:STC:SAFARI:MUL-FUNC-DOS
HTTP:STC:SAFARI:IPHONE-LIBTIFF
HTTP:STC:SAFARI:CSS-FORMAT-HINT
HTTP:STC:SAFARI:MAL-REGEX
HTTP:STC:SAFARI:JSARR-SORT-HOVF
HTTP:STC:SAFARI:WEBKIT-SVG-MC
HTTP:STC:SAFARI:WEBKIT-RENDER
HTTP:STC:SAFARI:RTL-USE-FREE
HTTP:STC:SAFARI:INNERHTML-MC
HTTP:STC:SAFARI:HELP-RUNSCRPT

HTTP:STC:SCRIPT

HTTP:STC:SCRIPT:FUNC-CNSTR-OBFU
HTTP:STC:SCRIPT:EVAL-JSOBFU
HTTP:STC:SCRIPT:STRFMCC-MUL-BAS
HTTP:STC:SCRIPT:REBOTS-DOT-PHP
HTTP:STC:SCRIPT:BROWSER-RECON
HTTP:STC:SCRIPT:BROWSER-RECON-1
HTTP:STC:SCRIPT:DOUBLE-BACKSLAS
HTTP:STC:SCRIPT:TRNSFM-STR-OBF
HTTP:STC:SCRIPT:VBS-DL-ATTEMPT
HTTP:STC:SCRIPT:UNESCAPE-HEX-OB
HTTP:STC:SCRIPT:SVL-DBL-FREE
HTTP:STC:SCRIPT:HEAPLIB-OBJ
HTTP:STC:SCRIPT:FUNC-REASSIGN
HTTP:STC:SCRIPT:OBFUSCATED
HTTP:STC:SCRIPT:EVAL-GIF-JSOBF
HTTP:STC:SCRIPT:REPLACE-OBSF
HTTP:STC:SCRIPT:AV-MAGIC-EVADE1
HTTP:STC:SCRIPT:NONALPHANUMERIC
HTTP:STC:SCRIPT:HTML-SCRIPT
HTTP:STC:SCRIPT:WEBEX-WRF-BOF1
HTTP:STC:SCRIPT:FF-NAV-URI1
HTTP:STC:SCRIPT:PAYLOAD-SETUP
HTTP:STC:SCRIPT:APACHE-XML-DOS
HTTP:STC:SCRIPT:JAVA-EVASION
HTTP:STC:SCRIPT:EDWARDS-PACKER
HTTP:STC:SCRIPT:GARBLE-JS-OBFUS
HTTP:STC:SCRIPT:MALJS-NEMUCOD
HTTP:STC:SCRIPT:JS-EK-ENC-OBF
HTTP:STC:SCRIPT:GRUNT-JJENCODER
HTTP:STC:SCRIPT:STUNNIX-PACKER
HTTP:STC:SCRIPT:EVAL-OBFUSC
HTTP:STC:SCRIPT:JS-MYOBFUSCATE
HTTP:STC:SCRIPT:JS-OB-ROUTIN-1
HTTP:STC:SCRIPT:JS-OB-EXPLOIT
HTTP:STC:SCRIPT:JS-RENAME
HTTP:STC:SCRIPT:JS-OBFUS-ROUTIN
HTTP:STC:SCRIPT:JSOBF-PLUGINVER
HTTP:STC:SCRIPT:MATH-LIB
HTTP:STC:SCRIPT:JS-STRING-OBFS
HTTP:STC:SCRIPT:HEAPSPRAY
HTTP:STC:SCRIPT:JS-ARRAY-POST
HTTP:STC:SCRIPT:MUL-OBJECT-TAGS
HTTP:STC:SCRIPT:MS-JS-OBFUS
HTTP:STC:SCRIPT:JS-PACKER
HTTP:STC:SCRIPT:UNESCAPE-OBFUS
HTTP:STC:SCRIPT:UUENCODED-EVAL
HTTP:STC:SCRIPT:MAL-FILE-HNDRCE
HTTP:STC:SCRIPT:DIV-N-FUNC-OBFU
HTTP:STC:SCRIPT:COOKIE-BOMB
HTTP:STC:SCRIPT:JS-OB-IFRAMER
HTTP:STC:SCRIPT:BASE64-ENCODED
HTTP:STC:SCRIPT:JSEVAL-GEN-TECH
HTTP:STC:SCRIPT:CHAR-ENCODING
HTTP:STC:SCRIPT:MUL-TAG-RTF-OBJ
HTTP:STC:SCRIPT:VB-REGX-ID
HTTP:STC:SCRIPT:DEFINATION-HEAP
HTTP:STC:SCRIPT:VAR-HEAP-SHELL
HTTP:STC:SCRIPT:CNSTR-QUOTE-OBF
HTTP:STC:SCRIPT:RTRN-FUNC-OBFU
HTTP:STC:SCRIPT:FUNC-EVAL-OBFU
HTTP:STC:SCRIPT:DOUBLE-BACKSLA1
HTTP:STC:SCRIPT:MUL-BASE-OBFU
HTTP:STC:SCRIPT:CONSTRUCTOR-OBF
HTTP:STC:SCRIPT:FUNC-RTN-OBFU
HTTP:STC:SCRIPT:JSVAR-REVALIGN
HTTP:STC:SCRIPT:MULTI-CHAR
HTTP:STC:SCRIPT:UNICODE-SLED
HTTP:STC:SCRIPT:PYTHON-RECVFROM
HTTP:STC:SCRIPT:SPLIT-REVERSE

HTTP:STC:SRVRSP

HTTP:STC:SRVRSP:COMPRESSED
HTTP:STC:SRVRSP:403-FORBID
HTTP:STC:SRVRSP:IDC-PATH
HTTP:STC:SRVRSP:404-NOT-FOUND
HTTP:STC:SRVRSP:AUTH-RESP-OF

HTTP:STC:SSL

HTTP:STC:SSL:MD5-SIGNATURE
HTTP:STC:SSL:MD5-SIGNATURE-1

HTTP:STC:STREAM

HTTP:STC:STREAM:DIRSHOW-MJPEG
HTTP:STC:STREAM:ASF-WMP
HTTP:STC:STREAM:REALAUDIO-OF
HTTP:STC:STREAM:WMV
HTTP:STC:STREAM:AVI
HTTP:STC:STREAM:CONTENT-TYPE
HTTP:STC:STREAM:FLV
HTTP:STC:STREAM:QT-IT-MEM
HTTP:STC:STREAM:QT-RESPONSE-BO
HTTP:STC:STREAM:REAL-MP4-MEM
HTTP:STC:STREAM:QUICKTIME-BO
HTTP:STC:STREAM:QT-M3U
HTTP:STC:STREAM:DIRSHOW-MJPEG1
HTTP:STC:STREAM:QT-MOV-FILE-BO1
HTTP:STC:STREAM:DIRECTSHOW-MJPG
HTTP:STC:STREAM:DIRECTX-MJPEG
HTTP:STC:STREAM:QT-HREFTRACK
HTTP:STC:STREAM:SWF
HTTP:STC:STREAM:QT-FF
HTTP:STC:STREAM:DIRECTSHOW-MP3
HTTP:STC:STREAM:QT-MOV-FILE-BOF
HTTP:STC:STREAM:MAL-MEDIA
HTTP:STC:STREAM:QT-MPEG-PAD
HTTP:STC:STREAM:REAL-AVI
HTTP:STC:STREAM:REALMEDIA-PROC
HTTP:STC:STREAM:FFDSHOW-URL-OF
HTTP:STC:STREAM:GDI-WMF-HEADER
HTTP:STC:STREAM:QT-DESC-ATOM
HTTP:STC:STREAM:ASF-BOF
HTTP:STC:STREAM:VLC-REALINDEX1
HTTP:STC:STREAM:QT-MAL-SMIL
HTTP:STC:STREAM:CINEPAK-RCE
HTTP:STC:STREAM:REALPLAYER-QCP
HTTP:STC:STREAM:QT-FLASHPIX-OF
HTTP:STC:STREAM:MAL-AVI-RIFF
HTTP:STC:STREAM:SHOCKWAVE-IO
HTTP:STC:STREAM:REALPLAYER-MP3
HTTP:STC:STREAM:QT-MOV-IO
HTTP:STC:STREAM:VLC-REALINDEX
HTTP:STC:STREAM:FLASH-MEMORY
HTTP:STC:STREAM:WINAMP-META-OF

HTTP:STC:SWF

HTTP:STC:SWF:REAL-FLV1
HTTP:STC:SWF:MAL-SWF-OF
HTTP:STC:SWF:HEAP-OF
HTTP:STC:SWF:OPENTYPE-FONT-OF1
HTTP:STC:SWF:CVE-2013-3362-MC
HTTP:STC:SWF:OPENTYPE-FONT-OF
HTTP:STC:SWF:AS-POOL
HTTP:STC:SWF:BYTEARRAY
HTTP:STC:SWF:FLASH-SALIGN
HTTP:STC:SWF:PHPEXEC
HTTP:STC:SWF:REAL-FLV
HTTP:STC:SWF:KEY-PRESS-EVENT
HTTP:STC:SWF:ADOBE-FLASH-FILEBO
HTTP:STC:SWF:FLASHPLAYER-OF
HTTP:STC:SWF:HEADER-MEM-RCE
HTTP:STC:SWF:DEFSCENE-OF
HTTP:STC:SWF:URL-SEC-DOM-RCE
HTTP:STC:SWF:COPYRAWDATATO
HTTP:STC:SWF:SIZE-MIS
HTTP:STC:SWF:RESOURCEMODULEURLS
HTTP:STC:SWF:TEXT-IOF
HTTP:STC:SWF:STAGE3D
HTTP:STC:SWF:UNDEF-NS
HTTP:STC:SWF:MEM-DISC
HTTP:STC:SWF:ACTIONTAG
HTTP:STC:SWF:REC-S-OF
HTTP:STC:SWF:FLASH-DEFINEFONT
HTTP:STC:SWF:PLACEOBJX
HTTP:STC:SWF:SWAVE-TSAC-CHUNK
HTTP:STC:SWF:CVE-2014-0510-MC
HTTP:STC:SWF:CVE-2014-0585-CE
HTTP:STC:SWF:ADOBE-COPYPIXEL-IO
HTTP:STC:SWF:FLASH-MEM-CORRUPT
HTTP:STC:SWF:SHARED-OBJ-UAF

HTTP:STC:VULN

HTTP:STC:VULN:APACHE-1-3-28
HTTP:STC:VULN:WEBLOGIC-8-1
HTTP:STC:VULN:CHEROKEE-0-4-17-1
HTTP:STC:VULN:OUTLOOK-XSRF
HTTP:STC:VULN:IMAIL-8-13
HTTP:STC:VULN:APACHE-1-3-26-31
HTTP:STC:VULN:APACHE-2-0-52
HTTP:STC:VULN:TAG-BDO

HTTP:STC:WINAMP

HTTP:STC:WINAMP:AU-OF1
HTTP:STC:WINAMP:ULTRAVOX-MSG
HTTP:STC:WINAMP:MAKI-SCRIPT-OF
HTTP:STC:WINAMP:MOD-HDR-OF
HTTP:STC:WINAMP:CDDA-OF
HTTP:STC:WINAMP:CDDA-OF3
HTTP:STC:WINAMP:M3U-BOF
HTTP:STC:WINAMP:ID3V2-OVERFLOW

HTTP:STREAM

HTTP:STREAM:FLV
HTTP:STREAM:STARTV-STREAM
HTTP:STREAM:AAJTAK-STREAM
HTTP:STREAM:YOUTUBE-REQ
HTTP:STREAM:VIDEO-CONTENT
HTTP:STREAM:QUICKTIME-CLIENT
HTTP:STREAM:GOOGLE-VIDEO
HTTP:STREAM:ITUNES-USERAGENT
HTTP:STREAM:MAGIX-OF

HTTP:TOMCAT

HTTP:TOMCAT:REAL-PATH-DISC
HTTP:TOMCAT:JSP-PAGE
HTTP:TOMCAT:JSP-BUFFER
HTTP:TOMCAT:REAL-PATH-REQ
HTTP:TOMCAT:SOURCE-MAL-REQ
HTTP:TOMCAT:XPL-FILE-DISC
HTTP:TOMCAT:DIR-LIST-INFO-DISCL
HTTP:TOMCAT:JSP-AS-HTML
HTTP:TOMCAT:JSP-DEC-INT-OF
HTTP:TOMCAT:AJP12-SHUTDOWN
HTTP:TOMCAT:DIR-TRAV
HTTP:TOMCAT:ADMIN-SCAN
HTTP:TOMCAT:URL-ENC-DIRTRAV
HTTP:TOMCAT:JSP-COMMENTS
HTTP:TOMCAT:SERVLET-DEVICE-DOS1
HTTP:TOMCAT:POLICY-BYPASS
HTTP:TOMCAT:SERVLET-DEVICE-DOS

HTTP:TUNNEL

HTTP:TUNNEL:CHAT-YIM
HTTP:TUNNEL:CHAT-AOL-IM
HTTP:TUNNEL:ALTNET-OVER-HTTP
HTTP:TUNNEL:TELNET
HTTP:TUNNEL:PROXY
HTTP:TUNNEL:HTTPTUNNEL-URL
HTTP:TUNNEL:SIP
HTTP:TUNNEL:REDUH
HTTP:TUNNEL:CHAT-MSN-IM-SSL
HTTP:TUNNEL:ANCHORFREE-CLIENT
HTTP:TUNNEL:SMTP
HTTP:TUNNEL:CHAT-MSN-IM

HTTP:UA

HTTP:UA:CURL
HTTP:UA:WGET
HTTP:UA:SKIPFISH
HTTP:UA:MSN-BINGBOT
HTTP:UA:GOOGLEBOT
HTTP:UA:MOREOVER
HTTP:UA:NUTCH
HTTP:UA:ATOMIC-EMAIL-HUNTER
HTTP:UA:NSAUDITOR
HTTP:UA:AUTO-EMAIL-PRO
HTTP:UA:PBROWSE
HTTP:UA:EMAILSPIDER
HTTP:UA:DSURF
HTTP:UA:EXTRACTOR-PRO
HTTP:UA:EMAILSIPHON-COLLECTOR
HTTP:UA:EMAILWOLF-COLLECTOR
HTTP:UA:PHP-BASE64-DECODE
HTTP:UA:CONTACTBOT-COLLECTOR
HTTP:UA:MOBILE
HTTP:UA:CRAZY-BROWSER
HTTP:UA:PHP-CODE-INJ
HTTP:UA:MALICIOUS-UA-1
HTTP:UA:MALICIOUS-UA

HTTP:UNIX-CMD

HTTP:UNIX-CMD:UNIX-CMD-M-Z
HTTP:UNIX-CMD:UNIX-CMD-A-L
HTTP:UNIX-CMD:UNIX-GCC1

HTTP:UNIX-FILE

HTTP:UNIX-FILE:ETC-HOSTS-ALLOW
HTTP:UNIX-FILE:ETC-PASSWD

HTTP:WASD

HTTP:WASD:CONF-ACCESS
HTTP:WASD:DIR-TRAV

HTTP:WEBLOGIC

HTTP:WEBLOGIC:WEBROOT
HTTP:WEBLOGIC:ENCODING
HTTP:WEBLOGIC:BEAPACHE
HTTP:WEBLOGIC:CONSOLE-HELP-PORT
HTTP:WEBLOGIC:JSESSIONID
HTTP:WEBLOGIC:BEA-CONN-BOF
HTTP:WEBLOGIC:URL-REVEAL-SRC

HTTP:WEBSPHERE

HTTP:WEBSPHERE:VER-DOS
HTTP:WEBSPHERE:SERVER-OF

HTTP:WEBSTER

HTTP:WEBSTER:LONG-GET-REQ
HTTP:WEBSTER:DIR-TRAVERSAL

HTTP:WHATSUP

HTTP:WHATSUP:WEB-SQL-INJECT
HTTP:WHATSUP:DOS-DEV-DOS
HTTP:WHATSUP:INSTANCENAME-OF

HTTP:WIN-CMD

HTTP:WIN-CMD:ROOT.EXE

HTTP:XSS

HTTP:XSS:YOAST-WP
HTTP:XSS:NASA-TRACE
HTTP:XSS:WEB-VIEW-DOC-SCR-INJ
HTTP:XSS:WHITE-LABEL-CMS
HTTP:XSS:CA-SITEMINDER-OLUNICDE
HTTP:XSS:SHAREPOINT-XSS
HTTP:XSS:HP-INTELLIGENT-MNGT
HTTP:XSS:IBM-LOTUS-NOTES-TRAV
HTTP:XSS:CISCO-CSDC
HTTP:XSS:WP-YT-AUDIO
HTTP:XSS:MS-FOREFRONT-INFO-DISC
HTTP:XSS:MS-CVE-2015-6170
HTTP:XSS:CISCOWORKS-CSFHS
HTTP:XSS:ANWIKI-XSS
HTTP:XSS:JOOMLA-COM-RESMAN
HTTP:XSS:WORDPRESS-COMMENTS-CE
HTTP:XSS:TOMCAT-JSP
HTTP:XSS:CISCO-XSS
HTTP:XSS:WP-ESHOP
HTTP:XSS:HTML-SCRIPT-IN-COOKIE
HTTP:XSS:ISA-AUTH-XSS
HTTP:XSS:AWAUCTIONSCRIPT-CMS
HTTP:XSS:OPENFIRE-SEARCH
HTTP:XSS:DRUPAL-CUMULAS
HTTP:XSS:WP-LIVE-WIRE-THEME
HTTP:XSS:AXIS-M10-CAMERA1
HTTP:XSS:WP-INLINE-GALLERY
HTTP:XSS:NOVELL-ZENWORKS-XSS
HTTP:XSS:FRONTPAGE-EXT
HTTP:XSS:WP-SOCIALGRID
HTTP:XSS:WP-UNIVERSAL-POST
HTTP:XSS:JOOMLA-CITY
HTTP:XSS:PACER-EDITION-EMAIL
HTTP:XSS:WP-GAZETTE-THEME
HTTP:XSS:WP-PLACESTER
HTTP:XSS:WP-AJAX-CALENDAR
HTTP:XSS:IIS-ASP
HTTP:XSS:SHAREPOINT-EDITFORM
HTTP:XSS:WP-ZOTPRESS
HTTP:XSS:E2-PHOTO-GALLERY
HTTP:XSS:MS-FOREFRONT-EXCEL-TBL
HTTP:XSS:MS-MULT-APPLICATION
HTTP:XSS:LDAP-ACCOUNT-MGR
HTTP:XSS:WP-WOOTHEMES
HTTP:XSS:TM-REQUEST-FORGERY
HTTP:XSS:XOOPS-MULT
HTTP:XSS:MS-SCOM-WEB-CONSOLE
HTTP:XSS:MS-W3WHO-XSS
HTTP:XSS:MC-CONTENT-MANAGER
HTTP:XSS:WP-RATING-WIDGET
HTTP:XSS:VBULLETIN-SORTORDER
HTTP:XSS:ZEN-CART
HTTP:XSS:SYNDEO-CMS-ADDONS
HTTP:XSS:INMAGIC-DBTWPUB
HTTP:XSS:PHPWEBSITE-PAGE-ID
HTTP:XSS:CISCOWORKS-CSFHS-1
HTTP:XSS:WP-COMICPRESS
HTTP:XSS:WP-PHOTO-ALBUM
HTTP:XSS:IBM-OPEN-ADMIN
HTTP:XSS:WP-AJAX-RECENT-POSTS
HTTP:XSS:VBULLETIN-SORT
HTTP:XSS:WP-AJAX-CATEGORY
HTTP:XSS:SUBRION-CMS
HTTP:XSS:WP-SERMON-BROWSER
HTTP:XSS:AWAUCTIONSCRIPT-CMS2
HTTP:XSS:XOOPS-VIEW-PHOTOS-PHP
HTTP:XSS:HP-SMH-REDIRCTURL
HTTP:XSS:MS-IE-TOSTATICHTML
HTTP:XSS:MUL-RECORDPRESS
HTTP:XSS:APACHE-MOD-NEGOTIATION
HTTP:XSS:WP-STATS-DASHBOARD
HTTP:XSS:WP-PHOTORACER
HTTP:XSS:WP-IGIT-POSTS
HTTP:XSS:CMSQLITE-ID
HTTP:XSS:ATUTOR-ACONTENT
HTTP:XSS:WP-DAILY-MAUI-PHOTO
HTTP:XSS:AXIS-M10-CAMERA
HTTP:XSS:ADOBE-COLDF-SEARCHLOG
HTTP:XSS:MAILMAN-ADMIN
HTTP:XSS:CISCO-SESM
HTTP:XSS:NAGIOS-XI-ALERT-CLOUD
HTTP:XSS:IE7-XSS
HTTP:XSS:AWAUCTIONSCRIPT-CMS3
HTTP:XSS:IE-CVE-2015-0070
HTTP:XSS:SERVICE-CGI
HTTP:XSS:IPLANET-ROOT
HTTP:XSS:OMNIHTTPD-REDIR
HTTP:XSS:IBM-LOTUS-DOMINO-XNSF
HTTP:XSS:ASP-REQ-VALIDATION
HTTP:XSS:WP-LOCAL-MARKET-EXP
HTTP:XSS:WP-LAZYEST-GALLERY
HTTP:XSS:WP-PHOTOSMASH-GAL
HTTP:XSS:HP-SEARCH-XSS
HTTP:XSS:WP-FANCYBOX-PLUGIN
HTTP:XSS:MS-SHAREPOINT-PARAM
HTTP:XSS:MS-VSTWAC-TFS
HTTP:XSS:X-FORWARDED-FOR-INJ
HTTP:XSS:SUSPICIOUS-SCAN
HTTP:XSS:SHARE-XSS
HTTP:XSS:ORACLE-REPORT-SVR
HTTP:XSS:SHAREPOINT-COMMAND
HTTP:XSS:SHAREPOINT-WIZARDLIST
HTTP:XSS:SHAREPOINT-THEMEWEB
HTTP:XSS:DYNAMICAX-PORTAL-XSS
HTTP:XSS:MS-LYNC-SERVER
HTTP:XSS:MULTI-VENDOR
HTTP:XSS:HTML-SCRIPT-HTTP-HDR
HTTP:XSS:CROOGO-CMS
HTTP:XSS:CKEDITOR-POSTEDDATAPHP
HTTP:XSS:IBM-LOTUS-SIMPLESEARCH
HTTP:XSS:HDR-REFERRER
HTTP:XSS:HTML-SCRIPT-IN-URL-PTH
HTTP:XSS:WORDPRESS-COMMENT
HTTP:XSS:SYM-IM-MANAGER
HTTP:XSS:MS-CS
HTTP:XSS:NOVELL-QUICKFINDER
HTTP:XSS:NOVELL-GW-WEB-ACCESS
HTTP:XSS:TYPO3-LOCALURL-CMS
HTTP:XSS:ARBORNETWORKS-PEAKFLOW
HTTP:XSS:HTML-SCRIPT-IN-URL-VAR
HTTP:XSS:SHAREPOINT-XSS-2
HTTP:XSS:SYMANTEC-WG
HTTP:XSS:SHAREPOINT-INPLVIEW
HTTP:XSS:ROBOHELP-XSS
HTTP:XSS:OUTLOOK-WEB
HTTP:XSS:SYMANTEC-EP-PARAM-XSS
HTTP:XSS:AWAUCTIONSCRIPT-CMS1
HTTP:XSS:MS-FOREFRONT-DEFAULT
HTTP:XSS:SHAREPOINT-CALLBACK
HTTP:XSS:HTML-SCRIPT-IN-UA
HTTP:XSS:MERCURY-BOARD
HTTP:XSS:BEA-ADMIN-CONSOLE
HTTP:XSS:CPANEL-MODULES
HTTP:XSS:REALPLAYER-SMIL
HTTP:XSS:URL-IMG-XSS
HTTP:XSS:ORACLE-GLASSFISH
HTTP:XSS:OUTLOOK-WEB-ACCESS
HTTP:XSS:MS-IE-XSS-BYPASS
HTTP:XSS:SHAREPOINT-LIST-XSS
HTTP:XSS:SHAREPOINT-USER
HTTP:XSS:HTML-SCRIPT-IN-HOST
HTTP:XSS:ORACLE-BIEE-XSS
HTTP:XSS:ORACLE-ISQLPLUS
HTTP:XSS:HTW-XSS
HTTP:XSS:FOREFRONT-SIGNURL
HTTP:XSS:HTML-SCRIPT-IN-AE
HTTP:XSS:HTML-SCRIPT-IN-AL
HTTP:XSS:COLDFUSION-MX7
HTTP:XSS:MS-SCCM-REFLECTED
HTTP:XSS:HTML-SCRIPT-IN-POST
HTTP:XSS:IBM-RATIONAL-CLEARCASE
HTTP:XSS:MS-REPORT-MANAGER
HTTP:XSS:OPENFIRE-USER-CREATE
HTTP:XSS:MS-REPORT-VIEWER
HTTP:XSS:SUN-JAVA-CALENDAR
HTTP:XSS:MAILMAN-OPTIONS
HTTP:XSS:CISCO-CSUSERCGIXSS
HTTP:XSS:WRDPRSS-SCRIPT-HEADER
HTTP:XSS:APACHE-SSI-XSS
HTTP:XSS:PHPNUKE-BOOKMARKS
HTTP:XSS:MS-IE-CVE-2014-6328
HTTP:XSS:MS-OWA-MUTIPLE
HTTP:XSS:HP-INSIGHT-ONLINE
HTTP:XSS:SYM-GATEWAY-PHP-PAGE

HTTP:YAHOO

HTTP:YAHOO:ATTACHMENT-UPLOAD
HTTP:YAHOO:ACTIVITY
HTTP:YAHOO:ATTACHMENT-DOWNLOAD

ICMP

ICMP:MODEMS-ATH-COMMAND-DOS

ICMP:AUDIT

ICMP:AUDIT:RESP-WITHOUT-REQ
ICMP:AUDIT:INVALID-CODE
ICMP:AUDIT:INVALID-TYPE
ICMP:AUDIT:WRONG-CHECKSUM
ICMP:AUDIT:REQUEST-RESND
ICMP:AUDIT:ICMP-WITH-OPTIONS

ICMP:EXPLOIT

ICMP:EXPLOIT:FLOOD
ICMP:EXPLOIT:NON-ZERO-DATA-LEN
ICMP:EXPLOIT:DIFF-LEN-IN-RESP
ICMP:EXPLOIT:DIFF-LEN-IN-RESND
ICMP:EXPLOIT:LAN-SMURF
ICMP:EXPLOIT:MIP-ROUTE-OF
ICMP:EXPLOIT:ECHOK

ICMP:INFO

ICMP:INFO:ADDR-REQ
ICMP:INFO:TIMESTAMP
ICMP:INFO:INFORMATION
ICMP:INFO:ECHO-REQUEST
ICMP:INFO:ECHO-REPLY

ICMP6:AUDIT

ICMP6:AUDIT:REQUEST-RESEND
ICMP6:AUDIT:INVALID-CHECKSUM
ICMP6:AUDIT:RESP-WITHOUT-REQ
ICMP6:AUDIT:INVALID-CODE
ICMP6:AUDIT:INVALID-TYPE

ICMP6:EXPLOIT

ICMP6:EXPLOIT:DIFF-LEN-IN-RESP
ICMP6:EXPLOIT:DIFF-LEN-IN-RSD
ICMP6:EXPLOIT:FLOOD

IDENT

IDENT:GEWSE-FLOOD
IDENT:TINYIDENT-OF

IDENT:AUDIT

IDENT:AUDIT:RESPONSE
IDENT:AUDIT:NEST-REQ
IDENT:AUDIT:PORT-PAIR

IDENT:INVALID

IDENT:INVALID:EMPTY-LN
IDENT:INVALID:EOL
IDENT:INVALID:SENDMAIL-EXPL

IDENT:JIDENTD

IDENT:JIDENTD:IDENT-OF1

IDENT:OVERFLOW

IDENT:OVERFLOW:REPLY
IDENT:OVERFLOW:REQUEST-NUM
IDENT:OVERFLOW:REQUEST

IKE

IKE:FW1-OVERFLOW
IKE:INV-DER-LEN
IKE:SYMANTEC-ISAKMPD-DOS
IKE:KAME-RACOON-X509-CERT-VERIF
IKE:STRONGSWAN-CERTIFICATE-BO
IKE:SA-DELETE
IKE:OPENSWAN-DPD-NULL-PTR-DOS

IKE:DOS

IKE:DOS:CISCO-DOS
IKE:DOS:WIN2K-DOS
IKE:DOS:TCP-HUMP
IKE:DOS:TCPDUMP-SPI-OVERFLOW
IKE:DOS:TCPDUMP-ID-UNDERFLOW
IKE:DOS:ISAKMP-DOS-IPSEC
IKE:DOS:OPENBSD-ISAKMPD
IKE:DOS:ISAKMP-DOS

IKE:MALFORMED

IKE:MALFORMED:2MANY-PAYLOAD
IKE:MALFORMED:INV-PAYLOAD-TYPE
IKE:MALFORMED:PACKET
IKE:MALFORMED:INV-PAY-LEN

IMAP

IMAP:MER-SUBSCRIBE
IMAP:AUTH-OF
IMAP:LOTUS-CRAM
IMAP:SET-QUOTA

IMAP:AUDIT

IMAP:AUDIT:REQ-INVALID-STATE
IMAP:AUDIT:REQ-UNKNOWN-CMD
IMAP:AUDIT:COMMAND-FAILED
IMAP:AUDIT:LOGIN-FAILED
IMAP:AUDIT:REQ-BINARY-DATA
IMAP:AUDIT:IMAPS-CLEAR

IMAP:CYRUS

IMAP:CYRUS:FETCH-CMD
IMAP:CYRUS:LOGIN-OF
IMAP:CYRUS:PRELOG
IMAP:CYRUS:PARTIAL-CMD

IMAP:EXPLOIT

IMAP:EXPLOIT:NETMAIL-APPEND
IMAP:EXPLOIT:SUSPICIOUS-HEADER
IMAP:EXPLOIT:SUSPICIOUS-COMM
IMAP:EXPLOIT:CMD-FORMAT-STRING
IMAP:EXPLOIT:DOMINO-IMAP-BO2
IMAP:EXPLOIT:CMD-DIR-TRSVR

IMAP:FAILURE

IMAP:FAILURE:BRUTE-FORCE

IMAP:IPSWITCH

IMAP:IPSWITCH:CHAR-OF
IMAP:IPSWITCH:IMAIL-INFO
IMAP:IPSWITCH:DELETE-OF
IMAP:IPSWITCH:STATUS-OF
IMAP:IPSWITCH:FETCH-OF
IMAP:IPSWITCH:SEARCH-DATE

IMAP:OVERFLOW

IMAP:OVERFLOW:REFERENCE
IMAP:OVERFLOW:PASS
IMAP:OVERFLOW:COMMAND
IMAP:OVERFLOW:FLAG
IMAP:OVERFLOW:TAG
IMAP:OVERFLOW:LIT_LENGTH_OFLOW
IMAP:OVERFLOW:LINE
IMAP:OVERFLOW:USER
IMAP:OVERFLOW:MAILBOX
IMAP:OVERFLOW:IMAP4-LSUB-OF
IMAP:OVERFLOW:MERCUR-NTLMSSP
IMAP:OVERFLOW:DOMINO-IMAP
IMAP:OVERFLOW:SCO-IMAPD-UNO-OF
IMAP:OVERFLOW:MAILENABLE-ARG-OF
IMAP:OVERFLOW:BIN-SH
IMAP:OVERFLOW:WUIMAPD-PART-OF
IMAP:OVERFLOW:MAILENABLE-OF
IMAP:OVERFLOW:MAILENABLE-APPEND
IMAP:OVERFLOW:MAILENABLE-BO
IMAP:OVERFLOW:MERCURY-MAIL-BO
IMAP:OVERFLOW:MAILENABLE-OF-2
IMAP:OVERFLOW:LITERAL-TOKEN
IMAP:OVERFLOW:MERCURY-LOGIN
IMAP:OVERFLOW:IMAP-CONT-OF
IMAP:OVERFLOW:MAILENABLE-OF-3
IMAP:OVERFLOW:OL-IFRAME-EXEC
IMAP:OVERFLOW:IMAP-LSUB-OF
IMAP:OVERFLOW:LINUX-X86-3
IMAP:OVERFLOW:LINUX-X86-2
IMAP:OVERFLOW:LINUX-X86-1
IMAP:OVERFLOW:LINUX-X86-4
IMAP:OVERFLOW:LINUX-X86-5
IMAP:OVERFLOW:LIST-OF
IMAP:OVERFLOW:MDAEMON-MD5
IMAP:OVERFLOW:WUIMAPD-MBOX-OF

IMAP:REQERR

IMAP:REQERR:REQ-DUPLICATE-TAG
IMAP:REQERR:REQ-INVALID-TAG
IMAP:REQERR:INVALID_LITERAL_LEN
IMAP:REQERR:REQ-UNEXPECTED-ARG

IMAP:VULN

IMAP:VULN:CYRUS-2-1-11

IP

IP:SRC-ROUTE-OF
IP:ESP-RUNT
IP:IGMP-MS-DOS

IP:AUDIT

IP:AUDIT:INVALID-TYPE
IP:AUDIT:HAS-IP-OPTIONS

IP:EXPLOIT

IP:EXPLOIT:IP-TRACEROUTE
IP:EXPLOIT:SAME-SRC-DST

IP:INFO

IP:INFO:INVALID-SOURCE
IP:INFO:INVALID-DESTINATION

IP:OPTERR

IP:OPTERR:INVALID-LENGTH
IP:OPTERR:DUPLICATE
IP:OPTERR:INVALID-INFRAGMENT

IP:OVERFLOW

IP:OVERFLOW:OPTIONS

LDAP

LDAP:UNSUPPORTED_VERSION
LDAP:CONTROLS-MISMATCH
LDAP:RECURSIVE-DOS
LDAP:LOTUS-DOMINO
LDAP:SIDVAULT-DOS
LDAP:KERIO-DOS
LDAP:SAMBALDAP-LIBLDB
LDAP:AD-LDAP-DOS
LDAP:BER-DOS
LDAP:AD-AUTH-BYPASS
LDAP:WIN-AUTH-SB2
LDAP:LOTUS-DN
LDAP:MS-WINDOWS-AD-LDAP-DOS
LDAP:OPENLDAP-2.2.23-DOS
LDAP:COMMGATE-OF
LDAP:OPENLDAP-RWM-DOS
LDAP:SUN-REQ-FS
LDAP:SUN-DIR-OF
LDAP:TIVOLI-OF
LDAP:SLAPD-OVERLAY-DOS
LDAP:EDIRECTORY-DOS
LDAP:BERGET-NXT-DOS
LDAP:IMAIL-BOF
LDAP:IMAIL-BOF-1
LDAP:ORACLE-PREAUTH-DOS
LDAP:AD-CONVERT-ATT
LDAP:LSASS-HEAP-OF
LDAP:MS-AD-QUERY-DOS
LDAP:NA-PGP-KEYSERVER-OF

LDAP:AUDIT

LDAP:AUDIT:ANONYMOUS_BIND
LDAP:AUDIT:BIND_RESULT_FAILED

LDAP:EMPTY

LDAP:EMPTY:DELREQ_EMPTY
LDAP:EMPTY:MODIFYREQ_EMPTY
LDAP:EMPTY:ASSERT_EMPTY
LDAP:EMPTY:ATTRIBDESC_EMPTY
LDAP:EMPTY:ATTRIB_ASSERT_EMPTY
LDAP:EMPTY:SRCH_RESREF_NONE
LDAP:EMPTY:SRCH_RES_OBJ_EMPTY
LDAP:EMPTY:REFERRAL_EMPTY
LDAP:EMPTY:EXTDRSP-RSPNM-EMPTY
LDAP:EMPTY:MODIFYREQ_ADD_EMPTY
LDAP:EMPTY:EXTDREQ-REQVAL-EMPTY
LDAP:EMPTY:EXTDREQ-REQNM-EMPTY
LDAP:EMPTY:EXTDRSP-RESP-EMPTY
LDAP:EMPTY:ATTRIBLIST_EMPTY
LDAP:EMPTY:ATTRIBVALUE_EMPTY
LDAP:EMPTY:SCHREQ-FTR-SSTR-NONE
LDAP:EMPTY:SRCHREQ_FILTER_EMPTY
LDAP:EMPTY:SRCH_FILTER_EMPTY
LDAP:EMPTY:SRCHREQ_FTR_NULL
LDAP:EMPTY:SRCHREQ_FTR_SSTR
LDAP:EMPTY:ADDREQ-ATTRIB-EMPTY
LDAP:EMPTY:ATTRIBVAL_LIST_EMPTY
LDAP:EMPTY:SRCHREQ_LOGOP_NOARGS
LDAP:EMPTY:MODIFYREQ_PART_EMPTY
LDAP:EMPTY:SCHREQ_FILTER_EMPTY
LDAP:EMPTY:MODREQ-ATTRIB-EMPTY

LDAP:FAILED

LDAP:FAILED:ADD-RESULT-FAIL
LDAP:FAILED:MODIFY-RESULT-FAIL
LDAP:FAILED:DELETE-RESULT-FAIL
LDAP:FAILED:COMPARE_RESULT_FAIL
LDAP:FAILED:SEARCH-RESULT-FAIL
LDAP:FAILED:BRUTE-FORCE
LDAP:FAILED:MODDN-RESULT-FAIL

LDAP:FORMAT

LDAP:FORMAT:ENC-UNK-END-CHAR
LDAP:FORMAT:ENC_LEN_INDEFINITE
LDAP:FORMAT:ENC_LEN_LEFT_ZEROS
LDAP:FORMAT:ENC_INCORRECT_TAG
LDAP:FORMAT:ATTRIB-DESC-FMTERR
LDAP:FORMAT:DN_FMTERR

LDAP:INVALID

LDAP:INVALID:REQ-ATTRIBTYPE-INV
LDAP:INVALID:SEARCH-BASEOBJ-INV
LDAP:INVALID:SEARCH-ATTRIB-INV
LDAP:INVALID:REFERRAL_INVALID
LDAP:INVALID:SRCH-DEREF-AL-INV
LDAP:INVALID:SRCH_RES_ATTR_INV
LDAP:INVALID:REQ-OPERATION-INV
LDAP:INVALID:MESGID-INVALID
LDAP:INVALID:MODDNREQ-ENTRY-INV
LDAP:INVALID:ENTRY_INVALID
LDAP:INVALID:ADDREQ-ENTRY-INV
LDAP:INVALID:ATTRIBTYPE_INVALID
LDAP:INVALID:SRCH-SIZELIMIT-INV
LDAP:INVALID:SRCH-TYPEONLY-INV
LDAP:INVALID:SEARCH-FILTER-INV
LDAP:INVALID:SRCH-TIMELIMIT-INV
LDAP:INVALID:SRCHREQ_FLEN_INV
LDAP:INVALID:SEARCH_SCOPE_INV
LDAP:INVALID:REQTYPE_INVALID
LDAP:INVALID:ENC_INVALID_LEN
LDAP:INVALID:ENC_BOOLEAN
LDAP:INVALID:ENC_INTEGER_LEN
LDAP:INVALID:MODDNREQ-NWRDN-INV
LDAP:INVALID:REQ_OBJECT_INVALID
LDAP:INVALID:MODRDN-NULL-RDN

LDAP:OVERFLOW

LDAP:OVERFLOW:ENCODING-TAG-OF
LDAP:OVERFLOW:ENCODING-LEN-OF
LDAP:OVERFLOW:DN_TOO_LONG
LDAP:OVERFLOW:ENCODING-INT-OF
LDAP:OVERFLOW:ENC_REPR_2LONG
LDAP:OVERFLOW:ATTRIB-DESC-OF
LDAP:OVERFLOW:SEARCH-LEVELS-OF
LDAP:OVERFLOW:ENC-TAG-VAL-OF
LDAP:OVERFLOW:MESSAGE-TOO-LONG
LDAP:OVERFLOW:DC-MEM-LEAK-DOS
LDAP:OVERFLOW:REQ-OF
LDAP:OVERFLOW:MS-DIR-LEAK-MC
LDAP:OVERFLOW:MODRDN-UTF8-EXEC
LDAP:OVERFLOW:IBM-DOMINO
LDAP:OVERFLOW:IBM-LOTUS-DOMINO
LDAP:OVERFLOW:IMAIL-ASN-1

LPD

LPD:HUMMINGBIRD
LPD:ACTFAX-SERVER-BO
LPD:MSF-CASCADE-JOB-REQ
LPD:LDP-CMD-INJ
LPD:OPT-OF

LPR

LPR:WINDOWS-LPR-DOS
LPR:ARB-FILE-UNLINK

LPR:AUDIT

LPR:AUDIT:C-CMD
LPR:AUDIT:CMD-FAILED
LPR:AUDIT:RESPONSE
LPR:AUDIT:PORT
LPR:AUDIT:CMD

LPR:INVALID

LPR:INVALID:C-EMPTY
LPR:INVALID:C-NAME
LPR:INVALID:D-EMPTY
LPR:INVALID:D-NAME
LPR:INVALID:EOF
LPR:INVALID:LINE
LPR:INVALID:EOL
LPR:INVALID:REQUEST
LPR:INVALID:CMD-TRUNC

LPR:OVERFLOW

LPR:OVERFLOW:C-HOST
LPR:OVERFLOW:C-BANNER
LPR:OVERFLOW:C-CLASS
LPR:OVERFLOW:C-FORMAT
LPR:OVERFLOW:C-INDENT
LPR:OVERFLOW:C-FONT
LPR:OVERFLOW:C-JOB
LPR:OVERFLOW:C-MAIL
LPR:OVERFLOW:C-WIDTH
LPR:OVERFLOW:C-LENGTH
LPR:OVERFLOW:C-NAME
LPR:OVERFLOW:CFILE
LPR:OVERFLOW:D-LENGTH
LPR:OVERFLOW:DFILE
LPR:OVERFLOW:D-NAME
LPR:OVERFLOW:C-SYMLINK
LPR:OVERFLOW:C-SOURCE
LPR:OVERFLOW:CFILE-LEN
LPR:OVERFLOW:C-TITLE
LPR:OVERFLOW:C-USER
LPR:OVERFLOW:LINE
LPR:OVERFLOW:LPD-EXPLOIT

MISC

MISC:HTRAN-PROXY-CONNECT-FAILED
MISC:OPENAFS-RPC-BO
MISC:LINUX-KERNEL-ISCSI-BO
MISC:WINS-COMMENDLG
MISC:WINS-BOF
MISC:MSF-ATCK-PATTERN
MISC:SHELLSHOCK
MISC:LIBREOFICE-IMPRESS-RSM-RCE
MISC:KERIO-AUTH-OF
MISC:LLMNR-REVERSE-LOOKUP

MISC:PDF

MISC:PDF:INTEGER-OVERFLOW

MS-RPC

MS-RPC:EPDUMP-SCAN
MS-RPC:EPDUMP-SCAN-2
MS-RPC:MSRPC-ISYSACTIVATE-RACE
MS-RPC:ATSVC-RUNDLL
MS-RPC:NOOP-SLIDE-RPC-REQ
MS-RPC:ADVTC-DATACORESVC-OF
MS-RPC:SAMR-ACCESS-REQUEST
MS-RPC:SAMR-ACCESS-DENIED
MS-RPC:INDX-SVC-ACTIVE
MS-RPC:WRKST-DOS
MS-RPC:MSGQU-FRNAME
MS-RPC:DCERPC-DOS3
MS-RPC:NETSRVRDSKENUM
MS-RPC:ATSVC-BIND
MS-RPC:PGP-SRV-PTR
MS-RPC:TREND-MICRO-RPC
MS-RPC:LAN-WORM-SPREAD
MS-RPC:EXCHANGE-MEM
MS-RPC:ARNUDP-RPC-DOS
MS-RPC:BROADWIN-BOF
MS-RPC:NETRLOGONGETDMNINF-NULL
MS-RPC:MESSENGER-POPUP
MS-RPC:MSRPC-HIGRCE
MS-RPC:HOST-INTEGRATION-RCE
MS-RPC:ADVTC-WEBVRPCS-BOF
MS-RPC:DCE-RPC-DNSSVR
MS-RPC:SNORT-EVAL-BOF
MS-RPC:SPOOLER-DLL-LOAD
MS-RPC:NTLM-RPCSS-DOS
MS-RPC:LLSSRV-RCE
MS-RPC:MSDTC-DOS
MS-RPC:DCE-RPC-UUID-BIND
MS-RPC:MSRPC-HIGRCE-1
MS-RPC:TRND-MICRO-RPC
MS-RPC:ADVTC-WEBVRPCS-SVC-BOF
MS-RPC:ADVANTECH-WEBACCESS-BOF
MS-RPC:MAL-DNS
MS-RPC:ADVTC-WEBSVC-BO
MS-RPC:ADVTC-DATACORESVC-BOF

MS-RPC:DCOM

MS-RPC:DCOM:SVRNAME-2LONG
MS-RPC:DCOM:LONG-FILE-OF
MS-RPC:DCOM:REMACT-UDP
MS-RPC:DCOM:REMACT-OBJNAME-OF
MS-RPC:DCOM:EXPLOIT-2
MS-RPC:DCOM:EXPLOIT
MS-RPC:DCOM:EXPLOIT-3
MS-RPC:DCOM:REMACT

MS-RPC:ERR

MS-RPC:ERR:FRAG-LEN-TOO-BIG
MS-RPC:ERR:WRONG-FRAG
MS-RPC:ERR:INV-PTYPE
MS-RPC:ERR:EPM-WRONG-LHS-LEN
MS-RPC:ERR:INV-AUTH-LEN
MS-RPC:ERR:FRAG-BIGGER-THAN-NEG
MS-RPC:ERR:EPM-INV-TOWER-LEN
MS-RPC:ERR:COUNT-TOO-LARGE
MS-RPC:ERR:CL-PTYPE-IN-CO-PDU
MS-RPC:ERR:EPM-WRONG-TOWER-LEN
MS-RPC:ERR:EPM-INV-LHS-LEN
MS-RPC:ERR:EPM-INV-NUM-ENTRIES
MS-RPC:ERR:CL-PAYLOAD-NOT-EMPTY
MS-RPC:ERR:EPM-INV-RHS-LEN
MS-RPC:ERR:EPM-WRONG-RHS-LEN
MS-RPC:ERR:EPM-INV-OP-NUM
MS-RPC:ERR:CO-PTYPE-IN-CL-PDU
MS-RPC:ERR:RESPONSE-NO-REQ
MS-RPC:ERR:SHORT-MSG
MS-RPC:ERR:INV-AUTH-PAD-LEN
MS-RPC:ERR:LEN-CONFLICT
MS-RPC:ERR:FRAG-LEN-TOO-SMALL

MS-RPC:EVASION

MS-RPC:EVASION:DCE-LARGE-FRAG-2
MS-RPC:EVASION:BLIND-BIND-ACK2
MS-RPC:EVASION:FRAG2-SMALL
MS-RPC:EVASION:DCERPC-SMALL-REQ
MS-RPC:EVASION:BUFFERED-REQ
MS-RPC:EVASION:LARGE-FRAG-2
MS-RPC:EVASION:BLIND-BIND-ACK-2
MS-RPC:EVASION:BUFFERED-REQUEST
MS-RPC:EVASION:SMALL-REQ-FRAG
MS-RPC:EVASION:LARGE-FRAG-1
MS-RPC:EVASION:SMALL-FRAG
MS-RPC:EVASION:MULTI-HEADER-1

MS-RPC:INV

MS-RPC:INV:REQUEST-FROM-SERVER
MS-RPC:INV:RESPONSE-FROM-CLIENT
MS-RPC:INV:NETWARE-SVC
MS-RPC:INV:SPOOLSS-SVC
MS-RPC:INV:DCOM-SVC
MS-RPC:INV:PNP-SVC
MS-RPC:INV:LLSSRV-SVC
MS-RPC:INV:DNS-SVC
MS-RPC:INV:RRAS-SVC
MS-RPC:INV:WKSTA-SVC
MS-RPC:INV:MQ-SVC
MS-RPC:INV:NETDDE-SVC
MS-RPC:INV:SRV-SVC

MS-RPC:LSASS

MS-RPC:LSASS:NETWARE-CIFS-OF
MS-RPC:LSASS:NTLM-DOS
MS-RPC:LSASS:OVERSIZED-FRAG
MS-RPC:LSASS:MAL-OPCODE-2
MS-RPC:LSASS:MAL-OPCODE

MS-RPC:OF

MS-RPC:OF:WKST-SVC-PIPE
MS-RPC:OF:MS-DNS-RPC
MS-RPC:OF:SRV-SVC-2
MS-RPC:OF:WEBCLIENT
MS-RPC:OF:WKST-SVC-BO
MS-RPC:OF:MSG-QUEUE-1
MS-RPC:OF:MSG-QUEUE-3
MS-RPC:OF:NETDDE-SHARE
MS-RPC:OF:MSDTC
MS-RPC:OF:SPOOLSS-1
MS-RPC:OF:MQSVC
MS-RPC:OF:MSG-QUEUE-2
MS-RPC:OF:SRV-SVC-1
MS-RPC:OF:RRAS
MS-RPC:OF:LOC-SVC-1
MS-RPC:OF:LOC-SVC-2
MS-RPC:OF:SPOOLSS-3
MS-RPC:OF:NWSPOOL-OF
MS-RPC:OF:MESSENGER-1

NDMP

NDMP:SHORT-MSG

NETBIOS:ACCESS

NETBIOS:ACCESS:C-DRIVE
NETBIOS:ACCESS:IPC-1
NETBIOS:ACCESS:D-DRIVE
NETBIOS:ACCESS:SAMBA-CLIENT
NETBIOS:ACCESS:ADMIN

NETBIOS:AUDIT

NETBIOS:AUDIT:INV_HDR
NETBIOS:AUDIT:NAME_ERROR
NETBIOS:AUDIT:ACTIVE_ERR
NETBIOS:AUDIT:NBNAME-RES-ADDR

NETBIOS:DIR

NETBIOS:DIR:CD-DOTDOTDOT
NETBIOS:DIR:CD-DOTDOT

NETBIOS:DOS

NETBIOS:DOS:RFPOISON
NETBIOS:DOS:RFPARALYZE

NETBIOS:NBDS

NETBIOS:NBDS:SHORT_MSG
NETBIOS:NBDS:EMPTY_UDP_MSG
NETBIOS:NBDS:BAD_LABEL_FORMAT
NETBIOS:NBDS:FRAG_TRANS_RESP
NETBIOS:NBDS:BE-SERVERNAME-OF
NETBIOS:NBDS:MS-PRINT-SPOOL-FMT

NETBIOS:NBDS:INVALID

NETBIOS:NBDS:INVALID:1STLVL_ENC
NETBIOS:NBDS:INVALID:MSG_TYPE
NETBIOS:NBDS:INVALID:DGM_LEN
NETBIOS:NBDS:INVALID:HDR_FLGS
NETBIOS:NBDS:INVALID:LABEL_LEN
NETBIOS:NBDS:INVALID:PROTO

NETBIOS:NBDS:OF

NETBIOS:NBDS:OF:MSG
NETBIOS:NBDS:OF:NAME

NETBIOS:NBNS

NETBIOS:NBNS:C2S_AA_FLAG
NETBIOS:NBNS:C2S_RESPONSE
NETBIOS:NBNS:CLASS-UNKNOWN
NETBIOS:NBNS:SHORT_MSG
NETBIOS:NBNS:S2C_QUERY
NETBIOS:NBNS:TYPE_UNKNOWN
NETBIOS:NBNS:NAME_TOO_LONG
NETBIOS:NBNS:POINTER_LOOP
NETBIOS:NBNS:EMPTY-UDP-MSG
NETBIOS:NBNS:MS-WPAD-PE

NETBIOS:NBNS:INVALID

NETBIOS:NBNS:INVALID:HDR-OPCODE
NETBIOS:NBNS:INVALID:RRNB-FLG
NETBIOS:NBNS:INVALID:NAME-FLGS
NETBIOS:NBNS:INVALID:PTR
NETBIOS:NBNS:INVALID:HDR-Z
NETBIOS:NBNS:INVALID:FIRST-ENC
NETBIOS:NBNS:INVALID:HDR-CNT
NETBIOS:NBNS:INVALID:LABEL-LEN

NETBIOS:NBNS:RESCODE

NETBIOS:NBNS:RESCODE:NOT_IMPLTD
NETBIOS:NBNS:RESCODE:FORMAT_ERR
NETBIOS:NBNS:RESCODE:CONFLICT
NETBIOS:NBNS:RESCODE:REFUSED
NETBIOS:NBNS:RESCODE:SVR_FAIL

NETBIOS:OVERFLOW

NETBIOS:OVERFLOW:MAILSLOT
NETBIOS:OVERFLOW:ASN-1-BER
NETBIOS:OVERFLOW:LENGTH-OF
NETBIOS:OVERFLOW:ASN-1-DER-OF

NETBIOS:WINS

NETBIOS:WINS:UPDATE-OF
NETBIOS:WINS:REPLICATION-PTR
NETBIOS:WINS:WPADWINS
NETBIOS:WINS:ISATAP-INFO-DIS-1
NETBIOS:WINS:ISATAP-INFO-DIS
NETBIOS:WINS:SRV-NAME-OF
NETBIOS:WINS:REPLICATION-PTR-U

NFS

NFS:UTILS-TCP-CONN-DOS
NFS:FREEBSD-REDDIR-MEM-COR
NFS:CAP-MKNOD
NFS:BSD-MOUNT-DOS
NFS:MS-WINDOWS-NFS-NULL-DOS
NFS:MS-WINDOWS-NFS-NULL-DOS2
NFS:TRIPWIRE-FORMAT-STRING

NFS:AUDIT

NFS:AUDIT:ROOT-ACCESS
NFS:AUDIT:UNKNOWN-VER
NFS:AUDIT:REQ-DENIED
NFS:AUDIT:INVALID-XID
NFS:AUDIT:MKNOD

NFS:ERR

NFS:ERR:VERSION-MISMATCH
NFS:ERR:LARGE-FH
NFS:ERR:LARGE-CRED
NFS:ERR:LONG-FILENAME
NFS:ERR:LONG-NETNAME
NFS:ERR:LONG-PATHNAME
NFS:ERR:WRONG-DIR
NFS:ERR:SHORT-READ

NFS:INFO

NFS:INFO:UNKNOWN-PROG

NFS:INVALID

NFS:INVALID:INVALID-DIR
NFS:INVALID:INVALID-FILETYPE
NFS:INVALID:INVALID-HOW
NFS:INVALID:BAD-CRED-LEN
NFS:INVALID:INVALID-RSTAT
NFS:INVALID:INVALID-CMODE
NFS:INVALID:INVALID-AMASK
NFS:INVALID:INVALID-EOF
NFS:INVALID:INVALID-PROC
NFS:INVALID:BAD-VERF-CRED

NFS:OVERFLOW

NFS:OVERFLOW:BUF-OVERFLOW
NFS:OVERFLOW:LINUX-ACL-OF-DOS2
NFS:OVERFLOW:LINUX-ACL-OF-DOS
NFS:OVERFLOW:XLOG-1BYTE-OF

NNTP

NNTP:INTERNETNEWS-NULL-PATH-DOS

NNTP:AUDIT

NNTP:AUDIT:NESTED-REPLY
NNTP:AUDIT:NESTED-REQ
NNTP:AUDIT:UNKNOWN-CMD

NNTP:ERR

NNTP:ERR:INVALID-CMD

NNTP:INN

NNTP:INN:INND-OF2
NNTP:INN:INND-OF1

NNTP:NN

NNTP:NN:NN-FMTSTR1

NNTP:OVERFLOW

NNTP:OVERFLOW:LINE-OVERFLOW
NNTP:OVERFLOW:XPAT-PATTERN
NNTP:OVERFLOW:NNTP-XHDR
NNTP:OVERFLOW:INN-CONTROL-MSG
NNTP:OVERFLOW:OUTLOOK-NNTP-OF

NNTP:VULN

NNTP:VULN:ISC-2-2-2

NTP

NTP:CTL_ERR_RSP_SEEN
NTP:EXCEEDED_REF_CLKAGE
NTP:RECVD_UNEXPECTED_PKT
NTP:PASV_NOT_DISSOLVED
NTP:PEER_MODE_INCOMPAT
NTP:PEER_STRATUM_INCOMPATI
NTP:MODE_STRATUM_ALTERED
NTP:NTP-READVAR
NTP:TRAFFIC
NTP:CRYPTO-NAK-AUTH-BYPASS
NTP:MUL-NTP-DAEMON-AUTOKEY-BOF
NTP:PIDFILE-DRIFTFILE-OVERWRITE
NTP:MULTIPLE-STACK-OVERFLOW
NTP:MONLIST-REQUEST
NTP:MODE7-DOS
NTP:NTP-NAK-DOS
NTP:MONLIST-REQUEST-FLOOD

NTP:ERROR

NTP:ERROR:CTL_NONSTD_VAR_NAME
NTP:ERROR:INVALID_MODE
NTP:ERROR:CTL_INVALID_CLK_SRC
NTP:ERROR:DATA_FIELD_TOO_SHORT
NTP:ERROR:CTL_INV_CLKSTATUS
NTP:ERROR:CTL_VAR_NAME_2LONG
NTP:ERROR:CTL_INV_PEER_EVCODE
NTP:ERROR:CTL_INVALID_ERRCODE
NTP:ERROR:CTL_INV_PEER_STATUS
NTP:ERROR:CTL_INV_PEER_SELECT
NTP:ERROR:MSG_TOO_SHORT
NTP:ERROR:MSG_WITHIN_POLL_INTVL
NTP:ERROR:MAX_STRATUM_EXCEEDED
NTP:ERROR:SERVER_SYNCH_ALARM
NTP:ERROR:INVALID_DISPERSION
NTP:ERROR:CTL_VAR_VALUE_2LONG
NTP:ERROR:CTL_INVALID_OPCODE
NTP:ERROR:CTL_INVALID_EVCODE
NTP:ERROR:MSG_TOO_LONG

NTP:INVALID

NTP:INVALID:CTL_CLKERR_RPRTED
NTP:INVALID:CTL_DATA_MULTI_PKT
NTP:INVALID:TIMESTMP_NOT_MATCH

OS:AIX

OS:AIX:PDNSD-OF

OS:LINUXX86

OS:LINUXX86:BOOTP-OF
OS:LINUXX86:SCTP-CHUNKLESS
OS:LINUXX86:LPRNG-OF
OS:LINUXX86:NTPDX-OF
OS:LINUXX86:MOUNTD-OF-1
OS:LINUXX86:POP2-OF-1
OS:LINUXX86:MOUNTD-OF-2
OS:LINUXX86:NTALKD-OF
OS:LINUXX86:MOUNTD-OF-3
OS:LINUXX86:POP2-OF-2

OS:SCOX86

OS:SCOX86:CALSERVER-OF

OS:SOLARISX86

OS:SOLARISX86:NLPS-OF

P2P

P2P:UNIFS

P2P:ARES

P2P:ARES:UDP-PEER-CHECK
P2P:ARES:PEER-CONNECT-UDP
P2P:ARES:PEER-CONNECT-TCP

P2P:AUDIT

P2P:AUDIT:GNUTELLA-MESSAGE
P2P:AUDIT:GNUTELLA-SVR-RESP
P2P:AUDIT:GNUTELLA-RTABLE-UPD
P2P:AUDIT:GNUTELLA-UNSUP-VER
P2P:AUDIT:GNUTELLA-LINE
P2P:AUDIT:GNUTELLA-HDR-ATRB
P2P:AUDIT:GNUTELLA-BYE-TTL
P2P:AUDIT:GNUTELLA-PING-LEN
P2P:AUDIT:GNUTELLA-PONG-LEN
P2P:AUDIT:GNUTELLA-HTTP-GET
P2P:AUDIT:GNUTELLA-QUERY
P2P:AUDIT:GNUTELLA-MSG
P2P:AUDIT:GNUTELLA-OK-RESP
P2P:AUDIT:GNUTELLA-PUSH-LEN
P2P:AUDIT:GNUTELLA-EOL
P2P:AUDIT:GNUTELLA-TTL
P2P:AUDIT:GNUTELLA-SEARCH
P2P:AUDIT:SOFTETHER-SSH
P2P:AUDIT:SE-HUB-LOOK

P2P:BEARSHARE

P2P:BEARSHARE:UA
P2P:BEARSHARE:LOGIN
P2P:BEARSHARE:DJ-SERVICE
P2P:BEARSHARE:FILE-XFER
P2P:BEARSHARE:SEARCH

P2P:BITTORRENT

P2P:BITTORRENT:BT-ENCRYPTED
P2P:BITTORRENT:BT-SEARCH
P2P:BITTORRENT:TRACKER-QUERY
P2P:BITTORRENT:TRACKER-SCRAPE
P2P:BITTORRENT:BT-TRACKER-DOS
P2P:BITTORRENT:HANDSHAKE
P2P:BITTORRENT:CONTENT-TYPE
P2P:BITTORRENT:KICKASSTORRENTS
P2P:BITTORRENT:TRACKER-QUERY-2
P2P:BITTORRENT:DHT4
P2P:BITTORRENT:DOT-TORRENT
P2P:BITTORRENT:BITCOMET-CHUNK
P2P:BITTORRENT:DHT
P2P:BITTORRENT:UTORRENT-UDP
P2P:BITTORRENT:TRACKER-UDP
P2P:BITTORRENT:BTCLIENT-UA

P2P:DC

P2P:DC:HUB-LOGIN
P2P:DC:ACTIVE
P2P:DC:DNS-QUERY

P2P:EDONKEY

P2P:EDONKEY:S2C-PONG-RESPONSE
P2P:EDONKEY:FILE-SEARCH-REQ
P2P:EDONKEY:CLIENT-HELLO
P2P:EDONKEY:CLIENT-VER-CHECK
P2P:EDONKEY:OTHER-SVR-INFO-REQ
P2P:EDONKEY:FILE-DOWNLOAD-REQ
P2P:EDONKEY:CLIENT-DOS-ATK
P2P:EDONKEY:FILE-SHARES
P2P:EDONKEY:C2S-PING-BEACON
P2P:EDONKEY:PORT-53

P2P:EMULE

P2P:EMULE:PLUS-VER-CHECK
P2P:EMULE:VERYCD
P2P:EMULE:KADEMLIA-KAD
P2P:EMULE:DECODE16-OVERFLOW

P2P:FREENET

P2P:FREENET:CONNECTION

P2P:GNUCLEUSLAN

P2P:GNUCLEUSLAN:BROADCAST
P2P:GNUCLEUSLAN:CONNECT

P2P:GNUTELLA

P2P:GNUTELLA:CONNECT
P2P:GNUTELLA:CONNECTION-OK-V06
P2P:GNUTELLA:UDP-TRAFFIC
P2P:GNUTELLA:LIMEWIRE-DIR-TRANS
P2P:GNUTELLA:X-GNUTELLA
P2P:GNUTELLA:DOWNLOAD
P2P:GNUTELLA:FILE-XCH-TCP
P2P:GNUTELLA:URN-DOWNLOAD-REQ

P2P:GROKSTER

P2P:GROKSTER:GROKSTER

P2P:KAZAA

P2P:KAZAA:FILE-HASH
P2P:KAZAA:FILE-SEND
P2P:KAZAA:FILE-REQ
P2P:KAZAA:UDP-PROBE
P2P:KAZAA:PEER-REQ
P2P:KAZAA:WEB-CONN

P2P:LIMEWIRE

P2P:LIMEWIRE:FREEWIRE

P2P:MISC

P2P:MISC:XOLOX
P2P:MISC:GLUZ
P2P:MISC:IMESH
P2P:MISC:P2P-NETWORKING
P2P:MISC:PHEX
P2P:MISC:100BAO
P2P:MISC:SOULSEEK
P2P:MISC:OPENFT
P2P:MISC:APPLEJUICE
P2P:MISC:HOTLINE
P2P:MISC:PEERENABLE
P2P:MISC:POCO-CONNECT
P2P:MISC:MUTE
P2P:MISC:MANOLITO
P2P:MISC:POCO-UDP
P2P:MISC:KUGOO
P2P:MISC:KUGOO-LOGIN
P2P:MISC:FREECAST
P2P:MISC:PPLIVE-TRACKER-OFF-REQ
P2P:MISC:MEDIASEEK-PL-CLIENT
P2P:MISC:MANOLITO-DOWNLOAD
P2P:MISC:PPLIVE-HTTP-CLIENT-REQ

P2P:MLDONKEY

P2P:MLDONKEY:CLIENT-ACTIVE

P2P:MORPHEUS

P2P:MORPHEUS:MORPHEUS

P2P:NAPSTER

P2P:NAPSTER:UPLOAD-REQ-8888
P2P:NAPSTER:DATA-4444
P2P:NAPSTER:DATA-6666
P2P:NAPSTER:DATA-8888
P2P:NAPSTER:DATA-5555
P2P:NAPSTER:DATA-6699
P2P:NAPSTER:DOWNLOAD-8888
P2P:NAPSTER:DATA-7777
P2P:NAPSTER:DOWNLOAD-7777
P2P:NAPSTER:LOGIN-8888
P2P:NAPSTER:LOGIN-7777
P2P:NAPSTER:USER-LOGIN-8888
P2P:NAPSTER:UPLOAD-REQ-7777
P2P:NAPSTER:SERVER-LOGIN
P2P:NAPSTER:USER-LOGIN-7777

P2P:OVERNET

P2P:OVERNET:PEER-DISCOVERY
P2P:OVERNET:FILE-SHARES
P2P:OVERNET:KEEP-ALIVE
P2P:OVERNET:CONNECTED
P2P:OVERNET:KADEMILIA-OVERNET
P2P:OVERNET:CONNECT-REQ

P2P:SHAREAZA

P2P:SHAREAZA:CLIENT-ACTIVE

P2P:VUZE

P2P:VUZE:USER-AGENT
P2P:VUZE:TIVO-DISCO-BEACON
P2P:VUZE:BIN-DHT
P2P:VUZE:HTTP-CLIENT-MODE
P2P:VUZE:HTTP-RPC-ACTIVITY

P2P:WINMX

P2P:WINMX:CLIENT-VER-CHK-DNS
P2P:WINMX:CLIENT-VER-CHK
P2P:WINMX:CLIENT-MATCHMAKE-DNS
P2P:WINMX:CLIENT-NET-PRB-DNS
P2P:WINMX:DOWNLOAD
P2P:WINMX:CLIENT-NET-PROBE
P2P:WINMX:SERVER-SUPERNODE-LIST
P2P:WINMX:SERVER-CONNECT-OK

P2P:WINNY

P2P:WINNY:PEER-CONNECT

P2P:XUNLEI

P2P:XUNLEI:OVER-HTTP
P2P:XUNLEI:STARTUP
P2P:XUNLEI:QUERY
P2P:XUNLEI:DOWNLOAD
P2P:XUNLEI:UDP
P2P:XUNLEI:MESSSAGE

POP3

POP3:EXTERNAL_MESSAGE
POP3:EMAIL-SCRIPT
POP3:MAL-LOTUS-APPLIX
POP3:EUDORA-MAIL-CLIENT
POP3:SUSPICIOUS-HEADER
POP3:SUSPICIOUS-COMM
POP3:MS-WORD-BULLET-MC
POP3:LOTUS-DOC-VIEWER
POP3:MS-OUTLOOK-2003-OBJ-SEC-BS
POP3:APPLE-ICAL-ATTACH-DOS
POP3:IBM-NOTES-PNG-OVF
POP3:POP-SCRIPT-TAG
POP3:OUTLOOK-OBJECT-TAG
POP3:MS-OUTLOOK-EXP-MHTML-CE
POP3:APPLE-ICAL-PARAM-BO

POP3:AUDIT

POP3:AUDIT:ILLEGAL-FILENAME
POP3:AUDIT:DUPLICATE-HEADER
POP3:AUDIT:INVALID-FILENAME
POP3:AUDIT:EMPTY-BOUNDARY
POP3:AUDIT:REQ-INVALID-STATE
POP3:AUDIT:REQ-NESTED-REQUEST
POP3:AUDIT:COMMAND-FAILED
POP3:AUDIT:REQ-UNKNOWN-CMD
POP3:AUDIT:LOGIN-FAILED

POP3:DOS

POP3:DOS:WINGATE
POP3:DOS:INWEB-HELO-DOS
POP3:DOS:MDAEMON-POP-DOS
POP3:DOS:ULTRAISO-CUE-BO

POP3:ERROR

POP3:ERROR:BOUNDARY_MISSING
POP3:ERROR:DUPLICATE_BOUNDARY
POP3:ERROR:PARTIAL_MESSAGE
POP3:ERROR:ILLEGAL_MIME_ENCODE
POP3:ERROR:UNFINISHED_MULTIPART
POP3:ERROR:TOO_MANY_BOUNDARIES
POP3:ERROR:INVALID_BASE64_CHAR
POP3:ERROR:ILLEGAL_ENCODE

POP3:EXT

POP3:EXT:DOUBLE-EXTENSION
POP3:EXT:DOT-SHS
POP3:EXT:DOT-VBS
POP3:EXT:DOT-PIF
POP3:EXT:DOT-SCR
POP3:EXT:DOT-EXE
POP3:EXT:DOT-MDB
POP3:EXT:DOT-LNK
POP3:EXT:DOT-MDE
POP3:EXT:DOT-SCT
POP3:EXT:DOT-REG
POP3:EXT:DOT-PCD
POP3:EXT:DOT-MSP
POP3:EXT:DOT-BAT
POP3:EXT:DOT-CPL
POP3:EXT:DOT-WSC
POP3:EXT:DOT-WSH
POP3:EXT:DOT-VBE
POP3:EXT:DOT-VB
POP3:EXT:DOT-ADP
POP3:EXT:DOT-BAS
POP3:EXT:DOT-HTA
POP3:EXT:DOT-CRT
POP3:EXT:DOT-INF
POP3:EXT:DOT-OCX
POP3:EXT:DOT-JSE
POP3:EXT:DOT-CHM
POP3:EXT:DOT-386
POP3:EXT:DOT-ADE
POP3:EXT:DOT-INS
POP3:EXT:DOT
POP3:EXT:DOT-CMD
POP3:EXT:DOT-JS
POP3:EXT:DOT-MSC
POP3:EXT:DOT-URL
POP3:EXT:DOT-ISP
POP3:EXT:DOT-WSZ-WAL
POP3:EXT:DOT-WSF
POP3:EXT:DOT-ZIP
POP3:EXT:DOT-MSI
POP3:EXT:DOT-HLP
POP3:EXT:DOT-COM
POP3:EXT:DOT-WMF
POP3:EXT:DOT-GRP
POP3:EXT:DOT-HT

POP3:FAILURE

POP3:FAILURE:BRUTE-FORCE

POP3:OUTLOOK

POP3:OUTLOOK:CRAFTED-RESP
POP3:OUTLOOK:MHTML-CDI
POP3:OUTLOOK:LOCAL-LINK
POP3:OUTLOOK:TROUBLE-QUERY-OF
POP3:OUTLOOK:OL-IFRAME-EXEC
POP3:OUTLOOK:MULTIPLE-FROM
POP3:OUTLOOK:HRALIGN-OF

POP3:OVERFLOW

POP3:OVERFLOW:PASS
POP3:OVERFLOW:BOUNDARY_OVERFLOW
POP3:OVERFLOW:FILENAME2LONG
POP3:OVERFLOW:APOP
POP3:OVERFLOW:COMMAND
POP3:OVERFLOW:LINE
POP3:OVERFLOW:CONTENT_NAME
POP3:OVERFLOW:TXTLINE_2LONG
POP3:OVERFLOW:USER
POP3:OVERFLOW:BSD-OFLOW-1
POP3:OVERFLOW:LINUX-OFLOW
POP3:OVERFLOW:QPOP-OF3
POP3:OVERFLOW:QPOP-OF2
POP3:OVERFLOW:PCCILLIN-POP-OF
POP3:OVERFLOW:ERR-RPLY-OF
POP3:OVERFLOW:AXIGEN-FS
POP3:OVERFLOW:QPOP-OF4
POP3:OVERFLOW:SCO-POP3-OVERFLOW
POP3:OVERFLOW:BSD-OFLOW-2
POP3:OVERFLOW:EUDORA-URL-BOF
POP3:OVERFLOW:CURL-LIBCURL-BO
POP3:OVERFLOW:HTTP-LINK-OF

POP3:REQERR

POP3:REQERR:REQ-MESSAGE-NUMBER
POP3:REQERR:REQ-SYNTAX-ERROR
POP3:REQERR:REQ-BINARY-DATA

POP3:USER

POP3:USER:ROOT

PORTMAPPER

PORTMAPPER:GETADDR-RESP-MAL-UA

PORTMAPPER:AUDIT

PORTMAPPER:AUDIT:ROOT-ACCESS

PORTMAPPER:ERR

PORTMAPPER:ERR:LONG-NETNAME
PORTMAPPER:ERR:WRONG-DIR
PORTMAPPER:ERR:LARGE-CRED
PORTMAPPER:ERR:SHORT-READ

PORTMAPPER:INFO

PORTMAPPER:INFO:NULL-PROC
PORTMAPPER:INFO:UNSET-PROC
PORTMAPPER:INFO:DUMP_PROC
PORTMAPPER:INFO:SET-PROC
PORTMAPPER:INFO:CALLIT-PROC
PORTMAPPER:INFO:PORTMAP-DUMP

PORTMAPPER:INVALID

PORTMAPPER:INVALID:BAD-CRED-LEN
PORTMAPPER:INVALID:BAD-VERF-CRD

PROTOCOLS:PORT

PROTOCOLS:PORT:FTP
PROTOCOLS:PORT:POP3
PROTOCOLS:PORT:TELNET
PROTOCOLS:PORT:SSH
PROTOCOLS:PORT:SIP
PROTOCOLS:PORT:HTTP

PROTOCOLS:TRAFFIC

PROTOCOLS:TRAFFIC:NOT-DNS-TCP
PROTOCOLS:TRAFFIC:NOT-FTP
PROTOCOLS:TRAFFIC:NOT-TELNET
PROTOCOLS:TRAFFIC:NOT-DNS-UDP
PROTOCOLS:TRAFFIC:NOT-HTTP
PROTOCOLS:TRAFFIC:NOT-IMAP
PROTOCOLS:TRAFFIC:NOT-DHCP
PROTOCOLS:TRAFFIC:NOT-SMTP
PROTOCOLS:TRAFFIC:NOT-IKE
PROTOCOLS:TRAFFIC:NOT-NTP
PROTOCOLS:TRAFFIC:NOT-SNMP
PROTOCOLS:TRAFFIC:NOT-SYSLOG
PROTOCOLS:TRAFFIC:NOT-SSH
PROTOCOLS:TRAFFIC:NOT-POP3

RADIUS

RADIUS:INVALID_MSG_LENGTH
RADIUS:ACSREQ_DISALLOWD_ATTR
RADIUS:ACCREQ_DISALLOWD_ATTR
RADIUS:MSG_TOO_SHORT
RADIUS:ACSREQ_INV_NUM_ATTRS
RADIUS:ACCREQ_INV_NUM_ATTRS
RADIUS:INVALID_ATTR_LENGTH
RADIUS:ACCREQ_ATTR_MISSING
RADIUS:INVALID_MSG_CODE
RADIUS:ACCREJ_INV_NUM_ATTRS
RADIUS:ACCCHAL_INV_NUM_ATTRS
RADIUS:ACC_ACC_DISALOWD_ATTR
RADIUS:ACCREJ_DISALLOWD_ATTR
RADIUS:RADIUS-BRUTE-FORCE
RADIUS:ACCREP_DISALLOWD_ATTR
RADIUS:ACC_ACCEPT_INV_NATTRS
RADIUS:ACCCHA_DISALLOWD_ATTR
RADIUS:MALFORMED_VENDOR_ATTR
RADIUS:INCONSISTANT_LENGTH
RADIUS:INVALID_ATTR_TYPE
RADIUS:CLIENT-CERT-VERIF-BO
RADIUS:FS-INJ
RADIUS:USR-OF
RADIUS:USR-AUTHENTICATION
RADIUS:TYPE-DOS
RADIUS:MS-NPS-DOS
RADIUS:FREERADIUS-DOS

REXEC:AUDIT

REXEC:AUDIT:PARAM-NOT-OK
REXEC:AUDIT:ILL-ERR-PORT

REXEC:OVERFLOW

REXEC:OVERFLOW:COMMAND
REXEC:OVERFLOW:PASSWORD
REXEC:OVERFLOW:USERNAME

RLOGIN:AUDIT

RLOGIN:AUDIT:PARAM-NOT-OK
RLOGIN:AUDIT:REQ-ILLEGAL-PORT

RLOGIN:FAILURE

RLOGIN:FAILURE:LOGIN-FAILURE

RLOGIN:INFO

RLOGIN:INFO:RLOGIN-LOGIN

RLOGIN:OVERFLOW

RLOGIN:OVERFLOW:USERNAME
RLOGIN:OVERFLOW:TERMINAL
RLOGIN:OVERFLOW:LONG-ARGS

RLOGIN:REQERR

RLOGIN:REQERR:DATA-IN-1ST-LINE

RLOGIN:USER

RLOGIN:USER:USER-BIN
RLOGIN:USER:USER-ECHO
RLOGIN:USER:ROOT-ACCESS
RLOGIN:USER:USER-ROOT

RPC

RPC:XDR-INTEGER-OVERFLOW
RPC:WDB-AGENT
RPC:SUN-SOLARIS-SADMIND-ADM
RPC:CALL-IT-OF
RPC:KADMIND-KLOG
RPC:RLPR-FS
RPC:KADMIND-RENAME
RPC:KADMIND-OF
RPC:YPUPDATED-CMD-INJ
RPC:KRB5-LIB-OF
RPC:SOL-CDE-CALENDAR-MGR
RPC:AUTOMOUNTD-OF
RPC:RPCBIND-CALLIT-DOS
RPC:SUN-SOLARIS-SADMIND-BO
RPC:NULL-TADDR2UADDR
RPC:PCNFSD-FS
RPC:EMC-LEGATO-NW-OF

RPC:AUDIT

RPC:AUDIT:REQUEST-DENIED
RPC:AUDIT:GETPORT-FAILED
RPC:AUDIT:INVALID-DIR
RPC:AUDIT:REQ-INVALID-XID

RPC:FAILURE

RPC:FAILURE:CALLIT-FAILED
RPC:FAILURE:UNSET-FAILED
RPC:FAILURE:SET-FAILED

RPC:REQERR

RPC:REQERR:REQ-INVALID-PROC

RPC:RPC.CMSD

RPC:RPC.CMSD:RPC-CMSD-OVERFLOW

RPC:RPC.MOUNTD

RPC:RPC.MOUNTD:XLINK-IOF
RPC:RPC.MOUNTD:SHOWMOUNT-TCP
RPC:RPC.MOUNTD:SHOWMOUNT
RPC:RPC.MOUNTD:SHOWMOUNT-UDP
RPC:RPC.MOUNTD:LINUX-MOUNTD-OBO

RPC:RPC.SADMIND

RPC:RPC.SADMIND:ADM-METHOD-TRAV
RPC:RPC.SADMIND:SADMIND-OF

RPC:RPC.SNMPXDMID

RPC:RPC.SNMPXDMID:OVERFLOW

RPC:RPC.STATD

RPC:RPC.STATD:STATD-FMT-STR5
RPC:RPC.STATD:STATD-FMT-STR4
RPC:RPC.STATD:AUTOMOUNT-TLI
RPC:RPC.STATD:STATD-FMT-STR2
RPC:RPC.STATD:RPC-STATD-OF
RPC:RPC.STATD:STATD-FMT-STR1

RPC:RPC.TTDBSERVER

RPC:RPC.TTDBSERVER:TT-REAL-PATH
RPC:RPC.TTDBSERVER:TT-MAL-FS-2
RPC:RPC.TTDBSERVER:TT-MAL-FS-3
RPC:RPC.TTDBSERVER:TT-MAL-OF
RPC:RPC.TTDBSERVER:TT-MAL-FS

RPC:RPC.WALLD

RPC:RPC.WALLD:WALLD-ERR-FTSTR-2
RPC:RPC.WALLD:SYSLOG-FS

RPC:RWHOD

RPC:RWHOD:RWHOD-NULL-INJ

RSH:AUDIT

RSH:AUDIT:PARAM-NOT-OK
RSH:AUDIT:PARAM-OK
RSH:AUDIT:REQ-ILLEGAL-PORT
RSH:AUDIT:REQ-ILLEGAL-ERR-PORT

RSH:FAILURE

RSH:FAILURE:LOGIN-FAILURE

RSH:OVERFLOW

RSH:OVERFLOW:USERNAME
RSH:OVERFLOW:COMMAND
RSH:OVERFLOW:WINRSHD-OF

RSH:USER

RSH:USER:USER-ROOT
RSH:USER:USER-ECHO
RSH:USER:USER-BIN

RSYNC

RSYNC:EXCLUDE-OF
RSYNC:DIR-TRAV
RSYNC:CHUNK-OF

RTSP

RTSP:PLAY
RTSP:EMPTY-HEADER
RTSP:SETUP
RTSP:DESCRIBE-BOF
RTSP:SET-PARAMETER
RTSP:SETUP-HDR
RTSP:CVE-2013-2569-RCE
RTSP:VLC-BO
RTSP:MS-MEDIA-PLAYER-MC
RTSP:HELIX-RN5AUTH
RTSP:UBIQUITI-AIRCAM-BOF
RTSP:MAL-RTSP
RTSP:UBIQUITI-AIRCAM-BOF1
RTSP:REALNETWORKS-HELIX-DOS
RTSP:SETUP-EMPTY

RTSP:EXPLOIT

RTSP:EXPLOIT:INVALID-PORT

RTSP:OVERFLOW

RTSP:OVERFLOW:LINE-OF
RTSP:OVERFLOW:LOADTEST-PW-OF
RTSP:OVERFLOW:STREAMCOUNT
RTSP:OVERFLOW:TRANSPORT-OF
RTSP:OVERFLOW:DESCRIBE-OF
RTSP:OVERFLOW:RTSP-CONTENT

RTSP:REALSERVER

RTSP:REALSERVER:REAL-SETUP-OF3
RTSP:REALSERVER:REAL-SETUP-OF2
RTSP:REALSERVER:REAL-SETUP-OF4
RTSP:REALSERVER:MAL-HEADER
RTSP:REALSERVER:REAL-SETUP-OF1

RUSERS:AUDIT

RUSERS:AUDIT:UNKNOWN-VER
RUSERS:AUDIT:INVALID-XID
RUSERS:AUDIT:REQ-DENIED
RUSERS:AUDIT:ROOT-ACCESS

RUSERS:ERR

RUSERS:ERR:WRONG-DIR
RUSERS:ERR:LONG-NETNAME
RUSERS:ERR:SHORT-READ
RUSERS:ERR:LARGE-CRED

RUSERS:INFO

RUSERS:INFO:UNKNOWN-PROG

RUSERS:INVALID

RUSERS:INVALID:BAD-CRED-LEN
RUSERS:INVALID:BAD-VERF-CRED
RUSERS:INVALID:INVALID-PROC
RUSERS:INVALID:INVALID-DIR

RUSERS:OVERFLOW

RUSERS:OVERFLOW:DEV-OVERFLOW
RUSERS:OVERFLOW:USER-OVERFLOW
RUSERS:OVERFLOW:HOST-OVERFLOW

SCADA

SCADA:SIELCO-SISTEMI-WINLOG-BO1
SCADA:SIEMENS-SIMATIC-WINCC-BO
SCADA:SIELCO-SISTEMI-WINLOG-BOF
SCADA:EKTRON-CMS-XSLT-RCE
SCADA:KINGVIEW-HISTORYSRV-OC3
SCADA:IOSERVER-INFO-DISCLSURE
SCADA:CODESYS-GATEWAY-SERVICE
SCADA:7T-INTERACTIVE-IGSS-OF
SCADA:SIEMENS-SIMATIC-CPU-RCE
SCADA:ICONICS-GENBROKER
SCADA:SIEMENS-SIMATIC-S7-300
SCADA:SIEMENS-CSSERVICE-BOF
SCADA:REALWIN
SCADA:CIP-UNAUTH-CMDEXEC
SCADA:MEASURESOFT-SCADAPRO-RCE
SCADA:3S-CODESYS-DIR-TRAVERSAL
SCADA:3S-CODESYS-GWS-DIRTRVRSL
SCADA:ABB-MICROSCADA-BOF
SCADA:KINGVIEW-BOF
SCADA:SIELCO-SISTEMI-WINLOGPRO
SCADA:CODESYS-MEM-ERR
SCADA:ABB-WSERVER-CMD-EXEC
SCADA:SIEMENS-SIMATIC-HMILOAD
SCADA:SIEMENS-TECNO-VRN-OF
SCADA:SCHNIDER-DB-INFO-DIS
SCADA:CODESYS-BO
SCADA:7T-INTERACTIVE-DC-OF
SCADA:SUNWAY-FORCECONTROL-OF
SCADA:WINLOG-TCP-OF
SCADA:DATAC-REALWIN-MULT-BOF
SCADA:YOKOGAWA-STACK-OF
SCADA:CODESYS-GATEWAY-DOS
SCADA:CITECT-OF
SCADA:SCHNEIDER-ELEC-INTER-BOF
SCADA:SCHNEIDER-ELE-INT-BO
SCADA:CODESYS-HEAP-OVF-1
SCADA:CODESYS-HEAP-OVF
SCADA:DATAC-REALWIN-OF
SCADA:CODESYS-CONTROL-SERVICE
SCADA:WWSUITE
SCADA:CODESYS-OPCODE03EF
SCADA:WELLINTECH-KING-OF

SCADA:DNP3

SCADA:DNP3:WARM-RESTART
SCADA:DNP3:READ
SCADA:DNP3:STOP
SCADA:DNP3:BROADCAST
SCADA:DNP3:DISABLE-RESP
SCADA:DNP3:RESPONSE-DOS
SCADA:DNP3:COLD-RESTART
SCADA:DNP3:MISC-REQ
SCADA:DNP3:WRITE
SCADA:DNP3:NON-DNP3

SCADA:ICCP

SCADA:ICCP:WRONG-FN-PARAMETER
SCADA:ICCP:REASON-CODE-LENGTH
SCADA:ICCP:WRONG-AB-PARAMETER
SCADA:ICCP:WRONG-DT-PARAMETER
SCADA:ICCP:INVALID-TPDU
SCADA:ICCP:CN-INVALID
SCADA:ICCP:INVALID-VERSION
SCADA:ICCP:UNSUPPORTED-TPDU
SCADA:ICCP:WRONG-CN-PARA
SCADA:ICCP:UNSUPPORTED-SERVICE
SCADA:ICCP:BUFFER-SIZE
SCADA:ICCP:DISCONNECT-CODE
SCADA:ICCP:CN-INVALID-LENGTH

SCADA:IEC104

SCADA:IEC104:MESSAGE-OVERFLOW
SCADA:IEC104:SESSION
SCADA:IEC104:INVALID-UDP-MSG
SCADA:IEC104:INVALID-START-TAG
SCADA:IEC104:SHORT-MSG
SCADA:IEC104:SESSION-ALT-PORT
SCADA:IEC104:MESSAGE-TYPEU-FN
SCADA:IEC104:MALFORMED-MESSAGE
SCADA:IEC104:TYPE-I
SCADA:IEC104:TYPE-S
SCADA:IEC104:TYPE-U

SCADA:MODBUS

SCADA:MODBUS:NOT-MODBUS
SCADA:MODBUS:TRAILING-DATA
SCADA:MODBUS:UNDERFLOW
SCADA:MODBUS:BAD-PROTO-ID
SCADA:MODBUS:SHORT-PDU
SCADA:MODBUS:INVALID-UNI-ID
SCADA:MODBUS:OVERLONG-PDU
SCADA:MODBUS:BUSY-EXCEPTION
SCADA:MODBUS:LISTEN-ONLY
SCADA:MODBUS:DOS
SCADA:MODBUS:LENGTH
SCADA:MODBUS:READ-ID
SCADA:MODBUS:CLEAR
SCADA:MODBUS:INVALID-HEADER
SCADA:MODBUS:SLAVE-ID
SCADA:MODBUS:WRITE
SCADA:MODBUS:READ
SCADA:MODBUS:INPUT-INT-OF
SCADA:MODBUS:OPC-SVR-HEAP-CORR
SCADA:MODBUS:GALIL-MODBUS-DOS
SCADA:MODBUS:TRI-COIL-DOS

SCAN

SCAN:DARKD0RK3R-XSS
SCAN:ACUNETIX
SCAN:MFS-PROBE
SCAN:DARKD0RK3R-LFI
SCAN:W3AF
SCAN:DIRBUSTER-UA
SCAN:BREAKINGPOINT-HTTP
SCAN:PYSMBLIB
SCAN:PHP-CGI-RCE-ACTIVITY
SCAN:MUIEBLACKCAT-TOOL
SCAN:OPENVAS-UA
SCAN:MASSCAN-UA

SCAN:ADM

SCAN:ADM:FTP-SCAN

SCAN:AMAP

SCAN:AMAP:FTP-SCAN
SCAN:AMAP:AMAP-USER
SCAN:AMAP:SAP-R3-ON-SSH
SCAN:AMAP:SAP-R3-ON-SMTP
SCAN:AMAP:SAP-R3-ON-HTTP
SCAN:AMAP:SSL-SCAN

SCAN:APPDETECTIVE

SCAN:APPDETECTIVE:HTTPS
SCAN:APPDETECTIVE:USER-AGENT

SCAN:AUDIT

SCAN:AUDIT:NBSTAT-QUERY
SCAN:AUDIT:ARACHNI-WEB-SCANNER
SCAN:AUDIT:IKE-TOOL-SCAN

SCAN:CANVAS

SCAN:CANVAS:NETWORKER-3
SCAN:CANVAS:NOVELL2
SCAN:CANVAS:FEDORA4
SCAN:CANVAS:WORDMAIL3
SCAN:CANVAS:INGRESS
SCAN:CANVAS:TIVOLI3
SCAN:CANVAS:ESERV
SCAN:CANVAS:LINUXSNMP
SCAN:CANVAS:HELIUM-AGENT
SCAN:CANVAS:MAILENABLE
SCAN:CANVAS:HELIUM-AGENT-1
SCAN:CANVAS:HELIUM-AGENT-2

SCAN:CERBERUS

SCAN:CERBERUS:SMTP
SCAN:CERBERUS:FTP
SCAN:CERBERUS:HTTP

SCAN:CORE

SCAN:CORE:DNS-STD-QUERY
SCAN:CORE:EXPLOIT-UNPACK
SCAN:CORE:OPENSSH-CHANNEL
SCAN:CORE:AGENT-LOAD-WIN
SCAN:CORE:EXPLOIT-UNPACK-HTTP
SCAN:CORE:NTPD-CTRL-MSG-OF
SCAN:CORE:MSRPC-WKSSVC
SCAN:CORE:IIS-ASP-CHUNKED
SCAN:CORE:SQL-SERVER-HELLO
SCAN:CORE:SAMBA-TRANS2
SCAN:CORE:TELNETD-LOGIN
SCAN:CORE:MP-IE-ZONE-BYPASS
SCAN:CORE:JPEG-GDI-VGX-EXPLOIT
SCAN:CORE:SAMBA-NTTRANS

SCAN:CYBERCOP

SCAN:CYBERCOP:OS-PROBE-1
SCAN:CYBERCOP:SMTP-EXPN
SCAN:CYBERCOP:OS-PROBE-2
SCAN:CYBERCOP:SMTP-EHLO
SCAN:CYBERCOP:FINGER-REDIR
SCAN:CYBERCOP:FINGER-QUERY
SCAN:CYBERCOP:UDP-BOMB

SCAN:II

SCAN:II:IIS-ISAPI-ENUM
SCAN:II:ISAKMP-FLOOD
SCAN:II:ALLAIRE-CF-OF
SCAN:II:TIQ-WMF-MAL-HEADER

SCAN:ISS

SCAN:ISS:FTP-SCAN

SCAN:METASPLOIT

SCAN:METASPLOIT:LSASS
SCAN:METASPLOIT:VICTIM-PROFILE
SCAN:METASPLOIT:METERPRETER-DLL
SCAN:METASPLOIT:EXECCOMMAND-UAF
SCAN:METASPLOIT:TWIKI-CONF-CMD
SCAN:METASPLOIT:JAVA-APPLET
SCAN:METASPLOIT:APACHE-CHUNK-OF
SCAN:METASPLOIT:SMB-ACTIVE
SCAN:METASPLOIT:JS-HEAPLIB

SCAN:MISC

SCAN:MISC:CAT-ETC-PASSWD-UDP
SCAN:MISC:QUERY
SCAN:MISC:SYN-FIN
SCAN:MISC:IDP-TEST
SCAN:MISC:NULL
SCAN:MISC:SVR-RES-S1024
SCAN:MISC:MSTREAM-CLIENT-REQ
SCAN:MISC:MSTREAM-REP-15104
SCAN:MISC:MSTREAM-REP-12754
SCAN:MISC:USER-LIST
SCAN:MISC:ADMROCKS-TCP
SCAN:MISC:ADMROCKS-UDP
SCAN:MISC:NETCAT-DOEXEC-BO

SCAN:MISC:FTP

SCAN:MISC:FTP:FTP-MKD
SCAN:MISC:FTP:FTP-MKD-DOT
SCAN:MISC:FTP:FREEBSD-FTPD-GLOB
SCAN:MISC:FTP:OPENBSD-X86
SCAN:MISC:FTP:PPC-FS1
SCAN:MISC:FTP:REALPATH-OF1
SCAN:MISC:FTP:BSD-FTPD-MKD-OF
SCAN:MISC:FTP:LOGXFR-OF1
SCAN:MISC:FTP:PATH-LINUX-X86-1
SCAN:MISC:FTP:PATH-LINUX-X86-2
SCAN:MISC:FTP:REALPATH-OF2
SCAN:MISC:FTP:LOGXFR-OF2

SCAN:MISC:HTTP

SCAN:MISC:HTTP:LWGATE-PROBE
SCAN:MISC:HTTP:VTI-BIN-PROBE
SCAN:MISC:HTTP:SNORK-ACCESS
SCAN:MISC:HTTP:CPSHOST-DLL
SCAN:MISC:HTTP:EDIT-DOC-ATTEMPT
SCAN:MISC:HTTP:POSTING-ATTEMPT
SCAN:MISC:HTTP:STORE-ACCESS
SCAN:MISC:HTTP:W2TVARS-PM-PROBE
SCAN:MISC:HTTP:ADMIN
SCAN:MISC:HTTP:DELETE-DOC
SCAN:MISC:HTTP:FILES-ACCESS
SCAN:MISC:HTTP:BIGCONF-ACCESS
SCAN:MISC:HTTP:RESPONDER-ACCESS
SCAN:MISC:HTTP:WEBDRIVER-ACCESS
SCAN:MISC:HTTP:WEB-MAP-ACCESS
SCAN:MISC:HTTP:SEARCH-VTS
SCAN:MISC:HTTP:MINISTATS-ADM
SCAN:MISC:HTTP:WAIS-ACCESS
SCAN:MISC:HTTP:CFGWIZ-EXE-PROBE
SCAN:MISC:HTTP:START-STOP-DOS
SCAN:MISC:HTTP:HTGROUP-ACCESS
SCAN:MISC:HTTP:AXS-ACCESS
SCAN:MISC:HTTP:REQ-HTTP-CONF
SCAN:MISC:HTTP:FLEXFORM-PROBE
SCAN:MISC:HTTP:ENVIRON-CGI
SCAN:MISC:HTTP:FILEMAIL-ACCESS
SCAN:MISC:HTTP:AX-ADMIN-ACCESS
SCAN:MISC:HTTP:WWW-SQL-PROBE
SCAN:MISC:HTTP:ADMADM-EXE-PROBE
SCAN:MISC:HTTP:ADMIN-NSF-ACCESS
SCAN:MISC:HTTP:RWWWSH-ACCESS
SCAN:MISC:HTTP:ADMADM-HTM-PROBE
SCAN:MISC:HTTP:CONT-HTM-PROBE
SCAN:MISC:HTTP:EDIT-ACCESS
SCAN:MISC:HTTP:UPLOAD-PROBE
SCAN:MISC:HTTP:MMSTDOD-PROBE
SCAN:MISC:HTTP:WIN-ARGS-CMD
SCAN:MISC:HTTP:WIN-NC
SCAN:MISC:HTTP:WIN-RCMD
SCAN:MISC:HTTP:WIN-ARGS-BAT
SCAN:MISC:HTTP:SRCH-HTM-PROBE
SCAN:MISC:HTTP:SRCADM-PROBE
SCAN:MISC:HTTP:SITE-IISAMPLES
SCAN:MISC:HTTP:WEBHITS-ACCESS
SCAN:MISC:HTTP:TILDA-ROOT
SCAN:MISC:HTTP:WIN-CD..
SCAN:MISC:HTTP:WIN-TELNET-EXE
SCAN:MISC:HTTP:WEBSITEPRO
SCAN:MISC:HTTP:INTRANET-REQ
SCAN:MISC:HTTP:BACKUP-REQ
SCAN:MISC:HTTP:ACHG-HTR-PROBE
SCAN:MISC:HTTP:EXAMPLEAPP-PRB
SCAN:MISC:HTTP:MSDAC-PROBE
SCAN:MISC:HTTP:README-EML
SCAN:MISC:HTTP:CNF-PROBE
SCAN:MISC:HTTP:MSPROXY-PROBE
SCAN:MISC:HTTP:ADMCGI-EXE-PROBE
SCAN:MISC:HTTP:CSS-PROBE
SCAN:MISC:HTTP:QUERYHIT-ACCESS
SCAN:MISC:HTTP:MEM-BIN-PROBE
SCAN:MISC:HTTP:PERL-PROBE
SCAN:MISC:HTTP:SCRIPTS-BROWSE
SCAN:MISC:HTTP:REPOST-ACCESS
SCAN:MISC:HTTP:CODE-ACCESS
SCAN:MISC:HTTP:SENDFORM-ACCESS
SCAN:MISC:HTTP:WEBTRENDS-PROBE
SCAN:MISC:HTTP:VIOLATION-ACCS
SCAN:MISC:HTTP:SENDMESSAGE
SCAN:MISC:HTTP:DIR-LISTING
SCAN:MISC:HTTP:CYBERCOP-HTTP
SCAN:MISC:HTTP:WIN-PERL
SCAN:MISC:HTTP:NESSUS-HTTP
SCAN:MISC:HTTP:MACHINEINFO
SCAN:MISC:HTTP:TEST-DOT-CGI
SCAN:MISC:HTTP:FORMHANDLER
SCAN:MISC:HTTP:IIS-SAMPLES
SCAN:MISC:HTTP:ALIBABA
SCAN:MISC:HTTP:SERVER-INFO
SCAN:MISC:HTTP:VOIDEYE
SCAN:MISC:HTTP:SEARCH97-VTS
SCAN:MISC:HTTP:QUID-PRO-QUO-LOG
SCAN:MISC:HTTP:ADMIN-FILES
SCAN:MISC:HTTP:DAY5DATA-PROBE
SCAN:MISC:HTTP:HEAD
SCAN:MISC:HTTP:PUT
SCAN:MISC:HTTP:TRACE
SCAN:MISC:HTTP:IPLANET-GETPROP
SCAN:MISC:HTTP:AUTH-ACCESS
SCAN:MISC:HTTP:MAILLIST-PROBE
SCAN:MISC:HTTP:WWWADM-ACCESS
SCAN:MISC:HTTP:CACHEMGR-ACCESS
SCAN:MISC:HTTP:IIS-NEWDSN
SCAN:MISC:HTTP:HTGREP-ACCESS
SCAN:MISC:HTTP:VIEWCODE-ASP
SCAN:MISC:HTTP:WS-FTP-INI-ATMPT
SCAN:MISC:HTTP:FINGER-PROBE
SCAN:MISC:HTTP:SHELL-ACCESS
SCAN:MISC:HTTP:NETCAT-CMD
SCAN:MISC:HTTP:POST-QUERY-PROBE
SCAN:MISC:HTTP:DCFORUM-ACCESS
SCAN:MISC:HTTP:TEST-PROBE
SCAN:MISC:HTTP:TEST-CGI-INFO
SCAN:MISC:HTTP:MAN-SH-PROBE
SCAN:MISC:HTTP:UPLOADER-EXE
SCAN:MISC:HTTP:WIN-WSH
SCAN:MISC:HTTP:CONTEXTADMIN
SCAN:MISC:HTTP:WIN-TFTP-EXE
SCAN:MISC:HTTP:ANNEX-DOS
SCAN:MISC:HTTP:HTW-ACCESS
SCAN:MISC:HTTP:SYNTXCHK-PROBE
SCAN:MISC:HTTP:CFAPPMAN-PROBE
SCAN:MISC:HTTP:MAINFRMST-PROBE
SCAN:MISC:HTTP:WIN-C-SAMPLE
SCAN:MISC:HTTP:WEBCOM-EXE
SCAN:MISC:HTTP:UNIX-BIN-CSH
SCAN:MISC:HTTP:NPH-PUBLISH
SCAN:MISC:HTTP:ARCHITEXT-QUERY
SCAN:MISC:HTTP:SNIPPETS-PROBE
SCAN:MISC:HTTP:SWEDITSERVLET
SCAN:MISC:HTTP:TESTCOUNTER
SCAN:MISC:HTTP:PERLSHOP-PROBE

SCAN:MISC:TELNET

SCAN:MISC:TELNET:TELNET-PORT-21
SCAN:MISC:TELNET:ETC-GROUP
SCAN:MISC:TELNET:CAT-ETC-INETD
SCAN:MISC:TELNET:TELNET-PORT-25
SCAN:MISC:TELNET:SU-ROOT
SCAN:MISC:TELNET:SU-BIN
SCAN:MISC:TELNET:STROBE
SCAN:MISC:TELNET:CISCO
SCAN:MISC:TELNET:SU-WRNG-GRP
SCAN:MISC:TELNET:NC
SCAN:MISC:TELNET:SHUTDOWN
SCAN:MISC:TELNET:VI-ETC-GROUP
SCAN:MISC:TELNET:CD-USR-HIDDEN
SCAN:MISC:TELNET:XHOST
SCAN:MISC:TELNET:MKDIR
SCAN:MISC:TELNET:VI-ETC-PASSWD
SCAN:MISC:TELNET:CD-VAR-HIDDEN
SCAN:MISC:TELNET:ID
SCAN:MISC:TELNET:REBOOT
SCAN:MISC:TELNET:APPEND-PASSWD
SCAN:MISC:TELNET:CD-BIN-HIDDEN
SCAN:MISC:TELNET:APPEND-RHOSTS
SCAN:MISC:TELNET:CAT-ETC-PASSWD
SCAN:MISC:TELNET:CD-DOT-DOT-DOT
SCAN:MISC:TELNET:NMAP
SCAN:MISC:TELNET:TELNET-PORT-80
SCAN:MISC:TELNET:XHOST-PLUS

SCAN:NESSUS

SCAN:NESSUS:SMB-SCAN
SCAN:NESSUS:ISS-DIR-LISTING
SCAN:NESSUS:SMTP-SCAN
SCAN:NESSUS:DNS-SCAN
SCAN:NESSUS:SSH
SCAN:NESSUS:TFTP-SCAN
SCAN:NESSUS:HTTP-USER-AGENT
SCAN:NESSUS:NPH-PUBLISH-CGI
SCAN:NESSUS:GLOBAL-ASA
SCAN:NESSUS:COUNT-CGI

SCAN:NETECT

SCAN:NETECT:SMTP

SCAN:NEXPOSE

SCAN:NEXPOSE:SNMP-PROBE
SCAN:NEXPOSE:TFTP-PROBE
SCAN:NEXPOSE:SQLD-PROBE

SCAN:NIKTO

SCAN:NIKTO:USER-AGENT
SCAN:NIKTO:URL

SCAN:NMAP

SCAN:NMAP:XMAS
SCAN:NMAP:FINGERPRINT
SCAN:NMAP:NMAP-UDP-1
SCAN:NMAP:NSE-HTTP-UA

SCAN:PISS

SCAN:PISS:FTP-SCAN

SCAN:RETINA

SCAN:RETINA:FTP

SCAN:RPVS

SCAN:RPVS:XSS-URL

SCAN:RVSCAN

SCAN:RVSCAN:FTP

SCAN:SAINT

SCAN:SAINT:FTP-SCAN

SCAN:SATAN

SCAN:SATAN:FTP-SCAN

SCAN:SENTINEL

SCAN:SENTINEL:TELNET-SPOOF

SCAN:SSH-RESEARCH

SCAN:SSH-RESEARCH:ACTIVITY

SCAN:WEBTRENDS

SCAN:WEBTRENDS:UDP-PROBE

SCAN:XPROBE

SCAN:XPROBE:XPROBE-BADCODE

SCREENOS

SCREENOS:IDS_ICMP_ADDR_MSK_REQ
SCREENOS:IDS_ICMP_TIME_EXCEED
SCREENOS:IDS_TCP_NO_FLAG
SCREENOS:IDS_ICMP_INFO_REQUEST
SCREENOS:IDS_IP_OPT_RECORD
SCREENOS:IDS_ICMP_TS_REPLY
SCREENOS:IDS_IP_OPT_LSR
SCREENOS:UDP_FLOOD
SCREENOS:MULTI_AUTH_FAIL
SCREENOS:IDS_IP_OPT_TIMESTAMP
SCREENOS:IDS_IP_OPT_SCHT
SCREENOS:IDS_ICMP_INFO_REPLY
SCREENOS:IDS_ICMP_ADDR_MSK_REP
SCREENOS:IDS_COMPONENT
SCREENOS:CONNECT_CMS_PORT
SCREENOS:DENY_POLICY
SCREENOS:IP_SOURCE_ROUTE
SCREENOS:IDS_ICMP_REDIRECT
SCREENOS:IDS_IP_OPT_SSR
SCREENOS:IDS_ICMP_ECHO_REQUEST
SCREENOS:CONNECT_SME_PORT
SCREENOS:IDS_ICMP_SRC_QUENCH
SCREENOS:IDS_ICMP_ECHO_REPLY
SCREENOS:IDS_IP_OPT_STREAM
SCREENOS:IDS_ICMP_HOST_UNREACH
SCREENOS:IDS_IP_UNKNOWN_PROT
SCREENOS:IDS_SYN_FRAG
SCREENOS:IDS_ICMP_FRAGMENT
SCREENOS:IDS_IP_BLOCK_FRAG
SCREENOS:IDS_TCP_FIN_NO_ACK
SCREENOS:IDS_ICMP_TS_REQUEST
SCREENOS:IDS_ICMP_PARA_PROB

SHELLCODE

SHELLCODE:PREPENDENCODER-HTTP-1
SHELLCODE:PREPENDENCODER-HTTP
SHELLCODE:HEX-ASCII-HEAPS-CHAR
SHELLCODE:PREPENDENCODER-TCP

SHELLCODE:ACTIVE

SHELLCODE:ACTIVE:DECODER2-80-CL
SHELLCODE:ACTIVE:DECODER3-80-CL
SHELLCODE:ACTIVE:DCDR-1-UDP-CTS
SHELLCODE:ACTIVE:BIND-1-HTTP-CL
SHELLCODE:ACTIVE:REVERSE-80-CTS
SHELLCODE:ACTIVE:REVERSE-80-STC
SHELLCODE:ACTIVE:DCDR-1-TCP-STC
SHELLCODE:ACTIVE:JS-ESCAPE
SHELLCODE:ACTIVE:BIND-1-TCP-CTS
SHELLCODE:ACTIVE:BIND-1-SMB-STC
SHELLCODE:ACTIVE:BIND-1-TCP-STC
SHELLCODE:ACTIVE:DECODER2-80-SV
SHELLCODE:ACTIVE:REVERSE-1-SMB
SHELLCODE:ACTIVE:DECODER1-80-CL
SHELLCODE:ACTIVE:DECODER3-80-SV
SHELLCODE:ACTIVE:BIND-1-SMB-CTS
SHELLCODE:ACTIVE:DCDR-1-UDP-STC
SHELLCODE:ACTIVE:REVERSE-1-TCP
SHELLCODE:ACTIVE:RVRS-1-UDP-CLT
SHELLCODE:ACTIVE:DCDR-2-TCP-STC
SHELLCODE:ACTIVE:BIND-1-UDP-CTS
SHELLCODE:ACTIVE:DCDR-2-TCP-CTS
SHELLCODE:ACTIVE:DCDR-3-TCP-CTS
SHELLCODE:ACTIVE:DCDR-3-UDP-CTS
SHELLCODE:ACTIVE:DCDR-2-UDP-CTS
SHELLCODE:ACTIVE:DECODER1-80-SV
SHELLCODE:ACTIVE:BIND-1-HTTP-SR
SHELLCODE:ACTIVE:BIND-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-3-TCP-STC
SHELLCODE:ACTIVE:DCDR-2-UDP-STC
SHELLCODE:ACTIVE:RVRS-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-3-UDP-STC
SHELLCODE:ACTIVE:JS-UNESCAPE
SHELLCODE:ACTIVE:DCDR-1-TCP-CTS

SHELLCODE:BSDX86

SHELLCODE:BSDX86:SHELL-2-HTTP
SHELLCODE:BSDX86:SHELL-1-HTTP

SHELLCODE:JS

SHELLCODE:JS:MAL-ABOUT
SHELLCODE:JS:ACTIVEX-OBFUS
SHELLCODE:JS:FROMCHARCODE
SHELLCODE:JS:ASCII-HEX
SHELLCODE:JS:UNICODE-ENC
SHELLCODE:JS:MAL-UNESCAPE
SHELLCODE:JS:HEX-ESCAPE
SHELLCODE:JS:AVOID-UTF8-TOLOWER
SHELLCODE:JS:ALPHA-UPPER
SHELLCODE:JS:JSOBFU-NEW
SHELLCODE:JS:OBFUSCATION

SHELLCODE:LINUX

SHELLCODE:LINUX:CHMDSDW-HTTP
SHELLCODE:LINUX:IPTABLES
SHELLCODE:LINUX:SYSKILL
SHELLCODE:LINUX:SSH-PORTFWD
SHELLCODE:LINUX:REBOOT
SHELLCODE:LINUX:ARMLE-STGR-80C
SHELLCODE:LINUX:ARMLE-STGR-80S
SHELLCODE:LINUX:CHMOD-ROOT-RWX
SHELLCODE:LINUX:IPTABLES-H
SHELLCODE:LINUX:UNLINK
SHELLCODE:LINUX:CHMOD-SHADOW
SHELLCODE:LINUX:UNLINK-HTTP
SHELLCODE:LINUX:ARMLE-STAGER

SHELLCODE:MIPS

SHELLCODE:MIPS:BE-BYTEXORI-80C
SHELLCODE:MIPS:LE-LONGXOR-80C
SHELLCODE:MIPS:BE-BYTEXORI-CTS
SHELLCODE:MIPS:LE-BYTEXORI-CTS
SHELLCODE:MIPS:LE-LONGXOR-CTS
SHELLCODE:MIPS:BE-LONGXOR-80C
SHELLCODE:MIPS:BE-LONGXOR-CTS
SHELLCODE:MIPS:LE-LONGXOR-STC
SHELLCODE:MIPS:LE-BYTEXORI-STC
SHELLCODE:MIPS:BE-LONGXOR-STC
SHELLCODE:MIPS:BE-BYTEXORI-STC
SHELLCODE:MIPS:LE-BYTEXORI-80C
SHELLCODE:MIPS:BE-LONGXOR-80S
SHELLCODE:MIPS:LE-BYTEXORI-80S
SHELLCODE:MIPS:BE-BYTEXORI-80S
SHELLCODE:MIPS:LE-LONGXOR-80S

SHELLCODE:MSF

SHELLCODE:MSF:FTENV-SMB2
SHELLCODE:MSF:PEXALPHANUM-CTS-1
SHELLCODE:MSF:DCX86-80S
SHELLCODE:MSF:JAVA-APP
SHELLCODE:MSF:GREENDAM
SHELLCODE:MSF:DCX86-UDP1
SHELLCODE:MSF:PROPSPRAY
SHELLCODE:MSF:DCX86-STC
SHELLCODE:MSF:DCX86-CTS
SHELLCODE:MSF:GEN-FTP
SHELLCODE:MSF:DCX86-UDP2
SHELLCODE:MSF:DCX86-80C
SHELLCODE:MSF:PEXALPHANUM-CTS
SHELLCODE:MSF:PEXCALL-CTS
SHELLCODE:MSF:PEXALPHANUM-STC
SHELLCODE:MSF:JAVA-JAR
SHELLCODE:MSF:PEXCALL-STC
SHELLCODE:MSF:ALPHA2-GETEIP-CTS
SHELLCODE:MSF:ALPHA2-GETEIP-STC
SHELLCODE:MSF:FTENV-SMB1

SHELLCODE:OSX

SHELLCODE:OSX:ARMLE-STAGER

SHELLCODE:PHP

SHELLCODE:PHP:SHELL-URI
SHELLCODE:PHP:BASE64-80C
SHELLCODE:PHP:BASE64-CTS
SHELLCODE:PHP:BASE64-80S
SHELLCODE:PHP:BASE64-STC
SHELLCODE:PHP:REVERSE-SHELL

SHELLCODE:PPC

SHELLCODE:PPC:LIN-GNRC-STGR-80C
SHELLCODE:PPC:LINUX-GNRC-STAGER
SHELLCODE:PPC:OSX-STAGER
SHELLCODE:PPC:LIN-GNRC-STGR-80S
SHELLCODE:PPC:AIX-STAGER
SHELLCODE:PPC:LONGXOR-CTS
SHELLCODE:PPC:LONGXOR-80C
SHELLCODE:PPC:LONGXOR-TAG-80C
SHELLCODE:PPC:LONGXOR-TAG-CTS
SHELLCODE:PPC:LONGXOR-TAG-STC
SHELLCODE:PPC:LONGXOR-TAG-80S
SHELLCODE:PPC:LONGXOR-STC
SHELLCODE:PPC:LONGXOR-80S

SHELLCODE:SPARC

SHELLCODE:SPARC:BIN-KSH
SHELLCODE:SPARC:WRITE-EXIT
SHELLCODE:SPARC:BSD-REVERSE-TCP
SHELLCODE:SPARC:BSD-BIND-TCP
SHELLCODE:SPARC:SOLARIS-STAGER
SHELLCODE:SPARC:LONGXORTAG-CTS
SHELLCODE:SPARC:LONGXORTAG-80C
SHELLCODE:SPARC:LONGXORTAG-80S
SHELLCODE:SPARC:LONGXORTAG-STC

SHELLCODE:WIN

SHELLCODE:WIN:SHELL-PROMPT
SHELLCODE:WIN:SHIKATAGANAI-21C
SHELLCODE:WIN:SHIKATA-GANAI-STC
SHELLCODE:WIN:PARTITION-FMT
SHELLCODE:WIN:7-SHUTDOWN
SHELLCODE:WIN:7-TASKMGR
SHELLCODE:WIN:SHIKATA-GANAI-CTS
SHELLCODE:WIN:SHIKATAGANAI-HTTP
SHELLCODE:WIN:SMB-REM-EXEC2
SHELLCODE:WIN:SHIKATAGANAI-80C
SHELLCODE:WIN:7-EXPTERM
SHELLCODE:WIN:SMB-REM-EXEC1
SHELLCODE:WIN:SHIKATAGANAI-80S

SHELLCODE:X64

SHELLCODE:X64:WIN-STAGER
SHELLCODE:X64:LIN-SHEL-BIND-80C
SHELLCODE:X64:LINUX-SHELL-BIND
SHELLCODE:X64:LINUX-REVERSE-80C
SHELLCODE:X64:LINUX-FIND-PORT
SHELLCODE:X64:LIN-SHEL-BIND-80S
SHELLCODE:X64:LINUX-REVERSE-80S
SHELLCODE:X64:LINUX-REVERSE-TCP
SHELLCODE:X64:WIN-STAGER-80C
SHELLCODE:X64:OSX-STAGER
SHELLCODE:X64:WIN-STAGER-80S
SHELLCODE:X64:XOR-80C
SHELLCODE:X64:XOR-CTS
SHELLCODE:X64:XOR-STC
SHELLCODE:X64:XOR-80S

SHELLCODE:X86

SHELLCODE:X86:NONALPHAUPPER-STC
SHELLCODE:X86:WIN-FIND-TAG-80S
SHELLCODE:X86:JMPCALLADTIVE-80C
SHELLCODE:X86:FNSTENV-CTS
SHELLCODE:X86:LINUX-BIND-80C
SHELLCODE:X86:X86-NOOP1-80S
SHELLCODE:X86:FNSTENV-80C
SHELLCODE:X86:X86-NOOP1-80C
SHELLCODE:X86:X90-NOOP-HTTP-HDR
SHELLCODE:X86:LIN-SHELL-REV-80S
SHELLCODE:X86:BUFFER-SHELL
SHELLCODE:X86:FNSTENV-80C-1
SHELLCODE:X86:ALPHA-GETEIP-80S3
SHELLCODE:X86:X90-NOOP-STC
SHELLCODE:X86:WIN-SHELL-XPFW
SHELLCODE:X86:WIN-NONX-TCP
SHELLCODE:X86:WIN-STAGER
SHELLCODE:X86:ALPHA-MIXED-80C
SHELLCODE:X86:WIN-SPEAK-PWNED
SHELLCODE:X86:WIN-REV-ORD-TCP
SHELLCODE:X86:LIN-REV-NONX-80C
SHELLCODE:X86:LINUX-FIND-TAG
SHELLCODE:X86:ALPHA-MIXED-CTS
SHELLCODE:X86:ALPHA-GETEIP-80S1
SHELLCODE:X86:UNESCAPE-ENC
SHELLCODE:X86:UNESCAPE-ENC1
SHELLCODE:X86:LINUX-REV-IPV6
SHELLCODE:X86:LIN-REV-IPV6-80C
SHELLCODE:X86:LIN-BIND-NONX-80C
SHELLCODE:X86:WIN-SPEAK-PWN-80C
SHELLCODE:X86:LINUX-REV-NONX
SHELLCODE:X86:LINUX-REVERSE-TCP
SHELLCODE:X86:WIN-BIND-IPV6-80C
SHELLCODE:X86:PIECEMEAL1
SHELLCODE:X86:PIECEMEAL
SHELLCODE:X86:LIN-BIND-NONX-80S
SHELLCODE:X86:WIN-SPEAK-PWN-80S
SHELLCODE:X86:LIN-REV-IPV6-80S
SHELLCODE:X86:LIN-REV-NONX-80S
SHELLCODE:X86:LINUX-BIND-NONX
SHELLCODE:X86:WIN-REV-ORD-80S
SHELLCODE:X86:WIN-NONX-TCP-80S
SHELLCODE:X86:LINUX-BIND-IPV6
SHELLCODE:X86:WIN-STAGER-80C
SHELLCODE:X86:SGI-NOOP
SHELLCODE:X86:BIN-SH-TRANSFER
SHELLCODE:X86:METERPRET-ESPIA1
SHELLCODE:X86:METERPRET-ESPIA2
SHELLCODE:X86:METERPRETER-ESPIA
SHELLCODE:X86:KADMIND-BOF
SHELLCODE:X86:SPARC-NOOP
SHELLCODE:X86:BLOXOR-80S
SHELLCODE:X86:LINUX-FND-PRT-80C
SHELLCODE:X86:LINUX-FND-TAG-80C
SHELLCODE:X86:LIN-SHELL-REV-80C
SHELLCODE:X86:LINUX-SHELL-REV
SHELLCODE:X86:X86-NOOP1-STC
SHELLCODE:X86:LINUX-FND-TAG-80S
SHELLCODE:X86:LINUX-BIND-80S
SHELLCODE:X86:LINUX-FIND-PORT
SHELLCODE:X86:BSD-BIND-IPV6-TCP
SHELLCODE:X86:BSD-REV-IPV6
SHELLCODE:X86:BSD-BIND-TCP
SHELLCODE:X86:BSD-FIND-PORT
SHELLCODE:X86:WIN-NONX-TCP-80C
SHELLCODE:X86:WIN-STAGER-80S
SHELLCODE:X86:BSD-EXEC
SHELLCODE:X86:BSD-FIND-TAG
SHELLCODE:X86:BSD-REVERSE-TCP
SHELLCODE:X86:FNSTENV-80S
SHELLCODE:X86:FNSTENV-STC
SHELLCODE:X86:WIN-FIND-TAG
SHELLCODE:X86:OSX-REVERSE-TCP
SHELLCODE:X86:OSX-FIND-PORT
SHELLCODE:X86:OSX-BIND-TCP
SHELLCODE:X86:SOLARIS-STAGER
SHELLCODE:X86:WIN-FIND-TAG-80C
SHELLCODE:X86:ALPHA-GETEIP-80S4
SHELLCODE:X86:ALPHA-GETEIP-80S5
SHELLCODE:X86:UNICODE-MIXED-CTS
SHELLCODE:X86:BLOXOR-80C
SHELLCODE:X86:WIN-REV-ORD-80C
SHELLCODE:X86:ALPHA-GETEIP-80S6
SHELLCODE:X86:WIN-SHLL-XPFW-80S
SHELLCODE:X86:ALPHA-GETEIP-80S2
SHELLCODE:X86:LINUX-BIND-TCP
SHELLCODE:X86:BSDI-STAGER
SHELLCODE:X86:NONALPHAUPPER-80C
SHELLCODE:X86:BLOXOR-TCP-CTS
SHELLCODE:X86:COUNTDOWN-80C
SHELLCODE:X86:COUNTDOWN-CTS
SHELLCODE:X86:UNICODE-MIXED-80C
SHELLCODE:X86:ADD-SUB-80C
SHELLCODE:X86:ADD-SUB-CTS
SHELLCODE:X86:ALPHA-UPPER-80S
SHELLCODE:X86:UNICODE-MIXED-80S
SHELLCODE:X86:CONTEXT-TIME-80C
SHELLCODE:X86:CONTEXT-STAT-80C
SHELLCODE:X86:CONTEXT-TIME-CTS
SHELLCODE:X86:CONTEXT-STAT-CTS
SHELLCODE:X86:SINGLSTATICBT-CTS
SHELLCODE:X86:JMPCALLADTIVE-CTS
SHELLCODE:X86:CONTEXT-CPUID-CTS
SHELLCODE:X86:CONTEXT-CPUID-80C
SHELLCODE:X86:SINGLSTATCBIT-80C
SHELLCODE:X86:UNICODE-UPPER-80C
SHELLCODE:X86:NONALPHAUPPER-CTS
SHELLCODE:X86:LINUX-FND-PRT-80S
SHELLCODE:X86:LIN-BIND-IPV6-80C
SHELLCODE:X86:ALPHA-UPPER-CTS
SHELLCODE:X86:COUNTDOWN-80S
SHELLCODE:X86:LIN-BIND-IPV6-80S
SHELLCODE:X86:AVD-UTF8-LWR-80S
SHELLCODE:X86:ALPHA-UPPER-STC
SHELLCODE:X86:AVD-UTF8TLWR-CTS
SHELLCODE:X86:ALPHA-MIXED-80S
SHELLCODE:X86:ALPHA-UPPER-80C
SHELLCODE:X86:AVD-UTF8TLWR-STC
SHELLCODE:X86:ALPHA-MIXED-STC
SHELLCODE:X86:UNICODE-MIXED-STC
SHELLCODE:X86:COUNTDOWN-STC
SHELLCODE:X86:CONTEXT-STAT-80S
SHELLCODE:X86:SINGLSTATCBIT-80S
SHELLCODE:X86:UNICODE-UPPER-CTS
SHELLCODE:X86:ADD-SUB-STC
SHELLCODE:X86:CONTEXT-CPUID-80S
SHELLCODE:X86:CONTEXT-CPUID-STC
SHELLCODE:X86:ADD-SUB-80S
SHELLCODE:X86:JMPCALLADTIVE-STC
SHELLCODE:X86:UNICODE-UPPER-80S
SHELLCODE:X86:UNICODE-UPPER-STC
SHELLCODE:X86:CONTEXT-TIME-STC
SHELLCODE:X86:SINGLSTATCBIT-STC
SHELLCODE:X86:CONTEXT-TIME-80S
SHELLCODE:X86:CONTEXT-STAT-STC
SHELLCODE:X86:FNSTENV-STC-1
SHELLCODE:X86:NONALPHAUPPER-80S
SHELLCODE:X86:DWORD-ADITIVE-80S
SHELLCODE:X86:GETEIP-XOR-80S
SHELLCODE:X86:FNSTENV-CTS-1
SHELLCODE:X86:UDP-ENCODER
SHELLCODE:X86:GETEIP-XOR-80C
SHELLCODE:X86:DWORD-ADITIVE-STC
SHELLCODE:X86:XOR-DWORD-CTS
SHELLCODE:X86:PEXALPHANUM-80S
SHELLCODE:X86:XOR-DWORD-STC
SHELLCODE:X86:FNSTENV-80S-1
SHELLCODE:X86:XOR-DWORD-80C
SHELLCODE:X86:DWORD-ADITIVE-CTS
SHELLCODE:X86:XOR-DWORD-80S
SHELLCODE:X86:GETEIP-XOR-STC
SHELLCODE:X86:DWORD-ADITIVE-80C
SHELLCODE:X86:BLOXOR-TCP-STC
SHELLCODE:X86:BASE64-NOOP-STC
SHELLCODE:X86:FLDZ-GET-EIP-STC
SHELLCODE:X86:FLDZ-GET-EIP-CTS
SHELLCODE:X86:FLDZ-GET-EIP-80S
SHELLCODE:X86:BASE64-NOOP-80C
SHELLCODE:X86:BASE64-NOOP-CTS
SHELLCODE:X86:REVERS-CONECT-CTS
SHELLCODE:X86:FLDZ-GET-EIP-80C
SHELLCODE:X86:BASE64-NOOP-80S
SHELLCODE:X86:ALPHA2-GETEIP-80C
SHELLCODE:X86:REVERS-CONECT-80S
SHELLCODE:X86:REVERS-CONECT-STC
SHELLCODE:X86:WIN2K-2K3-CTS
SHELLCODE:X86:WIN32-ENUM-80S
SHELLCODE:X86:REVERS-CONECT-80C
SHELLCODE:X86:PEXALPHANUM-80C
SHELLCODE:X86:GETEIP-XOR-CTS
SHELLCODE:X86:AVD-UTF8-LWR-80C
SHELLCODE:X86:JMPCALLADTIVE-80S
SHELLCODE:X86:PEXCALL-80C
SHELLCODE:X86:PEXCALL-80S
SHELLCODE:X86:ALPHA2-GETEIP-80S
SHELLCODE:X86:WIN32-ENUM-80C
SHELLCODE:X86:WIN32-ENUM-CTS
SHELLCODE:X86:WIN32-ENUM-STC
SHELLCODE:X86:MSF-X86-ADD-SUB
SHELLCODE:X86:METASPLOIT-X86-EN
SHELLCODE:X86:ALPHA2-GETEIP-ENC
SHELLCODE:X86:LINUX-BIND-MSF
SHELLCODE:X86:ALPHA-GETEIP-80S7
SHELLCODE:X86:X86-NOOP1-CTS
SHELLCODE:X86:X90-NOOP-HTTP-REQ
SHELLCODE:X86:X90-NOOP-CTS

SMB

SMB:REFLECTION
SMB:DUPLICATE-SESSION
SMB:NTLM-LOGIN-FAILED
SMB:CONNECT-FROM-LOCALHOST
SMB:WINS-SNAME-REG
SMB:NETDDE-SHARE-OF
SMB:TRANS2ROOT-OF
SMB:MAL-WIN-BRIEFCASE
SMB:XTIERRPCPIPE
SMB:WIN-BROWSER-SERVICE-DOS
SMB:MS-RAP-HEAP-OV
SMB:SMB20-NEG-DOS
SMB:FRAG-EXP-CODE
SMB:MS-ELS-LIB-LOAD
SMB:SEARCH-OF
SMB:SERVER-SVC-OF
SMB:MS-WIN-2000-LANMAN-DOS
SMB:DOUBLE-NEGO-RESP
SMB:MS-IE-IESHIMS-DLL-CE
SMB:CLIENT-POOL-CORR
SMB:MS-WIN-VISTA-SP0-SMB-DOS
SMB:CLIENT-MESSAGE-OF
SMB:HTTP-PAYLOAD
SMB:FRAG-MALICIOUS-PAYLOAD
SMB:MSSQL-DECLARE-EXEC
SMB:SMB-COPY-OF
SMB:DCE-RPC-FRAG-MAL-PAYLOAD
SMB:DCE-RPC-FRAG-EXP-PAYLOAD
SMB:ORACLE-JRE-INSECURE-LOAD
SMB:REPLY-ENCRYPTION-KEYS
SMB:MS-WIN-SMB-PARS-MC
SMB:SAMBA-SID-PARS-BO-1
SMB:MS-WIN-SMB-PATH-BO
SMB:NTLM-LOW-ENTROPY
SMB:TRANS2ROOT-OF-2
SMB:SAMBA-SMB-PKT-PARS-BO
SMB:USER-CMD-INJ
SMB:TIMBUKTU-PLUGHNT-COMMAND
SMB:MICROSOFT-LIB-LOADING-CE
SMB:CORE-DLL-REQ-VIA-SMB
SMB:MS-TELNET-INSECURE-LOADING
SMB:PNG-CHUNK-OF
SMB:INTERNET-PRINT-SVC-INT-OF
SMB:SAMBA-UNICODE-FLAGS2-DOS
SMB:OLEAUT32-WMF
SMB:SMB-SRV-NAME-DOS
SMB:MAILSLOT-OF
SMB:MS-RAP-STACK-OV
SMB:MS-WINDOWS-FILE-RCE
SMB:TRANSACTION-RESPONSE-OF
SMB:MS-RAP-DOS
SMB:VISIO-MFC71XXX-DLL-HIJACK
SMB:WIN-BRIEFCASE-RCE
SMB:MS-WIN-2000-LANMAN-UDP-DOS

SMB:AUDIT

SMB:AUDIT:NULL-ACCOUNT
SMB:AUDIT:LONG-ACCOUNT
SMB:AUDIT:UNK-CMD
SMB:AUDIT:EXT-SEC-DISABLED
SMB:AUDIT:NULL-DOMAIN
SMB:AUDIT:EXP-NEG
SMB:AUDIT:UNEXP-REP
SMB:AUDIT:NULL-NVE-OS
SMB:AUDIT:NT-LM-0.12
SMB:AUDIT:UNEXP-REQ
SMB:AUDIT:NULL-NVE-LM
SMB:AUDIT:INV-PROTOCOL
SMB:AUDIT:UNK-DIALECT
SMB:AUDIT:DCERPC-UNEXPECTED-RSP
SMB:AUDIT:UNK-SHDR-TYPE
SMB:AUDIT:OLD-VERSION
SMB:AUDIT:BRUTE-LOGIN

SMB:ENUM

SMB:ENUM:NAME-LOOKUP
SMB:ENUM:NETSESSION

SMB:ERROR

SMB:ERROR:MAL-MSG
SMB:ERROR:GRIND
SMB:ERROR:INV-MSG-LEN
SMB:ERROR:MULTI-HEADERS

SMB:EXPLOIT

SMB:EXPLOIT:REGISTRY-DOS
SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW
SMB:EXPLOIT:WINBLAST-DOS
SMB:EXPLOIT:NULL-PATH
SMB:EXPLOIT:NULL-SERVICE
SMB:EXPLOIT:NULL-FILENAME
SMB:EXPLOIT:LANMAN-NUKE
SMB:EXPLOIT:TRANS2-MDL-CHUNK
SMB:EXPLOIT:MSCOREDLL-LOAD
SMB:EXPLOIT:FOLDER-COM-EXEC
SMB:EXPLOIT:LINUX-TRANS2-OF
SMB:EXPLOIT:LLS-NAME
SMB:EXPLOIT:SRV-RENAME-CE
SMB:EXPLOIT:SMB-MULTI-DOS2
SMB:EXPLOIT:SMB-MULTI-DOS
SMB:EXPLOIT:MAL-JPEG-DL
SMB:EXPLOIT:DOT-JOB
SMB:EXPLOIT:MEDIAC-MCL-RCE
SMB:EXPLOIT:PRINT-SPOOL-BYPASS
SMB:EXPLOIT:MS-2015-0096-CE
SMB:EXPLOIT:SMB1-CHAINING-MC
SMB:EXPLOIT:SMB2-ZERO-LEN-WRT
SMB:EXPLOIT:MPLAYER-SAMI
SMB:EXPLOIT:FLASH-CHROME-BREAK
SMB:EXPLOIT:SAMBA-DIR-TRAV
SMB:EXPLOIT:ISS-ACCOUNTNAME-OF
SMB:EXPLOIT:WILD-FILE-DOS
SMB:EXPLOIT:GREENAPPLE-2
SMB:EXPLOIT:GREENAPPLE
SMB:EXPLOIT:SMB-MULTI-DOS-1
SMB:EXPLOIT:CVE-2015-0240-RCE
SMB:EXPLOIT:SMBDIE

SMB:EXT

SMB:EXT:DOT-ZIP

SMB:FILE

SMB:FILE:MS-WIN-ILL
SMB:FILE:EICAR-COPY
SMB:FILE:NAME-INV-CHARS
SMB:FILE:AUTORUN.INF-COPY
SMB:FILE:MS-INSECUR-LIB-LOAD
SMB:FILE:MS-OBJ-PACKAGER
SMB:FILE:WEB-VIEW-DOC-SCR-INJ
SMB:FILE:CRAFTED-NAME-RCE
SMB:FILE:SANDWORM-RCE
SMB:FILE:DLL-TRANSFER
SMB:FILE:WIRESHARK-INSECUREPATH

SMB:INFO

SMB:INFO:PCLAN-1.0
SMB:INFO:LANMAN-1.0
SMB:INFO:XENIX-CORE
SMB:INFO:MSNET-1.03
SMB:INFO:WFWGRP-3.1A
SMB:INFO:NEG-FAILED
SMB:INFO:LANMAN-2.1
SMB:INFO:LANMAN-1.2X002
SMB:INFO:NULL-GSS-TOKEN
SMB:INFO:DOT-EXE-FILE-XFER

SMB:NETBIOS

SMB:NETBIOS:INV-CGNAME-LEN
SMB:NETBIOS:INV-SNAME-LEN
SMB:NETBIOS:INV-CGNAME-ENC
SMB:NETBIOS:INV-CDNAME-ENC
SMB:NETBIOS:INV-CDNAME-LEN
SMB:NETBIOS:UNK-SHDR-FLAGS
SMB:NETBIOS:INV-SHDR-LEN
SMB:NETBIOS:SHARE-LVL-SEC
SMB:NETBIOS:RMT-REG-ACCESS
SMB:NETBIOS:NOVELL-TRAN-REQ-DOS
SMB:NETBIOS:WIN7-KERNEL-DOS
SMB:NETBIOS:GETPRINTERDATA-DOS
SMB:NETBIOS:WIN-RPC-UPNP-DOS
SMB:NETBIOS:RRAS-MEM-CORRUPTION

SMB:OF

SMB:OF:ACCOUNT-NAME-OVERFLOW
SMB:OF:DIALECT-INDEX-OVERFLOW
SMB:OF:SECUR-TOKEN-OVERFLOW
SMB:OF:PNP-OF
SMB:OF:SPOOL-SVC-OF
SMB:OF:NETCONMGR-DOS
SMB:OF:NETWARE-CLIENT-RPC
SMB:OF:RPC-PNP-OF
SMB:OF:SMB2-WRITE-OFFSET
SMB:OF:CREATE-NEG-EOF
SMB:OF:DFS-RESP
SMB:OF:TAPI-SVC-OF
SMB:OF:SMB-INVALID-BUFFER
SMB:OF:SMB2-DOS-2
SMB:OF:INVALID-DATACOUNT
SMB:OF:MS-SMB2-RES-DOS
SMB:OF:NWCW-INV-CALL
SMB:OF:MAL-QFILEPATHINFO
SMB:OF:MANGLING-FILE-OF
SMB:OF:RECV-RAW-BO
SMB:OF:LINUX-KERNEL-INT-OF
SMB:OF:RECV-RAW
SMB:OF:SMB-IPC-OF
SMB:OF:WKSSVC-CALL
SMB:OF:CVE-2009-3676-DOS
SMB:OF:MS-BROWSER-ELECT

SMB:SAMBA

SMB:SAMBA:ROOT-SYS
SMB:SAMBA:READ-NTTRANS-EA-LIST
SMB:SAMBA:NMBD-BO
SMB:SAMBA:NTRANS-RPLY
SMB:SAMBA:SETINFOPOLICY-HEAP
SMB:SAMBA:SWAT-AUTH-DOS
SMB:SAMBA:IDL-PARSE-OOB
SMB:SAMBA:SYMLINK-INFODISC
SMB:SAMBA:SMBD-ANDX-INFINITE
SMB:SAMBA:DFSENUM-OF
SMB:SAMBA:NETDFS-OF
SMB:SAMBA:SPOOLSS-NOTIFY
SMB:SAMBA:SID-QUOTA
SMB:SAMBA:LSALOOKUPSIDS

SMB:TOOLS

SMB:TOOLS:PSEXEC

SMTP

SMTP:SPAM-ADDRESS-EVASION
SMTP:AUTO-SPAM
SMTP:RCPT-CMD-INJ
SMTP:MSSQL-WORM-EMAIL
SMTP:SYM-NESTED-ZIP
SMTP:BANNER-CAPTURE
SMTP:INVALID-HELO
SMTP:SAGTUBE-DOS
SMTP:MULTIPLE-HYD-BOF
SMTP:SPAM-ASSN-INJ
SMTP:RESP-SPOOF2
SMTP:SPAMASS-DOS
SMTP:IPSWITCH-REPLY-TO-OF
SMTP:FFSMOUNTFS-BOF
SMTP:MS-OUTLOOK-EMAIL-RCE-1
SMTP:URL-LOC
SMTP:MS-WIN-SMTP-DOS
SMTP:SPAMASSASS-LM-DOS
SMTP:SMTP-URI-INJ
SMTP:FROM-FIELD-FS
SMTP:IBM-LOTUS-INT-OVERFLOW
SMTP:NOVELL-GROUPWISE-BO
SMTP:SHELLSHOCK
SMTP:MERCMAIL-AUTH-OF
SMTP:HTML-VAL-XSS
SMTP:IBM-LOTUS-NOTES-XSS
SMTP:WP5-EMAIL
SMTP:SQWEBMAIL-EMAIL-HEADER-INJ
SMTP:MS-XLS-BIFF-REC-RCE
SMTP:REALPLAYER-WAV-BO

SMTP:AUDIT

SMTP:AUDIT:REP-NESTED-REPLY
SMTP:AUDIT:COMMAND-FAILED
SMTP:AUDIT:REQ-MISSING-HELLO
SMTP:AUDIT:REP-INVALID-REPLY
SMTP:AUDIT:REQ-NESTED-REQUEST
SMTP:AUDIT:MISSING-MAIL-FROM
SMTP:AUDIT:REQ-INVALID-CMD-SEQ
SMTP:AUDIT:REQ-UNKNOWN-CMD
SMTP:AUDIT:EXTERNAL-MESG
SMTP:AUDIT:DUPLICATE-HEADER
SMTP:AUDIT:EMPTY-BOUNDARY
SMTP:AUDIT:ENCODE
SMTP:AUDIT:REQ-MISSING-RCPT-TO
SMTP:AUDIT:ENCODE-MIME-TYPE
SMTP:AUDIT:REQ-HDR-FLD-UNKNOWN
SMTP:AUDIT:INVALID-FILENAME
SMTP:AUDIT:REQ-BINARY-DATA
SMTP:AUDIT:REQ-BIN-DATA-3
SMTP:AUDIT:HIGH-VOLUME
SMTP:AUDIT:REQ-BIN-DATA-2

SMTP:COMMAND

SMTP:COMMAND:VRFY
SMTP:COMMAND:TURN
SMTP:COMMAND:EXPN
SMTP:COMMAND:HELP
SMTP:COMMAND:WIZ
SMTP:COMMAND:AV-INETSERV-DOS
SMTP:COMMAND:BDAT
SMTP:COMMAND:ETRN
SMTP:COMMAND:STARTTLS-CMD
SMTP:COMMAND:DEBUG

SMTP:DOS

SMTP:DOS:SMARTMAIL-DOS
SMTP:DOS:SENDMAIL-HEADERS-DOS
SMTP:DOS:GNU-MAILMAN-DATE-DOS
SMTP:DOS:CRAFTED-MX
SMTP:DOS:CLAM-TNEF-DOS
SMTP:DOS:OPENSSL-TLSRECORD-1
SMTP:DOS:EUDORA-MIME-DOS
SMTP:DOS:OPENSSL-TLSRECORD
SMTP:DOS:MS-MALWARE-ENGINE
SMTP:DOS:MS-XL-2003-NULL-DOS
SMTP:DOS:GNU-SCRUBBER-UTF8-DOS

SMTP:EMAIL

SMTP:EMAIL:RELAY-ADDR-OF
SMTP:EMAIL:LOTUS-COLPALETTE-BO
SMTP:EMAIL:EUDORA-SPOOF3
SMTP:EMAIL:IBM-LOTUS-NTS-WPD-BO
SMTP:EMAIL:EUDORA-SPOOF1
SMTP:EMAIL:MAIL-FROM-PIPE
SMTP:EMAIL:HEADER-FROM-PIPE
SMTP:EMAIL:HEADER-TO-PIPE
SMTP:EMAIL:RCPT-TO-DECODE
SMTP:EMAIL:REPLY-TO-PIPE
SMTP:EMAIL:RCPT-TO-PIPE
SMTP:EMAIL:EUDORA-SPOOF4
SMTP:EMAIL:EUDORA-LONG-MSG-URL

SMTP:EXCHANGE

SMTP:EXCHANGE:INV_BDAT_CMD
SMTP:EXCHANGE:INV_BDAT_SEC_LEN
SMTP:EXCHANGE:CMD_XEXCH50_2LONG
SMTP:EXCHANGE:INVLD_XEXCH50_CMD
SMTP:EXCHANGE:SCT_XEXCH50_2LONG
SMTP:EXCHANGE:MIME-MALF-ATTACH
SMTP:EXCHANGE:XLINK2_TOO_LONG
SMTP:EXCHANGE:AUTH-GUEST
SMTP:EXCHANGE:CALENDAR-HEAP
SMTP:EXCHANGE:OWA-CSS
SMTP:EXCHANGE:IMAP-DOS
SMTP:EXCHANGE:MULTI-MAILROUTE
SMTP:EXCHANGE:MAL-VERB-XEXCH50
SMTP:EXCHANGE:EXCH-TNEF-BO
SMTP:EXCHANGE:OWA-JSCRIPT
SMTP:EXCHANGE:MULTI-LONG-MAILRT
SMTP:EXCHANGE:ICAL-DOS
SMTP:EXCHANGE:MAILROUTE-OF

SMTP:EXPLOIT

SMTP:EXPLOIT:RELAY-ATTEMPT
SMTP:EXPLOIT:PINE-BOUNDARY
SMTP:EXPLOIT:SENDMAIL-IDENTEXEC
SMTP:EXPLOIT:RELAY-ATTEMPT-VAR
SMTP:EXPLOIT:EUDORA-URL-SPOOF
SMTP:EXPLOIT:KERIO-MS-FS
SMTP:EXPLOIT:POSTFIX-AUTH-REUSE
SMTP:EXPLOIT:HCP-QUOTE-SCRIPT
SMTP:EXPLOIT:SUSPICIOUS-FROM
SMTP:EXPLOIT:SUSPICIOUS-TO
SMTP:EXPLOIT:SUSPICIOUS-COMM
SMTP:EXPLOIT:AUTH-BRUTE-FORCE
SMTP:EXPLOIT:DMAIL-FS
SMTP:EXPLOIT:EMAIL-ADDR-FS
SMTP:EXPLOIT:JPXDECODE-RCE
SMTP:EXPLOIT:AVI-RIGHT-CLICK
SMTP:EXPLOIT:MAL-AU-DOS
SMTP:EXPLOIT:EXIM-DOVECOT-RCE
SMTP:EXPLOIT:POSTFIX-AUT-REUSE1
SMTP:EXPLOIT:QT-PICT-FILE-MC
SMTP:EXPLOIT:GNUPG-INT-OF
SMTP:EXPLOIT:BITDEF-LOG
SMTP:EXPLOIT:PINE-SLASHQUOTE
SMTP:EXPLOIT:MIME-TOOLS-EVADE
SMTP:EXPLOIT:PINE-CHARSET-OF-1

SMTP:EXT

SMTP:EXT:DOUBLE-EXTENSION
SMTP:EXT:DOT-SHS
SMTP:EXT:DOT-VBS
SMTP:EXT:DOT-EXE
SMTP:EXT:DOT-SCR
SMTP:EXT:DOT-PIF
SMTP:EXT:DOT-OCX
SMTP:EXT:DOT-CMD
SMTP:EXT:DOT-COM
SMTP:EXT:DOT-BAT
SMTP:EXT:DOT-JSE
SMTP:EXT:DOT-MDB
SMTP:EXT:DOT-PCD
SMTP:EXT:DOT-MSP
SMTP:EXT:DOT-REG
SMTP:EXT:DOT-MSC
SMTP:EXT:DOT-MDE
SMTP:EXT:DOT-MSI
SMTP:EXT:DOT-WSH
SMTP:EXT:DOT-SCT
SMTP:EXT:DOT-VB
SMTP:EXT:DOT-WSF
SMTP:EXT:DOT-WSC
SMTP:EXT:DOT-ADP
SMTP:EXT:DOT-INS
SMTP:EXT:DOT-BAS
SMTP:EXT:DOT-INF
SMTP:EXT:DOT-JS
SMTP:EXT:DOT-HLP
SMTP:EXT:DOT-CRT
SMTP:EXT:DOT-CHM
SMTP:EXT:DOT-ADE
SMTP:EXT:DOT-HTA
SMTP:EXT:DOT
SMTP:EXT:DOT-PPT
SMTP:EXT:DOT-386
SMTP:EXT:DOT-ANI
SMTP:EXT:DOT-WSZ
SMTP:EXT:DOT-ZIP
SMTP:EXT:DOT-ISP
SMTP:EXT:DOT-URL
SMTP:EXT:DOT-CPL
SMTP:EXT:DIR-TRAV
SMTP:EXT:DOT-JOB
SMTP:EXT:DOT-LNK
SMTP:EXT:FILE-AVI
SMTP:EXT:DOT-WMF
SMTP:EXT:DOUBLE-EXTENSION-MIME
SMTP:EXT:DOT-GRP
SMTP:EXT:DOT-HT

SMTP:IIS

SMTP:IIS:CDO-OF
SMTP:IIS:SSL-PCT-OF
SMTP:IIS:IIS-ENCAPS-RELAY

SMTP:INVALID

SMTP:INVALID:DUP-BOUNDARY
SMTP:INVALID:BOUNDARY-MISS
SMTP:INVALID:PARTIAL-MESG
SMTP:INVALID:UNFIN-MULTIPART
SMTP:INVALID:DUP-AUTH
SMTP:INVALID:2MANY-BOUNDARY
SMTP:INVALID:BASE64-CHAR

SMTP:MAILMAN

SMTP:MAILMAN:PASSWD-DISCLOSURE

SMTP:MAJORDOMO

SMTP:MAJORDOMO:COMMAND-EXEC

SMTP:MAL

SMTP:MAL:OUTLOOK-MAILTO-QUOT
SMTP:MAL:XSS-URL-IN-EMAIL
SMTP:MAL:SQM-CONTENT-XSS
SMTP:MAL:DATA-SCHEME
SMTP:MAL:BMP-MAL-HEADER
SMTP:MAL:AIM-BO-URL
SMTP:MAL:DOMINO-INOTES-XSS
SMTP:MAL:OUTLOOK-SHELL
SMTP:MAL:ANI-MAL-HEADER
SMTP:MAL:JPEG-ATTACH-COMMENT-OF
SMTP:MAL:LOTUS-LZH-BOF
SMTP:MAL:TBIRD-JAVASCRIPT
SMTP:MAL:MALFORMED-WMF
SMTP:MAL:LOTUS-MIF-VIEWER
SMTP:MAL:MS-HSC-DVD-VLN
SMTP:MAL:WMF-MAL-HEADER
SMTP:MAL:EXIM4-HEADER
SMTP:MAL:ANI-ATTACH
SMTP:MAL:LOTUS-APPLIX
SMTP:MAL:NOTES-INI-SMTP
SMTP:MAL:NOTES-BIGMAIL-DOS
SMTP:MAL:LOTUS-DOC-VIEWER
SMTP:MAL:LOTUS-VIEWER
SMTP:MAL:ACROBAT-UUEXEC
SMTP:MAL:IBM-ATTACHMENT-VIEWER
SMTP:MAL:MAL-ZIP-HDR
SMTP:MAL:LOTUS-WPD
SMTP:MAL:LOTUS-MAILTO
SMTP:MAL:EMAIL-URL-HIDING-ENC
SMTP:MAL:NAV-ZIP-BOMB
SMTP:MAL:FIREFOX-HTML-URL-INJ

SMTP:OUTLOOK

SMTP:OUTLOOK:DHTML-HANDLER-RACE
SMTP:OUTLOOK:OBJECT-TAG
SMTP:OUTLOOK:VML-BOF
SMTP:OUTLOOK:TZID-OF
SMTP:OUTLOOK:RTF-PARSE
SMTP:OUTLOOK:MMCN-EXEC
SMTP:OUTLOOK:VEVENT-MEMCORRUPT
SMTP:OUTLOOK:OBJECT-TAG-XML
SMTP:OUTLOOK:TNEF-INT-OF
SMTP:OUTLOOK:MHTML-CDI
SMTP:OUTLOOK:OSS-FILE
SMTP:OUTLOOK:HTML-NAME-OF
SMTP:OUTLOOK:LOCAL-LINK
SMTP:OUTLOOK:OWA-XSS
SMTP:OUTLOOK:W32-PARAM
SMTP:OUTLOOK:MIME-PARSE-UAF

SMTP:OVERFLOW

SMTP:OVERFLOW:FILENAME
SMTP:OVERFLOW:TOO-MANY-RCPT
SMTP:OVERFLOW:REPLY-LINE
SMTP:OVERFLOW:BOUNDARY
SMTP:OVERFLOW:CONTENT-NAME
SMTP:OVERFLOW:EMAIL-ADDRESS
SMTP:OVERFLOW:EMAIL-USERNAME
SMTP:OVERFLOW:EMAIL-DOMAIN
SMTP:OVERFLOW:COMMAND-LINE
SMTP:OVERFLOW:TEXT-LINE-OF
SMTP:OVERFLOW:LONGPARAM-STRBO3
SMTP:OVERFLOW:LONGPARAM-STRBO2
SMTP:OVERFLOW:MHTML-OF
SMTP:OVERFLOW:SENDMAIL-MIME-OF
SMTP:OVERFLOW:METAMAIL-HDR-FS2
SMTP:OVERFLOW:NTLM-AUTH-OF
SMTP:OVERFLOW:MS-WMF-OF
SMTP:OVERFLOW:METAMAIL-HDR-OF2
SMTP:OVERFLOW:HEADER-LINE-OF
SMTP:OVERFLOW:HEADER-LINE-OF-1
SMTP:OVERFLOW:SENDMAIL-CMT-OF1
SMTP:OVERFLOW:APPLE-PICT-MC
SMTP:OVERFLOW:IBM-BMP-COLOR
SMTP:OVERFLOW:MAILENABLE-BO
SMTP:OVERFLOW:TABS-EHLO-OF
SMTP:OVERFLOW:OUTLOOK-CERT-OF
SMTP:OVERFLOW:SENDMAIL-CMT-OF2

SMTP:REQERR

SMTP:REQERR:REQ-DUPLICATE-HELLO
SMTP:REQERR:REQ-SYNTAX-ERROR

SMTP:RESPONSE

SMTP:RESPONSE:BAD-RESPONSE
SMTP:RESPONSE:USER-UNKNOWN
SMTP:RESPONSE:RLY-ACC-DENIED
SMTP:RESPONSE:RLY-PBTED
SMTP:RESPONSE:PIPE-FAILED

SMTP:SENDMAIL

SMTP:SENDMAIL:ADDR-PRESCAN-ATK
SMTP:SENDMAIL:SENDMAIL-FF-OF
SMTP:SENDMAIL:DEBIAN-SASL-AUTH

SMTP:SERVER

SMTP:SERVER:OVERFLOW-WIN-X86

SMTP:VULN

SMTP:VULN:CMAILSERVER
SMTP:VULN:MAILENABLE-FS
SMTP:VULN:IBM-LOTUS-GIF-PARS-CE
SMTP:VULN:MERCUR-3-3
SMTP:VULN:IMG-PARSE-BOF
SMTP:VULN:MERCUR-4-2
SMTP:VULN:GROUPWISE-IMG-OF
SMTP:VULN:NOVELL-GROUPWISE-XSS
SMTP:VULN:EXIM-4-20

SNMP

SNMP:FREEBSD-GETBULKRQST-BO
SNMP:SNMPV3
SNMP:SNMPV2C
SNMP:SNMPV2U
SNMP:SNMPV1
SNMP:FMT-STR-TCP
SNMP:HMAC-AUTH-BYPASS
SNMP:SQUID-PROXY-ASN1-OF
SNMP:HMAC-AUTH-BYPASS-EXPLOIT
SNMP:TRAP-DECODE-DOS
SNMP:SYMNTC-FIREWALL-MULT

SNMP:AUDIT

SNMP:AUDIT:SET-REQUEST
SNMP:AUDIT:NO-SUCH-NAME
SNMP:AUDIT:OTHER-ERROR
SNMP:AUDIT:PUBLIC
SNMP:AUDIT:PRIVATE
SNMP:AUDIT:BAD-VALUE
SNMP:AUDIT:UNKNOWN-VERSION

SNMP:COMMUNITY

SNMP:COMMUNITY:NULL-CHAR
SNMP:COMMUNITY:ZERO-LEN
SNMP:COMMUNITY:FORMAT-CHAR
SNMP:COMMUNITY:SURECOM-RTR
SNMP:COMMUNITY:INTERNAL
SNMP:COMMUNITY:OVERFLOW-1K
SNMP:COMMUNITY:ILMI
SNMP:COMMUNITY:AVAYA-DEFCOM1

SNMP:DANGEROUS

SNMP:DANGEROUS:JETDIRECT-PASS
SNMP:DANGEROUS:LINKSYS-WAP55AG
SNMP:DANGEROUS:SAMSUNG-PRINTERS

SNMP:DOS

SNMP:DOS:CISCO-DOS
SNMP:DOS:GETBULK
SNMP:DOS:WIN-DEL

SNMP:ENCODING

SNMP:ENCODING:OID-TOO-LONG
SNMP:ENCODING:TLEN-TOO-BIG
SNMP:ENCODING:INT-TOO-BIG
SNMP:ENCODING:NZLEN-FOR-NULL
SNMP:ENCODING:ZLEN-FOR-VALUE
SNMP:ENCODING:EI-TOO-BIG
SNMP:ENCODING:GAUGE-TOO-BIG
SNMP:ENCODING:MALFORMED-OID
SNMP:ENCODING:COUNTER-TOO-BIG
SNMP:ENCODING:OIDVAL-TOO-BIG
SNMP:ENCODING:ES-TOO-BIG
SNMP:ENCODING:TT-TOO-BIG
SNMP:ENCODING:IP-TOO-BIG
SNMP:ENCODING:VALUE-MISSING
SNMP:ENCODING:ZLEN-FOR-OID
SNMP:ENCODING:GET-BULK-REQ
SNMP:ENCODING:INVALID-MIBROOT

SNMP:ENUM

SNMP:ENUM:LM2-ACCESS
SNMP:ENUM:ORINOCO-INFO1

SNMP:ERROR

SNMP:ERROR:INVALID-RESPONSE
SNMP:ERROR:INVALID-MSG-FORMAT
SNMP:ERROR:CLIENT-RESPONSE
SNMP:ERROR:INVALID_MAX_REPS
SNMP:ERROR:INVALID_GAUGE_VALUE
SNMP:ERROR:INV_NON_REPEATERS
SNMP:ERROR:INVALID_TIMETICKS
SNMP:ERROR:INVALID_ESTATUS
SNMP:ERROR:SERVER-REQUEST
SNMP:ERROR:MSG-TOO-SHORT
SNMP:ERROR:INVALID-REQUEST

SNMP:INFO

SNMP:INFO:ERROR_STATUS_GEN_ERR
SNMP:INFO:ERR_STATUS_WRG_LEN
SNMP:INFO:ERR_STAT_AUTH_ERROR
SNMP:INFO:ERR_STAT_NO_CREAT
SNMP:INFO:ERR_STAT_RES_UNAVAIL
SNMP:INFO:ERR_STAT_WRONG_VAL
SNMP:INFO:ERR_STAT_NO_ACCESS
SNMP:INFO:ERR_STAT_UNDO_FAILD
SNMP:INFO:ERR_STAT_NOT_WRITABLE
SNMP:INFO:ERR_STAT_INCON_VAL
SNMP:INFO:ERR_STAT_WRG_ENC
SNMP:INFO:ERR_STAT_INCON_NAME
SNMP:INFO:ERR_STAT_COMMIT_FAILD
SNMP:INFO:ERR_STATUS_WRG_TYPE

SNMP:RESPONSE

SNMP:RESPONSE:READ-ONLY
SNMP:RESPONSE:TOO-BIG

SNMPTRAP:AUDIT

SNMPTRAP:AUDIT:PUBLIC
SNMPTRAP:AUDIT:PRIVATE
SNMPTRAP:AUDIT:PROXY-AGENT
SNMPTRAP:AUDIT:UNKNOWN-VERSION

SNMPTRAP:COMMUNITY

SNMPTRAP:COMMUNITY:NULL-CHAR
SNMPTRAP:COMMUNITY:FORMAT-CHAR
SNMPTRAP:COMMUNITY:ZERO-LEN
SNMPTRAP:COMMUNITY:OVERFLOW-1K

SNMPTRAP:ENCODING

SNMPTRAP:ENCODING:ZLEN-VALUE
SNMPTRAP:ENCODING:NZLEN-NULL
SNMPTRAP:ENCODING:CNTR-TOO-BIG
SNMPTRAP:ENCODING:IP-TOO-BIG
SNMPTRAP:ENCODING:INT-TOO-BIG
SNMPTRAP:ENCODING:GAUGE-TOO-BIG
SNMPTRAP:ENCODING:TLEN-TOO-BIG
SNMPTRAP:ENCODING:TT-TOO-BIG
SNMPTRAP:ENCODING:MALFORMED-OID
SNMPTRAP:ENCODING:OVAL-TOO-BIG
SNMPTRAP:ENCODING:ZLEN-FOR-OID
SNMPTRAP:ENCODING:OID-TOO-LONG
SNMPTRAP:ENCODING:INVALID-MROOT

SNMPTRAP:ERROR

SNMPTRAP:ERROR:INV_TIMETICKS
SNMPTRAP:ERROR:INV_ERR_STAT
SNMPTRAP:ERROR:INV_ERRSTAT_LEN
SNMPTRAP:ERROR:INV_GAUGE_VAL
SNMPTRAP:ERROR:UNEXPECTED-REPLY
SNMPTRAP:ERROR:INVALID-MSG-FMT
SNMPTRAP:ERROR:MSG-TOO-SHORT

SNMPTRAP:INFO

SNMPTRAP:INFO:ERR_STAT_NOT_WRIT
SNMPTRAP:INFO:ERR_STAT_NO_CREAT
SNMPTRAP:INFO:STAT_WRNG_VAL
SNMPTRAP:INFO:STAT_UNDO_FAIL
SNMPTRAP:INFO:STAT_WRNG_TYPE
SNMPTRAP:INFO:ERR_STAT_WRNG_LEN
SNMPTRAP:INFO:STAT_INCON_NAME
SNMPTRAP:INFO:STAT_INCON_VAL
SNMPTRAP:INFO:ERR_STAT_AUTH_ERR
SNMPTRAP:INFO:ERR_STAT_BAD_VAL
SNMPTRAP:INFO:ERR_STAT_GEN_ERR
SNMPTRAP:INFO:ERR_STAT_COM_FAIL
SNMPTRAP:INFO:ERR_STAT_NO_ACC
SNMPTRAP:INFO:ERR_STAT_2BIG
SNMPTRAP:INFO:ERR_STAT_NO_NAME
SNMPTRAP:INFO:STAT_RSUNAVAIL
SNMPTRAP:INFO:STAT_OTHER_ERR
SNMPTRAP:INFO:ERR_STAT_RD_ONLY
SNMPTRAP:INFO:ERR_STAT_WRNG_ENC

SPYWARE

SPYWARE:LIGATS

SPYWARE:AD

SPYWARE:AD:SPYWARENUKER
SPYWARE:AD:METAEUREKA
SPYWARE:AD:ULTRABAR
SPYWARE:AD:MYWEBSEARCHTOOLBAR
SPYWARE:AD:GABESTMEDIAPLAYER
SPYWARE:AD:MIDADDLE
SPYWARE:AD:COMEDYPLANET
SPYWARE:AD:CALLINGHOME-BIZ
SPYWARE:AD:HOTOFFERS
SPYWARE:AD:WORDIQTOOLBAR
SPYWARE:AD:LINKSPIDERSEARCHBAR
SPYWARE:AD:MONEYBAR
SPYWARE:AD:SHOPNAV
SPYWARE:AD:A9TOOLBAR
SPYWARE:AD:HANSONELLISTOOLBAR
SPYWARE:AD:FREEWAREFILEBAR
SPYWARE:AD:ZIPITFAST
SPYWARE:AD:YELLOWBRIDGETOOLBAR
SPYWARE:AD:BLUBSTER-2X
SPYWARE:AD:FAVSEARCH
SPYWARE:AD:VIEWPOINTMEDIA
SPYWARE:AD:BTGRAB
SPYWARE:AD:GOLDENPALACECASINO
SPYWARE:AD:BROWSERACCELERATOR
SPYWARE:AD:ZENOSEARCH
SPYWARE:AD:OFFEROPTIMIZER
SPYWARE:AD:POWERZONE
SPYWARE:AD:KOOLBAR
SPYWARE:AD:ZUVIO
SPYWARE:AD:NABAZATOOLBAR
SPYWARE:AD:ASIAFINESTTOOLBAR
SPYWARE:AD:MIRAGOSEARCHBAR
SPYWARE:AD:KAZOOM
SPYWARE:AD:HSADVISORTOOLBAR
SPYWARE:AD:ATLAS
SPYWARE:AD:VIRTUMONDE
SPYWARE:AD:MEDIATICKETS
SPYWARE:AD:COMTRYMUSICDL
SPYWARE:AD:STATIONRIPPER
SPYWARE:AD:ACTIVESEARCH
SPYWARE:AD:WHENUSAVENOW
SPYWARE:AD:SC-SEARCH-O-MATIC
SPYWARE:AD:GROOWESEARCHBAR
SPYWARE:AD:MINIBUG
SPYWARE:AD:CASHBACK
SPYWARE:AD:CASINOONNET
SPYWARE:AD:MYWAYSEARCHBAR
SPYWARE:AD:IST-POWERSCAN
SPYWARE:AD:ADULTLINKS
SPYWARE:AD:BLOWSEARCH
SPYWARE:AD:TVZSEARCH
SPYWARE:AD:IGETNET
SPYWARE:AD:PURITYSCAN
SPYWARE:AD:EXACTSEARCH
SPYWARE:AD:BONZIBUD
SPYWARE:AD:TOOLBARBROWSER
SPYWARE:AD:ASKJEEVESTOOLBAR
SPYWARE:AD:ALTAVISTATOOLBAR
SPYWARE:AD:APROPOSMEDIA
SPYWARE:AD:EZULA-TOPTEXT
SPYWARE:AD:ESYNDICATE
SPYWARE:AD:STARWARETOOLBAR
SPYWARE:AD:TRELLIANTOOLBAR
SPYWARE:AD:PACIMEDIA
SPYWARE:AD:DIVXPRO
SPYWARE:AD:HOTBOTDESKBAR
SPYWARE:AD:CINMUS
SPYWARE:AD:NEWWEB
SPYWARE:AD:ALLSUM
SPYWARE:AD:BORLAN
SPYWARE:AD:EQISO
SPYWARE:AD:IMNAMES
SPYWARE:AD:ROOGOO
SPYWARE:AD:U88
SPYWARE:AD:ICOOLOADER25
SPYWARE:AD:WINANTIVIRUSPRO2007
SPYWARE:AD:DRIVECLEANER10111
SPYWARE:AD:WINZIX-2-2-0
SPYWARE:AD:AVSYSTEMCARE
SPYWARE:AD:X-CON3.2.8
SPYWARE:AD:COOPEN
SPYWARE:AD:GOPHORIA010B
SPYWARE:AD:PESTBOT
SPYWARE:AD:PARTYPOKER07
SPYWARE:AD:YOURPRIVACYGUARD
SPYWARE:AD:NETWORDAGENT
SPYWARE:AD:MALWARE_CRUSH_3_7
SPYWARE:AD:NETGUARDERWEBCLEANER
SPYWARE:AD:2005SEARCHLOADER
SPYWARE:AD:3WPLAYER_1_7
SPYWARE:AD:CONTRA_VIRUS
SPYWARE:AD:MALWARE-ALARM
SPYWARE:AD:SYSTEM-DOCTOR
SPYWARE:AD:IEDEFENDER
SPYWARE:AD:SPY_SHREDDER_2_1
SPYWARE:AD:AORNUM
SPYWARE:AD:WHENUWEATHERCAST
SPYWARE:AD:WHENU-CLOCKSYNC
SPYWARE:AD:GAMEBAR
SPYWARE:AD:CASALEMEDIA
SPYWARE:AD:4ARCADEPBAR
SPYWARE:AD:BROADCASTPC
SPYWARE:AD:MAPQUEST-TOOLBAR
SPYWARE:AD:SMARTPOPS
SPYWARE:AD:WINPUP
SPYWARE:AD:DOWNLOADWARE
SPYWARE:AD:WAREZP2P
SPYWARE:AD:SEARCHITBAR
SPYWARE:AD:IST-ISTBAR
SPYWARE:AD:FUNBUDDYICONS
SPYWARE:AD:CUSTOMTOOLBAR
SPYWARE:AD:SEEQTOOLBAR
SPYWARE:AD:CRACKSPIDER
SPYWARE:AD:EZSEARCHBAR
SPYWARE:AD:ZAPSPOT
SPYWARE:AD:SIDEFIND
SPYWARE:AD:NETWORKESSENTIALS
SPYWARE:AD:EXACTNAVISEARCH
SPYWARE:AD:HXDL
SPYWARE:AD:BUNDLEWARE
SPYWARE:AD:WHENUSEARCH
SPYWARE:AD:ATGAMES
SPYWARE:AD:TRANSPONDERSTUB
SPYWARE:AD:CRAZYWINNINGS
SPYWARE:AD:BROADCASTURBANTUNER
SPYWARE:AD:MYDAILYHOROSCOPE
SPYWARE:AD:BARGAINBUDDY
SPYWARE:AD:ISEARCH
SPYWARE:AD:PRAIZETOOLBAR
SPYWARE:AD:KEENVALUE
SPYWARE:AD:CLIPGENIE
SPYWARE:AD:ELITEBAR
SPYWARE:AD:7FASST
SPYWARE:AD:ARESPREMIUM
SPYWARE:AD:WEBREDIR
SPYWARE:AD:DOWNLOADER-G
SPYWARE:AD:MYSEARCHADROTATOR
SPYWARE:AD:NETSTER
SPYWARE:AD:SEARCHHIPPOTOOLBAR
SPYWARE:AD:ZTOOLBAR
SPYWARE:AD:MOKEAD
SPYWARE:AD:YAYAD
SPYWARE:AD:WINFIXER2005
SPYWARE:AD:INEXPLORERTOOLBAR
SPYWARE:AD:AURORA
SPYWARE:AD:HENBANG
SPYWARE:AD:WINSYSBA
SPYWARE:AD:VROOMSEARCH
SPYWARE:AD:PPRICH
SPYWARE:AD:NEW-DOT-NET
SPYWARE:AD:SPEDIABAR
SPYWARE:AD:DOWNLOAD-ACCEL
SPYWARE:AD:ADBARS
SPYWARE:AD:HOTBAR
SPYWARE:AD:DOGPILETOOLBAR
SPYWARE:AD:POWERSTRIP
SPYWARE:AD:TOPICKS
SPYWARE:AD:ADTOOLS
SPYWARE:AD:SEPRO
SPYWARE:AD:PEOPLEONPAGE
SPYWARE:AD:URLBLAZE
SPYWARE:AD:PALTALK
SPYWARE:AD:GIRAFATOOLBAR
SPYWARE:AD:NICTECH-BM2
SPYWARE:AD:GAMESPY-ARCADE
SPYWARE:AD:SHOPATHOMESELECT
SPYWARE:AD:LORDOFSEARCH
SPYWARE:AD:VX2-LOCALNRD
SPYWARE:AD:WUPD-MEDIAACCESS
SPYWARE:AD:SSSPIDER
SPYWARE:AD:VEGASPALMSCASINO
SPYWARE:AD:TEOMA
SPYWARE:AD:DIYBAR
SPYWARE:AD:ADSTART
SPYWARE:AD:FREEDOWNLOADMANAGER
SPYWARE:AD:EZTRACKS
SPYWARE:AD:WEBCPR
SPYWARE:AD:BESTOFFERS
SPYWARE:AD:ADCLICKER-EJ
SPYWARE:AD:ZAMINGO
SPYWARE:AD:WINADISCOUNT
SPYWARE:AD:SNAPULTRASEARCH136
SPYWARE:AD:2MFREEGAMES
SPYWARE:AD:NETPUMPER126
SPYWARE:AD:EMPIREPOKER
SPYWARE:AD:GOLDRIVIERACASINO
SPYWARE:AD:DESKTOPMEDIA
SPYWARE:AD:ZANGOTOOLBAR
SPYWARE:AD:WEBSEARCH
SPYWARE:AD:ACCESSIBILITYTOOLBAR
SPYWARE:AD:GEOMUNDOSTOOLBAR
SPYWARE:AD:SUPERFASTMP3SEARCH
SPYWARE:AD:SIMBAR
SPYWARE:AD:EARTHLINKTOOLBAR
SPYWARE:AD:IZITOTOOLBAR
SPYWARE:AD:FREESCRATCHANDWIN
SPYWARE:AD:ELITE_PROTECTOR
SPYWARE:AD:VIRUSPROTECTPRO37
SPYWARE:AD:LIVEPROTECTION
SPYWARE:AD:SUNSHINESPY_1_0
SPYWARE:AD:INSTANTBUZZ
SPYWARE:AD:ADULTP2P_1_5
SPYWARE:AD:JILYIETOOLBAR
SPYWARE:AD:COMODOTOOLBAR
SPYWARE:AD:DOWNLOADRECEIVER
SPYWARE:AD:DELFINMEDIAVIEWER
SPYWARE:AD:TARGETSAVER
SPYWARE:AD:SUPERFISH-INSTALL
SPYWARE:AD:SUPERFISH
SPYWARE:AD:PRICE-FOUNTAIN

SPYWARE:BH

SPYWARE:BH:QCBAR
SPYWARE:BH:NAVEXCEL-HELPER
SPYWARE:BH:LOOKTHRUBAR
SPYWARE:BH:CWSSTARTPAGE-2
SPYWARE:BH:FFINDER
SPYWARE:BH:ZEROPOPUP
SPYWARE:BH:WISHBONE
SPYWARE:BH:SPOTON
SPYWARE:BH:123MANIA
SPYWARE:BH:OEMJIBAR
SPYWARE:BH:ADTRAFFIC
SPYWARE:BH:EXACTSEEK
SPYWARE:BH:ABLE2KNOWTOOLBAR
SPYWARE:BH:THECOOLBAR
SPYWARE:BH:EXCITESEARCHBAR
SPYWARE:BH:CWS-GONNASEARCH
SPYWARE:BH:STARTNOW
SPYWARE:BH:2ND-THOUGHT
SPYWARE:BH:CNSMIN-3721
SPYWARE:BH:BAZOOKABAR
SPYWARE:BH:DIGITALNAMES
SPYWARE:BH:SOGOU
SPYWARE:BH:RICERCADOPPIA
SPYWARE:BH:RABIO42
SPYWARE:BH:SOSOTOOLBAR
SPYWARE:BH:411WEBTOOLBAR
SPYWARE:BH:EXTRATOOLBAR10
SPYWARE:BH:PROVENTACTICS35
SPYWARE:BH:ONESTEPSEARCH10118
SPYWARE:BH:MUSICSTARWARETOOL
SPYWARE:BH:WOWOK-MP3
SPYWARE:BH:SBUHOTBAR484
SPYWARE:BH:IMESHMEDIABAR
SPYWARE:BH:BLUEWAVEADULTLINK-TB
SPYWARE:BH:GRALICWRAP
SPYWARE:BH:PERSONALWEB
SPYWARE:BH:SIDEFIND-1-0
SPYWARE:BH:SEXYVIDEOSCREENSAVER
SPYWARE:BH:MORPHEUS-TOOLBAR
SPYWARE:BH:SCNTOOLBAR
SPYWARE:BH:NEWDOTNETQUICKSEARCH
SPYWARE:BH:MYFUNCARDS
SPYWARE:BH:PHAZEBAR
SPYWARE:BH:SEARCH4TOP
SPYWARE:BH:DREAMBAR
SPYWARE:BH:KOMPASS-TOOLBAR
SPYWARE:BH:PEOPLE_PAL_6_6
SPYWARE:BH:BAIDU_TOOLBAR_4_9_4
SPYWARE:BH:HDT_BAR
SPYWARE:BH:SOFA_TOOLBAR
SPYWARE:BH:EZ_TRACKS_TOOLBAR
SPYWARE:BH:DEEPDO_TOOLBAR
SPYWARE:BH:KWORD-INTERKEY
SPYWARE:BH:SIDESTEP
SPYWARE:BH:COUPONBAR
SPYWARE:BH:BLAZEFIND
SPYWARE:BH:DAOSEARCH
SPYWARE:BH:ILOOKUP
SPYWARE:BH:YOURSITEBAR
SPYWARE:BH:ISTSLOTCHBAR
SPYWARE:BH:CWS-CAMEUP
SPYWARE:BH:INTERNETOPTIMIZER
SPYWARE:BH:SEARCHFORIT
SPYWARE:BH:NAVEXCEL
SPYWARE:BH:COOLSEARCH
SPYWARE:BH:EXTREME-BIZ
SPYWARE:BH:FREECRUISE-TB
SPYWARE:BH:VIPNETLINK
SPYWARE:BH:ABCSEARCH
SPYWARE:BH:QMTOOLBAR
SPYWARE:BH:EZGREETS-TOOLBAR
SPYWARE:BH:MAPSTANTOOLBAR
SPYWARE:BH:NEED2FIND
SPYWARE:BH:SEARCHNUGGET
SPYWARE:BH:3SEARCH
SPYWARE:BH:CNNICUPDATE
SPYWARE:BH:LOOKQUICK
SPYWARE:BH:LOOKSTER
SPYWARE:BH:SEARCHESSISTANT
SPYWARE:BH:8848
SPYWARE:BH:SWBAR-ADROAD-CPR
SPYWARE:BH:HITHOPPER
SPYWARE:BH:LYCOSSIDESEARCH
SPYWARE:BH:FUNWEBPRODUCTS
SPYWARE:BH:YELLOWPAGES
SPYWARE:BH:LOCATORSTOOLBAR
SPYWARE:BH:FREEZE-COM
SPYWARE:BH:RX-TOOLBAR
SPYWARE:BH:IMESHBAR
SPYWARE:BH:MICROGRAMING
SPYWARE:BH:SPYNOVA
SPYWARE:BH:SNAPTOOLBAR
SPYWARE:BH:DEALIO_TOOLBAR
SPYWARE:BH:YOKSUPERSEARCH
SPYWARE:BH:FLASHBAR
SPYWARE:BH:GETMIRAR
SPYWARE:BH:SEARCHSQUIRE
SPYWARE:BH:PUSHTOOLBAR
SPYWARE:BH:STUMBLEUPON
SPYWARE:BH:ABOUTBLANK
SPYWARE:BH:HOTBAR100368

SPYWARE:BP

SPYWARE:BP:INTERNETMARKETINGBAR
SPYWARE:BP:SMILEYCENTRAL
SPYWARE:BP:RUSSIAN-SEARCHBAR
SPYWARE:BP:BYDOU
SPYWARE:BP:BAIGOO
SPYWARE:BP:BROWSERACCELERATOR30
SPYWARE:BP:HAPPYTOFIND
SPYWARE:BP:DITTO_TOOLBAR
SPYWARE:BP:IECODEC
SPYWARE:BP:IEPLUGIN
SPYWARE:BP:MIRARTOOLBAR
SPYWARE:BP:MACHERSTOOLBAR
SPYWARE:BP:NEWNET
SPYWARE:BP:UPLINK
SPYWARE:BP:ZQUEST-COOKIE
SPYWARE:BP:BYSOO
SPYWARE:BP:WILDTANGENT
SPYWARE:BP:ETCETERASEARCH
SPYWARE:BP:COMETCURSOR

SPYWARE:DIALER

SPYWARE:DIALER:PLUGINACCESS
SPYWARE:DIALER:EASYDATES
SPYWARE:DIALER:YEAKNET
SPYWARE:DIALER:TIB-PORN-DIALER
SPYWARE:DIALER:STRIPPLAYER
SPYWARE:DIALER:IEACCESS

SPYWARE:DM

SPYWARE:DM:BRIDALBASICS
SPYWARE:DM:TRUSTYFILES
SPYWARE:DM:MYNAPSTER
SPYWARE:DM:ALEXA-TOOLBAR
SPYWARE:DM:POPULARSCREENSAVERS
SPYWARE:DM:SLINKYSLATETOOLBAR
SPYWARE:DM:KONTIKI
SPYWARE:DM:ALTNET-VAR1
SPYWARE:DM:DWN-ARL
SPYWARE:DM:WEBHANCER

SPYWARE:GM

SPYWARE:GM:SONGOOG
SPYWARE:GM:ALBUMGALAXY
SPYWARE:GM:TWISTER
SPYWARE:GM:VIRTUALBOUNCER
SPYWARE:GM:SAH-CASHBACK
SPYWARE:GM:SEARCHBOSS
SPYWARE:GM:ZANGO-EASY-MESSENGER
SPYWARE:GM:SPYWARESTORMER
SPYWARE:GM:MYSPACEBARIE
SPYWARE:GM:UFIXER2007
SPYWARE:GM:VMNTOOLBAR16
SPYWARE:GM:DOTCOMTOOLBAR
SPYWARE:GM:SPYSHERIFF
SPYWARE:GM:SONYROOTKIT
SPYWARE:GM:IOWAWEBDOWNLOADER
SPYWARE:GM:SPYWARELOCKED33
SPYWARE:GM:CHILDWEBGUARDIAN
SPYWARE:GM:SPYDAWN
SPYWARE:GM:ERRORSAFE
SPYWARE:GM:EXPERTANTIVIRUS41
SPYWARE:GM:NETCRAFTTOOLBAR
SPYWARE:GM:SPYWAREQUAKE
SPYWARE:GM:WEBSITELOGGER34
SPYWARE:GM:RELEVANTKNOWLEDGE
SPYWARE:GM:PCAST
SPYWARE:GM:TROJ-SPYWAD-X
SPYWARE:GM:EDONKEY2000

SPYWARE:KL

SPYWARE:KL:ELITEKEYLOGGER
SPYWARE:KL:NETTRACK-SPY
SPYWARE:KL:KGBKEYLOGGER
SPYWARE:KL:SPYLANTERNKEYLOGGER
SPYWARE:KL:PERFECTKEYLOGGER-FTP
SPYWARE:KL:SPYOUTSIDE-SMTP
SPYWARE:KL:ACTIVEKEYLOGGERHOME
SPYWARE:KL:ACTIVEKEYLOGGER
SPYWARE:KL:XPCSPY-FTP
SPYWARE:KL:ELGOLF
SPYWARE:KL:STARLOGGER
SPYWARE:KL:WINSPY
SPYWARE:KL:WINTECTIVE
SPYWARE:KL:PROAGENT
SPYWARE:KL:MASSCONNECT
SPYWARE:KL:CAM2FTP
SPYWARE:KL:FKWP-KEYLOGGER
SPYWARE:KL:MYBRKEYLOGGER
SPYWARE:KL:XP-ADVANCEDKEYLOGGER
SPYWARE:KL:ARDAMAXKLOGGER28
SPYWARE:KL:WINFAMILYSAFETY
SPYWARE:KL:MG-SHADOW20
SPYWARE:KL:LANTERNKEYLOGGER_6
SPYWARE:KL:ACTIVEKEYLOGGER_392
SPYWARE:KL:EMAILSPYMONITOR_6_9
SPYWARE:KL:ADVANCEDSPY_4
SPYWARE:KL:COMPUTERMONITOR_1_1
SPYWARE:KL:SMART_PC_KEYLOGGER
SPYWARE:KL:FINDNOT_GUARDOG
SPYWARE:KL:HACKERWACKER
SPYWARE:KL:007SPYSOFTWARE-FTP
SPYWARE:KL:CODENAMEALVIN
SPYWARE:KL:LTTLOGGER
SPYWARE:KL:BEEE
SPYWARE:KL:LOGIT10
SPYWARE:KL:APLUSKEYLOGGER
SPYWARE:KL:ACTIVITY-LOGGER
SPYWARE:KL:GURLWATCH
SPYWARE:KL:LITTLEWITCHKEYLOGGER
SPYWARE:KL:ESURVEILLER
SPYWARE:KL:PC-PARENT
SPYWARE:KL:FARSIGHTER
SPYWARE:KL:DESKTOPSCOUT
SPYWARE:KL:BOSSEVERYWARE
SPYWARE:KL:PCACTMONPRO
SPYWARE:KL:STEALTHACTREPORTER
SPYWARE:KL:COMPUTERSPY
SPYWARE:KL:FEARLESSKEYSPY
SPYWARE:KL:DREAMSCAPEKEYLOGGER
SPYWARE:KL:ADVCMPMONITOR
SPYWARE:KL:RADARSPY-10
SPYWARE:KL:WIN32.REMOTEKEYLOG.B
SPYWARE:KL:KEYSPY
SPYWARE:KL:SPYGRAPHICAPRO
SPYWARE:KL:BEYONDKEYLOGGER_SMTP
SPYWARE:KL:ADVANCEDKEYLOGGER
SPYWARE:KL:KEYSPYWARE
SPYWARE:KL:STARR
SPYWARE:KL:PC-BLACK-BOX
SPYWARE:KL:GHOSTKEYLOGGER
SPYWARE:KL:SPYTECTOR131
SPYWARE:KL:ALLINONEKEYLOGGER
SPYWARE:KL:NICESPY
SPYWARE:KL:EMAILSPYPRO
SPYWARE:KL:PAGKEYLOG
SPYWARE:KL:SUPREMESPY
SPYWARE:KL:SYSTEMSURVEILLANCE
SPYWARE:KL:POWERSPY
SPYWARE:KL:BEYOND-KEYLOGGER-FTP
SPYWARE:KL:SYSTEMSLEUTH
SPYWARE:KL:SSKC20
SPYWARE:KL:KEYLOGGERKINGHOME32
SPYWARE:KL:OVERSPY
SPYWARE:KL:COMPUTERMONITORKL
SPYWARE:KL:APOPHISSPY10
SPYWARE:KL:PERFECTKEYLOGGER168
SPYWARE:KL:BASP-PRO-4
SPYWARE:KL:MSN-SPY-MONITOR
SPYWARE:KL:POWEREDKEYLOGGER-2-2
SPYWARE:KL:WEBMAILSPY
SPYWARE:KL:SPYBUDDY372
SPYWARE:KL:ACESPY
SPYWARE:KL:WATCHDOG
SPYWARE:KL:PCSENTINELSOFTWAREKL
SPYWARE:KL:EYESPYPRO
SPYWARE:KL:KEYLOGGERPRO
SPYWARE:KL:007SPYSOFTWARE-SMTP
SPYWARE:KL:DESKTOPDETECTIVE
SPYWARE:KL:SC-KEYLOG
SPYWARE:KL:ACTIVITYMONITOR
SPYWARE:KL:SPYOUTSIDE-FTP
SPYWARE:KL:ACTUALSPY
SPYWARE:KL:ARDAMAXKEYLOGGER
SPYWARE:KL:COMPUTERKEYLOGGER
SPYWARE:KL:NETOBSERVE
SPYWARE:KL:ACTIVITYKEYLOGGER
SPYWARE:KL:NETVIZOR52
SPYWARE:KL:INWEBSITELOG24
SPYWARE:KL:SYS-KEYLOG-1-3
SPYWARE:KL:WINVESTIGATOR

SPYWARE:RAT

SPYWARE:RAT:BIFROSE
SPYWARE:RAT:ANALRAPE-ICQ-NOTIFY
SPYWARE:RAT:REMOTEHAVOC
SPYWARE:RAT:ANALFTP
SPYWARE:RAT:MINIOBLIVION
SPYWARE:RAT:REMOTER
SPYWARE:RAT:SNIPERNET
SPYWARE:RAT:FADE1-0-HTTP
SPYWARE:RAT:INCOMMAND
SPYWARE:RAT:ROACH10-INITIALRESP
SPYWARE:RAT:ARCANUM-0-1-1
SPYWARE:RAT:PCACMEPRO
SPYWARE:RAT:DSKLITE1-0-ICQ
SPYWARE:RAT:CIA1-22-ICQ
SPYWARE:RAT:CIA1-22-SMTP
SPYWARE:RAT:BEAST202-ICQ
SPYWARE:RAT:CIA1-22-FTP
SPYWARE:RAT:EXCEPTION1-0-HTTP
SPYWARE:RAT:NEUROTICKAT1-3-ICQ
SPYWARE:RAT:ERAZER-ICQ
SPYWARE:RAT:ASSASSIN1-1-HTTP
SPYWARE:RAT:BUSCHTROMMEL1-22
SPYWARE:RAT:REMOTE-ANYTHING
SPYWARE:RAT:ACTMONMONITORING
SPYWARE:RAT:SHNAPPZHTTPRAT
SPYWARE:RAT:AIR
SPYWARE:RAT:FADE1-0-TCP
SPYWARE:RAT:THEEF-2.0-CGI
SPYWARE:RAT:THEEF-2-0-ICQ
SPYWARE:RAT:BIONET-TCP
SPYWARE:RAT:ABACAB-HTTP
SPYWARE:RAT:FORCEDCONTROL
SPYWARE:RAT:MASTER
SPYWARE:RAT:ANTILAMER
SPYWARE:RAT:DIEMSMUTTER
SPYWARE:RAT:ACIDHEAD
SPYWARE:RAT:NETOPREMOTECONTROL
SPYWARE:RAT:HATREDFRIEND-TCP
SPYWARE:RAT:CIA1-22-HTTP
SPYWARE:RAT:PRORAT1-9-ICQ
SPYWARE:RAT:ACIDDROP
SPYWARE:RAT:COOLREMOTECONTROL
SPYWARE:RAT:SMALLUPLOADER
SPYWARE:RAT:HIDDENCAMERA
SPYWARE:RAT:STEALTHREDIR-TCP
SPYWARE:RAT:SPYAGENT
SPYWARE:RAT:STEALTHREDIR-FTP
SPYWARE:RAT:FEAR2-0
SPYWARE:RAT:BOBO
SPYWARE:RAT:NETDEMON1-0
SPYWARE:RAT:DATARAPE10F-GETPWD
SPYWARE:RAT:MINIMO
SPYWARE:RAT:NIGHTCREATURE
SPYWARE:RAT:OMERTA-V13
SPYWARE:RAT:AQUA-0-2
SPYWARE:RAT:BADRAT1-1
SPYWARE:RAT:CYBERNETIC1-62
SPYWARE:RAT:BACKATTACK
SPYWARE:RAT:SNID-X2-1-2C-CTS
SPYWARE:RAT:STRIKER1-0
SPYWARE:RAT:SNID-X2-1-2C-STC
SPYWARE:RAT:NEUROTICKAT1-3-CTS
SPYWARE:RAT:LITTLEWITCHEXPLORER
SPYWARE:RAT:NEUROTICKAT1-3-STC
SPYWARE:RAT:BEAST20X-CTS
SPYWARE:RAT:KATUX2-0-SERVER
SPYWARE:RAT:BIONET405-STC
SPYWARE:RAT:ALEXMESSOMALEX-STC
SPYWARE:RAT:HANUMAN
SPYWARE:RAT:SKYRATSHOW
SPYWARE:RAT:REMOTECONTROL-17
SPYWARE:RAT:FERAT1-00-CTS
SPYWARE:RAT:ASSASSIN1-1-CTS
SPYWARE:RAT:FREAK
SPYWARE:RAT:CIA1-22
SPYWARE:RAT:BIONET405-CTS
SPYWARE:RAT:COMA-STC
SPYWARE:RAT:COMA-CTS
SPYWARE:RAT:FERAT1-00-STC
SPYWARE:RAT:ASSASSIN-1-1STC
SPYWARE:RAT:BEAST202-STC
SPYWARE:RAT:ALEXMESSOMALEX-CTS
SPYWARE:RAT:PRORAT1-9
SPYWARE:RAT:CIA1-3
SPYWARE:RAT:MINICOMMAND203-CTS
SPYWARE:RAT:MINICOMMAND203-STC
SPYWARE:RAT:BIONET
SPYWARE:RAT:AMITIS
SPYWARE:RAT:SPECREM6-2-STC
SPYWARE:RAT:ROACH1-0-STC
SPYWARE:RAT:LANFILTRATOR-SIN
SPYWARE:RAT:ROACH1-0-CTS
SPYWARE:RAT:FATALWOUND
SPYWARE:RAT:XHX1-6
SPYWARE:RAT:HANKYPANKY
SPYWARE:RAT:AUTOCRAT
SPYWARE:RAT:SPECREM6-2-CTS
SPYWARE:RAT:SERVEME
SPYWARE:RAT:GREEKHACKERS1-1-CTS
SPYWARE:RAT:HERMANUPLOADER-STC
SPYWARE:RAT:SOFTWARSHADOW-STC
SPYWARE:RAT:HVLRAT-530-CTS
SPYWARE:RAT:SCHWINDLER1-82-CTS
SPYWARE:RAT:SOFTWARSHADOW-CTS
SPYWARE:RAT:GREEKHACKERS1-1-STC
SPYWARE:RAT:LANFILTRATOR1-1-STC
SPYWARE:RAT:HVLRAT-530-STC
SPYWARE:RAT:SCHWINDLER1-82-STC
SPYWARE:RAT:PHOENIX2-1-28
SPYWARE:RAT:LAMESPY
SPYWARE:RAT:SCREENCONTROL10-STC
SPYWARE:RAT:HERMANUPLOADER-CTS
SPYWARE:RAT:NETCONTROLE3-0
SPYWARE:RAT:NTRC2000
SPYWARE:RAT:FREAK88DAS
SPYWARE:RAT:CD-ROMTROJAN
SPYWARE:RAT:REMOTESTORM1-2STC
SPYWARE:RAT:AMREMOTECLIENT1-1
SPYWARE:RAT:DIGITALUPLOAD
SPYWARE:RAT:REMOTESTORM1-2-CTS
SPYWARE:RAT:SHITHEEP
SPYWARE:RAT:BOSSWATCHER
SPYWARE:RAT:FLUX
SPYWARE:RAT:SCREENCONTROL10-CTS
SPYWARE:RAT:SMARTHACKUPLOADER
SPYWARE:RAT:TRAITOR21
SPYWARE:RAT:FAKE0-2
SPYWARE:RAT:96MM
SPYWARE:RAT:RTB666
SPYWARE:RAT:YAT1-3
SPYWARE:RAT:WINSHELL
SPYWARE:RAT:A-311DEATH
SPYWARE:RAT:JOKERSFTP
SPYWARE:RAT:NETCONTROLTAKEOVER
SPYWARE:RAT:ANTIPC
SPYWARE:RAT:WEBCAMTROJAN
SPYWARE:RAT:BSETROJAN
SPYWARE:RAT:EVILFTP
SPYWARE:RAT:SHNAPPZHTTPRAT-SMTP
SPYWARE:RAT:FF-RAT-SRV-RSP
SPYWARE:RAT:BLUEFIRE-FTP
SPYWARE:RAT:BIONET-FTP
SPYWARE:RAT:NETANGEL1-0-SIN
SPYWARE:RAT:FF-RAT-BIN-BEACON
SPYWARE:RAT:SPYAGENT-FTP
SPYWARE:RAT:CHARON-1-0-3
SPYWARE:RAT:PCSHARE
SPYWARE:RAT:RIX310
SPYWARE:RAT:SUPERSPY
SPYWARE:RAT:X2A
SPYWARE:RAT:STATWIN
SPYWARE:RAT:SPYONE-1-0
SPYWARE:RAT:SUPERRA
SPYWARE:RAT:SUPERVISORPLUS
SPYWARE:RAT:DIGIWATCHER-2-32
SPYWARE:RAT:FRAG-ROCK-2-0
SPYWARE:RAT:SPYAGENT-ALERT
SPYWARE:RAT:NCPH
SPYWARE:RAT:MITHRIL-1-45
SPYWARE:RAT:DSKLITE1-0
SPYWARE:RAT:HUNTERGOP
SPYWARE:RAT:COOLCAT
SPYWARE:RAT:FORCE1-61
SPYWARE:RAT:HORNET
SPYWARE:RAT:EXCEPTION1-0
SPYWARE:RAT:OMNIQUARD-IRC
SPYWARE:RAT:MINICOMMAND203-ICQ
SPYWARE:RAT:NUCLEAR-RAT-6-21
SPYWARE:RAT:LANFILTRATOR1-1-CTS
SPYWARE:RAT:ROBO-HACK1-2
SPYWARE:RAT:BLUEFIRE
SPYWARE:RAT:NEUROTICKITTEN
SPYWARE:RAT:SPYAGENT-SMTP
SPYWARE:RAT:DWMREMOTECONTROL
SPYWARE:RAT:GH0ST

SPYWARE:TROJAN

SPYWARE:TROJAN:SANDESA-ICQNOTIF
SPYWARE:TROJAN:HELIOS-ICQNOTIFY
SPYWARE:TROJAN:DOWNLOADER-ARM
SPYWARE:TROJAN:SPAM-MAXY
SPYWARE:TROJAN:DOWNLOADER.AB
SPYWARE:TROJAN:OUTBREAK
SPYWARE:TROJAN:FALLINGSTAR
SPYWARE:TROJAN:LOKITECH
SPYWARE:TROJAN:SNOWDOOR
SPYWARE:TROJAN:SINIQUE1-0
SPYWARE:TROJAN:BLHOUSE
SPYWARE:TROJAN:HALFLIFEJACKER
SPYWARE:TROJAN:SILENTSPY
SPYWARE:TROJAN:3XBACKDOOR
SPYWARE:TROJAN:HTTPRAT
SPYWARE:TROJAN:FKWP-WDOWNLOADER
SPYWARE:TROJAN:HAVRAT1.1
SPYWARE:TROJAN:51D1B
SPYWARE:TROJAN:BERSEK1.0
SPYWARE:TROJAN:AGENTWD
SPYWARE:TROJAN:CROSSBOW
SPYWARE:TROJAN:APOFIS1.0
SPYWARE:TROJAN:SHARK232
SPYWARE:TROJAN:BIFROST121
SPYWARE:TROJAN:RADMIN30
SPYWARE:TROJAN:DOWNLOADERDELF
SPYWARE:TROJAN:TROYA_1_4
SPYWARE:TROJAN:YURI-1-2
SPYWARE:TROJAN:BANDOOK-1-35
SPYWARE:TROJAN:EXPLOIT_1_4_5
SPYWARE:TROJAN:HATREDFIEND
SPYWARE:TROJAN:G-SPOT
SPYWARE:TROJAN:UPNRUN-V10
SPYWARE:TROJAN:DOWNLOADER-YD
SPYWARE:TROJAN:ABWIZ-C
SPYWARE:TROJAN:UNNAMED-BD
SPYWARE:TROJAN:BAC-GEN-E
SPYWARE:TROJAN:THEEF210
SPYWARE:TROJAN:THEEF210FTP
SPYWARE:TROJAN:LITHIUM102
SPYWARE:TROJAN:HOTMAILHACKER5
SPYWARE:TROJAN:CYN21
SPYWARE:TROJAN:BACKORIFICE2006
SPYWARE:TROJAN:ACCESSREMOTEPC
SPYWARE:TROJAN:GENIE17
SPYWARE:TROJAN:BLUEEYE10B
SPYWARE:TROJAN:BACKLASH
SPYWARE:TROJAN:SNAKETROJAN
SPYWARE:TROJAN:BAROK
SPYWARE:TROJAN:EVILGOAT
SPYWARE:TROJAN:BRAINWIPER
SPYWARE:TROJAN:LETMERULE20-STC
SPYWARE:TROJAN:MOSUCKER3-0
SPYWARE:TROJAN:LETMERULE20-CTS
SPYWARE:TROJAN:AUTOSPY-CTS
SPYWARE:TROJAN:MESSIAH2-0
SPYWARE:TROJAN:WEBDOWNLOADER
SPYWARE:TROJAN:ERAZER
SPYWARE:TROJAN:DACRYPTIC
SPYWARE:TROJAN:HRAT
SPYWARE:TROJAN:ELFRAT
SPYWARE:TROJAN:DIMBUS
SPYWARE:TROJAN:AUTOSPY-STC
SPYWARE:TROJAN:ERASER
SPYWARE:TROJAN:LITTLEWITCH-CMD
SPYWARE:TROJAN:ACROPOLIS
SPYWARE:TROJAN:REVERSABLE
SPYWARE:TROJAN:SINSTERLER
SPYWARE:TROJAN:TEQUILABANDITA
SPYWARE:TROJAN:NUCLEARUP
SPYWARE:TROJAN:ABACAB
SPYWARE:TROJAN:FUCKTROJAN
SPYWARE:TROJAN:RAD1-2-3
SPYWARE:TROJAN:INIKILLER
SPYWARE:TROJAN:GWBOY
SPYWARE:TROJAN:COMANDO
SPYWARE:TROJAN:X-BKDR
SPYWARE:TROJAN:SEED1-0
SPYWARE:TROJAN:HUE1-0
SPYWARE:TROJAN:VOICESPY
SPYWARE:TROJAN:HGZ
SPYWARE:TROJAN:NETSHADOW
SPYWARE:TROJAN:NETANGEL1-0
SPYWARE:TROJAN:CLANDESTINE
SPYWARE:TROJAN:FUNFACTORY-STC
SPYWARE:TROJAN:PHANTOMFTP
SPYWARE:TROJAN:OPTIXLITE
SPYWARE:TROJAN:WOLLF
SPYWARE:TROJAN:THUZEROTOLERANCE
SPYWARE:TROJAN:MYDEMISE
SPYWARE:TROJAN:BANDOOK-V1-0
SPYWARE:TROJAN:DWNLDR-ARQ
SPYWARE:TROJAN:NIRVANA-2.0
SPYWARE:TROJAN:POISONIVY212
SPYWARE:TROJAN:ONE
SPYWARE:TROJAN:ACESSOR20
SPYWARE:TROJAN:ONLY1RAT
SPYWARE:TROJAN:ACIDSHIVERS
SPYWARE:TROJAN:WINEGGDROPSPRO
SPYWARE:TROJAN:FURAX10B3
SPYWARE:TROJAN:COBRAUPLOADER
SPYWARE:TROJAN:SUNSHADOW-1-70
SPYWARE:TROJAN:ZZMM20
SPYWARE:TROJAN:ZSPYII0.99
SPYWARE:TROJAN:IEVA1.0
SPYWARE:TROJAN:X-DOOR
SPYWARE:TROJAN:YXNETSCREEN20
SPYWARE:TROJAN:ABREMOTEPRO31
SPYWARE:TROJAN:WINSHADOW30
SPYWARE:TROJAN:THEX-12
SPYWARE:TROJAN:YKW375
SPYWARE:TROJAN:OPTIXPRO132
SPYWARE:TROJAN:WEBCENTER
SPYWARE:TROJAN:LURKER11
SPYWARE:TROJAN:LAMERAT10
SPYWARE:TROJAN:BOER
SPYWARE:TROJAN:PSEUDORAT01B
SPYWARE:TROJAN:TROLLA
SPYWARE:TROJAN:REVOPA
SPYWARE:TROJAN:Y3K2K5
SPYWARE:TROJAN:BLACKCURSE4
SPYWARE:TROJAN:GLOBALKILLER-STC
SPYWARE:TROJAN:REMOTEHACK
SPYWARE:TROJAN:WINTERLOVE
SPYWARE:TROJAN:WINICABRAS11
SPYWARE:TROJAN:DLOADERAGENT-TL
SPYWARE:TROJAN:ZALIVATOR142PRO
SPYWARE:TROJAN:DARKMOON-4-11
SPYWARE:TROJAN:HELIOS-3-1-STC
SPYWARE:TROJAN:EVADE1-1B
SPYWARE:TROJAN:CRASHCOOL-1-1
SPYWARE:TROJAN:KMSNRAT100
SPYWARE:TROJAN:SPYLPLY.A
SPYWARE:TROJAN:TRAILOFDESTRUC20
SPYWARE:TROJAN:CROSSFIRESTROJAN
SPYWARE:TROJAN:ZXSHELL

SPYWARE:UTIL

SPYWARE:UTIL:COPERNICMETABAR
SPYWARE:UTIL:SARIA
SPYWARE:UTIL:WEBFERRET
SPYWARE:UTIL:AMPLIFYTOOLBAR
SPYWARE:UTIL:NUCLEARSCAN
SPYWARE:UTIL:SPYBLOCS-EBLOCS
SPYWARE:UTIL:COPERNICAGENT
SPYWARE:UTIL:I2HUB
SPYWARE:UTIL:BOHAJER-DOWNLOADER
SPYWARE:UTIL:SPYWARESTRIKE
SPYWARE:UTIL:SPAMBLOCKERUTILITY
SPYWARE:UTIL:HIPPYNOTIFY20
SPYWARE:UTIL:SMARTBARXP

SSH

SSH:PACKET-WRITE-WAIT-BO
SSH:NON-STD-PORT
SSH:SYSAX-SERVER-DOS
SSH:SYSAX-MULTI-SERVER-DOS
SSH:PRAGMAFORT-KEY-OF
SSH:KBDINT-NEXT-DEV-POL-BYPASS
SSH:OPENSSH-MAXSTARTUP-DOS
SSH:BRUTE-LOGIN
SSH:KBDINT-NEXT-DEV-POL-BYPAS-1

SSH:AUDIT

SSH:AUDIT:UNEXPECTED-HEADER
SSH:AUDIT:SSH-V1

SSH:ERROR

SSH:ERROR:MSG-TOO-LONG
SSH:ERROR:COOKIE-MISMATCH
SSH:ERROR:INVALID-PKT-TYPE
SSH:ERROR:MSG-TOO-SHORT
SSH:ERROR:INVALID-HEADER

SSH:MISC

SSH:MISC:MAL-VERSION
SSH:MISC:EXPLOIT-CMDS-UNIX
SSH:MISC:UNIX-ID-RESP

SSH:OPENSSH

SSH:OPENSSH:NOVEL-NETWARE
SSH:OPENSSH:GOODTECH-SFTP-BOF
SSH:OPENSSH:BLOCK-DOS

SSH:OVERFLOW

SSH:OVERFLOW:SECURECRT-BOF
SSH:OVERFLOW:PUTTY-VER
SSH:OVERFLOW:FREESSHD-KEY-OF

SSL

SSL:MSG-IN-WRONG-DIR
SSL:UNK-CHG-CPHR-SPEC-MSG
SSL:ENC-TAG-VALUE-TOO-BIG
SSL:ENC-LEN-VALUE-TOO-BIG
SSL:SESSION-ID-LEN-2BIG
SSL:SERIAL-NUM-TOO-LONG
SSL:UNK-HANDSHAKE-TYPE
SSL:CLNT-MSTR-KEY-OVERFLOW
SSL:SERVR-CERT-FAILS-VALIDATION
SSL:SESSION-KEY-REUSE-UNAVAIL
SSL:OPENSSL-TLS-HEARTBEAT
SSL:CIPHER-SUITE-OVERFLOW
SSL:UNKNOWN-CIPHER-SUITE
SSL:SSL-V3-BRUTE-FORCE
SSL:COMPROMISEDCERT-DECTECTION
SSL:DHEEXP-512CPHR-LOGJAM-1
SSL:X509-CN-NULL-BYTE
SSL:GNUTLS-ASN1-LENGTH-OF
SSL:HTTPS-UNIX-CMDS
SSL:HTTPS-UNIX-ID-RESP
SSL:OPENSSL-DTLS1-BOF
SSL:AVAST-ANTIVIRUS-CERT-RCE
SSL:GNUTLS-EXTRACT-DER-DOS
SSL:SYS-MGMT-HOMEP-CMD-INJ
SSL:MALFORMED-SCHANNEL-NEGO
SSL:SYMANTEC-EP-POLICY-BYPASS
SSL:TROJAN-ABUSE-CH
SSL:MOZ-SSLV2-CL
SSL:ALIEN-VAULT-SOAP-CE
SSL:UTN-USERFIRST-HARDWARE
SSL:MCAFEE-EPOLICY-XML
SSL:SQUID-SSL-BUMP-DOS
SSL:OPENSSL-FLOOD
SSL:THC-SSL-DOS
SSL:CPHR-DOS
SSL:HP-DIAGNOSTICS-OF
SSL:APPLE-SSL-BYPASS
SSL:OPENSSL-TLS-DOS
SSL:OPENSSL-DTLS-DOS
SSL:TURKTRUST-FRAUD-CERTIFICATE
SSL:EGO-GOV-FRAUD-CERTIFICATE
SSL:MICROFOCUS-NETIQ-DIR
SSL:MICROFOCUS-NETIQ-AB
SSL:MS-WINDOWS-TLS-BYPASS
SSL:SSLSCAN-ACTIVITY
SSL:DIGINOTAR-CERT-KEY-NEGO
SSL:OPENSSL-DTLSCLIENTHELLO-DOS
SSL:OPENSSL-DTLS-MEMEXHTN_DOS
SSL:MS-SCHANNEL-RCE
SSL:OPENSSL-DHE-DOS
SSL:OPENSSL-DTLS-SRTP-DOS
SSL:MOZILLA-NSS-RSA-SIG-FORGERY
SSL:MGM-CONSOLE-XSS
SSL:OPENSSL-AES-NI-INTUDF
SSL:SYMANTEC-CSRF
SSL:OPENSSL-REC-HANDLING-DOS
SSL:EPO-XMLNTITY-INJ
SSL:NOVELL-GROUPWISE-DIR-TRA
SSL:GNU-DER-PARSING-DOS
SSL:OPENSSL-AES-NI-INTUDF2
SSL:HEWLETT-PACKARD-VERTICA-RCI
SSL:SYMC-WEB-CMD-INJ
SSL:TLS-BRUTE-FORCE
SSL:OPENSSL-ALT-CHAINS-CERT-FRG
SSL:APACHE-NIO-CONNECTOR-DOS
SSL:OPENSSL-TLSRECORD-DOS
SSL:OPENSSL-ECDH-UAF
SSL:GNUTLS-CERT-BYPASS
SSL:NAGIOS-NRPE-CHKUSRS-CI
SSL:OPENSSL-MITM-SEC-BYPASS
SSL:SSL-V3-TRAFFC
SSL:SSL-V3-TRAFFIC-CBS-ENC-ID
SSL:OPENSSL-MEMLEAK-DOS
SSL:OPENSSL-ECDH-DOS
SSL:OPENSSL-DTLS1-DOS
SSL:ALIEN-VAULT-OSSIM-SOAP-CE
SSL:GNUTLS-TLS-RECORD-MC
SSL:OPENSSL-GET-KEY-EXCH-UAF
SSL:NOVELL-ZENWORKS-UL
SSL:GNUTLS-HELLO-SESSION-ID-OF
SSL:APACHE-MOD-SSL
SSL:SERVER-HELLO-SESSION-ID-OF
SSL:OPENSSL-TLS-DTLS-HEARTBEAT
SSL:OPENSSL-HEARTBEAT-ALTERNATE
SSL:TMCM-INFO-DISC
SSL:OPENSSL-CHAINS-CERT-FORG
SSL:GNUTLS-CERT-POLICY-BYPASS
SSL:OPENSSL-SRP-BO
SSL:NOVELL-IMANAGER-DOS
SSL:APPLE-SSL-BYPASS-PROXY
SSL:DTLS-DOS
SSL:BEA-WEBLOGIC-DOS
SSL:SLAPPER-WORM-PROBE
SSL:DEFAULT-PW
SSL:OPENSSL-DO-SSL3-WRITE-DOS
SSL:ALIEN-VAULT-SOAP-REQUEST-CE
SSL:OPENSSL-DTLS-REC-DOS

SSL:AUDIT

SSL:AUDIT:SESSION-KEY-REUSE
SSL:AUDIT:KEY-RENEGOTIATION
SSL:AUDIT:CERT-EXPIRED
SSL:AUDIT:TLS-V12-TRAFFIC
SSL:AUDIT:TLS-V11-TRAFFIC
SSL:AUDIT:TLS-V10-TRAFFIC
SSL:AUDIT:DTLS-CLT-HELLO-FRAG
SSL:AUDIT:HTTP-OVER-SSL
SSL:AUDIT:NOT-SSL
SSL:AUDIT:CERT-BIT-LT-2048
SSL:AUDIT:SSL-V2-TRAFFIC
SSL:AUDIT:SSL-V3-TRAFFIC
SSL:AUDIT:DHEEXP-512CPHR-LOGJAM
SSL:AUDIT:DHEEXP-512CPHRLOGJAM2
SSL:AUDIT:RSA-EXPORT-CIPHER

SSL:IIS

SSL:IIS:CERT-DOS

SSL:INVALID

SSL:INVALID:CONTENT-TYPE
SSL:INVALID:VALIDITY-FMT
SSL:INVALID:COMP-METH-LEN
SSL:INVALID:SESSION-ID-LEN
SSL:INVALID:CERT-VERSION
SSL:INVALID:CLIENT-HELLO
SSL:INVALID:MESSAGE-FMT
SSL:INVALID:COMP-METHOD
SSL:INVALID:SVR-HELLO-FMT
SSL:INVALID:CERT-CHAIN
SSL:INVALID:CIPHER-SPEC
SSL:INVALID:CERT-FORMAT
SSL:INVALID:CHALLENGE-LEN
SSL:INVALID:CIPHER-LEN
SSL:INVALID:CIPHER-SUITE
SSL:INVALID:SVR-HELLO-DATA
SSL:INVALID:LIBTASN1-DOS
SSL:INVALID:SVR-HELLO-DATA-1
SSL:INVALID:NULL-CERT
SSL:INVALID:SSL-INV-VER
SSL:INVALID:GNUTLS-RECORD-BO
SSL:INVALID:GNUTLS-RECORD-OF

SSL:OVERFLOW

SSL:OVERFLOW:SSL-KEY_ARG2
SSL:OVERFLOW:BEA-PLUGINS-CERT
SSL:OVERFLOW:CIPHERS-OF
SSL:OVERFLOW:MSCRSFT-SCHANNL-CE
SSL:OVERFLOW:CIPHERS-OBO
SSL:OVERFLOW:OPENSSL-SRP-CSUITE
SSL:OVERFLOW:ELLIPTIC-POLY-DOS
SSL:OVERFLOW:KEY-ARG-NO-ENTROPY
SSL:OVERFLOW:SSL-KEY_ARG1

SSL:VULN

SSL:VULN:KS-SSL-CERTVALIDATION
SSL:VULN:OPENSSL-PSS-PARAM
SSL:VULN:SYMANTEC-EP-PARAM-XSS
SSL:VULN:ASN1-TYPE-CMP-DOS
SSL:VULN:MOZILLA-NSS-REG
SSL:VULN:CVE-2015-0208-DOS
SSL:VULN:NOVELL-NETIQ-SB
SSL:VULN:OPENSSL-X509-DOS
SSL:VULN:NOVELL-FSFUI-UP2
SSL:VULN:HP-PROCURVE-SB
SSL:VULN:CVE-2015-0291-DOS
SSL:VULN:F5-ICONTROL-SOAP-CE
SSL:VULN:OPENSSL-HS-DOS
SSL:VULN:DTLS-DOUBLE-FREE-DOS

SYSLOG

SYSLOG:CP-SYSLOGD-ESC
SYSLOG:SYSLOG-CRAFTED-PKT
SYSLOG:WATCHER-PRO-DATE-XSS
SYSLOG:HP-MGMT-IMCSYSLOGDM-UAF
SYSLOG:PRI-PARSING-DOS
SYSLOG:PRI-PARSING-TCP-DOS

SYSLOG:AUDIT

SYSLOG:AUDIT:INVALID-PRIORITY
SYSLOG:AUDIT:MISSING-TS
SYSLOG:AUDIT:INVALID-DAY
SYSLOG:AUDIT:INVALID-MONTH
SYSLOG:AUDIT:EMPTY-PRI
SYSLOG:AUDIT:PACKET
SYSLOG:AUDIT:TIMESTAMP
SYSLOG:AUDIT:MISSING-PRI

SYSLOG:FAILURES

SYSLOG:FAILURES:MSG-TOO-SHORT
SYSLOG:FAILURES:UNEXP-REPLY
SYSLOG:FAILURES:MSG-TOO-LONG
SYSLOG:FAILURES:EMPTY-MSG

SYSLOG:FORMAT

SYSLOG:FORMAT:PRIORITY
SYSLOG:FORMAT:PRI-TOO-LONG

TCP:AMBIGUOUS

TCP:AMBIGUOUS:WSF-TOOBIG

TCP:AUDIT

TCP:AUDIT:S2C-LASTACK-ACK
TCP:AUDIT:S2C-SIMUL-SYN
TCP:AUDIT:S2C-TIMEWAIT-ACK
TCP:AUDIT:BAD-SYN-NONSYN
TCP:AUDIT:S2C-FINRETR-BADSEQ
TCP:AUDIT:C2S-SEG-OUT-OF-WIN
TCP:AUDIT:C2S-LASTACK-ACK
TCP:AUDIT:SYNSENT-NONSYN
TCP:AUDIT:SYN-RTNS-BADWIN
TCP:AUDIT:C2S-OLD-ESTB
TCP:AUDIT:C2S-TIMEWAIT-FIN
TCP:AUDIT:SYNSENT-RST
TCP:AUDIT:WRONG-CHECKSUM
TCP:AUDIT:OPTIONS-UNNEGOT-TS
TCP:AUDIT:SYNRCVD-SYNACK
TCP:AUDIT:C2S-TIMEWAIT-ACK
TCP:AUDIT:C2S-FINRETR-BADSEQ
TCP:AUDIT:C2S-RST-DATA
TCP:AUDIT:OPT-UNSUP
TCP:AUDIT:S2C-FINWAIT2-FIN
TCP:AUDIT:C2S-URG-DATA
TCP:AUDIT:S2C-SEG-OUT-OF-WIN
TCP:AUDIT:S2C-FIN-OUT-OF-WIN
TCP:AUDIT:S2C-TIMEWAIT-FIN
TCP:AUDIT:OPT-UNSOL-TS
TCP:AUDIT:S2C-PART-OUT-OF-WIN
TCP:AUDIT:UNSOL-SACKPERM
TCP:AUDIT:OLD-SYNACK
TCP:AUDIT:S2C-FUTURE-ACK
TCP:AUDIT:C2S-FUTURE-ACK
TCP:AUDIT:DUP-SEQ-SEG-RETRANS
TCP:AUDIT:S2C-RST-DATA
TCP:AUDIT:S2C-OLD-ESTB
TCP:AUDIT:NONSYN-SACKPERM
TCP:AUDIT:UNKNOWN
TCP:AUDIT:S2C-SYN-RST
TCP:AUDIT:SYN-RTNS-BADTS
TCP:AUDIT:UNSOL-WSF
TCP:AUDIT:C2S-CLOSED-ACK
TCP:AUDIT:OPTIONS-UNNEGOT-SACK
TCP:AUDIT:SYN-RTNS-BADISS
TCP:AUDIT:SYN-RTNS--BADWSF
TCP:AUDIT:OLD-3WH-ACK

TCP:C2S:AMBIG

TCP:C2S:AMBIG:C2S-SYN-DATA
TCP:C2S:AMBIG:SYN-RTNS--BADSACK
TCP:C2S:AMBIG:OLAP-MISMATCH

TCP:C2S:ERROR

TCP:C2S:ERROR:REASS-LOST-TRACK

TCP:C2S:EVASION

TCP:C2S:EVASION:C2S-ESTB-SYN
TCP:C2S:EVASION:C2S-URG-OUT-WIN

TCP:C2S:EXPLOIT

TCP:C2S:EXPLOIT:TCP-ZERO-PORT
TCP:C2S:EXPLOIT:C2S-URG-OVERLAP
TCP:C2S:EXPLOIT:RST-BRUTE-FORCE
TCP:C2S:EXPLOIT:URG-WO-FLG

TCP:C2S:FLAGSERROR

TCP:C2S:FLAGSERROR:DIRTY-SYN

TCP:C2S:INFO

TCP:C2S:INFO:C2S-FIN-OUT-OF-WIN

TCP:ERROR

TCP:ERROR:REASS-MEMORY-OVERFLOW
TCP:ERROR:FLOW-MEMORY-EXCEEDED

TCP:EXPLOIT

TCP:EXPLOIT:SOCKSTRESS

TCP:OPTERR

TCP:OPTERR:NONSYN-WSF
TCP:OPTERR:TOO-LONG
TCP:OPTERR:BAD-OPTION
TCP:OPTERR:SHORT-READ
TCP:OPTERR:SYN-SACK
TCP:OPTERR:NONSYN-MSS
TCP:OPTERR:BAD-LENGTH
TCP:OPTERR:ZERO-LENGTH
TCP:OPTERR:MS-ORPHAN-CONNECTION
TCP:OPTERR:MS-ZERO-WINDOW-SIZE

TCP:S2C:AMBIG

TCP:S2C:AMBIG:OLAP-MISMATCH

TCP:S2C:ERROR

TCP:S2C:ERROR:REASS-LOST-TRACK

TCP:S2C:EVASION

TCP:S2C:EVASION:S2C-ESTB-SYN
TCP:S2C:EVASION:S2C-URG-OUT-WIN

TCP:S2C:EXPLOIT

TCP:S2C:EXPLOIT:S2C-URG-OVERLAP
TCP:S2C:EXPLOIT:URG-WO-FLAGS

TCP:S2C:FLAGSERROR

TCP:S2C:FLAGSERROR:DIR-SYNACK

TCP:S2C:INFO

TCP:S2C:INFO:S2C-URG-DATA

TELNET:AUDIT

TELNET:AUDIT:REQ-SUBNEG-UNKNOWN
TELNET:AUDIT:USER

TELNET:CMD

TELNET:CMD:CAT-ETC-PASSWD
TELNET:CMD:HALT
TELNET:CMD:SCRIPT-TAGS-STREAM
TELNET:CMD:ALLIED-TELESIS-PRIV
TELNET:CMD:RAPIDHAMSTER-R2-TRAV

TELNET:DOS

TELNET:DOS:GAMSOFT
TELNET:DOS:TLNTSVR-EXE-DOS

TELNET:EXPLOIT

TELNET:EXPLOIT:RESOLV-HOST-CONF
TELNET:EXPLOIT:MIT-KERB-DASH-E
TELNET:EXPLOIT:LD-PRELOAD
TELNET:EXPLOIT:MS-CREDENTIAL
TELNET:EXPLOIT:SOL-AUTH-BYPASS
TELNET:EXPLOIT:LD-LIBRARY-PATH
TELNET:EXPLOIT:SGI-RLD
TELNET:EXPLOIT:SUN-TELNETD-OF
TELNET:EXPLOIT:SOLARIS-LOGIN-OF

TELNET:FAILURE

TELNET:FAILURE:BRUTE-FORCE
TELNET:FAILURE:NOT-ON-CONSOLE
TELNET:FAILURE:LOGIN-INCORRECT
TELNET:FAILURE:GUEST
TELNET:FAILURE:LOGIN-FAILED
TELNET:FAILURE:EMP-CISCO-PWD
TELNET:FAILURE:NON-NTLM
TELNET:FAILURE:WINDOWS
TELNET:FAILURE:PERM-DENIED

TELNET:NEGOT

TELNET:NEGOT:REQ-SUBNEG-FORMAT

TELNET:OVERFLOW

TELNET:OVERFLOW:SUBOPTION
TELNET:OVERFLOW:OPTION
TELNET:OVERFLOW:LOGIN-OF
TELNET:OVERFLOW:OPTIONS-REPLY
TELNET:OVERFLOW:NEW-ENVIRON-OF
TELNET:OVERFLOW:LINEMODE-OF
TELNET:OVERFLOW:YBSD-OF-CHECK
TELNET:OVERFLOW:CCPROXY-HOST-OF
TELNET:OVERFLOW:SGI
TELNET:OVERFLOW:ABSOLUTE-UK2-OF
TELNET:OVERFLOW:BSD-ENCRY-KEYID

TELNET:SVRRESP

TELNET:SVRRESP:MS-CLIENT-INFO

TELNET:USER

TELNET:USER:DEFAULT-PW-2
TELNET:USER:DEFAULT-PW-3
TELNET:USER:DEFAULT-PW-NORTEL
TELNET:USER:DEFAULT-PW
TELNET:USER:ROOT
TELNET:USER:AXIS-COPYRIGHT
TELNET:USER:DYNALINK-BACKDOOR
TELNET:USER:DEFAULT-PW-3COM
TELNET:USER:DEFAULT-PW-4
TELNET:USER:4DGIFTS
TELNET:USER:EZSETUP
TELNET:USER:OUTOFBOX
TELNET:USER:APC-BACKDOOR

TFTP

TFTP:MSG-TOO-SHORT
TFTP:MISSING-MODE
TFTP:EMPTY-FILENAME
TFTP:MISSING-FILENAME
TFTP:MSG-TOO-LONG
TFTP:FNAME-NOT-T2
TFTP:FILENAME-TOO-LONG
TFTP:NOVELL-ZENWORKS-DESK-CE
TFTP:WVFTP-OPTION-OF
TFTP:MULT-SERVER-DOS
TFTP:FS-FILE
TFTP:SERVER-ERROR-BO
TFTP:MRIS-ACCESS-VIOLATE
TFTP:TRANSPORT-BOF

TFTP:AUDIT

TFTP:AUDIT:C2S-UNEXP-ACK
TFTP:AUDIT:READ-FAILED
TFTP:AUDIT:S2C-UNEXP-DATA
TFTP:AUDIT:S2C-INVALID-OPCODE
TFTP:AUDIT:C2S-UNEXP-DATA
TFTP:AUDIT:WRITE-FAILED
TFTP:AUDIT:C2S-INVALID-OPCODE
TFTP:AUDIT:S2C-UNEXP-ACK

TFTP:DIRECTORY

TFTP:DIRECTORY:DOT-DOT
TFTP:DIRECTORY:ROOT
TFTP:DIRECTORY:SOLAR-TFTP-TRVRS
TFTP:DIRECTORY:REQ-FILE-DIR-TRV

TFTP:DOS

TFTP:DOS:LINUX-KERNEL

TFTP:FILE

TFTP:FILE:ADMIN-DLL
TFTP:FILE:PASSWD-MAKREC

TFTP:OPERATION

TFTP:OPERATION:GET
TFTP:OPERATION:WRITE
TFTP:OPERATION:FS-TFTP-OF

TFTP:OVERFLOW

TFTP:OVERFLOW:MODE-TOO-LONG
TFTP:OVERFLOW:SERVA-READ-REQ-BO

TFTP:REQUEST

TFTP:REQUEST:NULL-PTR

TIP

TIP:INV-IDENTIFY-RESP
TIP:RECONNECT

TROJAN

TROJAN:ROOTKIT-DL
TROJAN:EAGHOUSE
TROJAN:PUSHDO-ACTIVITY
TROJAN:BLEEDING-LIFE-EK
TROJAN:WALDEC-ACTIVITY
TROJAN:SINKHOLE-MALWARE-CONN
TROJAN:BEACON-CNC
TROJAN:GUPTACHAR-2.0
TROJAN:CAPFIRE4-CNC
TROJAN:CFM-UFO
TROJAN:FAKE-AV-CO-CC
TROJAN:HXDEF1.00
TROJAN:MITGLEIDER
TROJAN:TROJAN-BUNITU
TROJAN:WIPER-FLAME-UPDATE
TROJAN:DYRE
TROJAN:PEACOMM-TROJAN
TROJAN:POISONIVY-CNC
TROJAN:THE-RAT
TROJAN:WIPER-BACKDOOR-ACT
TROJAN:PROFTPD-BACKDOOR-BEACON
TROJAN:PROFTPD-BACKDOOR
TROJAN:GOZI-REG
TROJAN:PABUERI-OUTBOUND-CONN
TROJAN:SAKURA-1.1-ARCH-REQ
TROJAN:ASPXSPY-ACTIVITY
TROJAN:FISP-A-BOOTKIT
TROJAN:SAKURA-BIN-DOWNLOAD
TROJAN:EQUATIONGRP-EQUATIONLASR
TROJAN:SAKURA-LANDING-REQ
TROJAN:SAKURA-LANDING-OBFUS
TROJAN:OSX-DNS-CHANGER
TROJAN:DROIDDREAM
TROJAN:DEADBEEF-CNC
TROJAN:BACKDOOR-LEOUNCIA
TROJAN:DLINK-BACKDOOR
TROJAN:BYTE-VERIFY-HTML
TROJAN:BOT-FEODO-ACTIVITY
TROJAN:ITSOKNOPROBLEMBRO-CNC
TROJAN:R2D2
TROJAN:SPYEYE-BEACON
TROJAN:EBURY-DNS-EXFILTRATION
TROJAN:ALDIBOT-DETECTION
TROJAN:SYNFUL-KNOCK-CNC
TROJAN:ZEROACCESS-BOTNET-P2P
TROJAN:KRONOS-CNC-COMM
TROJAN:BEACON-C2-CNC
TROJAN:EZBRO-CNC
TROJAN:ZMEU-BOT-SCAN
TROJAN:RUN-FOREST-RUN
TROJAN:APT1-SSL-AOL
TROJAN:APT1-SSL-EMAIL
TROJAN:APT1-SSL-MOON-NIGHT
TROJAN:APT1-SSL-SUR
TROJAN:APT1-SSL-SERVER
TROJAN:APT1-SSL-VIRTUALLYTHERE
TROJAN:APT1-SSL-NS
TROJAN:FAKE-MSIE-6.0-UA
TROJAN:APT1-WEBC2-CLOVER-UA
TROJAN:ANDROID-SPAMSOLDIER-BOT
TROJAN:XYLIGAN-CHECKIN
TROJAN:APT1-SSL-WEBMAIL
TROJAN:APT1-SSL-YAHOO
TROJAN:SYNOLOCKER-ACTIVITY
TROJAN:TAIDOOR-CNC
TROJAN:ENFAL-LURID-CNC
TROJAN:KAZY-BEACON
TROJAN:TINBA-CHECKIN-RQST
TROJAN:VIRUT-COUNTER
TROJAN:WIN32-RAMNIT-CHECKIN
TROJAN:APT1-SSL-IBM
TROJAN:APT1-SSL-NO-NAME
TROJAN:WIN-NEUREVT
TROJAN:APT1-WEBC2-UGX-UA
TROJAN:CITADEL-BEACON
TROJAN:HTRAN-UA
TROJAN:BLACKHOLE-KIT-URL-REQ
TROJAN:APACHE-DARKLEECH
TROJAN:OPHIARU-BOTNET
TROJAN:DOWNLOAD-SETUP-EXE
TROJAN:MADNESS-CHECKIN
TROJAN:WIPER-FLAME-POST-EXFIL
TROJAN:WIN-TROJ-GRAFTOR-CONN
TROJAN:PUSHDO-POST-CNC
TROJAN:APT1-SSL-ALPHA
TROJAN:APT1-SSL-LAME
TROJAN:UNKNOWN-BACKDOOR-KNOCK
TROJAN:APT1-WEBC2RAVE-TOSCTB-UA
TROJAN:W32-PARITE-CNC
TROJAN:CVE-2013-3893-CNC
TROJAN:APT1-WEBC2-DIV-UA
TROJAN:SAKURA-BIN-LOAD-REQ
TROJAN:MALVERTISING-CO-CC
TROJAN:ASPXSPY-CONNECT
TROJAN:NIGHT-DRAGON-CC
TROJAN:SAFEPACK-PLUGIN-DETECT
TROJAN:EBURY-SSH-BACKDOOR
TROJAN:BACKOFF-ACTIVITY
TROJAN:SIMPLE-PHP-BACKDOOR
TROJAN:CDORKED-INFECTED-SERVER
TROJAN:BACKDOOR-BY-ZOMBIE
TROJAN:CDORKED-BACKDOOR
TROJAN:EQUATIONGRP-PRIVLIB
TROJAN:CRYPTOWALL
TROJAN:HTTP-ZEROACCESS-BOTNET
TROJAN:EQUATIONGRP-CRYPTOLIB
TROJAN:NGRBOT-ACTIVITY
TROJAN:PITTY-TIGER-ACTIVITY
TROJAN:TESLACRYPT-CNC
TROJAN:ANCHOR-PANDA
TROJAN:GABOC-CHECKIN
TROJAN:RESLURP-CNC-CONTACT
TROJAN:FILEENCODER-CNC
TROJAN:OLDBAIT-CHOSTICK-CHECKIN
TROJAN:SOFACY-MALICIOUS-REQUEST
TROJAN:SOFACY-CNC
TROJAN:GHOSTRAT-CNC
TROJAN:DUO-USB
TROJAN:JECT.A
TROJAN:CRYPTOWALL-DOCS-CAMP

TROJAN:ADMW0RM

TROJAN:ADMW0RM:USER-LOGIN

TROJAN:AUTOPROXY

TROJAN:AUTOPROXY:INFECTED-HOST

TROJAN:BACKCONSTR

TROJAN:BACKCONSTR:FTP-PORT-OPEN
TROJAN:BACKCONSTR:FTP-ON
TROJAN:BACKCONSTR:CONNECTION

TROJAN:BACKDOOR

TROJAN:BACKDOOR:BANNER
TROJAN:BACKDOOR:PERL-SHELLBOT-S
TROJAN:BACKDOOR:PANDORA-DOS-CNC
TROJAN:BACKDOOR:MURCY-CNC
TROJAN:BACKDOOR:CHINACHOPPERCNC
TROJAN:BACKDOOR:WIN-WEKBY-TORN
TROJAN:BACKDOOR:PCRAT-GHOST-CNC
TROJAN:BACKDOOR:WIN-RAMNIT
TROJAN:BACKDOOR:GHOSTNET-CNC
TROJAN:BACKDOOR:DRIDEX-FEODO
TROJAN:BACKDOOR:PCRAT-CNC-TRFC
TROJAN:BACKDOOR:SCREENOS-PWD
TROJAN:BACKDOOR:SCREENOS-SSH

TROJAN:BACKORIFICE

TROJAN:BACKORIFICE:EXECUTION
TROJAN:BACKORIFICE:BO2K-CONNECT
TROJAN:BACKORIFICE:WEB-SERVER
TROJAN:BACKORIFICE:BOPING
TROJAN:BACKORIFICE:CONN-REQ

TROJAN:CDK

TROJAN:CDK:PORT15858
TROJAN:CDK:PORT79

TROJAN:COREFLOOD

TROJAN:COREFLOOD:C-AND-C
TROJAN:COREFLOOD:TRACKER-REQ

TROJAN:DAGGER

TROJAN:DAGGER:SERVER-RES
TROJAN:DAGGER:CLIENT-CONNECT

TROJAN:DOLY

TROJAN:DOLY:COMMAND-V1
TROJAN:DOLY:SERVER-RES-V2
TROJAN:DOLY:SERVER-RES-V1

TROJAN:DONALDDICK

TROJAN:DONALDDICK:SERVER-RES

TROJAN:GATECRASHER

TROJAN:GATECRASHER:SERVER-RES
TROJAN:GATECRASHER:GC-PROBE

TROJAN:GIRLFRIEND

TROJAN:GIRLFRIEND:SERVER-RES

TROJAN:INFECTOR

TROJAN:INFECTOR:SVR-RES
TROJAN:INFECTOR:CLIENT-REQ

TROJAN:MISC

TROJAN:MISC:BLACKMOON
TROJAN:MISC:GHOST-SRV-RESP
TROJAN:MISC:KONIK-CLIENT-REQ
TROJAN:MISC:CHUPA-COMMAND
TROJAN:MISC:AOLADMIN-SRV-RESP
TROJAN:MISC:ROOTBEER-CLIENT
TROJAN:MISC:WEBSERVCT10
TROJAN:MISC:FRENZY-SRV-RESP
TROJAN:MISC:NETTAXI-SRV-RESP
TROJAN:MISC:CELINE-SRV-RESP
TROJAN:MISC:TRUVA-SERV-RESP
TROJAN:MISC:UNDETECTED-SRV-RESP
TROJAN:MISC:LESZCZ-SRV-RESP
TROJAN:MISC:SCHNECK-SERV-RESP
TROJAN:MISC:LITHIUM-SRV-RESP
TROJAN:MISC:MASSAKER-SRV-RESP
TROJAN:MISC:ASYLUM-COMMAND
TROJAN:MISC:BDDT-SRV-OK
TROJAN:MISC:BF-EVOLUTION-BANNER
TROJAN:MISC:BASICHELL-SRV-RESP
TROJAN:MISC:BACKAGE-COMMAND
TROJAN:MISC:AMANDA-SRV-RESP
TROJAN:MISC:DANTON-SVR-RESP
TROJAN:MISC:BREACHPRO-CAP-REQ
TROJAN:MISC:INCOMMAND-SVR-VER
TROJAN:MISC:GSPOT-COMMAND
TROJAN:MISC:GIFT-COMMAND
TROJAN:MISC:FORE-SRV-RESP
TROJAN:MISC:FE-SERV-RESP
TROJAN:MISC:CRACKDOWN-SRV-RESP
TROJAN:MISC:CAFEINI-SERV-RESP
TROJAN:MISC:FILENAIL-REQUEST
TROJAN:MISC:DRAT-SRV-VERSION
TROJAN:MISC:DCONNECT
TROJAN:MISC:CYN-CLIENT-REQ
TROJAN:MISC:FBACKDOOR-SRV-RESP
TROJAN:MISC:DTR-BANNER
TROJAN:MISC:CGI-BUINET-SRV-RESP
TROJAN:MISC:ECLYPSE-SRV-RESP
TROJAN:MISC:BLAZER-SERV-RESP
TROJAN:MISC:BLACKANGEL-SRV-RESP
TROJAN:MISC:BREACH-SRV-RESP
TROJAN:MISC:BLADERUNNER-RESP
TROJAN:MISC:MOONPIE-SERV-RESP
TROJAN:MISC:MEETLAMER-COMMAND
TROJAN:MISC:KIDTERROR-SRV-RESP
TROJAN:MISC:GIRLFRIEND-SRV-RESP
TROJAN:MISC:NETRAIDER-SRV-RESP
TROJAN:MISC:MOSUCKER-SERV-RESP
TROJAN:MISC:MOONPIE3-FTP-RESP
TROJAN:MISC:MOBLIVION-SERV-RESP
TROJAN:MISC:MAVERICKS-SRV-RESP
TROJAN:MISC:INSANE-SRV-RESP
TROJAN:MISC:MICHAL-SRV-RESP
TROJAN:MISC:HACKWORLD-CMD
TROJAN:MISC:NETSPY-SRV-RESP
TROJAN:MISC:HOSTCONTROL-RESP
TROJAN:MISC:MNEAH-SERV-RESP
TROJAN:MISC:INTRUDER-RESPONSE
TROJAN:MISC:WOW23-TCP
TROJAN:MISC:THING-SERV-RESP
TROJAN:MISC:VAGNCKER-SERV-RESP
TROJAN:MISC:TRON-COMMAND
TROJAN:MISC:ULTORS-SERV-RESP
TROJAN:MISC:WINMITE-SRV-RDY
TROJAN:MISC:WINRAT10-TCP
TROJAN:MISC:UPLOADER-LOGIN-REQ
TROJAN:MISC:XANADU111-CON
TROJAN:MISC:RUX-COMMAND
TROJAN:MISC:WINRAT12-TCP
TROJAN:MISC:REMOTEHACK-CLIENTID
TROJAN:MISC:VOODOO-COMMAND
TROJAN:MISC:SCARAB-CONNECT
TROJAN:MISC:TRANSSCOUT-CLIENTID
TROJAN:MISC:RULER-SERV-RESP
TROJAN:MISC:RPM-COMMAND
TROJAN:MISC:WANREMOTE-ADMIN
TROJAN:MISC:WINCRASH10-SRV-RDY
TROJAN:MISC:WINCRASH
TROJAN:MISC:OXON-COMMAND
TROJAN:MISC:PCINVADER-FTP-BANR
TROJAN:MISC:PITFALL-SERV-RESP
TROJAN:MISC:PHASE-ZERO-SRV-RESP
TROJAN:MISC:NIRVANA-COMMAND
TROJAN:MISC:OSIRIS-SERV-RESP
TROJAN:MISC:OBLIVION-SRV-RESP
TROJAN:MISC:PHOENIX-SERV-RESP
TROJAN:MISC:RATHEAD-SRV-RESP
TROJAN:MISC:NETSILENCE-SRV-RESP
TROJAN:MISC:PPORT-INFO-REQ
TROJAN:MISC:PROJNEXT-SERV-RESP
TROJAN:MISC:SONOFPW-SERV-RESP
TROJAN:MISC:ONE-CLIENTID
TROJAN:MISC:R0XR4T-COMMAND
TROJAN:MISC:PROSIAK-SERV-RESP
TROJAN:MISC:FLU-COMMAND
TROJAN:MISC:PSYCHWARD-SRV-RESP
TROJAN:MISC:R3C-SERV-RESP
TROJAN:MISC:NOKNOK-COMMAND
TROJAN:MISC:REMOTEHACK-SVR-RESP
TROJAN:MISC:PCINVADER-COMMAND
TROJAN:MISC:LEGUARDIEN
TROJAN:MISC:ULTIMATERAT
TROJAN:MISC:RADMIN-CMD
TROJAN:MISC:OPTIX-PRO-CONN
TROJAN:MISC:SCHOOLBUS-JOYBD
TROJAN:MISC:LAST2K-CONN
TROJAN:MISC:EXECUTOR-CMD
TROJAN:MISC:GLACIER
TROJAN:MISC:CYN-CLIENT-CONN
TROJAN:MISC:TROJAN-CIA
TROJAN:MISC:ILLUSION-1-0
TROJAN:MISC:ULTIMATE-RAT21
TROJAN:MISC:CRAZZYNET-SRV-RESP
TROJAN:MISC:MILLENIUM-SERV-RESP
TROJAN:MISC:CONNECTION-RESP
TROJAN:MISC:NETTERROR-SRV-RESP
TROJAN:MISC:HELLZ-SRV-RESP
TROJAN:MISC:PITFALL-TELNET-ID
TROJAN:MISC:PRAYER-SERV-RESP
TROJAN:MISC:MOONPIE-FTP-RESP
TROJAN:MISC:VAMPIRE-SRV-RESP
TROJAN:MISC:ULLYSSE
TROJAN:MISC:MWI-DOC-EXPKIT
TROJAN:MISC:MULTI-TROJ-CHECKIN
TROJAN:MISC:ZEUS-DERIVATIVE
TROJAN:MISC:ZEPROXB-CHECKIN
TROJAN:MISC:DARKNESS-DDOS

TROJAN:MS-04-028

TROJAN:MS-04-028:R-ADMIN-START
TROJAN:MS-04-028:TOOL-DOWNLOAD
TROJAN:MS-04-028:BACKDOOR-LOGIN

TROJAN:MYDOOM

TROJAN:MYDOOM:MYDOOM-TROJAN
TROJAN:MYDOOM:S-IRC-BACKDOOR
TROJAN:MYDOOM:AH-HTTP-INFECT

TROJAN:NETBUS

TROJAN:NETBUS:SERVER-RES-12346
TROJAN:NETBUS:PRO-SERVER-RES
TROJAN:NETBUS:SERVER-RES-12345
TROJAN:NETBUS:CLT-GETINFO-12346
TROJAN:NETBUS:CLT-GETINFO-12345

TROJAN:NETDEVIL

TROJAN:NETDEVIL:NETDEVIL1-4
TROJAN:NETDEVIL:NETDEVIL
TROJAN:NETDEVIL:NETDEVIL-STC

TROJAN:NETMTROPOL

TROJAN:NETMTROPOL:CLI-REQ-5301
TROJAN:NETMTROPOL:CLI-REQ-5302

TROJAN:NETSPHERE

TROJAN:NETSPHERE:SVR-RES-HIGH
TROJAN:NETSPHERE:SVR-RES

TROJAN:PHASEZERO

TROJAN:PHASEZERO:SERVER-RES

TROJAN:PHATBOT

TROJAN:PHATBOT:FTP-CONNECT
TROJAN:PHATBOT:CMD-CONNECT

TROJAN:QAZ

TROJAN:QAZ:CLIENT-LOGIN
TROJAN:QAZ:TCP25-CALLING-HOME
TROJAN:QAZ:TCP139-SCAN

TROJAN:REMOTE-EXPLORER

TROJAN:REMOTE-EXPLORER:CONNECT

TROJAN:SATANS-BD

TROJAN:SATANS-BD:SERVER-RES

TROJAN:SUBSEVEN

TROJAN:SUBSEVEN:2.2-SERVER-RES
TROJAN:SUBSEVEN:SCAN
TROJAN:SUBSEVEN:SUBSEVEN
TROJAN:SUBSEVEN:SUBSEVEN-HTTP
TROJAN:SUBSEVEN:2.1.A-SRVR-RES

TROJAN:TELNET

TROJAN:TELNET:USER-HIDESOURCE
TROJAN:TELNET:USER-LRKR0X
TROJAN:TELNET:USER-W00W00
TROJAN:TELNET:USER-R00T
TROJAN:TELNET:USER-WH00T
TROJAN:TELNET:USER-FRIDAY
TROJAN:TELNET:USER-HIDEPAK
TROJAN:TELNET:USER-REWT
TROJAN:TELNET:USER-SATORI
TROJAN:TELNET:USER-BACKDOOR
TROJAN:TELNET:USER-HAX0R
TROJAN:TELNET:USER-D13HH

TROJAN:Y3K-RAT

TROJAN:Y3K-RAT:Y3K14-RAT-TCP
TROJAN:Y3K-RAT:Y3K16-RAT-BANNER

TROJAN:YAT

TROJAN:YAT:YAT-BANNER

UDP

UDP:PORT-ZERO
UDP:ZERO-DATA
UDP:SNORT-FRAG3-DETECTION
UDP:XTACACSD-BO
UDP:MS-WINDOWS-TCP-IP-CNTR

VIRUS

VIRUS:HERE-YOU-HAVE
VIRUS:BITCOIN-MINER-BOTNET

VIRUS:POP3

VIRUS:POP3:UUENCODED-DOT-VBS
VIRUS:POP3:EICAR-ATTACHMENT
VIRUS:POP3:NIMDA
VIRUS:POP3:SOBER-K

VIRUS:SMTP

VIRUS:SMTP:DOUBLE-EXTENSION
VIRUS:SMTP:NIMDA
VIRUS:SMTP:EICAR-ATTACHMENT
VIRUS:SMTP:EXE-IN-ZIP
VIRUS:SMTP:UUENCODED-DOT-VBS
VIRUS:SMTP:EXE-ATTACH-1
VIRUS:SMTP:LOCALHOST-HELO
VIRUS:SMTP:ZONEALARM-EXE
VIRUS:SMTP:ASPROX

VNC

VNC:SESSION
VNC:QEMU-KVM-DOS
VNC:GNOME-VINO-VNC-SERVER-DOS
VNC:CHICKEN-VNC-DOS
VNC:AUTH-BYPASS
VNC:LIBVNCSERVER-DIVBYZERO-DOS
VNC:ULTRAVNC-CLIENT-AUTH-OF
VNC:ULTRA-CLIENT-OF

VNC:AUDIT

VNC:AUDIT:UNKNOWN-SERVER-MSG
VNC:AUDIT:UNKNOWN-CLIENT-MSG
VNC:AUDIT:ENCODING-TYPE
VNC:AUDIT:AUTH-STATUS
VNC:AUDIT:SERVER-BITPERPIXEL
VNC:AUDIT:CLIENT-BITPERPIXEL
VNC:AUDIT:AUTH-SCHEME
VNC:AUDIT:AUTH-FAILED
VNC:AUDIT:CONNECT-FAIL

VNC:ERR

VNC:ERR:TOO-MANY-AUTH-FAIL
VNC:ERR:SVR-CUT-TOO-LONG
VNC:ERR:CONFLICT-HEXTILE-MASK
VNC:ERR:BRUTE-FORCE
VNC:ERR:CLNT-CUT
VNC:ERR:SVR-CUT-OVERFLOW
VNC:ERR:NO-AUTH-SCHEME

VNC:INVALID

VNC:INVALID:SERVER-VERSION
VNC:INVALID:NAME-TOO-LONG
VNC:INVALID:SERVER-RESPONSE
VNC:INVALID:CLIENT-VERSION
VNC:INVALID:CLIENT-REQUEST

VNC:OVERFLOW

VNC:OVERFLOW:SET-ENCODINGS
VNC:OVERFLOW:REASON
VNC:OVERFLOW:NAME
VNC:OVERFLOW:CLIENT-CUT-TEXT
VNC:OVERFLOW:AUTH-CHALLENGE
VNC:OVERFLOW:AUTH-STATUS
VNC:OVERFLOW:AUTH-RESPONSE
VNC:OVERFLOW:CLIENT-INIT
VNC:OVERFLOW:RSN-TOO-LONG
VNC:OVERFLOW:REALVNC-MSG-BO
VNC:OVERFLOW:SER-WRT-SCALNG-RCE

VOIP

VOIP:APPLE-FACETIME-REQ
VOIP:CISCO-UCM-OF
VOIP:ASTERISK-CS-OVERFLOW
VOIP:SKINNY-DRV-DOS
VOIP:IAX-INT-OF
VOIP:DIGIUM-ASTERISK-SECBYPASS
VOIP:ASTERISK-IAX2-DOS

VOIP:H225RAS

VOIP:H225RAS:REG-BAD-ID-CHAR
VOIP:H225RAS:URQ-DOS

VOIP:H225RAS:AUDIT

VOIP:H225RAS:AUDIT:UNKN-MESSAGE

VOIP:H225RAS:DOS

VOIP:H225RAS:DOS:LRQ
VOIP:H225RAS:DOS:ARQ
VOIP:H225RAS:DOS:RRQ

VOIP:H225SGN

VOIP:H225SGN:SETUP-NOGRANT-PORT
VOIP:H225SGN:SETUP-NOTGRANT-IP
VOIP:H225SGN:SETUP
VOIP:H225SGN:RELEASE-COMPLETE
VOIP:H225SGN:PROTO

VOIP:MGCP

VOIP:MGCP:INV-CHAR-HIGH
VOIP:MGCP:INVALID-HEX-LOW
VOIP:MGCP:INV-CHAR-LOW
VOIP:MGCP:OVERLONG-UTF8
VOIP:MGCP:UTF8-ERROR
VOIP:MGCP:LINE-OVERFLOW
VOIP:MGCP:INVALID-HEX-HIGH
VOIP:MGCP:DOUBLE-ENCODING

VOIP:MGCP:AUDIT

VOIP:MGCP:AUDIT:INV-PARM-RM
VOIP:MGCP:AUDIT:INV-TRANS-ID
VOIP:MGCP:AUDIT:INV-CMD-HDR
VOIP:MGCP:AUDIT:UNKNOWN-METHOD
VOIP:MGCP:AUDIT:INV-CONN-ID
VOIP:MGCP:AUDIT:INV-RSP-HDR
VOIP:MGCP:AUDIT:INV-IP-DOMAIN
VOIP:MGCP:AUDIT:INV-PARM-NAME
VOIP:MGCP:AUDIT:INV-PARM-RD
VOIP:MGCP:AUDIT:INV-CALL-ID
VOIP:MGCP:AUDIT:INV-EP-NAME

VOIP:MGCP:SDP

VOIP:MGCP:SDP:HEADER-RPT-ERR
VOIP:MGCP:SDP:HEADER-ORD-ERR
VOIP:MGCP:SDP:HEADER-UNK-ERR
VOIP:MGCP:SDP:SYNTAX-ERROR
VOIP:MGCP:SDP:INV-CI
VOIP:MGCP:SDP:INV-ORIGIN
VOIP:MGCP:SDP:VERSION-OF
VOIP:MGCP:SDP:TIME-OF
VOIP:MGCP:SDP:MAL-HEADER
VOIP:MGCP:SDP:MEDIA-PORT-OF

VOIP:MGMT

VOIP:MGMT:VICIDIAL-INFO-DISC
VOIP:MGMT:XPRESSA-HTTP-DOS

VOIP:RTP

VOIP:RTP:FLOW-START-VIDEO
VOIP:RTP:FLOW-START
VOIP:RTP:IAXFLOOD-DOS
VOIP:RTP:RTPFLOOD-DOS

VOIP:SIP

VOIP:SIP:SHORT-REQUEST
VOIP:SIP:OVERSIZED-UDP-MSG
VOIP:SIP:BRUTE-FORCE
VOIP:SIP:MALFORMED-PORT
VOIP:SIP:SECURITY-BAD-SCHEMA
VOIP:SIP:SECURITY-PAR-UFLOW
VOIP:SIP:DOUBLE-ENCODING
VOIP:SIP:SECURITY-PAR-ERR
VOIP:SIP:BRUTE-INV
VOIP:SIP:HEADER-UFLOW
VOIP:SIP:SHORT-RESPONSE
VOIP:SIP:HAMMER
VOIP:SIP:EMERGENCY-NUMBER
VOIP:SIP:EMERGENCY-PRIORITY
VOIP:SIP:SQL-INJ
VOIP:SIP:KEEP-ALIVE-2
VOIP:SIP:UNKNOWN-DATA
VOIP:SIP:SQL-CMD-2
VOIP:SIP:SQL-CMD-1
VOIP:SIP:BYE-AUTH
VOIP:SIP:SESSION-REQ
VOIP:SIP:BIN-IN-AUTH-RESP
VOIP:SIP:SRV-RESP-401
VOIP:SIP:SRV-RESP-400
VOIP:SIP:UNK-SRV-RESP
VOIP:SIP:KEEP-ALIVE
VOIP:SIP:RESPR-INV-OPT-OF
VOIP:SIP:KEEP-ALIVE-3
VOIP:SIP:FMT-STR
VOIP:SIP:INVITE-MSG-DOS
VOIP:SIP:ASTERISK-CHANNEL-DOS
VOIP:SIP:CSCO-INVITE-DOS
VOIP:SIP:ASTERISK-UDPTL-BO
VOIP:SIP:ASTERISK-SDP-MEDIA-DOS
VOIP:SIP:DIGIUM-ASTERISK-DOS
VOIP:SIP:BT-RECON-SVMAP
VOIP:SIP:BT-RECON-ENUMIAX
VOIP:SIP:BT-RECON-SIPSCAN
VOIP:SIP:BT-RECON-SMAP
VOIP:SIP:TEARDOWN-BYE-DOS
VOIP:SIP:INVITEFLOOD-DOS
VOIP:SIP:ASTERISK-RES-DOS
VOIP:SIP:SIPSAK-OPTION-FLOOD
VOIP:SIP:WENGO-PHONE-DOS
VOIP:SIP:CISCO-PHNE-MSG-SEQ-DOS
VOIP:SIP:ASTERISK-RTP-TYPE
VOIP:SIP:MULTI-TECH-INVITE-OF
VOIP:SIP:GS-EAVESDROP

VOIP:SIP:AUDIT

VOIP:SIP:AUDIT:EMPTY-HEADER-VAL
VOIP:SIP:AUDIT:UNK-METHOD
VOIP:SIP:AUDIT:NO-COLON
VOIP:SIP:AUDIT:CONTENT-LENGTH
VOIP:SIP:AUDIT:INV-REQ-HEADER
VOIP:SIP:AUDIT:SYNTAX-ERROR
VOIP:SIP:AUDIT:MISSING-VERSION
VOIP:SIP:AUDIT:UTF8-ERROR
VOIP:SIP:AUDIT:INV-CHARACTER
VOIP:SIP:AUDIT:INV-TERMINATION
VOIP:SIP:AUDIT:INVALID-RCODE
VOIP:SIP:AUDIT:INV-REP-HEADER
VOIP:SIP:AUDIT:UNK-HEADER
VOIP:SIP:AUDIT:URI-ERROR
VOIP:SIP:AUDIT:BAD-IPV6
VOIP:SIP:AUDIT:INV-CHAR-LOW
VOIP:SIP:AUDIT:BAD-IPV4
VOIP:SIP:AUDIT:INVALID-HEX-LOW
VOIP:SIP:AUDIT:DUPLICATE-HEADER
VOIP:SIP:AUDIT:INVALID-HEX-HIGH
VOIP:SIP:AUDIT:INV-CHAR-HIGH
VOIP:SIP:AUDIT:NOT-SIP
VOIP:SIP:AUDIT:INV-CONTACT
VOIP:SIP:AUDIT:INV-CONT-TYPE
VOIP:SIP:AUDIT:INV-CSEQ
VOIP:SIP:AUDIT:INV-FROM
VOIP:SIP:AUDIT:INV-URI
VOIP:SIP:AUDIT:SESSION-HIJACK
VOIP:SIP:AUDIT:TELEPRESENCE
VOIP:SIP:AUDIT:INV-PARA-VIA
VOIP:SIP:AUDIT:INV-INVITE-SRC
VOIP:SIP:AUDIT:INV-VIA-PROT-ID
VOIP:SIP:AUDIT:DUPLICATE-INVITE
VOIP:SIP:AUDIT:INV-CALL-ID

VOIP:SIP:LIMITS

VOIP:SIP:LIMITS:CALL-INFO-OF
VOIP:SIP:LIMITS:CONTACT-OF
VOIP:SIP:LIMITS:CONTENT-LEN-OF
VOIP:SIP:LIMITS:EXPIRES-OF
VOIP:SIP:LIMITS:FROM-OF
VOIP:SIP:LIMITS:CONTENT-TYPE-OF
VOIP:SIP:LIMITS:IN-REPLY-TO-OF
VOIP:SIP:LIMITS:SIP-NEG-CNT-LEN
VOIP:SIP:LIMITS:ACC-OF
VOIP:SIP:LIMITS:MAX-FWRDS-OF
VOIP:SIP:LIMITS:REJ-CONTACT-OF
VOIP:SIP:LIMITS:REQ-DISPO-OF
VOIP:SIP:LIMITS:MIN-EXPIRES-OF
VOIP:SIP:LIMITS:PROX-REQ-OF
VOIP:SIP:LIMITS:ORGANIZATION-OF
VOIP:SIP:LIMITS:ACC-LAN-OF
VOIP:SIP:LIMITS:ACC-ENC-OF
VOIP:SIP:LIMITS:ACC-CONTACT-OF
VOIP:SIP:LIMITS:AUTH-INFO-OF
VOIP:SIP:LIMITS:AUTHORIZ-OF
VOIP:SIP:LIMITS:ALLOW-OF
VOIP:SIP:LIMITS:CALL-ID-OF
VOIP:SIP:LIMITS:ROUTE-OF
VOIP:SIP:LIMITS:PROX-AUTH-OF
VOIP:SIP:LIMITS:PROX-AUTHRIZ-OF
VOIP:SIP:LIMITS:RETRY-AFTER-OF
VOIP:SIP:LIMITS:CONT-ENC-OF
VOIP:SIP:LIMITS:PRIORITY-OF
VOIP:SIP:LIMITS:REC-ROUTE-OF
VOIP:SIP:LIMITS:CSEQ-OF

VOIP:SIP:OVERFLOW

VOIP:SIP:OVERFLOW:LINE-OVERFLOW
VOIP:SIP:OVERFLOW:CHUNK-OF
VOIP:SIP:OVERFLOW:MAX-FORWARD
VOIP:SIP:OVERFLOW:HEADER-OF
VOIP:SIP:OVERFLOW:LINE-OF
VOIP:SIP:OVERFLOW:SECURITY-PAR
VOIP:SIP:OVERFLOW:PORT-OF
VOIP:SIP:OVERFLOW:USERNAME
VOIP:SIP:OVERFLOW:OVERLONG-UTF8
VOIP:SIP:OVERFLOW:METHOD
VOIP:SIP:OVERFLOW:FROM-OF
VOIP:SIP:OVERFLOW:VIA-HOST-OF
VOIP:SIP:OVERFLOW:QPOP-OF
VOIP:SIP:OVERFLOW:HDR-EXP-OF
VOIP:SIP:OVERFLOW:T-38-SDP-OF
VOIP:SIP:OVERFLOW:HDR-URI-OF
VOIP:SIP:OVERFLOW:SIPXTAPI-OF

VOIP:SIP:SDP

VOIP:SIP:SDP:HEADER-ORD-ERR
VOIP:SIP:SDP:SYNTAX-ERROR
VOIP:SIP:SDP:HEADER-UNK-ERR
VOIP:SIP:SDP:HEADER-RPT-ERR
VOIP:SIP:SDP:MEDIA-PORT-OF
VOIP:SIP:SDP:MAL-HEADER-CLT
VOIP:SIP:SDP:TIME-OF
VOIP:SIP:SDP:INV-CI
VOIP:SIP:SDP:MAL-HEADER-STC
VOIP:SIP:SDP:VERSION-OF
VOIP:SIP:SDP:HDR-BOF

VOIP:SKYPE

VOIP:SKYPE:SKYPE-ENCRYPTED
VOIP:SKYPE:INSTALL
VOIP:SKYPE:VERSION-CHECK
VOIP:SKYPE:LOGIN
VOIP:SKYPE:PROBE-1
VOIP:SKYPE:CONNECTION

VOIP:SMPP

VOIP:SMPP:NOKIA-SMS-MMS-DOS

WHOIS

WHOIS:REQUEST-TOO-LONG
WHOIS:TUNNEL
WHOIS:INVALID_EOL
WHOIS:UNEXPECTED-REPLY

WORM

WORM:COMMWARRIORB
WORM:LOVEGATE-INFECTED
WORM:WORM-BROPIA-F
WORM:CHOD.B
WORM:AKAK-TRAFFIC
WORM:DISTTRACK-PROPAGATION
WORM:DISTTRACK-USER-AGENT
WORM:DISTTRACK-CNC
WORM:WIN-URAHU-CNC
WORM:STATS-PHP-IFRAME
WORM:CRYPTO-RANSOM-CNC2
WORM:CRYPTO-RANSOM-CNC3
WORM:THE-MOON-LINKSYS
WORM:MINIFLAME-CNC
WORM:BLACKHOLE-ACTIVITY
WORM:MARE-D-SCAN
WORM:CRYPTOLOCKER-RACKETEER
WORM:CHUNKED-WORM

WORM:AGOBOT

WORM:AGOBOT:PY-HTTP-PROP
WORM:AGOBOT:SASSER-FTP-OF

WORM:BAGLE

WORM:BAGLE:Q-HTTP
WORM:BAGLE:HTTP-BACKDOOR
WORM:BAGLE:AF-HTTP

WORM:BERBEW

WORM:BERBEW:KEYLOGGER-UPLOAD

WORM:BLASTER

WORM:BLASTER:BACKDOOR-CMD

WORM:CODERED

WORM:CODERED:INFECTION-ATTEMPT

WORM:CODERED-2

WORM:CODERED-2:INFECT-ATTEMPT

WORM:CONFICKER

WORM:CONFICKER:C-ACTIVITY
WORM:CONFICKER:C-ACTIVITY-2

WORM:DABBER

WORM:DABBER:TFTP-TRANSFER
WORM:DABBER:B-BACKDOOR-CMD
WORM:DABBER:SASSER-PROBE

WORM:EMAIL

WORM:EMAIL:SOBIG-DL-REQUEST

WORM:FIZZER

WORM:FIZZER:IRC-CHAN-2
WORM:FIZZER:IRC-CHAN-1

WORM:LOVGATE

WORM:LOVGATE:P-NET-SHARE-SPREAD
WORM:LOVGATE:BACKDOOR-LOGIN

WORM:MASLAN

WORM:MASLAN:IRC-BACKDOOR-CON

WORM:MIMAIL

WORM:MIMAIL:MIMAIL.A

WORM:MOFEI

WORM:MOFEI:MOFEI-BACKDOOR3
WORM:MOFEI:MOFEI-BACKDOOR2
WORM:MOFEI:MOFEI-B-PROPAGATION

WORM:MYTOB

WORM:MYTOB:ED-IRC

WORM:NACHI

WORM:NACHI:B-C-D-INFECT-ATTEMPT
WORM:NACHI:D-WEBDAV-ATK

WORM:NETSKY

WORM:NETSKY:V-SMTP-PROP

WORM:NIMDA

WORM:NIMDA:NIMDA-RICHED20
WORM:NIMDA:BIN-255-CMD
WORM:NIMDA:EMAIL-PROP
WORM:NIMDA:NIMDA-NWS
WORM:NIMDA:NIMDA-EML
WORM:NIMDA:SCRIPTS-CMD
WORM:NIMDA:SCRIPTS-C11C-CMD
WORM:NIMDA:MSADC-ROOT
WORM:NIMDA:SCRIPTS-ROOT

WORM:PHPINCLUDE

WORM:PHPINCLUDE:EXPLOIT
WORM:PHPINCLUDE:SEARCH-REQ

WORM:SANTY

WORM:SANTY:GOOGLE-SEARCH
WORM:SANTY:INFECT-ATTEMPT

WORM:SASSER

WORM:SASSER:A-D-F-SHELL-CMD
WORM:SASSER:FTP-SRV-OVERFLOW
WORM:SASSER:A-D-F-FTP-DL-5554

WORM:SDBOT

WORM:SDBOT:DX-IRC-BEACON
WORM:SDBOT:OH-BACKDOOR-COMMAND

WORM:SLAMMER

WORM:SLAMMER:INFECT-ATTEMPT

WORM:SLAPPER

WORM:SLAPPER:C2-INFEC
WORM:SLAPPER:C-INFECT
WORM:SLAPPER:AION-INFECT
WORM:SLAPPER:B-INFECT
WORM:SLAPPER:WORM-INFECT
WORM:SLAPPER:CINIK-SRC

WORM:SMB

WORM:SMB:BUGBEAR-B
WORM:SMB:DELODER
WORM:SMB:DELODER-2
WORM:SMB:W32-SLACKOR

WORM:SQL-SNAKE

WORM:SQL-SNAKE:MSSQL-REG-2
WORM:SQL-SNAKE:MSSQL-REG-3
WORM:SQL-SNAKE:MSSQL-REG-1

WORM:WITTY

WORM:WITTY:INFECT-ATTEMPT

WORM:ZAFI

WORM:ZAFI:D-BACKDOOR-UPL

X11

X11:XFS-SWAP-CHAR
X11:X11-XC-QUERY-SECURITY
X11:XFS-QUERYX

APP:ENCRYPTED-TRAFFIC-1

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the least strict, and should catch the most traffic, but might trigger on non-encrypted traffic.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-3

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the most strict, and should create the fewest false positives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-2

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is moderately strict, and is a compromise between false-positives and false-negatives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:NAV-ENT-WEB-OF

Description

This signature detects attempts to exploit a known vulnerability in Norton Antivirus Enterprise (NAV). A successful attack can lead to a stack overflow causing a denial of service or arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

An attacker could exploit the vulnerability to execute arbitrary code with System level privileges.

References

APP:HP-SAN-IQ-CMD-INJ

Description

This signature detects attempts to exploit a known vulnerability in the HP SAN iQ Appliance. A successful attack can lead to command injection within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

lhn/public/network/ping in HP SAN/iQ 9.5 on the HP Virtual SAN Appliance allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) first, (2) third, or (3) fourth parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4361.

Affected Products

References

APP:WINCOM-AUTH-BO

Description

This signature detects attempts to exploit a known vulnerability against WinComLPD. A successful attack allows attackers to execute arbitrary code with the privileges of the user running the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Integer overflow in the remote administration protocol processing in Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to cause a denial of service (crash) via a large string length argument, which triggers memory corruption.

Affected Products

References

APP:GIOP-COMM

Description

This signature detects properly formatted GIOP communication. This signature triggers when your network is carrying Object Request Broker traffic.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:JONDO-PROXY

Description

This signature detects the runtime behavior of Jondo Privacy Generator. Jondo is a proxy application that enables users to re-route communication through an encrypted pipe. This is usually used to bypass corporate network usage policies.

Severity

INFO

Group

APP

Supported By

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:LINUX-SCTP-FWD-TSN-BO

Description

This signature detects attempts to exploit a known vulnerability against Linux SCTP Handler. A successful exploit can lead to buffer overflow and remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.

Affected Products

References

APP:YOUSENDIT

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:HP-FAULTDOWNLOADSERVLET

Description

This signature detects attempts to exploit a known vulnerability against HP Intelligent Management Center. A successful attack can lead to information disclosure.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1612.

Affected Products

References

APP:IPSO-FILE-VIEW

Description

This signature detects attempts to exploit a known vulnerability in "Voyager", a Web GUI included with Nokia IP-boxes. IPSO 3.6-FCS6 and other versions are vulnerable. Attackers can use Voyager to instruct a CGI script to view the contents of arbitrary files on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It has been reported that Nokia IPSO does not properly handle some types of requests through Voyager. Because of this, an attacker with access to the interface may be able to view potentially sensitive information.

Affected Products

References

APP:HP-DATA-PROTECTOR-MMD-BOF

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Manager MMD Service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability because of an access violation error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager A.06.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:NOVELL-SECURITY-BYPASS

Description

This signature detects attempts to exploit a known vulnerability against Novell Sentinel Log Manager. This can result in the creation of unauthorized data retention policies.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Novell Sentinel Log Manager before 1.2.0.3 allows remote attackers to create data retention policies via a crafted text/x-gwt-rpc request to novelllogmanager/datastorageservice.rpc, and allows remote authenticated Report Administrators to create data retention policies via a search-results "Save Query As" "Save As Retention Policy" action.

Affected Products

References

APP:HP-STORAGEWORKS-OPC22-BO

Description

This signature detects an attempt to exploit a known vulnerability against HP StorageWorks application. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:HP-DATA-PRTCTR-OPCODE

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-2008.

Affected Products

References

APP:HP-DATA-PRTCTR-OP267-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP OpenView Storage Data Protector is prone to a stack-based buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise affected computers. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was previously covered in BID 37386 (HP OpenView Storage Data Protector Multiple Remote Code Execution Vulnerabilities), but has been assigned its own record to better document it.

Affected Products

References

APP:HPE-DATA-PROTECT-USR-BO

Description

This signature detects attempts to exploit a known vulnerability in the OmniInet.exe component of HPE Data Protector. Successful exploitation could lead to arbitrary code execution under the security context of SYSTEM.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC

Description

This signature detects attempts to exploit a known vulnerability against EMC AlphaStor Library Manager. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

robotd in the Library Manager in EMC AlphaStor 3.1 SP1 for Windows allows remote attackers to execute arbitrary commands via an unspecified string field in a packet to TCP port 3500.

Affected Products

References

APP:COLDFUSIONMX-ACC

Description

This signature detects attempts to access the fileprobe.cfm. With default settings, Macromedia ColdFusion MX will return an error message containing the full path of the ColdFusion software. Versions 6.x are vulnerable.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A vulnerability has been reported for Macromedia ColdFusion MX that may reveal the physical path information to attackers. When certain malformed URL requests are received by the server, an error message is returned containing the full path of the ColdFusion installation.

Affected Products

References

APP:HP-DATA-PRTCTR-OP28-11

Description

An command execution vulnerability exists in Hewlett-Packard Data Protector. The vulnerability is due to the a design weakness when handling requests to port 5555. A remote attacker can exploit this vulnerability by sending crafted packets to the target service. Successful exploitation could lead to arbitrary command execution with System privileges on the target server.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 8.x allows remote attackers to execute arbitrary code via unknown vectors.

Affected Products

References

APP:WINMAIL-PATH-DIS

Description

This signature detects attempts to access a vulnerable Winmail module. A successful exploit can allow attackers to obtain information about the server's internal structure.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:VMS-8.3.5-CMD-EXE

Description

This signature detects an attempt to redirect the flow of the VisNetic MailServer administration interface. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:PEER2MAIL

Description

This signature detects the Peer2Mail application. Peer2Mail allows files to be stored on a mail server as e-mail attachments for later retrieval from another computer. This can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:WINPRICE

Description

This signature detects activity of the WinPrice client, an application made by Quatrain (http://www.katren.ru) for purchasing prescription drugs over the Internet. This activity may be illegal in your area.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:GOOG-PICASA

Description

This signature detects the activity of the Google Picasa Client. Picasa is a photo repository, editing, and uploading client by Google Inc.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:MOZY-ACTY

Description

This signature detects the activity of the Mozy Backup Client. Mozy is an on-line file backup service provided by Berkeley Data Systems.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:OPENVIEW-STORAGE-BO

Description

This signature detects an attempt to exploit a Buffer Overflow vulnerability against HP Open View Storage. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:FEDORA-DIR-SER-INFO-LEAK

Description

This signature detects an information disclosure attack against the Fedora directory service. Fedora Directory Server 1.0.2 DSGW is vulnerable to an information leakage that can allow an attacker to retrieve multiples files on the system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:CHKPOINT-FW-INFO-DISC

Description

This signature detects attempts to exploit an information disclosure vulnerability in Checkpoint Firewall WebUI. Due to insufficient sanitization of user input, attackers can gain access to arbitrary files on the targeted system.

Severity

MEDIUM

Group

APP

Supported By

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:FREEPBX-ARI-DOS

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Asterisk Recording Interface (ARI) webui. A malformed request can result in a denial of service of the Web interface.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The Asterisk Recording Interface is prone to the following issues: 1. Multiple security bypass vulnerabilities. 2. A cross-site request-forgery vulnerability. 3. A cross-site scripting vulnerability. Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Affected Products

References

APP:CHROME-ENGINE-4-DOS

Description

This signature detects attempts to exploit a known vulnerability in the Chrome Engine 4. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Chrome Engine 4 is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected server, resulting in denial-of-service conditions. Chrome Engine version 4 is vulnerable; other versions may also be affected.

Affected Products

References

APP:EMC-NSRINDEXD-BO

Description

This signature detects attempts to exploit a known vulnerability in EMC NetWorker. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.

Affected Products

References

APP:EMC-DATA-PROTECTION-DOS

Description

This signature detects attempts to exploit a known vulnerability against EMC Data Protection Advisor. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:CLAMAV-UPX-OF-HTTP

Description

This signature detects attempts to exploit a known vulnerability in ClamAV. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

ClamAV is prone to a remote buffer-overflow vulnerability. This condition occurs when the program processes malformed UPX-compressed executables. Successful exploitation may result in the execution of arbitrary code in the context of the application.

Affected Products

References

APP:SITEMINDER-AUTH-REDIR

Description

This signature detects attempts to exploit a known vulnerability in Netegrity's Siteminder application. Attackers can send a maliciously formatted hyperlink designed to trick users into believing they are logging into their Siteminder server. Instead, the hyperlink redirects the user's authentication information to a server under the attacker's control, enabling the attacker to obtain the user's login information.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:RETRO-CL-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC Retrospect Client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Dantz Retrospect Backup Client is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

Affected Products

References

APP:HP-INSIGHT-MANAGER-RCE

Description

This signature detects attempts to exploit a known vulnerability against Hewlett-Packard Insight Manager. A successful exploit can lead to the remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:VIDEOSPIRIT-OF

Description

This signature detects attempts to exploit a known vulnerability in the VideoSpirit Pro. A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name.

Affected Products

References

APP:ZEND-SERVER-JAVA-RCE

Description

This signature detects attempts to exploit a known vulnerability against Zend Server Java Bridge. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Zend Server is prone to a remote code-execution vulnerability in the Zend Java Bridge component. Successful exploits can allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

References

APP:HP-MEDIA-SIGN-IN-NAME-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations SignInName Parameter. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Media Operations is prone to a remote denial-of-service vulnerability that occurs because of a NULL-pointer dereference error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Media Operations 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:MCAFEE-FIREWALL-RCE

Description

This signature detects attempts to exploit a known vulnerability against McAfee Firewall. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

McAfee Firewall Reporter is prone to an authentication-bypass vulnerability. Successfully exploiting this issue will allow attackers to point the 'cgisess' cookie value to an arbitrary file that exists on the server, bypassing certain security restrictions. This issue may allow websites to bypass certain security restrictions and gain access to potentially sensitive information. This issue was introduced in McAfee Firewall Reporter 5.1.0.6

Affected Products

References

APP:HP-DATA-PRTCTR-EXEC_CMD-RCE

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Client. Attackers can send a maliciously crafted message that could cause arbitrary commands to be executed with SYSTEM privileges.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP OpenView Storage Data Protector is prone to multiple remote code-execution vulnerabilities that affect the Cell Manager and Client components. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

References

APP:SVN-DATE-SERVE

Description

This signature detects attempts to exploit a known vulnerability in the