Juniper Networks

Index

APP

APP:ENCRYPTED-TRAFFIC-3
APP:ENCRYPTED-TRAFFIC-1
APP:ENCRYPTED-TRAFFIC-2
APP:NAV-ENT-WEB-OF
APP:CONEXANT-LOGIN
APP:HP-SAN-IQ-CMD-INJ
APP:WINCOM-AUTH-BO
APP:GIOP-COMM
APP:JONDO-PROXY
APP:LINUX-SCTP-FWD-TSN-BO
APP:HP-MGMT-CENTER-BO
APP:YOUSENDIT
APP:INDUSOFT-WEBSTUDIO-RCE
APP:SUPERSCOUT-USERDB
APP:NTOP-WEB-FS1
APP:RH-ICOMMERCE-ANYFILE
APP:HP-DATA-PROTECTOR-MMD-BOF
APP:IPSO-FILE-VIEW
APP:CUPS-GIF-BO
APP:HP-STORAGEWORKS-OPC22-BO
APP:POSTFIX-IPV6-RELAYING-ISSUE
APP:WINMAIL-PATH-DIS
APP:BRG-MAIL-US-PASS
APP:POSTFIX-GLD-FS
APP:COLDFUSIONMX-ACC
APP:MERCURY-BOF
APP:VMS-8.3.5-CMD-EXE
APP:PEER2MAIL
APP:HP-LOADRUNNER-RCE
APP:WINPRICE
APP:SENTINEL-LM-OF
APP:GOOG-PICASA
APP:MOZY-ACTY
APP:EMC-ALPHA-BO
APP:SVN-DATE-SERVE
APP:OPENVIEW-STORAGE-BO
APP:BORLAND-STARTEAM
APP:FEDORA-DIR-SER-INFO-LEAK
APP:RETRO-CL-BO
APP:CHKPOINT-FW-INFO-DISC
APP:SVN-DATE-OF
APP:CHROME-ENGINE-4-DOS
APP:EMC-NSRINDEXD-BO
APP:SOLARWINDS-LOG-EVENT-MANAGR
APP:EMC-DATA-PROTECTION-DOS
APP:FREEPBX-ARI-DOS
APP:SITEMINDER-AUTH-REDIR
APP:CLAMAV-UPX-OF-HTTP
APP:AFP-LEN-OF
APP:VINZANT-ARCHTCTR-AUTHWKNESS
APP:HP-LEFTHAND-HYDRA-PING-OF
APP:HP-INSIGHT-MANAGER-RCE
APP:ZEND-SERVER-JAVA-RCE
APP:HP-MEDIA-SIGN-IN-NAME-DOS
APP:EMC-ALPHASTOR-LIB-BOF
APP:HP-PROCURVE-FILE-UPLD-SSL
APP:LANDESK-QIP-HEAL
APP:APPLE-MACOSX-ODP-RCE
APP:BAOFENG-STORM-PLAYLIFL-BO
APP:HP-LOADRUNNER-SSL
APP:WEBSENSE-FAV-BYPASS
APP:MCAFEE-FIREWALL-RCE
APP:HP-MGMT-DBMAN-OF
APP:HP-DATA-PROTECTOR-OP-DOS
APP:HP-DATA-PRTCTR-EXEC-BAR-CE
APP:FLASH-RTMP-RESP
APP:ADOBE-FLASH-RTMP-RCE
APP:EMBARCADERO-CONNECT-OF
APP:HP-DATA-PROTECTOR-DOS
APP:LANDESK-OF
APP:PEERCAST-FS
APP:APPLE-CUPS-PNG-FILTER-OF
APP:SQUID-HTCP-DOS
APP:WEBSENSE-TRITON-RCE
APP:QUEST-BIG-BRO-FD
APP:RIM-BLACKBERRY-DOS
APP:HP-DATA-PRTCTR-EXEC_SETUP
APP:ADOBE-FLASH-MEDIA-SRVR
APP:VMAUTH-FS
APP:RDP-BRUTE-FORCE
APP:HP-PM-EXP-DATA-LOGS
APP:HP-DATA-PRTCTR-EXEC_CMD-BO
APP:MAL-AFP-DSI-REQ
APP:SAFENET-VPN-OF
APP:CPANEL-RESETPASS
APP:KINDLE-BROWSER-NPAPI-RCE
APP:NOW-SMS-OF-MSF
APP:CDE-DTSPCD-OF
APP:POSTFIX-GREYLISTD-OF
APP:MCAFEE-ORCH-BO
APP:JBOSS-JMX-AUTH-BYPASS
APP:HP-DATA-PRTCTR-OPCODE
APP:INTERSYSTEMS-CACHE-OF
APP:BOMBER-BO
APP:IA-WEBMAIL-OF
APP:VIDEOSPIRIT-OF
APP:YOUSENDIT-ENCRYPTED
APP:VMWARE-SPRING-CLASSLOADER
APP:HP-DATA-PRTCTR-RDS-DOS
APP:AGENTX-RECEIVE-INT-OF
APP:TRACKERCAM-OF
APP:SPREECOMMERCE-RCE
APP:CHKPOINT-FW-WEBUI-REDIRECT
APP:FCKEDITOR-RCE-UPLOAD
APP:NOW-SMS-OF
APP:HP-PWR-MGR-DIR-TRAV
APP:DISKPULSE-GETSERVERINFO-OF
APP:RSLOGIX-RSVCHOST-DOS
APP:APPLE-SIRI
APP:HP-DATA-PROTECTOR-GET-SQL
APP:HP-DATA-PROTECTOR-REQ-SQL
APP:EMC-NETWORKER-NSRD-BO
APP:GFI-FAXMAKER-DOS
APP:GROK-NETPROXY-SEC-BYPASS
APP:DELL-OPENMANAGE-BO
APP:QNX-QCONN-CMDEXEC
APP:FLASH-SRV-DOS
APP:EMC-ALPHASTORE-CMDEXEC
APP:HP-INTELLIGENT-INFO-DISC
APP:EIQ-NET-SEC-ANALYZER-DOS
APP:MCAFEE-ORCHESTRATOR-FS
APP:DIGIUM-IAX2-DOS
APP:BAKBON-NETVAULT-HEAP-OF
APP:MERCURY-PH-BO
APP:VERITAS-ADMIN-BO
APP:MCAFEE-EBUSINESS-RCE
APP:BULLETPROOF-FTP-BPS-BOF
APP:HP-PROCURVE-FUPLOAD-SSL
APP:QEMU-VNC-SETPIXEL-PTR-DEREF
APP:CAIN-ABEL-CISCO-IOS-BOF
APP:HP-MGMT-UAM-BO
APP:EMC-AUTOSTART-BOF
APP:XEROX-WORKCENTRE-BOF
APP:ASUS-DPC-PROXY-BO
APP:WEBMOD-AUTH.W-INFO-DISC
APP:NOW-SMS-GW-OF
APP:APPIAN-BPM-SUITE-DOS
APP:INTELLITAMPER-HREF-BO
APP:HTTPD-MODLOG-COOKIE
APP:MCAFEE-EPOLICY-XSS
APP:INTELLITAMPER-LCTION-HDR-BO
APP:ACOUSTICA-MIXCRFT-MX4-FL-BO
APP:ICARUS-PGN-FILE-BO
APP:APPLE-QT-NULL-DOS
APP:BULLETPROOF-FTP-CLNT-BM-BO
APP:AUDACITY-AUP-BO
APP:HP-LASERJET-EWS-XSS
APP:ASHAMPOO-BURN-SDO-ASHPRJ-BO
APP:ACRONIS-TRU-IMG-ECO-SRV-DOS
APP:BULLETPROOF-FTP-BPS-FILE-BO
APP:BAKBON-NETVAULT-INT-OF
APP:LENOVO-RCE-UPLOAD
APP:REALNETWORKS-HELIXSRV-DOS
APP:PROGEA-MOVICON-BO
APP:BLUECOAT-AAA-OF
APP:AVAYA-CCRWEBCLIENT-RCE
APP:HP-DATA-PROTECTOR-SQL
APP:EMC-NETWORKER-NSRINDEXD-OF
APP:CUPS-IPP-RCE
APP:NOVELL-EDIR-LEN-DOS
APP:INDUSOFT-WEB-STUDIO-BO
APP:INDUSOFT-WEB-STUDIO-RCE
APP:DIGIUM-ASTERISK-MGR-CMDEXEC
APP:SIEMENS-SIMATIC-WINCC-BO
APP:GOOLE-SKETCHUP-3DS-FILE-MC
APP:VMWARE-VCENTER-CHARGEBACK
APP:HP-STORAGEWORKS-CIFS
APP:HP-SITESCOPE-CMD-INJ
APP:GE-PROFICY-RT-DIRTRAVERSAL
APP:LANDESK-THINKMGT-DIRTRVRSAL
APP:DIGIUM-ASTERISK-SKINNY-DOS
APP:FREEPBX-RECORDING-RCE
APP:HP-OPENVIEW-DTPRTCTR-BO
APP:ASTIUM-PBX-DOS
APP:IPMI-CIPHER-ZERO
APP:BIGANT-USV-BOF
APP:BIGANT-SCH-CMD-BOF
APP:HP-PROCURVE-BYPASS
APP:ICECAST-BOF
APP:FREEPBX-FILE-UPLOAD
APP:DIGIUM-IAX2-POKE-DOS
APP:HP-LEFTHAND-VIRT-SAN
APP:HP-SM-RCE
APP:DIGIUM-ASTERISK-OF
APP:HP-PROCRVE-SNAC-FILE-UPLD
APP:HP-MGMT-FILE-UPLOAD
APP:GIMP-SCRIPTFU-OF
APP:HP-LIPS-HSSPD
APP:DISTCC-EXEC
APP:HP-OPNVW-STORAGE-DATA-BO
APP:REPLISTOR-DOS
APP:GTS-WAP-PASSDISC
APP:MCAFEE-DLP-MGR-INFO-DISCL
APP:HP-DATA-PRTCTR-OP1092-BO
APP:BLUECOAT-BCAAA-BOF
APP:2WIRE-DSL-VULN
APP:HP-DATA-PROC-NEW-FOLDER
APP:INVISIONIX-RS-RFI
APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC
APP:MCAFEE-EPOLICY-SQLI
APP:HP-DATA-PRTCTR-DBSERVER-BO
APP:HP-DATA-PRTCTR-EXEC_CMD-RCE
APP:WIRESHARK-LWRES
APP:TROLLTECH-QT-BMP-OF
APP:SVN-PROTOCOL-STRING-OF
APP:HP-NNM-HLEN-BOF
APP:HP-OPNVIEWSTORAGE-BOF
APP:HP-MGMT-BIMS-FILE-UPLOAD
APP:HORDE-WEBMAIL-CSRF
APP:AGENTX-RECEIVE-OF
APP:SUN-JAVA-SERVER-ADMIN-DOS
APP:HP-REPORTIMGSERVLET
APP:HP-FAULTDOWNLOADSERVLET
APP:HP-LOGIN-BOF
APP:HP-ACMSERVLETDOWNLOAD
APP:HP-ICTDOWNLOADSERVLET
APP:ADOBE-COLDFUSION-WEBSOCKET
APP:HP-DATA-PRTCTR-OP267-BO
APP:YOUNGZSOFT-CONNECT
APP:SUN-JAVA-SYSCAL-TZID-DOS
APP:ACCELLION-FILE-TRANSFER
APP:VMWARE-ISAPI-DOS
APP:PEERCAST-CMD-BOF
APP:HP-DATA-PRTCTR-OP1091-305
APP:HP-SYS-MANGMNT-CMD-INJ
APP:EMC-ALPHASTOR-BOF
APP:HP-DATA-PRTCTR-OP215-263
APP:HP-PROCURVE-FILE-UPLOAD
APP:HP-VIRTUAL-SAN
APP:WEBSENSE-PROXY-BYPASS
APP:HP-MGMT-IMG-OF
APP:HP-DATA-PROTECTOR-DTBCLS-OF
APP:HP-DATA-PRTCTR-OP45-46
APP:MEDIAWIKI-RCE
APP:VLC-RTSP-PLUGIN-BO
APP:HP-DATA-PRTCTR-OP-27
APP:VMWARE-OVF-FMTSTR
APP:HP-DATA-PRTCTR-OP259-BO
APP:HPLOADRUNNER-XDR-BO
APP:EMC-REPLICATION-MGR-CMD-EXE
APP:HP-AIO-BO
APP:WINMEDIASRV-RCE
APP:SBS-TRAINING-OF2
APP:MS-SNABASE-EXE-DOS
APP:MS-SMS-DOS
APP:HP-DIAGNOSTICS-OF
APP:HP-DATA-PRTCTR-OP227-BO
APP:HP-DATA-PRTCTR-OP260-BO
APP:HP-SYS-IPRANGE-OF
APP:MCAFEE-WR-JBOSS-RCE
APP:EMC-PACKT-INJ-COM-EXEC
APP:EMC-NETWORKER-BYPASS
APP:WEBSENS-TRITON-RCE
APP:EMC-NSRINDEXD-DOS
APP:EMC-DATAPROTECTION-NULL-DOS
APP:MSDOTNET-CVE-2014-1806
APP:MCAFEE-EPOLICY-XML
APP:SOPHOS-WA-PWD-CHG
APP:XEROX-DS-SQ-INJ
APP:EMC-CMCNE-INFO-DISC
APP:OSSIM-COMMAND-EXEC
APP:MCAFEE-AM-INFO-DISC-SSL
APP:MCAFEE-DIR-TRAVERSAL
APP:NAV-ENT-WEB-OF-2
APP:HP-SYS-RCE
APP:MCAFEE-AM-INPUT
APP:SOPHOS-WA-PWD-CHG-SSL
APP:DIGIUM-ASTERISK-COOKIE-OF
APP:SOPHOS-WEBAPP-CMDEXEC-SSL
APP:MCAFEE-AM-INPUT-SSL
APP:OBSERVICED-OF
APP:PERSISTENT-COMMAND-EXEC
APP:ASUS-WRT-INFOSVR-COMND-EXEC
APP:CLAMAV-UPX-OF-SMTP
APP:HP-LOADRUNNER-BO
APP:HPIM-SOM-EUACCNT-BYPASS
APP:ISCSI-TARGET-FMT-STR
APP:HP-MGMT-SOM-SDFILE
APP:HP-PROCRVE-MANAGER-CE
APP:ISCSI-TARGET-OF
APP:ALTN-WORLDCLIENT-MEM
APP:HP-MGMT-TFTP-MODE-RCE
APP:EMC-APLHASTORE-FMTSTR
APP:HP-MGMT-TFTP-DATA-OF
APP:HP-DATA-PRTCTR-OP235-BO
APP:HP-DATA-PRTCTR-OP234-BO
APP:ASTERISK-PJSIP-MODULE-DOS
APP:HP-STORAGEWORKS-BO
APP:HP-DATA-PRTCTR-MULTI-OP-OF
APP:HP-DATA-PRTCTR-OP211-264
APP:SQUID-SNMPHANDLEUDP-CE
APP:NOVELL-NET-FTP-DEL-CMD-OF
APP:HP-DATA-PROTECTOR-SIGN-DOS
APP:SECURECRT-CONF
APP:ZLIB-COMPRES-LIB-DOS
APP:HP-DBARCHIVE-GIOP-BO
APP:WSDAPI-OF
APP:ADOBE-CF-DIR-TRAV
APP:SQUID-HTTPVER-DOS
APP:HP-LEFTHAND-HYDRA-INFO-DISC
APP:VMWARE-ESX-SOAP-DOS
APP:HP-LEFTHAND-HYDRA-DIAG-OF
APP:SUNPROXY
APP:ABB-NETSCANHOST-OF
APP:MS-SNBASE
APP:FLEXERA-FLXNETPUB-IMGRD-BO
APP:SOPHOS-WEBAPP-CMDEXEC
APP:HP-DATA-PRTCTR-OP28-11
APP:NOVELL-SECURITY-BYPASS
APP:EIQ-LM-OF
APP:HP-DATA-PRTCTR-OP42-DIR-TRV
APP:BIGANT-SERVER-FILE-UPLOAD
APP:HP-STORAGEWORKS-BOF
APP:UNIVERSAL-CMDB-AXIS2-RCE
APP:NETSUPPORT-MANAGER-BO
APP:HP-INODEMNGCHECKER-EXE-BOF
APP:LIBGTOP-FMT-STR
APP:SCOHELP-OF1
APP:HP-INTELLI-MGMT-TFTP-BO
APP:OBSERVICED-BOF
APP:FREEPBX-CALLMENUM
APP:HP-PROTECTOR-DIR-TRAV
APP:EMC-DOS
APP:ROCKET-SERVERGRAPH-CE
APP:HP-DATA-PRTCTR-OPCODES
APP:HP-DATA-PROTECTOR-FIN-SQL
APP:RDP-ISO-RECV-MSG-IUF

APP:AI

APP:AI:PARTIAL-MATCH
APP:AI:NO-MATCH
APP:AI:PROTOCOL-MISMATCH

APP:AMANDA

APP:AMANDA:AMANDA-ROOT-OF1
APP:AMANDA:AMANDA-ROOT-OF2

APP:APT-WWW-PROXY

APP:APT-WWW-PROXY:AWPLOG-DOS

APP:ARKEIA

APP:ARKEIA:DEFAULT-PASSWORD
APP:ARKEIA:AGENT-CONFIG
APP:ARKEIA:DEFAULT-ADMIN-PW
APP:ARKEIA:TYPE-77-OF
APP:ARKEIA:AGENT-ACCESS

APP:BORLAND

APP:BORLAND:STARTEAM-MPX-OF
APP:BORLAND:VISIBROKER

APP:CA

APP:CA:LIC-COMMAND-OF
APP:CA:ETRUST-ID-KEY-DOS
APP:CA:IGATEWAY-CNT-LEN-OF
APP:CA:RPC-MSG-OF-2
APP:CA:ALERT-SRV-OF
APP:CA:MESSAGE-QUEUE-HEAP
APP:CA:PRODUCT-DISC-BOF
APP:CA:LIC-PUTOLF-OF
APP:CA:IGATEWAY-DEBUG
APP:CA:LIC-GETCONFIG-OF2
APP:CA:ECSQDMN-DOS
APP:CA:CONSOLE-LOGIN-OVERFLOW
APP:CA:RPC-MSG-OF
APP:CA:LOG-SEC-BOF
APP:CA:LIC-GCR-OF-SVR
APP:CA:LIC-GETCONFIG-OF-SVR
APP:CA:LIC-GCR-OF-CLT
APP:CA:LIC-GETCONFIG-OF-CLT
APP:CA:IGATEWAY-BOF
APP:CA:RPC-MSG-BO
APP:CA:INTERNET-SECURITY-SUITE
APP:CA:DBA-SVR-POINT
APP:CA:DBASVR-POINT

APP:CA:ARCSRV

APP:CA:ARCSRV:UNICENTERAGENT-2
APP:CA:ARCSRV:TAPE-ENGNE-DOS
APP:CA:ARCSRV:BCK-MESSAGE
APP:CA:ARCSRV:RPC-MEMRCORRUPT
APP:CA:ARCSRV:LGSERVER-CMDNAME
APP:CA:ARCSRV:RPC-MEMCORRUPT
APP:CA:ARCSRV:BACKUP-CMD-EXEC
APP:CA:ARCSRV:BME-OP-117
APP:CA:ARCSRV:METHD-EXPOSURE
APP:CA:ARCSRV:LOGGERD-DOS
APP:CA:ARCSRV:CAMEDIASRV-UDP
APP:CA:ARCSRV:UNICENTERAGENT-OF
APP:CA:ARCSRV:BCK-MSG
APP:CA:ARCSRV:RPC-TAPE-ENG
APP:CA:ARCSRV:TCP-BOF
APP:CA:ARCSRV:HSM-OF
APP:CA:ARCSRV:GWT-INFO-DISC
APP:CA:ARCSRV:CALOGGERD-BO
APP:CA:ARCSRV:XDR-PARSING-BO
APP:CA:ARCSRV:LGSERVER-HSHAKE
APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS
APP:CA:ARCSRV:BCKUP-AUTHSRV-CE
APP:CA:ARCSRV:MOBILE
APP:CA:ARCSRV:PORTMAPPER
APP:CA:ARCSRV:MAILSLOT-OF
APP:CA:ARCSRV:D2D-AXIS2-RCE
APP:CA:ARCSRV:BRIGHTSTOR-BKP-BO
APP:CA:ARCSRV:FILE-UPLOAD
APP:CA:ARCSRV:UA-OF
APP:CA:ARCSRV:CAMEDIASRV
APP:CA:ARCSRV:MOBILE-2
APP:CA:ARCSRV:TAPE-OP-207
APP:CA:ARCSRV:DIRTRAV
APP:CA:ARCSRV:MEDIASERVER-BO
APP:CA:ARCSRV:DISCSRV-DOS
APP:CA:ARCSRV:TAPE-ENGINE-DOS
APP:CA:ARCSRV:METHOD-EXPOSURE
APP:CA:ARCSRV:LG-SERVER-RCE
APP:CA:ARCSRV:SQLOF
APP:CA:ARCSRV:LGSERVER-AUTH-USR
APP:CA:ARCSRV:LGSERVER-AUTH

APP:CISCO

APP:CISCO:ACS-FS
APP:CISCO:REGISTRAR-AUTH-BYPASS
APP:CISCO:CNS-NETWORK-DOS
APP:CISCO:LAN-MGMT-SOL-RCE
APP:CISCO:ACS-OF
APP:CISCO:FW-SCCP-DOS
APP:CISCO:VIDEO-SURVEILANCE-XSS
APP:CISCO:VIDEO-SURVEILANCE-LFI
APP:CISCO:SECUREACS-AUTH-BYPASS
APP:CISCO:SECURITY-AGENT-CE
APP:CISCO:NX-OS-PRIV-ESC

APP:CITRIX

APP:CITRIX:AGENT-OF-2
APP:CITRIX:AG-CMD-INJ
APP:CITRIX:IMA-BO
APP:CITRIX:META-IMA-AUTH
APP:CITRIX:STEAM-OF
APP:CITRIX:PROVISIONING-OPCODE
APP:CITRIX:PROVISIONINGSERV-UF
APP:CITRIX:XENAPP-XML-RCE
APP:CITRIX:NSEPACOM-BOF
APP:CITRIX:STREAMPROCESS-BOF
APP:CITRIX:AGENT-OF

APP:CUPS

APP:CUPS:APPLE-DOSELECT
APP:CUPS:CUPS-JOBS-EXP
APP:CUPS:COMMAND-CHAR
APP:CUPS:HPGL-PC-OF
APP:CUPS:IPP-NULL-PTR-DOS
APP:CUPS:JBIG2-SYMBOLDICTIONARY
APP:CUPS:TEXTTOPS-OF
APP:CUPS:CGI-ADMIN-OF
APP:CUPS:GIF-READ-LZW-OF

APP:CVS

APP:CVS:EXCESSIVE-MAX-DOTDOT
APP:CVS:DIR-OVERFLOW
APP:CVS:CVS-AUTHOR-OF
APP:CVS:CVS-FILE-INFO
APP:CVS:ENTRY-TAG-OF
APP:CVS:ARGUMENTX-CMD

APP:ESIGNAL

APP:ESIGNAL:OVERFLOW-EXPLOIT

APP:ETHEREAL

APP:ETHEREAL:NETFLOW-OF
APP:ETHEREAL:TCP-80-DOS
APP:ETHEREAL:DISTCC-OF
APP:ETHEREAL:EIGRP-OF-CLT
APP:ETHEREAL:EIGRP-OF-STC
APP:ETHEREAL:TCPDUMP-ISAKMP-DOS
APP:ETHEREAL:3G-A11-B0F
APP:ETHEREAL:IGAP-ACCT-OF

APP:EXCHANGE

APP:EXCHANGE:EMSMDB32-DOS

APP:GAME

APP:GAME:COD4-CONNECT
APP:GAME:CS-CONNECT
APP:GAME:CS-S-CONNECT
APP:GAME:XBOX-HTTP-ACCESS
APP:GAME:XBOX-KERBEROS-LOGIN
APP:GAME:XBOX-LIVE-MARKETPLACE
APP:GAME:XBOX-DASHBOARD
APP:GAME:DIRECTPLAY-PLAYER-DOS
APP:GAME:STEAM-LOGIN
APP:GAME:UT3-QUERY
APP:GAME:UT2004-QUERY
APP:GAME:EAD-LOGIN
APP:GAME:STARDOCK-IMPULSE
APP:GAME:STEAM-URI
APP:GAME:WII-ACTIVITY
APP:GAME:DIRECTPLAY-NULL-PTR
APP:GAME:WOW-REALM
APP:GAME:SOURCE-QUERY
APP:GAME:DIABLO3
APP:GAME:WORDS-WITH-FRIENDS
APP:GAME:MEDAL-OF-HONOR-BO
APP:GAME:UNREAL-GAMESPY-QP-BOF
APP:GAME:PS-COMMUNITY
APP:GAME:PS-APPLICATIONS
APP:GAME:PS-CHAT
APP:GAME:PS-UPDATE
APP:GAME:XBOX-LIVE
APP:GAME:DIRECTPLAY-DOS
APP:GAME:WOW-LOGIN

APP:GAUNTLET

APP:GAUNTLET:GAUNTLET-URL-OF

APP:HPOV

APP:HPOV:NNM-EVTCOR-CMD-INJ
APP:HPOV:OVALARMSRV-OF
APP:HPOV:DEMANDPOLL-FMT-STR
APP:HPOV:OVALARMSRV-DOS
APP:HPOV:REQ_SEV_CHANGE-DOS
APP:HPOV:OVALARMSRV-FMT-STR
APP:HPOV:NNM-BO
APP:HPOV:NNM-GETNNMDATA-OF
APP:HPOV:OVALARMSRV-DOS2
APP:HPOV:NNM-OVALARM-IO
APP:HPOV:HPOPSMGT-OF
APP:HPOV:OMNIBACK-II-ACE
APP:HPOV:NODE-MGR-NNMRPTCONFIG
APP:HPOV:CMD-INJ
APP:HPOV:OMNIINET-OF
APP:HPOV:NNM-OVLAUNCH-BO
APP:HPOV:SDPM-HEAP-BOF
APP:HPOV:PERFORMANCE-INSIGHT
APP:HPOV:NNM-SNMP-BOF
APP:HPOV:OALARM-LANG-OF
APP:HPOV:OVJAVALOCALE-OF
APP:HPOV:UNAUTH-FILE-UPLOAD
APP:HPOV:NNM-RADIA-NOTIFY
APP:HPOV:NNM-EXECVP-NC-OF
APP:HPOV:OVTOPMD-DOS
APP:HPOV:OPENVMS-FINGER-SRV-BO
APP:HPOV:NNM-HTTP-REQUEST
APP:HPOV:NNMRPTCONG-TEMPL
APP:HPOV:OVDLL-OVBUILDPATH-BOF
APP:HPOV:INT-MGMT-CTR-INFO-DIS
APP:HPOV:NNM-HTTP-OF
APP:HPOV:INT-MGMT-CTR-DIRTRAV
APP:HPOV:NNMRPTCONFIG-EXE-RCE
APP:HPOV:NNM-DISPLAYWIDTH-BOF
APP:HPOV:OVWEBSNMPSRV-OF
APP:HPOV:OPE-AGENT-CODA-BO
APP:HPOV:NNMI-BO
APP:HPOV:NNM-XSS
APP:HPOV:NNM-OVW-MSG
APP:HPOV:OID-OF
APP:HPOV:NNM-SNMP-HOST
APP:HPOV:NNM-RPING-BOF
APP:HPOV:SNMPVIEWER-APP-OF
APP:HPOV:OMNILNET-NULL
APP:HPOV:HP-DPBC-OF
APP:HPOV:REGISTER-FILE-DELETE
APP:HPOV:NNMRPTCONFIG-EXE-OF
APP:HPOV:OVTRACE
APP:HPOV:NNM-LOGIN-BOF
APP:HPOV:NNMRPTCONFIG-EXE-BOF

APP:IBM

APP:IBM:BLADECENTER-AMM-CSRF
APP:IBM:TIV-DS-IBMSLAPD-EXE
APP:IBM:TSM-CLIENT-OF
APP:IBM:IDS-LIBRPC
APP:IBM:INFORMIX-EXPLAIN
APP:IBM:TIVOLI-FASTBACK-SER-RCE
APP:IBM:INFORMIX-DBINFO-BOF
APP:IBM:TEALEAF-PCA-CMDEXEC
APP:IBM:INFORMIX-LIBRPC-DLL-BOF
APP:IBM:TIVOLI-OF
APP:IBM:DOMINO-BYPASS
APP:IBM:INFORMIX-EXPLAIN-BOF
APP:IBM:WCM-XPATH-INJ
APP:IBM:BLADECENTER-DOS
APP:IBM:FORMVIEWER-XFDL-BOF
APP:IBM:TIVOLI-PRO-MGR-BO
APP:IBM:SOLIDDB-DOS
APP:IBM:SYS-DIRECTOR-DLL-LOAD
APP:IBM:COGNOS-BACKDOOR
APP:IBM:DIRECTOR-AGENT-DOS
APP:IBM:DB2-KUDDB2-DOS
APP:IBM:BLADECENTER-INFO
APP:IBM:SET-ENVIRONMENT-BOF
APP:IBM:COGNOS-TM1-BOF
APP:IBM:TIVOLI-FASTBACK-RCE
APP:IBM:TIVOLI-FASTBACK-BOF
APP:IBM:DOMINO-BYPASS-1
APP:IBM:TSM-RCE
APP:IBM:TSM-CVE-2015-0119-BO
APP:IBM:TIVOLI-FASTBACK-OF
APP:IBM:INFORMIX-CMD-OF
APP:IBM:TME-AGENT
APP:IBM:LOTUS-NOTES-HTML-OF
APP:IBM:SYMPHONY-SOAP-BOF
APP:IBM:TSM-SIGN-ON-OF
APP:IBM:TSM-NODE-NAME-OF
APP:IBM:DIRECTOR-CIM-DOS
APP:IBM:LDAP-MODIFYREQUEST-BO
APP:IBM:TIV-SCHEDULEPARAM-XSS
APP:IBM:TIV-SM-CAD
APP:IBM:TIVOLI-MAN-HEAP

APP:INGRES

APP:INGRES:DB-COMP-BO
APP:INGRES:DB-COMM-SVR-OF

APP:IPSWITCH

APP:IPSWITCH:LOGGING-SVC-DOS
APP:IPSWITCH:IMAIL-FILEDISCLSR
APP:IPSWITCH:WS-FTP-INFO-DISC

APP:KERBEROS

APP:KERBEROS:KRB5-MITM-DES
APP:KERBEROS:EXCESSIVE-ERRORS
APP:KERBEROS:MS-WIN-2000-DOMAIN
APP:KERBEROS:XREALM-DOS
APP:KERBEROS:DOS-TCP
APP:KERBEROS:INV-TOKEN-DOS-TCP
APP:KERBEROS:KRB5-DOS
APP:KERBEROS:DBLFREE
APP:KERBEROS:INV-TOKEN-DOS-UDP
APP:KERBEROS:SPNEGO-5-DOS
APP:KERBEROS:XREALM-KDC-DOS
APP:KERBEROS:DBLFREE-2
APP:KERBEROS:DOS
APP:KERBEROS:CHKSUM-PRIV-ESC
APP:KERBEROS:PREP-REPROCESS-REQ
APP:KERBEROS:KDC-NULL-DOS
APP:KERBEROS:KDC-AUTH-DOS
APP:KERBEROS:MIT-KRB5-DOS
APP:KERBEROS:MS-KERB-ASN-BIT
APP:KERBEROS:READ-MSG-DOS
APP:KERBEROS:GSS-ZERO-TOKEN
APP:KERBEROS:KBR-DOS-TCP-2
APP:KERBEROS:KPASSWD-UDP-DOS
APP:KERBEROS:MULTI-REALM-DOS

APP:MDAEMON

APP:MDAEMON:MDCONFIG-VER
APP:MDAEMON:FORM2RAW-OF
APP:MDAEMON:SEND-OF
APP:MDAEMON:LIST-OF

APP:MISC

APP:MISC:OP5-APP-TIMESTAMP
APP:MISC:KADMIN-4-OF
APP:MISC:ACTFAX-BO
APP:MISC:PIGEON-DOS
APP:MISC:TVMOBILI-DOS
APP:MISC:ACROREAD-XML-URL
APP:MISC:DOMINO-MGR-FS
APP:MISC:OP5-APP-PASSWORD
APP:MISC:GITORIOUS-RCE
APP:MISC:AVIRA-ANTIVIR
APP:MISC:HP-MERCURY-BOF
APP:MISC:UNISYS-BIS
APP:MISC:GUESTBOOK-CGI
APP:MISC:NETVAULT-SD-DOS
APP:MISC:WSHARK-ENTTEC-BO
APP:MISC:HEARTBEAT-OF
APP:MISC:SIMENS-GIGAST-DOS
APP:MISC:EMC-AS-INSECUREOPS
APP:MISC:ARCSERVE-GETBACKUP
APP:MISC:PXESERVICE-UDP
APP:MISC:DSM-SLICEUPLOAD-RCE
APP:MISC:SAMSUNG-SWIFTKEY-RCE
APP:MISC:SAMSUNG-TV-SERVER-DOS
APP:MISC:GOOGLE-EARTH
APP:MISC:ESIGNAL-WINSIG-BO
APP:MISC:SPREE-SEARCH-CMD-EXE
APP:MISC:DOGFOOD-RCE
APP:MISC:ZABBIX-AGENT-RCE
APP:MISC:ACTFAX-BO-HTTP
APP:MISC:AVID-MEDIA-OF
APP:MISC:AVAYA-WINPDM
APP:MISC:UPLUS-FTP-WEB-OF
APP:MISC:ZABBIX-SQLI
APP:MISC:OPC-SYSTEMS-NET-DOS
APP:MISC:REALITYSERVER-DOS
APP:MISC:NERO-MEDIAHOME-DOS
APP:MISC:SIEMENS-SE461-DOS
APP:MISC:PSI-INTEGER-OF-DOS
APP:MISC:CYBERLINK-POWERDVD-DOS
APP:MISC:BOPUP-COMMUNICATION-BO
APP:MISC:HP-SITESCOPE-SOAP
APP:MISC:EMC-AUTOSTART-NULLBYTE
APP:MISC:F-SECURE-WEB-BO
APP:MISC:HP-SITESCOPE-LOADFILE
APP:MISC:HP-SITESCOPE-DIR-TRAV
APP:MISC:HP-OA-HEALTH-BO
APP:MISC:AUTONOMY-CONN-TYPE-13
APP:MISC:ENTERASYS-NETSIGHT-BOF
APP:MISC:REDHAT-JBOSS-JNDI
APP:MISC:LCDPROC-BOF
APP:MISC:NAGIOS-NRPE-CE
APP:MISC:JRE-PACK200-OF
APP:MISC:D-LINK-SEC-BYPASS
APP:MISC:SYNERGY-CLPBRD-OF
APP:MISC:LCDPROC-TEST-FUNC-FS
APP:MISC:SCHNEIDER-ACCUTECH-B0
APP:MISC:YEALINK-IP-PHONE-CSRF
APP:MISC:YEALINK-IP-PHONE-BO
APP:MISC:SAP-NETWEAVER-SOAP-RCE
APP:MISC:CVE-2014-0549-RTMP-MC
APP:MISC:SAMSUNG-ALLSHARE-DOS
APP:MISC:SAMSUNG-NET-I-WARE-DOS
APP:MISC:ADOBE-RTMP-UAF
APP:MISC:HP-SITESCOPE-CE
APP:MISC:HP-AUTOKEYLIB-RCE
APP:MISC:SOPHOS-WEBAPP-RCE
APP:MISC:HP-RADIO-CLI-MEMCP
APP:MISC:HP-DATA-PROTECTOR-TRAV
APP:MISC:HP-SSC-APIMONITORIMPL
APP:MISC:HP-INODE-BO
APP:MISC:MS-ACTIVE-DIR-RCE
APP:MISC:HICP-HOSTNAME
APP:MISC:ALIENVALT-BAKUP-COM-RE
APP:MISC:SCHNEIDER-ELE-MGR-BO
APP:MISC:CLEARSCADA-OPF-PARSE
APP:MISC:FARONICS-DFE-RCE
APP:MISC:SCHNEIDER-SQLI-RCE
APP:MISC:MUL-DOS-UDP
APP:MISC:MULTIPLE-RCE
APP:MISC:MUL-PRDCTS-CMD-EXEC
APP:MISC:MUL-DOS
APP:MISC:FUJITSU-WEB-DIR-TRAV
APP:MISC:MUL-MEMCP-1
APP:MISC:MUL-MEMCP-2
APP:MISC:APACHE-QPID-SEQSET-DOS
APP:MISC:APACHE-QPID-SESS-DOS
APP:MISC:HP-AUTOKEYLIB-CE
APP:MISC:MULTI-VENDORS-OF
APP:MISC:MULTI-VENDORS-BOF
APP:MISC:MUL-VENDORS-ID
APP:MISC:SAM-ACTQ-MULTI
APP:MISC:OBJ-OBJDB-BO
APP:MISC:NEC-EXPCLU-BO
APP:MISC:SAMSUNG-TV-BD-DOS
APP:MISC:ARCSERVE-BKUP
APP:MISC:EZHOMETECH-EZSERVER-BO
APP:MISC:ZABBIC-NODE-PROCESS-CE
APP:MISC:ZEND-XMLRPC-INFO-DISC
APP:MISC:CNTWR-FV-GIF-LZWMCS-MC
APP:MISC:QUEST-NETVAULT-DOS
APP:MISC:NAGIOS-NRPE-CHKUSRS-CI
APP:MISC:CITADEL-BO
APP:MISC:ZIMBRA-COLLAB-INFODISC
APP:MISC:GANGLIA-METE-BOF
APP:MISC:TANNE-FMT-STR
APP:MISC:BIGANT-DDNF-BO
APP:MISC:MCAFEE-EPOL-ORCH

APP:NOVELL

APP:NOVELL:REPORTER-AGENT-BOF
APP:NOVELL:GRPWISE-HOST-RCE
APP:NOVELL:HTTP-NOVELL-REDIRECT
APP:NOVELL:GROUPWISE-WA
APP:NOVELL:EDIR-PLUGIN-OF
APP:NOVELL:ZENWORKS-MSG-DLL-OF
APP:NOVELL:IMONITOR-OF
APP:NOVELL:EDIR-HEADER-DOS
APP:NOVELL:EDIRECTORY-DOS
APP:NOVELL:REPORTER-AGENT
APP:NOVELL:IMANAGER-FILE-UPLOAD
APP:NOVELL:IMANAGER-CREATE-BO
APP:NOVELL:NETWARE-XNFS-BO
APP:NOVELL:GROUPWISE-CLIENT-BO
APP:NOVELL:RECORD-TAG-BOF
APP:NOVELL:EDIRECTORY-ME-OF
APP:NOVELL:ZENWORKS-FHIPCND-EXE
APP:NOVELL:DIS-PRINT-SRV
APP:NOVELL:ZENWORKS-LG-DIR-TRAV
APP:NOVELL:ZENWORKS-MGT-UPLOAD
APP:NOVELL:REPORTER-SRS
APP:NOVELL:NMAP-NETMAIL-STOR
APP:NOVELL:INTERNET-AGENT-BOF
APP:NOVELL:IMANAGER-ARB-UPLOAD
APP:NOVELL:GROUPWISE-ADDRESS
APP:NOVELL:XNFS-NLM
APP:NOVELL:REMOTE-MGR-DOS
APP:NOVELL:IPRINT-ATTRIB-BO
APP:NOVELL:GROUPWISEIA-ICAL-DOS
APP:NOVELL:MSNGR-CREATESEARCH
APP:NOVELL:MESSENGER-LOGIN
APP:NOVELL:ZENWORKS-CONFMGR-BO
APP:NOVELL:NETIQ-EDIR-BOF
APP:NOVELL:ZENWORKS-AGENT-OF
APP:NOVELL:ZENWORKS-MOBILE-LFI
APP:NOVELL:CASA-PAM-BOF
APP:NOVELL:MESSENGER-SERVER-BOF
APP:NOVELL:REPORTER-FSFUI
APP:NOVELL:MESSENGER-BOF
APP:NOVELL:ZENWORKSCM-DIRTRVRSL
APP:NOVELL:GROUPWISE-MAILTO-BO
APP:NOVELL:ZENWORKS-ZFHIPCND-OF
APP:NOVELL:ZENWORKS-DIR-TRVRS
APP:NOVELL:GWCLIENT-BOF
APP:NOVELL:ZENWORKS-DIR-TRAV
APP:NOVELL:GWMGR-INFODISC
APP:NOVELL:ZENWORKS-TFTPD-RCE
APP:NOVELL:NDS-IO
APP:NOVELL:GROUPWISE-ADDRESSBK
APP:NOVELL:ZENWORKS-MGMT-DIR
APP:NOVELL:ZENWORKS-PREBOOT-SVC
APP:NOVELL:MESSENGER-DOS
APP:NOVELL:ZENWORKS-CONTENT-LEN
APP:NOVELL:REPORTER-VOL
APP:NOVELL:IMANAGER-TREE-NAME
APP:NOVELL:PREBOOT-POLICY-BO
APP:NOVELL:EDIR-CONTENT-LEN-OF

APP:ORACLE

APP:ORACLE:WEBCACHE-INSECURE2
APP:ORACLE:BUSINESS-FLSHSVC-RCE
APP:ORACLE:WEBCACHE-INSECURE
APP:ORACLE:OUTSIDE-IN-FLASHPIX
APP:ORACLE:REPORT-CMD-INJ
APP:ORACLE:WEBCACHE-METHOD-OF
APP:ORACLE:VIRTUAL-AGENT-CMDINJ
APP:ORACLE:SBAS-AUTH-BYPASS
APP:ORACLE:RAPID-WEBSRV-XSS
APP:ORACLE:MEMCACHED-PLUGIN
APP:ORACLE:VIRTUAL-AGT-CMDIJ-HS
APP:ORACLE:JAVA-RMI-RCE
APP:ORACLE:SQL-QUERY-DIR-TRAV
APP:ORACLE:OUTSIDEIN-MET-HOVF
APP:ORACLE:CLNT-SYS-ANLZR-FL-UP
APP:ORACLE:GOLDENGATE-SOAP-OF
APP:ORACLE:SECURE-BACKUP-INJ
APP:ORACLE:APP-FRAME-DEV-MODE
APP:ORACLE:OHS-PROXY-BYPASS
APP:ORACLE:SYSTEM-ARRAYCOPY-RCE
APP:ORACLE:WEBLOGIC-CMD-EXEC
APP:ORACLE:RHINOSCRIPT-BYPASS
APP:ORACLE:OOXML-TAG
APP:ORACLE:OUTSIDE-JPEG2-CODCOC
APP:ORACLE:WEBUI-CMD-INJ
APP:ORACLE:OUTSIDE-JPEG2-CRG

APP:PCANYWHERE

APP:PCANYWHERE:LOGIN-ADMIN
APP:PCANYWHERE:STARTUP
APP:PCANYWHERE:LOGIN-FAILURE
APP:PCANYWHERE:HOST-SERVICES
APP:PCANYWHERE:SERVER-DOS
APP:PCANYWHERE:LOGIN-PASSWD-BO

APP:PPTP

APP:PPTP:PPTP-UNK-CTRL
APP:PPTP:POPTOP-OF
APP:PPTP:MICROSOFT-PPTP

APP:PROXY

APP:PROXY:SQUID-HOST-HDR-BYPASS
APP:PROXY:SQUID-PROXY-CACHE
APP:PROXY:SQUID-ACCEPT-LANG-DOS
APP:PROXY:SQUID-WCCP-BO
APP:PROXY:SQUID-WCCP-DOS

APP:QT-SERVER

APP:QT-SERVER:DESCRIBE-DOS
APP:QT-SERVER:DEV-URL-DOS
APP:QT-SERVER:PARSE-XML-CGI-RCE

APP:REAL

APP:REAL:NEG-CONT-LEN
APP:REAL:SERVER-DOS
APP:REAL:PLAYER-MAL-META-FILE
APP:REAL:RAM-FILE-OF
APP:REAL:PLAYER-FORMAT-STRING
APP:REAL:HELIX-URL-OF
APP:REAL:REALTEXT-ERR-OF
APP:REAL:SMIL-WALLCLOCK-OF
APP:REAL:PLAYER-AU-FILE-DOS
APP:REAL:RMP-BO
APP:REAL:HTML-PARSING-DOS
APP:REAL:PLAYER-INVALID-CHUNK
APP:REAL:REAL-MPG-WIDTH
APP:REAL:RMP-FILE-OF
APP:REAL:IVR-OF-1
APP:REAL:PLAYER-MAL-SKIN
APP:REAL:IVR-OF
APP:REAL:MAL-FLV-FILE
APP:REAL:PLAYER-SMIL-OF
APP:REAL:VIDPLIN-DLL
APP:REAL:PLAYER-FILE-SEC-BYPASS
APP:REAL:HELIX-NTLM-OF

APP:REMOTE

APP:REMOTE:RDP-CONNECT
APP:REMOTE:TEAMVIEWER-URL-MODE
APP:REMOTE:TIMBUKTU-CONNECT
APP:REMOTE:TEAMVIEWER-HTTP
APP:REMOTE:LOGMEIN
APP:REMOTE:TEAMVIEWER
APP:REMOTE:GOTOMYPC-CONN-TEST
APP:REMOTE:GOTOMYPC
APP:REMOTE:RDP-HEAP-OF
APP:REMOTE:TIMBUKTU-AUTH-OF
APP:REMOTE:NETTRANSPORT-DM
APP:REMOTE:RDP-DOS
APP:REMOTE:MS-WIN-RDP-RCE
APP:REMOTE:MS-RDP-ACTIVEX-RCE
APP:REMOTE:RDP-RCE
APP:REMOTE:RDP-MEM-OBJ
APP:REMOTE:CVE-2015-2373-RCE
APP:REMOTE:RDP-HEAP-BO

APP:RWHOISD

APP:RWHOISD:RWHOISD-FS

APP:SAP

APP:SAP:NETWEAVER-DOS
APP:SAP:NETWEAVER-DIAGI-DOS
APP:SAP:WEBAPP-SERV-XSS
APP:SAP:IGS-OF
APP:SAP:WEB-SRV-OF
APP:SAP:NETWEAVER-SOAP-RCE
APP:SAP:MSG-SRV-GRP
APP:SAP:BIS-LIC-MGR-BOF
APP:SAP:NETWEAVER-MSG-RCE
APP:SAP:NETWEAVER-MSG-SERVER-B0
APP:SAP:SYBASE-ESPPARSE-DOS
APP:SAP:INT-GRAPHICS-PARAMS-XSS
APP:SAP:CONFIGSERVLET-CMD-EXEC
APP:SAP:NETWEAVER-BO
APP:SAP:WEBAS-DOS

APP:SHOUTCAST

APP:SHOUTCAST:ICY-OVERFLOW

APP:SNORT

APP:SNORT:GARBAGE-PACKET
APP:SNORT:DCE-RPC-DOS
APP:SNORT:BACKORIFICE-BOF
APP:SNORT:REPORT-RCE
APP:SNORT:BACKORIFICE-DOS

APP:SOCKS

APP:SOCKS:SMTP-PROXY-HTTP

APP:SYMC

APP:SYMC:WORKSPACE-RCE
APP:SYMC:VRTSWEB-EXEC
APP:SYMC:AV-AHS-DOS
APP:SYMC:AV-MGT-SVC-BOF
APP:SYMC:ALERT-MGT-FILE-TRNS
APP:SYMC:WEB-GATEWAY-CSRF
APP:SYMC:BLOCKED-PHP-SQLI
APP:SYMC:MESSAGING-SSH-PASSWORD
APP:SYMC:VERITAS-VXSVC-BO
APP:SYMC:NETBACKUP-CMD-EXEC
APP:SYMC:EASYSETUP-ACTIVEX
APP:SYMC:ALERT-MGT
APP:SYMC:IM-MGR-ADM-INJ
APP:SYMC:LUA-HTML-INJ
APP:SYMC:LUA-HTML-INJ-TEST
APP:SYMC:WG-PBCONTROL
APP:SYMC:WEB-GW-PWD-CHG
APP:SYMC:IM-MGR-INJ
APP:SYMC:MESSAGING-DIR-TRAV
APP:SYMC:WEB-GATEWAY-OS-CMD-INJ
APP:SYMC:AGENT-RM-CMD
APP:SYMC:ALTIRIS-DS-SQL-INJ
APP:SYMC:MGM-CONSOLE-XSS
APP:SYMC:ENCRYPTED-CMD-EXEC
APP:SYMC:LIVE-UPDATE-SEC-BYPASS
APP:SYMC:WORKSPACE-FILE-UPLOAD
APP:SYMC:MESSAGING-SAVE.DO-CSRF
APP:SYMC:AMS-MODEM-STRING-OF
APP:SYMC:XFERWAN-OF
APP:SYMC:SCAN-ENG-AUTH-BYPASS
APP:SYMC:AV-INTEL-ALERT
APP:SYMC:BACKUP-EXEC
APP:SYMC:AMS-HNDLRSVC-RCE
APP:SYMC:IM-MGR-WEB-UI-INJ
APP:SYMC:AMS-PIN-OF
APP:SYMC:AMS-SEND-ALERT-ACK-OF

APP:TMIC

APP:TMIC:SP-CREATE-BIND-OF
APP:TMIC:SP-EARTHAGENT-OF
APP:TMIC:SP-CREATEBIND-OF
APP:TMIC:CTRLMGR-CHUNKED
APP:TMIC:SP-EARTH-AGENT-OF
APP:TMIC:INTERSCAN-XSS
APP:TMIC:CONTROL-MANAGER-CMD
APP:TMIC:OFFICESCAN-PW-OF
APP:TMIC:TMREGCHANGE
APP:TMIC:OFFICESCAN-AUTH

APP:TUN

APP:TUN:TOR-2
APP:TUN:TOR-1
APP:TUN:TOR-3
APP:TUN:GRE-TUNNEL
APP:TUN:ESP-TUNNEL
APP:TUN:GPRS-TUNNEL
APP:TUN:ANCHORFREE-VPN-UDP
APP:TUN:PACKETIX-VPN-CONNECT
APP:TUN:TEREDO-INFO
APP:TUN:ANCHORFREE-VPN-SSL
APP:TUN:IPV6-OVER-IPV4
APP:TUN:ESP-OVER-UDP
APP:TUN:TOR-EXIT-HOSTHEADER
APP:TUN:TEREDO-TUNNEL
APP:TUN:6TO4-TUNNEL
APP:TUN:ANCHORFREE-VPN-TCP
APP:TUN:TIC-LOGIN

APP:UPNP

APP:UPNP:MS-UPNP
APP:UPNP:APPLE-MDNS
APP:UPNP:MINIUPNPD-DOS
APP:UPNP:LIBUPNP-ROOT-DSN-BOF
APP:UPNP:LIBUPNP-UUID-BOF
APP:UPNP:LIBUPNP-DSN-BOF
APP:UPNP:DLINK-SEARCH-NOTIFY

APP:VERITAS

APP:VERITAS:NB-VMD-OF2
APP:VERITAS:REG-WRITE
APP:VERITAS:VERITAS-FILE-DUMP
APP:VERITAS:COMMAND-CHAIN
APP:VERITAS:NETBACKUP-VNETD
APP:VERITAS:NETBACKUP-BPCD
APP:VERITAS:REG-WRITE-2
APP:VERITAS:NB-VMD-OF
APP:VERITAS:AGENT-NAME-OF
APP:VERITAS:VERITAS-NULL-PTR
APP:VERITAS:NETBACKUP-FS
APP:VERITAS:MAL-REQUEST-DOS
APP:VERITAS:NETBCKP-CMD-EXEC
APP:VERITAS:CLIENT-AUTH-OF

APP:WHATSUP

APP:WHATSUP:IPSWITCH-DIR-TRV

APP:WINAMP

APP:WINAMP:CDA-DEV-NAME-OF
APP:WINAMP:CAF-OF
APP:WINAMP:MP4-MC
APP:WINAMP:RIFF-INFO
APP:WINAMP:AVI-STREAM-BO
APP:WINAMP:AMF-BO
APP:WINAMP:MIDI-FILE-OF

APP:WMP

APP:WMP:DSHOW-BIGCHUNK-HTTP
APP:WMP:DSHOW-BIGCHUNK-SMTP
APP:WMP:DSHOW-BIGCHUNK-SMB

APP:XDMCP

APP:XDMCP:DTLOGIN-DBL-FREE

CHARGEN

CHARGEN:ECHO-DOS
CHARGEN:TRAFFIC

CHARGEN:EXPLOIT

CHARGEN:EXPLOIT:UNEXPECTED-REQ

CHAT

CHAT:OOVOO-ACTIVITY
CHAT:POPO-CHAT-LOGIN
CHAT:APPLE-IMESSAGE-CONNECTION
CHAT:MS-LYNC-2010-CE
CHAT:STEAM-FRIENDS

CHAT:AIM

CHAT:AIM:FILE-EXE
CHAT:AIM:CLOSE-CONNECTION
CHAT:AIM:MESSAGE-RECEIVE
CHAT:AIM:MESSAGE-SEND
CHAT:AIM:LOGIN-ATTEMPT
CHAT:AIM:SERVER-READY
CHAT:AIM:FILE-SEND
CHAT:AIM:LINK-EXEC
CHAT:AIM:FILE-GET
CHAT:AIM:HTTP-PROXY
CHAT:AIM:TUNNEL
CHAT:AIM:TOC
CHAT:AIM:HTTPS-LOGIN

CHAT:AIM:OVERFLOW

CHAT:AIM:OVERFLOW:AWAY-FS
CHAT:AIM:OVERFLOW:TRILIN-XML-BO
CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY
CHAT:AIM:OVERFLOW:TRILLIAN-XML

CHAT:AUDIT

CHAT:AUDIT:IRC-CMD
CHAT:AUDIT:IRC-CMD-CHR

CHAT:AUDIT:AIM

CHAT:AUDIT:AIM:MSG-HEADER
CHAT:AUDIT:AIM:TLV-LEN-OVFLW
CHAT:AUDIT:AIM:MSG-TOO-BIG
CHAT:AUDIT:AIM:MSG-TOO-SHORT
CHAT:AUDIT:AIM:INV-TLV-LEN
CHAT:AUDIT:AIM:INVALID-TLV

CHAT:AUDIT:MSN

CHAT:AUDIT:MSN:PHONE-NUM
CHAT:AUDIT:MSN:URL
CHAT:AUDIT:MSN:MSN-USER-NAME
CHAT:AUDIT:MSN:MSG
CHAT:AUDIT:MSN:MSG-2LONG
CHAT:AUDIT:MSN:USER-STATE
CHAT:AUDIT:MSN:CMD
CHAT:AUDIT:MSN:IP-PORT
CHAT:AUDIT:MSN:GROUP-NAME

CHAT:AUDIT:YMSG

CHAT:AUDIT:YMSG:MAIL-SNDR-ADDR
CHAT:AUDIT:YMSG:CRYPT-PASSWD
CHAT:AUDIT:YMSG:GROUP-NAME
CHAT:AUDIT:YMSG:CONTACT-NAME
CHAT:AUDIT:YMSG:CONF-INVIT
CHAT:AUDIT:YMSG:CHATROOM-NAME
CHAT:AUDIT:YMSG:CONF-NAME
CHAT:AUDIT:YMSG:CONF-MSG
CHAT:AUDIT:YMSG:CHAT-NAME-OF
CHAT:AUDIT:YMSG:CONF-HOST
CHAT:AUDIT:YMSG:RESP-CRYPT
CHAT:AUDIT:YMSG:MAIL-ADDR
CHAT:AUDIT:YMSG:OFLOW-CHALNG
CHAT:AUDIT:YMSG:COOKIE
CHAT:AUDIT:YMSG:OFLOW-CONF-NAME
CHAT:AUDIT:YMSG:SEPARATOR
CHAT:AUDIT:YMSG:WEBCAM-KEY
CHAT:AUDIT:YMSG:BUDY-LIST
CHAT:AUDIT:YMSG:DATA-TYPE
CHAT:AUDIT:YMSG:INV-GROUP-NAME
CHAT:AUDIT:YMSG:FILE-NAME
CHAT:AUDIT:YMSG:OFLOW-GRP-NAME
CHAT:AUDIT:YMSG:OFLOW-COOKIE
CHAT:AUDIT:YMSG:OFLOW-PASSWD
CHAT:AUDIT:YMSG:EVENT-CODE
CHAT:AUDIT:YMSG:CHATRM-MSG
CHAT:AUDIT:YMSG:BUD-LST
CHAT:AUDIT:YMSG:ACTIVITY-SIZE
CHAT:AUDIT:YMSG:BUD-NAME
CHAT:AUDIT:YMSG:MEMBER-NAME
CHAT:AUDIT:YMSG:MAIL-SUBJECT
CHAT:AUDIT:YMSG:VALUE
CHAT:AUDIT:YMSG:INV-STAT-CODE
CHAT:AUDIT:YMSG:MSG-TOO-BIG
CHAT:AUDIT:YMSG:BUD-LIST
CHAT:AUDIT:YMSG:ACTIVITY
CHAT:AUDIT:YMSG:RECIPIENT
CHAT:AUDIT:YMSG:STATUS-CODE
CHAT:AUDIT:YMSG:SENDER
CHAT:AUDIT:YMSG:URL
CHAT:AUDIT:YMSG:MAIL-SNDR-NAME
CHAT:AUDIT:YMSG:MSG
CHAT:AUDIT:YMSG:USERNAME
CHAT:AUDIT:YMSG:OFLOW-URL
CHAT:AUDIT:YMSG:USER-NAME
CHAT:AUDIT:YMSG:OFLOW-RESP-CRPT
CHAT:AUDIT:YMSG:MSG-SIZE
CHAT:AUDIT:YMSG:CHALLENGE
CHAT:AUDIT:YMSG:OFLOW-CONF-MSG
CHAT:AUDIT:YMSG:MESSAGE-SEND
CHAT:AUDIT:YMSG:MESSAGE-RECEIVE
CHAT:AUDIT:YMSG:FILE-SEND
CHAT:AUDIT:YMSG:FILE-SEND-HTTP

CHAT:GADU-GADU

CHAT:GADU-GADU:BANNER
CHAT:GADU-GADU:CLIENT-REQ
CHAT:GADU-GADU:DISCOVER

CHAT:GOOGLE

CHAT:GOOGLE:SEND-HTTP
CHAT:GOOGLE:GTALK-CALL
CHAT:GOOGLE:GTALK-STARTUP
CHAT:GOOGLE:START
CHAT:GOOGLE:TALKGADGET
CHAT:GOOGLE:GTALK-SSL
CHAT:GOOGLE:GTALK-PHONE-SESSION
CHAT:GOOGLE:TALKGADGET-ACTIVITY
CHAT:GOOGLE:JABBER
CHAT:GOOGLE:JABBER-SSL

CHAT:ICQ

CHAT:ICQ:FILE-RECEIVE
CHAT:ICQ:FILE-SEND
CHAT:ICQ:ISS-BLACKICE-OF

CHAT:IRC

CHAT:IRC:SRV-RESPONSE
CHAT:IRC:SSN-CLEARTEXT
CHAT:IRC:NICK
CHAT:IRC:MIRC-PRIVMSG
CHAT:IRC:UNREALRCD-BACKDOOR
CHAT:IRC:LOIC-HIVE-LOGIN
CHAT:IRC:RATBOX-MCAPAB-DOS
CHAT:IRC:COLLOQUY-DOS
CHAT:IRC:COLLOQUY-INVITE-FS
CHAT:IRC:CC-NUMBER

CHAT:IRC:BOTNET

CHAT:IRC:BOTNET:AGOBOT-CMD
CHAT:IRC:BOTNET:DOWNLOAD-CMD
CHAT:IRC:BOTNET:SDBOT-CMD
CHAT:IRC:BOTNET:RA1NX-BOT-CE

CHAT:IRC:INVALID

CHAT:IRC:INVALID:NULL-CHAR
CHAT:IRC:INVALID:ARGS
CHAT:IRC:INVALID:NUM-REPLY
CHAT:IRC:INVALID:MSG
CHAT:IRC:INVALID:PREFIX
CHAT:IRC:INVALID:FORMAT-STR

CHAT:IRC:OVERFLOW

CHAT:IRC:OVERFLOW:NICK
CHAT:IRC:OVERFLOW:USERNAME
CHAT:IRC:OVERFLOW:PASSWORD
CHAT:IRC:OVERFLOW:NUM-REPLY
CHAT:IRC:OVERFLOW:CHANNEL
CHAT:IRC:OVERFLOW:LINE
CHAT:IRC:OVERFLOW:XCHAT-SOCKS
CHAT:IRC:OVERFLOW:OPENBSD-DOS

CHAT:JABBER

CHAT:JABBER:JABBER-XTRAF
CHAT:JABBER:JABBER-CTRAF
CHAT:JABBER:UNAME-OF
CHAT:JABBER:NIMBUZZ

CHAT:MSN

CHAT:MSN:POINT-TO-POINT
CHAT:MSN:ACCESS
CHAT:MSN:INVITE-SEND
CHAT:MSN:LOGIN-ATTEMPT
CHAT:MSN:INVITE-RECV
CHAT:MSN:BRIDGE
CHAT:MSN:GIF-OVERFLOW
CHAT:MSN:PIDGIN-MSN-IO

CHAT:MSN:HTTP

CHAT:MSN:HTTP:LOGIN
CHAT:MSN:HTTP:CHAT
CHAT:MSN:HTTP:CALL
CHAT:MSN:HTTP:MSNFTP-INVITE

CHAT:MSN:INVALID

CHAT:MSN:INVALID:PNG-WIDTH
CHAT:MSN:INVALID:MSN-VID-FRAME
CHAT:MSN:INVALID:PNG-HEIGHT

CHAT:QQ

CHAT:QQ:QQ-CONNECT-TCP
CHAT:QQ:QQ-CONNECT

CHAT:YIM

CHAT:YIM:XSS
CHAT:YIM:FILE-TRANSFER
CHAT:YIM:HTTP-FILE-TRANSFER
CHAT:YIM:LONG-FILE-NAME
CHAT:YIM:DOUBLE-EXT
CHAT:YIM:YAHOO-HTTP-PROXY
CHAT:YIM:LOGIN-ATTEMPT
CHAT:YIM:HTTP-TUNNEL

CHAT:YIM:OVERFLOW

CHAT:YIM:OVERFLOW:SPOOFED-NAME

DB

DB:IBM-SOLIDDB-ROWNUM
DB:MONGODB-NATIVEHELPER-RCE
DB:INGRES-UUID_FROM_CHAR-OF
DB:SOLIDDB-LOG-FS
DB:FIREBIRD-USER-BO
DB:INGRESDB-IIDBMS-OF
DB:FIREBIRD-XDR-DOS
DB:IBM-SOLIDDB-AUTH-BYPASS
DB:SALESLOGIX-DISC
DB:IBM-SOLIDBD-WHERE-DOS
DB:SAP-MAXDB-SERV-OF
DB:SAPDB-WEB-OF
DB:SOLIDDB-DOS
DB:FIREBIRD-DOS
DB:BORLAND-MSG-BO
DB:VERSANT-OBJ-ARG-INJ

DB:DB2

DB:DB2:JDBC-OF
DB:DB2:XML-QUERY-OF
DB:DB2:CONNECT-DOS
DB:DB2:DB2-DOS
DB:DB2:INVALID-DATA-STREAM-DOS
DB:DB2:IBM-DAS-BOF
DB:DB2:HS-DOS
DB:DB2:SQL-REPEAT-OF

DB:IB

DB:IB:CONNECT-BOF
DB:IB:BORLAND-INTERBASE-BOF

DB:MS-SQL

DB:MS-SQL:PREAUTH-OVERFLOW
DB:MS-SQL:SQLMON-MDAC-OFLOW
DB:MS-SQL:SQLMON-PING-DOS
DB:MS-SQL:SQLMON-EMPTY-PKT
DB:MS-SQL:NULL-PSWRD
DB:MS-SQL:MSSQL-LGN-BRUTE-FORCE
DB:MS-SQL:SQLMON-STACK-OFLOW
DB:MS-SQL:SQLMON-HEAP-OFLOW
DB:MS-SQL:SQLMON-MALFORM-DOS
DB:MS-SQL:XP_CMDSHELL-TDS
DB:MS-SQL:PWD-CHANGE
DB:MS-SQL:XP_CMDSHELL-SMB
DB:MS-SQL:COMMAND-BO
DB:MS-SQL:USER-ADD
DB:MS-SQL:PWD-ENCRYPT
DB:MS-SQL:XP-DIRTREE1
DB:MS-SQL:LOGIN-FAILURE
DB:MS-SQL:X-RAY-SCANNER
DB:MS-SQL:TDI-OVERFLOW
DB:MS-SQL:TDS-FRAG-LEN-ZERO
DB:MS-SQL:SA-LOGIN
DB:MS-SQL:HELLO-OF
DB:MS-SQL:REPLWRITETIVARBIN-MC
DB:MS-SQL:WINCC-DEFAULT-PASS
DB:MS-SQL:REPLWRITETIVARBIN-DB
DB:MS-SQL:2000-SP_START_JOB
DB:MS-SQL:INSERT-CMD-BOF
DB:MS-SQL:CONVERT-OF
DB:MS-SQL:STOR-PROC-PRIV-UPGRD
DB:MS-SQL:TDS-FRAG-FLOOD
DB:MS-SQL:DOS1
DB:MS-SQL:MAL-INSERT

DB:MYSQL

DB:MYSQL:LOGIN-NO-PSWD
DB:MYSQL:LOGIN-OVERLONG-USER
DB:MYSQL:LOGIN-NO-USER
DB:MYSQL:LOGIN-OVERLONG-PSWD
DB:MYSQL:SHORT-MSG
DB:MYSQL:AUTHENTICATION-BYPASS
DB:MYSQL:MAXDB-WEB-OF
DB:MYSQL:MAXDB-WEBDAV-OF
DB:MYSQL:MAXDB-GET-OF
DB:MYSQL:MYSQL-PFIELD-TYPE
DB:MYSQL:ZERO-LEN-PW
DB:MYSQL:LOGIN-FAILED
DB:MYSQL:ROOT-USER
DB:MYSQL:MS-DOS-NAMES-DOS
DB:MYSQL:CREATE-FUNCTION
DB:MYSQL:LONG-FUNC
DB:MYSQL:MYSQL-LDAP-DOS
DB:MYSQL:SINGLE-ROW-DOS
DB:MYSQL:SELECT-SUB-DOS
DB:MYSQL:BRUTE-FORCE
DB:MYSQL:IN-NULL-ARG-DOS
DB:MYSQL:YASSL-HELLO-BO
DB:MYSQL:CREATE-TABLE
DB:MYSQL:MYSQL-IFDOS
DB:MYSQL:UPDATEXML
DB:MYSQL:MYSQL-USE-DOS
DB:MYSQL:SSL-OF
DB:MYSQL:COMMANDS-BO
DB:MYSQL:LOGIN-INFO-DISCLOSURE
DB:MYSQL:BENCHMARK-DOS
DB:MYSQL:MYSQL-DATE-FS
DB:MYSQL:WINDOWS-REMOTE-ROOT
DB:MYSQL:WIN-RCE
DB:MYSQL:MOF-EXEC
DB:MYSQL:UPDATEXML-DOS
DB:MYSQL:MAXDB-CMD
DB:MYSQL:COM-FIELD-LIST-BO
DB:MYSQL:GEOMETRY-INT-OVF
DB:MYSQL:PROC-ANALYSE-DOS
DB:MYSQL:FS-REQUEST
DB:MYSQL:USER-ENUMERATION
DB:MYSQL:COMTABLEDUMP-OF
DB:MYSQL:EXTRACT-VAL-RCE
DB:MYSQL:MAXDB-SERVER-OF
DB:MYSQL:ORACLE-XPATH-DOS
DB:MYSQL:UNIQ-SET-COL-JOIN-DOS
DB:MYSQL:GRANT-FILE-BO
DB:MYSQL:CLIENT-BOF
DB:MYSQL:AUTH-BYPASS
DB:MYSQL:MYSQL-PASSWORD-OF

DB:ORACLE

DB:ORACLE:VULN-VER-10.1.0.1
DB:ORACLE:VULN-VER-9.2.0.4
DB:ORACLE:INSECURE-TNS-LISTENER
DB:ORACLE:APPDET-CONNECT
DB:ORACLE:SDO-CODE-AUTH-BYPASS
DB:ORACLE:USERNAME-DUMP
DB:ORACLE:SQL-PLUS-LOAD-UIX
DB:ORACLE:REPORTS-XML-DISC
DB:ORACLE:DECLARE-EXEC
DB:ORACLE:AS-EMCHARTBEAN-TRAV
DB:ORACLE:CREATE-VIEW
DB:ORACLE:OSB-NDMP-OF
DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO
DB:ORACLE:WAREHOUSE-BUILDER
DB:ORACLE:DBMS-ASSERT
DB:ORACLE:TIMES-TEN-HTTP-DOS
DB:ORACLE:WORKSPACE-MGR-INJ
DB:ORACLE:WEBLOGIC-SERVER
DB:ORACLE:LOGIN-BYPASS
DB:ORACLE:EVTDUMP
DB:ORACLE:XDB-PITRIG-SQLINJ
DB:ORACLE:INVALID-LOGIN
DB:ORACLE:LINK-BOF
DB:ORACLE:ROLLBACKWORKSPACE
DB:ORACLE:METAFILE-PARSER-DOS
DB:ORACLE:XML-SCHEMA-OF
DB:ORACLE:STRCONV-BOF
DB:ORACLE:DBMS-CDC-PUBLISH-INJ
DB:ORACLE:CREATE_TABLES-INJ
DB:ORACLE:FUSION-XLS-IO
DB:ORACLE:ORACLE-DSI
DB:ORACLE:SEARCH-P-GROUPS
DB:ORACLE:GRANT-TYPE-ACCESS-INJ
DB:ORACLE:PITRIG-TRUNC-DROP
DB:ORACLE:LOGIN-CMD-INJ
DB:ORACLE:EXP-APP-WEBCACHE
DB:ORACLE:SDO_TOPO_DROP_FTBL
DB:ORACLE:SDO_CS-TRANS-OF
DB:ORACLE:EMANAGEMENT-BOF
DB:ORACLE:ODCITABLESTART-OF
DB:ORACLE:ORACLE-SQL-BOF
DB:ORACLE:COMPILER-ACL
DB:ORACLE:XDB-DROPMETADATA

DB:ORACLE:DBMS

DB:ORACLE:DBMS:OPMN-LOG-FMT-STR
DB:ORACLE:DBMS:EXP-EXT-UNSAFE
DB:ORACLE:DBMS:CDC-AQJM-UNSAFE
DB:ORACLE:DBMS:EXPORT-PRIV
DB:ORACLE:DBMS:VAL-REMOTE-INJ
DB:ORACLE:DBMS:SUB_NAME-SQL-INJ
DB:ORACLE:DBMS:EXPORT-EXTENSION
DB:ORACLE:DBMS:AQELM-OF
DB:ORACLE:DBMS:JVM-EXP-PERMS
DB:ORACLE:DBMS:CORE-DOS
DB:ORACLE:DBMS:METADATA-UNSAFE
DB:ORACLE:DBMS:JVM-SYS-CMD
DB:ORACLE:DBMS:OUTPUT-TO-JAVA

DB:ORACLE:PASSWD

DB:ORACLE:PASSWD:ORDSYS
DB:ORACLE:PASSWD:OUTLN
DB:ORACLE:PASSWD:ORDPLUGINS
DB:ORACLE:PASSWD:SYSTEM
DB:ORACLE:PASSWD:SCOTT
DB:ORACLE:PASSWD:CTXSYS
DB:ORACLE:PASSWD:BLAKE
DB:ORACLE:PASSWD:JONES
DB:ORACLE:PASSWD:CLARK
DB:ORACLE:PASSWD:ADAMS
DB:ORACLE:PASSWD:TRACESVR
DB:ORACLE:PASSWD:SYS
DB:ORACLE:PASSWD:ORDCOMMON
DB:ORACLE:PASSWD:AURORA
DB:ORACLE:PASSWD:MDSYS
DB:ORACLE:PASSWD:DBSNMP

DB:ORACLE:SYS

DB:ORACLE:SYS:KUPW-WORKER
DB:ORACLE:SYS:MDSYS-SDO-LRS
DB:ORACLE:SYS:PBSDE-INIT-OF
DB:ORACLE:SYS:LT-WORKSPACE
DB:ORACLE:SYS:LT-FINDRICSET
DB:ORACLE:SYS:KUPVFT-UNSAFE
DB:ORACLE:SYS:LPXFSMSAX-NAME-BO

DB:ORACLE:TNS

DB:ORACLE:TNS:MALFORMED-IP
DB:ORACLE:TNS:OVERFLOW_MSG
DB:ORACLE:TNS:UNK-COMMAND
DB:ORACLE:TNS:MALFORMED-PORT
DB:ORACLE:TNS:SHORT_MSG
DB:ORACLE:TNS:RDBMS-DOS
DB:ORACLE:TNS:DOS
DB:ORACLE:TNS:CMD-EXEC
DB:ORACLE:TNS:TRACE-OF
DB:ORACLE:TNS:OF
DB:ORACLE:TNS:INTERMEDIA-DOS
DB:ORACLE:TNS:UNSAFE-CMD
DB:ORACLE:TNS:DBMS-OF
DB:ORACLE:TNS:LOOP-DOS
DB:ORACLE:TNS:ORACLE-PRIVESC
DB:ORACLE:TNS:BEQ-BYPASS
DB:ORACLE:TNS:TABLEFUNC-ASOWN
DB:ORACLE:TNS:ACC-CONTROL-BP
DB:ORACLE:TNS:SERVICE-NAME-OF
DB:ORACLE:TNS:AUTH-SESSKEY-OF-1
DB:ORACLE:TNS:AUTH-SESSKEY-OF-2
DB:ORACLE:TNS:SERVICE-AUTH
DB:ORACLE:TNS:AUTH-SESSKEY

DB:POSTGRESQL

DB:POSTGRESQL:SET-ROLE-BYPASS
DB:POSTGRESQL:DATETIME-BO
DB:POSTGRESQL:CACHEW-OF
DB:POSTGRESQL:LINUX-DBLINK-RCE
DB:POSTGRESQL:DBNAME-CLIFLAGINJ
DB:POSTGRESQL:POSTGRE-DBSEC-BP
DB:POSTGRESQL:GEO-OPS-PATH-IN
DB:POSTGRESQL:DBA-AUTH-BYPASS
DB:POSTGRESQL:SUBSTRING-OF

DB:SYBASE

DB:SYBASE:OPEN-SERVER-MC
DB:SYBASE:OPEN-SERVER-CE
DB:SYBASE:MOBILINK-BO

DDOS

DDOS:LOIC-ANONYMOUS-HTTP
DDOS:JAVALOIC-TWITTER
DDOS:HOIC-HTTP-METHOD
DDOS:LOIC-UDP-METHOD
DDOS:LOIC-TCP-METHOD
DDOS:LONGCAT
DDOS:DIRTJUMPER
DDOS:JAVALOIC-TCP-METHOD
DDOS:LOIC-HTTP-METHOD
DDOS:JAVALOIC-UDP-METHOD
DDOS:LOIC-WEB

DDOS:SHAFT

DDOS:SHAFT:AGENT-TO-HANDLER
DDOS:SHAFT:AGENT-TO-HANDLER-PKT
DDOS:SHAFT:CLIENT-TO-HANDLER
DDOS:SHAFT:HANDLER-TO-AGENT

DDOS:TRIN00

DDOS:TRIN00:DAEMON-CMD-XYZ
DDOS:TRIN00:MASTER-CMD-MDOS
DDOS:TRIN00:MASTER-CMD-MDIE
DDOS:TRIN00:MASTERPW-DEF-STRTUP
DDOS:TRIN00:MASTER-PROMPT
DDOS:TRIN00:MASTER-CMD-MPING
DDOS:TRIN00:DAEMON-TO-MSTR2-PKT
DDOS:TRIN00:DAEMON-TO-MASTER-1
DDOS:TRIN00:MASTER-CMD-KILLDEAD
DDOS:TRIN00:DAEMON-TO-MSTR1-PKT
DDOS:TRIN00:DAEMON-TO-MASTER-2
DDOS:TRIN00:MASTER-CMD-DOS
DDOS:TRIN00:MASTER-CMD-MSIZE
DDOS:TRIN00:DAEMON-CMD-SHI
DDOS:TRIN00:MASTERPW-DEF-KDIE
DDOS:TRIN00:MASTERPW-DEFLT-WIN
DDOS:TRIN00:DAEMON-CMD
DDOS:TRIN00:MASTERPW-DEF-REMOTE

DDOS:TRINITY

DDOS:TRINITY:DEFAULT-PW

DHCP

DHCP:ISC-ZERO-LEN-DOS

DHCP:AUDIT

DHCP:AUDIT:CLI-HWADDR-NOT-T2
DHCP:AUDIT:MISS-MAGIC-COOKIE
DHCP:AUDIT:SVRNAME-NOT-T2
DHCP:AUDIT:UNK-OPCODE
DHCP:AUDIT:UNK-HW-TYPE
DHCP:AUDIT:CLI-HW-MISMATCH
DHCP:AUDIT:INV-CLI-SRC-PORT
DHCP:AUDIT:INV-SVR-SRC-PORT
DHCP:AUDIT:BOOT-FNAME-NOT-T2

DHCP:ERROR

DHCP:ERROR:INV-MSG-TYPE
DHCP:ERROR:INV-MAGIC-COOKIE
DHCP:ERROR:INV-HW-LEN

DHCP:EXPLOIT

DHCP:EXPLOIT:MSG-TOO-SHORT
DHCP:EXPLOIT:HOSTNAME-HTML
DHCP:EXPLOIT:SOLARIS-EXEC

DHCP:OPT

DHCP:OPT:BAD-HOSTNAME
DHCP:OPT:TCP-DEF-TTL-ZERO
DHCP:OPT:INV-OPT-LEN
DHCP:OPT:INV-OPT-VAL
DHCP:OPT:INV-NB-NODE-TYPE
DHCP:OPT:LEASE-TIME-ZERO
DHCP:OPT:MAX-MSG-SIZE-2-SMALL
DHCP:OPT:MAX-DGM-SZ-2-SMALL
DHCP:OPT:IFMTU-TOO-SMALL
DHCP:OPT:DEF-TTL-ZERO
DHCP:OPT:MISSING-EOO
DHCP:OPT:LOG-BUF-OVERFLOW
DHCP:OPT:DHCPD-PKT-SIZE-BO
DHCP:OPT:ISC-DHCPD-MMS-DOS
DHCP:OPT:MS-OPT-OF

DHCP:SERVER

DHCP:SERVER:FMT-STR
DHCP:SERVER:ISC-FORMAT-STRING
DHCP:SERVER:ISC-MAL-CLID
DHCP:SERVER:GNU-BASH-CMD-EXE
DHCP:SERVER:ISC-DUID-BO
DHCP:SERVER:ISC-DHCPD-BO
DHCP:SERVER:ISC-DHCLIENT-BOF
DHCP:SERVER:ISC-PACKET-DOS
DHCP:SERVER:ISC-DISCOVER-DOS
DHCP:SERVER:ISC-CMD-INJ

DISCARD

DISCARD:TRAFFIC

DISCARD:EXPLOIT

DISCARD:EXPLOIT:UNEXPECTED-REP

DISCARD:INFO

DISCARD:INFO:ASCEND-DISCARD

DNS

DNS:TOO-MANY-ERRORS
DNS:POWERDNS-NAMESRVR-UDP-DOS
DNS:SAMBA-DNS-REPLY-FLAG-DOS
DNS:WPADREG
DNS:ISC-BIND-EDNS-OPT-DOS
DNS:PHP-PARSERR-HEAP-BO
DNS:MS-ANY-QUERY-SPOOFING
DNS:POWERDNS-NAMSRVR-TCP-DOS
DNS:ISC-BIND-RRSIG-DOS
DNS:DYNAMICUPDATE
DNS:BIND-RRSIG-QUERY-DOS
DNS:TRAFFIC-TCP
DNS:TRAFFIC-UDP
DNS:RRSIG-QUERY
DNS:BIND9-ASSERT-DOS
DNS:SQUID-DNS-RESPONSE-SPOOF
DNS:RESOLVER-BO
DNS:ISC-BIND-REGEX-DOS
DNS:REQUEST-RRTYPE-ANY
DNS:GNUTLS-DANE-BOF
DNS:RESP-SPOOF
DNS:ISATAPREG
DNS:NEGANY
DNS:MICROSOFT-DNS-DOS
DNS:WORDPRESS-SOAK-SOAK-MALWARE
DNS:BIND-DELEGATION-HANDLNG-DOS
DNS:CRAFTED-MX
DNS:SYMANTEC-DNS-RESPONSE-DOS
DNS:BIND-NXT-OVERFLOW3
DNS:BIND-NXT-OVERFLOW1
DNS:BIND-NXT-OVERFLOW2
DNS:BIND-NXT-OVERFLOW4
DNS:ISC-BIND-TKEY-DOS
DNS:MS-FOREFRONT-RCE
DNS:SYMANTEC-DNS-POISIONING
DNS:BIND-RRSIG-DOS
DNS:MAILENABLE-SPF

DNS:AUDIT

DNS:AUDIT:OPT-NMB-EXCEEDED
DNS:AUDIT:RCODE-NOT-IMPL
DNS:AUDIT:REP-MISMATCHING-QD
DNS:AUDIT:REP-MISMATCHING-AN
DNS:AUDIT:REP-QTYPE-UNEXPECTED
DNS:AUDIT:MISMATCHING-AN-CNAME
DNS:AUDIT:CLASS-NON-IN
DNS:AUDIT:TYPE-OBSOLETE
DNS:AUDIT:RCODE-REFUSED
DNS:AUDIT:TYPE-NON-1035
DNS:AUDIT:RCODE-FORMAT-ERROR
DNS:AUDIT:RCODE-NAME-ERROR
DNS:AUDIT:INVALID-Z
DNS:AUDIT:CLASS-UNKNOWN
DNS:AUDIT:TYPE-EXPERIMENTAL
DNS:AUDIT:TYPE-UNKNOWN
DNS:AUDIT:REP-S2C-QUERY
DNS:AUDIT:TYPE-ALL
DNS:AUDIT:INVALID-RCODE
DNS:AUDIT:REQ-ANSWERS-IN-QUERY
DNS:AUDIT:REQ-INVALID-HDR-RA
DNS:AUDIT:REQ-C2S-RESPONSE
DNS:AUDIT:REQ-INVALID-HDR-RD
DNS:AUDIT:QCLASS-UNEXP
DNS:AUDIT:AAAA-RR
DNS:AUDIT:UNASSIGNED-OPCODE
DNS:AUDIT:Z-RESERVED-OPT

DNS:EXPLOIT

DNS:EXPLOIT:PNTRS-PERNAME-EXCD
DNS:EXPLOIT:TRANSPOOF-2
DNS:EXPLOIT:POINTER-LOOP
DNS:EXPLOIT:EMPTY-UDP-MSG
DNS:EXPLOIT:REQUEST-SHORT-MSG
DNS:EXPLOIT:EXPLOIT-BIND9-RT
DNS:EXPLOIT:MAL-TXT-REC
DNS:EXPLOIT:ISC-BIND-RDATA-DOS
DNS:EXPLOIT:BIND-MULT-RRSET
DNS:EXPLOIT:MS-WIN-NAT-HLPR-DOS
DNS:EXPLOIT:ISC-BIND-DNS64-RPZ
DNS:EXPLOIT:SQUID-PROXY-PTR-DOS
DNS:EXPLOIT:BIND-ADDSOA
DNS:EXPLOIT:SQUID-PROXY-DOS

DNS:FAILURE

DNS:FAILURE:RCODE_NOTAUTH
DNS:FAILURE:RCODE_NOTZONE

DNS:HEADERERROR

DNS:HEADERERROR:INVALID-OPCODE

DNS:INFO

DNS:INFO:RCODE-BADVERS
DNS:INFO:OVERSIZED_ADV_PAYLOAD
DNS:INFO:TYPE-AXFR
DNS:INFO:RCODE-SERVER-FAILURE
DNS:INFO:XFER-BAD
DNS:INFO:XFER-GOOD

DNS:OVERFLOW

DNS:OVERFLOW:SIG-OVERFLOW
DNS:OVERFLOW:TOO-LONG-TCP-MSG
DNS:OVERFLOW:OPT-OVERFLOW
DNS:OVERFLOW:OPT-DOS
DNS:OVERFLOW:NAME-TOO-LONG
DNS:OVERFLOW:INVALID-POINTER
DNS:OVERFLOW:INVALID-LABEL-LEN
DNS:OVERFLOW:NXT-OVERFLOW
DNS:OVERFLOW:SPARC-TCP
DNS:OVERFLOW:SCO-NAMED2-OF1
DNS:OVERFLOW:SCO-NAMED2-OF2
DNS:OVERFLOW:NOOP-RQUERY
DNS:OVERFLOW:DNS-ATMA-SIZE-OF
DNS:OVERFLOW:SYMANTEC-CNAME
DNS:OVERFLOW:TCP-RESPONSE
DNS:OVERFLOW:HOSTNAME-OF
DNS:OVERFLOW:ADM-TCP
DNS:OVERFLOW:TFTPD32
DNS:OVERFLOW:GNU-C-GLIBC
DNS:OVERFLOW:TXTRECORD
DNS:OVERFLOW:SYMNTEC-CNAME
DNS:OVERFLOW:BAD-CHAR-UDP

DNS:QUERY

DNS:QUERY:NULL-QUERY
DNS:QUERY:VERSION-QUERY
DNS:QUERY:ENC-STATUS-SPOOF
DNS:QUERY:BIND-IQUERY-BO
DNS:QUERY:HOSTNAME
DNS:QUERY:AUTHORS
DNS:QUERY:SYMC-DNS-CACHE
DNS:QUERY:ISC-BIND-NSEC3-DOS
DNS:QUERY:WIN-DNS-SERVER-SPOOF

DNS:REPERR

DNS:REPERR:NAPRT-IOF
DNS:REPERR:NULL-RDATA-LEN

DNS:REQUEST

DNS:REQUEST:REVERSE-LOOKUP
DNS:REQUEST:SUN-JRE-DOS

DNS:TUNNEL

DNS:TUNNEL:NULL-RECORD
DNS:TUNNEL:OZYMANDNS
DNS:TUNNEL:IODINE
DNS:TUNNEL:DNS2TCP
DNS:TUNNEL:SHORT-TTL
DNS:TUNNEL:I2P-DNS-QUERY

DOS

DOS:EMULE-DOS
DOS:LINUX-COOKIE-ECHO-DOS
DOS:FREEBSD-ROUTED-DAEMON
DOS:SLOWHTTPTEST-TOOL
DOS:RCA-CABLE-MODEM
DOS:UPNP-CHARGEN-DOS
DOS:MULTIVENDOR-TCP-TIMESTAMP
DOS:DELL-NETVAULT-DOS

DOS:APPLICATION

DOS:APPLICATION:DOS
DOS:APPLICATION:MS-HIS-UDP
DOS:APPLICATION:MS-HIS-TCP

DOS:IP

DOS:IP:LINUX-KERNEL-OOTB
DOS:IP:CHARGEN-BOMB
DOS:IP:LINUX-KERNEL-NF-DOS
DOS:IP:LINUX-DCCP-DOS
DOS:IP:ASCONF-CHUNK-PARSE
DOS:IP:LINUX-KERNEL-INIT
DOS:IP:LINUX-CHUNKINIT-DOS
DOS:IP:LIN-KERNEL-SKACK-DOS
DOS:IP:IGMP-OVERSIZE
DOS:IP:CISCO-IOS-NHRP
DOS:IP:PGM
DOS:IP:FRAGMENT
DOS:IP:IGMP-LINUX

DOS:NETDEV

DOS:NETDEV:CISCO-SYSLOG-DOS
DOS:NETDEV:LINKSYS-GOZILA-DOS2
DOS:NETDEV:NETWORK-3COM-DOS
DOS:NETDEV:HP-LCD-MOD-9001
DOS:NETDEV:NORTEL-MARLIN
DOS:NETDEV:CISCO-SUNND
DOS:NETDEV:CISCO-IPMOBILITY
DOS:NETDEV:ROUTEFINDER-VPN-DOS
DOS:NETDEV:ASCEND-KILL2
DOS:NETDEV:CISCO-SWIPE
DOS:NETDEV:CISCO-TELNET-BOF1
DOS:NETDEV:WEBJET-FW-INFOLEAK
DOS:NETDEV:WEBJET-WRITETOFILE
DOS:NETDEV:WEBJET-HTS-DOT
DOS:NETDEV:LINKSYS-GOZILA-DOS3
DOS:NETDEV:WEBJET-FRAMEWORK
DOS:NETDEV:CISCO-HTTPD-DOS
DOS:NETDEV:D-LINK-DNS-320
DOS:NETDEV:CATALYST-SSH-DOS
DOS:NETDEV:HP-LCD-MOD-9100
DOS:NETDEV:ASCEND-KILL
DOS:NETDEV:CISCO-5000
DOS:NETDEV:LIVINGSTON
DOS:NETDEV:CISCO-PIM

DOS:WINDOWS

DOS:WINDOWS:WGC-VZMN-JP-CGSI
DOS:WINDOWS:KM1-KW-VTJO-WN
DOS:WINDOWS:HTTP-SYS
DOS:WINDOWS:MS-RDP-PATTERN-DOS
DOS:WINDOWS:WINNUKE-NETBIOS
DOS:WINDOWS:ISCSI-TARGET

ECHO

ECHO:CHARGEN-DOS

ECHO:AUDIT

ECHO:AUDIT:LINE

ECHO:EXPLOIT

ECHO:EXPLOIT:MISMATCHING-REPLY
ECHO:EXPLOIT:SERVER-NO-RESPONSE

FINGER:AUDIT

FINGER:AUDIT:REQ-WRONG-FORMAT

FINGER:BACKDOOR

FINGER:BACKDOOR:CMD-ROOTSH

FINGER:DOS

FINGER:DOS:BOMB

FINGER:EXPLOIT

FINGER:EXPLOIT:DOT-AT-HOST
FINGER:EXPLOIT:ACCOUNT-ENUM
FINGER:EXPLOIT:REDIRECTION
FINGER:EXPLOIT:NULL-BYTE
FINGER:EXPLOIT:ZERO-AT-HOST
FINGER:EXPLOIT:PIPE

FINGER:OVERFLOW

FINGER:OVERFLOW:LINE

FINGER:REPLYERROR

FINGER:REPLYERROR:BIN-DATA

FINGER:REQERR

FINGER:REQERR:UNEXP-LINE
FINGER:REQERR:REQ-BINARY-DATA
FINGER:REQERR:BIN-HOST

FINGER:USER

FINGER:USER:SEARCH
FINGER:USER:SLASH-FILE
FINGER:USER:ROOT

FTP

FTP:VSFTPD-BACKDOOR
FTP:CISCO-VPN-ACCESS
FTP:FORMAT-STRING-IN-CMD
FTP:CURL-OF-BANNER
FTP:FREEFLOAT-CMD-BO
FTP:TRIPWIRE-FORMAT-STRING
FTP:SHELLSHOCK
FTP:PHP-FILE-UPLOAD
FTP:SYMLINKS-WGET-INPT-VALID

FTP:AUDIT

FTP:AUDIT:LOGIN-FAILED
FTP:AUDIT:REP-INVALID-REPLY
FTP:AUDIT:REQ-UNKNOWN-CMD
FTP:AUDIT:COMMAND-FAILED
FTP:AUDIT:REQ-NESTED-REQUEST
FTP:AUDIT:REQ-INVALID-CMD-SEQ
FTP:AUDIT:REP-NESTED-REPLY
FTP:AUDIT:REP-BINARY-DATA
FTP:AUDIT:REQ-BINARY-DATA
FTP:AUDIT:BINARY-DATA-FOLDER

FTP:COMMAND

FTP:COMMAND:FTP-FS-COMMAND
FTP:COMMAND:PLATFTP-CD-DOS
FTP:COMMAND:3CDAEMON-PATH-DISCL
FTP:COMMAND:WS-FTP-REST
FTP:COMMAND:SITE-EXEC
FTP:COMMAND:SYMLINK
FTP:COMMAND:PUT-CMD-DIR-TRAV
FTP:COMMAND:GET-CMD-DIR-TRAV-2
FTP:COMMAND:GET-CMD-DIR-TRAV
FTP:COMMAND:SLIMFTP-LIST
FTP:COMMAND:SITE-CMD-INJ
FTP:COMMAND:ACFTP-SERV-DOS
FTP:COMMAND:TITAN-SERV-DIR-TRAV
FTP:COMMAND:SORIN-CHITU-DOS
FTP:COMMAND:CTRL-CHAR
FTP:COMMAND:WINFTP-LIST-CMD-BO
FTP:COMMAND:MULTIPLE-CMD-DIRTRA
FTP:COMMAND:MALICIOUS-CHARS
FTP:COMMAND:MULTIPLE-OF
FTP:COMMAND:STOR-RHOSTS
FTP:COMMAND:VICFTPS-DOS
FTP:COMMAND:WS_FTP-CMD-BO

FTP:DIRECTORY

FTP:DIRECTORY:FTP-REQ-DIR-TRAV
FTP:DIRECTORY:DOT-DOT
FTP:DIRECTORY:DOT-PCT-20-DOT
FTP:DIRECTORY:TILDE-ROOT
FTP:DIRECTORY:CISCOFTP-OF

FTP:DOS

FTP:DOS:NULL-CRED
FTP:DOS:GEN-GLOB-DOS
FTP:DOS:VSFTPD-STAT
FTP:DOS:XM-NLST-NEG
FTP:DOS:FTPDMIN-LIST-CMD
FTP:DOS:VSFTPD-CONNECTION
FTP:DOS:MACOSX-FTPD
FTP:DOS:GOOGLE-CHROME-DOS
FTP:DOS:MUL-FTP-DOS
FTP:DOS:MS-IIS-WILDCARD

FTP:EXPLOIT

FTP:EXPLOIT:BOUNCE-ATTACK
FTP:EXPLOIT:ILLEGAL-PORT
FTP:EXPLOIT:SYNTAX-ERROR
FTP:EXPLOIT:WIN32-WFTPD-BOF
FTP:EXPLOIT:FTPBIN-WRITEABLE
FTP:EXPLOIT:GLFTPD-KAKAKA
FTP:EXPLOIT:ZYXEL-CONF-GET
FTP:EXPLOIT:TYPSOFT-DOS
FTP:EXPLOIT:OPENFTPD-MSG-FS
FTP:EXPLOIT:WSFTP-FMT-STR
FTP:EXPLOIT:CA-FTP-LIST-PASV
FTP:EXPLOIT:MOD-INCLUDE-BOF
FTP:EXPLOIT:VERMILLION-PORT-OF
FTP:EXPLOIT:LEAPFTP-CLI-BO

FTP:EXT

FTP:EXT:DOT-EXEC
FTP:EXT:DOT-PDF

FTP:FILE

FTP:FILE:SPACE.ASP
FTP:FILE:STOR
FTP:FILE:RETR
FTP:FILE:WINDOWS-C-ACCESS
FTP:FILE:FREEFLOAT-AUTH-BYPASS

FTP:LUKEMFTP

FTP:LUKEMFTP:URG-RELOGIN

FTP:MS-FTP

FTP:MS-FTP:MSFTPSVC-DOS
FTP:MS-FTP:MSFTPSVC-EXEC
FTP:MS-FTP:IIS7-5-DOS
FTP:MS-FTP:STAT-GLOB
FTP:MS-FTP:IIS-BOF

FTP:OVERFLOW

FTP:OVERFLOW:PASS-TOO-LONG
FTP:OVERFLOW:SITESTRING-2-LONG
FTP:OVERFLOW:USERNAME-2-LONG
FTP:OVERFLOW:LINE-TOO-LONG
FTP:OVERFLOW:PATH-TOO-LONG
FTP:OVERFLOW:MS-IE-FTP-RES-MC
FTP:OVERFLOW:GUILDFTP-HEAP
FTP:OVERFLOW:K4FTP-OF1
FTP:OVERFLOW:OPENBSD-FTPD-GLOB
FTP:OVERFLOW:PCMAN-STOR-BOF
FTP:OVERFLOW:WFTPD-SIZE
FTP:OVERFLOW:S2C-PATH-OF
FTP:OVERFLOW:REST-INT-OF
FTP:OVERFLOW:FREE-FTPD-PASS
FTP:OVERFLOW:EASY-FTP-OF
FTP:OVERFLOW:MUL-FTP-MKDOF
FTP:OVERFLOW:CMD-NOOP-SLED
FTP:OVERFLOW:CMD-OF
FTP:OVERFLOW:TYPSOFT-SERVER
FTP:OVERFLOW:WINFTP-DATA-OF
FTP:OVERFLOW:ASCII-WRITE
FTP:OVERFLOW:RAIDENFTPD-CMD
FTP:OVERFLOW:UPLUS-MULTI-CMDS
FTP:OVERFLOW:SAMI-LIST-CMND-BO
FTP:OVERFLOW:XLINK-CLIENT
FTP:OVERFLOW:WFTPD-MKD-OVERFLOW
FTP:OVERFLOW:WUBSD-SE-RACE
FTP:OVERFLOW:PATH-LINUX-X86-3

FTP:PABLO-FTP

FTP:PABLO-FTP:FORMAT-STRING

FTP:PASSWORD

FTP:PASSWORD:BRUTE-FORCE
FTP:PASSWORD:ROOT
FTP:PASSWORD:LRKR0X
FTP:PASSWORD:SATORI
FTP:PASSWORD:PLUS
FTP:PASSWORD:H0TB0X
FTP:PASSWORD:WH00T
FTP:PASSWORD:COMMON-PASSWD
FTP:PASSWORD:USER-DICT
FTP:PASSWORD:DEFAULT-USERNM-PW
FTP:PASSWORD:FTPPASS-BLUESKIES

FTP:PROFTP

FTP:PROFTP:USER-DOS
FTP:PROFTP:SIZE-DOS2
FTP:PROFTP:PROFTP-FS-MKDIR
FTP:PROFTP:OFF-BY-ONE
FTP:PROFTP:MOD-SQL-HEAP-OF
FTP:PROFTP:REMOTE-FILE-COPY
FTP:PROFTP:OVERFLOW1
FTP:PROFTP:PPC-FS2

FTP:REQERR

FTP:REQERR:REQ-MISSING-ARGS
FTP:REQERR:REQ-TOO-MANY-ARGS
FTP:REQERR:GNULS-WIDTH-DOS

FTP:RPLERR

FTP:RPLERR:CUTEFTP-OF

FTP:SERVU

FTP:SERVU:STOU-DOS
FTP:SERVU:LIST-OVERFLOW
FTP:SERVU:CHMOD-OVERFLOW
FTP:SERVU:MDTM-OVERFLOW
FTP:SERVU:RNTO-TRAV

FTP:USER

FTP:USER:ACFTP-BAD-LOGIN
FTP:USER:ANONYMOUS
FTP:USER:FORMAT-STRING
FTP:USER:ROOT
FTP:USER:IRIX-DEF-ACCT

FTP:VULN

FTP:VULN:SERVU-FTP-BO
FTP:VULN:SERV-U-FTP-4-2
FTP:VULN:SERV-U-FTP-2-6
FTP:VULN:SERV-U-FTP-5-0-0-6
FTP:VULN:WS-FTP-4-0-2
FTP:VULN:WS-FTP-5-0-4

FTP:WS-FTP

FTP:WS-FTP:WS-FTP-COMM-OF
FTP:WS-FTP:CPWD
FTP:WS-FTP:SITE-ADMIN-DOS

FTP:WU-FTP

FTP:WU-FTP:SETPROCTITLE
FTP:WU-FTP:IREPLY-FS
FTP:WU-FTP:SITE-OF
FTP:WU-FTP:WUFTPD-FMT-STR
FTP:WU-FTP:LINUX-OF
FTP:WU-FTP:OFFBYONE-BOF
FTP:WU-FTP:FTPD-BSD-X86
FTP:WU-FTP:GLOBARG

GOPHER

GOPHER:IE-GOPHER-OF

GOPHER:INVALID

GOPHER:INVALID:TRUNC-LINE
GOPHER:INVALID:PORT
GOPHER:INVALID:DOC-TYPE
GOPHER:INVALID:EOL
GOPHER:INVALID:NST-REQ

GOPHER:OVERFLOW

GOPHER:OVERFLOW:LINE
GOPHER:OVERFLOW:SELECTOR
GOPHER:OVERFLOW:HOST
GOPHER:OVERFLOW:DISPLAY

HTTP

HTTP:INFO-LEAK-CC
HTTP:TOO-MANY-PARAMETERS
HTTP:INFO-LEAK-SSN
HTTP:JAVA-UPDATE-RCE
HTTP:INTEGARD-PASSWORD-BOF
HTTP:ADOBE-ROBOHELP-FILE-UPLOAD
HTTP:SUN-WEBDAV-FD
HTTP:REAL-DESCBO
HTTP:MONGOOSE-HTTPD-URI-OF
HTTP:MALICIOUS-SESSION-COOKIE
HTTP:REMOTE-URL-IN-VAR
HTTP:WEBDAV-SEARCH-NO-LENGTH
HTTP:SUN-DIGEST-OF
HTTP:OPENX-AD-SERVER-PHP-CE
HTTP:WEBDAV-FS
HTTP:YOUNGZSOFT-MAILCOM-BO
HTTP:XDOMAINXML
HTTP:EASYLAN-REG-BOF
HTTP:DFIND-PROBE
HTTP:SAP-MGT-CON-OSEXEC
HTTP:CLAMAV-ENCRYPT-PDF-MC
HTTP:VLCFS
HTTP:WEBSRV-BO-4096
HTTP:SKYPE-EZPMUTILS
HTTP:DLINK-CMD-RCE
HTTP:STATIC-SERVER-BOF
HTTP:SUN-JAVA-SYSTEM-WEBDAV-OF
HTTP:ASC-TIMETABLES-SUBJECT-BOF
HTTP:MICROSOFT-ASPNET-POST-DOS
HTTP:HP-PRINTER-INFO-DISCLOSURE
HTTP:FIREFOX-XDOMAIN-INFODISC
HTTP:SOLARWINDS-AUTH-BYPASS
HTTP:WP-FGALLERY-MAL-FILE-POST
HTTP:APPLE-SAFARI-BYPASS
HTTP:WINAMP-SKIN-DOWNLOAD
HTTP:MS-VBSCRIPT-UAF-RCE
HTTP:SYBASE-AGSOAP-EXE-BOF
HTTP:MS-LYNC-SERVER-RCE
HTTP:REGIN-CNC-TRAFFIC
HTTP:ESTSOFT-ALZIP-MIM-BO
HTTP:DOURAN-ARB-FILE-DL
HTTP:ORACLE-JRE-INSECURE-LOAD
HTTP:WP-FGALLERY-MAL-FILE-HOST
HTTP:ALLATORI-JAVA-OBFUSCATOR
HTTP:MAMBO-MYSQL-INF-DISCLOSURE
HTTP:MS-IE-MEMORY-CORRUPTION
HTTP:MULTIPLE-WEBSER-INFO-LEAK
HTTP:SYSAX-SERVER-BOF
HTTP:NGINX-RQST-URI-SECBYPASS
HTTP:ADOBE-FLASH-PLAYER-BO
HTTP:UBIQUITI-AIROS-CE
HTTP:ADOBE-FLASHPLYR-PRIV-ESC
HTTP:LANDESK-MGT-GATEWAY-CMDINJ
HTTP:ZONEALARM-PROXY-DOS
HTTP:NCSS-SPREADSHEET
HTTP:WINAMP-WLZ-BO
HTTP:GHOSTSCRIPT-ERRPRINTF-BOF
HTTP:GTA-SA-MP-CFG-BO
HTTP:MOREAMP-MAF-BO
HTTP:FUCTWEB-CAPCC-CAPTCHA
HTTP:ALTNWADMIN
HTTP:INTELLITAMPER-DEFER-BO
HTTP:MS-IE-MHTMLFILE-DOS
HTTP:HP-INSIGHT-DIAGNOSTICS-LFI
HTTP:INOUT-ARTICLE-BASE-CSRF
HTTP:MULTI-MEDIA-FORMATS-BO
HTTP:BSPLAYER-BSI-FILE-BO
HTTP:MICROSOFT-WORKS-WKSSS-BO
HTTP:MAPLE-MAPLET-FILE-BO
HTTP:SONICWALL-CONTENT-FILTER
HTTP:BROWSE3D-SFS-FILE-BO
HTTP:W3C-AMAYA-BOF
HTTP:BLUEZONE-ZAD-BO
HTTP:LIVE-FOR-SPEED-MPR-BO
HTTP:YAHOO-MSNGR-URI-DOS
HTTP:REALTEK-MEDIAPLAYER-PLA-BO
HTTP:SUN-JAVA-WEBSERVER-DOS
HTTP:XAMPP-REQUEST-FORGERY
HTTP:INTEGARD-VERSION-CHECK
HTTP:NOVELL-NETIQ-MOD-POLBYPAS
HTTP:NTOP-BASIC-AUTHORIZATION
HTTP:NETBSD-TNFTP-CE
HTTP:LIGHTHTTPD-CONNECTION-DOS
HTTP:MANAGENGINE-EVTLG-INF-DISC
HTTP:XNVIEW-MBM-FILE-BO
HTTP:ULTRAVNC-VNCLOG-BO
HTTP:MACROCHECK-DOCUMENT
HTTP:TRENDMICRO-CTRLMGR-SQLINJ
HTTP:NAGIOS-GRAPHEXPLORE-CMDINJ
HTTP:LAYTON-HELPBOX-AUTH-BYPASS
HTTP:RUBY-GEM-SEMICOLON
HTTP:VLC-ABC-FILE-BOF
HTTP:NOVELL-NETIQ-EVAL-POLBYPAS
HTTP:RUBYONRAILS-JSONYAML-RCE
HTTP:PARALLEL-PLESK-RCE
HTTP:CLANSPHERE-COOKIE-LFI
HTTP:FIREFLY-MEDIA-SERVER-DOS
HTTP:VMWARE-VSPHERE-DOS
HTTP:JAVA-EXPRESS-HTML-INJ
HTTP:KASPERSKY-URI-PARSING-DOS
HTTP:JAVA-JSP-SRC-CODE-DISC
HTTP:ADOBE-INDESIGN-SOAP-RCE
HTTP:FTP-ACTIVEX-CE
HTTP:APPLE-QT-TTD-BO
HTTP:ACMS-ASSETS-INFODISC
HTTP:GD-GRAPHICS-PNG
HTTP:NGINX-CHUNKED-BO
HTTP:AVIRA-SECURE-BCKUP-REG-BOF
HTTP:MS-WORDPERFECT-BOF
HTTP:JOOMLA-WEBRING-RFI
HTTP:ROBOHELP-SQL-INJ
HTTP:RUBYONRAILS-XMLYAML-RCE
HTTP:FOXIT-FF-URL-STG-BO
HTTP:FIREFOX-IDN-SPOOF
HTTP:RESIN-INFO-DISCLOSURE
HTTP:MS-MDAC-RCE
HTTP:WIPER-SHAMOON-FILE-DWNLD
HTTP:WORDPRESS-W3PLUGIN-RCE
HTTP:ALTN-SG-OF
HTTP:NAGIOS-CONFMGR-SQLINJ
HTTP:JOOMLA-MEDIAMGR-FILEUPLOAD
HTTP:MS-DOT-NET-HEAP-CORRUPT
HTTP:JABBER-SERVER-BYPASS
HTTP:CA-XOSOFT-XOSOAP
HTTP:OFFICESCAN-CGIRECVFILE
HTTP:SONICWALL-GMS-RCE
HTTP:EMC-DPA-EJBSERVLET-RCE
HTTP:DLINK-DIR605L-CAPTCHA-BOF
HTTP:MS-OUTLOOK-2003-OBJ-SEC-SB
HTTP:GLPI-INSTALLPHP-RCE
HTTP:HTTP-INVALID-PORT-VALUE
HTTP:MS-WINDOWS-X509-DOS
HTTP:ISA-AUTH-BYPASS
HTTP:BACKDOOR-UPATRE-UA
HTTP:SWF-CVE-2014-0503-RCE
HTTP:MONKEY-HTTPD-BO
HTTP:AUTOCAD-FAS-FILE-EXEC
HTTP:WIRELURKER-SNUPLOAD
HTTP:ORACLE-ID-MANAGER-REDIRECT
HTTP:OSSIM-COMMAND-EXEC
HTTP:WIRESHARK-MPEG-BOF
HTTP:UNUSUAL-REFERER
HTTP:WIRELURKER-VRUPDATE
HTTP:C99-SHELL-BACKDOOR
HTTP:CONTENTKEEPER-BENETOOL-CE
HTTP:MANAGENGINE-INF-DISC
HTTP:MANAGENGINE-POL-BYPASS
HTTP:ZENOSS-VER-CHECK-RCE
HTTP:SOLARWINDS-POLICYBYPASS
HTTP:JAVA-UA-EXE-DL
HTTP:LEXMARK-LIB-FILE-DIR-TRAV
HTTP:MICROSYS-BASE64-BO
HTTP:MAGENTO-PAR-AUTH-BYPASS
HTTP:FORTINET-HELLO-MSG-DOS
HTTP:FORTINET-HELLO-MSG-BOF
HTTP:ELASTICSEARCH-REST-ACE
HTTP:SUN-GLASSFISH-AUTH-BP
HTTP:DLL-REQ-VIA-WEBDAV
HTTP:SQUID-HEADER-VALUE-DOS
HTTP:MAXTHON-HISTORY-XSS
HTTP:MS-WIN-FOLDER-GUID-CE
HTTP:OPENMEDIAVAULT-AUTHEN-ACE
HTTP:DLINK-AUTHENTICATION-BO
HTTP:VMTURBO-OS-COMM-INJ
HTTP:CARBERP-BACKDOOR-RCE
HTTP:PHPWIKI-PLOTICUS-ACE
HTTP:HP-SITESCOPE-INF-DISC
HTTP:XML-EXTERNAL-ENTITY-INJ
HTTP:MANAGENGINE-EVENTLOG-CSRF
HTTP:ATLASIAN-JIRA-DIR-TRAVER
HTTP:SCADA-WEB-INTERFACE-DOS
HTTP:TRENDMICRO-FMT-STR
HTTP:MICROSOFT-IE-USEAFTERFREE
HTTP:BROWSER-WINDOW-INJECTION
HTTP:FOXIT-PNG-PDF-BO
HTTP:ISAPI-RSA-WEB
HTTP:IESHIMS-DLL-HIJACK
HTTP:LOCALHOST-ON-INTERNET
HTTP:MS-TELNET-INSECURE-LOADING
HTTP:GOOGLE-SKETCHUP-BMP-BO
HTTP:MS-WINDOWS-HYPERLINK-BO
HTTP:PCAP-FORMATSTR-GENERIC
HTTP:LANDESK-REQ-FORGERY
HTTP:NEUTRINO-EK-SB
HTTP:EK-ANGLER-JAVA
HTTP:SPRING-XMLENTITY-INFODISC
HTTP:APPLE-SGI-BOF
HTTP:MS-DOT-NET-XAML-RCE
HTTP:PFSENSE-ZONE-CSS
HTTP:DIGIUM-ASTERISK-BO

HTTP:3COM

HTTP:3COM:LOG-CLEAN
HTTP:3COM:3COM-PASS-LEAK
HTTP:3COM:ADMIN-LOGOUT
HTTP:3COM:CONF-DOWNLOAD
HTTP:3COM:OFFICECONNECT

HTTP:AGORA

HTTP:AGORA:AUTH
HTTP:AGORA:DBACCESS
HTTP:AGORA:POSTGRES65

HTTP:APACHE

HTTP:APACHE:MOD-LOG-CONFIG-DOS
HTTP:APACHE:WWWPASSWD-FILE-DISC
HTTP:APACHE:USER-ENUM
HTTP:APACHE:PHP-DOS
HTTP:APACHE:HTGREP-HDR
HTTP:APACHE:ENCODED-DIRTRAV
HTTP:APACHE:RESIN-WEB-INF
HTTP:APACHE:STRUTS-URIREDIRECT
HTTP:APACHE:INV-HEADER-DOS
HTTP:APACHE:WILDCARD-CMD-EXEC
HTTP:APACHE:MOD-NTLM-BOF1
HTTP:APACHE:WIN32BATCH
HTTP:APACHE:LDAPFS
HTTP:APACHE:STRUTS-CI-SECBYPASS
HTTP:APACHE:REWRITE-OF
HTTP:APACHE:APACHE-CHUNKREQ-DOS
HTTP:APACHE:COUCHDB-UUID-DOS
HTTP:APACHE:AXIS-SOAP-DOS
HTTP:APACHE:STRUTS-INCLUDPARAMS
HTTP:APACHE:SERVER-MODPROXY-DOS
HTTP:APACHE:APACHE-NIO-DOS
HTTP:APACHE:NOSEJOB
HTTP:APACHE:SERVER-MOD-STATS-BO
HTTP:APACHE:HTTP-SERVER-MOD-DOS
HTTP:APACHE:MOD-DAV-MERGE-DOS
HTTP:APACHE:APR-DOS
HTTP:APACHE:STRUTS2-OGNL-INJ
HTTP:APACHE:STRUTS2-COOKIE-OGNL
HTTP:APACHE:MOD-REWRITE-CMD-EXE
HTTP:APACHE:MOD-CACHE-DOS
HTTP:APACHE:REV-PROXY-EXPLOIT
HTTP:APACHE:ARCHIVA-CSRF
HTTP:APACHE:2.0-CGI-PATH-DISC
HTTP:APACHE:SERVER-INFO-DISC
HTTP:APACHE:STRUTS2-OGNL-CE
HTTP:APACHE:SERVER-STATUS-PROBE
HTTP:APACHE:APR-UTIL-LIB-DOS
HTTP:APACHE:MASSACRE-DOS-VAR
HTTP:APACHE:TOMCAT-CAL2JSP-XSS
HTTP:APACHE:RANGE-DOS
HTTP:APACHE:MODRPAF-XFWD-DOS
HTTP:APACHE:MOD-PROXY-SECBYPASS
HTTP:APACHE:HTTPD-ERROR-400
HTTP:APACHE:HTTPD-MODLOG-COOKIE
HTTP:APACHE:MOD-CACHE-DOS-STC
HTTP:APACHE:MOD-CACHE-DOS-CLT
HTTP:APACHE:STRUTS-RCE
HTTP:APACHE:ACTIVEMQ-INFO-DISC
HTTP:APACHE:WEBDAV-PROPFIND
HTTP:APACHE:COOKIE-INFO-DISC
HTTP:APACHE:STRUTS-SECBYPASS
HTTP:APACHE:STRUTS2-PI-RCE
HTTP:APACHE:SCALP
HTTP:APACHE:ROLLER-OGNL-RCE
HTTP:APACHE:SOLR-FILE-DISC
HTTP:APACHE:STRUTS-OGNL-CMDEXEC
HTTP:APACHE:APR-PSPRINTF-MC
HTTP:APACHE:FILEUPLOAD-CNT-TYPE
HTTP:APACHE:STRUTS-SKILLNAME-CE
HTTP:APACHE:RPC-RAVE-INFO-DISC
HTTP:APACHE:MYFACES-DIR-TRAV
HTTP:APACHE:CAMEL-XSLT-JCE
HTTP:APACHE:STRUTS-URI-CMDEXEC
HTTP:APACHE:STRUTS-OGNL-CE
HTTP:APACHE:XSPACE
HTTP:APACHE:FILTER-DISPATCHER
HTTP:APACHE:MODPHP-UPLOAD-HOF
HTTP:APACHE:LONG-HEADER-DOS
HTTP:APACHE:BYTE-RANGE-LEAK
HTTP:APACHE:MODPROXY-AJP-DOS
HTTP:APACHE:MOD-TCL-FS
HTTP:APACHE:MOD-ISAPI-RCE

HTTP:AUDIT

HTTP:AUDIT:LENGTH-OVER-2048
HTTP:AUDIT:LENGTH-OVER-1024
HTTP:AUDIT:LENGTH-OVER-256
HTTP:AUDIT:LENGTH-OVER-8192
HTTP:AUDIT:LENGTH-OVER-4096
HTTP:AUDIT:UNKNWN-REQ
HTTP:AUDIT:URL
HTTP:AUDIT:INV-HTTP-VER
HTTP:AUDIT:LENGTH-OVER-512
HTTP:AUDIT:REQ-LONG-UTF8CODE
HTTP:AUDIT:TOO-MANY-HEADERS
HTTP:AUDIT:FW1-SCHEME-OF
HTTP:AUDIT:ROBOTS.TXT
HTTP:AUDIT:NULL-HREF
HTTP:AUDIT:UNWISE-CHAR
HTTP:AUDIT:HTTP-VER-1.0
HTTP:AUDIT:HTTP-1.0-HOST-HEADER
HTTP:AUDIT:GENERIC-FMT-STR
HTTP:AUDIT:BINARY-IN-URLENCODE
HTTP:AUDIT:CHUNKED-TRANSFER
HTTP:AUDIT:ACMS-FLV-URLSPOOF
HTTP:AUDIT:UNKNOWN-VERB

HTTP:BADBLUE

HTTP:BADBLUE:INVALID-GET-DOS
HTTP:BADBLUE:PROXY-RELAY
HTTP:BADBLUE:MFC-ISAPI-CMD-OF

HTTP:BARRACUDA

HTTP:BARRACUDA:PREV-EXEC

HTTP:BIGBROTHER

HTTP:BIGBROTHER:INFO-DISCLOSURE

HTTP:BROWSER

HTTP:BROWSER:ICQ
HTTP:BROWSER:MARQUEE-TAG-DOS
HTTP:BROWSER:FIREFOX-OGG
HTTP:BROWSER:MOZILLA-DBKEYRANGE
HTTP:BROWSER:GOOGLE-CHROME-DOS
HTTP:BROWSER:URI-OBFUSCATION
HTTP:BROWSER:FIREFOX-GIF-DOS
HTTP:BROWSER:SAFARI-RELOAD-DOS
HTTP:BROWSER:CHROME-JS-ENG-MC
HTTP:BROWSER:FIREFOX-DATA-URI
HTTP:BROWSER:POLICY-BYPASS

HTTP:CGI

HTTP:CGI:APM-ACC-BYPASS
HTTP:CGI:ANYFORM-SEMICOLON
HTTP:CGI:IKONBOARD-BADCOOKIE
HTTP:CGI:LISTSERV-BO
HTTP:CGI:EASY-MB-PRINT
HTTP:CGI:LIBCGI-RFP-OVERWRITE
HTTP:CGI:AXIS-ACCOUNT
HTTP:CGI:AXIS-EXEC
HTTP:CGI:AWSTATS
HTTP:CGI:CDOMAINFREE-RMT-EXEC
HTTP:CGI:KORWEBLOG-PATHDISC
HTTP:CGI:RSA-AGENT-BOF
HTTP:CGI:CHETCPASSWD-OF
HTTP:CGI:TWIKI-VIEW-EXEC
HTTP:CGI:INCLUDER-EXEC
HTTP:CGI:MONALBUM
HTTP:CGI:REF-CMD-INJECT
HTTP:CGI:NAGIOS-CMD-INJ
HTTP:CGI:SOFTCART
HTTP:CGI:SOJOURN-FILE-VIEW
HTTP:CGI:STORE-ATTEMPT
HTTP:CGI:WAYBOARD-FILE-DISCLSR
HTTP:CGI:HASSAN-DIR-TRAVERSAL
HTTP:CGI:QUIKSTORE-CFG-ACCESS
HTTP:CGI:ALLAIRE-SHELL-ATTEMPT
HTTP:CGI:CAREY-COMMERCE-DIR-TRV
HTTP:CGI:CVSWEB-CGI-SEMICOLON
HTTP:CGI:EXCITE-AT-ADMIN-CGI
HTTP:CGI:EXTROPIA-DIR-TRAVERSAL
HTTP:CGI:INFOSRCH-REMOTE-EXEC
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
HTTP:CGI:TECHNOTE-MAIN-DCLSR
HTTP:CGI:MONALBUM-INFO
HTTP:CGI:USERONLINE-LOGLEAK
HTTP:CGI:HTDIG-INCLUSION
HTTP:CGI:EMUMAIL-INFO-LEAK
HTTP:CGI:EASYNEWS-ADMIN1
HTTP:CGI:ORACLE-RPT-INFOLEAK
HTTP:CGI:LIBCGI-TUXBR-OF1
HTTP:CGI:LITESERV-CGI-DISC
HTTP:CGI:BOOZT-CGI-OF
HTTP:CGI:SITESEARCHER-EXEC
HTTP:CGI:BATCH-PIPE
HTTP:CGI:TEXIS-INFOPROBE
HTTP:CGI:SMARTSEARCH-EXEC
HTTP:CGI:CPANEL5-GB-EXEC
HTTP:CGI:SUNPS-IRUNBOOK
HTTP:CGI:MAIL-FORM-ACCESS
HTTP:CGI:SPIDERSALES
HTTP:CGI:TEST-CGI
HTTP:CGI:FORMMAIL-VULN
HTTP:CGI:GLIMPSE-PIPE
HTTP:CGI:VIRTUAL-VISION-TRVRSL
HTTP:CGI:UBNT-AIROS-CMD-INJ
HTTP:CGI:APPLE-QT-FILEDISC1
HTTP:CGI:YABB-DIR-TRAVERSAL
HTTP:CGI:CYBEROFFICE-DB-REQUEST
HTTP:CGI:ROADS-FILE-DISCLOSURE
HTTP:CGI:LANDSK-UPLOAD-RCE
HTTP:CGI:EMAIL-VIRTUAL-APP
HTTP:CGI:WEBSCADA
HTTP:CGI:GROUNDWORK-MONITOR-CE
HTTP:CGI:BASH-CODE-INJECTION
HTTP:CGI:BASH-INJECTION-URL
HTTP:CGI:ZEN-LB-CMD-EXEC
HTTP:CGI:MOVABLE-TYPE-UPGRADE
HTTP:CGI:BASH-INJECTION-HEADER
HTTP:CGI:BUGZILLA-SEMICOLON
HTTP:CGI:SHELLSHOCK
HTTP:CGI:NULL-ENCODING
HTTP:CGI:AWC-XSL-CMD-INJ
HTTP:CGI:CTEK-SKYROUTER-EXEC
HTTP:CGI:TWIKI-MAKETEXT-RCE
HTTP:CGI:TWIKI-REV-CMD-INJ
HTTP:CGI:NAGIOS-HISTORY-PRM-BO
HTTP:CGI:NAGIOS-XI-AUTODISC-CMD
HTTP:CGI:ZAMFOO-CMD-INJ
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE
HTTP:CGI:SCRUTINIZER-CE
HTTP:CGI:OFFICESCAN-CGI-BO
HTTP:CGI:SUPERMICRO-BOF
HTTP:CGI:GENERIC-WEB-APP-CE
HTTP:CGI:DLINK-ROUTER-CMD-INJ
HTTP:CGI:ALTAVISTA-TRAVERSAL
HTTP:CGI:ME-DESKTOP-CENT-ADMIN
HTTP:CGI:FAXSURVEY-REMOTE-EXEC
HTTP:CGI:TWIKI-SEARCH-CMD-EXEC
HTTP:CGI:NAGIOS-CORE-DOS
HTTP:CGI:WEBPALS-EXEC

HTTP:CGI:BUGZILLA

HTTP:CGI:BUGZILLA:PRIV-UP

HTTP:CGI:PERL

HTTP:CGI:PERL:WEBHINT-CMD-INJ
HTTP:CGI:PERL:DUMPENV-PROBE

HTTP:CHKP

HTTP:CHKP:AUTH-FMT-STR
HTTP:CHKP:AUTH-HDR-BOF
HTTP:CHKP:VPN1-UTM-XSS

HTTP:CISCO

HTTP:CISCO:SERVLETEXEC
HTTP:CISCO:MARS-JMX
HTTP:CISCO:WIFI-AUTH-DOS
HTTP:CISCO:UNIFIED-XSS
HTTP:CISCO:CISCOWORKS-DIR-TRAV
HTTP:CISCO:UNIFIED-XSS-2
HTTP:CISCO:IOS-ADMIN-ACCESS
HTTP:CISCO:WIFI-CONTROLLER-DOS
HTTP:CISCO:IOS-ERROR-DOS
HTTP:CISCO:LINKSYS-CMD-INJ
HTTP:CISCO:LINKSYS-WRT54GL-CSRF
HTTP:CISCO:LINKSYS-WRT54GL-XSS
HTTP:CISCO:LINKSYS-CODE-INJ
HTTP:CISCO:SOURCE-CODE-DISC
HTTP:CISCO:CUCM-DIR-TRAV
HTTP:CISCO:CONTROLLER-CSRF
HTTP:CISCO:CSUSERCGI-BOF
HTTP:CISCO:SCANNER-PROBE
HTTP:CISCO:ASA-VPN-SEC-BYPASS
HTTP:CISCO:CATALYST-ARB-CMD
HTTP:CISCO:IOS-HTML-INJ
HTTP:CISCO:DOWNLOADSERVLET-FU
HTTP:CISCO:LINKSYS-APPLY-RCE
HTTP:CISCO:FILEUPLOADSERVLET
HTTP:CISCO:PROCESSIMAGESAVE-FU

HTTP:CISCO:VOIP

HTTP:CISCO:VOIP:STREAM-ID-REQ
HTTP:CISCO:VOIP:STREAM-ID-DOS
HTTP:CISCO:VOIP:PORT-INFO-DOS

HTTP:COBALT

HTTP:COBALT:SEC-REQ-PROBE
HTTP:COBALT:SERVICE-DOS
HTTP:COBALT:CONF-DIR-TRAV
HTTP:COBALT:SEC-REQ-PROBE-2

HTTP:COLDFUSION

HTTP:COLDFUSION:CFM-FILE
HTTP:COLDFUSION:GETFILE-PROBE
HTTP:COLDFUSION:CFCACHE-MAP
HTTP:COLDFUSION:CF-CLASS-DWLD
HTTP:COLDFUSION:CVE-2013-3336
HTTP:COLDFUSION:CFIDE-AUTHBYPAS
HTTP:COLDFUSION:ENV-VAR-OW
HTTP:COLDFUSION:XML-CMD-INJ
HTTP:COLDFUSION:ADMIN-PROBE
HTTP:COLDFUSION:HEADER-LOG-OF

HTTP:CYCLADES

HTTP:CYCLADES:SAVEUSER-PRIV
HTTP:CYCLADES:CONSOLE-CON

HTTP:DIR

HTTP:DIR:TRAVERSE-DIRECTORY
HTTP:DIR:NOVELL-ZENWORKS
HTTP:DIR:HTTP-HOST-HDR
HTTP:DIR:WP-UNGALLERY-LFD
HTTP:DIR:HTTP-COOKIE-HDR
HTTP:DIR:NOVELL-GROUPWSE-DIRTRA
HTTP:DIR:MESMP-DIR-TRAV
HTTP:DIR:WINACE-DIR-TRVRS
HTTP:DIR:ORACLE-HYPERION-TRAV
HTTP:DIR:BARRACUDA-DIRTRAV
HTTP:DIR:PARAMETER-TRAVERSE
HTTP:DIR:QUICKSHARE-DIR-TRAV
HTTP:DIR:APACHE-SHIRO-DIR-TRAV
HTTP:DIR:DLINK-DNS-DIR-TRAV
HTTP:DIR:HP-LOADRUNNER-LOGIN
HTTP:DIR:TRAV-ENCODED
HTTP:DIR:MNGE-ENGINE-FILE-DLD
HTTP:DIR:MS-SHAREPOINT
HTTP:DIR:HTTP-ACCEPT-ENCODING
HTTP:DIR:VISUALMINING-NETCHARTS
HTTP:DIR:HTTP-ACCEPT-LANG
HTTP:DIR:CA-ERWIN-WEB-PORTAL
HTTP:DIR:HTTP-AUTH-HDR
HTTP:DIR:HTTP-REFERER-HDR
HTTP:DIR:HTTP-UA-HDR
HTTP:DIR:CRYSTAL-REPORTS
HTTP:DIR:HTTP-CONTENT-MD5
HTTP:DIR:HTTP-CONT-TYPE
HTTP:DIR:HTTP-ACCEPT-HDR
HTTP:DIR:MUL-VEN-DIR-TRAV
HTTP:DIR:HTTP-REQ-URL
HTTP:DIR:HTTP-REQUEST-HDR
HTTP:DIR:ADMIN-PATH-TRAVERSAL
HTTP:DIR:MANAGEENGINE
HTTP:DIR:NOVELL-ZENWORKS-TRAV
HTTP:DIR:HP-LOADRUNNER-EMU
HTTP:DIR:ENDECA-ETLSERVER-DT
HTTP:DIR:ORACLE-INFO-DISCOVERY

HTTP:DOMINO

HTTP:DOMINO:POST-DOS2
HTTP:DOMINO:NSF-DIR-TRAVERSAL
HTTP:DOMINO:USERNAME-DISCOVERY
HTTP:DOMINO:NSF-PASSWORD-BYPASS
HTTP:DOMINO:HASH-DUMPER
HTTP:DOMINO:INFO-LEAK
HTTP:DOMINO:SAMETIME-URL-OF
HTTP:DOMINO:CSP-SRC-DISCLOSURE
HTTP:DOMINO:REDIR-BOF
HTTP:DOMINO:HPRAGENTNAME-BOF
HTTP:DOMINO:ACCEPT-LANG-OF

HTTP:DOS

HTTP:DOS:HULK-DOS
HTTP:DOS:SLOW-HEADER-DOS
HTTP:DOS:POPPLER-MAL
HTTP:DOS:INF-ARRAY-SORT
HTTP:DOS:GOLDENEYE-DOS
HTTP:DOS:HTTPKILLER-KEEPALIVE
HTTP:DOS:NOOP-SLED-REQ-MALF
HTTP:DOS:SCHNEIDER-EXPRT-SCADA
HTTP:DOS:DRUPAL-XML-RPC-IEE
HTTP:DOS:SAFARI-FILE-DOWNLOAD
HTTP:DOS:MUL-VENDORS
HTTP:DOS:MUL-PRODUCTS
HTTP:DOS:SQUID-HDR-RANGE
HTTP:DOS:DRUPAL-XMLRPC-TAGS
HTTP:DOS:APACHE-TOMCAT-CHUNKED

HTTP:EXPLOIT

HTTP:EXPLOIT:AMBIG-CONTENT-LEN
HTTP:EXPLOIT:BRUTE-SEARCH
HTTP:EXPLOIT:BRUTE-FORCE
HTTP:EXPLOIT:WEBMIN-FS-INT
HTTP:EXPLOIT:SLASH-EVASION
HTTP:EXPLOIT:SWS-NO-LINEFEED
HTTP:EXPLOIT:VAR-RESPONSE-SPLIT
HTTP:EXPLOIT:SMALL-FIRST-DATA
HTTP:EXPLOIT:PI3WEB-USERS
HTTP:EXPLOIT:MS-DOS-DEV
HTTP:EXPLOIT:XERVER-NULL-INJ
HTTP:EXPLOIT:SYM-FILEUPLOAD
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
HTTP:EXPLOIT:BIN-IN-AUTH-BASIC
HTTP:EXPLOIT:FP2K-ASP-UPLOAD
HTTP:EXPLOIT:REDMINE-CMD-EXEC
HTTP:EXPLOIT:WEBSTER-URL-OF
HTTP:EXPLOIT:D-LINK-ADMIN-PW
HTTP:EXPLOIT:JUNK-HEADERS
HTTP:EXPLOIT:HEADER-FOLDING
HTTP:EXPLOIT:HOST-RANDOM-2
HTTP:EXPLOIT:HOST-RANDOM-3
HTTP:EXPLOIT:HOST-RANDOM-4
HTTP:EXPLOIT:HOST-RANDOM-1
HTTP:EXPLOIT:IE-SAVE-AS-HIDE
HTTP:EXPLOIT:MAL-LNK
HTTP:EXPLOIT:URI-RANDOM-HOST
HTTP:EXPLOIT:SQLXML-ISAPI-OF
HTTP:EXPLOIT:MS-TCPSTACK-URLDOS
HTTP:EXPLOIT:HOST-RANDOM-5
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
HTTP:EXPLOIT:XITAMI-HEAD-DOS

HTTP:EXT

HTTP:EXT:FILE-EXT-IN-DIR
HTTP:EXT:DOT-XUL
HTTP:EXT:DOT-PPT
HTTP:EXT:DOT-RPT
HTTP:EXT:DOT-PIF
HTTP:EXT:DOT-UNSAFE
HTTP:EXT:SCR
HTTP:EXT:DOT-VML
HTTP:EXT:DOT-LNK
HTTP:EXT:HTRSRCFRAG
HTTP:EXT:DOT-GRP
HTTP:EXT:DOT-CHM
HTTP:EXT:DOT-JOB
HTTP:EXT:DOT-RAT
HTTP:EXT:METAFILE
HTTP:EXT:DOT-HLP
HTTP:EXT:RAT-SVR-PUSH

HTTP:FRONTPAGE

HTTP:FRONTPAGE:ADMIN.PWD-REQ
HTTP:FRONTPAGE:AUTH-PWD-PROBE
HTTP:FRONTPAGE:FRM-RES-PROBE
HTTP:FRONTPAGE:SERVICE.PWD-REQ
HTTP:FRONTPAGE:FP30REG.DLL-OF
HTTP:FRONTPAGE:AUTHOR-PWD-INFO
HTTP:FRONTPAGE:SHTML.EXE-PATH
HTTP:FRONTPAGE:DOS-NAME-DOS

HTTP:GMAIL

HTTP:GMAIL:FILE-UPLOAD
HTTP:GMAIL:FILE-DOWNLOAD

HTTP:HOTMAIL

HTTP:HOTMAIL:FILE-DOWNLOAD
HTTP:HOTMAIL:EXE-DOWNLOAD
HTTP:HOTMAIL:LIVE-EXE-ATTACH
HTTP:HOTMAIL:LIVE-ATTACH
HTTP:HOTMAIL:LIVE-ACTIVITY
HTTP:HOTMAIL:FILE-UPLOAD
HTTP:HOTMAIL:ZIP-DOWNLOAD

HTTP:IIS

HTTP:IIS:MFC-EXT-OF
HTTP:IIS:SHAREPOINT-XSS
HTTP:IIS:FILE-LIST-ATTEMPT
HTTP:IIS:CMDSHELL-ATTEMPT
HTTP:IIS:SHARE-ID
HTTP:IIS:ENUMDSN-ATTEMPT
HTTP:IIS:EXAIR-DOS
HTTP:IIS:ISM.DLL-FILENAME
HTTP:IIS:SITE-SERVER-FILE-UPLD
HTTP:IIS:PERL-0A-ATTEMPT
HTTP:IIS:BAT-AMP
HTTP:IIS:JET-DB-VBA-REMOTE-EXEC
HTTP:IIS:SAM-DOWNLOAD-ATTEMPT
HTTP:IIS:FPCOUNT-OVERFLOW
HTTP:IIS:REGREAD-ATTEMPT
HTTP:IIS:ADMIN-PROBE
HTTP:IIS:FP30REG-CSS1
HTTP:IIS:MALFORMED-EXT-DATA
HTTP:IIS:MSADC-PROBE
HTTP:IIS:IISCHECK-PROBE
HTTP:IIS:HDR-EVASION
HTTP:IIS:MSADC-VBBO-ACCESS
HTTP:IIS:ASPX-DOS
HTTP:IIS:MALFORMED-HTR-REQUEST
HTTP:IIS:INDEX-SERVER-SQLQHIT
HTTP:IIS:TILDE-INFO-DISC
HTTP:IIS:IIS-HILIGHT-BYPASS
HTTP:IIS:IIS-DISC
HTTP:IIS:IIS-BYPASS
HTTP:IIS:SENSEPOST.EXE
HTTP:IIS:IIS-6-7-AUTH-BYPASS
HTTP:IIS:SP-SCRIPTRESX-XSS
HTTP:IIS:DIR-BYPASS
HTTP:IIS:ASP-SEARCH-PROBE
HTTP:IIS:ASP-PAGE-BOF
HTTP:IIS:MS-RD-WEB-ACCESS-XSS
HTTP:IIS:ASP-FORMS-DISCLOSURE
HTTP:IIS:IIS-HTR-CHUNKED
HTTP:IIS:COLDFUSION-INFOLEAK
HTTP:IIS:ASP-RCE
HTTP:IIS:IISAPI-EXT-PATH-DISC
HTTP:IIS:ASPNET-DISCLOSURE
HTTP:IIS:SOURCE-VIEW
HTTP:IIS:SHAREPOINT-DOS
HTTP:IIS:ASP-NET-FORM-REDIRECT
HTTP:IIS:SOURCE-CODE-DISC
HTTP:IIS:IIS-EXT-BYPASS
HTTP:IIS:NSIISLOG-OF
HTTP:IIS:ASP-NET-MVC-SEC-BYPASS
HTTP:IIS:DOT-NET-SERVER-DOS
HTTP:IIS:SERVERVARIABLES-INFO
HTTP:IIS:LOCALHOST-SPOOF
HTTP:IIS:COMMAND-EXEC-ALL
HTTP:IIS:HTW-CROSS-SITE
HTTP:IIS:ISAPI-IDQ-OVERFLOW
HTTP:IIS:ASN-1-BOF
HTTP:IIS:HTR-OVERFLOW
HTTP:IIS:MDAC-RDS
HTTP:IIS:DLL-URL-REQ
HTTP:IIS:HEADER-HOST-DOS
HTTP:IIS:INDEX-SERVER-SRC-CODE
HTTP:IIS:MDAC-DATASTUB
HTTP:IIS:PBSERVER-PARAM-OF
HTTP:IIS:HTR-OF-2
HTTP:IIS:MS-SHAREPOINT-DOS
HTTP:IIS:ASP-SHOWCODE
HTTP:IIS:CGI-BIN-CMD-EXE
HTTP:IIS:ASPX-URL
HTTP:IIS:ASP-DOT-NET-VSTATE
HTTP:IIS:ASN.1-BIT-STRING
HTTP:IIS:ASPNET-DOS
HTTP:IIS:SHAREPOINT-2010-XSS
HTTP:IIS:SCHANNEL-IMPROPER-CERT
HTTP:IIS:TRACK-REQUEST
HTTP:IIS:PROPFIND
HTTP:IIS:X-SITE-SCRIPT
HTTP:IIS:UNC-PATH-DISC
HTTP:IIS:NSIISLOG-CHUNKED-POST
HTTP:IIS:ODATA-PROTOCOL-DOS
HTTP:IIS:AD-SERVER-CONFIG
HTTP:IIS:HTR-ASP-CODE-DISC
HTTP:IIS:FASTCGI
HTTP:IIS:4-INTERNAL-IP-DISC
HTTP:IIS:ADFS-MAL-HEADER
HTTP:IIS:MDAC-RDS-2
HTTP:IIS:ASP-DOT-NET-BACKSLASH
HTTP:IIS:ISAPI-IDA-OVERFLOW
HTTP:IIS:INT-OVERFLOW-DOS
HTTP:IIS:WEB-CONFIG-INFO-LEAK
HTTP:IIS:ASP-CHUNKED-OF
HTTP:IIS:ISAPI-PRINTER-OVERFLOW
HTTP:IIS:SAMPLE-ACCESS
HTTP:IIS:IIS-ADS-BYPASS
HTTP:IIS:SHAREPOINT-CONVERT
HTTP:IIS:IIS-AUTH-BYPASS
HTTP:IIS:SHAREPOINT-PRIV-ESC
HTTP:IIS:PERC-2E-ASP
HTTP:IIS:IISADMPWD-PROXY-PASSWD
HTTP:IIS:SHAREPOINT-MUL-XSS
HTTP:IIS:DATA-DISCLOSURE

HTTP:IIS:CMS

HTTP:IIS:CMS:MAL-CMS-REQ
HTTP:IIS:CMS:MAL-CMS-REQ-2

HTTP:IIS:ENCODING

HTTP:IIS:ENCODING:SINGLE-DIG-2
HTTP:IIS:ENCODING:SINGLE-DIG-1
HTTP:IIS:ENCODING:UNICODE-BP
HTTP:IIS:ENCODING:PERC-PERC-2
HTTP:IIS:ENCODING:PERC-PERC-1
HTTP:IIS:ENCODING:PERC-PERC-3
HTTP:IIS:ENCODING:UNICODE

HTTP:IIS:WEBDAV

HTTP:IIS:WEBDAV:MALFORMED-REQ2
HTTP:IIS:WEBDAV:MALFORMED-REQ1
HTTP:IIS:WEBDAV:WINDOWS-SHELL
HTTP:IIS:WEBDAV:SEARCH-OF
HTTP:IIS:WEBDAV:REQ-DISCLO
HTTP:IIS:WEBDAV:XML-HANDLER-DOS
HTTP:IIS:WEBDAV:COMMAND-OF
HTTP:IIS:WEBDAV:AUTH-BYPASS

HTTP:INFLATE

HTTP:INFLATE:TYPE-MISMATCH
HTTP:INFLATE:OVERFLOW

HTTP:INFO

HTTP:INFO:REQ-NO-CONTENT-LENGTH
HTTP:INFO:YOUTUBE
HTTP:INFO:XEROX-DS-INFO
HTTP:INFO:RESIN-DEV-WEBROOT
HTTP:INFO:MWS-SEARCH-OF1
HTTP:INFO:TMICRO-PROXY-REQ
HTTP:INFO:FARK
HTTP:INFO:SPIDER-ROBOT
HTTP:INFO:FACEBOOK
HTTP:INFO:MS-UPDATE
HTTP:INFO:OFFLINE-CACHING-HTML5
HTTP:INFO:HTML5-CONTENT
HTTP:INFO:HTTPPOST-GETSTYLE
HTTP:INFO:YOUTUBE-APP
HTTP:INFO:IDN-HOSTNAME
HTTP:INFO:NULL-AUTH
HTTP:INFO:CHARSET-ASCII
HTTP:INFO:AUTH-NEGOTIATE

HTTP:INFO-LEAK

HTTP:INFO-LEAK:POLYCOM
HTTP:INFO-LEAK:PHP-PROXIMA
HTTP:INFO-LEAK:JOOMLA-SQLREPORT
HTTP:INFO-LEAK:HTACCESS
HTTP:INFO-LEAK:NSCONFIG
HTTP:INFO-LEAK:SALESCART-DB
HTTP:INFO-LEAK:NETGEAR-CONFLEAK
HTTP:INFO-LEAK:VIGNETTE-LEAK-2
HTTP:INFO-LEAK:JBOSS-JSP-SRC
HTTP:INFO-LEAK:VIGNETTE-LEAK
HTTP:INFO-LEAK:WFCHAT
HTTP:INFO-LEAK:CUTENEWS
HTTP:INFO-LEAK:HTPASSWD-REQUEST
HTTP:INFO-LEAK:ORACLE-SQL
HTTP:INFO-LEAK:WIN-INI
HTTP:INFO-LEAK:SELENA-WEBSTORE
HTTP:INFO-LEAK:DS-STORE
HTTP:INFO-LEAK:LAYTON-TECH
HTTP:INFO-LEAK:ZYXEL-PRESTIGE
HTTP:INFO-LEAK:F-SECURE-MANAGER
HTTP:INFO-LEAK:COFFEECUP
HTTP:INFO-LEAK:BANNERMATIC
HTTP:INFO-LEAK:ASP-WEB-CONFIG
HTTP:INFO-LEAK:BARRACUDADRIVE
HTTP:INFO-LEAK:SNOOP-DISLOSURE
HTTP:INFO-LEAK:BUGZILLA-DISC
HTTP:INFO-LEAK:BOOT-INI
HTTP:INFO-LEAK:WORDPRES-GAZETTE
HTTP:INFO-LEAK:CART32-INFO-LEAK
HTTP:INFO-LEAK:WEB-INF-DOT
HTTP:INFO-LEAK:LIVE-WIRE
HTTP:INFO-LEAK:WP-DBM-CFG
HTTP:INFO-LEAK:SSN-CLEARTEXT
HTTP:INFO-LEAK:D-LINK-MUL
HTTP:INFO-LEAK:GOOGLEMAP-PLUGIN
HTTP:INFO-LEAK:SHAREPOINT-INFO
HTTP:INFO-LEAK:CC-CLEAR-VAR
HTTP:INFO-LEAK:MULTIPLE-VENDORS
HTTP:INFO-LEAK:HP-SITESCOPE
HTTP:INFO-LEAK:MS-IE-MOUSE-MVMT
HTTP:INFO-LEAK:F5-BIG-IP-XML
HTTP:INFO-LEAK:DVR-VS-PWD-DISC
HTTP:INFO-LEAK:DVR-VS-LOG-DISC
HTTP:INFO-LEAK:SUGARCRM
HTTP:INFO-LEAK:BOOT-INI-TCP
HTTP:INFO-LEAK:MS-VISIO-XML
HTTP:INFO-LEAK:HYPERSTOP-HOST
HTTP:INFO-LEAK:JUNOS-J-WEB
HTTP:INFO-LEAK:MUL-WEB-SERVER
HTTP:INFO-LEAK:MS-PKCS-INFODISC
HTTP:INFO-LEAK:REDHAT-JBOSS
HTTP:INFO-LEAK:IBM-FP-SERLET
HTTP:INFO-LEAK:TOSTATICHTML-API
HTTP:INFO-LEAK:DOT-NET-CODE
HTTP:INFO-LEAK:NET-INFO-DISC
HTTP:INFO-LEAK:HTTP-SHARE-ENUM
HTTP:INFO-LEAK:IIS-FILE-ACCESS
HTTP:INFO-LEAK:HP-LASERJET-PRO
HTTP:INFO-LEAK:JETY-SRV-RESP
HTTP:INFO-LEAK:WP-MUL-PLUGINS
HTTP:INFO-LEAK:CONCRETE5
HTTP:INFO-LEAK:NETGEAR-MUL
HTTP:INFO-LEAK:MUL-VENDORS-1
HTTP:INFO-LEAK:CHECK-POINT-MUL
HTTP:INFO-LEAK:NOVELL-ZENWORKS
HTTP:INFO-LEAK:HP-APISITESCOPE
HTTP:INFO-LEAK:ASP-ORACLE-PAD
HTTP:INFO-LEAK:CA-TOTAL-DEFENSE
HTTP:INFO-LEAK:GOAHEAD-PERM
HTTP:INFO-LEAK:VIGNETTE-DIAG

HTTP:INVALID

HTTP:INVALID:NON-STAND-W-SPACE
HTTP:INVALID:BAD-CONTENT-LENGTH
HTTP:INVALID:INVLD-AUTH-CHAR
HTTP:INVALID:HDR-FIELD
HTTP:INVALID:UNEXPECTCHAR
HTTP:INVALID:MSNG-HTTP-VER
HTTP:INVALID:MISSING-REQ
HTTP:INVALID:DUPLICATE-HEADER
HTTP:INVALID:INVLD-AUTH-LEN
HTTP:INVALID:HOST_HEADER_S2C
HTTP:INVALID:STATUS-CODE
HTTP:INVALID:CHUNK-HEADER
HTTP:INVALID:EXPECT
HTTP:INVALID:VAR-NEG-LG

HTTP:IRIX

HTTP:IRIX:CGI-BIN-REMOTE-EXEC
HTTP:IRIX:CGI-BIN-WRAP

HTTP:LHTTPD

HTTP:LHTTPD:HOST-DOT-DOT-SLASH
HTTP:LHTTPD:FCGI-HEADER-OF
HTTP:LHTTPD:GET-BOF

HTTP:LINUX

HTTP:LINUX:RPM-QUERY
HTTP:LINUX:DD-WRT-MGMT-GUI
HTTP:LINUX:REDHAT-ACCEPT-LANG

HTTP:MISC

HTTP:MISC:MOBY-LENGTH-DOS
HTTP:MISC:MULTPLE-EK-JAR-DOWNLD
HTTP:MISC:BLUECOAT-ADMIN
HTTP:MISC:BLUECOAT-LICENSE
HTTP:MISC:SPLUNK-MAPPY-RCE
HTTP:MISC:AVAILABLEMEDIA-REQ
HTTP:MISC:WWWACL-PROBE
HTTP:MISC:HP-PROCURVE-RESET
HTTP:MISC:DLINK-CAMERA-VIDEO-BY
HTTP:MISC:SINAPSI-CMD-INJ
HTTP:MISC:JIGSAW-DEV-DOS1
HTTP:MISC:XENEO-WEBREQ-DOS
HTTP:MISC:XOOPS-WEBROOT
HTTP:MISC:TOPTOOLS-HPNST-DOS
HTTP:MISC:VISNETIC-DOS
HTTP:MISC:WEBWEAVER-DDP
HTTP:MISC:MOODLOGIC-CLIENT
HTTP:MISC:RAS-CFG
HTTP:MISC:FLASH-CVE-2014-0554
HTTP:MISC:MS-USERS-PWD-INFO-DIS
HTTP:MISC:NG-WG602-BACKDOOR
HTTP:MISC:X-MICRO-WLAN-PASSWORD
HTTP:MISC:EMULIVE-ADMIN
HTTP:MISC:NEOTERIS-IVE-BF
HTTP:MISC:LINBIT-LINBOX-BYPASS
HTTP:MISC:MOODLE-RCE
HTTP:MISC:FORTIGATE-CSRF
HTTP:MISC:OPENSIS-PARAM-PHP-INJ
HTTP:MISC:MOTOROLA-WR850
HTTP:MISC:MUTINY-5-EDITDOCUMENT
HTTP:MISC:WESTERN-DIGITAL-LFI
HTTP:MISC:NODEJS-DOS
HTTP:MISC:WP-IMG-UPLOAD
HTTP:MISC:ZENOSS-CMD-EXEC
HTTP:MISC:KEYFOCUS-KF-DIRTRAV
HTTP:MISC:IBM-CRDIT-LMT-BYPAS
HTTP:MISC:IBM-CONSOLE-FILE-READ
HTTP:MISC:APPLE-MAPS-APP
HTTP:MISC:RAILS-ROUTING
HTTP:MISC:ZENOSS-CE
HTTP:MISC:WAPP-PARAM-SEC2
HTTP:MISC:TM-INTERSCAN-DIR-TRAV
HTTP:MISC:ZOPE-CMD-RCE
HTTP:MISC:NETCHARTS-SER-RCE
HTTP:MISC:COREL-PDF-FUSION-XPS
HTTP:MISC:DLINK-CE
HTTP:MISC:ABYSS-HDR-DOS
HTTP:MISC:WIN-MOVIE-MAKER-DOS
HTTP:MISC:UPTIME-MONTRN-PHP-RCE
HTTP:MISC:SPAM-TO-PHP-REDIR
HTTP:MISC:NGINX-CHUNK-TRANS-DOS
HTTP:MISC:OPENFILER-NETWORKCARD
HTTP:MISC:JENKINS-CONSOLE-CE
HTTP:MISC:DLINK-CMD-INJECTION
HTTP:MISC:ALIEN-VAULT-OSSIM-CE
HTTP:MISC:FREEPBX-CFG-CODE-EXEC
HTTP:MISC:APPLE-CUPS-RCE
HTTP:MISC:ALIENVAULT-OSSIM-CE
HTTP:MISC:LIFESIZE-ROOM-SEC-BY
HTTP:MISC:SPRING-HEADER-INJ
HTTP:MISC:NEWGEN-OMNIDOCS-PRIV
HTTP:MISC:LIFESIZE-ROOM-CMD-INJ
HTTP:MISC:BLUECOAT-HOST-HDR-OF
HTTP:MISC:GRAPHITE-RCE
HTTP:MISC:PYTHON-ZLIB-BO
HTTP:MISC:MULTIPLE-PRODCT-CSRF
HTTP:MISC:MS-OWA-URL-REDIR
HTTP:MISC:XEROX-4595-COPIER
HTTP:MISC:BLUECOAT-K9-BO
HTTP:MISC:DESTINY-PLAYER-DOS
HTTP:MISC:MULTI-ANTIVIRUS-ASCII
HTTP:MISC:DLINK-DIR-300
HTTP:MISC:PLATINUM-UPNP-LIB-BO
HTTP:MISC:EVIEWS-PRG-BO
HTTP:MISC:PYTHON-IMGOP-OF
HTTP:MISC:PYTHON-PYLOCALE
HTTP:MISC:MEGACUBO-URI-HANDLR
HTTP:MISC:MAYA-EO-VIDEO-BO
HTTP:MISC:SAVANT-WEBSERVER-BOF
HTTP:MISC:COMPFACE-XBM-BO
HTTP:MISC:ICARUS-ICP-BO
HTTP:MISC:FOXIT-READER-BO
HTTP:MISC:IDM-LANG-BO
HTTP:MISC:DB-POMER-AMP-BO
HTTP:MISC:HYDRA-IRC-DOS
HTTP:MISC:DDWRT-REQUEST-FORGERY
HTTP:MISC:MS-FOREFRONT-DOS
HTTP:MISC:MANAGENGINE-EVNTLG-CE
HTTP:MISC:DLINK-CAPTCHA-BO
HTTP:MISC:BUFFALO-LINK-INFO
HTTP:MISC:UBIQUITI-AIROS-CE
HTTP:MISC:MONOWALL-CSRF
HTTP:MISC:MINIUPNPD-SOAP-ACTION
HTTP:MISC:WEEVELY
HTTP:MISC:SQUID-DNS-REPLIES
HTTP:MISC:ASTIUM-PBX-PHP-CE
HTTP:MISC:SONICWALL-AUTH-BYPAS
HTTP:MISC:BELKIN-ROUTER-UPLOAD
HTTP:MISC:NGINX-ENCODED-DOS
HTTP:MISC:AWSTATS-EXEC
HTTP:MISC:HASTYMAIL-CMD-INJ
HTTP:MISC:FREEPBX-AUTH-BYPASS
HTTP:MISC:WIRESHARK-MMS-DOS
HTTP:MISC:DLINK-OS-CMD-INJ
HTTP:MISC:DVR-VS-RCE
HTTP:MISC:WEB-BBS-CE
HTTP:MISC:ALCATEL-OMNIPCX-RCE
HTTP:MISC:ALCATEL-OMNIPCX-CE
HTTP:MISC:COPPERMINE-SQL-INJ
HTTP:MISC:D-LINK-DAP-1160
HTTP:MISC:D-LINK-DIR-615-PASSWD
HTTP:MISC:DLINK-INFO-DISCLOSURE
HTTP:MISC:IBM-JAVA-UTF8-BYPASS
HTTP:MISC:CVSTRAC-FILEDIFF-RCE
HTTP:MISC:TP-LINK-TD-8817-CSRF
HTTP:MISC:SAP-ITS-INFO-DISC
HTTP:MISC:AV-INVALID-CHKSUM
HTTP:MISC:WIRESHARK-DECT-OF
HTTP:MISC:RUBY-WEBRICK-ESCAPE
HTTP:MISC:AIRSPAN-PROST-WIMAX
HTTP:MISC:CAMTRON-AUTH-BYPASS
HTTP:MISC:MANAGEENGINE-APPS
HTTP:MISC:F-PORT-ANTIVIRUS-OF
HTTP:MISC:MS-XML-SIG-VAL-DOS
HTTP:MISC:WEBUI-COMMAND-EXEC
HTTP:MISC:DATALIFE-ENGINE-RCE
HTTP:MISC:MUTINY-CMD-INJ
HTTP:MISC:ADOBE-COLDFUSION-HTML
HTTP:MISC:DAS-STUDIO-RCE
HTTP:MISC:GOOGLE-SKETCHUP
HTTP:MISC:BEETEL-TC1-450-CSRF
HTTP:MISC:NEG-CTN-LENGTH-STC
HTTP:MISC:MS-SHARE-POINT-RCE
HTTP:MISC:NETGEAR-CMD-INJ
HTTP:MISC:DLINK-CAMERA-CMD-INJ
HTTP:MISC:HP-SYS-IPRANGE-OF
HTTP:MISC:AA-COOKIE-PARAM-RCE
HTTP:MISC:MS-MOVIE-MAKER-OCX
HTTP:MISC:MANAGE-ENGNE-ADMIN-AC
HTTP:MISC:F5-ICONTROL-SOAP-CE
HTTP:MISC:SYMANTEC-COMMAND-EXEC
HTTP:MISC:HP-RELEASE-CONTROL
HTTP:MISC:FILE-DOWNLOAD
HTTP:MISC:COGENT-SERVER-CMD-INJ
HTTP:MISC:MULTIPLE-PRDCT-CSRF
HTTP:MISC:MULTI-PRDCTS-CSRF-1
HTTP:MISC:MUL-VENDORS-CSRF
HTTP:MISC:MUTI-PROD-COMND-EXEC
HTTP:MISC:MULTIPLE-VENDORS-UAF
HTTP:MISC:MULTIPLE-VENDORS-CSRF
HTTP:MISC:PHPMOADMIN-RCE
HTTP:MISC:SEAGATE-NAS-RCE
HTTP:MISC:WAPP-PARAM-SEC1
HTTP:MISC:WAPP-SUSP-FILEUL1
HTTP:MISC:MUL-AUTH-BYPASS
HTTP:MISC:SNORT-URICNTNT-EVASON
HTTP:MISC:SPLUNK-CUSTOM-APP-CE
HTTP:MISC:MUL-VEND-IMPRO-ACCESS
HTTP:MISC:PRDCTS-COMMAND-EXEC
HTTP:MISC:PRDCTS-COMMAND-INJ
HTTP:MISC:MANAGEENGINE-PRIV-ESC
HTTP:MISC:NEG-CTN-LENGTH-CLT
HTTP:MISC:MULTIPLE-VENDORS-RCE
HTTP:MISC:MULTPLE-PRODUCT-CSRF
HTTP:MISC:MULTIPLE-PRODUCT-CSRF
HTTP:MISC:WAVELINK-HDR-PARSE-BO
HTTP:MISC:MULTPLE-PRDCTS-RCE
HTTP:MISC:WAPP-PARAM-SEC3
HTTP:MISC:WORDPRESS-PHP-ACE
HTTP:MISC:ABEE-CHM-MAKER-RCE
HTTP:MISC:SAMSNG-DVR-COOKI-AUTH
HTTP:MISC:LETTERBOX-RCE
HTTP:MISC:CUTEZIP-BO
HTTP:MISC:CHASYS-BO
HTTP:MISC:JBOSS-SEAM-EL-RCE
HTTP:MISC:DLINK-EXSHEL-PARAM-CE
HTTP:MISC:WING-FTP-COMMNAD-EXEC
HTTP:MISC:IRFVIEW-JP2-BO
HTTP:MISC:GSM-SIMEDIT-BO
HTTP:MISC:BLKIN-PARAM-HNDLNG-CE
HTTP:MISC:ERS-VIEWER-BO
HTTP:MISC:ES-GROOVY-CODEEXEC
HTTP:MISC:DLINK-INFOCGI-BO
HTTP:MISC:APSTRUTS-DEV-EXEC
HTTP:MISC:EPO-XMLENTITY-INJ
HTTP:MISC:MLTPLE-TABLE-INFO-DIS
HTTP:MISC:DYNDNSUPDATE
HTTP:MISC:CVE-2014-6332-RCE
HTTP:MISC:GE-GEFEBT-CE
HTTP:MISC:DOLIBARR-ERP-COMM-INJ
HTTP:MISC:RUBY-RAILS-SECRET-RCE
HTTP:MISC:APPLE-INSTALLER-FS
HTTP:MISC:ESF-PFSENSE-RCE
HTTP:MISC:WINDOWS-DLL-LOAD-CE
HTTP:MISC:CVE-2013-3214-AB
HTTP:MISC:PHPWIKI-SHELL-CE
HTTP:MISC:GITLAB-SH-EXEC
HTTP:MISC:MAC-COMM-EXEC
HTTP:MISC:WINRAR-FILENM-SPOOF
HTTP:MISC:DLINK-COOKI-HANDLN-BO
HTTP:MISC:JOOMLA-UNSER-CE
HTTP:MISC:GITLIST-URI-REQ-CE
HTTP:MISC:FRITZ-SEC-BYPASS-CE
HTTP:MISC:ZPANEL-HTPASWD-MOD-CE
HTTP:MISC:WINDOWS-GREENDAM-BO
HTTP:MISC:ARRIS-VAP-RCE
HTTP:MISC:WIRESHARK-LUA-RCE
HTTP:MISC:PANDORA-SERVICE-CE
HTTP:MISC:EDOC-UPLOAD-PHP-CE
HTTP:MISC:MCAFFEE-SRV-HDR
HTTP:MISC:OPENPLI-CE
HTTP:MISC:MANAGEENGINE-FILE-UP
HTTP:MISC:WEBFILEMANAGER-RFI
HTTP:MISC:EZGUESTBOOK
HTTP:MISC:POSTER-SW-PUI-FILE-OF
HTTP:MISC:SHAMBALA-DOS1
HTTP:MISC:EK-REDKIT-JAR-DOWNLD
HTTP:MISC:COOL-EXKIT-JAR-DL
HTTP:MISC:EK-HIMAN-JAVA
HTTP:MISC:REAL-RMP-TRAV

HTTP:NCSA

HTTP:NCSA:NPH-TEST-CGI
HTTP:NCSA:PHF-EXEC

HTTP:NETGEAR

HTTP:NETGEAR:DG834G-DEBUG-MODE
HTTP:NETGEAR:NETGEAR-PRO-SAFE
HTTP:NETGEAR:DGN1000B-SETUP-RCE

HTTP:NETSCAPE

HTTP:NETSCAPE:INDEX-DISCLOSURE
HTTP:NETSCAPE:ENTERPRISE-DOS

HTTP:NOVELL

HTTP:NOVELL:WEBACC-MODIFY
HTTP:NOVELL:IMANAGER-TOMCAT-BOF
HTTP:NOVELL:DHOST-BOF
HTTP:NOVELL:TEAMING-UPLOAD
HTTP:NOVELL:ZENWORKS-RTRLET-COM
HTTP:NOVELL:FILENAME-PARAM-DT
HTTP:NOVELL:REPORTER-AGENT
HTTP:NOVELL:ZENWORKS-INFODISC
HTTP:NOVELL:DHOST-URI-BOF
HTTP:NOVELL:EDIR-ACCEPT-LANG-OF
HTTP:NOVELL:GROUPWISE-IMG-BOF
HTTP:NOVELL:EDIR-DHOST
HTTP:NOVELL:GROUPWISE-CSS
HTTP:NOVELL:ACT-PARAM-ID
HTTP:NOVELL:EDIRECTORY-SOAP
HTTP:NOVELL:NETMAIL-WEBADMIN
HTTP:NOVELL:GROUPWISE-NETAGT-BO

HTTP:ORACLE

HTTP:ORACLE:OWA-UTIL-INFO-DISC
HTTP:ORACLE:CHAR-CONV-VULN
HTTP:ORACLE:OUTSIDEIN-MET-BOF
HTTP:ORACLE:APEX-HASH
HTTP:ORACLE:SERVER-FORMS-CE
HTTP:ORACLE:WEBCENTER-SITES-RF
HTTP:ORACLE:SBA-CMD-INJ
HTTP:ORACLE:SSO-ACCESS
HTTP:ORACLE:OS-2-METAFILE-BOF
HTTP:ORACLE:JNLP-CODE-EXEC
HTTP:ORACLE:BACKUP-AUTH-BYPASS
HTTP:ORACLE:GLASSFISH-REST
HTTP:ORACLE:CONF-ACCESS
HTTP:ORACLE:ISQLPLUS-OF
HTTP:ORACLE:XML-SIG-SPOOFING
HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO
HTTP:ORACLE:GLASSFISH-MUL-XSS
HTTP:ORACLE:DEMANTRA-FILEACCESS
HTTP:ORACLE:ENDECA-SERVER-RCE
HTTP:ORACLE:WEBCENTER-HEADR-INJ
HTTP:ORACLE:OUTSIDE-IN-MSACCESS
HTTP:ORACLE:OUTSIDEIN-CORELDRAW
HTTP:ORACLE:BACKUP-CMD-INJ
HTTP:ORACLE:COREL-DRAW-BO
HTTP:ORACLE:REPORTS-RCE
HTTP:ORACLE:SRV-OPMN-FS
HTTP:ORACLE:LOGIN-COOKIES-INJ
HTTP:ORACLE:DATAINT-ACTIVEX-MC
HTTP:ORACLE:9I-APP-SERVER-DOS
HTTP:ORACLE:SOAP-CONF
HTTP:ORACLE:ORACLE9I-INFO-LEAK
HTTP:ORACLE:GLASSFISH-BYPASS
HTTP:ORACLE:PARADOX-DB-DOS
HTTP:ORACLE:EVNTPRO-DIR-TRAV
HTTP:ORACLE:APP-SERVER-BYPASS
HTTP:ORACLE:GENERIC-SIGNATUR-MC
HTTP:ORACLE:JAVA-SERVICELOADER

HTTP:OVERFLOW

HTTP:OVERFLOW:CONTENT-ENCODING
HTTP:OVERFLOW:USER-AGENT
HTTP:OVERFLOW:TRANSFER-ENCODING
HTTP:OVERFLOW:SET-COOKIE
HTTP:OVERFLOW:CONTENT-LOCATION
HTTP:OVERFLOW:AUTHORIZATION
HTTP:OVERFLOW:REFERER
HTTP:OVERFLOW:SERVER
HTTP:OVERFLOW:CONTENT-MD5
HTTP:OVERFLOW:ACCEPT-ENCODING
HTTP:OVERFLOW:CONTENT-LANGUAGE
HTTP:OVERFLOW:CONTENT-LENGTH
HTTP:OVERFLOW:ACCEPT
HTTP:OVERFLOW:ACCEPT-LANGUAGE
HTTP:OVERFLOW:CONNECTION
HTTP:OVERFLOW:CONTENT-RANGE
HTTP:OVERFLOW:CHUNK-OVERFLOW
HTTP:OVERFLOW:VERB-OVERFLOW
HTTP:OVERFLOW:INV-CHUNK-LEN
HTTP:OVERFLOW:COOKIE
HTTP:OVERFLOW:CONTENT-OVERFLOW
HTTP:OVERFLOW:HEADER
HTTP:OVERFLOW:AUTH-OVFLW
HTTP:OVERFLOW:CHUNK-LEN-OFLOW
HTTP:OVERFLOW:CHUNKS-TOO-SMALL
HTTP:OVERFLOW:CONTENT-TYPE
HTTP:OVERFLOW:HOST
HTTP:OVERFLOW:URL-OVERFLOW
HTTP:OVERFLOW:NULLHTTPD-ROOT-OF
HTTP:OVERFLOW:SAMBAR-SEARCH
HTTP:OVERFLOW:MULTIWEB-REQOF
HTTP:OVERFLOW:GAZTEK-HTTPD-OF
HTTP:OVERFLOW:HTTPDX-GET-URL-OF
HTTP:OVERFLOW:HTTPDX-POST-BOF
HTTP:OVERFLOW:WEBC-REQ-OF
HTTP:OVERFLOW:WSHELL-CGIC
HTTP:OVERFLOW:ATP-HTTPD-OF
HTTP:OVERFLOW:XITAMIIFMOD
HTTP:OVERFLOW:SERVU-SESSION
HTTP:OVERFLOW:ACROBATX-NULL
HTTP:OVERFLOW:EVOCAM-WEBSRV-GET
HTTP:OVERFLOW:WEBDAV-JAVASYSTEM
HTTP:OVERFLOW:BLACK-ICE-BOF
HTTP:OVERFLOW:HTTPDX-URL
HTTP:OVERFLOW:AUTH-OVERFLOW
HTTP:OVERFLOW:SAVANT
HTTP:OVERFLOW:D-LINK-HNAP-BO
HTTP:OVERFLOW:OVWEBHELP-BO
HTTP:OVERFLOW:COREL-WP-BOF
HTTP:OVERFLOW:RSA-WEB-OF
HTTP:OVERFLOW:IMAGEMAGICK-EXIF
HTTP:OVERFLOW:JANA-PRXY-OF1
HTTP:OVERFLOW:IMAGEMAGICK-SGI
HTTP:OVERFLOW:ACROBATX-HEAP
HTTP:OVERFLOW:COREHTTP-URI
HTTP:OVERFLOW:PI3WEB-SLASH-OF
HTTP:OVERFLOW:LINKSYS-APPLY
HTTP:OVERFLOW:MS-IE-URL-BOF
HTTP:OVERFLOW:MS-W3WHO-OF
HTTP:OVERFLOW:METHOD-GENRC-OF
HTTP:OVERFLOW:EXPRESSVIEW
HTTP:OVERFLOW:XNVIEW-IMAGE-FILE
HTTP:OVERFLOW:MULTIPLE-PRODUCTS
HTTP:OVERFLOW:JESKOLA-BUZZ
HTTP:OVERFLOW:ACDSEE-PRO-IMAGE
HTTP:OVERFLOW:GSM-SIM-UTILITY
HTTP:OVERFLOW:IRFANVIEW-PLUGIN
HTTP:OVERFLOW:CAM2PC
HTTP:OVERFLOW:MUL-VENDORS-BO
HTTP:OVERFLOW:STATUS-CODE-OF
HTTP:OVERFLOW:MALICIOUS-HOST
HTTP:OVERFLOW:HP-POWERMAN-OF
HTTP:OVERFLOW:MISSING-VER-BO
HTTP:OVERFLOW:MAIL-ENABLE-AUTH
HTTP:OVERFLOW:LIBYAML-SCANNER
HTTP:OVERFLOW:OPENVIEW-NNM-BO
HTTP:OVERFLOW:SENKAS-KALIBRI-BO
HTTP:OVERFLOW:SYBASE-WEBCONSOLE
HTTP:OVERFLOW:SIMPLE-WEB-SRV-BO
HTTP:OVERFLOW:MS-HTTP-SERVICES

HTTP:OWA

HTTP:OWA:LOGIN-REDIR
HTTP:OWA:EXCHANGE-SERVER

HTTP:PASSWD

HTTP:PASSWD:COMMON

HTTP:PHP

HTTP:PHP:WP-XML-RPC-PINGBACK-RQ
HTTP:PHP:TIKIWIKI-CMD-EXEC
HTTP:PHP:PHP-CAL-FILE-INC
HTTP:PHP:PHPZIPURL
HTTP:PHP:BZOPEN-OF
HTTP:PHP:EXOOPS-FD
HTTP:PHP:SPL-OBJECT-UNSERIALIZE
HTTP:PHP:ALEXPHP-INCLUDE
HTTP:PHP:SILENT-STORM-ADMIN
HTTP:PHP:BLACKBOARD-INC
HTTP:PHP:VBULLETIN-CODE-EXEC
HTTP:PHP:COOLPHP-DIRTRAV
HTTP:PHP:COOLFORUM-INJ
HTTP:PHP:FORMMAIL-INCLUDE
HTTP:PHP:SQUIRRELMAIL
HTTP:PHP:FORMMAIL-SCRIPTROOT
HTTP:PHP:SQUIRRELMAIL-AUTH
HTTP:PHP:CACTI-RRD-AUTH-BYPASS
HTTP:PHP:FAMILY-CONN-CMS-RCE
HTTP:PHP:PHPRPC-EXEC
HTTP:PHP:WP-GLOBAL-INFO-DISC
HTTP:PHP:PINEAPP-LIVELOG-RCE
HTTP:PHP:RUNCMS-FILE-UP
HTTP:PHP:TIKIWIKI-FORM
HTTP:PHP:PHP-FILE-INCL
HTTP:PHP:PHPINFO-QUERY
HTTP:PHP:PHPINFO-SERVER
HTTP:PHP:REDHAT-PIRANHA-PASSWD
HTTP:PHP:WP-INCLUDES-ACCESS
HTTP:PHP:LOKWABB-PRIVM2
HTTP:PHP:LOKWABB-PRIVM
HTTP:PHP:MIDICART-DB
HTTP:PHP:LOKWABB-PRIVM3
HTTP:PHP:MANTIS-ARB-EXEC1
HTTP:PHP:WOLTAB-SQL-INJ
HTTP:PHP:WP-XML-RPC-PINGBACK-PP
HTTP:PHP:COOLFORUM-SRC-DISC
HTTP:PHP:WORDPRESS-UPLOAD
HTTP:PHP:YABBSE-SSI-INCLUDE
HTTP:PHP:LOG-INSERT
HTTP:PHP:DFORUM-PHP-INC
HTTP:PHP:DOTBR-PHP-EXEC
HTTP:PHP:CEDRIC-EMAIL-PHPINC2
HTTP:PHP:PAGETOOL-SQL-INJ
HTTP:PHP:PHPPASS-BYPASS
HTTP:PHP:YABBSE-PKG-EXEC
HTTP:PHP:PHPFORUM-INC
HTTP:PHP:JOOMLA-DIR-TRAV
HTTP:PHP:WP-XMLRPC-BRUTE
HTTP:PHP:PMACHINE-INCLUDE
HTTP:PHP:PMACHINE-PATH-DISC
HTTP:PHP:ACONTENT-AUTH-BYPASS
HTTP:PHP:WORDPRESS-SPEED-RCE
HTTP:PHP:MLOG-SCREEN
HTTP:PHP:DOTBR-INFO-LEAK
HTTP:PHP:ULTIMATE-PHP-BOARD
HTTP:PHP:WORDPRESS-USER-INJ
HTTP:PHP:QDPM-FILE-UPLOAD
HTTP:PHP:GLOSSWORD-FILE-UPLOAD
HTTP:PHP:GAPICMS-DIRDEPTH-INC
HTTP:PHP:REMOTE-FILE-INCL
HTTP:PHP:SCHEDULEIT-RCE
HTTP:PHP:SITEMAN-USER
HTTP:PHP:WEBMIN-TARGET
HTTP:PHP:PHPMYNEWS-FILE-ACCESS
HTTP:PHP:POSTNUKE-CMD-EXEC
HTTP:PHP:CEDRIC-EMAIL-PHPINC1
HTTP:PHP:TAX-DRAWIMAGE-RCE
HTTP:PHP:OABOARD-RFI
HTTP:PHP:WP-FOXYPRESS-FILE-UP
HTTP:PHP:FTP-GENLIST-ACE
HTTP:PHP:CLAROLINE-INCLUDE
HTTP:PHP:CACTI-RDD-LOCAL-SCRIPT
HTTP:PHP:WEBCAL-INC
HTTP:PHP:VWAROOT-INCLUDE
HTTP:PHP:CACTI-CONFIG-INC
HTTP:PHP:AWSTATS-SORT
HTTP:PHP:SYM-WG-FILE-UP
HTTP:PHP:PODCAST-FILE-INCL
HTTP:PHP:WP-MRKPLC-UPLOADIFY
HTTP:PHP:VAMCART-FU
HTTP:PHP:WP-DOUPLOAD-FU
HTTP:PHP:WP-README-SCAN
HTTP:PHP:FILE-INCL-DL
HTTP:PHP:PHPROJEKT-INC
HTTP:PHP:OPEN-FLASH-CHART-RCE
HTTP:PHP:MEDIAWIKI-RCE
HTTP:PHP:XODA-FILE-UPLOAD
HTTP:PHP:PHPLIB-REMOTE-EXEC
HTTP:PHP:PHPMYNEWS-INCLUDE
HTTP:PHP:WORDPRESS-SPELCHECK-FI
HTTP:PHP:PINEAPP-CMD-INJ
HTTP:PHP:SYM-WG-IPCHANG
HTTP:PHP:COMPACTCMS-ENGINE-RFI
HTTP:PHP:WAN-EMULATOR-CE
HTTP:PHP:PINE-APP-CMD-INJE
HTTP:PHP:AJAXPLORER-RCE
HTTP:PHP:PHAR-PARSE-TARFILE-ID
HTTP:PHP:CMSQLITE-LFI
HTTP:PHP:STUNSHELL-RCE
HTTP:PHP:JOOMLA-LOC-FILE
HTTP:PHP:SYM-WG-FILE-DOWN-DEL
HTTP:PHP:BASILIC-CMD-EXE
HTTP:PHP:SUGARCRM-CE
HTTP:PHP:NARCISSUS-CMD-EXE
HTTP:PHP:XML-HEAP-MEM-CORR
HTTP:PHP:CDF-INFINITE-LOOP-DOS
HTTP:PHP:WP-IS-HUMAN-CMD-INJ
HTTP:PHP:SSL-CERT-SEC-BYPASS
HTTP:PHP:WEBSVN-CMD-INJ
HTTP:PHP:PACER-EDITION-CMS-LFI
HTTP:PHP:PACER-CMS-FILE-DELETE
HTTP:PHP:WORDPRESS-MUL-FL-GAL
HTTP:PHP:WORDPRESS-MUL-GND-ALBM
HTTP:PHP:BACULA-WEB-REPORT
HTTP:PHP:WORDPRESS-OPS-LFI
HTTP:PHP:JOOMLA-XCLONER
HTTP:PHP:EXTPLORER-FILE-UPLOAD
HTTP:PHP:N-CMS-PAGE-LFI
HTTP:PHP:CONSTRUCTR-CMS-MUL
HTTP:PHP:MEDIAWIKI-SCRIPT-INSER
HTTP:PHP:WEBTESTER-CMD-EXE
HTTP:PHP:JOOMLA-FILE-LISTER
HTTP:PHP:TINYWEBGALLERY-LFI
HTTP:PHP:724CMS-LFI
HTTP:PHP:MULTI-INDEX-PHP-RFI
HTTP:PHP:EXIF-HEADER
HTTP:PHP:GIF-HEADER-EVASION
HTTP:PHP:CORE-INT-OF-CE
HTTP:PHP:AINS-AD-FUNDUM-RFI
HTTP:PHP:FORMAT-OF
HTTP:PHP:PHP-XML-CMD
HTTP:PHP:HTML-SPCL-CHARS
HTTP:PHP:PROJECTPIER-FILE-UP
HTTP:PHP:PINEAPP-COMMAND-INJ
HTTP:PHP:OSCOMMERCE-ADMIN
HTTP:PHP:MYBB-BACKDOOR
HTTP:PHP:CACTI-RRD-FILE-INC
HTTP:PHP:CMD-INJ-UA
HTTP:PHP:JOOMLA-ADMIN-SCAN
HTTP:PHP:CMD-COMMAND-EXEC
HTTP:PHP:WHMCS-LFI
HTTP:PHP:AWACTSCRPT-CMS-FILE-UP
HTTP:PHP:HORDE-EVAL
HTTP:PHP:VBULLETIN-IMPEX-INC
HTTP:PHP:MANTIS-ARB-EXEC2
HTTP:PHP:WP-GRAND-FLASH-ALBUM
HTTP:PHP:WP-GRAND-FLASH
HTTP:PHP:SPHPBLOG-PW-DOWNLOAD
HTTP:PHP:WP-JQUERY-MEGAMENU-LFI
HTTP:PHP:PHPESCSHELL
HTTP:PHP:WP-GLOBAL-CONT-CE
HTTP:PHP:EARK-PHP-RFI
HTTP:PHP:WP-GIULIO-GANCI-DM-FU
HTTP:PHP:EASYPHP-CODETESTER-RCE
HTTP:PHP:TIKIWIKI-JHOT
HTTP:PHP:PINE-APP-CMD-INJ
HTTP:PHP:REGISTER-VARIABLE-CE
HTTP:PHP:DRIES-BUYTRT-DRUPAL-ID
HTTP:PHP:CHARTS-RCE
HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD
HTTP:PHP:JOOMLA-COM-COLLECTOR
HTTP:PHP:BITRIX-SITE-MGR-CS
HTTP:PHP:ZEBRAFEEDS-RFI
HTTP:PHP:OSSIM-MUL-CMD-EXE
HTTP:PHP:SITE-ASSISTANT-RFI
HTTP:PHP:CAUPOSHOP-LFI
HTTP:PHP:MOODLE-TEX-FILTER-RCE
HTTP:PHP:JOOMLA-JOOMTOUCH-LFI
HTTP:PHP:YOUTUBE-BLOG-RFI
HTTP:PHP:XOOPS-BANNERS-LFI
HTTP:PHP:FREENEWS-PHP-INC1
HTTP:PHP:MEMORY-LIMIT-CE
HTTP:PHP:KIETU-HIT-INCLUDE
HTTP:PHP:PHP-NEWS-FILE-INC
HTTP:PHP:TSEP-COLORSWITCH-RFI
HTTP:PHP:FREE-FILE-HOSTING-RFI
HTTP:PHP:MYNEWSGROUPS-RFI
HTTP:PHP:VS-NEWS-RFI
HTTP:PHP:GESTART-RFI
HTTP:PHP:WMNEWS-RFI
HTTP:PHP:ULTIMATE-FUN-BOOK-RFI
HTTP:PHP:PHPSECUREPAGE-RFI
HTTP:PHP:BHARAT-MEDIARATTA-RFI
HTTP:PHP:BEAUTIFIER-RFI
HTTP:PHP:ACTIVIST-BASE-RFI
HTTP:PHP:EXIFF-THUMBNAIL-BOF
HTTP:PHP:427BB-AUTH-BYPASS
HTTP:PHP:4IMAGES-RFI
HTTP:PHP:ACAL-AUTH-BYPASS
HTTP:PHP:DBGUESTBOOK-DBSBASE
HTTP:PHP:HPE-HPEINC-RFI
HTTP:PHP:SQUERY-RFI
HTTP:PHP:BITWEAVER-LFI
HTTP:PHP:SABDRIMER-RFI
HTTP:PHP:PHPADSNEW-RFI
HTTP:PHP:WP-BRUTE-FORCE-LOGIN
HTTP:PHP:WEBID-FILE-DISCLOSURE
HTTP:PHP:JOOMLA-PHP-OBJ-INJ
HTTP:PHP:UPLOAD-LOCATION
HTTP:PHP:ULTIMATE-PHP-CODE-EXEC
HTTP:PHP:OPEN-EDUCATION-SYS-RFI
HTTP:PHP:CMD-INJ
HTTP:PHP:SDNTOJEWISH-FUNC-OF
HTTP:PHP:WP-LOGIN-PASS-RESET
HTTP:PHP:WP-ADMIN-CONFIG-BYPASS
HTTP:PHP:GENERIC-MEMBRES-RFI
HTTP:PHP:EGROUPWARE-FI
HTTP:PHP:IBM-PROVENTIA-RFI
HTTP:PHP:MAMBO-PATH-INCL
HTTP:PHP:MINIBB-MULTI-RFI
HTTP:PHP:INTERPHOTO-IPLANG-LFI
HTTP:PHP:STRIP-TAGS-XSS
HTTP:PHP:WORDPRESS-WPCUSTOM-LFI
HTTP:PHP:FORM-DOS
HTTP:PHP:PHP-QUOT-PRINT-ENCODE
HTTP:PHP:JOOMLA-JMSFILESELL-LFI
HTTP:PHP:JOOMLA-COM-PHOCADL-LFI
HTTP:PHP:WP-ACF-ABSPATH-RFI
HTTP:PHP:ZONEMINDER-SERVER-CE
HTTP:PHP:APACHE-RQST-HEADER-BO
HTTP:PHP:JOOMLA-JE-STORY-LFI
HTTP:PHP:JOOMLA-OBSUGGEST-LFI
HTTP:PHP:WP-WPTOUCH-REDIRECT
HTTP:PHP:WP-ANNOUNCES-RFI
HTTP:PHP:COPPERMINE-RCE
HTTP:PHP:HORDE-HREF-BACKDOOR
HTTP:PHP:PFSENSE-SNORT-INFO-DIS
HTTP:PHP:OPENSSL-X509-CERT-MC
HTTP:PHP:FILEINFO-DOS
HTTP:PHP:V0PCR3W-WEB-SHELL-RCE
HTTP:PHP:XAMPP-FILE-WRITE
HTTP:PHP:DATEINTERVAL-DOS
HTTP:PHP:WP-SLIDER-REV-AFD
HTTP:PHP:LIBMAGIC-PE-RCE
HTTP:PHP:WP-FILE-UPLOAD
HTTP:PHP:WP-PROPERTY-RCE
HTTP:PHP:PHAR_SET_INODE-FUNC-BO
HTTP:PHP:EXIF-NULL-DEREFERENCE
HTTP:PHP:PHPWEB-REMOTE-FILE
HTTP:PHP:CVE-2015-2331-BO
HTTP:PHP:PHP-CORE-UAF
HTTP:PHP:LIBMAGIC-CDF-FILE-DOS
HTTP:PHP:SYMC-WEB-CMD-INJ
HTTP:PHP:SYM-GW-LFI
HTTP:PHP:PHP-CGI-CMD-LINE-RCE
HTTP:PHP:MYSQL-COMMANDER-RFI
HTTP:PHP:FCRING-RFI
HTTP:PHP:LWC-DATE-CMDINJ
HTTP:PHP:WORDPRESS-COOKIE-INJ
HTTP:PHP:OPEN-REALITY-XSS-SQLI
HTTP:PHP:RAXNET-CACTI-RCE
HTTP:PHP:EXIF-HEADER-INT-OF
HTTP:PHP:BOITE-DE-NEWS-RFI
HTTP:PHP:PHPBOOK-CODE-INJECTION
HTTP:PHP:WOW-ROSTER-RFI
HTTP:PHP:PHPAUCTION-FI
HTTP:PHP:SAVEWEB-PORTAL-RFI
HTTP:PHP:MULTIPROD-CONFIG-RFI
HTTP:PHP:MULTI-PRODUCTS-RFI
HTTP:PHP:DOCPILE-INIT-PATH
HTTP:PHP:FLASHCHAT-RFI
HTTP:PHP:EMPIRE-CMS-RFI
HTTP:PHP:BASE-RFI
HTTP:PHP:GLOBALS-INJ
HTTP:PHP:ACGVCLICK-RFI
HTTP:PHP:ARDEACORE-RFI
HTTP:PHP:AKARRU-SOCIAL-RFI
HTTP:PHP:VMIST-ART-RFI
HTTP:PHP:FTP-GENLIST-IO
HTTP:PHP:ANNONCESV-RFI
HTTP:PHP:GHOST-GLIBC-WP
HTTP:PHP:OPENI-CMS-RFI
HTTP:PHP:NETWORK-WEATHERMAP-LFI

HTTP:PHP:GALLERY

HTTP:PHP:GALLERY:EMBED-AUTH-VAR
HTTP:PHP:GALLERY:EMBED-AUTH
HTTP:PHP:GALLERY:HTTP-VARS

HTTP:PHP:PHORUM

HTTP:PHP:PHORUM:REMOTE-EXEC
HTTP:PHP:PHORUM:READ-ACCESS
HTTP:PHP:PHORUM:RESPONSE-SPLIT
HTTP:PHP:PHORUM:ADMIN-PW-CHG

HTTP:PHP:PHPBB

HTTP:PHP:PHPBB:DL-SQL-INJ
HTTP:PHP:PHPBB:PM-SQL-USER
HTTP:PHP:PHPBB:HIGHLIGHT-EXEC
HTTP:PHP:PHPBB:AVATAR-UPLOAD
HTTP:PHP:PHPBB:PROFILE-ADD-DOS
HTTP:PHP:PHPBB:SEARCH-DOS
HTTP:PHP:PHPBB:LANG-EXEC
HTTP:PHP:PHPBB:UID-SQL-INJECT
HTTP:PHP:PHPBB:AUTH-BYPASS
HTTP:PHP:PHPBB:PROOTPATH-INJ
HTTP:PHP:PHPBB:SELECT-FISH
HTTP:PHP:PHPBB:PRIV-DEL
HTTP:PHP:PHPBB:SEARCH-INJECT
HTTP:PHP:PHPBB:AVATAR-PATH-INC

HTTP:PHP:PHPMYADMIN

HTTP:PHP:PHPMYADMIN:SVR-PARAM
HTTP:PHP:PHPMYADMIN:LOCALFILE
HTTP:PHP:PHPMYADMIN:PREG-REPLAC
HTTP:PHP:PHPMYADMIN:FMT-OPTION
HTTP:PHP:PHPMYADMIN:SERVERDB
HTTP:PHP:PHPMYADMIN:SETUP-SCAN
HTTP:PHP:PHPMYADMIN:GOTO-RFI

HTTP:PHP:PHPNEWS

HTTP:PHP:PHPNEWS:SQL-SENDTO

HTTP:PHP:PHPNUKE

HTTP:PHP:PHPNUKE:BOOKMARK-SQL
HTTP:PHP:PHPNUKE:SID-SQL-INJECT
HTTP:PHP:PHPNUKE:PRIV-ESC
HTTP:PHP:PHPNUKE:VIEWADMIN
HTTP:PHP:PHPNUKE:DELADMIN
HTTP:PHP:PHPNUKE:QR-SQL-INJECT
HTTP:PHP:PHPNUKE:MODULES-DOS
HTTP:PHP:PHPNUKE:ADMIN-GUESS
HTTP:PHP:PHPNUKE:PATH-DISC2
HTTP:PHP:PHPNUKE:PATH-DISC1
HTTP:PHP:PHPNUKE:CID-SQL-INJECT
HTTP:PHP:PHPNUKE:4NALBUM-INC
HTTP:PHP:PHPNUKE:DOWNLD-SQL-INJ

HTTP:PHP:THATWARE

HTTP:PHP:THATWARE:THATFILE-INC
HTTP:PHP:THATWARE:CONFIG-INC
HTTP:PHP:THATWARE:ARTLIST-INC
HTTP:PHP:THATWARE:AUTH-INC

HTTP:PKG

HTTP:PKG:WEBMIN-BRUTE
HTTP:PKG:EZMALL-LOG-ORDER-ACCSS
HTTP:PKG:OFFICESCAN-JDKRQNOTIFY
HTTP:PKG:VWALL-FTPSAV-DLL
HTTP:PKG:ALLAIRE-JRUN-DOS
HTTP:PKG:CART32-ADM-PW-CHG
HTTP:PKG:CART32-CLI-DIS
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-2
HTTP:PKG:EWAVE-SERVLET-DOS
HTTP:PKG:WEBGAIS-REMOTE-EXEC
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-1
HTTP:PKG:DNSTOOLS-AUTH-BYPASS
HTTP:PKG:TUXEDO-INIFILE
HTTP:PKG:TUXEDO-DOS
HTTP:PKG:MS-JET-VBA
HTTP:PKG:WEBMIN-FAKE-SESSION
HTTP:PKG:MOUNTAIN-WEBCART-DISC
HTTP:PKG:SALESLOGIC-UNAUTH-ADMN
HTTP:PKG:ANACONDA-DIR-TRAVERSAL
HTTP:PKG:SUPERSCOUT-USERLIST
HTTP:PKG:WEBMIN-SHOWCGI-CMDEXEC
HTTP:PKG:SALESLOGIX-AUTH-BYPASS
HTTP:PKG:NS-QUERY-PAT
HTTP:PKG:DB4WEB-FILE-ACCESS
HTTP:PKG:CARELLO-VBEXEC
HTTP:PKG:WEBMIN-FILEDISC
HTTP:PKG:ICQ-WEBFRONT-DOS-2

HTTP:PROXY

HTTP:PROXY:PROXYPRO-GET
HTTP:PROXY:SQUID-AT-AT
HTTP:PROXY:HTTP-PROXY-GET
HTTP:PROXY:CAW-URI-RES
HTTP:PROXY:WPAD-CONNECTION
HTTP:PROXY:SQUID-FTP
HTTP:PROXY:SQUID-CACHE-UPDATE
HTTP:PROXY:PSOPROXY-OF
HTTP:PROXY:SQUID-TRACE
HTTP:PROXY:WINGATE-OF
HTTP:PROXY:SQUID-NULL-PTR
HTTP:PROXY:SQUID-NTLM-OF
HTTP:PROXY:SQUID-STRLISTGETITEM
HTTP:PROXY:SQUID-OVERSIZE-HDR

HTTP:PROXY:ANON

HTTP:PROXY:ANON:CGIPROXY
HTTP:PROXY:ANON:CONCEAL-WS
HTTP:PROXY:ANON:PROXY-2
HTTP:PROXY:ANON:PROXY-1
HTTP:PROXY:ANON:FOXY-FILTER
HTTP:PROXY:ANON:PHPROXY

HTTP:PROXY:LIST

HTTP:PROXY:LIST:PROXYFIND
HTTP:PROXY:LIST:PUBWEBPROXIES

HTTP:REQERR

HTTP:REQERR:REQ-MALFORMED-URL
HTTP:REQERR:REQ-INVALID-FORMAT
HTTP:REQERR:REQ-MISSING-HOST
HTTP:REQERR:DOUBLE-ENCODE
HTTP:REQERR:BIN-DATA-CONT-LOC
HTTP:REQERR:BIN-DATA-ACC-ENC
HTTP:REQERR:FS-HOST
HTTP:REQERR:BIN-DATA-CONT-ENC
HTTP:REQERR:BIN-DATA-CONT-LANG
HTTP:REQERR:BIN-DATA-ACCEPT
HTTP:REQERR:HEADER-INJECT
HTTP:REQERR:BIN-DATA-AUTH
HTTP:REQERR:URL-VAR-FS
HTTP:REQERR:NULL-IN-HEADER
HTTP:REQERR:BIN-DATA-HEADER
HTTP:REQERR:MALFORMED-AUTH
HTTP:REQERR:INV-HTTP-VERSION
HTTP:REQERR:POST-MISSING-DATA
HTTP:REQERR:INV-IPV6-HOST-HDR
HTTP:REQERR:REQ-INJECTION
HTTP:REQERR:URL-LF-CR

HTTP:SAVANT

HTTP:SAVANT:GET-PERCENT
HTTP:SAVANT:GET-DOT1

HTTP:SQL

HTTP:SQL:NOVEL-ZENWORKS
HTTP:SQL:NOVELL-ZENWORKS

HTTP:SQL:INJ

HTTP:SQL:INJ:IS_SRVROLEMEMBER
HTTP:SQL:INJ:TOLINET-AGENCIA-ID
HTTP:SQL:INJ:OSCOM
HTTP:SQL:INJ:JOOMLA-CBCONTACT
HTTP:SQL:INJ:JOOMLA-COMHOSPITAL
HTTP:SQL:INJ:JOOMLA-CONTROLLER
HTTP:SQL:INJ:JOOMLA-FOTO
HTTP:SQL:INJ:JOOMLA-NEWSSEARCH
HTTP:SQL:INJ:SFX-SQLI
HTTP:SQL:INJ:JOOMLA-AVRELOADED
HTTP:SQL:INJ:HEADER-3
HTTP:SQL:INJ:HEADER-2
HTTP:SQL:INJ:WAITFOR-DELAY
HTTP:SQL:INJ:SYNERGY-SW
HTTP:SQL:INJ:HTTP-REQ-HDR-1
HTTP:SQL:INJ:FACTO-CMS
HTTP:SQL:INJ:POSTNUKE
HTTP:SQL:INJ:PHPTOPSITES
HTTP:SQL:INJ:MYSHOP
HTTP:SQL:INJ:REMOTE-EXEC
HTTP:SQL:INJ:WS2000
HTTP:SQL:INJ:PANGOLIN
HTTP:SQL:INJ:GLOBAL-VAR
HTTP:SQL:INJ:AUTHID
HTTP:SQL:INJ:SQLMAP-ACTIVITY
HTTP:SQL:INJ:CONVERT-INJ-OF
HTTP:SQL:INJ:JOOMLA-COM-JCE
HTTP:SQL:INJ:SINAPSI-ESOLAR
HTTP:SQL:INJ:YABSOFT-GALLERY-ID
HTTP:SQL:INJ:OMNISTAR-MAILER
HTTP:SQL:INJ:AUTO-TRANS
HTTP:SQL:INJ:MYSQL-BINLOG-DOS
HTTP:SQL:INJ:JOOMLA-FILTERORDER
HTTP:SQL:INJ:MNG-ENG-SECMNG-PLS
HTTP:SQL:INJ:MAIAN-WEBLOG
HTTP:SQL:INJ:JOOMLA-COMTEAM
HTTP:SQL:INJ:JOOMLA-COM-SHOP
HTTP:SQL:INJ:4IMAGES-DETAIL-PHP
HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM
HTTP:SQL:INJ:WP-MEDIA-LIBRARY
HTTP:SQL:INJ:SYMC-BLOCKED-PHP
HTTP:SQL:INJ:JOOMLA-MAPLOCATOR
HTTP:SQL:INJ:WP-SERMON-BROWSER
HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK
HTTP:SQL:INJ:KUBELABS-PHPDUG
HTTP:SQL:INJ:JOOMLA-QUESTION
HTTP:SQL:INJ:JOOSTINA
HTTP:SQL:INJ:WP-UNIVERSAL-POST
HTTP:SQL:INJ:WP-STARSRATEBOX
HTTP:SQL:INJ:TEDE-SIMPLIFICADO
HTTP:SQL:INJ:MAMBO-COM-DOCMAN
HTTP:SQL:INJ:JOOMLA-CALCBUILDER
HTTP:SQL:INJ:JOOMLA-ALLCINEVID
HTTP:SQL:INJ:MERCURY-UA
HTTP:SQL:INJ:JOOMLA-FAQ-BOOK
HTTP:SQL:INJ:JOOMLA-RESTAURANTE
HTTP:SQL:INJ:JOOMLA-JUICY-PICID
HTTP:SQL:INJ:JOOMLA-COM-CLAN
HTTP:SQL:INJ:COVER-VISION-ID
HTTP:SQL:INJ:WORDPRESS-WP-FRM
HTTP:SQL:INJ:DH-MLM-LOGIN-PHP
HTTP:SQL:INJ:WP-SYMPOSIUM
HTTP:SQL:INJ:SYNDEO-CMS-USRNAME
HTTP:SQL:INJ:MYSCHOOL
HTTP:SQL:INJ:WP-ECOMMERCE
HTTP:SQL:INJ:WORDPRESS-ID
HTTP:SQL:INJ:CHAR-ENCODE
HTTP:SQL:INJ:WP-PHOTORACER
HTTP:SQL:INJ:HAVIJ-UA
HTTP:SQL:INJ:NULLBYTE-COMMENT
HTTP:SQL:INJ:CHAR
HTTP:SQL:INJ:AGENT-ADMIN
HTTP:SQL:INJ:WP-AJAX-CATEGORY
HTTP:SQL:INJ:MS-SQL-TABLE-NAME
HTTP:SQL:INJ:COMPARISON
HTTP:SQL:INJ:ORACLE-WEBCENTER
HTTP:SQL:INJ:CISCO-UCM
HTTP:SQL:INJ:CMD-IN-URL
HTTP:SQL:INJ:MS-SQL-FUNCTIONS
HTTP:SQL:INJ:BTTLXEFORUM
HTTP:SQL:INJ:USER-ADD
HTTP:SQL:INJ:CA-TOTAL-DEFENSE
HTTP:SQL:INJ:WP-MULTIPLE
HTTP:SQL:INJ:CA-TOTAL-UNCWS
HTTP:SQL:INJ:DECLARE-EXEC
HTTP:SQL:INJ:UNION-SELECT
HTTP:SQL:INJ:HEADER-COOKIE
HTTP:SQL:INJ:CONVERT
HTTP:SQL:INJ:HEADER-1
HTTP:SQL:INJ:JOOMLA-COM-CCBOARD
HTTP:SQL:INJ:HEADER-REFERRER
HTTP:SQL:INJ:INTO-OUTFILE
HTTP:SQL:INJ:IMP
HTTP:SQL:INJ:IISPROTECT
HTTP:SQL:INJ:RUBY-ON-RAILS
HTTP:SQL:INJ:CA-EXPORTREPORT
HTTP:SQL:INJ:JOOMLA-VIRTUEMART
HTTP:SQL:INJ:NULL-NULL-NULL
HTTP:SQL:INJ:F5-BIGIP-11.2.0
HTTP:SQL:INJ:JOOMLA-MORFEOSHOW
HTTP:SQL:INJ:SLASH-STAR
HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL
HTTP:SQL:INJ:SYMANTEC-IM
HTTP:SQL:INJ:MYSQL-PRIV-ESCAL
HTTP:SQL:INJ:L-FORUM
HTTP:SQL:INJ:PL-SQL
HTTP:SQL:INJ:FORUM-LIVRE
HTTP:SQL:INJ:TIVOLI-USER-UPDATE
HTTP:SQL:INJ:VERSION-DETECT
HTTP:SQL:INJ:SCOZNET-ADMINNAME
HTTP:SQL:INJ:S9Y-SERENDIPITY
HTTP:SQL:INJ:ACTIVECAMPAIGN
HTTP:SQL:INJ:VEGO-SQL-INJ
HTTP:SQL:INJ:ADMENTOR-ADMIN
HTTP:SQL:INJ:THEWEBFORUM-LOGIN
HTTP:SQL:INJ:SLRWINDS-STORG-MGR
HTTP:SQL:INJ:PARALLEL-PLESK
HTTP:SQL:INJ:DRUPAL-DATABASE
HTTP:SQL:INJ:DELL-SONICWALL
HTTP:SQL:INJ:WP-EVENTS-MGR
HTTP:SQL:INJ:WEBID-BLIND-SQL
HTTP:SQL:INJ:EXEC-MASTER
HTTP:SQL:INJ:XPCMDSHELL
HTTP:SQL:INJ:BIT5-BLOG
HTTP:SQL:INJ:COMMENT
HTTP:SQL:INJ:WP-SUPER-CAPTCHA
HTTP:SQL:INJ:VENOM-BOARD
HTTP:SQL:INJ:WP-GD-STAR-RATING
HTTP:SQL:INJ:JOOMLA-AD-DJ
HTTP:SQL:INJ:WP-FBCONNECTOR
HTTP:SQL:INJ:ACCEPT-LANG-HDR-3
HTTP:SQL:INJ:SYSOBJECTS
HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY
HTTP:SQL:INJ:RATIONAL-CLRQST
HTTP:SQL:INJ:MYSQL-TABLE-NAME
HTTP:SQL:INJ:CMD-CHAIN-2
HTTP:SQL:INJ:OPMNGR-AGENT-SQL
HTTP:SQL:INJ:ALTER-MYSQL
HTTP:SQL:INJ:MANAGEENGINER-RCE
HTTP:SQL:INJ:MANAGE-ENGINE-SM
HTTP:SQL:INJ:BIZTALK
HTTP:SQL:INJ:CMD-CHAIN-1
HTTP:SQL:INJ:HTTP-HOST-HDR-3
HTTP:SQL:INJ:ACCEPT-HDR-3
HTTP:SQL:INJ:REFERER-HDR-1
HTTP:SQL:INJ:UA-HDR-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-1
HTTP:SQL:INJ:CONT-TYPE-HDR-3
HTTP:SQL:INJ:HTTP-AUTH-HDR-2
HTTP:SQL:INJ:ACCEPT-HDR-2
HTTP:SQL:INJ:ACCEPT-HDR-1
HTTP:SQL:INJ:UA-HDR-3
HTTP:SQL:INJ:REFERER-HDR-2
HTTP:SQL:INJ:HTTP-AUTH-HDR-3
HTTP:SQL:INJ:REFERER-HDR-3
HTTP:SQL:INJ:REQ-VAR-3
HTTP:SQL:INJ:COOKIE-HDR-2
HTTP:SQL:INJ:UA-HDR-1
HTTP:SQL:INJ:HTTP-HOST-HDR-2
HTTP:SQL:INJ:CONT-MD5-HDR-2
HTTP:SQL:INJ:CONT-TYPE-HDR-1
HTTP:SQL:INJ:RESPONSE-PAGE
HTTP:SQL:INJ:REQ-VAR-2
HTTP:SQL:INJ:CONT-TYPE-HDR-2
HTTP:SQL:INJ:REQ-URL-3
HTTP:SQL:INJ:REQ-URL-1
HTTP:SQL:INJ:CONT-MD5-HDR-1
HTTP:SQL:INJ:HTTP-REQ-HDR-3
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-1
HTTP:SQL:INJ:COOKIE-HDR-3
HTTP:SQL:INJ:ACCEPT-LANG-HDR-2
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-2
HTTP:SQL:INJ:HTTP-HOST-HDR-1
HTTP:SQL:INJ:COOKIE-HDR-1
HTTP:SQL:INJ:ACCEPT-ENCOD-HDR-3
HTTP:SQL:INJ:CONT-MD5-HDR-3
HTTP:SQL:INJ:ACCEPT-LANG-HDR-1
HTTP:SQL:INJ:REQ-URL-2
HTTP:SQL:INJ:HTTP-REQ-HDR-2
HTTP:SQL:INJ:MULTI-VENDORS-2
HTTP:SQL:INJ:REQ-VAR-4
HTTP:SQL:INJ:SOLARWINDS
HTTP:SQL:INJ:OVERSIZE-STATEMENT
HTTP:SQL:INJ:SELECT-CONCAT-STAT
HTTP:SQL:INJ:CONCAT-FUNC-CALL
HTTP:SQL:INJ:ASCII-FUNC-CALL
HTTP:SQL:INJ:CHR-FUNC-CALL
HTTP:SQL:INJ:HP-LOADR-GETREPORT
HTTP:SQL:INJ:WORD-CIRCLE-SQL
HTTP:SQL:INJ:CONCAT
HTTP:SQL:INJ:PROC-GENERIC
HTTP:SQL:INJ:REQ-VAR-1
HTTP:SQL:INJ:AND-NUMBER-EQUALS
HTTP:SQL:INJ:INSERT-VALUES
HTTP:SQL:INJ:MULTI-VENDORS-1
HTTP:SQL:INJ:SELECT-SUB-DOS
HTTP:SQL:INJ:WP-SQL
HTTP:SQL:INJ:MANAGENGINE-IT360
HTTP:SQL:INJ:GENERIC

HTTP:STC

HTTP:STC:QTIME-TEXTBOX-MEMC
HTTP:STC:APPLE-MIME-TYPE-BOF
HTTP:STC:SOAPUI-WSDL-WADL-CE
HTTP:STC:SUSPICIOUS-JS-FUNC
HTTP:STC:MPG123-STEREO-OF
HTTP:STC:SYMANTEC-AV-STACK
HTTP:STC:APPLE-RTSP-DOS
HTTP:STC:HHP-PARA-OF
HTTP:STC:ACUNETIX-EXT-DOMAIN-BO
HTTP:STC:LOTUS-CAI-URI
HTTP:STC:IE-INDEX
HTTP:STC:WIN-SHELLHNDL
HTTP:STC:DIRECTSHOW-AVI-EXEC
HTTP:STC:ITUNES-HANDLER-OF
HTTP:STC:X11-OVERSIZE-FONT
HTTP:STC:MS-CVE-2015-2460-CE
HTTP:STC:MCAFEE-FILE-NAME-OF
HTTP:STC:MS-CVE-2015-2435-CE
HTTP:STC:WMP-AU-DOS
HTTP:STC:PPT-LONGNAME
HTTP:STC:APPLE-CFNETWORK-DOS
HTTP:STC:MS-VISUALSTUD-BOF
HTTP:STC:BLACKBERRY-SVR-DOS
HTTP:STC:WGET-REDIRECT
HTTP:STC:AV-MAGIC-EVADE
HTTP:STC:XMPLAY-ASX
HTTP:STC:IBM-IIM-URI-EXEC
HTTP:STC:CACHETIME
HTTP:STC:SBS-TRAIN
HTTP:STC:PIWIGO-LOCALFILES-CSRF
HTTP:STC:MS-OFFICE-WRITEAV-RCE
HTTP:STC:DESKTOP-INI-CODE-EXE
HTTP:STC:DOT-NET-ARRAY-RCE
HTTP:STC:JSXX-OBFS-JS
HTTP:STC:APPLE-ICHAT
HTTP:STC:SILVERLIGHT-RCE
HTTP:STC:FF-NAV-URI
HTTP:STC:SKYPE4COM
HTTP:STC:NAV-REDIR
HTTP:STC:MS-JSCRIPT-ENGINE-RCE
HTTP:STC:SAFARI-MALFRMD-URI-DOS
HTTP:STC:ORACLE-ENDECA-CSRF
HTTP:STC:FILE-UTF7
HTTP:STC:HEADER-UTF7
HTTP:STC:OBJ-FILE-BASE64
HTTP:STC:GOOGLE-APP-MAILTO
HTTP:STC:CSS-STATUS-BAR-SPOOF
HTTP:STC:INTERWOVEN-WORKDOC-XSS
HTTP:STC:URI-INJ
HTTP:STC:DOTNET-FRAMEWORK-RCE
HTTP:STC:WEBEX-WRF-BOF
HTTP:STC:WIN-CCL-BOF
HTTP:STC:CURL-COOKIE-PATH-RCE
HTTP:STC:WINDOWS-FAX-COVER
HTTP:STC:FIREPHP-COMMAND-EXEC
HTTP:STC:DOTNET-BUFF-ALLOC
HTTP:STC:HIDDEN-IFRAME
HTTP:STC:DTOA-MC
HTTP:STC:DAVREDIR
HTTP:STC:IMTOO-MPEG-ENCODER-BO
HTTP:STC:GD-GRAPHICSLIB-BOF
HTTP:STC:TRIMBL-NAV-BMP-HOVF
HTTP:STC:MS-OBJ-PACKAGER
HTTP:STC:M3U-VLC-SMB-LINK
HTTP:STC:ITUNES-PL
HTTP:STC:RESIZE-DOS
HTTP:STC:WIN32KSYS-MEM
HTTP:STC:CODESIGHS-BOF
HTTP:STC:LITESPEED-CSRF
HTTP:STC:ABOUT-JAVASCRIPT
HTTP:STC:NDROID-BROW-SAME-ORIGN
HTTP:STC:DOT-NET-REFLECTION
HTTP:STC:KDE-LIBKHTML-DOS
HTTP:STC:NESTED-XML-DOS
HTTP:STC:JS-DATA-SCHEME
HTTP:STC:CPANEL-REQUEST-FORGERY
HTTP:STC:OOVOO-URI-BOF
HTTP:STC:MEDIAMONKEY-URI-DOS
HTTP:STC:ALINK-WIRLES-RUTR-CSRF
HTTP:STC:BUFFALO-AIRSTATON-CSRF
HTTP:STC:BELKIN-RUTR-AUTH-BYPAS
HTTP:STC:FOXMAIL-MAILTO-BO
HTTP:STC:RUBY-PROT-FRM-FGY-CSRF
HTTP:STC:NOKIA-S60-SORT-DOS
HTTP:STC:RMOC3260-DLL-MC
HTTP:STC:ADVANTEC-WEBACSES-BOF
HTTP:STC:MS-WIN-JPEG-PARSE-IDIS
HTTP:STC:MALFORMED-RESPONSE
HTTP:STC:KDE-KONQUEROR-FTP-DOS
HTTP:STC:OLE-AUTO-RCE
HTTP:STC:VAR-EQUALS-REDIRECT
HTTP:STC:SILVERLIGHT-MEM-COR
HTTP:STC:GOOGLE-CHROME-UAF
HTTP:STC:COREL-WP-BOF
HTTP:STC:APPENDED-MAL-JS
HTTP:STC:SUSPICIOUS-JS-EVASION
HTTP:STC:MS-DOTNET-NAMESPACE-BO
HTTP:STC:HIDDEN-IFRAME-2
HTTP:STC:SUSPICIOUS-JS-ALPHA
HTTP:STC:DOTNET-WINFORMS-RCE
HTTP:STC:CVE-2015-0058-PRIV
HTTP:STC:FF-SRIALIZE-STREAM-UAF
HTTP:STC:GOOGLE-SKETCHUP-PICT
HTTP:STC:HPJ-OPTIONS
HTTP:STC:MS-DIRECTSHOW-GIF-RCE
HTTP:STC:CPTEXIMG2D-IO
HTTP:STC:MS-WORD-INDEX-MC
HTTP:STC:SKYPE-URI-HANDLER
HTTP:STC:WMF-FILE-DOS
HTTP:STC:MS-OFFICE-XP-HTML-LINK
HTTP:STC:MS-FRONTPAGE-INFO-DISC
HTTP:STC:WLW-INFO-DISC
HTTP:STC:FIREFOX-LOOKUP-GETTER
HTTP:STC:MHTML-CDI
HTTP:STC:ADVANTEC-INP-PARAM-RCE
HTTP:STC:FILE-UPLOAD
HTTP:STC:TELNET-URL-OPTS
HTTP:STC:RHINO-HDR-OF
HTTP:STC:VLC-ABC-HOVF
HTTP:STC:WEBKIT-FLOAT-TYPE-RCE
HTTP:STC:DOTNET-XML-SIG-SPOOF
HTTP:STC:PAJAX-RCE
HTTP:STC:MSXML-XSLT-RCE
HTTP:STC:DATA-SCHEME
HTTP:STC:IBM-OMNIFIND-CSRF
HTTP:STC:MICROSOFT-GDI-TIFF-RCE
HTTP:STC:CVE-2015-0062-PRIV
HTTP:STC:BROWSER-FLOAT-STYLE-MC
HTTP:STC:APPLE-QTIME-ENOF-OF
HTTP:STC:CANVAS-BABYBOTTLE-GZIP
HTTP:STC:CANVAS-BABYBOTTLE
HTTP:STC:HHP-BINARY
HTTP:STC:MS-WORD-CVE-2013-1325
HTTP:STC:MS-OFFICE-FILE-BOF
HTTP:STC:DOTNET-SERIALIZATION
HTTP:STC:WINHELP32-MSGBOX-RCE
HTTP:STC:WINHELP32-OF2
HTTP:STC:RSS-FEED-CODE-INJ
HTTP:STC:PPT-CRAFTED-PATH
HTTP:STC:MS-WINDOWS-FILE-RCE
HTTP:STC:DOT-NET-RCE
HTTP:STC:OLE-SHELL
HTTP:STC:CSS-RELOADED
HTTP:STC:GIT-CLIENT-CE
HTTP:STC:NOVEL-CLIENT-NMX-BOF
HTTP:STC:CVE-2015-1724-BO
HTTP:STC:PHP-DATE-TIME-OBJ-UAF
HTTP:STC:CVE-2015-0076-INF-DSC
HTTP:STC:SAP-SQL-ALIAS-BOF
HTTP:STC:PHP-DATE-TIME-OBJ-RCE
HTTP:STC:TOMCAT-CHUNKED-REQ-DOS
HTTP:STC:MSXML-CVE-2015-1646-SB
HTTP:STC:OSX-UPDATE
HTTP:STC:CVE-2015-1677-ID
HTTP:STC:SONICWALL-VPN-FS
HTTP:STC:SCHNEIDER-CFG-FILE-BO
HTTP:STC:CVE-2015-1699-RCE
HTTP:STC:NOTES-INI
HTTP:STC:CLAMAV-UPX-DECODE-DOS
HTTP:STC:SILVERLIGHT-CE
HTTP:STC:BROWSER-DISPLAY-BOX-MC
HTTP:STC:MS-CVE-2014-4121-RCE
HTTP:STC:SILVERLIGHT-MEM-CORR
HTTP:STC:WHSC-RCE
HTTP:STC:ADVANTECH-WEBACCES-BOF
HTTP:STC:SILVERLIGHT-INFO-DISC
HTTP:STC:RPM-CPIO-HDR-BOF
HTTP:STC:MS-XML-RCE
HTTP:STC:MSA-SPOOF
HTTP:STC:SEARCH-LINK
HTTP:STC:EMBED-SRC-OF
HTTP:STC:FAX-COVER-MC
HTTP:STC:CVE-2015-1722-KERNL-PE
HTTP:STC:OFFCE-CVE-2015-1760-CE
HTTP:STC:WIRESHARK-INSECUREPATH
HTTP:STC:DIRECTX-AVI-WAV-PARSE
HTTP:STC:APPLE-QTIME-DREF-BO
HTTP:STC:AV-GATEWAY-BYPASS
HTTP:STC:SAFARI-IE-RCE
HTTP:STC:CHTSKDIC
HTTP:STC:CVE-2015-1727-RCE
HTTP:STC:CVE-2015-1768-PE
HTTP:STC:CVE-2015-1723-CE
HTTP:STC:MIRC-URI-OF
HTTP:STC:ORBIT-DL-URL
HTTP:STC:W32-PARAM-HTTP
HTTP:STC:UNZIP-EXTRA-FIELD-BO
HTTP:STC:MS-FOREFRONT-RCE
HTTP:STC:BROWSER-RUBY-BLOCK
HTTP:STC:CHAR-CONFLICT
HTTP:STC:QT-RTSP-LINK-OF
HTTP:STC:MS-WINDOWS-FILE-BOF
HTTP:STC:IE-STREAM-HDR
HTTP:STC:BROWSER-HTMLSLTELT-DOS
HTTP:STC:ON-BEFORE-UNLOAD
HTTP:STC:WEBKIT-ONLOAD-CDS

HTTP:STC:ACTIVEX

HTTP:STC:ACTIVEX:BACKDOORS
HTTP:STC:ACTIVEX:ADODB-CONNECT
HTTP:STC:ACTIVEX:HP
HTTP:STC:ACTIVEX:VLC-PLY-RCE
HTTP:STC:ACTIVEX:EBAY
HTTP:STC:ACTIVEX:HPUPDATE
HTTP:STC:ACTIVEX:BSTORM-WINGRPH
HTTP:STC:ACTIVEX:SYMFAX
HTTP:STC:ACTIVEX:CTSUENG-OCX
HTTP:STC:ACTIVEX:AKAMAI-DM
HTTP:STC:ACTIVEX:VERYPDF
HTTP:STC:ACTIVEX:ASK-COM
HTTP:STC:ACTIVEX:ROXIO-CINEPL
HTTP:STC:ACTIVEX:WINDVD7
HTTP:STC:ACTIVEX:EBOOK-FLIP
HTTP:STC:ACTIVEX:SOFTARTISANS
HTTP:STC:ACTIVEX:GRPWISE-GIXMIM
HTTP:STC:ACTIVEX:MCA-VTRACE
HTTP:STC:ACTIVEX:PESTPATROL
HTTP:STC:ACTIVEX:THREEDIFY-BOF
HTTP:STC:ACTIVEX:LIVE-MSG
HTTP:STC:ACTIVEX:GEOVISON-LIVEX
HTTP:STC:ACTIVEX:CVE-2015-0016
HTTP:STC:ACTIVEX:VISAGESFT-PDF
HTTP:STC:ACTIVEX:ULTRAOFFIC
HTTP:STC:ACTIVEX:ZENTURI
HTTP:STC:ACTIVEX:DLINK-DCS-5605
HTTP:STC:ACTIVEX:UNCOMMON-AX
HTTP:STC:ACTIVEX:BB-LOAD
HTTP:STC:ACTIVEX:TRENDNET
HTTP:STC:ACTIVEX:HPSUPPORT
HTTP:STC:ACTIVEX:SAM-CONNECTDDN
HTTP:STC:ACTIVEX:KVIEW-KCHARTXY
HTTP:STC:ACTIVEX:QUEST-PNLLMCLI
HTTP:STC:ACTIVEX:MOROVIA-BARCOD
HTTP:STC:ACTIVEX:YMAILATTACH-OF
HTTP:STC:ACTIVEX:ACTI-NETWORK
HTTP:STC:ACTIVEX:QUEST-INTRUST
HTTP:STC:ACTIVEX:MAL-CON-2
HTTP:STC:ACTIVEX:REVEALTRANS
HTTP:STC:ACTIVEX:HTMLSAFHLP
HTTP:STC:ACTIVEX:YSHORTCUT
HTTP:STC:ACTIVEX:AXVLC
HTTP:STC:ACTIVEX:MACINSTALL
HTTP:STC:ACTIVEX:OLE-AUTO
HTTP:STC:ACTIVEX:CISCO-CSD-WEB
HTTP:STC:ACTIVEX:RWSO
HTTP:STC:ACTIVEX:HPVIRTUAL
HTTP:STC:ACTIVEX:TM-OS
HTTP:STC:ACTIVEX:WINIMGLOG
HTTP:STC:ACTIVEX:SAPI-DLL
HTTP:STC:ACTIVEX:GATEWAYX
HTTP:STC:ACTIVEX:IRFILEIOSRVC
HTTP:STC:ACTIVEX:DERIVO
HTTP:STC:ACTIVEX:QUEST-RCE
HTTP:STC:ACTIVEX:WINZIP-CMDLINE
HTTP:STC:ACTIVEX:GOMPLAYER
HTTP:STC:ACTIVEX:TM-HOUSECALL
HTTP:STC:ACTIVEX:LINKSYS
HTTP:STC:ACTIVEX:HUSDAWG
HTTP:STC:ACTIVEX:VIDEOCALL
HTTP:STC:ACTIVEX:SAP-IRRFC-OF
HTTP:STC:ACTIVEX:MCFE-OVERWRITE
HTTP:STC:ACTIVEX:QUEST-TOAD-DBA
HTTP:STC:ACTIVEX:JETAUDIO-DIR
HTTP:STC:ACTIVEX:VIELIB
HTTP:STC:ACTIVEX:ADESK-AX
HTTP:STC:ACTIVEX:UBISOFT-UPLAY
HTTP:STC:ACTIVEX:SAP-BEXGLOBAL
HTTP:STC:ACTIVEX:EASEWE-FTP
HTTP:STC:ACTIVEX:WMI-ADMIN
HTTP:STC:ACTIVEX:DELL-INFO-DISC
HTTP:STC:ACTIVEX:DX-PLY-CMD-INJ
HTTP:STC:ACTIVEX:MITSUBISHI
HTTP:STC:ACTIVEX:CA-XMLSECDB
HTTP:STC:ACTIVEX:GE-HISTORIAN
HTTP:STC:ACTIVEX:WFICA
HTTP:STC:ACTIVEX:CAMTRON-CMNC
HTTP:STC:ACTIVEX:EDRAW-LIC-NAME
HTTP:STC:ACTIVEX:JVIEWPRO
HTTP:STC:ACTIVEX:UUSEE-UUPLAYER
HTTP:STC:ACTIVEX:HYLEOS
HTTP:STC:ACTIVEX:HP-MERC-CLR
HTTP:STC:ACTIVEX:WONDERWARE
HTTP:STC:ACTIVEX:EASY-GRID
HTTP:STC:ACTIVEX:IDAUTOMATION
HTTP:STC:ACTIVEX:IMERA-SYS
HTTP:STC:ACTIVEX:DATA-DYNAMICS
HTTP:STC:ACTIVEX:IBM-SPSS-EXHTM
HTTP:STC:ACTIVEX:GUI-CM-CTRLS
HTTP:STC:ACTIVEX:REAL-GAMEHOUSE
HTTP:STC:ACTIVEX:HP-APP-LIFE
HTTP:STC:ACTIVEX:LEADTOOLS
HTTP:STC:ACTIVEX:SAM-DVMR
HTTP:STC:ACTIVEX:DRM-MSNETOBJ
HTTP:STC:ACTIVEX:MOXA-PFILENAME
HTTP:STC:ACTIVEX:CHILKAT-ZIP
HTTP:STC:ACTIVEX:INST-SHLD-FO
HTTP:STC:ACTIVEX:EDRAW-OFF-BOF
HTTP:STC:ACTIVEX:GDPICTUREPRO
HTTP:STC:ACTIVEX:CHILLKAT-CRYPT
HTTP:STC:ACTIVEX:ISIS-AFP-BO
HTTP:STC:ACTIVEX:IMESH-IMWEBCON
HTTP:STC:ACTIVEX:EASYMAIL-OBJ
HTTP:STC:ACTIVEX:IMAGE-VIEWER
HTTP:STC:ACTIVEX:MAPGUIDE-LAYER
HTTP:STC:ACTIVEX:SAMSUNG-NET-I
HTTP:STC:ACTIVEX:ORACLE-SIEBEL
HTTP:STC:ACTIVEX:SAMSUNG-BACKUP
HTTP:STC:ACTIVEX:SOLARWINDS-BO
HTTP:STC:ACTIVEX:SOPCAST-CNAME
HTTP:STC:ACTIVEX:CRYSTAL-SEARCH
HTTP:STC:ACTIVEX:LTOCXTWAINU
HTTP:STC:ACTIVEX:MCFEE-MCINSCTL
HTTP:STC:ACTIVEX:ALADDIN
HTTP:STC:ACTIVEX:GESTEC-ELONFMT
HTTP:STC:ACTIVEX:ORACLE-CROPROJ
HTTP:STC:ACTIVEX:AVAYA-ONE-X
HTTP:STC:ACTIVEX:MSXML2-MEMCORR
HTTP:STC:ACTIVEX:ORACLE-DOC-CAP
HTTP:STC:ACTIVEX:SASCAM-WEBCAM
HTTP:STC:ACTIVEX:PBEMAIL
HTTP:STC:ACTIVEX:MSCOMM32
HTTP:STC:ACTIVEX:DELL-SCANNER
HTTP:STC:ACTIVEX:PRO-SOFTNET
HTTP:STC:ACTIVEX:ARGOSOFT-MAIL
HTTP:STC:ACTIVEX:SAP-CRSTL-RPT
HTTP:STC:ACTIVEX:CYGNICON
HTTP:STC:ACTIVEX:BARCODEWIZ
HTTP:STC:ACTIVEX:PHOTOBASIC-AX
HTTP:STC:ACTIVEX:AURIGMAIMG
HTTP:STC:ACTIVEX:FLEXCELL-GRID
HTTP:STC:ACTIVEX:MS-SQLDMO
HTTP:STC:ACTIVEX:IBMINTS-INT-OF
HTTP:STC:ACTIVEX:BLACKICE-PRNT
HTTP:STC:ACTIVEX:DECISIONTOOLS
HTTP:STC:ACTIVEX:SYMC-APPSTEAM
HTTP:STC:ACTIVEX:LIVE-WRITER
HTTP:STC:ACTIVEX:REAL-IERPCTL
HTTP:STC:ACTIVEX:WKIMGSRV
HTTP:STC:ACTIVEX:URLMON-DLL
HTTP:STC:ACTIVEX:WATCHFIRE
HTTP:STC:ACTIVEX:CA-ETRUST
HTTP:STC:ACTIVEX:SYMC-NAVCOMUI
HTTP:STC:ACTIVEX:CHILKAT-FTP2
HTTP:STC:ACTIVEX:RKD-BARCODE
HTTP:STC:ACTIVEX:VB-TLBINF32
HTTP:STC:ACTIVEX:SIGPLUS-PRO
HTTP:STC:ACTIVEX:AUTODESK-IDROP
HTTP:STC:ACTIVEX:IBM-VSVIEW6
HTTP:STC:ACTIVEX:EDRAW-VIEWER
HTTP:STC:ACTIVEX:CO-FLEXGRID
HTTP:STC:ACTIVEX:MCAFEE-MYCIO
HTTP:STC:ACTIVEX:MDAC-DATASPACE
HTTP:STC:ACTIVEX:YAHOO-CD-PLY
HTTP:STC:ACTIVEX:FLEXERA
HTTP:STC:ACTIVEX:NTR-BOF
HTTP:STC:ACTIVEX:AWINGSOFT
HTTP:STC:ACTIVEX:CLEARQUEST-OLE
HTTP:STC:ACTIVEX:ATTACHMATE-REF
HTTP:STC:ACTIVEX:IDEFENSE-COM
HTTP:STC:ACTIVEX:SKINCRAFTER-OF
HTTP:STC:ACTIVEX:EASYMAIL
HTTP:STC:ACTIVEX:FLASH9D-CSS
HTTP:STC:ACTIVEX:PROMOTIC
HTTP:STC:ACTIVEX:PRECISIONID
HTTP:STC:ACTIVEX:ANSMTP
HTTP:STC:ACTIVEX:TUMBLEWEED
HTTP:STC:ACTIVEX:EASYMAIL-EXP
HTTP:STC:ACTIVEX:SIEMENS-AUTO
HTTP:STC:ACTIVEX:PVCAL
HTTP:STC:ACTIVEX:SAP-GUI-TABONE
HTTP:STC:ACTIVEX:PCVUE-SCADA
HTTP:STC:ACTIVEX:REAL-IEFRAME
HTTP:STC:ACTIVEX:EMC-KEYHELP
HTTP:STC:ACTIVEX:2X-APPLICATION
HTTP:STC:ACTIVEX:SUNWAY
HTTP:STC:ACTIVEX:HP-SPRINTER
HTTP:STC:ACTIVEX:C6-URL-DL
HTTP:STC:ACTIVEX:AXIS-CAMERA
HTTP:STC:ACTIVEX:HP-PROTECT-DAM
HTTP:STC:ACTIVEX:MSVIDCTL-2
HTTP:STC:ACTIVEX:TEECHARTPRO-OF
HTTP:STC:ACTIVEX:FACEBOOK-PHOTO
HTTP:STC:ACTIVEX:SHELL-APP
HTTP:STC:ACTIVEX:AOL-PHOBOS
HTTP:STC:ACTIVEX:BENNET-TEC
HTTP:STC:ACTIVEX:DOM-INOTES-WEB
HTTP:STC:ACTIVEX:JNPR-SSL-VPN
HTTP:STC:ACTIVEX:SAP-WEBBVIEWER
HTTP:STC:ACTIVEX:SAPGUI-AX
HTTP:STC:ACTIVEX:VMWARE-INTRA
HTTP:STC:ACTIVEX:NEWCOMMON-OCX
HTTP:STC:ACTIVEX:F-SECURE-MC
HTTP:STC:ACTIVEX:HUMMINGBIRD
HTTP:STC:ACTIVEX:HP-LOADRUNER
HTTP:STC:ACTIVEX:PROMOTIC-RCE
HTTP:STC:ACTIVEX:MW6-BARCODE
HTTP:STC:ACTIVEX:MS-ICARDIE
HTTP:STC:ACTIVEX:MSACCESS-AX
HTTP:STC:ACTIVEX:NOKIA-PHOENIX
HTTP:STC:ACTIVEX:ECAVA
HTTP:STC:ACTIVEX:HP-XUPLOAD-OCX
HTTP:STC:ACTIVEX:KINGVIEW
HTTP:STC:ACTIVEX:MOVE-PLAYER
HTTP:STC:ACTIVEX:SECOND-SIGHT
HTTP:STC:ACTIVEX:MYSPACE-UPLOAD
HTTP:STC:ACTIVEX:ADVANCED-FILE
HTTP:STC:ACTIVEX:IMAGESHACK
HTTP:STC:ACTIVEX:NETCRAFT
HTTP:STC:ACTIVEX:DBPOWERAMP
HTTP:STC:ACTIVEX:DART-SERVICE
HTTP:STC:ACTIVEX:FATH-FTP
HTTP:STC:ACTIVEX:WINDOWS-DRM
HTTP:STC:ACTIVEX:MACROVISION
HTTP:STC:ACTIVEX:CLSID-OBFUS
HTTP:STC:ACTIVEX:AURIGMA
HTTP:STC:ACTIVEX:STARUML
HTTP:STC:ACTIVEX:HP-INFO-CENTER
HTTP:STC:ACTIVEX:LPVIEWER
HTTP:STC:ACTIVEX:HMNGBRD-DEPWIZ
HTTP:STC:ACTIVEX:IBM-INOTES-BOF
HTTP:STC:ACTIVEX:WIN-SHELL-USER
HTTP:STC:ACTIVEX:CRYSTAL-REPORT
HTTP:STC:ACTIVEX:MS-OUTLOOK
HTTP:STC:ACTIVEX:SYNCTS-FILE-OW
HTTP:STC:ACTIVEX:PICTUREPUSHER
HTTP:STC:ACTIVEX:IBIZ-E-BANKING
HTTP:STC:ACTIVEX:DXTMSFT
HTTP:STC:ACTIVEX:DAXCTLE
HTTP:STC:ACTIVEX:DIVX-PLAYER
HTTP:STC:ACTIVEX:CLEVER-INTERNT
HTTP:STC:ACTIVEX:REDIFFBOL
HTTP:STC:ACTIVEX:LEADTOOLS-LTMM
HTTP:STC:ACTIVEX:ICQ-TOOLBAR
HTTP:STC:ACTIVEX:SOFTEK-BOF
HTTP:STC:ACTIVEX:STREAM-AUDIO
HTTP:STC:ACTIVEX:YAHOO-RCE
HTTP:STC:ACTIVEX:YAHO-YNOTIFIER
HTTP:STC:ACTIVEX:SMARTVMD-BOF
HTTP:STC:ACTIVEX:MS-EDRAW
HTTP:STC:ACTIVEX:PPSTREAM-BOF
HTTP:STC:ACTIVEX:DIVIS-WEB-DVR
HTTP:STC:ACTIVEX:OURGAME
HTTP:STC:ACTIVEX:BAOFENG-BO
HTTP:STC:ACTIVEX:CHINAGAMES
HTTP:STC:ACTIVEX:CHILKAT-SOCKET
HTTP:STC:ACTIVEX:CHILKAT-CRYPT
HTTP:STC:ACTIVEX:BLACKICE-SDK
HTTP:STC:ACTIVEX:AOL-PIC-EDITOR
HTTP:STC:ACTIVEX:AOA-DVD-BOF
HTTP:STC:ACTIVEX:EDRAW
HTTP:STC:ACTIVEX:WEBEX-GPC-DOS
HTTP:STC:ACTIVEX:JCOMSOFT
HTTP:STC:ACTIVEX:ATUCFOBJ-DLL
HTTP:STC:ACTIVEX:ZUNE
HTTP:STC:ACTIVEX:OVCTL
HTTP:STC:ACTIVEX:KINGSOFT
HTTP:STC:ACTIVEX:CYME-POWER-ENG
HTTP:STC:ACTIVEX:HPIS-DATA-MGR
HTTP:STC:ACTIVEX:YAHOO-CYFT
HTTP:STC:ACTIVEX:NETSPRINTTBAR
HTTP:STC:ACTIVEX:CITRIX-GATEWAY
HTTP:STC:ACTIVEX:FLASH-PLY-NULL
HTTP:STC:ACTIVEX:MOVIE-PLAYER
HTTP:STC:ACTIVEX:SONY-PCOMP-BOF
HTTP:STC:ACTIVEX:AOL-AMPX
HTTP:STC:ACTIVEX:WIBUKEY-RT-BO
HTTP:STC:ACTIVEX:TM-ISP-2010
HTTP:STC:ACTIVEX:ISSYMBOL
HTTP:STC:ACTIVEX:HONEYWELL-TEMA
HTTP:STC:ACTIVEX:MCAFEE-VT
HTTP:STC:ACTIVEX:MITSUBISHI-V3
HTTP:STC:ACTIVEX:HONEYWELL-EBI
HTTP:STC:ACTIVEX:LIQUIDXML-MULT
HTTP:STC:ACTIVEX:JAVA-DTK
HTTP:STC:ACTIVEX:ZENWORKS
HTTP:STC:ACTIVEX:NOVELL-RCE
HTTP:STC:ACTIVEX:KASP-AX
HTTP:STC:ACTIVEX:ABB-CWGRAPH3D
HTTP:STC:ACTIVEX:BROADWIN
HTTP:STC:ACTIVEX:CITRIX-NSEPA
HTTP:STC:ACTIVEX:SUN-JAVA-BO
HTTP:STC:ACTIVEX:KAZAA-ALTNET
HTTP:STC:ACTIVEX:ISOVIEW-BOF
HTTP:STC:ACTIVEX:VISBASIC6-AX-1
HTTP:STC:ACTIVEX:MS-MDAC
HTTP:STC:ACTIVEX:ORA-AUTOVUE
HTTP:STC:ACTIVEX:LIVE-PROFILE
HTTP:STC:ACTIVEX:MSMASK32-OCX
HTTP:STC:ACTIVEX:IBM-ACCESS
HTTP:STC:ACTIVEX:NATIONAL-INST
HTTP:STC:ACTIVEX:QTPLUGINX
HTTP:STC:ACTIVEX:MAGNETO-ICMP
HTTP:STC:ACTIVEX:MAGNETOSOFT-OV
HTTP:STC:ACTIVEX:MAGNETOSOFT-OF
HTTP:STC:ACTIVEX:SIEMENS-WINCC
HTTP:STC:ACTIVEX:MS-AGENT-LIB
HTTP:STC:ACTIVEX:NOVELL-GRPWISE
HTTP:STC:ACTIVEX:OWC
HTTP:STC:ACTIVEX:EBCRYPT-PRNG
HTTP:STC:ACTIVEX:ICONICS-WEBHMI
HTTP:STC:ACTIVEX:SNAPVIEW-RCE
HTTP:STC:ACTIVEX:MSGSC-DLL
HTTP:STC:ACTIVEX:MAGNETOSOFT
HTTP:STC:ACTIVEX:AXIS-MEDIA-BO
HTTP:STC:ACTIVEX:ADODB
HTTP:STC:ACTIVEX:SPEECH-API
HTTP:STC:ACTIVEX:ORBIT-DWNLDR
HTTP:STC:ACTIVEX:SYNACTISPDF-BO
HTTP:STC:ACTIVEX:DOC-CAPTURE-BO
HTTP:STC:ACTIVEX:PANASONIC-API
HTTP:STC:ACTIVEX:VMWARE-FS
HTTP:STC:ACTIVEX:IBM-TIVOLI
HTTP:STC:ACTIVEX:CISCO-WVC200
HTTP:STC:ACTIVEX:ORACLE-SSSPLT
HTTP:STC:ACTIVEX:IBM-SPSS-MRAB
HTTP:STC:ACTIVEX:FLEXERA-ISGRID
HTTP:STC:ACTIVEX:ORACLE-FILEC
HTTP:STC:ACTIVEX:ORACLE-DSCXB
HTTP:STC:ACTIVEX:DATA-ACTIVEBAR
HTTP:STC:ACTIVEX:MW6-AZTEC-BO
HTTP:STC:ACTIVEX:MSXML-INFODISC
HTTP:STC:ACTIVEX:IPSWITCH-IMAIL
HTTP:STC:ACTIVEX:CODEBASE
HTTP:STC:ACTIVEX:VFP6R
HTTP:STC:ACTIVEX:DIVX-DOS
HTTP:STC:ACTIVEX:VULN-DHTML
HTTP:STC:ACTIVEX:DEV-TOOL
HTTP:STC:ACTIVEX:OLEAUTO32
HTTP:STC:ACTIVEX:ACCESS-CORRUPT
HTTP:STC:ACTIVEX:MS-OWC-RCE
HTTP:STC:ACTIVEX:RICHTXT
HTTP:STC:ACTIVEX:NSKEY-DLL
HTTP:STC:ACTIVEX:NMSA-OF
HTTP:STC:ACTIVEX:MSVIDCTL-1
HTTP:STC:ACTIVEX:MS-WIN-MSGR
HTTP:STC:ACTIVEX:MS-DEBUGDIAG
HTTP:STC:ACTIVEX:IE-TMP-FOLDER
HTTP:STC:ACTIVEX:CAPICOM
HTTP:STC:ACTIVEX:MSCOMCTL-OCX
HTTP:STC:ACTIVEX:DATA-ANALYSIS
HTTP:STC:ACTIVEX:HXVZ
HTTP:STC:ACTIVEX:IEMOUSE-IMGTAG
HTTP:STC:ACTIVEX:XMLHTTP
HTTP:STC:ACTIVEX:SAMSUNG-CNC
HTTP:STC:ACTIVEX:COM-OBJ
HTTP:STC:ACTIVEX:IE-ECENTREX
HTTP:STC:ACTIVEX:MS-IE-WMS
HTTP:STC:ACTIVEX:ORCLE-WEBCENTR
HTTP:STC:ACTIVEX:EASYMAIL-LEAK
HTTP:STC:ACTIVEX:IE-CCRP
HTTP:STC:ACTIVEX:WORD-VIEWER
HTTP:STC:ACTIVEX:IE-POPUP
HTTP:STC:ACTIVEX:WMEX
HTTP:STC:ACTIVEX:ADDCOLUMN
HTTP:STC:ACTIVEX:SIEMENS-SOLID
HTTP:STC:ACTIVEX:ADVANTECH-OF
HTTP:STC:ACTIVEX:ORACLE-DATAINT
HTTP:STC:ACTIVEX:ADVANTECH-BOF
HTTP:STC:ACTIVEX:CODEBASE-2
HTTP:STC:ACTIVEX:DOM-TYPE
HTTP:STC:ACTIVEX:WEBGATE-WESP
HTTP:STC:ACTIVEX:ELECTRIC-PELCO
HTTP:STC:ACTIVEX:HP-RCE
HTTP:STC:ACTIVEX:SOLARWINDS
HTTP:STC:ACTIVEX:ULTRAOFFICE
HTTP:STC:ACTIVEX:SAMSUNG-KIES
HTTP:STC:ACTIVEX:VISAGESOFT-PDF
HTTP:STC:ACTIVEX:MCKESSON
HTTP:STC:ACTIVEX:UBISOFT
HTTP:STC:ACTIVEX:QUICKTIME-BOF
HTTP:STC:ACTIVEX:VS05-INJ
HTTP:STC:ACTIVEX:MS-OWC
HTTP:STC:ACTIVEX:MS-DOS
HTTP:STC:ACTIVEX:IENIPP
HTTP:STC:ACTIVEX:ORACLE-DQ-RCE
HTTP:STC:ACTIVEX:AGILENT-INSERT
HTTP:STC:ACTIVEX:OFFICE-OCX
HTTP:STC:ACTIVEX:REAL-PLR-RPAU
HTTP:STC:ACTIVEX:DELL-WEBCAM
HTTP:STC:ACTIVEX:IE-DA
HTTP:STC:ACTIVEX:IBM-SPSS
HTTP:STC:ACTIVEX:ALTIRIS
HTTP:STC:ACTIVEX:PDWIZARD
HTTP:STC:ACTIVEX:HNYWLL-OPOS
HTTP:STC:ACTIVEX:VMWARE
HTTP:STC:ACTIVEX:JBOX
HTTP:STC:ACTIVEX:YAHOO-AUDIO
HTTP:STC:ACTIVEX:IBM-C1SIZER
HTTP:STC:ACTIVEX:HP-SPRINTR-BOF
HTTP:STC:ACTIVEX:ORACLE-RCE
HTTP:STC:ACTIVEX:MS-OWC-BOF
HTTP:STC:ACTIVEX:HP-EASYPRINTER
HTTP:STC:ACTIVEX:ORACLE-TTF16
HTTP:STC:ACTIVEX:CISCO-VPN
HTTP:STC:ACTIVEX:TOM-SAMYER-GET
HTTP:STC:ACTIVEX:IBM-RATIONAL
HTTP:STC:ACTIVEX:HP-EASY-XML
HTTP:STC:ACTIVEX:RDP-UNSAFE-AX
HTTP:STC:ACTIVEX:IETAB-AX
HTTP:STC:ACTIVEX:WMP-SCRIPT
HTTP:STC:ACTIVEX:EMV-PIXTOOLS
HTTP:STC:ACTIVEX:SCHNEIDER
HTTP:STC:ACTIVEX:SCHNEIDER-ELEC
HTTP:STC:ACTIVEX:ASUS-NETSWITCH
HTTP:STC:ACTIVEX:JRE-DNSRESOLVE
HTTP:STC:ACTIVEX:BLACKICE
HTTP:STC:ACTIVEX:HP-AUDIO-REC
HTTP:STC:ACTIVEX:SETHTMLFILE
HTTP:STC:ACTIVEX:ADOBE-DL-MGR
HTTP:STC:ACTIVEX:XML-CORE-3-0
HTTP:STC:ACTIVEX:MS-IE-COM-RCE
HTTP:STC:ACTIVEX:OFFICEVIEW-DOS
HTTP:STC:ACTIVEX:MW6-MAXICODE
HTTP:STC:ACTIVEX:HHCTRL-IMAGE
HTTP:STC:ACTIVEX:EDRAW-PDF
HTTP:STC:ACTIVEX:IBM-LOTUS-QIKR
HTTP:STC:ACTIVEX:WFILESTRING
HTTP:STC:ACTIVEX:MCAFEE-FREESCN
HTTP:STC:ACTIVEX:SAMSNG-KIES
HTTP:STC:ACTIVEX:ICQPHONE-EXEC
HTTP:STC:ACTIVEX:SNOOPYCTRL
HTTP:STC:ACTIVEX:CRYSTAL-PRINT
HTTP:STC:ACTIVEX:PEACHTREE
HTTP:STC:ACTIVEX:ISUSWEB
HTTP:STC:ACTIVEX:HP-OPOS-DRIVER
HTTP:STC:ACTIVEX:NOVELL-CLIENT
HTTP:STC:ACTIVEX:NDFXARTEFFECTS
HTTP:STC:ACTIVEX:BACKWEB-LIA
HTTP:STC:ACTIVEX:MSO-DATASRC
HTTP:STC:ACTIVEX:DATASRCCTL
HTTP:STC:ACTIVEX:WHALE-CLNT-BO
HTTP:STC:ACTIVEX:SONICWALL-VPN
HTTP:STC:ACTIVEX:WEBGATE-WESPM
HTTP:STC:ACTIVEX:CA-PSFORMX-AX
HTTP:STC:ACTIVEX:CA-WEBSCAN-AX
HTTP:STC:ACTIVEX:LEADTOOLS-JPEG
HTTP:STC:ACTIVEX:SYGATE-SSHELP
HTTP:STC:ACTIVEX:HPQUTIL
HTTP:STC:ACTIVEX:BT-WEBHELPER
HTTP:STC:ACTIVEX:REAL-PLAYER
HTTP:STC:ACTIVEX:WIN2K-AX
HTTP:STC:ACTIVEX:SYMC-CLIPROXY
HTTP:STC:ACTIVEX:WELLINTECH
HTTP:STC:ACTIVEX:HP-SW-UPDATE
HTTP:STC:ACTIVEX:NORTON-SYMSPAM
HTTP:STC:ACTIVEX:NETIQ-BO
HTTP:STC:ACTIVEX:FLASH-ALOSCRPT
HTTP:STC:ACTIVEX:SONY-WIFIMAN
HTTP:STC:ACTIVEX:TRIEDITDOC
HTTP:STC:ACTIVEX:SQLVDIR-DLL
HTTP:STC:ACTIVEX:TROUBLE-QUERY
HTTP:STC:ACTIVEX:YAHOO-MSG

HTTP:STC:ADOBE

HTTP:STC:ADOBE:CVE-2014-0534-SB
HTTP:STC:ADOBE:SWF-FLASH-OF
HTTP:STC:ADOBE:CVE-2015-3096-SB
HTTP:STC:ADOBE:PDF-UUEXEC
HTTP:STC:ADOBE:PDF-CATALOG
HTTP:STC:ADOBE:PDF-DESC-FONTS
HTTP:STC:ADOBE:FLASH-ARGREST
HTTP:STC:ADOBE:READER-DOS
HTTP:STC:ADOBE:CVE-2014-0559-BO
HTTP:STC:ADOBE:THUMBNAIL-RCE
HTTP:STC:ADOBE:PDF-LAUNCH-CMD
HTTP:STC:ADOBE:CVE2014-0532-RCE
HTTP:STC:ADOBE:CVE-2014-0545-MC
HTTP:STC:ADOBE:DOMAIN-MEMORY
HTTP:STC:ADOBE:CVE-2015-3129-CE
HTTP:STC:ADOBE:CVE-2015-3125-ID
HTTP:STC:ADOBE:FLASH-DEFINE-TAG
HTTP:STC:ADOBE:FLASH-DYN-SCRIPT
HTTP:STC:ADOBE:FLASH-FLV-MEM
HTTP:STC:ADOBE:FLASH-AS-MEM-DOS
HTTP:STC:ADOBE:FLASH-RCE
HTTP:STC:ADOBE:SWF-BUTTON
HTTP:STC:ADOBE:PDF-HEAP-RCE
HTTP:STC:ADOBE:FLASH-NULL-PTR
HTTP:STC:ADOBE:CVE-2015-3124-CE
HTTP:STC:ADOBE:PARSE-FLOAT-BOF
HTTP:STC:ADOBE:CVE-2014-9159-BO
HTTP:STC:ADOBE:MAL-BMP
HTTP:STC:ADOBE:CONVFILTER-UAF
HTTP:STC:ADOBE:CVE-2014-8459-MC
HTTP:STC:ADOBE:CVE-2013-3355-CE
HTTP:STC:ADOBE:PDF-COMPACT
HTTP:STC:ADOBE:CVE-2014-9165-UA
HTTP:STC:ADOBE:JS-CE
HTTP:STC:ADOBE:CVE-2015-0301-MC
HTTP:STC:ADOBE:CVE-2015-5093-CE
HTTP:STC:ADOBE:READER-10.1.4-MC
HTTP:STC:ADOBE:CVE-2015-0306-MC
HTTP:STC:ADOBE:CVE-2015-312-RCE
HTTP:STC:ADOBE:PDF-GOTO-XSS
HTTP:STC:ADOBE:READER-NULL-PTR
HTTP:STC:ADOBE:PDF-ICC-PRODESC
HTTP:STC:ADOBE:CVE-2014-0587-MC
HTTP:STC:ADOBE:FLASH-FIREFOX
HTTP:STC:ADOBE:PDF-PICT-HEAP-OF
HTTP:STC:ADOBE:PDF-OPENACTION
HTTP:STC:ADOBE:CVE-2014-8452-SB
HTTP:STC:ADOBE:PDF-MAL-JPEG
HTTP:STC:ADOBE:PDF-JS-METHOD
HTTP:STC:ADOBE:2015-0310-REGMCP
HTTP:STC:ADOBE:PDF-OBFUSCATION
HTTP:STC:ADOBE:PDF-JAVASCRIPT
HTTP:STC:ADOBE:CAM-RAW-PLUGIN
HTTP:STC:ADOBE:FLASH-INT-DOS
HTTP:STC:ADOBE:PDF-CLUT
HTTP:STC:ADOBE:PDF-TJ-OBJECT
HTTP:STC:ADOBE:CVE-2014-0493-CE
HTTP:STC:ADOBE:PDF-COOLTYPE-BO
HTTP:STC:ADOBE:MEMDSC-2014-0552
HTTP:STC:ADOBE:PDF-U3D-BO
HTTP:STC:ADOBE:SWF-MAL-FILE
HTTP:STC:ADOBE:EMBED-OBJ-MIME
HTTP:STC:ADOBE:CVE-2014-0588-CE
HTTP:STC:ADOBE:CVE-2015-0302-ID
HTTP:STC:ADOBE:PDF-FREETYPE
HTTP:STC:ADOBE:SWF-ACTIONSET
HTTP:STC:ADOBE:JBIG2-SYMBOL-RCE
HTTP:STC:ADOBE:FLASHPLYR-HEAPOF
HTTP:STC:ADOBE:FLV-FILE-DOS
HTTP:STC:ADOBE:READER-CID-FONT
HTTP:STC:ADOBE:PDF-URI-OACTION
HTTP:STC:ADOBE:FLASH-INT-OVF
HTTP:STC:ADOBE:PDF-PRINTSEPS
HTTP:STC:ADOBE:READER-FILE-DOS
HTTP:STC:ADOBE:CVE-2015-5131-CE
HTTP:STC:ADOBE:PDF-UNICODED-SC
HTTP:STC:ADOBE:FLASH-INVOP
HTTP:STC:ADOBE:READER-FILE-RCE
HTTP:STC:ADOBE:CVE-2015-0307-DS
HTTP:STC:ADOBE:CVE-2013-3354-CE
HTTP:STC:ADOBE:READER-HEAP-OVF
HTTP:STC:ADOBE:CVE-2014-0574-MC
HTTP:STC:ADOBE:PDF-PRINTSEPS-2
HTTP:STC:ADOBE:ACROFORM-MEM
HTTP:STC:ADOBE:PDF-FONT
HTTP:STC:ADOBE:CVE-2015-3102-SB
HTTP:STC:ADOBE:CVE-2014-0577-CE
HTTP:STC:ADOBE:CVE-2013-5331-CE
HTTP:STC:ADOBE:READER-IT
HTTP:STC:ADOBE:CVE-2014-0539-CE
HTTP:STC:ADOBE:CVE-2014-0565-MC
HTTP:STC:ADOBE:CVE-2014-0523-CE
HTTP:STC:ADOBE:PDF-XML-XSS
HTTP:STC:ADOBE:CVE-2014-0522-MC
HTTP:STC:ADOBE:CS-NULL-POINTER
HTTP:STC:ADOBE:XFIR-PAMI-RCE
HTTP:STC:ADOBE:CVE-2015-3098-CE
HTTP:STC:ADOBE:CVE-2015-3103-CE
HTTP:STC:ADOBE:CVE-2014-4671
HTTP:STC:ADOBE:CVE2014-8456-DOS
HTTP:STC:ADOBE:FLASH-REGEX-DOS
HTTP:STC:ADOBE:READER-BMP
HTTP:STC:ADOBE:CVE-2014-0537-CE
HTTP:STC:ADOBE:MAL-FLV-BOF
HTTP:STC:ADOBE:CVE-2015-3099-ID
HTTP:STC:ADOBE:CVE-2015-5559-CE
HTTP:STC:ADOBE:PDF-FIELDDIR
HTTP:STC:ADOBE:XFIR-PAMI
HTTP:STC:ADOBE:PDF-UNI-3D
HTTP:STC:ADOBE:READER-DCT
HTTP:STC:ADOBE:CFF-OF
HTTP:STC:ADOBE:CVE-2015-5550-CE
HTTP:STC:ADOBE:TRUETYPE-OF
HTTP:STC:ADOBE:FLASH-RUNTIME
HTTP:STC:ADOBE:PDF-GLYPH-OF
HTTP:STC:ADOBE:SWF-DEFINEFONT4
HTTP:STC:ADOBE:CVE-2014-0574-CE
HTTP:STC:ADOBE:READER-BMP-COLOR
HTTP:STC:ADOBE:MAL-PSD
HTTP:STC:ADOBE:SWF-ACTIONIF-DO
HTTP:STC:ADOBE:FLASH-FILEREF-BO
HTTP:STC:ADOBE:U3D-CLODMESH-MC
HTTP:STC:ADOBE:FLASH-XSRF
HTTP:STC:ADOBE:SWF-GRADIENTFIL2
HTTP:STC:ADOBE:PDF-JPXDECODE
HTTP:STC:ADOBE:CVE-2015-5561-CE
HTTP:STC:ADOBE:POSTSCRIPT-RCE
HTTP:STC:ADOBE:SWF-IN-PDF
HTTP:STC:ADOBE:CVE-2014-0584-CE
HTTP:STC:ADOBE:CVE-2014-0568-SE
HTTP:STC:ADOBE:PDF-SPELL-MC
HTTP:STC:ADOBE:SWF-APPLY-FUNC
HTTP:STC:ADOBE:SWF-POINTOBJ
HTTP:STC:ADOBE:READER-PRC
HTTP:STC:ADOBE:READER-U3D
HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC
HTTP:STC:ADOBE:SWF-DEFINEFUNC2
HTTP:STC:ADOBE:READER-PICT-RLE
HTTP:STC:ADOBE:SWF-MAL-AS-RCE
HTTP:STC:ADOBE:SWF-FLASH-BOF
HTTP:STC:ADOBE:U3D-TEXTURE-BOF
HTTP:STC:ADOBE:SWF-MAL-AS
HTTP:STC:ADOBE:SWF-INVALID-OBF
HTTP:STC:ADOBE:FLASH-ACTIONIF
HTTP:STC:ADOBE:FLASH-BITMAPDATA
HTTP:STC:ADOBE:FLASH-SEQUENCE
HTTP:STC:ADOBE:RMAS-RCE
HTTP:STC:ADOBE:FLASH-BMD-SCROLL
HTTP:STC:ADOBE:FLASH-XDOMAIN
HTTP:STC:ADOBE:SWF-MAL-AS-OF
HTTP:STC:ADOBE:PDF-COOLTYPE-RCE
HTTP:STC:ADOBE:PDF-JPEG-FILE-CE
HTTP:STC:ADOBE:ACROBAT-U3D-RCE
HTTP:STC:ADOBE:READER-DOTRANGE
HTTP:STC:ADOBE:FLASH-SETSLOT
HTTP:STC:ADOBE:SWF-GRADIENTFILL
HTTP:STC:ADOBE:TEXT-NETCONNECT
HTTP:STC:ADOBE:READER-WIDGET
HTTP:STC:ADOBE:FLASH-STAGE3D
HTTP:STC:ADOBE:CVE-2014-8441-MC
HTTP:STC:ADOBE:READER-FORM-UAF
HTTP:STC:ADOBE:TRUETYPE-FONT-CE
HTTP:STC:ADOBE:READER-INFODISC
HTTP:STC:ADOBE:PDF-EVASIVE-FF
HTTP:STC:ADOBE:PS-TIFF-BOF
HTTP:STC:ADOBE:FLASH-PLAYER-MP4
HTTP:STC:ADOBE:READER-XSLT-BO
HTTP:STC:ADOBE:MEM-PTR-LEAK
HTTP:STC:ADOBE:CVE-2014-0564-MC
HTTP:STC:ADOBE:SWF-METHOD-BODY
HTTP:STC:ADOBE:SWF-XSFORGE
HTTP:STC:ADOBE:CROSS-SEC-BYPASS
HTTP:STC:ADOBE:SHOCKWAVE-RCSL
HTTP:STC:ADOBE:XFIR-KEY
HTTP:STC:ADOBE:SWF-SEC-BYPASS
HTTP:STC:ADOBE:PDF-GDI-OBJ-RCE
HTTP:STC:ADOBE:ACROBAT-IFF-OF
HTTP:STC:ADOBE:ACROBAT-PICT-IMG
HTTP:STC:ADOBE:ACROBAT-PCX-OF
HTTP:STC:ADOBE:PDF-JS-FILE
HTTP:STC:ADOBE:ACROBAT-BMP-HEAD
HTTP:STC:ADOBE:ACROBAT-GLYPH-MC
HTTP:STC:ADOBE:ACROBAT-JS-XRF
HTTP:STC:ADOBE:READER-BPROTECT
HTTP:STC:ADOBE:ACROBAT-U3D-BO
HTTP:STC:ADOBE:FLASH-ACTIVEX-MC
HTTP:STC:ADOBE:FLASH-MP4-NULL
HTTP:STC:ADOBE:READER-HYBRID-BY
HTTP:STC:ADOBE:CVE-2013-0622-SB
HTTP:STC:ADOBE:CVE-2015-5544-CE
HTTP:STC:ADOBE:SWF-OPENTYPE-CFF
HTTP:STC:ADOBE:SWF-XLS-MALF
HTTP:STC:ADOBE:SWF-UNVRSL-XSS
HTTP:STC:ADOBE:PDF-JS-HIDE
HTTP:STC:ADOBE:SWF-SETTARGET
HTTP:STC:ADOBE:SWF-TYPE-CONFUS
HTTP:STC:ADOBE:DOMAIN-MEM-RCE
HTTP:STC:ADOBE:ACROBAT-XSS
HTTP:STC:ADOBE:ILLUSTRATOR-MC
HTTP:STC:ADOBE:FLEX3-HISTORY
HTTP:STC:ADOBE:FLASH-OOB-MC
HTTP:STC:ADOBE:REDR-ACROFORM-MC
HTTP:STC:ADOBE:CVE-2014-8440-CE
HTTP:STC:ADOBE:READER-INFO-DISC
HTTP:STC:ADOBE:READER-WRITAV-CE
HTTP:STC:ADOBE:FLS-PLYR-SWF-DOS
HTTP:STC:ADOBE:PUSHSTRING-RCE
HTTP:STC:ADOBE:ACROBAT-URL-DF
HTTP:STC:ADOBE:ACROBAT-GETICON
HTTP:STC:ADOBE:CVE-2014-0586-CE
HTTP:STC:ADOBE:FLASH-PLY-RCE
HTTP:STC:ADOBE:READER-REMTE-DOS
HTTP:STC:ADOBE:READER-PLUGIN
HTTP:STC:ADOBE:INDESIGN-INDD-BO
HTTP:STC:ADOBE:FLASH-CSS-EXP
HTTP:STC:ADOBE:FLASH-MC
HTTP:STC:ADOBE:FLASH-BO
HTTP:STC:ADOBE:FLASH-INT-OV
HTTP:STC:ADOBE:READER-INT-OF
HTTP:STC:ADOBE:CVE-2014-0547-MC
HTTP:STC:ADOBE:CVE-2014-9150-SB
HTTP:STC:ADOBE:CVE-2014-0576-CE
HTTP:STC:ADOBE:READER-TTF-DESC
HTTP:STC:ADOBE:CVE-2014-0567-OF
HTTP:STC:ADOBE:READER-OOB-WRITE
HTTP:STC:ADOBE:READER-MC-RCE
HTTP:STC:ADOBE:READER-STACK-EXH
HTTP:STC:ADOBE:BMP-HEADER
HTTP:STC:ADOBE:DEFINEFONT
HTTP:STC:ADOBE:CVE-2013-5325-CE
HTTP:STC:ADOBE:SWF-UAF-JS
HTTP:STC:ADOBE:JPEG-FILE-OF
HTTP:STC:ADOBE:PS-PNG-BO
HTTP:STC:ADOBE:FLASH-ARGCOUNT
HTTP:STC:ADOBE:READER-JP2K-BO
HTTP:STC:ADOBE:TTF-HANDLING
HTTP:STC:ADOBE:CVE-2014-0556-BO
HTTP:STC:ADOBE:SWF-FILE-XSS
HTTP:STC:ADOBE:AUD-SESSFILE
HTTP:STC:ADOBE:SWF-REMOTE-MC
HTTP:STC:ADOBE:FLSHPLYR-INFDISC
HTTP:STC:ADOBE:CVE-2014-9162-ID
HTTP:STC:ADOBE:FLASH-AS2-OF
HTTP:STC:ADOBE:FLASH-SNATIVE
HTTP:STC:ADOBE:READER-PDF-DOS
HTTP:STC:ADOBE:CVE-2015-0330-CE
HTTP:STC:ADOBE:SHKWV-LINGO-BOF
HTTP:STC:ADOBE:PDF-EBUK-FORMSTR
HTTP:STC:ADOBE:FLASH-DYN-CALC
HTTP:STC:ADOBE:CVE2015-0309-RCE
HTTP:STC:ADOBE:CVE-2014-9158-MC
HTTP:STC:ADOBE:CVE-2014-8458-MC
HTTP:STC:ADOBE:MEMLK-2014-0543
HTTP:STC:ADOBE:CVE-2014-8461-MC
HTTP:STC:ADOBE:CLTYP-TYPGPY-DOS
HTTP:STC:ADOBE:REVOKED-CERT
HTTP:STC:ADOBE:WEIGHTVECTOR
HTTP:STC:ADOBE:PDF-UAC-HANDLE
HTTP:STC:ADOBE:SWF-MEM-COR
HTTP:STC:ADOBE:SWF-LINUX-AS
HTTP:STC:ADOBE:CVE-2014-8443-MC
HTTP:STC:ADOBE:CVE-2015-0313-ID
HTTP:STC:ADOBE:FLASH-MP4LOAD-BO
HTTP:STC:ADOBE:CVE-2014-8451-ID
HTTP:STC:ADOBE:CVE-2014-8453-CE
HTTP:STC:ADOBE:PDF-U3D-CLOD
HTTP:STC:ADOBE:FLATEDECODE-BO
HTTP:STC:ADOBE:CVE-2014-8460-BO
HTTP:STC:ADOBE:PDF-EXT-OF
HTTP:STC:ADOBE:FLASH-MEDIA-SRVR
HTTP:STC:ADOBE:CVE-2014-0580-SB
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT
HTTP:STC:ADOBE:CVE-2015-3119-CE
HTTP:STC:ADOBE:CVE-2015-3118-CE
HTTP:STC:ADOBE:FLASHPLR-NULL-MC
HTTP:STC:ADOBE:SWF-MEM-CORR
HTTP:STC:ADOBE:CVE-2015-0323-CE
HTTP:STC:ADOBE:FLASHPLR-FILE-MC
HTTP:STC:ADOBE:PDF-UNIVERSAL3D
HTTP:STC:ADOBE:CVE-2015-0317-CE
HTTP:STC:ADOBE:PDF-EMBEDDEDFILE
HTTP:STC:ADOBE:MAL-IFF
HTTP:STC:ADOBE:PDF-3D-WH
HTTP:STC:ADOBE:MEMLK-2014-0542
HTTP:STC:ADOBE:FLASH-CVE15-0308
HTTP:STC:ADOBE:XFIR-RCSL
HTTP:STC:ADOBE:CVE-2013-3352-CE
HTTP:STC:ADOBE:CVE-2015-3121-CE
HTTP:STC:ADOBE:CVE-2015-3116-CE
HTTP:STC:ADOBE:FLASH-AS3-INT-OV
HTTP:STC:ADOBE:2013-5065-PDF
HTTP:STC:ADOBE:PDF-UAF-RCE
HTTP:STC:ADOBE:READER-SECBYPASS
HTTP:STC:ADOBE:CVE-2015-0322-CE
HTTP:STC:ADOBE:FLASHPLYR-SBYPAS
HTTP:STC:ADOBE:CVE-2014-0497-MC
HTTP:STC:ADOBE:READER-ICC-RCE
HTTP:STC:ADOBE:CVE-2014-0578-CE
HTTP:STC:ADOBE:CVE-2013-5330-MC
HTTP:STC:ADOBE:CVE-2015-3117-CE
HTTP:STC:ADOBE:PDF-ICC-RCE
HTTP:STC:ADOBE:CVE-2015-2417-CE
HTTP:STC:ADOBE:LIBTIF-FETCHDATA
HTTP:STC:ADOBE:CVE-2015-3114-ID
HTTP:STC:ADOBE:FLASH-INFO-DISC
HTTP:STC:ADOBE:FLASH-MAL-ACTION
HTTP:STC:ADOBE:CVE-2013-3357-MC
HTTP:STC:ADOBE:READER-API-CE
HTTP:STC:ADOBE:CVE-2015-0303-SB
HTTP:STC:ADOBE:CVE-2015-0326-DS
HTTP:STC:ADOBE:BMP-INT-OVF
HTTP:STC:ADOBE:CVE-2013-5324-MC
HTTP:STC:ADOBE:CVE-2014-0499-MC
HTTP:STC:ADOBE:CVE-2015-3128-CE
HTTP:STC:ADOBE:READER-MAL-PDF
HTTP:STC:ADOBE:BYTEARRAY-UAF
HTTP:STC:ADOBE:CVE-2013-5332-CE
HTTP:STC:ADOBE:CVE-2014-0558-CE
HTTP:STC:ADOBE:CVE-2015-3127-UF
HTTP:STC:ADOBE:CVE-2015-5103-CE
HTTP:STC:ADOBE:CVE-2015-5104-CE
HTTP:STC:ADOBE:CVE-2015-0328-CE
HTTP:STC:ADOBE:CVE-2015-5094-CE
HTTP:STC:ADOBE:FLV-APPENDBYTES
HTTP:STC:ADOBE:FLASH-PLAYER-BOF
HTTP:STC:ADOBE:FLASH-PLAYER-AIR
HTTP:STC:ADOBE:CVE-2015-5098-CE
HTTP:STC:ADOBE:SWF-INFO-DISC
HTTP:STC:ADOBE:ACROBAT-JPEG2000
HTTP:STC:ADOBE:PDF-CCITT
HTTP:STC:ADOBE:PM-FONT-OF
HTTP:STC:ADOBE:CVE-2015-5095-CE
HTTP:STC:ADOBE:PDF-COLORS-INT
HTTP:STC:ADOBE:AUD-TRKM
HTTP:STC:ADOBE:CVE-2013-3353
HTTP:STC:ADOBE:FLASH-NULL-DOS
HTTP:STC:ADOBE:CVE-2015-5087-CE
HTTP:STC:ADOBE:CVE-2014-0518-CE
HTTP:STC:ADOBE:PS-CS4-MULTI-BO
HTTP:STC:ADOBE:CVE-2015-5113-CE
HTTP:STC:ADOBE:CVE-2015-4447-CE
HTTP:STC:ADOBE:CVE-2015-5115-OB
HTTP:STC:ADOBE:CVE-2015-5101-CE
HTTP:STC:ADOBE:CVE-2015-5102-CE
HTTP:STC:ADOBE:CVE-2014-0506-UF
HTTP:STC:ADOBE:CVE-2014-0544-MC
HTTP:STC:ADOBE:FLASH-INFODISC
HTTP:STC:ADOBE:FLASH-CVE15-0304
HTTP:STC:ADOBE:CVE-2014-0555-BO
HTTP:STC:ADOBE:CVE-2014-0550-BO
HTTP:STC:ADOBE:FLASH-PLAYER-BO
HTTP:STC:ADOBE:2014-0557-RCE
HTTP:STC:ADOBE:CVE-2014-0511-BO
HTTP:STC:ADOBE:PDF-BITDEF-OF
HTTP:STC:ADOBE:CVE-2015-5100-CE
HTTP:STC:ADOBE:CVE-2014-0553-MC
HTTP:STC:ADOBE:PDF-JS-EXECUTION
HTTP:STC:ADOBE:CVE-2014-0538-UF
HTTP:STC:ADOBE:READER-DCT-NULL
HTTP:STC:ADOBE:TEXTLINE-OB-CE
HTTP:STC:ADOBE:READER-JS-RCE
HTTP:STC:ADOBE:CVE-2015-0305-MC
HTTP:STC:ADOBE:READER-CRASH
HTTP:STC:ADOBE:READER-UAF
HTTP:STC:ADOBE:CVE-2014-0512-CE
HTTP:STC:ADOBE:CVE-2014-8455-UF
HTTP:STC:ADOBE:CVE-2015-0329-CE
HTTP:STC:ADOBE:FLASH-AS3-MC
HTTP:STC:ADOBE:FLASH-PLY-BYPASS
HTTP:STC:ADOBE:CVE-2014-0517-CE
HTTP:STC:ADOBE:CVE-2014-0524-MC
HTTP:STC:ADOBE:CVE-2015-5123-CE
HTTP:STC:ADOBE:CVE-2015-4448-CE
HTTP:STC:ADOBE:READER-JAVA-CE
HTTP:STC:ADOBE:CVE-2014-0520-CE
HTTP:STC:ADOBE:CVE-2014-8450-CE
HTTP:STC:ADOBE:CVE-2015-5086-CE
HTTP:STC:ADOBE:SWF-EVENTLISTEN
HTTP:STC:ADOBE:CVE-2014-0515-BO
HTTP:STC:ADOBE:SHOCKWAVE-OOB
HTTP:STC:ADOBE:CVE-2014-0531-MC
HTTP:STC:ADOBE:READR-ACROBAT-BO
HTTP:STC:ADOBE:FLASH-OP
HTTP:STC:ADOBE:DC-2015-5097-CE
HTTP:STC:ADOBE:CVE-2014-0521
HTTP:STC:ADOBE:CVE-2014-8449-CE
HTTP:STC:ADOBE:CVE-2015-0321-CE
HTTP:STC:ADOBE:CVE-2015-0315-CE
HTTP:STC:ADOBE:CVE-2015-0325-CE
HTTP:STC:ADOBE:CVE-2015-0318-CE
HTTP:STC:ADOBE:CVE-2015-0320-CE
HTTP:STC:ADOBE:CVE-2015-0319-CE
HTTP:STC:ADOBE:CVE-2015-0324-CE
HTTP:STC:ADOBE:CVE-2015-0316-CE
HTTP:STC:ADOBE:CVE-2015-0314-BO
HTTP:STC:ADOBE:CVE-2015-0333-MC
HTTP:STC:ADOBE:CVE-2015-0341-CE
HTTP:STC:ADOBE:CVE-2015-0340-CE
HTTP:STC:ADOBE:CVE-2015-0093-CE
HTTP:STC:ADOBE:CVE-2015-0348-CE
HTTP:STC:ADOBE:CVE-2015-0090-CE
HTTP:STC:ADOBE:CVE-2015-0092-CE
HTTP:STC:ADOBE:CVE-2015-0089-ID
HTTP:STC:ADOBE:CVE-2015-0091-CE
HTTP:STC:ADOBE:CVE-2015-0087-ID
HTTP:STC:ADOBE:CVE-2015-0337-PB
HTTP:STC:ADOBE:CVE-2015-0342-CE
HTTP:STC:ADOBE:CVE-2015-0335-CE
HTTP:STC:ADOBE:CVE-2015-0334-CE
HTTP:STC:ADOBE:CVE-2015-0353-CE
HTTP:STC:ADOBE:CVE-2015-0339-CE
HTTP:STC:ADOBE:CVE-2015-0338-CE
HTTP:STC:ADOBE:CVE-2015-0327-CE
HTTP:STC:ADOBE:CVE-2015-0356-CE
HTTP:STC:ADOBE:CVE-2015-0351-MC
HTTP:STC:ADOBE:CVE-2015-0350-MC
HTTP:STC:ADOBE:CVE-2015-3044-ID
HTTP:STC:ADOBE:CVE-2015-0349-CE
HTTP:STC:ADOBE:CVE-2015-0358-CE
HTTP:STC:ADOBE:CVE-2015-0357-CE
HTTP:STC:ADOBE:CVE-2015-3042-CE
HTTP:STC:ADOBE:CVE-2015-3041-CE
HTTP:STC:ADOBE:CVE-2015-0347-CE
HTTP:STC:ADOBE:CVE-2015-0352-MC
HTTP:STC:ADOBE:CVE-2015-0360-MC
HTTP:STC:ADOBE:CVE-2015-3040-ID
HTTP:STC:ADOBE:CVE-2015-0346-CE
HTTP:STC:ADOBE:CVE-2015-0355-MC
HTTP:STC:ADOBE:CVE-2015-3038-MC
HTTP:STC:ADOBE:CVE-2015-0354-MC
HTTP:STC:ADOBE:CVE-2015-0359-MC
HTTP:STC:ADOBE:CVE-2014-8440-ID
HTTP:STC:ADOBE:CVE-2014-0548-PB
HTTP:STC:ADOBE:CVE-2015-3054-CE
HTTP:STC:ADOBE:CVE-2015-3059-CE
HTTP:STC:ADOBE:CVE-2015-3043-CE
HTTP:STC:ADOBE:CVE-2015-3091-CE
HTTP:STC:ADOBE:CVE-2015-3064-CE
HTTP:STC:ADOBE:CVE-2015-3051-CE
HTTP:STC:ADOBE:CVE-2015-3046-CE
HTTP:STC:ADOBE:CVE-2015-3075-CE
HTTP:STC:ADOBE:CVE-2015-3090-CE
HTTP:STC:ADOBE:CVE-2014-9160-CE
HTTP:STC:ADOBE:CVE-2015-3092-CE
HTTP:STC:ADOBE:CVE-2015-3050-CE
HTTP:STC:ADOBE:CVE-2014-9161-CE
HTTP:STC:ADOBE:CVE-2015-3047-CE
HTTP:STC:ADOBE:CVE-2015-3087-CE
HTTP:STC:ADOBE:CVE-2015-3077-CE
HTTP:STC:ADOBE:CVE-2015-3070-CE
HTTP:STC:ADOBE:CVE-2015-3062-CE
HTTP:STC:ADOBE:CVE-2015-3084-CE
HTTP:STC:ADOBE:CVE-2015-3072-CE
HTTP:STC:ADOBE:CVE-2015-3053-CE
HTTP:STC:ADOBE:CVE-2015-3052-CE
HTTP:STC:ADOBE:CVE-2015-3074-CE
HTTP:STC:ADOBE:CVE-2015-3069-CE
HTTP:STC:ADOBE:CVE-2015-3080-CE
HTTP:STC:ADOBE:CVE-2015-3076-CE
HTTP:STC:ADOBE:CVE-2015-3086-CE
HTTP:STC:ADOBE:CVE-2015-3085-VB
HTTP:STC:ADOBE:CVE-2015-3057-CE
HTTP:STC:ADOBE:CVE-2015-3093-CE
HTTP:STC:ADOBE:CVE-2015-3089-CE
HTTP:STC:ADOBE:CVE-2015-3088-BO
HTTP:STC:ADOBE:CVE-2015-3078-DS
HTTP:STC:ADOBE:CVE-2015-3056-MC
HTTP:STC:ADOBE:CVE-2015-3055-CE
HTTP:STC:ADOBE:CVE-2015-3079-SB
HTTP:STC:ADOBE:CVE-2015-3081-BP
HTTP:STC:ADOBE:CVE-2010-0195-CE
HTTP:STC:ADOBE:CVE-2010-0197-MC
HTTP:STC:ADOBE:CVE-2009-2985-MC
HTTP:STC:ADOBE:FLASH-MATRX3D-IO
HTTP:STC:ADOBE:PHOTOSHOP-TIF-OF
HTTP:STC:ADOBE:DIRECTOR-FILE-MC
HTTP:STC:ADOBE:CVE-2009-3791-MC
HTTP:STC:ADOBE:CVE-2010-2202-MC
HTTP:STC:ADOBE:GETANNOTS-RCE
HTTP:STC:ADOBE:XFIR-TSAC
HTTP:STC:ADOBE:CVE-2010-2873-CE
HTTP:STC:ADOBE:SHOCKWAVE-3D-OF
HTTP:STC:ADOBE:FLASH-PL-JPEG-OF
HTTP:STC:ADOBE:CVE-2009-3959-OF
HTTP:STC:ADOBE:SWF-DMNMEM-CP
HTTP:STC:ADOBE:SWF-JPG-OF
HTTP:STC:ADOBE:CVE-2015-4431-CE
HTTP:STC:ADOBE:CVE-2015-4429-CE
HTTP:STC:ADOBE:PDF-DRAWIMG
HTTP:STC:ADOBE:PDF-LIBTIFF
HTTP:STC:ADOBE:CVE-2015-3123-CE
HTTP:STC:ADOBE:2014-8439-RCE
HTTP:STC:ADOBE:CVE-2015-3132-UF
HTTP:STC:ADOBE:CVE-2015-3126-CE
HTTP:STC:ADOBE:FP-CASI-MC
HTTP:STC:ADOBE:CVE-2015-3130-CE
HTTP:STC:ADOBE:CVE-2015-4430-CE
HTTP:STC:ADOBE:CVE-2015-4433-CE
HTTP:STC:ADOBE:CVE-2015-3120-CE
HTTP:STC:ADOBE:CVE-2015-3122-CE
HTTP:STC:ADOBE:PHOTOSHOP-ASSET
HTTP:STC:ADOBE:CVE-2015-3134-BO
HTTP:STC:ADOBE:XFIR-PAMM-MEM
HTTP:STC:ADOBE:TOOLBUTTON-UAF
HTTP:STC:ADOBE:READER-FONT-OF
HTTP:STC:ADOBE:PDF-UTILPRINTF
HTTP:STC:ADOBE:CVE-2009-1862-CE
HTTP:STC:ADOBE:READER-WKT-BO
HTTP:STC:ADOBE:XFIR-LNAM
HTTP:STC:ADOBE:XFIR-RECORD
HTTP:STC:ADOBE:CVE-2015-3133-DS
HTTP:STC:ADOBE:PDF-JBIG2DECODE
HTTP:STC:ADOBE:SWF-NEWFUNC
HTTP:STC:ADOBE:CVE-2015-3106-CE
HTTP:STC:ADOBE:CVE-2014-0554
HTTP:STC:ADOBE:CVE-2015-5123-UF
HTTP:STC:ADOBE:FLASH-PLAYER-XSS
HTTP:STC:ADOBE:CVE-2014-0533-XS
HTTP:STC:ADOBE:DLMGR-AOM-OF
HTTP:STC:ADOBE:SWF-UNC-JUMP
HTTP:STC:ADOBE:CVE-2013-5329-CE
HTTP:STC:ADOBE:PDF-FLATEDECODE
HTTP:STC:ADOBE:CVE-2014-8447-MC
HTTP:STC:ADOBE:CVE-2015-3100-CE
HTTP:STC:ADOBE:CVE-2015-3104-CE
HTTP:STC:ADOBE:CVE-2015-3108-CE
HTTP:STC:ADOBE:WRTE-WAT-WHRE-CE
HTTP:STC:ADOBE:PDF-CIDFONT
HTTP:STC:ADOBE:TSAC-STRING
HTTP:STC:ADOBE:PDF-JS-NEWPLAYER

HTTP:STC:ATL

HTTP:STC:ATL:OWC
HTTP:STC:ATL:SHOCKWAVE
HTTP:STC:ATL:CISCO-UNITY
HTTP:STC:ATL:MSOFFICE-AX
HTTP:STC:ATL:DIRECTSHOW

HTTP:STC:BT

HTTP:STC:BT:FDM-TORRENT-BOF

HTTP:STC:CHROME

HTTP:STC:CHROME:GURL-XO-BYPASS
HTTP:STC:CHROME:POPUP-URI-SPOOF
HTTP:STC:CHROME:LOCATION-UAF
HTTP:STC:CHROME:NOTIFY-IWD-UAF
HTTP:STC:CHROME:ID-ATTR-OBJ-UAF
HTTP:STC:CHROME:MUL-FILE-TYPE
HTTP:STC:CHROME:STALE-PTR
HTTP:STC:CHROME:RESPONSE-MC
HTTP:STC:CHROME:DOM-UAF
HTTP:STC:CHROME:LIST-INSIDE-COL
HTTP:STC:CHROME:MUTATIONOBS-UAF
HTTP:STC:CHROME:VIEW-SOURCE-DOS
HTTP:STC:CHROME:URL-ELIDER.BOF
HTTP:STC:CHROME:FILE-DOWNLOAD
HTTP:STC:CHROME:IFRAME-INFO-DIS
HTTP:STC:CHROME:ARRAY-INTOVF
HTTP:STC:CHROME:V8-JS-OOB
HTTP:STC:CHROME:CLPBRD-DATA-MC
HTTP:STC:CHROME:SVG-DSTRCTR-UAF
HTTP:STC:CHROME:PEPPER-PLGN-UAF
HTTP:STC:CHROME:OBJ-BFRLOAD-UAF
HTTP:STC:CHROME:IFRAME-VIDEO-MC
HTTP:STC:CHROME:TABLE-CSS-MC
HTTP:STC:CHROME:RANGE-BLUR-MC
HTTP:STC:CHROME:SVG-ELMNT-UAF
HTTP:STC:CHROME:V8-ARRAY-OOB
HTTP:STC:CHROME:TEMPLTE-DOM-UAF
HTTP:STC:CHROME:JS-MSGBOX-DOS
HTTP:STC:CHROME:AWSNAP-DOS
HTTP:STC:CHROME:EXECCMD-UAF
HTTP:STC:CHROME:WEBKIT-OO
HTTP:STC:CHROME:BUG-REPORT-CE

HTTP:STC:CLSID:ACTIVEX

HTTP:STC:CLSID:ACTIVEX:VANTAGEX
HTTP:STC:CLSID:ACTIVEX:ACROPDF
HTTP:STC:CLSID:ACTIVEX:DLMGR
HTTP:STC:CLSID:ACTIVEX:LEN-AX
HTTP:STC:CLSID:ACTIVEX:AOL-AX
HTTP:STC:CLSID:ACTIVEX:PAVPZ
HTTP:STC:CLSID:ACTIVEX:ORADC2
HTTP:STC:CLSID:ACTIVEX:MDSAUTH
HTTP:STC:CLSID:ACTIVEX:INTUIT
HTTP:STC:CLSID:ACTIVEX:SWCTL
HTTP:STC:CLSID:ACTIVEX:NESSCAN
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ
HTTP:STC:CLSID:ACTIVEX:AX-57
HTTP:STC:CLSID:ACTIVEX:AX-55
HTTP:STC:CLSID:ACTIVEX:AX-56
HTTP:STC:CLSID:ACTIVEX:AX-49
HTTP:STC:CLSID:ACTIVEX:AX-46
HTTP:STC:CLSID:ACTIVEX:AX-47
HTTP:STC:CLSID:ACTIVEX:AX-13
HTTP:STC:CLSID:ACTIVEX:AX-12
HTTP:STC:CLSID:ACTIVEX:AX-26
HTTP:STC:CLSID:ACTIVEX:AX-22
HTTP:STC:CLSID:ACTIVEX:AX-14
HTTP:STC:CLSID:ACTIVEX:AX-28
HTTP:STC:CLSID:ACTIVEX:AX-24
HTTP:STC:CLSID:ACTIVEX:AX-25
HTTP:STC:CLSID:ACTIVEX:AX-17
HTTP:STC:CLSID:ACTIVEX:AX-18
HTTP:STC:CLSID:ACTIVEX:AX-34
HTTP:STC:CLSID:ACTIVEX:AX-16
HTTP:STC:CLSID:ACTIVEX:AX-32
HTTP:STC:CLSID:ACTIVEX:AX-33
HTTP:STC:CLSID:ACTIVEX:AX-15
HTTP:STC:CLSID:ACTIVEX:AX-35
HTTP:STC:CLSID:ACTIVEX:AX-37
HTTP:STC:CLSID:ACTIVEX:AX-21
HTTP:STC:CLSID:ACTIVEX:AX-36
HTTP:STC:CLSID:ACTIVEX:AX-51
HTTP:STC:CLSID:ACTIVEX:AX-50
HTTP:STC:CLSID:ACTIVEX:AX-54
HTTP:STC:CLSID:ACTIVEX:AX-53
HTTP:STC:CLSID:ACTIVEX:AX-48
HTTP:STC:CLSID:ACTIVEX:AX-68
HTTP:STC:CLSID:ACTIVEX:AX-66
HTTP:STC:CLSID:ACTIVEX:AX-67
HTTP:STC:CLSID:ACTIVEX:AX-65
HTTP:STC:CLSID:ACTIVEX:AX-73
HTTP:STC:CLSID:ACTIVEX:AX-74
HTTP:STC:CLSID:ACTIVEX:AX-71
HTTP:STC:CLSID:ACTIVEX:AX-62
HTTP:STC:CLSID:ACTIVEX:AX-69
HTTP:STC:CLSID:ACTIVEX:AX-70
HTTP:STC:CLSID:ACTIVEX:AX-64
HTTP:STC:CLSID:ACTIVEX:AX-72
HTTP:STC:CLSID:ACTIVEX:AX-83
HTTP:STC:CLSID:ACTIVEX:AX-94
HTTP:STC:CLSID:ACTIVEX:AX-77
HTTP:STC:CLSID:ACTIVEX:AX-20
HTTP:STC:CLSID:ACTIVEX:AX-38
HTTP:STC:CLSID:ACTIVEX:AX-42
HTTP:STC:CLSID:ACTIVEX:AX-43
HTTP:STC:CLSID:ACTIVEX:AX-60
HTTP:STC:CLSID:ACTIVEX:AX-39
HTTP:STC:CLSID:ACTIVEX:AX-11
HTTP:STC:CLSID:ACTIVEX:AX-40
HTTP:STC:CLSID:ACTIVEX:AX-85
HTTP:STC:CLSID:ACTIVEX:AX-82
HTTP:STC:CLSID:ACTIVEX:AX-84
HTTP:STC:CLSID:ACTIVEX:AX-91
HTTP:STC:CLSID:ACTIVEX:AX-92
HTTP:STC:CLSID:ACTIVEX:AX-105
HTTP:STC:CLSID:ACTIVEX:AX-142
HTTP:STC:CLSID:ACTIVEX:AX-129
HTTP:STC:CLSID:ACTIVEX:AX-131
HTTP:STC:CLSID:ACTIVEX:AX-132
HTTP:STC:CLSID:ACTIVEX:AX-135
HTTP:STC:CLSID:ACTIVEX:AX-86
HTTP:STC:CLSID:ACTIVEX:AX-89
HTTP:STC:CLSID:ACTIVEX:AX-88
HTTP:STC:CLSID:ACTIVEX:AX-90
HTTP:STC:CLSID:ACTIVEX:AX-27
HTTP:STC:CLSID:ACTIVEX:AX-109
HTTP:STC:CLSID:ACTIVEX:AX-111
HTTP:STC:CLSID:ACTIVEX:AX-116
HTTP:STC:CLSID:ACTIVEX:AX-122
HTTP:STC:CLSID:ACTIVEX:AX-121
HTTP:STC:CLSID:ACTIVEX:AX-113
HTTP:STC:CLSID:ACTIVEX:AX-124
HTTP:STC:CLSID:ACTIVEX:AX-115
HTTP:STC:CLSID:ACTIVEX:AX-107
HTTP:STC:CLSID:ACTIVEX:AX-125
HTTP:STC:CLSID:ACTIVEX:AX-114
HTTP:STC:CLSID:ACTIVEX:AX-123
HTTP:STC:CLSID:ACTIVEX:AX-134
HTTP:STC:CLSID:ACTIVEX:AX-120
HTTP:STC:CLSID:ACTIVEX:AX-130
HTTP:STC:CLSID:ACTIVEX:AX-140
HTTP:STC:CLSID:ACTIVEX:AX-133
HTTP:STC:CLSID:ACTIVEX:AX-147
HTTP:STC:CLSID:ACTIVEX:AX-138
HTTP:STC:CLSID:ACTIVEX:AX-128
HTTP:STC:CLSID:ACTIVEX:AX-141
HTTP:STC:CLSID:ACTIVEX:AX-126
HTTP:STC:CLSID:ACTIVEX:AX-81
HTTP:STC:CLSID:ACTIVEX:AX-80
HTTP:STC:CLSID:ACTIVEX:NCT-AX
HTTP:STC:CLSID:ACTIVEX:AX-06
HTTP:STC:CLSID:ACTIVEX:AX-119
HTTP:STC:CLSID:ACTIVEX:AX-01
HTTP:STC:CLSID:ACTIVEX:AX-78
HTTP:STC:CLSID:ACTIVEX:AX-58
HTTP:STC:CLSID:ACTIVEX:AX-29
HTTP:STC:CLSID:ACTIVEX:AX-30
HTTP:STC:CLSID:ACTIVEX:AX-23
HTTP:STC:CLSID:ACTIVEX:AX-145
HTTP:STC:CLSID:ACTIVEX:AX-63
HTTP:STC:CLSID:ACTIVEX:AX-149
HTTP:STC:CLSID:ACTIVEX:NAVOPTS
HTTP:STC:CLSID:ACTIVEX:HP-MODEM
HTTP:STC:CLSID:ACTIVEX:HTML-HP2
HTTP:STC:CLSID:ACTIVEX:SYM-SS
HTTP:STC:CLSID:ACTIVEX:INC-AX
HTTP:STC:CLSID:ACTIVEX:EPO-SM
HTTP:STC:CLSID:ACTIVEX:VERI-AX
HTTP:STC:CLSID:ACTIVEX:DXSDK
HTTP:STC:CLSID:ACTIVEX:SHELLAPP
HTTP:STC:CLSID:ACTIVEX:RFCGUI
HTTP:STC:CLSID:ACTIVEX:DXTLIPI
HTTP:STC:CLSID:ACTIVEX:MAGVIEW
HTTP:STC:CLSID:ACTIVEX:YVERINFO
HTTP:STC:CLSID:ACTIVEX:XMLCORE
HTTP:STC:CLSID:ACTIVEX:MOTIVE
HTTP:STC:CLSID:ACTIVEX:FPOLE
HTTP:STC:CLSID:ACTIVEX:LENOVO
HTTP:STC:CLSID:ACTIVEX:HP-AX
HTTP:STC:CLSID:ACTIVEX:AX-137
HTTP:STC:CLSID:ACTIVEX:AX-127
HTTP:STC:CLSID:ACTIVEX:AX-117
HTTP:STC:CLSID:ACTIVEX:AX-31
HTTP:STC:CLSID:ACTIVEX:SYM-FWAX
HTTP:STC:CLSID:ACTIVEX:BB-PURE
HTTP:STC:CLSID:ACTIVEX:SONICAX
HTTP:STC:CLSID:ACTIVEX:OUACTR
HTTP:STC:CLSID:ACTIVEX:HRTBEAT
HTTP:STC:CLSID:ACTIVEX:CTX-ICA
HTTP:STC:CLSID:ACTIVEX:AX-10
HTTP:STC:CLSID:ACTIVEX:AX-136
HTTP:STC:CLSID:ACTIVEX:VMWARE
HTTP:STC:CLSID:ACTIVEX:OSCAN8
HTTP:STC:CLSID:ACTIVEX:MCAFEE
HTTP:STC:CLSID:ACTIVEX:EXECHAND
HTTP:STC:CLSID:ACTIVEX:SONY-XCP
HTTP:STC:CLSID:ACTIVEX:AX-59
HTTP:STC:CLSID:ACTIVEX:SAP-AX
HTTP:STC:CLSID:ACTIVEX:AX-146
HTTP:STC:CLSID:ACTIVEX:TREND-AX
HTTP:STC:CLSID:ACTIVEX:WH32-OF
HTTP:STC:CLSID:ACTIVEX:AX-45
HTTP:STC:CLSID:ACTIVEX:AX-139
HTTP:STC:CLSID:ACTIVEX:AX-108
HTTP:STC:CLSID:ACTIVEX:VBTOVSI
HTTP:STC:CLSID:ACTIVEX:AX-118
HTTP:STC:CLSID:ACTIVEX:AX-08
HTTP:STC:CLSID:ACTIVEX:AX-07
HTTP:STC:CLSID:ACTIVEX:AX-05
HTTP:STC:CLSID:ACTIVEX:AX-76
HTTP:STC:CLSID:ACTIVEX:AX-09
HTTP:STC:CLSID:ACTIVEX:AX-151
HTTP:STC:CLSID:ACTIVEX:AX-106
HTTP:STC:CLSID:ACTIVEX:AX-44
HTTP:STC:CLSID:ACTIVEX:HTML-HLP
HTTP:STC:CLSID:ACTIVEX:AX-110
HTTP:STC:CLSID:ACTIVEX:AX-100
HTTP:STC:CLSID:ACTIVEX:AX-02
HTTP:STC:CLSID:ACTIVEX:AX-19
HTTP:STC:CLSID:ACTIVEX:AX-144
HTTP:STC:CLSID:ACTIVEX:VML-AX
HTTP:STC:CLSID:ACTIVEX:WSH
HTTP:STC:CLSID:ACTIVEX:AX-41
HTTP:STC:CLSID:ACTIVEX:CREATEOB
HTTP:STC:CLSID:ACTIVEX:JINIT-AX
HTTP:STC:CLSID:ACTIVEX:INOTES6W
HTTP:STC:CLSID:ACTIVEX:AX-112
HTTP:STC:CLSID:ACTIVEX:YAHOO-IM
HTTP:STC:CLSID:ACTIVEX:ORADC
HTTP:STC:CLSID:ACTIVEX:AX-99
HTTP:STC:CLSID:ACTIVEX:AX-143
HTTP:STC:CLSID:ACTIVEX:MACRO-AX
HTTP:STC:CLSID:ACTIVEX:AX-93
HTTP:STC:CLSID:ACTIVEX:AX-87
HTTP:STC:CLSID:ACTIVEX:AX-153
HTTP:STC:CLSID:ACTIVEX:AX-61
HTTP:STC:CLSID:ACTIVEX:AX-75
HTTP:STC:CLSID:ACTIVEX:AX-79
HTTP:STC:CLSID:ACTIVEX:AX-52
HTTP:STC:CLSID:ACTIVEX:AX-98
HTTP:STC:CLSID:ACTIVEX:AX-103
HTTP:STC:CLSID:ACTIVEX:AX-104
HTTP:STC:CLSID:ACTIVEX:AX-102
HTTP:STC:CLSID:ACTIVEX:AX-101
HTTP:STC:CLSID:ACTIVEX:AX-97

HTTP:STC:DL

HTTP:STC:DL:RADASM-MNU-BOF
HTTP:STC:DL:OFFICEART-PROP
HTTP:STC:DL:QT-UDTA-ATOM
HTTP:STC:DL:VISIO-VSD-MEMCP
HTTP:STC:DL:CVE-2015-2456-CE
HTTP:STC:DL:WORD-CLSID
HTTP:STC:DL:MAL-WRI
HTTP:STC:DL:RADASM-RAD-BOF
HTTP:STC:DL:MS-PPT-2007-MC
HTTP:STC:DL:VARICAD-DWB
HTTP:STC:DL:MPLAYER-DEMUXER
HTTP:STC:DL:VIDEOLAN-VLC-SWF-CE
HTTP:STC:DL:MAL-RUBY
HTTP:STC:DL:AVI-LIST-OF
HTTP:STC:DL:XNVIEW-PCT-FILE-BOF
HTTP:STC:DL:MICROCHIP-MPLAB-BOF
HTTP:STC:DL:VIDEOLAN-VLC-BOF
HTTP:STC:DL:OTF-2015-2462-CE
HTTP:STC:DL:CVE-2015-2455-CE
HTTP:STC:DL:CYBERLINK-MUL-BO
HTTP:STC:DL:XLS-DATA-INIT
HTTP:STC:DL:CVE-2015-2463-RCE
HTTP:STC:DL:MAL-PLS
HTTP:STC:DL:CVE-2015-2459-CE
HTTP:STC:DL:CVE-2015-2429-CE
HTTP:STC:DL:CVE-2015-2432-RCE
HTTP:STC:DL:HELP-IMG-HEAP
HTTP:STC:DL:MPG123-HEAP-OF
HTTP:STC:DL:CVE-2015-2464-RCE
HTTP:STC:DL:NOVELL-SAV-DOS
HTTP:STC:DL:QUICKTIME-MOV-BOF
HTTP:STC:DL:WORD-STYLE-EXEC
HTTP:STC:DL:CVE-2015-2458-CE
HTTP:STC:DL:QT-FLIPFILETYPE
HTTP:STC:DL:WIN-MAL-COMP-FILE
HTTP:STC:DL:CVE-2015-2431-CE
HTTP:STC:DL:CVE-2015-2461-CE
HTTP:STC:DL:BREAKPOINT-HEX-BOF
HTTP:STC:DL:OSX-GIF-BANDPROC
HTTP:STC:DL:CVE-2015-2477-CE
HTTP:STC:DL:WORD-ARRAY-DATA
HTTP:STC:DL:ACCUSOFT-IMGEAR-BO
HTTP:STC:DL:FF-SAME-ORIG-SB
HTTP:STC:DL:MS-GDI-WMF-OF
HTTP:STC:DL:WPS-HEAP-OF
HTTP:STC:DL:ZIP-FILE
HTTP:STC:DL:PDF-FILE
HTTP:STC:DL:BZIP2-FILE
HTTP:STC:DL:WINRAR-FILE
HTTP:STC:DL:OTF-DOS
HTTP:STC:DL:WORD-RTF-MEM
HTTP:STC:DL:AOL-DESKTOP-RTX-BOF
HTTP:STC:DL:CYTEL-LGXACT-CYL-BO
HTTP:STC:DL:CYTEL-CRSOVR-CYB-BO
HTTP:STC:DL:AVAST-LHA
HTTP:STC:DL:FOXIT-PDF-OF
HTTP:STC:DL:MAL-MOVIEMAKER
HTTP:STC:DL:WORD-FONT
HTTP:STC:DL:MAL-MDB
HTTP:STC:DL:QT-JVTCOMPENCODE
HTTP:STC:DL:WORD-CMAJ
HTTP:STC:DL:VIDEOLAN-VLC-PNG-CE
HTTP:STC:DL:REAL-SWF-BOF
HTTP:STC:DL:WORD-RTF-RCE
HTTP:STC:DL:4XM-VULNS
HTTP:STC:DL:WPD-BO
HTTP:STC:DL:INFORMIX-NFX
HTTP:STC:DL:RTF-LISTID-UAF
HTTP:STC:DL:XLS-FILE-HNDL
HTTP:STC:DL:ACDSEE-FS-ID-PLP-BO
HTTP:STC:DL:WORD-MAL-INDEX
HTTP:STC:DL:GOGLE-STGEFRIGHT-CE
HTTP:STC:DL:PANDA-ZOO-BO
HTTP:STC:DL:OTF-FONT-INT
HTTP:STC:DL:QT-FPX-IO
HTTP:STC:DL:ACE-BO
HTTP:STC:DL:AVISOFT-DTV-PLF-BO
HTTP:STC:DL:WORD-MEM-CORR
HTTP:STC:DL:VIDEOLAN-WAV-IO
HTTP:STC:DL:XLS-CHART-OBJ
HTTP:STC:DL:APPLE-PLS-FILE-BOF
HTTP:STC:DL:PPT-FF-BOF
HTTP:STC:DL:XBM-BO
HTTP:STC:DL:WORD-BOOKMARK-OF
HTTP:STC:DL:WORD-STYLESHEET-MEM
HTTP:STC:DL:WP5-FILE
HTTP:STC:DL:OPENSSL-CMS-FILE
HTTP:STC:DL:OFFICE-CGM
HTTP:STC:DL:XLS-COLUMN-RECORD
HTTP:STC:DL:MAL-XRL
HTTP:STC:DL:MS-WIN-VERIFY-TRUST
HTTP:STC:DL:XLS-HFPICTURE-REC
HTTP:STC:DL:XLS-WORKSPACE-DES
HTTP:STC:DL:MSHTML-DBLFREE
HTTP:STC:DL:VLC-CUE-OF
HTTP:STC:DL:OTF-NULL-PTR
HTTP:STC:DL:MS-OFFICE-DOC-MC
HTTP:STC:DL:MS-OFFICE-STRING
HTTP:STC:DL:CCMPLAYER-M3U-OF
HTTP:STC:DL:VISIO-DXF-RCE
HTTP:STC:DL:WORD-LINK-OBJ
HTTP:STC:DL:VLC-XSPF-MC
HTTP:STC:DL:XL-CVE-2013-1315
HTTP:STC:DL:SWF-ACTIONPUSH
HTTP:STC:DL:PAC-DESIGNER-BO
HTTP:STC:DL:XLS-DRAWING-REC
HTTP:STC:DL:XLS-MSOFBTOPT
HTTP:STC:DL:MULTIMEDIA-JUKEBOX
HTTP:STC:DL:CVE-2014-6361-RCE
HTTP:STC:DL:SWF-ACTIONCONSTPOOL
HTTP:STC:DL:VLC-MEDIA-PLY-BO
HTTP:STC:DL:MSPUBLISHER-OBJ
HTTP:STC:DL:MAL-WAV-FILE
HTTP:STC:DL:PDF-PRINTSEPS
HTTP:STC:DL:OFF-GDI-RCD-TYPE
HTTP:STC:DL:XLS-SERIES
HTTP:STC:DL:APPLE-ITUNES-IO
HTTP:STC:DL:XLS-SERIES-TYPE-RCE
HTTP:STC:DL:MS-READER-MC
HTTP:STC:DL:RAINBOWPLY-BOF
HTTP:STC:DL:MS-OFFICE-XL-MC
HTTP:STC:DL:APPLE-QT-JPEG-OF
HTTP:STC:DL:SAWSTUDIO-PRF-BOF
HTTP:STC:DL:GNU-TAR-PAX-BOF
HTTP:STC:DL:APPLE-QT-VR-TRCK-OF
HTTP:STC:DL:QT-PV-GIF
HTTP:STC:DL:LIBAV-LZO-IO
HTTP:STC:DL:MS-THEME-RCE
HTTP:STC:DL:WMF-IO
HTTP:STC:DL:AVI-MMAKER
HTTP:STC:DL:XLS-HEAP-OF
HTTP:STC:DL:PPT-FB1-ATOM-OF
HTTP:STC:DL:XLS-WRITEAV
HTTP:STC:DL:RTF-MISMATCH
HTTP:STC:DL:VLC-MEDIAPLAYER-RCE
HTTP:STC:DL:OO-EMF
HTTP:STC:DL:XLS-SCENARIO
HTTP:STC:DL:ASF-DF
HTTP:STC:DL:NOKIA-PLAYER-BOF
HTTP:STC:DL:JAVA-FILEDIALOG-BOF
HTTP:STC:DL:WORD-BOF
HTTP:STC:DL:OPENOFFICE-TIFF-OF
HTTP:STC:DL:MS-OFFICE-EXCEL-RCE
HTTP:STC:DL:XLS-OBJ-BIFF
HTTP:STC:DL:WMP-DVR-MS
HTTP:STC:DL:TRUETYPE-PARSE2
HTTP:STC:DL:APPLE-QT-H264-OF
HTTP:STC:DL:XLS-CF-BIFF
HTTP:STC:DL:XLS-XF-BIFF
HTTP:STC:DL:PPT-OFFICEART
HTTP:STC:DL:OTF-BO
HTTP:STC:DL:CYBERLINK-LIST-OF
HTTP:STC:DL:VISIO-UMLSTRING
HTTP:STC:DL:SHOCKWAVE-3D-RCE
HTTP:STC:DL:OTF-INF-LOOP
HTTP:STC:DL:XLS-MS-OGRAPH
HTTP:STC:DL:LOTUS-DOC-VIEWER
HTTP:STC:DL:DIRECTSHOW-QUICK-MC
HTTP:STC:DL:OTF-GLYPH
HTTP:STC:DL:FOXIT-PDF-FILE-DOS
HTTP:STC:DL:MAL-RMF-GM
HTTP:STC:DL:PPT-2000-BOF
HTTP:STC:DL:ACDSEE-XPM-COLOR
HTTP:STC:DL:XLS-MERGECELLS-OF
HTTP:STC:DL:VISIO-FREED
HTTP:STC:DL:MPLAYER-CALLOC
HTTP:STC:DL:COM-CLSID-DLL
HTTP:STC:DL:OFFICE-MSO
HTTP:STC:DL:XLS-XISPARENT
HTTP:STC:DL:MS-EXCEL-OBJ-MC
HTTP:STC:DL:ALADDIN-ETOKEN-RCE
HTTP:STC:DL:NUANCE-LAUNCH
HTTP:STC:DL:VISIO-INVALID-ROW
HTTP:STC:DL:PPT-NOTES-MC
HTTP:STC:DL:ORACLE-LOTUS-123
HTTP:STC:DL:FOXIT-READER-ESCAPE
HTTP:STC:DL:PDFXCHANGE-AX
HTTP:STC:DL:FAT-MEDIAPLAYER-RCE
HTTP:STC:DL:PPT-LEGACY-FMT-OF
HTTP:STC:DL:XLS-PIC-REC-MC
HTTP:STC:DL:MP3-WM-MEM
HTTP:STC:DL:MS-VISIO-DXF-BO
HTTP:STC:DL:MINI-STREAM-PLS-OF
HTTP:STC:DL:XLS-INT-OR
HTTP:STC:DL:PEAZIP-CINJ
HTTP:STC:DL:MIDICONTROLEVENT
HTTP:STC:DL:GALAN-BO
HTTP:STC:DL:XLS-MAL-REC-MC
HTTP:STC:DL:MS-MEDIA-DVR
HTTP:STC:DL:WEBEX-ATDL-OF
HTTP:STC:DL:MS-WORD-XST-BOF
HTTP:STC:DL:WINAMP-MAL-PLS
HTTP:STC:DL:MS-WORD-MEM-CORR
HTTP:STC:DL:FOXIT-CREATEOBJ
HTTP:STC:DL:MS-PUBLISHER-RCE
HTTP:STC:DL:QT-STSC-ATOM-MC
HTTP:STC:DL:SOPHOS-ZIPDOS
HTTP:STC:DL:XLS-FIELD-MC
HTTP:STC:DL:XLS-BIN-OF
HTTP:STC:DL:AOL-RTX
HTTP:STC:DL:QP-S3M-OF
HTTP:STC:DL:PPT-SLIDEATOM
HTTP:STC:DL:PPT-PP7-MC
HTTP:STC:DL:VLC-MP4-BOF
HTTP:STC:DL:ACDSEE-XBM-WIDTH
HTTP:STC:DL:CVE-2014-6357-RCE
HTTP:STC:DL:EPS-DSC-BOF
HTTP:STC:DL:MS-HELP-CNT-BO
HTTP:STC:DL:LIBFLAC-PIC-TYPE
HTTP:STC:DL:DIRECTX-SAMI
HTTP:STC:DL:XLS-DBORPARAMQRY
HTTP:STC:DL:WPD-WP3-TABLE-BO
HTTP:STC:DL:XLS-HFPICT
HTTP:STC:DL:XLS-LINKED-LIST
HTTP:STC:DL:XLS-INDEX
HTTP:STC:DL:WORD-TEXTBOX
HTTP:STC:DL:WORD-MAL-DOC
HTTP:STC:DL:WORKS-WPS-OF
HTTP:STC:DL:SEARCHMS-EXEC
HTTP:STC:DL:MPEG4-3IVX-FILE
HTTP:STC:DL:SYM-AV-RAR-BO
HTTP:STC:DL:WORD-SPRMDEFTABLE
HTTP:STC:DL:QTPICT-REC-BO
HTTP:STC:DL:MAL-WMV-MEDIA
HTTP:STC:DL:MS-NET-CLILOADER-MC
HTTP:STC:DL:MS-WMF-DOS
HTTP:STC:DL:PROSHOW-PSH-FILE-OF
HTTP:STC:DL:PPT-VIEWER-MEMALLOC
HTTP:STC:DL:MPLAYER-SAMI
HTTP:STC:DL:MS-OFFICE-RCE
HTTP:STC:DL:OFFICEART-RCE
HTTP:STC:DL:EMF-OF
HTTP:STC:DL:APPLE-DMG-VOLNAME
HTTP:STC:DL:FFMPEG-READ-OF
HTTP:STC:DL:ACDSEE-XPM-VALUES
HTTP:STC:DL:JVM-READMABCURVE
HTTP:STC:DL:APPLE-PICT
HTTP:STC:DL:OLE-ART-INV
HTTP:STC:DL:COOLPLAYER-PLAYLIST
HTTP:STC:DL:GNOME-RC4-BO
HTTP:STC:DL:LIBSNDFILE-PAF-OF
HTTP:STC:DL:CLAMAV-PE-INT
HTTP:STC:DL:JRE-APPLET2CLASS-LD
HTTP:STC:DL:XLS-FEATHEADER
HTTP:STC:DL:WORDPAD-PRL
HTTP:STC:DL:XLS-FILTER-REC
HTTP:STC:DL:XLS-SET-FONT
HTTP:STC:DL:XLS-IMDATA
HTTP:STC:DL:OTF-FONT-SIZE
HTTP:STC:DL:CVE-2015-0054-PRIV
HTTP:STC:DL:XLS-SELECTION
HTTP:STC:DL:ALTOVA-DATABASE-BOF
HTTP:STC:DL:XLS-BOUNDSHEET
HTTP:STC:DL:QT-EMBED-JS
HTTP:STC:DL:MS-WIN-HLP-MC
HTTP:STC:DL:PPT-OFFART-ATOM-RCE
HTTP:STC:DL:XLS-OBJECTLINK
HTTP:STC:DL:XLS-BIFF-MC
HTTP:STC:DL:XLS-FORMULA-BIFF
HTTP:STC:DL:PUB-INDEXLIMITS
HTTP:STC:DL:VISIO-OBJ-TAG
HTTP:STC:DL:XLS-MAL-OBJ
HTTP:STC:DL:ASTONSOFT-DBR-BO
HTTP:STC:DL:VLC-M3U-FTP
HTTP:STC:DL:ULTRAISO-CUE
HTTP:STC:DL:XLS-WINDOW2
HTTP:STC:DL:MAL-WEBEX-WRF
HTTP:STC:DL:PPT-MS-OGRAPH
HTTP:STC:DL:A-PDF-RCE
HTTP:STC:DL:ESIGNAL-MUL-FILE-OF
HTTP:STC:DL:SWF-OPENER-BOF
HTTP:STC:DL:GENSTAT-GWB-OF
HTTP:STC:DL:PPT-TXMASTERSTYLE
HTTP:STC:DL:VISIO-MAL-DXF
HTTP:STC:DL:AVI-DL-MEM
HTTP:STC:DL:MS-PUB-MC
HTTP:STC:DL:FEEDDEMON-OPML-BOF
HTTP:STC:DL:MS-FON-FILE-RCE
HTTP:STC:DL:QT-SMIL-FILEHAND
HTTP:STC:DL:PPT-SOUND-OBJ-OF
HTTP:STC:DL:REAL-3G2-WRITEAV-MC
HTTP:STC:DL:WORD-SMARTTAG
HTTP:STC:DL:NETOP-DWS-BOF
HTTP:STC:DL:GD-GRAPHICS-DOS
HTTP:STC:DL:POWER-AUDIO-DOS
HTTP:STC:DL:CRYSTAL-PLYLIST-BOF
HTTP:STC:DL:WORDTRAINER-ORD
HTTP:STC:DL:VLC-MEDIA-PLY-APE
HTTP:STC:DL:SUBEDIT-SUBTITLE-BO
HTTP:STC:DL:MOVIEPLAY-LST-BOF
HTTP:STC:DL:RAW-ZLIB-PERL
HTTP:STC:DL:METASTOCK-RCE
HTTP:STC:DL:IRAI-AUTOMGEN-RCE
HTTP:STC:DL:CYTEL-STXACT-CY3-BO
HTTP:STC:DL:MACRO-EXPRO-MXE-OF
HTTP:STC:DL:MS-OFFICE-WORD-BO
HTTP:STC:DL:NOKIA-PLAYER-DOS
HTTP:STC:DL:OPENOFFICE-CSV-DOS
HTTP:STC:DL:LCPLAYER-BOF
HTTP:STC:DL:KINGSOFT-IS-DOS
HTTP:STC:DL:EXESCOPE-FILE-BO
HTTP:STC:DL:CVE-2014-6364-RCE
HTTP:STC:DL:ISPVM-SYS-XCF-BOF
HTTP:STC:DL:XLS-DATA-RECORD
HTTP:STC:DL:PCSOFT-WDP-FILE-OF
HTTP:STC:DL:MS-OPEN-FONT-FILE
HTTP:STC:DL:LOTUS-URL-RCE
HTTP:STC:DL:REAL-3GP-FILE-MC
HTTP:STC:DL:VISUAL-INTERDEV
HTTP:STC:DL:NIEW-EWB-BOF
HTTP:STC:DL:MS-PAINT-BMP-MC
HTTP:STC:DL:GHOSTSCRIPT-PS-BOF
HTTP:STC:DL:QT-TOQTPOINTER
HTTP:STC:DL:SODA-PDF-DOS
HTTP:STC:DL:ESET-SMART-SECURITY
HTTP:STC:DL:TOTAL-TVP-BO
HTTP:STC:DL:CLAMAV-UPX-BO
HTTP:STC:DL:MS-OFFICE-EXCEL-MC
HTTP:STC:DL:IRFANVIEW-RLE-DC-BO
HTTP:STC:DL:GENSTAT-GSH-OF
HTTP:STC:DL:SNACKAMP-SMP-BOF
HTTP:STC:DL:ORBITAL-VIEWER-ORB
HTTP:STC:DL:APPLE-CORE-IMAGE-BO
HTTP:STC:DL:OO-OLE
HTTP:STC:DL:ULTRAISO-CCD-IMG
HTTP:STC:DL:MS-XL-2003-NULL-DOS
HTTP:STC:DL:VLC-PLY-RT-BOF
HTTP:STC:DL:CVE-2013-3893-DROP
HTTP:STC:DL:MS-DOC-STREAM-CE
HTTP:STC:DL:IRFANVIEW-ICO-DOS
HTTP:STC:DL:VKPLY-MID-FILE-BOF
HTTP:STC:DL:COREL-PAINT-PNG
HTTP:STC:DL:WINSOFTMAGIC-PNG
HTTP:STC:DL:IRFANVIEW-IFF-BOF
HTTP:STC:DL:XILISOFT-VIDEO-BOF
HTTP:STC:DL:ORB-MP3-DOS
HTTP:STC:DL:WORD-SPLASH-LIST-BO
HTTP:STC:DL:VLC-XSPF-MEM
HTTP:STC:DL:SONIQUE-XPL-BOF
HTTP:STC:DL:MAL-PLF
HTTP:STC:DL:CAIN-ABEL-RCE
HTTP:STC:DL:OPENOFFICE-DOC
HTTP:STC:DL:LIBPNG-TRAN-CHLT-BO
HTTP:STC:DL:REALPLAYER-SWF-BO
HTTP:STC:DL:NUMARK-M3U-BO
HTTP:STC:DL:WORD-RTF-CONTROL
HTTP:STC:DL:INTELLITAMPER-CAT
HTTP:STC:DL:HEX-WORKSHP-CMAP-CE
HTTP:STC:DL:WINASM-STUDIO-BOF
HTTP:STC:DL:MEDIA-FILE-BOF
HTTP:STC:DL:MS-WORD-BULLET
HTTP:STC:DL:MS-WMP-WAV-DOS
HTTP:STC:DL:EDD-FILE-BOF
HTTP:STC:DL:EWP-FILE-BOF
HTTP:STC:DL:TURNTABLES
HTTP:STC:DL:VLC-TTA-OF
HTTP:STC:DL:XLS-FORMAT-ARRAY
HTTP:STC:DL:LIBTIFF-BOF
HTTP:STC:DL:SRT-FILE-OF
HTTP:STC:DL:WINPLOT-PLOT2D-BO
HTTP:STC:DL:WINMOUNT-ZIP
HTTP:STC:DL:MS-WORD-WORDART
HTTP:STC:DL:EXCEL-UAF-RCE
HTTP:STC:DL:PROJECT-FILE-RCE
HTTP:STC:DL:FF-LOOP-DOS
HTTP:STC:DL:MS-PNG-IMG-CE
HTTP:STC:DL:APPLE-QT-JP2-DOS
HTTP:STC:DL:MP4-FILE-RCE
HTTP:STC:DL:INTELLITAMPER-CFG
HTTP:STC:DL:MS-VB-VB6STKIT
HTTP:STC:DL:MS-PUBLISHER-MC
HTTP:STC:DL:APPLE-QT-OBJI
HTTP:STC:DL:MS-PICTURE-MGR-AV
HTTP:STC:DL:PPT-SHAPES-MEM
HTTP:STC:DL:WORD-DOC-BOF
HTTP:STC:DL:IRFANVIEW-MC
HTTP:STC:DL:SVG-FILE-DOS
HTTP:STC:DL:REALPLY-MP3-DOS
HTTP:STC:DL:XLS-SLK-PICTURE-RCE
HTTP:STC:DL:MIDI-PLY-MAMX-BOF
HTTP:STC:DL:XPAT-MAL-XML
HTTP:STC:DL:MS-POWRPONT-PPT-RCE
HTTP:STC:DL:WORD-STRING
HTTP:STC:DL:EOT-IO
HTTP:STC:DL:AIFF-FILE-DOS
HTTP:STC:DL:QT-PDAT
HTTP:STC:DL:WORD-STSH-RCE
HTTP:STC:DL:GIMP-XWD-BO
HTTP:STC:DL:IRFANVIEW-TIF-DC-BO
HTTP:STC:DL:REALPLY-URL-BOF
HTTP:STC:DL:MS-OFFICE-STR-RCE
HTTP:STC:DL:ORACLE-JPEG-QCD-OF
HTTP:STC:DL:WORD-FILE-MEM
HTTP:STC:DL:MAL-OGG-FILE
HTTP:STC:DL:XLS-SHEET-OBJ
HTTP:STC:DL:ZIP-FOR-MEDIA
HTTP:STC:DL:SOPHOS-CAB-FILE-OF
HTTP:STC:DL:SOPHOS-PDF-FILE-OF
HTTP:STC:DL:MS-WORKS9-RTF
HTTP:STC:DL:IRFANVIEW-IMXCF-OF
HTTP:STC:DL:DIRECTPLAY-HEAP-OF
HTTP:STC:DL:XENORATE-XPL-BOF
HTTP:STC:DL:SOPHOS-RAR-VMSF-RGB
HTTP:STC:DL:VLC-SWF-RCE
HTTP:STC:DL:XLS-SXVIEW-REC
HTTP:STC:DL:XLS-PIVOT
HTTP:STC:DL:VLC-MEDIA-PLY-ASS
HTTP:STC:DL:MS-OFFICE-2010-RCE
HTTP:STC:DL:OFFICE-PICT-MC
HTTP:STC:DL:CVE-2015-0003-PRIV
HTTP:STC:DL:ONENOTE-INFO-DISC
HTTP:STC:DL:APPLE-QT-QTIF-DOS
HTTP:STC:DL:SOPHOS-RAR-FILTER
HTTP:STC:DL:APPLE-QT-RNET-OF
HTTP:STC:DL:MS-WMF-ESCSET-CE
HTTP:STC:DL:VBA-MEM-CORRUPT
HTTP:STC:DL:MS-WIN-MOVIE-MKR-MC
HTTP:STC:DL:MS-MEDIA-DECOMP
HTTP:STC:DL:PPT-TEXTBYTESATM-BO
HTTP:STC:DL:VISIWAVE-SITE-BOF
HTTP:STC:DL:MINI-STREAM-ASX-BOF
HTTP:STC:DL:MS-PUB-RCE
HTTP:STC:DL:FREETYPE-TYPE1
HTTP:STC:DL:OPEN-TYPE-RCE
HTTP:STC:DL:WIN-EXE-DOWNLOAD
HTTP:STC:DL:COOLPDF-READER-BO
HTTP:STC:DL:MS-OFFICE-BAD-INDEX
HTTP:STC:DL:MS-GDI32-POLYLINE
HTTP:STC:DL:KINGVIEW-LOGFILE-BO
HTTP:STC:DL:VISIO-TYPE-CONF
HTTP:STC:DL:CVE-2014-6333-MC
HTTP:STC:DL:QUO-ESIGNAL-BOF
HTTP:STC:DL:OO-WORD-TABLE
HTTP:STC:DL:CVE-2014-6335-RCE
HTTP:STC:DL:APPLE-QT-JPEG-2000
HTTP:STC:DL:WEBEX-ATDL-BOF
HTTP:STC:DL:APPLE-QT-MOV-DOS
HTTP:STC:DL:CSOUND-GETNUM-BOF
HTTP:STC:DL:VLC-FORMAT-STRING
HTTP:STC:DL:WORD-PPAX
HTTP:STC:DL:XORG-PCF-BO
HTTP:STC:DL:CLAMAV-PE-BO
HTTP:STC:DL:URSOFT-W32DASM-BOF
HTTP:STC:DL:MS-WMF-PARSE
HTTP:STC:DL:MS-TTF-PARSING
HTTP:STC:DL:MS-PP-PRESENT-RCE
HTTP:STC:DL:EICAR
HTTP:STC:DL:OFF-GDI-HOF
HTTP:STC:DL:CVE-2015-0063-RCE
HTTP:STC:DL:LIBXML2-ENTRY-NAME
HTTP:STC:DL:WMF-HEAPOF
HTTP:STC:DL:WORDPAD-FONT-CONV
HTTP:STC:DL:XLS-VERSIONINFO
HTTP:STC:DL:MSDOTNET-FUNC-PTR
HTTP:STC:DL:WORD-WEBAPPS-RCE
HTTP:STC:DL:CVE-2015-2387-CE
HTTP:STC:DL:FONT-HANDLING-CE
HTTP:STC:DL:WEBEX-ATAS
HTTP:STC:DL:MAL-WIN-BRIEFCASE-1
HTTP:STC:DL:CISCO-WEBEX-ATDL
HTTP:STC:DL:APPLE-QT-MJPEG-OF
HTTP:STC:DL:APPLE-QT-TARGA-BO
HTTP:STC:DL:CISCO-FORMAT-PLY-MC
HTTP:STC:DL:MS-CVE-2014-6356-CE
HTTP:STC:DL:PPT-SCRIPT
HTTP:STC:DL:XLS-WOPT
HTTP:STC:DL:GIMP-XWD-HEAP-BO
HTTP:STC:DL:GOOGLE-PICASA-OVF
HTTP:STC:DL:MS-OBJ-PACKAGER-RCE
HTTP:STC:DL:MS-FONTMATRIX
HTTP:STC:DL:EMF-EMR-INT
HTTP:STC:DL:VS-XML-INFO
HTTP:STC:DL:VISIO-VSD-MEM
HTTP:STC:DL:CAB-VULNS
HTTP:STC:DL:XLS-2015-2375-ID
HTTP:STC:DL:APPLE-ITUNES-BOF
HTTP:STC:DL:DS-ATOM-TABLE
HTTP:STC:DL:FAX-EDITOR-RCE
HTTP:STC:DL:MAL-HLP-CHM
HTTP:STC:DL:QT-CRGN-ATOM
HTTP:STC:DL:GSTREAMER-QT-OF
HTTP:STC:DL:MS-OFFICE-PICT-MC
HTTP:STC:DL:MS-ACCESS-MEM-CORR
HTTP:STC:DL:WIRELURKER-DOWNLOAD
HTTP:STC:DL:CVE-2015-2367-SB
HTTP:STC:DL:MS-GDI-INT-OVF
HTTP:STC:DL:DOC-2015-2379-CE
HTTP:STC:DL:MS-MPEG-LAYER-3-DOS
HTTP:STC:DL:MS-GDI-EMF
HTTP:STC:DL:MS-PAINT-DOS
HTTP:STC:DL:CVE-2015-2378-CE
HTTP:STC:DL:CVE-2015-2376-CE
HTTP:STC:DL:KINGSOFT-FONT-BO
HTTP:STC:DL:MS-EXCEL-TXOOBJ-MC
HTTP:STC:DL:XLS-FNGROUPNAME
HTTP:STC:DL:DOC-2015-2380-CE
HTTP:STC:DL:XLS-MAL-RTD-REC
HTTP:STC:DL:CVE-2015-2370-PRIV
HTTP:STC:DL:CVE-2015-2415-RCE
HTTP:STC:DL:MS-EMF-PARSE
HTTP:STC:DL:CVE-2015-2366-PE
HTTP:STC:DL:ACCESS-MEM-CORR
HTTP:STC:DL:SUSPICIOUS-FILE
HTTP:STC:DL:XLS-BUFF-OR
HTTP:STC:DL:WORD-SPRMTDIAGLINE
HTTP:STC:DL:WORD-GLOBAL-INDEX
HTTP:STC:DL:WIN-GDI-METAFILE
HTTP:STC:DL:XLS-STYLE-RECORD
HTTP:STC:DL:XLS-AXISPARENT
HTTP:STC:DL:MAL-WIN-BRIEFCASE-2
HTTP:STC:DL:MAL-VBP
HTTP:STC:DL:MEDIA-FILE-DOS
HTTP:STC:DL:DLL-PLANTING-CE
HTTP:STC:DL:MS-GDI-ICO
HTTP:STC:DL:WORD-REC-LEN-OF
HTTP:STC:DL:WORDPAD-BO
HTTP:STC:DL:MS-WORKS-BO
HTTP:STC:DL:MSSQL-BACKUP-MEM
HTTP:STC:DL:CVE-2015-2377-UAF
HTTP:STC:DL:MS-FOREFRONT-CUP
HTTP:STC:DL:MS-VISUAL-CPP-RC-BO
HTTP:STC:DL:MSHTML-HELP
HTTP:STC:DL:PUB-TEXTBOX
HTTP:STC:DL:MS-XL-ROW-REC-BO
HTTP:STC:DL:MSPROJECT-MEM
HTTP:STC:DL:MS-RICHEDIT-RCE
HTTP:STC:DL:EXCEL-SST
HTTP:STC:DL:OFFICE-PCT
HTTP:STC:DL:EXCEL-REC-TYPE
HTTP:STC:DL:MSCOMCTL-ACTIVEX
HTTP:STC:DL:MS-VISIO-OBJ-MC
HTTP:STC:DL:VCF-SHELLEXECUTE
HTTP:STC:DL:DBP-FILE-BOF
HTTP:STC:DL:EXCEL-SERIES
HTTP:STC:DL:EXCEL-FEAT11
HTTP:STC:DL:DOT-NET-INFO-DISC
HTTP:STC:DL:WORD-IND
HTTP:STC:DL:VISIO-INV-VERSION
HTTP:STC:DL:CVE-2015-2365-PRIV
HTTP:STC:DL:PUB-PLC
HTTP:STC:DL:PPT-UNK-ANI
HTTP:STC:DL:VISIO-OBJ-HEADER
HTTP:STC:DL:VISIO-BOF
HTTP:STC:DL:WINVERIFY-TRUST
HTTP:STC:DL:VISIO-COMPRESSION
HTTP:STC:DL:WORD-DPENDGROUP
HTTP:STC:DL:TRUETYPE-PARSE
HTTP:STC:DL:XLW-MEM-CORR
HTTP:STC:DL:XLS-PALETTE
HTTP:STC:DL:XLS-OBJ-RECORD
HTTP:STC:DL:WORD-SMART-TAGS
HTTP:STC:DL:XLS-NAMED-GRAPH
HTTP:STC:DL:XLS-OFFICE-DRAWING
HTTP:STC:DL:PAGEMAKER-OF
HTTP:STC:DL:MAL-FILE-BOF
HTTP:STC:DL:WORD-LISTOVERRIDE
HTTP:STC:DL:MS-VISUAL-BASIC-BOF
HTTP:STC:DL:CVE-2015-0064-RCE
HTTP:STC:DL:WORD-SECTION-OF
HTTP:STC:DL:WIN-MEDIA-PLY-MC
HTTP:STC:DL:RTF-FPARSE-RCE
HTTP:STC:DL:MS-DIRECTSHOW-RCE
HTTP:STC:DL:MS-WORDPAD-DOS
HTTP:STC:DL:OFFICE-BO-RCE
HTTP:STC:DL:CVE-2014-1776-SHELL
HTTP:STC:DL:PPT-PRINTER-REC-OF
HTTP:STC:DL:CVE-2014-6360-RCE
HTTP:STC:DL:MSEXCEL-VBMACRO-RCE
HTTP:STC:DL:XLS-INV-DRAW
HTTP:STC:DL:OFFICE-MAL-PUB
HTTP:STC:DL:APPLE-QT-FTAB-ATOM
HTTP:STC:DL:XLS-SXSTREAMID
HTTP:STC:DL:CVE-2015-2426-BOF
HTTP:STC:DL:CVE-2015-2469-CE
HTTP:STC:DL:CVE-2015-0065-RCE
HTTP:STC:DL:MAL-PNG-FILE
HTTP:STC:DL:CVE-2015-0080-ID
HTTP:STC:DL:CVE-2015-0086-RCE
HTTP:STC:DL:MS-CVE-2015-0096-CE
HTTP:STC:DL:MULTIPLE-MAL-FILE
HTTP:STC:DL:MAL-AVI-FILE
HTTP:STC:DL:MAL-VISIO
HTTP:STC:DL:CVE-2015-0085-RCE
HTTP:STC:DL:MS-CVE-2015-0097-CE
HTTP:STC:DL:MAL-MP3
HTTP:STC:DL:MAL-MPEG-4
HTTP:STC:DL:CVE-2015-1642-RCE
HTTP:STC:DL:CVE-2015-1644-PRIV
HTTP:STC:DL:CVE-2015-0332-CE
HTTP:STC:DL:OFFICE-VBA-UAF
HTTP:STC:DL:CVE-2015-0094-ID
HTTP:STC:DL:CVE-2015-0078-PRIV
HTTP:STC:DL:CVE-2015-0084-SB
HTTP:STC:DL:VISIO-OBJ-CONFUSION
HTTP:STC:DL:ASF-SR
HTTP:STC:DL:CVE-2015-1649-RCE
HTTP:STC:DL:CVE-2015-1651-RCE
HTTP:STC:DL:CVE-2015-1650-RCE
HTTP:STC:DL:OBF-PE-DL
HTTP:STC:DL:QT-TEXML-BOF
HTTP:STC:DL:CVE-2015-1676-ID
HTTP:STC:DL:WNDPROC-INFO-DISC
HTTP:STC:DL:CVE-2015-1678-ID
HTTP:STC:DL:CVE-2015-1698-RCE
HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC
HTTP:STC:DL:WJ-2015-1697-CE
HTTP:STC:DL:WJ-CVE-2015-1696-CE
HTTP:STC:DL:JS-VAR-OBFUS
HTTP:STC:DL:GIF-AND-PHPFUNC
HTTP:STC:DL:CVE-2015-1674-SB
HTTP:STC:DL:NET-CVE-2015-1672
HTTP:STC:DL:CVE-2015-1671-RCE
HTTP:STC:DL:CVE-2015-1682-RCE
HTTP:STC:DL:CVE-2015-1675-RCE
HTTP:STC:DL:CVE-2015-1681-DOS
HTTP:STC:DL:EMF-IMG-FILE-RCE
HTTP:STC:DL:RTF-PARSE-RCE
HTTP:STC:DL:MUL-FILES-WITH-PDF
HTTP:STC:DL:CVE-2015-3083-CE
HTTP:STC:DL:CVE-2015-3048-RCE
HTTP:STC:DL:WORD-DPPOLYCOUNT
HTTP:STC:DL:NODEJS-YAML-CE
HTTP:STC:DL:CVE-2011-1985-CE
HTTP:STC:DL:QEMU-FLOPPY-DISK-OF
HTTP:STC:DL:MS-EXPLORER-URL-OF
HTTP:STC:DL:BITDEFEND-SCRIPT
HTTP:STC:DL:CVE-2015-1721-PRIV
HTTP:STC:DL:VLC-LIBMOD-S3M-BO
HTTP:STC:DL:PUB-OPY
HTTP:STC:DL:APPLE-QT-H264-BOF
HTTP:STC:DL:APPLE-QT-FLIC-BO
HTTP:STC:DL:OTF-INDEX-RCE
HTTP:STC:DL:XLS-MBOF
HTTP:STC:DL:MAL-MIC-BICLRUSED
HTTP:STC:DL:XLS-SST
HTTP:STC:DL:CVE-2015-1770-CE
HTTP:STC:DL:XLS-NULL-PTR
HTTP:STC:DL:PPT-EXTTIMENODE
HTTP:STC:DL:MSOFFICE-MSODLL-MC
HTTP:STC:DL:MIXERSEQUENCER-RCE
HTTP:STC:DL:WIN-CHM-DETECTION
HTTP:STC:DL:MP4-FILE-BOF
HTTP:STC:DL:APPLE-QT-TEXML
HTTP:STC:DL:MSWMM-OF
HTTP:STC:DL:OTF-CFF-RCE
HTTP:STC:DL:QT-FLASHPIX-BOF
HTTP:STC:DL:XLS-MOD-BYTES
HTTP:STC:DL:XLS-SXLI-MC
HTTP:STC:DL:JRE-ZIP-READCEN
HTTP:STC:DL:XLS-ARR-INDEX
HTTP:STC:DL:DOCX-ACCESS-RCE
HTTP:STC:DL:XLS-FILE-IMPORT
HTTP:STC:DL:WEBEX-RECORD-ATAS
HTTP:STC:DL:CLAMAV-UPX-FILE-MC
HTTP:STC:DL:DOT-NET-WEB-PROXY
HTTP:STC:DL:PPT-OEP-ATOM-INV
HTTP:STC:DL:VLC-TY-BO
HTTP:STC:DL:XLS-LBL-RECORD
HTTP:STC:DL:CVE-2015-2470-BO
HTTP:STC:DL:MAL-MEDIA-RCE
HTTP:STC:DL:PPTVIEWER-DRAWSHAPE
HTTP:STC:DL:MAL-AIFF
HTTP:STC:DL:CLAMAV-CHM-DOS
HTTP:STC:DL:APPLE-QT-IMAGE-MC
HTTP:STC:DL:MFC-DOC-TITLE
HTTP:STC:DL:XLS-MDSXET-REC
HTTP:STC:DL:XLS-SHRFMLA
HTTP:STC:DL:XLS-MDXTUPLE-BIFF
HTTP:STC:DL:ARJ-BO
HTTP:STC:DL:CLAMAV-INT
HTTP:STC:DL:QT-COLOR-TABLE
HTTP:STC:DL:CRYSTAL-RPT-OLE
HTTP:STC:DL:SOPHOS-MAL-VISIO
HTTP:STC:DL:XLS-PUB-REC
HTTP:STC:DL:VISIO-VSD-ICON
HTTP:STC:DL:QT-PV-OF
HTTP:STC:DL:MS-WIN-DOTNET-RCE
HTTP:STC:DL:WORD-CONV-INT-OF
HTTP:STC:DL:VML-GRADIENT
HTTP:STC:DL:QT-PICT-FILE-MC
HTTP:STC:DL:OUTLOOK-CE
HTTP:STC:DL:XLS-FRTWRAPPER
HTTP:STC:DL:XLS-XML-ZIP
HTTP:STC:DL:MPP-MEM-VAL
HTTP:STC:DL:LIBFLAC-PIC-DESC
HTTP:STC:DL:CVE-2015-1759-RCE
HTTP:STC:DL:LIBFLAC-VORBIS-CMT
HTTP:STC:DL:DOC-FIB
HTTP:STC:DL:CVE-2015-1739-CE
HTTP:STC:DL:CVE-2015-1719-PRIV
HTTP:STC:DL:CVE-2015-1743-RCE
HTTP:STC:DL:CVE-2015-1725-PRIV
HTTP:STC:DL:MAL-ASX-OF
HTTP:STC:DL:QUICKTIME-PNSIZE
HTTP:STC:DL:SANDWORM-RCE
HTTP:STC:DL:CVE-2015-2360-PRIV
HTTP:STC:DL:CVE-2015-1728-CE
HTTP:STC:DL:CVE-2015-1726-CE
HTTP:STC:DL:MSOFFICE-MSO-RCE
HTTP:STC:DL:OO-RTF
HTTP:STC:DL:MOZILLA-WAV-BOF
HTTP:STC:DL:LOTUS-LZH-BOF
HTTP:STC:DL:XLS-SXVIEW
HTTP:STC:DL:XLS-SST-REC-MC
HTTP:STC:DL:QUICKTIME-PAINTPOLY
HTTP:STC:DL:XLS-SXDB
HTTP:STC:DL:MPLAYER-TWINVQ-BO
HTTP:STC:DL:MSVB-DSR-BOF
HTTP:STC:DL:WORD-SPRM-MEM
HTTP:STC:DL:GZIP-LHZ
HTTP:STC:DL:XLS-REPT
HTTP:STC:DL:JAVA-SB-RES
HTTP:STC:DL:XLS-RTWINDOW
HTTP:STC:DL:QT-COLOR-ATOM
HTTP:STC:DL:WMP-SKIN-DECOMP
HTTP:STC:DL:PDF-U3D-CLOD
HTTP:STC:DL:COLORMGMT-PATHNAME
HTTP:STC:DL:XLS-WORKSPACE-IDX
HTTP:STC:DL:AV-CAB-HEADER
HTTP:STC:DL:XLS-SHEET-NAME
HTTP:STC:DL:QUICKTIME-QTVR-BOF
HTTP:STC:DL:QT-PANORAMA-ATOM
HTTP:STC:DL:MS-OFFICE-2007-MC
HTTP:STC:DL:VLC-MATROSKA
HTTP:STC:DL:CVE-2015-1673-PE
HTTP:STC:DL:XLS-VBOBJ-RCE
HTTP:STC:DL:OLE-STRUCTURE-RCE
HTTP:STC:DL:XLS-BIFF-REC-RCE
HTTP:STC:DL:CLAMAV-JPEG-DOS
HTTP:STC:DL:CLAMAV-MEW-PACKED
HTTP:STC:DL:ORBIT-DOWNLOADER-OF
HTTP:STC:DL:QT-STSD-ATOMS
HTTP:STC:DL:CVE-2015-1695-RCE
HTTP:STC:DL:MAL-WOFF
HTTP:STC:DL:MAL-M3U
HTTP:STC:DL:OO-XPMREAD-OF
HTTP:STC:DL:CGM-IMG-BOF
HTTP:STC:DL:MCAF-LHA-OF
HTTP:STC:DL:CVE-2015-2467-CE
HTTP:STC:DL:IDEAL-SERVER-OF
HTTP:STC:DL:WORD-SPRMTSETBRC
HTTP:STC:DL:WMP-SKIN-PARSE
HTTP:STC:DL:OFFICE-BMP-HEADER

HTTP:STC:HSC

HTTP:STC:HSC:HCP-QUOTE-SCRIPT
HTTP:STC:HSC:MS-HSC-URL-VLN

HTTP:STC:IE

HTTP:STC:IE:CVE-2015-1745-UAF
HTTP:STC:IE:CVE-2014-4095-UAF
HTTP:STC:IE:TITLE-ELM-CHG
HTTP:STC:IE:JS-LOCATION-ASSIGN
HTTP:STC:IE:VTABLE-RCE
HTTP:STC:IE:LOC-SPOOF
HTTP:STC:IE:DRAG-DROP-MOD
HTTP:STC:IE:INFINITE-ARRAY
HTTP:STC:IE:RCDSET-UAF
HTTP:STC:IE:IE-TGVAL-DOS
HTTP:STC:IE:CREATETEXTRANGE-2
HTTP:STC:IE:9-10-MC
HTTP:STC:IE:9-10-MEM-CORRUPTION
HTTP:STC:IE:WSZ-EXEC
HTTP:STC:IE:CVE-2013-5056-UAF
HTTP:STC:IE:MAL-VB-JSCRIPT
HTTP:STC:IE:MS-TIME-DLL
HTTP:STC:IE:BGSOUND-TAG
HTTP:STC:IE:CVE-2014-4140-CE
HTTP:STC:IE:CODE-EXECUTION
HTTP:STC:IE:GOPHER-IMGTAG
HTTP:STC:IE:CACHE-SMDIALOG
HTTP:STC:IE:ONMOVE-RCE
HTTP:STC:IE:IE-LOCAL-FORMAT
HTTP:STC:IE:CVE-2015-2443-RCE
HTTP:STC:IE:CVE-2015-2441-RCE
HTTP:STC:IE:CACHE-EXTERNAL
HTTP:STC:IE:CVE-2015-2451-CE
HTTP:STC:IE:MEM-CORR-UAF
HTTP:STC:IE:FRAME-FLOOD
HTTP:STC:IE:OBJCT-PROCESSING-CE
HTTP:STC:IE:HTA-CONTENT-TYPE
HTTP:STC:IE:MHTML-REDIRECT
HTTP:STC:IE:CVE-2013-3910-UAF
HTTP:STC:IE:IFRAME-SMB
HTTP:STC:IE:CVE-2014-4087-UAF
HTTP:STC:IE:LOCAL-WEB-FOLDER
HTTP:STC:IE:IE-FTP-CMD
HTTP:STC:IE:CMARKUP-UAF
HTTP:STC:IE:IFRAME-FILE
HTTP:STC:IE:CVE-2013-3911-MC
HTTP:STC:IE:CVE-2013-3917-UAF
HTTP:STC:IE:CVE-2015-0048-RCE
HTTP:STC:IE:CVE-2013-3914-MC
HTTP:STC:IE:ONROWSINSERTED-RCE
HTTP:STC:IE:CVE-2015-0100-UAF
HTTP:STC:IE:POINTER-AFTERFREE
HTTP:STC:IE:INVALID-LAYOUT
HTTP:STC:IE:SAME-ORI-SEC-BYPASS
HTTP:STC:IE:MMCN-EXEC
HTTP:STC:IE:CVE-2015-1622-RCE
HTTP:STC:IE:DND-IMG
HTTP:STC:IE:TIF-DND
HTTP:STC:IE:WMP-BMP-OF-1
HTTP:STC:IE:HTML-TAG-MC
HTTP:STC:IE:INSERT-ADJACENT-RCE
HTTP:STC:IE:DHTML-CCR-INV-OBJ
HTTP:STC:IE:IE-IMG-INF-DOS
HTTP:STC:IE:CVE-2013-3871-MC
HTTP:STC:IE:CVE-2015-2450-UAF
HTTP:STC:IE:SPOF-STATUS-BAR-URL
HTTP:STC:IE:SETSLICE-OF
HTTP:STC:IE:HRALIGN-OF
HTTP:STC:IE:ONUNLOAD
HTTP:STC:IE:IEUNMEM
HTTP:STC:IE:6-10-MEM-CORRUPTION
HTTP:STC:IE:EVENT-HANDLER-RCE
HTTP:STC:IE:CVE-2014-6376-RCE
HTTP:STC:IE:IE-HCP-DELETE
HTTP:STC:IE:VML-AFTERFREE
HTTP:STC:IE:DEV-TOOLBAR-RCE
HTTP:STC:IE:IEXDOM-INFO
HTTP:STC:IE:CVE-2015-2502-CE
HTTP:STC:IE:TOSTATICHTML
HTTP:STC:IE:TOSTATIC-DISC
HTTP:STC:IE:10-MEM-CORRUPTION
HTTP:STC:IE:EVENT-INVOKE
HTTP:STC:IE:MAL-JPEG
HTTP:STC:IE:CROSS-FRAME-SCRIPT
HTTP:STC:IE:HTML-HELP-ZONE-BP
HTTP:STC:IE:OE-MSHTML-OF
HTTP:STC:IE:WMP-SKIN-EXEC
HTTP:STC:IE:CVE-2008-4258-MC
HTTP:STC:IE:CACHE-CREATERANGE
HTTP:STC:IE:CHROME-HTML-CMD-INJ
HTTP:STC:IE:SYSMON-DOS
HTTP:STC:IE:URI-REDIRECTION
HTTP:STC:IE:9-NULL-BYTE-DISC
HTTP:STC:IE:HTML-OBJECTS
HTTP:STC:IE:CVE-2013-3208-UAF
HTTP:STC:IE:IE11-HEAPSPRAY-W81
HTTP:STC:IE:TABLE-LAYOUT
HTTP:STC:IE:ANIMATION-RCE
HTTP:STC:IE:CVE-2013-3207-UAF
HTTP:STC:IE:7-LOC-DATA-URI-DOS
HTTP:STC:IE:CSS-XDOM-DISC
HTTP:STC:IE:MSRAT-NAME-OF2
HTTP:STC:IE:CVE-2014-6375-RCE
HTTP:STC:IE:TEXTRANGE-OBJ
HTTP:STC:IE:UNINIT-DOM
HTTP:STC:IE:CACHED-OBJ-RCE
HTTP:STC:IE:CVE-2014-0281-MC
HTTP:STC:IE:LAYOUT-RCE
HTTP:STC:IE:CLONENODE-RCE
HTTP:STC:IE:TOSTATIC-XSS
HTTP:STC:IE:CVE-2014-1775-UAF
HTTP:STC:IE:UNINIT-LAYOUT
HTTP:STC:IE:9-MAL-HTML-DOS
HTTP:STC:IE:FILE-EXT-SPOOF
HTTP:STC:IE:CVE-2014-6355-IDISC
HTTP:STC:IE:ATTR-RM-RCE
HTTP:STC:IE:DHTML-OBJ-CORRUPT
HTTP:STC:IE:INCOMPLETE-EM
HTTP:STC:IE:MDAC-CACHESIZE-OF
HTTP:STC:IE:CVE-2014-0267-MC
HTTP:STC:IE:EXECCOMMAND-RCE
HTTP:STC:IE:FULLMEM-RELOAD3
HTTP:STC:IE:CFLATMARKUPPOINTER
HTTP:STC:IE:LETTER-STYLE-UAF
HTTP:STC:IE:LOCAL-CNT-INJ
HTTP:STC:IE:EVENT-LISTENER-RCE
HTTP:STC:IE:CVE-2014-6374-RCE
HTTP:STC:IE:CELEMENT-RCE
HTTP:STC:IE:CVE-2014-0284-MC
HTTP:STC:IE:CVE-2014-4063-UAF
HTTP:STC:IE:CMSHTMLED-UAF
HTTP:STC:IE:VML-RCE
HTTP:STC:IE:CVE-2014-0285-MC
HTTP:STC:IE:HTML-TIME
HTTP:STC:IE:COLORBALANCE
HTTP:STC:IE:STYLESHEET-MC
HTTP:STC:IE:MHTML-INFO-DISC
HTTP:STC:IE:STYLEOBJ-MEM
HTTP:STC:IE:ONLOAD-EVT-RCE
HTTP:STC:IE:MARKUP-POINTER-RCE
HTTP:STC:IE:SCROLL-EVENT-RCE
HTTP:STC:IE:DHTML-HANDLER-RACE
HTTP:STC:IE:CVE-2014-2823-UAF
HTTP:STC:IE:CVE-2014-2820-UAF
HTTP:STC:IE:CVE-2015-0053-RCE
HTTP:STC:IE:CVE-2014-2824-BO
HTTP:STC:IE:RES-URI-INFODISC
HTTP:STC:IE:XMLDOM-INFODISC
HTTP:STC:IE:CVE-2015-2452-CE
HTTP:STC:IE:CVE-2015-0039-RCE
HTTP:STC:IE:CVE-2014-6347-MC
HTTP:STC:IE:XML-PARSER-RCE
HTTP:STC:IE:INSERTROW-RCE
HTTP:STC:IE:CSS-OF
HTTP:STC:IE:SAMEID-RCE
HTTP:STC:IE:AUTH-REFLECTION
HTTP:STC:IE:CHAN-SCRIPT
HTTP:STC:IE:LAYOUT-UAF
HTTP:STC:IE:COL-SPAN
HTTP:STC:IE:PRINT-PREVIEW-CE
HTTP:STC:IE:JS-MEM-CORR
HTTP:STC:IE:GETMARKUPPTR-UAF
HTTP:STC:IE:FULLMEM-RELOAD2
HTTP:STC:IE:EMBED-MC
HTTP:STC:IE:MHTML-REDIR-INFO
HTTP:STC:IE:UNINIT-CORRUPT
HTTP:STC:IE:HTML-OB-MEM
HTTP:STC:IE:OBJ-PARSING-UAF
HTTP:STC:IE:UNINIT-MEM-CORR
HTTP:STC:IE:HTML-LAYOUT
HTTP:STC:IE:CVE-2014-6369-MC
HTTP:STC:IE:FOLDER-COM-EXEC
HTTP:STC:IE:STYLESHEET-OF
HTTP:STC:IE:CVE-2015-0035-UAF
HTTP:STC:IE:JS-MC
HTTP:STC:IE:CVE-2015-0030-UAF
HTTP:STC:IE:IEFRAME
HTTP:STC:IE:CTREEPOS-RCE
HTTP:STC:IE:CVE-2014-6369-UAF
HTTP:STC:IE:CVE-2014-6368-RCE
HTTP:STC:IE:IFRAME-HTA
HTTP:STC:IE:CVE-2014-6369-RCE
HTTP:STC:IE:JS-INFO-DISC
HTTP:STC:IE:LOCAL-ACCESS-DAT
HTTP:STC:IE:HTML-LAYOUT-CE
HTTP:STC:IE:CVE-2014-4057-MC
HTTP:STC:IE:MARQUEE-STYLE
HTTP:STC:IE:CVE-2014-6329-RCE
HTTP:STC:IE:OPTION-ELEMENT-RCE
HTTP:STC:IE:CIR-REF
HTTP:STC:IE:SELECT-ELEMENT-RCE
HTTP:STC:IE:XSLT-MC
HTTP:STC:IE:X-DOMAIN-INFO
HTTP:STC:IE:BOUNDELEMENTS
HTTP:STC:IE:IE-MEM-CORR
HTTP:STC:IE:USE-AFTER-FREE
HTTP:STC:IE:TIME-RCE
HTTP:STC:IE:CVE-2014-6330-MC
HTTP:STC:IE:CVE-2014-6373-UAF
HTTP:STC:IE:CVE-2015-0043-RCE
HTTP:STC:IE:ONBEFORE-DEACTIVATE
HTTP:STC:IE:CVE-2015-0050-CE
HTTP:STC:IE:NESTED-OBJECT-TAG
HTTP:STC:IE:URI-HANDLER-PDF
HTTP:STC:IE:FLASH-UAF
HTTP:STC:IE:SYSIMAGE-INFO-DISC
HTTP:STC:IE:MHTML-REDIR-JS
HTTP:STC:IE:USERDATA
HTTP:STC:IE:CVE-2014-6327-MC
HTTP:STC:IE:CVE-2015-0040-RCE
HTTP:STC:IE:CVE-2013-3874-UAF
HTTP:STC:IE:CVE-2013-5047-UAF
HTTP:STC:IE:TABLES-MEMCORRUPT
HTTP:STC:IE:VML-NUM-BOF
HTTP:STC:IE:CFORMELEMENT-RCE
HTTP:STC:IE:XML-MIME-CORRUPT
HTTP:STC:IE:CVE-2015-0042-RCE
HTTP:STC:IE:CVE-2014-8967-RCE
HTTP:STC:IE:CTREENODE-UAF
HTTP:STC:IE:CVE-2015-0051-SB
HTTP:STC:IE:CVE-2014-6341-UAF
HTTP:STC:IE:CVE-2015-0019-RCE
HTTP:STC:IE:TYPE-CONFUSION-RCE
HTTP:STC:IE:CROSS-DOMAIN-INFO
HTTP:STC:IE:6-STATUS-BAR-SPOOF
HTTP:STC:IE:VERT-ALIGN-DOS
HTTP:STC:IE:PNG-IMAGE-BO
HTTP:STC:IE:POSITION-CSS-DOS
HTTP:STC:IE:MHT-FILE
HTTP:STC:IE:XML-OBJECTION
HTTP:STC:IE:8-MSHTML-INFO-DISC
HTTP:STC:IE:TABLE-FRAMESET
HTTP:STC:IE:EXCEPT-HNDL-OF
HTTP:STC:IE:CSS-DISCLOSURE
HTTP:STC:IE:CVE-2015-0020-CE
HTTP:STC:IE:NULL-PTR-DOS
HTTP:STC:IE:FRAME-BORDER-DOS
HTTP:STC:IE:CSS-DOS
HTTP:STC:IE:ADDFAVORITE-BOF
HTTP:STC:IE:CVE-2015-0021-CE
HTTP:STC:IE:LI-ELEMENT-DOS
HTTP:STC:IE:CVE-2013-3908-DISC
HTTP:STC:IE:XDR-PROTOTYPE-DOS
HTTP:STC:IE:CVE-2014-6337-UAF
HTTP:STC:IE:MULTI-ACTION
HTTP:STC:IE:CSS-PROPERTY-METHOD
HTTP:STC:IE:CVE-2015-0054-RCE
HTTP:STC:IE:CVE-2015-0067-UAF
HTTP:STC:IE:CVE-2015-0055-CE
HTTP:STC:IE:CVE-2015-0068-UAF
HTTP:STC:IE:CVE-2015-0069-INFO
HTTP:STC:IE:CVE-2014-6349-CE
HTTP:STC:IE:NULL-OBJ-RCE
HTTP:STC:IE:UNISCRIBE-FNPS-MC
HTTP:STC:IE:MOUSE-MOVE-MEM
HTTP:STC:IE:9-MEMCORRUPT-DOS
HTTP:STC:IE:UTF8-DECODE-OF
HTTP:STC:IE:ONREADYSTATE
HTTP:STC:IE:8-XSS-FILTER
HTTP:STC:IE:CVE-2015-0025-RCE
HTTP:STC:IE:UAF-RCE
HTTP:STC:IE:MS-IE-MEM-RCE
HTTP:STC:IE:SAVE-HISTORY-UAF
HTTP:STC:IE:SETCAPTURE-UAF
HTTP:STC:IE:TABLECELL-INFO-DISC
HTTP:STC:IE:PASTEHTML-RCE
HTTP:STC:IE:COBJECT-ELE-UAF
HTTP:STC:IE:CDISPNODE-UAF
HTTP:STC:IE:COMWINDOWPROXY-UAF
HTTP:STC:IE:CVE-2015-0037-CE
HTTP:STC:IE:CVE-2015-0038-RCE
HTTP:STC:IE:CVE-2013-3189-MC
HTTP:STC:IE:CVE-2015-0049-RCE
HTTP:STC:IE:UAF-ARBITRARY-CE
HTTP:STC:IE:CHTML-UAF
HTTP:STC:IE:INSELM-UAF
HTTP:STC:IE:LSGETTRAILINFO-UAF
HTTP:STC:IE:JIS-CHAR-INFO-DISC
HTTP:STC:IE:MALFORMED-URI-BO
HTTP:STC:IE:9-USE-AFTER-FREE
HTTP:STC:IE:CVE-2013-3845-UAF
HTTP:STC:IE:APPLYELEMENT-UAF
HTTP:STC:IE:10-UAF
HTTP:STC:IE:CVE-2013-3885-UAF
HTTP:STC:IE:6-10-USE-AFTER-FREE
HTTP:STC:IE:HTML-SANITZ
HTTP:STC:IE:CSS-RACE-CE
HTTP:STC:IE:COLLECTGARBAGE-B64
HTTP:STC:IE:HTML-OBJ-MEM-CRPTN
HTTP:STC:IE:UAF-MC
HTTP:STC:IE:DHTML-OBJ-MC
HTTP:STC:IE:OBJECT-OF
HTTP:STC:IE:HTML-XSS
HTTP:STC:IE:8-CTREENODE-UAF
HTTP:STC:IE:CVE-2013-5051-MC
HTTP:STC:IE:CCARET-UAF
HTTP:STC:IE:CLEMENT-UAF
HTTP:STC:IE:REMOVECHILD-UAF
HTTP:STC:IE:CMARKUPBEHAVIOR-UAF
HTTP:STC:IE:CVE-2014-4132-MC
HTTP:STC:IE:CVE-2014-2795-MC
HTTP:STC:IE:CVE-2014-6345-INFO
HTTP:STC:IE:OBJ-DEL-UAF
HTTP:STC:IE:CVE-2013-3115-MC
HTTP:STC:IE:UNSAFE-MEM-OPER-UAF
HTTP:STC:IE:CVE-2014-4138-CE
HTTP:STC:IE:CVE-2014-6343-UAF
HTTP:STC:IE:CVE-2014-6350-CE
HTTP:STC:IE:UAF-MEM-COR
HTTP:STC:IE:INSECURE-OBJDEL-UAF
HTTP:STC:IE:OBJECT-CODE-EXEC
HTTP:STC:IE:CVE-2013-3153-MC
HTTP:STC:IE:8-10-MEM-CORR
HTTP:STC:IE:CVE-2014-1772-MC
HTTP:STC:IE:CVE-2014-1797-UAF
HTTP:STC:IE:ONENOTE-URL
HTTP:STC:IE:9-UAF-MEM-CORR
HTTP:STC:IE:FRAME-INJ
HTTP:STC:IE:CVE-2014-1785-UAF
HTTP:STC:IE:CVE-2014-1802-MC
HTTP:STC:IE:7-10-MEM-CORRUPTION
HTTP:STC:IE:2014-6340-INFO-DIS
HTTP:STC:IE:CVE-2013-3199-CE
HTTP:STC:IE:IE-8-DOM-UN-MEM
HTTP:STC:IE:CVE-2014-4143-MC
HTTP:STC:IE:DIRECTX-SAMI-BO
HTTP:STC:IE:HTML-OBJECTS-MC
HTTP:STC:IE:OBJECT-TAG-XML
HTTP:STC:IE:GETELEMENT-CACHE
HTTP:STC:IE:SLAYOUTRUN-UAF
HTTP:STC:IE:IMPROPER-REF
HTTP:STC:IE:JSON-ARRAY-INFO-DIS
HTTP:STC:IE:9-UAF-CE
HTTP:STC:IE:9-UNINITVARS-UAF
HTTP:STC:IE:6-7-UAF-RCE
HTTP:STC:IE:EVENT-HANDLER-XD
HTTP:STC:IE:OBJHAN-ERR-UAF
HTTP:STC:IE:SETEXP-REFCOUNT
HTTP:STC:IE:10-UAF-MC
HTTP:STC:IE:URI-INFODISC
HTTP:STC:IE:MSIE-OBJ-UAF
HTTP:STC:IE:OBJECTS-MC
HTTP:STC:IE:CVE-2015-0018-UAF
HTTP:STC:IE:PAGE-UPDATE-RACE
HTTP:STC:IE:SHOWHELP
HTTP:STC:IE:CVE-2014-4128-MC
HTTP:STC:IE:CONT-LOC-ZON-BYPASS
HTTP:STC:IE:MS-UAF-MC
HTTP:STC:IE:8-10-MEM-CORRUPTION
HTTP:STC:IE:MEM-CORRUPT-RCE
HTTP:STC:IE:8-UAF-RCE
HTTP:STC:IE:UAF-MC-RCE
HTTP:STC:IE:MEM-CORR
HTTP:STC:IE:CVE-2014-1805-MC
HTTP:STC:IE:MAL-GIF-DOS
HTTP:STC:IE:SHELL-WEB-FOLDER
HTTP:STC:IE:CSS-MEMORY-CORRUPT
HTTP:STC:IE:ANCHOR-URL-SPOOF
HTTP:STC:IE:CVE-2015-0029-UAF
HTTP:STC:IE:CVE-2014-4126-MC
HTTP:STC:IE:CVE-2015-2422-UAF
HTTP:STC:IE:CVE-2014-6346-INFO
HTTP:STC:IE:OBJECT-MC
HTTP:STC:IE:CVE-2015-2391-RCE
HTTP:STC:IE:CVE-2014-2797-MC
HTTP:STC:IE:CVE-2013-3916-RCE
HTTP:STC:IE:CVE-2014-4127-MC
HTTP:STC:IE:WINCVE-2014-4113-PE
HTTP:STC:IE:CVE-2014-2799-UAF
HTTP:STC:IE:INP-ELNT-OBJCT-RCE
HTTP:STC:IE:CPASTECOMMAND
HTTP:STC:IE:CVE-2014-4133-CE
HTTP:STC:IE:DOM-OBJ-MC
HTTP:STC:IE:CVE-2014-0289-MC
HTTP:STC:IE:CVE-2015-2411-UAF
HTTP:STC:IE:CVE-2013-5048-MC
HTTP:STC:IE:CVE-2013-5052-MC
HTTP:STC:IE:TABLE-POSWIDTH-MC
HTTP:STC:IE:CVE-2015-2406-RCE
HTTP:STC:IE:CVE-2014-0287-MC
HTTP:STC:IE:CVE-2014-0271-MC
HTTP:STC:IE:CVE-2014-0288-MC
HTTP:STC:IE:CVE-2014-0286-MC
HTTP:STC:IE:SCROL-INTO-VIEW-UAF
HTTP:STC:IE:CVE-2014-6366-CE
HTTP:STC:IE:CVE-2015-2390-UAF
HTTP:STC:IE:CVE-2015-2414-RCE
HTTP:STC:IE:MSWEBDVD-NPA
HTTP:STC:IE:10-CVE-2014-0275-MC
HTTP:STC:IE:URL-FILE-BOF
HTTP:STC:IE:CVE-2014-0303-MC
HTTP:STC:IE:CVE-2014-0269-MC
HTTP:STC:IE:CVE-2014-0283-MC
HTTP:STC:IE:CVE-2014-0272-MC
HTTP:STC:IE:CVE-2014-0277-MC
HTTP:STC:IE:CVE-2014-0274-MC
HTTP:STC:IE:CSS-IMPORT
HTTP:STC:IE:CVE-2014-0276-MC
HTTP:STC:IE:CVE-2014-0270-UAF
HTTP:STC:IE:CVE-2014-0290-MC
HTTP:STC:IE:CVE-2014-0273-MC
HTTP:STC:IE:CVE-2015-2404-RCE
HTTP:STC:IE:UNCLOSED-DIV-UAF
HTTP:STC:IE:CVE-2014-0313-BOF
HTTP:STC:IE:CVE-2014-0322-UAF
HTTP:STC:IE:CVE-2014-0312-RCE
HTTP:STC:IE:CVE-2015-2372-UAF
HTTP:STC:IE:CVE-2014-4137-MC
HTTP:STC:IE:11-CVE-2014-0304-MC
HTTP:STC:IE:CVE-2014-0314-MC
HTTP:STC:IE:CVE-2014-0324-MC
HTTP:STC:IE:CVE-2014-0298-UAF
HTTP:STC:IE:CVE-2014-0306-RCE
HTTP:STC:IE:9-MEM-CORR
HTTP:STC:IE:CVE-2012-6502-INFO
HTTP:STC:IE:CSHADOW-RCE
HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY
HTTP:STC:IE:CVE-2015-2416-CE
HTTP:STC:IE:CVE-2013-5049-MC
HTTP:STC:IE:CVE-2014-0299-RCE
HTTP:STC:IE:XML-MEM-COR
HTTP:STC:IE:CVE-2014-0311-UAF
HTTP:STC:IE:CVE-2015-2397-UAF
HTTP:STC:IE:CVE-2014-0309-MC
HTTP:STC:IE:CVE-2014-0302-MC
HTTP:STC:IE:8-CVE-2014-0278-MC
HTTP:STC:IE:CVE-2014-0297-MC
HTTP:STC:IE:VML-FILL-BOF
HTTP:STC:IE:CVE-2014-4123-CE
HTTP:STC:IE:CVE-2014-0305-MC
HTTP:STC:IE:CVE-2015-2425-CE
HTTP:STC:IE:CVE-2014-6348-UAF
HTTP:STC:IE:CVE-2015-1738-UAF
HTTP:STC:IE:CVE-2014-4129-MC
HTTP:STC:IE:9-UAF-RCE
HTTP:STC:IE:CVE-2015-2364-BO
HTTP:STC:IE:CVE-2015-2384-RCE
HTTP:STC:IE:JSCRIPT9-CE
HTTP:STC:IE:CVE-2014-4134-MC
HTTP:STC:IE:CVE-2014-4124-CE
HTTP:STC:IE:CVE-2015-2413
HTTP:STC:IE:CVE-2014-4141-MC
HTTP:STC:IE:CVE-2015-2402-SB
HTTP:STC:IE:INFOBAR-DOWNLOAD
HTTP:STC:IE:ONRESIZE-UAF
HTTP:STC:IE:XFRAME-REST-BYPASS
HTTP:STC:IE:XML-DISCLOSE
HTTP:STC:IE:CVE-2015-1733-RCE
HTTP:STC:IE:CVE-2015-2412-SB
HTTP:STC:IE:CVE-2014-6344-UAF
HTTP:STC:IE:CVE-2013-3194-UAF
HTTP:STC:IE:10-INT-OVF
HTTP:STC:IE:10-OBJHANDLING-UAF
HTTP:STC:IE:10-OBJDEL-UAF
HTTP:STC:IE:CVE-2015-2388-UAF
HTTP:STC:IE:10-OBJECT-RCE
HTTP:STC:IE:WMP-BMP-OF-3
HTTP:STC:IE:OBJECT-OF1
HTTP:STC:IE:URL-HIDING-ENC
HTTP:STC:IE:XSS-FILTER-DISC
HTTP:STC:IE:DESIGNMODE-INFO
HTTP:STC:IE:CVE-2015-2408-UAF
HTTP:STC:IE:8-OBJECT-MC
HTTP:STC:IE:DIALOG-MANIP
HTTP:STC:IE:CVE-2013-3873-MC
HTTP:STC:IE:CVE-2013-3875-MC
HTTP:STC:IE:CVE-2013-3912-RCE
HTTP:STC:IE:EUC-JP-XSS
HTTP:STC:IE:EOT-WEBFONTS-DL
HTTP:STC:IE:INST-ENG-INT-OF
HTTP:STC:IE:6.0-FOR-LOOP-DOS
HTTP:STC:IE:10-OBJECT-MC
HTTP:STC:IE:CVE-2014-6342-MEMCP
HTTP:STC:IE:HTML-FORM-DOS
HTTP:STC:IE:MAL-DATASTREAM
HTTP:STC:IE:CVE-2015-2389-UAF
HTTP:STC:IE:OBJERR-UAF
HTTP:STC:IE:CVE-2015-2383-UAF
HTTP:STC:IE:IE-MSHTML-OF
HTTP:STC:IE:SCREEN-DOS
HTTP:STC:IE:CVE-2015-0026-UAF
HTTP:STC:IE:TEXT-HELP-ZONE-BP
HTTP:STC:IE:MHTML-REDIR
HTTP:STC:IE:ONBEFORECOPY-UAF
HTTP:STC:IE:EXEC-CMD-FILE-SPOOF
HTTP:STC:IE:IFRAME-MEM-CORR
HTTP:STC:IE:REDIRECT-MC
HTTP:STC:IE:MHTML-XDOM
HTTP:STC:IE:XML-HANDLE-EXEC
HTTP:STC:IE:ZONE-SPOOF
HTTP:STC:IE:8-CVE-2014-0279-MC
HTTP:STC:IE:CVE-2013-3188-MC
HTTP:STC:IE:9-10-OBJERR-UAF
HTTP:STC:IE:DOC-MARKUP-RCE
HTTP:STC:IE:7-WINDOW-SPOOF
HTTP:STC:IE:CVE-2015-1729-UAF
HTTP:STC:IE:CVE-2013-3209-UAF
HTTP:STC:IE:ADDRBOOK-OBJ-DOS
HTTP:STC:IE:6-ADDRESS-BAR-SPOOF
HTTP:STC:IE:ANTIXSS-INFO-DISC
HTTP:STC:IE:DEL-OBJ-REF
HTTP:STC:IE:8-DOS
HTTP:STC:IE:10-OBJ-DEL-UAF
HTTP:STC:IE:CDO-IN-HEADER
HTTP:STC:IE:CACHE-CLIPDATA
HTTP:STC:IE:9-MC-RCE
HTTP:STC:IE:ADDRBAR-SPOOF-2
HTTP:STC:IE:JS-VBS-DECODE-OF
HTTP:STC:IE:CVE-2014-6351-UAF
HTTP:STC:IE:CVE-2015-2403-UAF
HTTP:STC:IE:FULLMEM-RELOAD
HTTP:STC:IE:CVE-2014-6353-UAF
HTTP:STC:IE:CVE-2015-2421-ID
HTTP:STC:IE:CVE-2015-1767-UAF
HTTP:STC:IE:CSRSS-HE-MSG
HTTP:STC:IE:CVE-2014-6339-MC
HTTP:STC:IE:8-OBJ-MC
HTTP:STC:IE:CVE-2014-0307-MC
HTTP:STC:IE:CVE-2014-6347-RCE
HTTP:STC:IE:CVE-2014-4065-UAF
HTTP:STC:IE:CVE-2014-1755-MC
HTTP:STC:IE:COL-TAG-CACHE
HTTP:STC:IE:ERROR-HANDLER
HTTP:STC:IE:ZONE-BYPASS
HTTP:STC:IE:CVE-2014-4088-UAF
HTTP:STC:IE:CVE-2014-1753-MC
HTTP:STC:IE:DEL-TABLE
HTTP:STC:IE:2014-1751-MEM-CORR
HTTP:STC:IE:7-CVE-2014-1752-RCE
HTTP:STC:IE:CVE-2015-2442-RCE
HTTP:STC:IE:CVE-2014-4080-UAF
HTTP:STC:IE:CVE-2014-1791-UAF
HTTP:STC:IE:CVE-2014-0282-UAF
HTTP:STC:IE:CVE-2014-4092-UAF
HTTP:STC:IE:CVE-2014-1789-MC
HTTP:STC:IE:CVE-2014-1766-UAF
HTTP:STC:IE:CVE-2014-1795-UAF
HTTP:STC:IE:CVE-2015-0045-RCE
HTTP:STC:IE:CVE-2014-4094-UAF
HTTP:STC:IE:CVE-2014-4081-UAF
HTTP:STC:IE:CVE-2015-0022-UAF
HTTP:STC:IE:ASLR-BYPASS-RCE
HTTP:STC:IE:CVE-2015-1625-RCE
HTTP:STC:IE:CVE-2015-0099-RCE
HTTP:STC:IE:CVE-2014-1765-RCE
HTTP:STC:IE:CVE-2014-2801-MC
HTTP:STC:IE:10-CVE2014-2804-UAF
HTTP:STC:IE:CVE-2015-0044-RCE
HTTP:STC:IE:6-11-UAF
HTTP:STC:IE:CVE-2014-1762-MC
HTTP:STC:IE:CVE-2014-1800-UAF
HTTP:STC:IE:CVE-2014-4089-UAF
HTTP:STC:IE:CVE-2014-1804-UAF
HTTP:STC:IE:CVE-2014-4084-UAF
HTTP:STC:IE:CVE-2014-0310-MC
HTTP:STC:IE:CVE-2014-4086-UAF
HTTP:STC:IE:CVE-2014-1815-UAF
HTTP:STC:IE:CVE-2014-4082-MC
HTTP:STC:IE:CVE-2014-2787-MC
HTTP:STC:IE:SMEORIGIN-BYPASS
HTTP:STC:IE:MSAPP-TASK
HTTP:STC:IE:CVE-2015-0056-MC
HTTP:STC:IE:CVE-2015-1624-RCE
HTTP:STC:IE:CVE-2015-0081-RCE
HTTP:STC:IE:CVE-2015-2448-RCE
HTTP:STC:IE:CVE-2015-0032-RCE
HTTP:STC:IE:CVE-2015-1627-PRIV
HTTP:STC:IE:CRAFTED-WEB-CE
HTTP:STC:IE:CVE-2015-1660-RCE
HTTP:STC:IE:CVE-2015-1634-RCE
HTTP:STC:IE:CVE-2015-1623-MC
HTTP:STC:IE:CVE-2015-1626-RCE
HTTP:STC:IE:MEMCORRUPT2
HTTP:STC:IE:CVE-2015-1657-ID
HTTP:STC:IE:CQUOTES-OBJECT-CE
HTTP:STC:IE:CVE-2015-1652-RCE
HTTP:STC:IE:EVENT-HANDLER-INFO
HTTP:STC:IE:OBJECT-HANDLNG-RCE
HTTP:STC:IE:CVE-2015-1668-RCE
HTTP:STC:IE:CVE-2015-1708-UAF
HTTP:STC:IE:CVE-2015-1714-UAF
HTTP:STC:IE:CVE-2015-1718-UAF
HTTP:STC:IE:CVE-2015-1688-SB
HTTP:STC:IE:CVE-2015-1713-SB
HTTP:STC:IE:CVE-2015-1706-UAF
HTTP:STC:IE:CVE-2015-1710-CE
HTTP:STC:IE:CVE-2015-1691-UAF
HTTP:STC:IE:CVE-2015-1658-RCE
HTTP:STC:IE:ACCESS-BYPASS-ID
HTTP:STC:IE:CVE-2015-1711-UAF
HTTP:STC:IE:CVE-2015-1686-ID
HTTP:STC:IE:CVE-2015-1712-RCE
HTTP:STC:IE:CVE-2015-1666-RCE
HTTP:STC:IE:CVE-2015-1662-RCE
HTTP:STC:IE:CVE-2015-1659-RCE
HTTP:STC:IE:CVE-2015-1661-ID
HTTP:STC:IE:CVE-2015-1685-RCE
HTTP:STC:IE:CVE-2015-1709-RCE
HTTP:STC:IE:CVE-2015-1705-UAF
HTTP:STC:IE:CVE-2015-1717-CE
HTTP:STC:IE:RANGE-OBJ-HNDLNG-ID
HTTP:STC:IE:WRITE-WAT-WHERE-UAF
HTTP:STC:IE:VML-MEM-CORRUPTION
HTTP:STC:IE:COMPRESSED-URL
HTTP:STC:IE:VTABLE-CODE-EXEC
HTTP:STC:IE:XML-RCE
HTTP:STC:IE:OLE-AUTO
HTTP:STC:IE:MS-IE-UAF
HTTP:STC:IE:CVE-2015-1731-CE
HTTP:STC:IE:CVE-2015-1753-RCE
HTTP:STC:IE:CVE-2015-1744-CE
HTTP:STC:IE:DOCUMENT-RCE
HTTP:STC:IE:XML-ELEMENT-RCE
HTTP:STC:IE:USE-AFTR-FREE
HTTP:STC:IE:TREE-POS-OBJECT-RCE
HTTP:STC:IE:SCRIPT-STCK-EXH
HTTP:STC:IE:CVE-2014-0263-MC
HTTP:STC:IE:CSS-HEAP
HTTP:STC:IE:CLIP-MEM
HTTP:STC:IE:IFRAME-NAME-OF
HTTP:STC:IE:HISTORY-GO-MC
HTTP:STC:IE:CVE-2008-2256-MC
HTTP:STC:IE:MEM-LEAK
HTTP:STC:IE:ANIMATEMOTION
HTTP:STC:IE:LAYOUT-GRID
HTTP:STC:IE:IE-HEADER-XDOM-INFO
HTTP:STC:IE:LOCATION-X-DOMAIN
HTTP:STC:IE:OBJ-MGMT-MC
HTTP:STC:IE:CVE-2014-6323-ID
HTTP:STC:IE:IESTYLE-OBJ
HTTP:STC:IE:FREED-OBJECT
HTTP:STC:IE:CVE-2015-1735-UAF
HTTP:STC:IE:CVE-2015-1687-RCE
HTTP:STC:IE:CVE-2015-1742-RCE
HTTP:STC:IE:CVE-2015-1751-RCE
HTTP:STC:IE:CVE-2015-1730-RCE
HTTP:STC:IE:CVE-2012-1877-CE
HTTP:STC:IE:CVE-2015-1750-UAF
HTTP:STC:IE:SELECT-ELEMENT
HTTP:STC:IE:ONUNLOAD-MEM
HTTP:STC:IE:UAF-MEM-CORR
HTTP:STC:IE:EVENT-HANDLER-MC
HTTP:STC:IE:TABLE-SPAN-CORRUPT
HTTP:STC:IE:CREATETEXTRANGE
HTTP:STC:IE:CVE-2015-1736-RCE
HTTP:STC:IE:HDRLOC-MSITS
HTTP:STC:IE:CVE-2015-1741-RCE
HTTP:STC:IE:TITLE-BAR-URI
HTTP:STC:IE:CVE-2015-1737-UAF
HTTP:STC:IE:CVE-2015-1740-UAF
HTTP:STC:IE:OBJECT-PROCESING-CE
HTTP:STC:IE:CVE-2015-1766-RCE
HTTP:STC:IE:CVE-2015-1755-UAF
HTTP:STC:IE:CVE-2015-1732-UAF
HTTP:STC:IE:ZONE-SPOOF-2
HTTP:STC:IE:IE-FTP-SCRIPTING
HTTP:STC:IE:JAVA-SCRIPT-RCE
HTTP:STC:IE:CSS-XSS
HTTP:STC:IE:DEREF-OBJ-ACCESS
HTTP:STC:IE:TIME-ELEMENT
HTTP:STC:IE:CENTER-ELE-RCE
HTTP:STC:IE:XML-HMAC-BYPASS
HTTP:STC:IE:CSS-PSEUDO-UAF
HTTP:STC:IE:MERGE-ATTRIB
HTTP:STC:IE:SELECT-EMPTY
HTTP:STC:IE:COMPINST-OF
HTTP:STC:IE:GOOGLEBAR-FILE
HTTP:STC:IE:MSRAT-NAME-OF-SVR2
HTTP:STC:IE:MSRAT-NAME-OF
HTTP:STC:IE:HELPCTR-CODE-EX
HTTP:STC:IE:SSL-PROXY-DIS
HTTP:STC:IE:INV-CSSARR
HTTP:STC:IE:DOM-CACHE-CORRUPT
HTTP:STC:IE:WIN-ADO-EXEC
HTTP:STC:IE:CLONE-REF-CORRUPT
HTTP:STC:IE:IE-REFRESH-OF
HTTP:STC:IE:EOTF-LZCOMP-OF
HTTP:STC:IE:OVERLAP-TAGS
HTTP:STC:IE:COPY-PASTE-INFODISC
HTTP:STC:IE:HTML-OBJ-MC
HTTP:STC:IE:CVE-2015-1748-RCE
HTTP:STC:IE:IE-MHT-REDIRECT
HTTP:STC:IE:HTML-RELOAD-CORRUPT
HTTP:STC:IE:VML-VGX-BOF
HTTP:STC:IE:MSRAT-NAME-OF-SVR

HTTP:STC:IMG

HTTP:STC:IMG:NOT-BMP
HTTP:STC:IMG:PNG-NAME-ERROR
HTTP:STC:IMG:PNG_IHDR_INVAL_LEN
HTTP:STC:IMG:NOT-GIF
HTTP:STC:IMG:OVERLARGE-BMP
HTTP:STC:IMG:BMP-OVERFLOW
HTTP:STC:IMG:NOT-PNG
HTTP:STC:IMG:PNG-TRNS-ERROR
HTTP:STC:IMG:JPEG-BAD-LENGTH
HTTP:STC:IMG:MALFORMED-JPEG
HTTP:STC:IMG:PNG-IHDR-BAD-PAR
HTTP:STC:IMG:PNG-PLTE-ERROR
HTTP:STC:IMG:JPEG-UNDERRUN
HTTP:STC:IMG:NOT-JPEG
HTTP:STC:IMG:GIF-BAD-PARAMETER
HTTP:STC:IMG:MALFORMED-BMP
HTTP:STC:IMG:BMP-BAD-PARAMETER
HTTP:STC:IMG:PNG_CHUNK_OVERFLOW
HTTP:STC:IMG:OFFEND-TG
HTTP:STC:IMG:OFFEND-GG
HTTP:STC:IMG:WMP-BMP-OF
HTTP:STC:IMG:WMF-MALFORMED
HTTP:STC:IMG:PNG-IO
HTTP:STC:IMG:BMP-WIDTH-OF
HTTP:STC:IMG:BMP-HEADER-UF
HTTP:STC:IMG:WMF-MAL-HEADER
HTTP:STC:IMG:MAL-EMF
HTTP:STC:IMG:MAL-EMF-2
HTTP:STC:IMG:MAL-WMF-REC-OF
HTTP:STC:IMG:PICT-POLY-UF
HTTP:STC:IMG:TIFF-BOF
HTTP:STC:IMG:OFFICE-FLASHPIX
HTTP:STC:IMG:OFFICE-MAL-TIF
HTTP:STC:IMG:XP-MAL-TIFF
HTTP:STC:IMG:OFFICE-MAL-TIFF3
HTTP:STC:IMG:PAINT-JPEG-OF
HTTP:STC:IMG:PNG-TEXT
HTTP:STC:IMG:OFFICE-FLASHPIX2
HTTP:STC:IMG:KODAK-TIFF
HTTP:STC:IMG:JPEG-HEIGHT-OF
HTTP:STC:IMG:JAVA-GIF-MEM
HTTP:STC:IMG:LIBPNG-ROWS
HTTP:STC:IMG:JDK-ICC
HTTP:STC:IMG:GOOGLE-SKETCH-BMP
HTTP:STC:IMG:TFF-THUNDER
HTTP:STC:IMG:PICT-UNCOMP-UF
HTTP:STC:IMG:WMF-METASPLOIT
HTTP:STC:IMG:ICO-SIZE-OF
HTTP:STC:IMG:ANI-FILE-DOS
HTTP:STC:IMG:MS-GIFGDI-OF
HTTP:STC:IMG:BMP-HDR-IO
HTTP:STC:IMG:LIBPNG-CHUNK-OV
HTTP:STC:IMG:PNG-WIDTH
HTTP:STC:IMG:WMF-METASPLOIT2
HTTP:STC:IMG:SUN-JAVA-PNG-BOF
HTTP:STC:IMG:JPEGDECODERAW-FUNC
HTTP:STC:IMG:ANI-BLOCK-STR2
HTTP:STC:IMG:PHP-AS-GIF
HTTP:STC:IMG:EMF-DOWNLOAD
HTTP:STC:IMG:PNG-HEIGHT
HTTP:STC:IMG:JPEG-SCRIPT
HTTP:STC:IMG:WMF-METASPLOIT-GZ
HTTP:STC:IMG:MS-BMP-OF
HTTP:STC:IMG:WMF-DOWNLOAD
HTTP:STC:IMG:JPEG-WIDTH-OF
HTTP:STC:IMG:NOT-JPG-GIF-PNG
HTTP:STC:IMG:WPG-HEAP-OVF
HTTP:STC:IMG:MALFORMED-EMF-TAG
HTTP:STC:IMG:MS-OFFICE-GIF
HTTP:STC:IMG:JPEG-MAL-MARKER
HTTP:STC:IMG:WMF-SETPALETTE
HTTP:STC:IMG:EXE-FOR-IMG-TYPE
HTTP:STC:IMG:TARGA-IMG-HEAP
HTTP:STC:IMG:EXE-FOR-IMAGE
HTTP:STC:IMG:EXE-IN-IMAGE
HTTP:STC:IMG:PNG-CHUNK-OF

HTTP:STC:IMG:JPEG

HTTP:STC:IMG:JPEG:WIN-COLOR

HTTP:STC:JAVA

HTTP:STC:JAVA:JNLP-OF
HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC
HTTP:STC:JAVA:SIGVERIFY-BYPASS
HTTP:STC:JAVA:NXT-UPDTE-RA
HTTP:STC:JAVA:GIF-MEMCORRUPT
HTTP:STC:JAVA:JPEGIMGEWRITER-MC
HTTP:STC:JAVA:JAVA-VM-ARGS-OF
HTTP:STC:JAVA:JNLP-CHARSET-OF
HTTP:STC:JAVA:HOTSPOT-BCODE-RCE
HTTP:STC:JAVA:IMGLIB-LOOKUPBYTE
HTTP:STC:JAVA:JPEGIMAGE-OF
HTTP:STC:JAVA:RUNTIME-ENV-BO
HTTP:STC:JAVA:CLAS-VERIFY-ABORT
HTTP:STC:JAVA:SETPIXEL-INF-DISC
HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC
HTTP:STC:JAVA:JAR-PROCESS-OF
HTTP:STC:JAVA:JAR-FILE-DOWNLOAD
HTTP:STC:JAVA:GETSOUNDBANK-OF
HTTP:STC:JAVA:BEAST-WEBSOCKET
HTTP:STC:JAVA:BASICSERVICEIMPL
HTTP:STC:JAVA:JNDI-BYPASS
HTTP:STC:JAVA:ORA-BYTECODE-CE
HTTP:STC:JAVA:SETDIFFICM-BOF
HTTP:STC:JAVA:JRE-CAL-PRIV-ESLN
HTTP:STC:JAVA:JRE-IMG-PARS-DOS
HTTP:STC:JAVA:WEBSTART
HTTP:STC:JAVA:APPLET-CLASS-FILE
HTTP:STC:JAVA:ORACLE-IMGLIB-OVF
HTTP:STC:JAVA:CONCHASHMAP
HTTP:STC:JAVA:SEC-SLIDER-BYPASS
HTTP:STC:JAVA:FINAL-FIELD-OW
HTTP:STC:JAVA:IBM-CLASS-LDR-RCE
HTTP:STC:JAVA:JAX-WS-RCE
HTTP:STC:JAVA:SQL-DRIVERMANAGER
HTTP:STC:JAVA:MAL-JNLP-FILE
HTTP:STC:JAVA:FONT-PROCESSING
HTTP:STC:JAVA:PRVDR-SKLTON-SB
HTTP:STC:JAVA:IBM-RMI-PROXY-RCE
HTTP:STC:JAVA:APPLET-REFLECTRCE
HTTP:STC:JAVA:FONT-PARSING
HTTP:STC:JAVA:MORT-LIGATURE-BO
HTTP:STC:JAVA:APPLET-RCE
HTTP:STC:JAVA:LOOKUPBYTEBI-MC
HTTP:STC:JAVA:METHODHANDLE
HTTP:STC:JAVA:IMG-INTEGER-MC
HTTP:STC:JAVA:STOREIMG-ARRAY-BO
HTTP:STC:JAVA:JMX-FINDCLASS-RCE
HTTP:STC:JAVA:IMG-SETPIXELS-OF
HTTP:STC:JAVA:GSUB-TABLE-BO
HTTP:STC:JAVA:JRE-MEM-DISC
HTTP:STC:JAVA:TRUE-TYPE-FONT-OF
HTTP:STC:JAVA:TYPECONF
HTTP:STC:JAVA:SHORT-COMPONENT
HTTP:STC:JAVA:FONT-HANDLNG-BO
HTTP:STC:JAVA:JMXMBEAN-RCE
HTTP:STC:JAVA:JAVADEPLOY-RCE
HTTP:STC:JAVA:PHANTOM-OBJ-RCE
HTTP:STC:JAVA:IBM-CLASS-RCE
HTTP:STC:JAVA:TYPE1-FONT
HTTP:STC:JAVA:SANDBOX-BYPASS
HTTP:STC:JAVA:DOCBASE-BOF
HTTP:STC:JAVA:SIGNED-APPLET-CE
HTTP:STC:JAVA:ATOMIC-SB-BREACH
HTTP:STC:JAVA:GSUB-BOF
HTTP:STC:JAVA:MIXERSEQ-OF
HTTP:STC:JAVA:PACK200-INT

HTTP:STC:MOZILLA

HTTP:STC:MOZILLA:FIRESEARCH
HTTP:STC:MOZILLA:JIT-ESCAPE-MC
HTTP:STC:MOZILLA:MAL-REG-EX
HTTP:STC:MOZILLA:FIREFLASH
HTTP:STC:MOZILLA:WGL-BUFFERDATA
HTTP:STC:MOZILLA:MESA-TEXIMG2D
HTTP:STC:MOZILLA:URL-SHRTCUT
HTTP:STC:MOZILLA:IFRAME-STYLE
HTTP:STC:MOZILLA:CONSTRUCTFRAME
HTTP:STC:MOZILLA:SHELL
HTTP:STC:MOZILLA:FIREBURN
HTTP:STC:MOZILLA:URLBAR-RCE
HTTP:STC:MOZILLA:SKYPE-EXT-CLIP
HTTP:STC:MOZILLA:WRAPPED-JAVA
HTTP:STC:MOZILLA:FF2-VS-INF-DIS
HTTP:STC:MOZILLA:IFRAME-SRC
HTTP:STC:MOZILLA:FF-COMPARTMENT
HTTP:STC:MOZILLA:SVG-CODE-INJ
HTTP:STC:MOZILLA:DEFINESETTER
HTTP:STC:MOZILLA:FIREFOX-DOS
HTTP:STC:MOZILLA:SIDEBAR
HTTP:STC:MOZILLA:MAL-SVG-INDEX
HTTP:STC:MOZILLA:FF-WYCIWYG
HTTP:STC:MOZILLA:CSSVALUE-MEM
HTTP:STC:MOZILLA:MOZ-TAG-ORDER
HTTP:STC:MOZILLA:ICONURL-JS
HTTP:STC:MOZILLA:SVG-DATA
HTTP:STC:MOZILLA:TITLE-OF
HTTP:STC:MOZILLA:SVG-XML-INT-OF
HTTP:STC:MOZILLA:CHROME-PRIVESC
HTTP:STC:MOZILLA:SSL-ICON
HTTP:STC:MOZILLA:ONKEYDOWN-FU
HTTP:STC:MOZILLA:FIREFOX-ENG-MC
HTTP:STC:MOZILLA:CONTENT-INJECT
HTTP:STC:MOZILLA:REDUCE-RIGHT
HTTP:STC:MOZILLA:MOZ-BINDING
HTTP:STC:MOZILLA:SHAREDWORK-UAF
HTTP:STC:MOZILLA:PARAM-OF
HTTP:STC:MOZILLA:CANVAS-BO
HTTP:STC:MOZILLA:FF-ARRAY-SLICE
HTTP:STC:MOZILLA:PKCS11-RCE
HTTP:STC:MOZILLA:TABLE-BG-UAF
HTTP:STC:MOZILLA:LAYOUT-HEAP-OF
HTTP:STC:MOZILLA:SVG-RCE
HTTP:STC:MOZILLA:OGG-VORBIS
HTTP:STC:MOZILLA:PROPTAB-MEM
HTTP:STC:MOZILLA:OBJ-TYPE-CURR
HTTP:STC:MOZILLA:FF-INFO
HTTP:STC:MOZILLA:XUL-DLL-DOS
HTTP:STC:MOZILLA:SOAPPARAM-OF
HTTP:STC:MOZILLA:FF-SELECT-UAF
HTTP:STC:MOZILLA:PLUGINSPAGE-CE
HTTP:STC:MOZILLA:RDF-FILE-MC
HTTP:STC:MOZILLA:FF-DESGNMD-DOS
HTTP:STC:MOZILLA:FF-ADDR-SPOOF
HTTP:STC:MOZILLA:FF-HTML-PS-DOS
HTTP:STC:MOZILLA:ONSTARTREQUEST
HTTP:STC:MOZILLA:WINDOWS-PRINT
HTTP:STC:MOZILLA:FF-KEYGEN-DOS
HTTP:STC:MOZILLA:FF-LAYOUT-MC
HTTP:STC:MOZILLA:FF-RANGESCRIPT
HTTP:STC:MOZILLA:FF-ERROR-INFO
HTTP:STC:MOZILLA:FF-ONUNLOAD
HTTP:STC:MOZILLA:FF-URL-SPOOF
HTTP:STC:MOZILLA:FF-UI-NULL-PTR
HTTP:STC:MOZILLA:FF-JSFRAME-DOS
HTTP:STC:MOZILLA:FF-SIDEBAR-DOS
HTTP:STC:MOZILLA:FF-ABT-BLK-SPF
HTTP:STC:MOZILLA:FF-XDG-OPEN
HTTP:STC:MOZILLA:TABLE-FRAMES
HTTP:STC:MOZILLA:DOMNODEREMOVED
HTTP:STC:MOZILLA:QUERYINT-OF
HTTP:STC:MOZILLA:FF-IMG-TAG-DOS
HTTP:STC:MOZILLA:OFFSET-MEM-COR
HTTP:STC:MOZILLA:CLEARTEXTRUN
HTTP:STC:MOZILLA:FF-REMOTE-MC
HTTP:STC:MOZILLA:GIF89A-EXT
HTTP:STC:MOZILLA:EVENT-DLOAD
HTTP:STC:MOZILLA:INNER-HTML-DOS
HTTP:STC:MOZILLA:NONASCII-LINK
HTTP:STC:MOZILLA:FF-ACTION-PROM
HTTP:STC:MOZILLA:XBL-METHD-EVAL
HTTP:STC:MOZILLA:HOST-MAL-IDN
HTTP:STC:MOZILLA:XUL-NULL-MENU
HTTP:STC:MOZILLA:FIREFOX-XPCOM
HTTP:STC:MOZILLA:FIRE-FAVICON
HTTP:STC:MOZILLA:FF2-DIR-TRAV
HTTP:STC:MOZILLA:FF-TOSOURCE
HTTP:STC:MOZILLA:SVG-CLIPPATH
HTTP:STC:MOZILLA:FF-XSL-TRANS
HTTP:STC:MOZILLA:XML-MEM-CORR
HTTP:STC:MOZILLA:LAYOUT-MC
HTTP:STC:MOZILLA:MOZ-GRID-DOS
HTTP:STC:MOZILLA:FF-PLUGINSPAGE
HTTP:STC:MOZILLA:SVG-IN-XBL-UAF
HTTP:STC:MOZILLA:DUP-LOC-HEADER
HTTP:STC:MOZILLA:NSCSSVALUE-OF
HTTP:STC:MOZILLA:ADDON-RCE
HTTP:STC:MOZILLA:FIREFOX-MC
HTTP:STC:MOZILLA:FF-DEL-OBJ-REF
HTTP:STC:MOZILLA:OVERFLOW-EVENT
HTTP:STC:MOZILLA:TYPE-OBJ-RCE
HTTP:STC:MOZILLA:HTML-JS-DOS
HTTP:STC:MOZILLA:PLUGIN-ACL
HTTP:STC:MOZILLA:XSLT-FILE-DOS
HTTP:STC:MOZILLA:LOCATION-HOST
HTTP:STC:MOZILLA:FF2-PM-INF-DIS
HTTP:STC:MOZILLA:MOZ-FLOAT-OF
HTTP:STC:MOZILLA:READYSTATE-UAF
HTTP:STC:MOZILLA:XUL-TREE
HTTP:STC:MOZILLA:DOMSVGLNGTH
HTTP:STC:MOZILLA:STR-REPLACE
HTTP:STC:MOZILLA:ONUNLOAD-SSL
HTTP:STC:MOZILLA:FRAME-COMMENT
HTTP:STC:MOZILLA:NAV-OBJ-EXEC
HTTP:STC:MOZILLA:JS-EVAL
HTTP:STC:MOZILLA:ARRAY-DANGLE
HTTP:STC:MOZILLA:DOC-WRITE-MC
HTTP:STC:MOZILLA:FIREUNICODE
HTTP:STC:MOZILLA:ARGMNT-FUNC-CE
HTTP:STC:MOZILLA:FIREFOX-NSTREE
HTTP:STC:MOZILLA:XUL-FRAMETREE
HTTP:STC:MOZILLA:XRAYWRAPPER-SB
HTTP:STC:MOZILLA:STR-RPLACE-MEM
HTTP:STC:MOZILLA:FIREFOX-INPUT
HTTP:STC:MOZILLA:JSCRIPT-CLIP
HTTP:STC:MOZILLA:THUNDERBIRD-JS
HTTP:STC:MOZILLA:MCHANNEL-UAF
HTTP:STC:MOZILLA:XBL-TAG-RM
HTTP:STC:MOZILLA:NNTP-URL

HTTP:STC:NORTON

HTTP:STC:NORTON:LAUNCHURL-HTTP
HTTP:STC:NORTON:NAV-AX-DOS

HTTP:STC:OPERA

HTTP:STC:OPERA:OPERA-CONFIG
HTTP:STC:OPERA:DOCUMENT-WRITE
HTTP:STC:OPERA:FILE-URL-OF
HTTP:STC:OPERA:TREE-TRAVERSE-MC
HTTP:STC:OPERA:JPG-DHT-MC
HTTP:STC:OPERA:11.11-DOS
HTTP:STC:OPERA:NULL-PTR-DOS
HTTP:STC:OPERA:ESCAPE-SEQ-DOS
HTTP:STC:OPERA:SEARCH-HIST
HTTP:STC:OPERA:ADDR-BAR-URI-SPF
HTTP:STC:OPERA:HTML-CANVAS-RCE
HTTP:STC:OPERA:GIF-PROC-MC
HTTP:STC:OPERA:LINKS-PANEL-XSS
HTTP:STC:OPERA:SVG-CLIPPATH-MC
HTTP:STC:OPERA:HREF-TAG-DOS
HTTP:STC:OPERA:TELNET-URI
HTTP:STC:OPERA:GETIMAGEDATA-MC
HTTP:STC:OPERA:SVG-ANIMATION
HTTP:STC:OPERA:DOC-STYLSHET-DOS
HTTP:STC:OPERA:ALERTBOX-BOVF

HTTP:STC:OUTLOOK

HTTP:STC:OUTLOOK:SHELL-PROFILE
HTTP:STC:OUTLOOK:WABFILE-STC
HTTP:STC:OUTLOOK:WABFILE
HTTP:STC:OUTLOOK:WAB-BOF
HTTP:STC:OUTLOOK:MAILTO-QUOT-CE
HTTP:STC:OUTLOOK:OUTLOOK-PRF

HTTP:STC:SAFARI

HTTP:STC:SAFARI:HELP-RUNSCRPT
HTTP:STC:SAFARI:SSH-URI
HTTP:STC:SAFARI:DISK-URI
HTTP:STC:SAFARI:WEBKIT-SVG-MARK
HTTP:STC:SAFARI:MAL-REGEX
HTTP:STC:SAFARI:MUL-FUNC-DOS
HTTP:STC:SAFARI:CHARSET-XFORM
HTTP:STC:SAFARI:CHILD-REMOVAL
HTTP:STC:SAFARI:WEBKIT-SVG-MC
HTTP:STC:SAFARI:RUNIN-UAF
HTTP:STC:SAFARI:IMG-USE-FREE
HTTP:STC:SAFARI:JSARR-SORT-HOVF
HTTP:STC:SAFARI:WEBKIT-FREE-CE
HTTP:STC:SAFARI:FILE-URI
HTTP:STC:SAFARI:WEBKIT-TITLE
HTTP:STC:SAFARI:IPHONE-LIBTIFF
HTTP:STC:SAFARI:WEBKIT-1ST-LTR
HTTP:STC:SAFARI:FLOAT-BOF
HTTP:STC:SAFARI:JS-EVAL-DOS
HTTP:STC:SAFARI:WEBKIT-STYLE
HTTP:STC:SAFARI:KHTMLPARSER-BOF
HTTP:STC:SAFARI:MAL-URI-DOS
HTTP:STC:SAFARI:WEBKIT-XSS
HTTP:STC:SAFARI:WEBKIT-KHTMLDOS
HTTP:STC:SAFARI:DOC-LOCATION-BO
HTTP:STC:SAFARI:IPHONE-ALERT
HTTP:STC:SAFARI:WEBKIT-INFO-DIS
HTTP:STC:SAFARI:TIMEOUT-SPOOF
HTTP:STC:SAFARI:IOS-JS-ARY-RCE
HTTP:STC:SAFARI:CSS-IMG-DOS
HTTP:STC:SAFARI:ENTITY-INFODISC
HTTP:STC:SAFARI:CONSOLE-LOG-FS
HTTP:STC:SAFARI:ADDR-BOOK-INFO
HTTP:STC:SAFARI:WEBKIT-COLUMN
HTTP:STC:SAFARI:XML-INFI-RECUR
HTTP:STC:SAFARI:CMD-INJECTION
HTTP:STC:SAFARI:X-MAN-PAGE-RCE
HTTP:STC:SAFARI:WEBKIT-AFREE
HTTP:STC:SAFARI:WEBKIT-MENU-MEM
HTTP:STC:SAFARI:WEBKIT-ELEMENTS
HTTP:STC:SAFARI:RTL-USE-FREE
HTTP:STC:SAFARI:PARENT-CLOSE
HTTP:STC:SAFARI:WEBKIT-RANGEOBJ
HTTP:STC:SAFARI:INNERHTML-MC
HTTP:STC:SAFARI:WEBKIT-LIBXSLT
HTTP:STC:SAFARI:CSS-FORMAT-HINT
HTTP:STC:SAFARI:CONT-EDITABLE
HTTP:STC:SAFARI:FEED-URI
HTTP:STC:SAFARI:WEBKIT-RENDER

HTTP:STC:SCRIPT

HTTP:STC:SCRIPT:REBOTS-DOT-PHP
HTTP:STC:SCRIPT:DEFINATION-HEAP
HTTP:STC:SCRIPT:DOUBLE-BACKSLAS
HTTP:STC:SCRIPT:UNESCAPE-HEX-OB
HTTP:STC:SCRIPT:REPLACE-OBSF
HTTP:STC:SCRIPT:SVL-DBL-FREE
HTTP:STC:SCRIPT:HEAPLIB-OBJ
HTTP:STC:SCRIPT:FUNC-REASSIGN
HTTP:STC:SCRIPT:MULTI-CHAR
HTTP:STC:SCRIPT:EVAL-GIF-JSOBF
HTTP:STC:SCRIPT:OBFUSCATED
HTTP:STC:SCRIPT:HTML-SCRIPT
HTTP:STC:SCRIPT:NONALPHANUMERIC
HTTP:STC:SCRIPT:APACHE-XML-DOS
HTTP:STC:SCRIPT:PAYLOAD-SETUP
HTTP:STC:SCRIPT:PYTHON-RECVFROM
HTTP:STC:SCRIPT:JAVA-EVASION
HTTP:STC:SCRIPT:EDWARDS-PACKER
HTTP:STC:SCRIPT:SPLIT-REVERSE
HTTP:STC:SCRIPT:JS-RANDOM-ENCOD
HTTP:STC:SCRIPT:JS-RENAME
HTTP:STC:SCRIPT:FROMCC-OBFUS
HTTP:STC:SCRIPT:MUL-OBJECT-TAGS
HTTP:STC:SCRIPT:MS-JS-OBFUS
HTTP:STC:SCRIPT:JS-STRING-OBFS
HTTP:STC:SCRIPT:JSOBF-PLUGINVER
HTTP:STC:SCRIPT:MATH-LIB
HTTP:STC:SCRIPT:UNICODE-SLED
HTTP:STC:SCRIPT:JS-PACKER
HTTP:STC:SCRIPT:COOKIE-BOMB
HTTP:STC:SCRIPT:JS-OBFUS-ROUTIN
HTTP:STC:SCRIPT:HEAPSPRAY
HTTP:STC:SCRIPT:JS-OB-ROUTIN-1
HTTP:STC:SCRIPT:EVAL-OBFUSC
HTTP:STC:SCRIPT:JS-OB-IFRAMER
HTTP:STC:SCRIPT:JS-OB-EXPLOIT
HTTP:STC:SCRIPT:JS-MYOBFUSCATE
HTTP:STC:SCRIPT:JS-ARRAY-POST
HTTP:STC:SCRIPT:DIV-N-FUNC-OBFU
HTTP:STC:SCRIPT:MAL-FILE-HNDRCE
HTTP:STC:SCRIPT:VB-REGX-ID
HTTP:STC:SCRIPT:UNESCAPE-OBFUS
HTTP:STC:SCRIPT:UUENCODED-EVAL
HTTP:STC:SCRIPT:BASE64-ENCODED
HTTP:STC:SCRIPT:JSEVAL-GEN-TECH
HTTP:STC:SCRIPT:VAR-HEAP-SHELL
HTTP:STC:SCRIPT:CHAR-ENCODING
HTTP:STC:SCRIPT:MUL-TAG-RTF-OBJ

HTTP:STC:SRVRSP

HTTP:STC:SRVRSP:COMPRESSED
HTTP:STC:SRVRSP:403-FORBID
HTTP:STC:SRVRSP:404-NOT-FOUND
HTTP:STC:SRVRSP:IDC-PATH
HTTP:STC:SRVRSP:AUTH-RESP-OF

HTTP:STC:SSL

HTTP:STC:SSL:MD5-SIGNATURE

HTTP:STC:STREAM

HTTP:STC:STREAM:CONTENT-TYPE
HTTP:STC:STREAM:WMV
HTTP:STC:STREAM:AVI
HTTP:STC:STREAM:SWF
HTTP:STC:STREAM:FLV
HTTP:STC:STREAM:QT-IT-MEM
HTTP:STC:STREAM:FLASH-MEMORY
HTTP:STC:STREAM:SHOCKWAVE-IO
HTTP:STC:STREAM:QT-MPEG-PAD
HTTP:STC:STREAM:REALPLAYER-MP3
HTTP:STC:STREAM:QUICKTIME-BO
HTTP:STC:STREAM:REAL-MP4-MEM
HTTP:STC:STREAM:QT-DESC-ATOM
HTTP:STC:STREAM:QT-M3U
HTTP:STC:STREAM:DIRSHOW-MJPEG
HTTP:STC:STREAM:DIRECTSHOW-MJPG
HTTP:STC:STREAM:QT-MOV-IO
HTTP:STC:STREAM:QT-RESPONSE-BO
HTTP:STC:STREAM:REAL-AVI
HTTP:STC:STREAM:APPLE-QT-OBO-BO
HTTP:STC:STREAM:WINAMP-META-OF
HTTP:STC:STREAM:QT-FLASHPIX-OF
HTTP:STC:STREAM:REALAUDIO-OF
HTTP:STC:STREAM:REALPLAYER-QCP
HTTP:STC:STREAM:QT-HREFTRACK
HTTP:STC:STREAM:QT-FF
HTTP:STC:STREAM:QT-MAL-SMIL
HTTP:STC:STREAM:QT-MOV-FILE-BOF
HTTP:STC:STREAM:VLC-REALINDEX
HTTP:STC:STREAM:ASF-BOF
HTTP:STC:STREAM:GDI-WMF-HEADER
HTTP:STC:STREAM:MAL-MEDIA
HTTP:STC:STREAM:REALMEDIA-PROC
HTTP:STC:STREAM:DIRECTX-MJPEG
HTTP:STC:STREAM:FFDSHOW-URL-OF
HTTP:STC:STREAM:DIRECTSHOW-MP3
HTTP:STC:STREAM:ASF-WMP
HTTP:STC:STREAM:MAL-AVI-RIFF
HTTP:STC:STREAM:CINEPAK-RCE

HTTP:STC:SWF

HTTP:STC:SWF:MAL-SWF-OF
HTTP:STC:SWF:FLASH-MEM-CORRUPT
HTTP:STC:SWF:REAL-FLV
HTTP:STC:SWF:HEAP-OF
HTTP:STC:SWF:PHPEXEC
HTTP:STC:SWF:ACTIONTAG
HTTP:STC:SWF:CVE-2014-0585-CE
HTTP:STC:SWF:CVE-2013-3362-MC
HTTP:STC:SWF:REC-S-OF
HTTP:STC:SWF:UNDEF-NS
HTTP:STC:SWF:BYTEARRAY
HTTP:STC:SWF:AS-POOL
HTTP:STC:SWF:PLACEOBJX
HTTP:STC:SWF:STAGE3D
HTTP:STC:SWF:SIZE-MIS
HTTP:STC:SWF:TEXT-IOF
HTTP:STC:SWF:OPENTYPE-FONT-OF
HTTP:STC:SWF:RESOURCEMODULEURLS
HTTP:STC:SWF:FLASH-SALIGN
HTTP:STC:SWF:FLASH-DEFINEFONT
HTTP:STC:SWF:URL-SEC-DOM-RCE
HTTP:STC:SWF:SWAVE-TSAC-CHUNK
HTTP:STC:SWF:KEY-PRESS-EVENT
HTTP:STC:SWF:ADOBE-FLASH-FILEBO
HTTP:STC:SWF:SHARED-OBJ-UAF
HTTP:STC:SWF:MEM-DISC
HTTP:STC:SWF:HEADER-MEM-RCE
HTTP:STC:SWF:FLASHPLAYER-OF
HTTP:STC:SWF:CVE-2014-0510-MC
HTTP:STC:SWF:COPYRAWDATATO
HTTP:STC:SWF:DEFSCENE-OF

HTTP:STC:VULN

HTTP:STC:VULN:CHEROKEE-0-4-17-1
HTTP:STC:VULN:IMAIL-8-13
HTTP:STC:VULN:WEBLOGIC-8-1
HTTP:STC:VULN:APACHE-1-3-28
HTTP:STC:VULN:APACHE-1-3-26-31
HTTP:STC:VULN:APACHE-2-0-52
HTTP:STC:VULN:OUTLOOK-XSRF
HTTP:STC:VULN:TAG-BDO

HTTP:STC:WINAMP

HTTP:STC:WINAMP:AU-OF1
HTTP:STC:WINAMP:ID3V2-OVERFLOW
HTTP:STC:WINAMP:ULTRAVOX-MSG
HTTP:STC:WINAMP:M3U-BOF
HTTP:STC:WINAMP:MAKI-SCRIPT-OF
HTTP:STC:WINAMP:MAKI-PARSE-OF
HTTP:STC:WINAMP:5.61-DOS
HTTP:STC:WINAMP:CDDA-OF3
HTTP:STC:WINAMP:CDDA-OF
HTTP:STC:WINAMP:MOD-HDR-OF

HTTP:STREAM

HTTP:STREAM:STARTV-STREAM
HTTP:STREAM:FLV
HTTP:STREAM:AAJTAK-STREAM
HTTP:STREAM:YOUTUBE-REQ
HTTP:STREAM:VIDEO-CONTENT
HTTP:STREAM:QUICKTIME-CLIENT
HTTP:STREAM:GOOGLE-VIDEO
HTTP:STREAM:ITUNES-USERAGENT
HTTP:STREAM:MAGIX-OF

HTTP:TOMCAT

HTTP:TOMCAT:JSP-PAGE
HTTP:TOMCAT:JSP-COMMENTS
HTTP:TOMCAT:SERVLET-DEVICE-DOS
HTTP:TOMCAT:REAL-PATH-REQ
HTTP:TOMCAT:JSP-BUFFER
HTTP:TOMCAT:REAL-PATH-DISC
HTTP:TOMCAT:JSP-AS-HTML
HTTP:TOMCAT:SOURCE-MAL-REQ
HTTP:TOMCAT:XPL-FILE-DISC
HTTP:TOMCAT:DIR-TRAV
HTTP:TOMCAT:DIR-LIST-INFO-DISCL
HTTP:TOMCAT:JSP-DEC-INT-OF
HTTP:TOMCAT:ADMIN-SCAN
HTTP:TOMCAT:TOMCAT-JSP-DISC
HTTP:TOMCAT:FORM-AUTHENTICATION
HTTP:TOMCAT:AJP12-SHUTDOWN
HTTP:TOMCAT:AWSTATS-CFG-EXEC
HTTP:TOMCAT:POLICY-BYPASS
HTTP:TOMCAT:URL-ENC-DIRTRAV

HTTP:TUNNEL

HTTP:TUNNEL:CHAT-YIM
HTTP:TUNNEL:ALTNET-OVER-HTTP
HTTP:TUNNEL:CHAT-AOL-IM
HTTP:TUNNEL:TELNET
HTTP:TUNNEL:PROXY
HTTP:TUNNEL:HTTPTUNNEL-URL
HTTP:TUNNEL:SIP
HTTP:TUNNEL:CHAT-MSN-IM-SSL
HTTP:TUNNEL:REDUH
HTTP:TUNNEL:ANCHORFREE-CLIENT
HTTP:TUNNEL:SMTP
HTTP:TUNNEL:CHAT-MSN-IM

HTTP:UA

HTTP:UA:SKIPFISH
HTTP:UA:WGET
HTTP:UA:CURL
HTTP:UA:GOOGLEBOT
HTTP:UA:MSN-BINGBOT
HTTP:UA:MOREOVER
HTTP:UA:NUTCH
HTTP:UA:ATOMIC-EMAIL-HUNTER
HTTP:UA:PBROWSE
HTTP:UA:EMAILSPIDER
HTTP:UA:AUTO-EMAIL-PRO
HTTP:UA:NSAUDITOR
HTTP:UA:DSURF
HTTP:UA:EMAILSIPHON-COLLECTOR
HTTP:UA:EMAILWOLF-COLLECTOR
HTTP:UA:EXTRACTOR-PRO
HTTP:UA:PHP-BASE64-DECODE
HTTP:UA:CONTACTBOT-COLLECTOR
HTTP:UA:MOBILE
HTTP:UA:CRAZY-BROWSER
HTTP:UA:PHP-CODE-INJ

HTTP:UNIX-CMD

HTTP:UNIX-CMD:UNIX-CMD-M-Z
HTTP:UNIX-CMD:UNIX-CMD-A-L

HTTP:UNIX-FILE

HTTP:UNIX-FILE:ETC-HOSTS-ALLOW
HTTP:UNIX-FILE:ETC-PASSWD

HTTP:WASD

HTTP:WASD:DIR-TRAV
HTTP:WASD:CONF-ACCESS

HTTP:WEBLOGIC

HTTP:WEBLOGIC:WEBROOT
HTTP:WEBLOGIC:ENCODING
HTTP:WEBLOGIC:BEAPACHE
HTTP:WEBLOGIC:JSESSIONID
HTTP:WEBLOGIC:BEA-CONN-BOF
HTTP:WEBLOGIC:CONSOLE-HELP-PORT
HTTP:WEBLOGIC:URL-REVEAL-SRC

HTTP:WEBSPHERE

HTTP:WEBSPHERE:VER-DOS
HTTP:WEBSPHERE:SERVER-OF
HTTP:WEBSPHERE:APP-SERVER-REQ

HTTP:WEBSTER

HTTP:WEBSTER:DIR-TRAVERSAL
HTTP:WEBSTER:LONG-GET-REQ

HTTP:WHATSUP

HTTP:WHATSUP:WEB-SQL-INJECT
HTTP:WHATSUP:INSTANCENAME-OF
HTTP:WHATSUP:DOS-DEV-DOS

HTTP:WIN-CMD

HTTP:WIN-CMD:ROOT.EXE

HTTP:XSS

HTTP:XSS:MERCURY-BOARD
HTTP:XSS:MAILMAN-ADMIN
HTTP:XSS:SHAREPOINT-XSS
HTTP:XSS:YOAST-WP
HTTP:XSS:NASA-TRACE
HTTP:XSS:WEB-VIEW-DOC-SCR-INJ
HTTP:XSS:ORACLE-GLASSFISH
HTTP:XSS:WHITE-LABEL-CMS
HTTP:XSS:MS-FOREFRONT-INFO-DISC
HTTP:XSS:CA-SITEMINDER-OLUNICDE
HTTP:XSS:MS-MULT-APPLICATION
HTTP:XSS:HP-INTELLIGENT-MNGT
HTTP:XSS:WP-YT-AUDIO
HTTP:XSS:HTW-XSS
HTTP:XSS:APACHE-SSI-XSS
HTTP:XSS:ANWIKI-XSS
HTTP:XSS:IBM-RATIONAL-CLEARCASE
HTTP:XSS:JOOMLA-COM-RESMAN
HTTP:XSS:TOMCAT-JSP
HTTP:XSS:COLDFUSION-MX7
HTTP:XSS:CISCO-CSUSERCGIXSS
HTTP:XSS:CISCO-XSS
HTTP:XSS:JAVA-COM-EXP
HTTP:XSS:OUTLOOK-WEB-ACCESS
HTTP:XSS:WP-ESHOP
HTTP:XSS:ISA-AUTH-XSS
HTTP:XSS:SERVICE-CGI
HTTP:XSS:APACHE-MOD-NEGOTIATION
HTTP:XSS:PHPNUKE-BOOKMARKS
HTTP:XSS:ORACLE-ISQLPLUS
HTTP:XSS:WP-INLINE-GALLERY
HTTP:XSS:E2-PHOTO-GALLERY
HTTP:XSS:AWAUCTIONSCRIPT-CMS
HTTP:XSS:AFTERLOGIC-WEBMAIL-PRO
HTTP:XSS:WP-LIVE-WIRE-THEME
HTTP:XSS:CISCO-SESM
HTTP:XSS:SHARE-XSS
HTTP:XSS:DRUPAL-CUMULAS
HTTP:XSS:FRONTPAGE-EXT
HTTP:XSS:WP-SOCIALGRID
HTTP:XSS:WP-UNIVERSAL-POST
HTTP:XSS:WP-GAZETTE-THEME
HTTP:XSS:WP-PLACESTER
HTTP:XSS:MS-IE-TOSTATICHTML
HTTP:XSS:PACER-EDITION-EMAIL
HTTP:XSS:IIS-ASP
HTTP:XSS:WP-AJAX-CALENDAR
HTTP:XSS:WP-ZOTPRESS
HTTP:XSS:JOOMLA-CITY
HTTP:XSS:MS-FOREFRONT-EXCEL-TBL
HTTP:XSS:LDAP-ACCOUNT-MGR
HTTP:XSS:XOOPS-MULT
HTTP:XSS:INMAGIC-DBTWPUB
HTTP:XSS:WP-RATING-WIDGET
HTTP:XSS:SYM-GATEWAY-PHP-PAGE
HTTP:XSS:WP-WOOTHEMES
HTTP:XSS:MS-VSTWAC-TFS
HTTP:XSS:MS-SCOM-WEB-CONSOLE
HTTP:XSS:MS-W3WHO-XSS
HTTP:XSS:MS-SCCM-REFLECTED
HTTP:XSS:PHPWEBSITE-PAGE-ID
HTTP:XSS:MC-CONTENT-MANAGER
HTTP:XSS:ZEN-CART
HTTP:XSS:SYNDEO-CMS-ADDONS
HTTP:XSS:VBULLETIN-SORTORDER
HTTP:XSS:TM-REQUEST-FORGERY
HTTP:XSS:ROBOHELP-XSS
HTTP:XSS:CISCOWORKS-CSFHS-1
HTTP:XSS:CISCO-CSDC
HTTP:XSS:WP-COMICPRESS
HTTP:XSS:SUBRION-CMS
HTTP:XSS:IBM-OPEN-ADMIN
HTTP:XSS:US-ROBOTICS-FIRMWARE
HTTP:XSS:MAILMAN-OPTIONS
HTTP:XSS:SHAREPOINT-EDITFORM
HTTP:XSS:SHAREPOINT-WIZARDLIST
HTTP:XSS:SHAREPOINT-LIST-XSS
HTTP:XSS:SYMANTEC-WG
HTTP:XSS:HTML-SCRIPT-IN-HOST
HTTP:XSS:ADOBE-COLDF-SEARCHLOG
HTTP:XSS:MS-IE-CVE-2014-6328
HTTP:XSS:MS-OWA-MUTIPLE
HTTP:XSS:SHAREPOINT-INPLVIEW
HTTP:XSS:CMSQLITE-ID
HTTP:XSS:WP-IGIT-POSTS
HTTP:XSS:VBULLETIN-SORT
HTTP:XSS:WP-DAILY-MAUI-PHOTO
HTTP:XSS:SYM-IM-MANAGER
HTTP:XSS:WP-AJAX-CATEGORY
HTTP:XSS:WP-AJAX-RECENT-POSTS
HTTP:XSS:MUL-RECORDPRESS
HTTP:XSS:HTML-SCRIPT-IN-COOKIE
HTTP:XSS:FOREFRONT-SIGNURL
HTTP:XSS:SHAREPOINT-THEMEWEB
HTTP:XSS:AXIS-M10-CAMERA
HTTP:XSS:WP-SERMON-BROWSER
HTTP:XSS:XOOPS-VIEW-PHOTOS-PHP
HTTP:XSS:WP-PHOTORACER
HTTP:XSS:WP-PHOTO-ALBUM
HTTP:XSS:HP-SMH-REDIRCTURL
HTTP:XSS:WP-STATS-DASHBOARD
HTTP:XSS:ATUTOR-ACONTENT
HTTP:XSS:IBM-LOTUS-NOTES-TRAV
HTTP:XSS:BEA-ADMIN-CONSOLE
HTTP:XSS:MS-IE-XSS-BYPASS
HTTP:XSS:SUN-JAVA-CALENDAR
HTTP:XSS:ADOBE-COLDFUSION
HTTP:XSS:IE7-XSS
HTTP:XSS:IE-CVE-2015-0070
HTTP:XSS:NAGIOS-XI-ALERT-CLOUD
HTTP:XSS:ORACLE-BIEE-XSS
HTTP:XSS:HTML-HTW
HTTP:XSS:MS-OUTLOOK-REDIR-ASP
HTTP:XSS:TECHSMITH-SWF
HTTP:XSS:HTML-SCRIPT-IN-AE
HTTP:XSS:LINKSYS-WIRELESS
HTTP:XSS:HTML-SCRIPT-IN-AL
HTTP:XSS:SHAREPOINT-CALLBACK
HTTP:XSS:ASP-REQ-VALIDATION
HTTP:XSS:URL-IMG-XSS
HTTP:XSS:CPANEL-MODULES
HTTP:XSS:JAVA-IDENTITY-MGR
HTTP:XSS:IBM-LOTUS-DOMINO-XNSF
HTTP:XSS:WP-LOCAL-MARKET-EXP
HTTP:XSS:WP-LAZYEST-GALLERY
HTTP:XSS:WP-PHOTOSMASH-GAL
HTTP:XSS:HTML-SCRIPT-IN-URL-VAR
HTTP:XSS:CPANEL-FILEOP
HTTP:XSS:REALPLAYER-SMIL
HTTP:XSS:WP-FANCYBOX-PLUGIN
HTTP:XSS:MS-SHAREPOINT-PARAM
HTTP:XSS:CISCOWORKS-CSFHS
HTTP:XSS:HP-SEARCH-XSS
HTTP:XSS:X-FORWARDED-FOR-INJ
HTTP:XSS:SUSPICIOUS-SCAN
HTTP:XSS:HTML-SCRIPT-IN-POST
HTTP:XSS:ORACLE-REPORT-SVR
HTTP:XSS:DYNAMICAX-PORTAL-XSS
HTTP:XSS:MS-REPORT-MANAGER
HTTP:XSS:MS-CS
HTTP:XSS:SHAREPOINT-COMMAND
HTTP:XSS:IBM-LOTUS-SIMPLESEARCH
HTTP:XSS:MS-LYNC-SERVER
HTTP:XSS:CROOGO-CMS
HTTP:XSS:CKEDITOR-POSTEDDATAPHP
HTTP:XSS:HP-INSIGHT-ONLINE
HTTP:XSS:HTML-SCRIPT-IN-URL-PTH
HTTP:XSS:HTML-SCRIPT-HTTP-HDR
HTTP:XSS:MULTI-VENDOR
HTTP:XSS:HDR-REFERRER
HTTP:XSS:WORDPRESS-COMMENT
HTTP:XSS:WORDPRESS-COMMENTS-CE
HTTP:XSS:NOVELL-QUICKFINDER
HTTP:XSS:SYMANTEC-EP-PARAM-XSS
HTTP:XSS:MS-FOREFRONT-DEFAULT
HTTP:XSS:ARBORNETWORKS-PEAKFLOW
HTTP:XSS:SHAREPOINT-USER
HTTP:XSS:OUTLOOK-WEB
HTTP:XSS:SHAREPOINT-XSS-2
HTTP:XSS:HTML-SCRIPT-IN-UA
HTTP:XSS:IPLANET-ROOT
HTTP:XSS:MS-REPORT-VIEWER
HTTP:XSS:OMNIHTTPD-REDIR

HTTP:YAHOO

HTTP:YAHOO:ACTIVITY
HTTP:YAHOO:ATTACHMENT-UPLOAD
HTTP:YAHOO:ATTACHMENT-DOWNLOAD

ICMP

ICMP:MODEMS-ATH-COMMAND-DOS

ICMP:AUDIT

ICMP:AUDIT:RESP-WITHOUT-REQ
ICMP:AUDIT:RESPONSE-RESND
ICMP:AUDIT:REQUEST-RESND
ICMP:AUDIT:INVALID-CODE
ICMP:AUDIT:WRONG-CHECKSUM
ICMP:AUDIT:INVALID-TYPE
ICMP:AUDIT:ICMP-WITH-OPTIONS

ICMP:EXPLOIT

ICMP:EXPLOIT:DIFF-CSUM-IN-RESND
ICMP:EXPLOIT:FLOOD
ICMP:EXPLOIT:DIFF-LEN-IN-RESP
ICMP:EXPLOIT:DIFF-CSUM-IN-RESP
ICMP:EXPLOIT:NON-ZERO-DATA-LEN
ICMP:EXPLOIT:DIFF-LEN-IN-RESND
ICMP:EXPLOIT:LAN-SMURF
ICMP:EXPLOIT:MIP-ROUTE-OF
ICMP:EXPLOIT:ECHOK

ICMP:INFO

ICMP:INFO:TIMESTAMP
ICMP:INFO:INFORMATION
ICMP:INFO:ADDR-REQ
ICMP:INFO:ECHO-REPLY
ICMP:INFO:ECHO-REQUEST

IDENT

IDENT:GEWSE-FLOOD
IDENT:TINYIDENT-OF

IDENT:AUDIT

IDENT:AUDIT:PORT-PAIR
IDENT:AUDIT:NEST-REQ
IDENT:AUDIT:RESPONSE

IDENT:INVALID

IDENT:INVALID:EMPTY-LN
IDENT:INVALID:EOL
IDENT:INVALID:SENDMAIL-EXPL

IDENT:JIDENTD

IDENT:JIDENTD:IDENT-OF1

IDENT:OVERFLOW

IDENT:OVERFLOW:REQUEST-NUM
IDENT:OVERFLOW:REPLY
IDENT:OVERFLOW:REQUEST

IKE

IKE:FW1-OVERFLOW
IKE:INV-DER-LEN
IKE:SA-DELETE
IKE:STRONGSWAN-CERTIFICATE-BO
IKE:OPENSWAN-DPD-NULL-PTR-DOS
IKE:SYMANTEC-ISAKMPD-DOS
IKE:KAME-RACOON-X509-CERT-VERIF

IKE:DOS

IKE:DOS:CISCO-DOS
IKE:DOS:TCPDUMP-ID-UNDERFLOW
IKE:DOS:WIN2K-DOS
IKE:DOS:TCPDUMP-SPI-OVERFLOW
IKE:DOS:TCP-HUMP
IKE:DOS:ISAKMP-DOS-IPSEC
IKE:DOS:OPENBSD-ISAKMPD
IKE:DOS:ISAKMP-DOS

IKE:MALFORMED

IKE:MALFORMED:PACKET
IKE:MALFORMED:2MANY-PAYLOAD
IKE:MALFORMED:INV-PAYLOAD-TYPE
IKE:MALFORMED:INV-PAY-LEN

IMAP

IMAP:SET-QUOTA
IMAP:LOTUS-CRAM
IMAP:MER-SUBSCRIBE
IMAP:AUTH-OF

IMAP:AUDIT

IMAP:AUDIT:LOGIN-FAILED
IMAP:AUDIT:REQ-UNKNOWN-CMD
IMAP:AUDIT:REQ-INVALID-STATE
IMAP:AUDIT:COMMAND-FAILED
IMAP:AUDIT:REQ-BINARY-DATA
IMAP:AUDIT:IMAPS-CLEAR

IMAP:CYRUS

IMAP:CYRUS:PRELOG
IMAP:CYRUS:FETCH-CMD
IMAP:CYRUS:PARTIAL-CMD
IMAP:CYRUS:LOGIN-OF

IMAP:EXPLOIT

IMAP:EXPLOIT:NETMAIL-APPEND
IMAP:EXPLOIT:CMD-DIR-TRSVR
IMAP:EXPLOIT:SUSPICIOUS-COMM
IMAP:EXPLOIT:SUSPICIOUS-HEADER
IMAP:EXPLOIT:CMD-FORMAT-STRING

IMAP:FAILURE

IMAP:FAILURE:BRUTE-FORCE

IMAP:IPSWITCH

IMAP:IPSWITCH:FETCH-OF
IMAP:IPSWITCH:IMAIL-INFO
IMAP:IPSWITCH:DELETE-OF
IMAP:IPSWITCH:SEARCH-DATE
IMAP:IPSWITCH:CHAR-OF
IMAP:IPSWITCH:STATUS-OF

IMAP:OVERFLOW

IMAP:OVERFLOW:FLAG
IMAP:OVERFLOW:PASS
IMAP:OVERFLOW:COMMAND
IMAP:OVERFLOW:REFERENCE
IMAP:OVERFLOW:TAG
IMAP:OVERFLOW:USER
IMAP:OVERFLOW:LINE
IMAP:OVERFLOW:LIT_LENGTH_OFLOW
IMAP:OVERFLOW:MAILBOX
IMAP:OVERFLOW:LINUX-X86-5
IMAP:OVERFLOW:LINUX-X86-3
IMAP:OVERFLOW:LINUX-X86-4
IMAP:OVERFLOW:MDAEMON-MD5
IMAP:OVERFLOW:IMAP4-LSUB-OF
IMAP:OVERFLOW:WUIMAPD-MBOX-OF
IMAP:OVERFLOW:MERCUR-NTLMSSP
IMAP:OVERFLOW:SCO-IMAPD-UNO-OF
IMAP:OVERFLOW:MAILENABLE-ARG-OF
IMAP:OVERFLOW:WUIMAPD-PART-OF
IMAP:OVERFLOW:MAILENABLE-OF-2
IMAP:OVERFLOW:LITERAL-TOKEN
IMAP:OVERFLOW:MAILENABLE-OF
IMAP:OVERFLOW:LIST-OF
IMAP:OVERFLOW:IMAP-LSUB-OF
IMAP:OVERFLOW:MAILENABLE-APPEND
IMAP:OVERFLOW:MERCURY-MAIL-BO
IMAP:OVERFLOW:MAILENABLE-BO
IMAP:OVERFLOW:DOMINO-IMAP
IMAP:OVERFLOW:IMAP-CONT-OF
IMAP:OVERFLOW:OL-IFRAME-EXEC
IMAP:OVERFLOW:MERCURY-LOGIN
IMAP:OVERFLOW:MAILENABLE-OF-3
IMAP:OVERFLOW:LINUX-X86-2
IMAP:OVERFLOW:LINUX-X86-1
IMAP:OVERFLOW:BIN-SH

IMAP:REQERR

IMAP:REQERR:REQ-DUPLICATE-TAG
IMAP:REQERR:REQ-INVALID-TAG
IMAP:REQERR:REQ-UNEXPECTED-ARG
IMAP:REQERR:INVALID_LITERAL_LEN
IMAP:REQERR:EMPTY-COMMAND

IMAP:VULN

IMAP:VULN:CYRUS-2-1-11

IP

IP:ESP-RUNT
IP:SRC-ROUTE-OF
IP:IGMP-MS-DOS

IP:AUDIT

IP:AUDIT:INVALID-TYPE
IP:AUDIT:HAS-IP-OPTIONS

IP:EXPLOIT

IP:EXPLOIT:IP-TRACEROUTE
IP:EXPLOIT:SAME-SRC-DST

IP:INFO

IP:INFO:INVALID-DESTINATION
IP:INFO:INVALID-SOURCE

IP:OPTERR

IP:OPTERR:DUPLICATE
IP:OPTERR:INVALID-LENGTH
IP:OPTERR:INVALID-INFRAGMENT

IP:OVERFLOW

IP:OVERFLOW:OPTIONS

LDAP

LDAP:UNSUPPORTED_VERSION
LDAP:CONTROLS-MISMATCH
LDAP:BER-DOS
LDAP:SIDVAULT-DOS
LDAP:LOTUS-DOMINO
LDAP:SUN-DIR-OF
LDAP:IMAIL-BOF
LDAP:KERIO-DOS
LDAP:COMMGATE-OF
LDAP:LSASS-HEAP-OF
LDAP:OPENLDAP-2.2.23-DOS
LDAP:TIVOLI-OF
LDAP:AD-LDAP-DOS
LDAP:SUN-REQ-FS
LDAP:NA-PGP-KEYSERVER-OF
LDAP:LOTUS-DN
LDAP:AD-AUTH-BYPASS
LDAP:ORACLE-PREAUTH-DOS
LDAP:MS-AD-QUERY-DOS
LDAP:MS-WINDOWS-AD-LDAP-DOS
LDAP:OPENLDAP-RWM-DOS
LDAP:AD-CONVERT-ATT
LDAP:RECURSIVE-DOS
LDAP:SLAPD-OVERLAY-DOS
LDAP:EDIRECTORY-DOS

LDAP:AUDIT

LDAP:AUDIT:ANONYMOUS_BIND
LDAP:AUDIT:BIND_RESULT_FAILED

LDAP:EMPTY

LDAP:EMPTY:ADDREQ-ATTRIB-EMPTY
LDAP:EMPTY:SRCHREQ_FILTER_EMPTY
LDAP:EMPTY:SCHREQ-FTR-SSTR-NONE
LDAP:EMPTY:SRCHREQ_FTR_NULL
LDAP:EMPTY:SRCHREQ_FTR_SSTR
LDAP:EMPTY:SRCH_RES_OBJ_EMPTY
LDAP:EMPTY:SRCH_FILTER_EMPTY
LDAP:EMPTY:EXTDRSP-RSPNM-EMPTY
LDAP:EMPTY:MODIFYREQ_ADD_EMPTY
LDAP:EMPTY:EXTDRSP-RESP-EMPTY
LDAP:EMPTY:SRCH_RESREF_NONE
LDAP:EMPTY:EXTDREQ-REQVAL-EMPTY
LDAP:EMPTY:REFERRAL_EMPTY
LDAP:EMPTY:ATTRIBDESC_EMPTY
LDAP:EMPTY:ASSERT_EMPTY
LDAP:EMPTY:ATTRIBLIST_EMPTY
LDAP:EMPTY:ATTRIBVALUE_EMPTY
LDAP:EMPTY:EXTDREQ-REQNM-EMPTY
LDAP:EMPTY:ATTRIB_ASSERT_EMPTY
LDAP:EMPTY:MODREQ-ATTRIB-EMPTY
LDAP:EMPTY:SCHREQ_FILTER_EMPTY
LDAP:EMPTY:MODIFYREQ_PART_EMPTY
LDAP:EMPTY:SRCHREQ_LOGOP_NOARGS
LDAP:EMPTY:ATTRIBVAL_LIST_EMPTY
LDAP:EMPTY:DELREQ_EMPTY
LDAP:EMPTY:MODIFYREQ_EMPTY

LDAP:FAILED

LDAP:FAILED:ADD-RESULT-FAIL
LDAP:FAILED:MODIFY-RESULT-FAIL
LDAP:FAILED:SEARCH-RESULT-FAIL
LDAP:FAILED:DELETE-RESULT-FAIL
LDAP:FAILED:COMPARE_RESULT_FAIL
LDAP:FAILED:BRUTE-FORCE
LDAP:FAILED:MODDN-RESULT-FAIL

LDAP:FORMAT

LDAP:FORMAT:ENC-UNK-END-CHAR
LDAP:FORMAT:ENC_LEN_INDEFINITE
LDAP:FORMAT:ENC_LEN_LEFT_ZEROS
LDAP:FORMAT:ENC_INCORRECT_TAG
LDAP:FORMAT:ATTRIB-DESC-FMTERR
LDAP:FORMAT:DN_FMTERR

LDAP:INVALID

LDAP:INVALID:SRCHREQ_FLEN_INV
LDAP:INVALID:SEARCH-FILTER-INV
LDAP:INVALID:MESGID-INVALID
LDAP:INVALID:SRCH-TIMELIMIT-INV
LDAP:INVALID:MODDNREQ-ENTRY-INV
LDAP:INVALID:REQ-OPERATION-INV
LDAP:INVALID:SRCH-DEREF-AL-INV
LDAP:INVALID:SRCH-TYPEONLY-INV
LDAP:INVALID:REFERRAL_INVALID
LDAP:INVALID:SRCH_RES_ATTR_INV
LDAP:INVALID:SEARCH-BASEOBJ-INV
LDAP:INVALID:SRCH-SIZELIMIT-INV
LDAP:INVALID:REQ-ATTRIBTYPE-INV
LDAP:INVALID:SEARCH-ATTRIB-INV
LDAP:INVALID:ATTRIBTYPE_INVALID
LDAP:INVALID:ENTRY_INVALID
LDAP:INVALID:ADDREQ-ENTRY-INV
LDAP:INVALID:ENC_BOOLEAN
LDAP:INVALID:ENC_INTEGER_LEN
LDAP:INVALID:MODDNREQ-NWRDN-INV
LDAP:INVALID:REQ_OBJECT_INVALID
LDAP:INVALID:ENC_INVALID_LEN
LDAP:INVALID:SEARCH_SCOPE_INV
LDAP:INVALID:REQTYPE_INVALID
LDAP:INVALID:MODRDN-NULL-RDN

LDAP:OVERFLOW

LDAP:OVERFLOW:SEARCH-LEVELS-OF
LDAP:OVERFLOW:DN_TOO_LONG
LDAP:OVERFLOW:ENC_REPR_2LONG
LDAP:OVERFLOW:ENCODING-TAG-OF
LDAP:OVERFLOW:ENCODING-LEN-OF
LDAP:OVERFLOW:ENCODING-INT-OF
LDAP:OVERFLOW:ATTRIB-DESC-OF
LDAP:OVERFLOW:ENC-TAG-VAL-OF
LDAP:OVERFLOW:MESSAGE-TOO-LONG
LDAP:OVERFLOW:REQ-OF
LDAP:OVERFLOW:DC-MEM-LEAK-DOS
LDAP:OVERFLOW:MS-DIR-LEAK-MC
LDAP:OVERFLOW:IMAIL-ASN-1
LDAP:OVERFLOW:MODRDN-UTF8-EXEC

LPD

LPD:HUMMINGBIRD
LPD:ACTFAX-SERVER-BO
LPD:MSF-CASCADE-JOB-REQ
LPD:LDP-CMD-INJ
LPD:OPT-OF

LPR

LPR:HP-UX-CMD
LPR:WINDOWS-LPR-DOS
LPR:SAP-GUI-SAPLPD-DOS
LPR:ARB-FILE-UNLINK

LPR:AUDIT

LPR:AUDIT:CMD-FAILED
LPR:AUDIT:RESPONSE
LPR:AUDIT:PORT
LPR:AUDIT:C-CMD
LPR:AUDIT:CMD

LPR:INVALID

LPR:INVALID:C-EMPTY
LPR:INVALID:REQUEST
LPR:INVALID:CMD-TRUNC
LPR:INVALID:EOL
LPR:INVALID:EOF
LPR:INVALID:D-EMPTY
LPR:INVALID:D-NAME
LPR:INVALID:LINE
LPR:INVALID:C-NAME

LPR:OVERFLOW

LPR:OVERFLOW:C-INDENT
LPR:OVERFLOW:CFILE-LEN
LPR:OVERFLOW:C-FONT
LPR:OVERFLOW:C-FORMAT
LPR:OVERFLOW:C-BANNER
LPR:OVERFLOW:C-LENGTH
LPR:OVERFLOW:C-TITLE
LPR:OVERFLOW:C-NAME
LPR:OVERFLOW:C-CLASS
LPR:OVERFLOW:C-MAIL
LPR:OVERFLOW:C-JOB
LPR:OVERFLOW:C-WIDTH
LPR:OVERFLOW:C-HOST
LPR:OVERFLOW:DFILE
LPR:OVERFLOW:D-LENGTH
LPR:OVERFLOW:D-NAME
LPR:OVERFLOW:C-SYMLINK
LPR:OVERFLOW:C-SOURCE
LPR:OVERFLOW:LINE
LPR:OVERFLOW:C-USER
LPR:OVERFLOW:CFILE
LPR:OVERFLOW:LPD-EXPLOIT

MISC

MISC:LIBREOFICE-IMPRESS-RSM-RCE
MISC:WINS-COMMENDLG
MISC:HTRAN-PROXY-CONNECT-FAILED
MISC:KERIO-AUTH-OF
MISC:SHELLSHOCK
MISC:LLMNR-REVERSE-LOOKUP
MISC:LINUX-KERNEL-ISCSI-BO
MISC:OPENAFS-RPC-BO
MISC:WINS-BOF

MISC:PDF

MISC:PDF:INTEGER-OVERFLOW

MS-RPC

MS-RPC:EPDUMP-SCAN
MS-RPC:EPDUMP-SCAN-2
MS-RPC:MSRPC-ISYSACTIVATE-RACE
MS-RPC:ATSVC-RUNDLL
MS-RPC:WRKST-DOS
MS-RPC:EXCHANGE-MEM
MS-RPC:NOOP-SLIDE-RPC-REQ
MS-RPC:SAMR-ACCESS-REQUEST
MS-RPC:SAMR-ACCESS-DENIED
MS-RPC:INDX-SVC-ACTIVE
MS-RPC:HOST-INTEGRATION-RCE
MS-RPC:DCERPC-DOS3
MS-RPC:ATSVC-BIND
MS-RPC:NETSRVRDSKENUM
MS-RPC:PGP-SRV-PTR
MS-RPC:TREND-MICRO-RPC
MS-RPC:LAN-WORM-SPREAD
MS-RPC:MSGQU-FRNAME
MS-RPC:MAL-DNS
MS-RPC:NETRLOGONGETDMNINF-NULL
MS-RPC:BROADWIN-BOF
MS-RPC:SPOOLER-DLL-LOAD
MS-RPC:MSRPC-HIGRCE
MS-RPC:DCERPC-DOS
MS-RPC:DCE-RPC-UUID-BIND
MS-RPC:NTLM-RPCSS-DOS
MS-RPC:DCE-RPC-DNSSVR
MS-RPC:SNORT-EVAL-BOF
MS-RPC:ARNUDP-RPC-DOS
MS-RPC:MSDTC-DOS
MS-RPC:LLSSRV-RCE
MS-RPC:MESSENGER-POPUP
MS-RPC:TRND-MICRO-RPC

MS-RPC:DCOM

MS-RPC:DCOM:SVRNAME-2LONG
MS-RPC:DCOM:REMACT-UDP
MS-RPC:DCOM:REMACT-OBJNAME-OF
MS-RPC:DCOM:REMACT
MS-RPC:DCOM:EXPLOIT-2
MS-RPC:DCOM:LONG-FILE-OF
MS-RPC:DCOM:EXPLOIT
MS-RPC:DCOM:EXPLOIT-3

MS-RPC:ERR

MS-RPC:ERR:CO-PTYPE-IN-CL-PDU
MS-RPC:ERR:CL-PAYLOAD-NOT-EMPTY
MS-RPC:ERR:COUNT-TOO-LARGE
MS-RPC:ERR:CL-PTYPE-IN-CO-PDU
MS-RPC:ERR:FRAG-LEN-TOO-BIG
MS-RPC:ERR:EPM-INV-NUM-ENTRIES
MS-RPC:ERR:EPM-INV-TOWER-LEN
MS-RPC:ERR:INV-AUTH-LEN
MS-RPC:ERR:EPM-WRONG-TOWER-LEN
MS-RPC:ERR:EPM-INV-LHS-LEN
MS-RPC:ERR:EPM-INV-OP-NUM
MS-RPC:ERR:FRAG-BIGGER-THAN-NEG
MS-RPC:ERR:EPM-INV-RHS-LEN
MS-RPC:ERR:EPM-WRONG-RHS-LEN
MS-RPC:ERR:INV-PTYPE
MS-RPC:ERR:EPM-WRONG-LHS-LEN
MS-RPC:ERR:WRONG-FRAG
MS-RPC:ERR:FRAG-LEN-TOO-SMALL
MS-RPC:ERR:LEN-CONFLICT
MS-RPC:ERR:INV-AUTH-PAD-LEN
MS-RPC:ERR:SHORT-MSG
MS-RPC:ERR:RESPONSE-NO-REQ

MS-RPC:EVASION

MS-RPC:EVASION:DCE-LARGE-FRAG-2
MS-RPC:EVASION:DCERPC-SMALL-REQ
MS-RPC:EVASION:FRAG2-SMALL
MS-RPC:EVASION:BLIND-BIND-ACK2
MS-RPC:EVASION:BUFFERED-REQ
MS-RPC:EVASION:LARGE-FRAG-2
MS-RPC:EVASION:BUFFERED-REQUEST
MS-RPC:EVASION:BLIND-BIND-ACK-2
MS-RPC:EVASION:SMALL-REQ-FRAG
MS-RPC:EVASION:LARGE-FRAG-1
MS-RPC:EVASION:MULTI-HEADER-1
MS-RPC:EVASION:SMALL-FRAG

MS-RPC:INV

MS-RPC:INV:REQUEST-FROM-SERVER
MS-RPC:INV:RESPONSE-FROM-CLIENT
MS-RPC:INV:NETWARE-SVC
MS-RPC:INV:SPOOLSS-SVC
MS-RPC:INV:NETDDE-SVC
MS-RPC:INV:WKSTA-SVC
MS-RPC:INV:DNS-SVC
MS-RPC:INV:LLSSRV-SVC
MS-RPC:INV:DCOM-SVC
MS-RPC:INV:PNP-SVC
MS-RPC:INV:SRV-SVC
MS-RPC:INV:MQ-SVC
MS-RPC:INV:RRAS-SVC

MS-RPC:LSASS

MS-RPC:LSASS:NETWARE-CIFS-OF
MS-RPC:LSASS:MAL-OPCODE
MS-RPC:LSASS:LSA-DOS-CHALLENGE
MS-RPC:LSASS:MAL-OPCODE-2
MS-RPC:LSASS:OVERSIZED-FRAG
MS-RPC:LSASS:NTLM-DOS

MS-RPC:OF

MS-RPC:OF:WKST-SVC-PIPE
MS-RPC:OF:MSG-QUEUE-1
MS-RPC:OF:RRAS
MS-RPC:OF:NWSPOOL-OF
MS-RPC:OF:MS-DNS-RPC
MS-RPC:OF:MSG-QUEUE-2
MS-RPC:OF:MESSENGER-1
MS-RPC:OF:WEBCLIENT
MS-RPC:OF:SPOOLSS-1
MS-RPC:OF:WKST-SVC-BO
MS-RPC:OF:NETDDE-SHARE
MS-RPC:OF:SPOOLSS-3
MS-RPC:OF:MSG-QUEUE-3
MS-RPC:OF:SRV-SVC-1
MS-RPC:OF:SRV-SVC-2
MS-RPC:OF:MSDTC
MS-RPC:OF:LOC-SVC-2
MS-RPC:OF:LOC-SVC-1
MS-RPC:OF:MQSVC

NDMP

NDMP:SHORT-MSG

NETBIOS:ACCESS

NETBIOS:ACCESS:D-DRIVE
NETBIOS:ACCESS:SAMBA-CLIENT
NETBIOS:ACCESS:C-DRIVE
NETBIOS:ACCESS:IPC-1
NETBIOS:ACCESS:ADMIN

NETBIOS:AUDIT

NETBIOS:AUDIT:NAME_ERROR
NETBIOS:AUDIT:ACTIVE_ERR
NETBIOS:AUDIT:INV_HDR
NETBIOS:AUDIT:NBNAME-RES-ADDR

NETBIOS:DIR

NETBIOS:DIR:CD-DOTDOTDOT
NETBIOS:DIR:CD-DOTDOT

NETBIOS:DOS

NETBIOS:DOS:RFPOISON
NETBIOS:DOS:RFPARALYZE

NETBIOS:NBDS

NETBIOS:NBDS:FRAG_TRANS_RESP
NETBIOS:NBDS:BAD_LABEL_FORMAT
NETBIOS:NBDS:SHORT_MSG
NETBIOS:NBDS:EMPTY_UDP_MSG
NETBIOS:NBDS:BE-SERVERNAME-OF
NETBIOS:NBDS:MS-PRINT-SPOOL-FMT
NETBIOS:NBDS:MS-BROWSER-ELECT

NETBIOS:NBDS:INVALID

NETBIOS:NBDS:INVALID:DGM_LEN
NETBIOS:NBDS:INVALID:LABEL_LEN
NETBIOS:NBDS:INVALID:HDR_FLGS
NETBIOS:NBDS:INVALID:1STLVL_ENC
NETBIOS:NBDS:INVALID:MSG_TYPE
NETBIOS:NBDS:INVALID:PROTO

NETBIOS:NBDS:OF

NETBIOS:NBDS:OF:MSG
NETBIOS:NBDS:OF:NAME

NETBIOS:NBNS

NETBIOS:NBNS:TYPE_UNKNOWN
NETBIOS:NBNS:S2C_QUERY
NETBIOS:NBNS:SHORT_MSG
NETBIOS:NBNS:NAME_TOO_LONG
NETBIOS:NBNS:CLASS-UNKNOWN
NETBIOS:NBNS:C2S_RESPONSE
NETBIOS:NBNS:C2S_AA_FLAG
NETBIOS:NBNS:EMPTY-UDP-MSG
NETBIOS:NBNS:POINTER_LOOP

NETBIOS:NBNS:INVALID

NETBIOS:NBNS:INVALID:FIRST-ENC
NETBIOS:NBNS:INVALID:HDR-Z
NETBIOS:NBNS:INVALID:PTR
NETBIOS:NBNS:INVALID:NAME-FLGS
NETBIOS:NBNS:INVALID:RRNB-FLG
NETBIOS:NBNS:INVALID:HDR-OPCODE
NETBIOS:NBNS:INVALID:HDR-CNT
NETBIOS:NBNS:INVALID:LABEL-LEN

NETBIOS:NBNS:RESCODE

NETBIOS:NBNS:RESCODE:SVR_FAIL
NETBIOS:NBNS:RESCODE:REFUSED
NETBIOS:NBNS:RESCODE:NOT_IMPLTD
NETBIOS:NBNS:RESCODE:CONFLICT
NETBIOS:NBNS:RESCODE:FORMAT_ERR

NETBIOS:OVERFLOW

NETBIOS:OVERFLOW:MAILSLOT
NETBIOS:OVERFLOW:LENGTH-OF
NETBIOS:OVERFLOW:ASN-1-DER-OF
NETBIOS:OVERFLOW:ASN-1-BER

NETBIOS:WINS

NETBIOS:WINS:REPLICATION-PTR-U
NETBIOS:WINS:ISATAP-INFO-DIS
NETBIOS:WINS:SRV-NAME-OF
NETBIOS:WINS:UPDATE-OF
NETBIOS:WINS:REPLICATION-PTR
NETBIOS:WINS:WPADWINS

NFS

NFS:BSD-MOUNT-DOS
NFS:UTILS-TCP-CONN-DOS
NFS:TRIPWIRE-FORMAT-STRING
NFS:FREEBSD-REDDIR-MEM-COR
NFS:MS-WINDOWS-NFS-NULL-DOS
NFS:CAP-MKNOD

NFS:AUDIT

NFS:AUDIT:INVALID-XID
NFS:AUDIT:REQ-DENIED
NFS:AUDIT:MKNOD
NFS:AUDIT:ROOT-ACCESS
NFS:AUDIT:UNKNOWN-VER

NFS:ERR

NFS:ERR:LARGE-CRED
NFS:ERR:LARGE-FH
NFS:ERR:LONG-FILENAME
NFS:ERR:VERSION-MISMATCH
NFS:ERR:LONG-NETNAME
NFS:ERR:LONG-PATHNAME
NFS:ERR:WRONG-DIR
NFS:ERR:SHORT-READ

NFS:INFO

NFS:INFO:UNKNOWN-PROG

NFS:INVALID

NFS:INVALID:INVALID-PROC
NFS:INVALID:INVALID-FILETYPE
NFS:INVALID:INVALID-CMODE
NFS:INVALID:INVALID-RSTAT
NFS:INVALID:BAD-CRED-LEN
NFS:INVALID:INVALID-AMASK
NFS:INVALID:INVALID-HOW
NFS:INVALID:INVALID-EOF
NFS:INVALID:INVALID-DIR
NFS:INVALID:BAD-VERF-CRED

NFS:OVERFLOW

NFS:OVERFLOW:BUF-OVERFLOW
NFS:OVERFLOW:XLOG-1BYTE-OF
NFS:OVERFLOW:LINUX-ACL-OF-DOS

NNTP

NNTP:INTERNETNEWS-NULL-PATH-DOS

NNTP:AUDIT

NNTP:AUDIT:UNKNOWN-CMD
NNTP:AUDIT:NESTED-REPLY
NNTP:AUDIT:NESTED-REQ

NNTP:ERR

NNTP:ERR:INVALID-CMD

NNTP:INN

NNTP:INN:INND-OF1
NNTP:INN:INND-OF2

NNTP:NN

NNTP:NN:NN-FMTSTR1

NNTP:OVERFLOW

NNTP:OVERFLOW:LINE-OVERFLOW
NNTP:OVERFLOW:NNTP-XHDR
NNTP:OVERFLOW:XPAT-PATTERN
NNTP:OVERFLOW:INN-CONTROL-MSG
NNTP:OVERFLOW:OUTLOOK-NNTP-OF

NNTP:VULN

NNTP:VULN:ISC-2-2-2

NTP

NTP:CTL_ERR_RSP_SEEN
NTP:PEER_STRATUM_INCOMPATI
NTP:PEER_MODE_INCOMPAT
NTP:RECVD_UNEXPECTED_PKT
NTP:EXCEEDED_REF_CLKAGE
NTP:PASV_NOT_DISSOLVED
NTP:MODE_STRATUM_ALTERED
NTP:NTP-READVAR
NTP:TRAFFIC
NTP:MUL-NTP-DAEMON-AUTOKEY-BOF
NTP:MONLIST-REQUEST
NTP:MODE7-DOS
NTP:MULTIPLE-STACK-OVERFLOW
NTP:MONLIST-REQUEST-FLOOD

NTP:ERROR

NTP:ERROR:CTL_INV_PEER_EVCODE
NTP:ERROR:CTL_INV_PEER_SELECT
NTP:ERROR:CTL_INVALID_ERRCODE
NTP:ERROR:CTL_INV_CLKSTATUS
NTP:ERROR:CTL_INV_PEER_STATUS
NTP:ERROR:CTL_INVALID_CLK_SRC
NTP:ERROR:INVALID_MODE
NTP:ERROR:SERVER_SYNCH_ALARM
NTP:ERROR:MAX_STRATUM_EXCEEDED
NTP:ERROR:CTL_VAR_NAME_2LONG
NTP:ERROR:MSG_TOO_SHORT
NTP:ERROR:DATA_FIELD_TOO_SHORT
NTP:ERROR:MSG_WITHIN_POLL_INTVL
NTP:ERROR:CTL_VAR_VALUE_2LONG
NTP:ERROR:CTL_INVALID_EVCODE
NTP:ERROR:CTL_INVALID_OPCODE
NTP:ERROR:INVALID_DISPERSION
NTP:ERROR:CTL_NONSTD_VAR_NAME
NTP:ERROR:MSG_TOO_LONG

NTP:INVALID

NTP:INVALID:CTL_DATA_MULTI_PKT
NTP:INVALID:CTL_CLKERR_RPRTED
NTP:INVALID:TIMESTMP_NOT_MATCH

OS:AIX

OS:AIX:PDNSD-OF

OS:LINUXX86

OS:LINUXX86:BOOTP-OF
OS:LINUXX86:NTPDX-OF
OS:LINUXX86:SCTP-CHUNKLESS
OS:LINUXX86:LPRNG-OF
OS:LINUXX86:POP2-OF-2
OS:LINUXX86:NTALKD-OF
OS:LINUXX86:POP2-OF-1
OS:LINUXX86:MOUNTD-OF-3
OS:LINUXX86:MOUNTD-OF-1
OS:LINUXX86:MOUNTD-OF-2

OS:SCOX86

OS:SCOX86:CALSERVER-OF

OS:SOLARISX86

OS:SOLARISX86:NLPS-OF

P2P

P2P:UNIFS

P2P:ARES

P2P:ARES:UDP-PEER-CHECK
P2P:ARES:PEER-CONNECT-UDP
P2P:ARES:PEER-CONNECT-TCP

P2P:AUDIT

P2P:AUDIT:GNUTELLA-QUERY
P2P:AUDIT:GNUTELLA-SEARCH
P2P:AUDIT:GNUTELLA-TTL
P2P:AUDIT:GNUTELLA-EOL
P2P:AUDIT:GNUTELLA-PING-LEN
P2P:AUDIT:GNUTELLA-HDR-ATRB
P2P:AUDIT:GNUTELLA-LINE
P2P:AUDIT:GNUTELLA-PONG-LEN
P2P:AUDIT:GNUTELLA-BYE-TTL
P2P:AUDIT:GNUTELLA-HTTP-GET
P2P:AUDIT:GNUTELLA-SVR-RESP
P2P:AUDIT:GNUTELLA-RTABLE-UPD
P2P:AUDIT:GNUTELLA-UNSUP-VER
P2P:AUDIT:GNUTELLA-MESSAGE
P2P:AUDIT:GNUTELLA-PUSH-LEN
P2P:AUDIT:GNUTELLA-OK-RESP
P2P:AUDIT:GNUTELLA-MSG
P2P:AUDIT:SE-HUB-LOOK
P2P:AUDIT:SOFTETHER-SSH

P2P:BEARSHARE

P2P:BEARSHARE:UA
P2P:BEARSHARE:DJ-SERVICE
P2P:BEARSHARE:LOGIN
P2P:BEARSHARE:FILE-XFER
P2P:BEARSHARE:SEARCH

P2P:BITTORRENT

P2P:BITTORRENT:BT-ENCRYPTED
P2P:BITTORRENT:TRACKER-SCRAPE
P2P:BITTORRENT:TRACKER-QUERY
P2P:BITTORRENT:BT-SEARCH
P2P:BITTORRENT:HANDSHAKE
P2P:BITTORRENT:BT-TRACKER-DOS
P2P:BITTORRENT:CONTENT-TYPE
P2P:BITTORRENT:KICKASSTORRENTS
P2P:BITTORRENT:DHT4
P2P:BITTORRENT:TRACKER-QUERY-2
P2P:BITTORRENT:BITCOMET-CHUNK
P2P:BITTORRENT:DHT
P2P:BITTORRENT:UTORRENT-UDP
P2P:BITTORRENT:DOT-TORRENT
P2P:BITTORRENT:TRACKER-UDP
P2P:BITTORRENT:BTCLIENT-UA

P2P:DC

P2P:DC:HUB-LOGIN
P2P:DC:ACTIVE
P2P:DC:DNS-QUERY

P2P:EDONKEY

P2P:EDONKEY:S2C-PONG-RESPONSE
P2P:EDONKEY:CLIENT-DOS-ATK
P2P:EDONKEY:OTHER-SVR-INFO-REQ
P2P:EDONKEY:FILE-DOWNLOAD-REQ
P2P:EDONKEY:CLIENT-HELLO
P2P:EDONKEY:CLIENT-VER-CHECK
P2P:EDONKEY:FILE-SEARCH-REQ
P2P:EDONKEY:FILE-SHARES
P2P:EDONKEY:C2S-PING-BEACON
P2P:EDONKEY:PORT-53

P2P:EMULE

P2P:EMULE:PLUS-VER-CHECK
P2P:EMULE:DECODE16-OVERFLOW
P2P:EMULE:VERYCD
P2P:EMULE:KADEMLIA-KAD

P2P:FREENET

P2P:FREENET:CONNECTION

P2P:GNUCLEUSLAN

P2P:GNUCLEUSLAN:CONNECT
P2P:GNUCLEUSLAN:BROADCAST

P2P:GNUTELLA

P2P:GNUTELLA:CONNECT
P2P:GNUTELLA:CONNECTION-OK-V06
P2P:GNUTELLA:UDP-TRAFFIC
P2P:GNUTELLA:LIMEWIRE-DIR-TRANS
P2P:GNUTELLA:X-GNUTELLA
P2P:GNUTELLA:DOWNLOAD
P2P:GNUTELLA:FILE-XCH-TCP
P2P:GNUTELLA:URN-DOWNLOAD-REQ

P2P:GROKSTER

P2P:GROKSTER:GROKSTER

P2P:KAZAA

P2P:KAZAA:FILE-HASH
P2P:KAZAA:FILE-SEND
P2P:KAZAA:FILE-REQ
P2P:KAZAA:UDP-PROBE
P2P:KAZAA:PEER-REQ
P2P:KAZAA:WEB-CONN

P2P:LIMEWIRE

P2P:LIMEWIRE:FREEWIRE

P2P:MISC

P2P:MISC:GLUZ
P2P:MISC:XOLOX
P2P:MISC:IMESH
P2P:MISC:P2P-NETWORKING
P2P:MISC:PHEX
P2P:MISC:PEERENABLE
P2P:MISC:KUGOO-LOGIN
P2P:MISC:MUTE
P2P:MISC:KUGOO
P2P:MISC:APPLEJUICE
P2P:MISC:MANOLITO
P2P:MISC:HOTLINE
P2P:MISC:FREECAST
P2P:MISC:POCO-UDP
P2P:MISC:100BAO
P2P:MISC:OPENFT
P2P:MISC:SOULSEEK
P2P:MISC:POCO-CONNECT
P2P:MISC:PPLIVE-TRACKER-OFF-REQ
P2P:MISC:MEDIASEEK-PL-CLIENT
P2P:MISC:MANOLITO-DOWNLOAD
P2P:MISC:PPLIVE-HTTP-CLIENT-REQ

P2P:MLDONKEY

P2P:MLDONKEY:CLIENT-ACTIVE

P2P:MORPHEUS

P2P:MORPHEUS:MORPHEUS

P2P:NAPSTER

P2P:NAPSTER:USER-LOGIN-8888
P2P:NAPSTER:LOGIN-7777
P2P:NAPSTER:DATA-7777
P2P:NAPSTER:DOWNLOAD-8888
P2P:NAPSTER:LOGIN-8888
P2P:NAPSTER:DATA-6666
P2P:NAPSTER:DATA-4444
P2P:NAPSTER:DOWNLOAD-7777
P2P:NAPSTER:UPLOAD-REQ-7777
P2P:NAPSTER:SERVER-LOGIN
P2P:NAPSTER:UPLOAD-REQ-8888
P2P:NAPSTER:DATA-8888
P2P:NAPSTER:DATA-5555
P2P:NAPSTER:DATA-6699
P2P:NAPSTER:USER-LOGIN-7777

P2P:OVERNET

P2P:OVERNET:PEER-DISCOVERY
P2P:OVERNET:CONNECTED
P2P:OVERNET:KEEP-ALIVE
P2P:OVERNET:FILE-SHARES
P2P:OVERNET:KADEMILIA-OVERNET
P2P:OVERNET:CONNECT-REQ

P2P:SHAREAZA

P2P:SHAREAZA:CLIENT-ACTIVE

P2P:VUZE

P2P:VUZE:TIVO-DISCO-BEACON
P2P:VUZE:BIN-DHT
P2P:VUZE:USER-AGENT
P2P:VUZE:HTTP-CLIENT-MODE
P2P:VUZE:HTTP-RPC-ACTIVITY

P2P:WINMX

P2P:WINMX:CLIENT-NET-PRB-DNS
P2P:WINMX:CLIENT-VER-CHK-DNS
P2P:WINMX:CLIENT-VER-CHK
P2P:WINMX:CLIENT-MATCHMAKE-DNS
P2P:WINMX:SERVER-SUPERNODE-LIST
P2P:WINMX:SERVER-CONNECT-OK
P2P:WINMX:CLIENT-NET-PROBE
P2P:WINMX:DOWNLOAD

P2P:WINNY

P2P:WINNY:PEER-CONNECT

P2P:XUNLEI

P2P:XUNLEI:OVER-HTTP
P2P:XUNLEI:STARTUP
P2P:XUNLEI:QUERY
P2P:XUNLEI:MESSSAGE
P2P:XUNLEI:DOWNLOAD
P2P:XUNLEI:UDP

POP3

POP3:EXTERNAL_MESSAGE
POP3:EMAIL-SCRIPT
POP3:EUDORA-MAIL-CLIENT
POP3:POP-SCRIPT-TAG
POP3:MAL-LOTUS-APPLIX
POP3:APPLE-ICAL-PARAM-BO
POP3:APPLE-ICAL-ATTACH-DOS
POP3:MS-OUTLOOK-EXP-MHTML-CE
POP3:SUSPICIOUS-COMM
POP3:SUSPICIOUS-HEADER
POP3:MS-WORD-BULLET-MC
POP3:IBM-NOTES-PNG-OVF
POP3:LOTUS-DOC-VIEWER
POP3:MS-OUTLOOK-2003-OBJ-SEC-BS
POP3:OUTLOOK-OBJECT-TAG

POP3:AUDIT

POP3:AUDIT:ILLEGAL-FILENAME
POP3:AUDIT:DUPLICATE-HEADER
POP3:AUDIT:EMPTY-BOUNDARY
POP3:AUDIT:INVALID-FILENAME
POP3:AUDIT:REQ-INVALID-STATE
POP3:AUDIT:LOGIN-FAILED
POP3:AUDIT:COMMAND-FAILED
POP3:AUDIT:REQ-UNKNOWN-CMD
POP3:AUDIT:REQ-NESTED-REQUEST

POP3:DOS

POP3:DOS:WINGATE
POP3:DOS:INWEB-HELO-DOS
POP3:DOS:MDAEMON-POP-DOS
POP3:DOS:ULTRAISO-CUE-BO

POP3:ERROR

POP3:ERROR:DUPLICATE_BOUNDARY
POP3:ERROR:BOUNDARY_MISSING
POP3:ERROR:UNFINISHED_MULTIPART
POP3:ERROR:PARTIAL_MESSAGE
POP3:ERROR:TOO_MANY_BOUNDARIES
POP3:ERROR:ILLEGAL_MIME_ENCODE
POP3:ERROR:INVALID_BASE64_CHAR
POP3:ERROR:ILLEGAL_ENCODE

POP3:EXT

POP3:EXT:DOUBLE-EXTENSION
POP3:EXT:DOT-SCR
POP3:EXT:DOT-PIF
POP3:EXT:DOT-VBS
POP3:EXT:DOT-EXE
POP3:EXT:DOT-SHS
POP3:EXT:DOT-OCX
POP3:EXT:DOT-CPL
POP3:EXT:DOT-ADE
POP3:EXT:DOT-BAT
POP3:EXT:DOT-HTA
POP3:EXT:DOT-ADP
POP3:EXT:DOT-386
POP3:EXT:DOT-BAS
POP3:EXT:DOT-MSP
POP3:EXT:DOT-WSH
POP3:EXT:DOT-WSC
POP3:EXT:DOT-LNK
POP3:EXT:DOT-MDE
POP3:EXT:DOT-INF
POP3:EXT:DOT-JSE
POP3:EXT:DOT-MDB
POP3:EXT:DOT-CHM
POP3:EXT:DOT-INS
POP3:EXT:DOT-CRT
POP3:EXT:DOT-WSZ-WAL
POP3:EXT:DOT-VB
POP3:EXT:DOT-SCT
POP3:EXT:DOT-PCD
POP3:EXT:DOT-VBE
POP3:EXT:DOT-REG
POP3:EXT:DOT-HT
POP3:EXT:DOT
POP3:EXT:DOT-JS
POP3:EXT:DOT-CMD
POP3:EXT:DOT-ISP
POP3:EXT:DOT-MSC
POP3:EXT:DOT-URL
POP3:EXT:DOT-ZIP
POP3:EXT:DOT-COM
POP3:EXT:DOT-WSF
POP3:EXT:DOT-HLP
POP3:EXT:DOT-MSI
POP3:EXT:DOT-GRP
POP3:EXT:DOT-WMF

POP3:FAILURE

POP3:FAILURE:BRUTE-FORCE

POP3:OUTLOOK

POP3:OUTLOOK:LOCAL-LINK
POP3:OUTLOOK:CRAFTED-RESP
POP3:OUTLOOK:HRALIGN-OF
POP3:OUTLOOK:MHTML-CDI
POP3:OUTLOOK:OL-IFRAME-EXEC
POP3:OUTLOOK:TROUBLE-QUERY-OF
POP3:OUTLOOK:MULTIPLE-FROM

POP3:OVERFLOW

POP3:OVERFLOW:FILENAME2LONG
POP3:OVERFLOW:BOUNDARY_OVERFLOW
POP3:OVERFLOW:TXTLINE_2LONG
POP3:OVERFLOW:CONTENT_NAME
POP3:OVERFLOW:COMMAND
POP3:OVERFLOW:LINE
POP3:OVERFLOW:PASS
POP3:OVERFLOW:APOP
POP3:OVERFLOW:USER
POP3:OVERFLOW:SCO-POP3-OVERFLOW
POP3:OVERFLOW:BSD-OFLOW-1
POP3:OVERFLOW:BSD-OFLOW-2
POP3:OVERFLOW:LINUX-OFLOW
POP3:OVERFLOW:QPOP-OF3
POP3:OVERFLOW:QPOP-OF2
POP3:OVERFLOW:PCCILLIN-POP-OF
POP3:OVERFLOW:ERR-RPLY-OF
POP3:OVERFLOW:HTTP-LINK-OF
POP3:OVERFLOW:AXIGEN-FS
POP3:OVERFLOW:PEEPER-UIDL
POP3:OVERFLOW:CURL-LIBCURL-BO
POP3:OVERFLOW:QPOP-OF4
POP3:OVERFLOW:EUDORA-URL-BOF

POP3:REQERR

POP3:REQERR:REQ-SYNTAX-ERROR
POP3:REQERR:REQ-MESSAGE-NUMBER
POP3:REQERR:REQ-BINARY-DATA

POP3:USER

POP3:USER:ROOT

PORTMAPPER

PORTMAPPER:GETADDR-RESP-MAL-UA

PORTMAPPER:AUDIT

PORTMAPPER:AUDIT:ROOT-ACCESS

PORTMAPPER:ERR

PORTMAPPER:ERR:LONG-NETNAME
PORTMAPPER:ERR:WRONG-DIR
PORTMAPPER:ERR:SHORT-READ
PORTMAPPER:ERR:LARGE-CRED

PORTMAPPER:INFO

PORTMAPPER:INFO:NULL-PROC
PORTMAPPER:INFO:SET-PROC
PORTMAPPER:INFO:DUMP_PROC
PORTMAPPER:INFO:UNSET-PROC
PORTMAPPER:INFO:CALLIT-PROC
PORTMAPPER:INFO:PORTMAP-DUMP

PORTMAPPER:INVALID

PORTMAPPER:INVALID:BAD-CRED-LEN
PORTMAPPER:INVALID:BAD-VERF-CRD

PROTOCOLS:PORT

PROTOCOLS:PORT:POP3
PROTOCOLS:PORT:FTP
PROTOCOLS:PORT:TELNET
PROTOCOLS:PORT:SSH
PROTOCOLS:PORT:SIP
PROTOCOLS:PORT:HTTP

PROTOCOLS:TRAFFIC

PROTOCOLS:TRAFFIC:NOT-DNS-TCP
PROTOCOLS:TRAFFIC:NOT-TELNET
PROTOCOLS:TRAFFIC:NOT-FTP
PROTOCOLS:TRAFFIC:NOT-DHCP
PROTOCOLS:TRAFFIC:NOT-HTTP
PROTOCOLS:TRAFFIC:NOT-DNS-UDP
PROTOCOLS:TRAFFIC:NOT-IMAP
PROTOCOLS:TRAFFIC:NOT-POP3
PROTOCOLS:TRAFFIC:NOT-SMTP
PROTOCOLS:TRAFFIC:NOT-SNMP
PROTOCOLS:TRAFFIC:NOT-SYSLOG
PROTOCOLS:TRAFFIC:NOT-NTP
PROTOCOLS:TRAFFIC:NOT-IKE
PROTOCOLS:TRAFFIC:NOT-SSH

RADIUS

RADIUS:INVALID_MSG_LENGTH
RADIUS:INVALID_ATTR_LENGTH
RADIUS:MSG_TOO_SHORT
RADIUS:ACCREQ_DISALLOWD_ATTR
RADIUS:ACCREJ_DISALLOWD_ATTR
RADIUS:ACCREJ_INV_NUM_ATTRS
RADIUS:ACCCHAL_INV_NUM_ATTRS
RADIUS:ACCREQ_INV_NUM_ATTRS
RADIUS:ACCREQ_ATTR_MISSING
RADIUS:ACSREQ_DISALLOWD_ATTR
RADIUS:ACSREQ_INV_NUM_ATTRS
RADIUS:ACC_ACC_DISALOWD_ATTR
RADIUS:INVALID_MSG_CODE
RADIUS:ACCREP_DISALLOWD_ATTR
RADIUS:RADIUS-BRUTE-FORCE
RADIUS:INCONSISTANT_LENGTH
RADIUS:MALFORMED_VENDOR_ATTR
RADIUS:ACCCHA_DISALLOWD_ATTR
RADIUS:ACC_ACCEPT_INV_NATTRS
RADIUS:INVALID_ATTR_TYPE
RADIUS:USR-OF
RADIUS:CLIENT-CERT-VERIF-BO
RADIUS:FREERADIUS-DOS
RADIUS:FS-INJ
RADIUS:USR-AUTHENTICATION
RADIUS:TYPE-DOS

REXEC:AUDIT

REXEC:AUDIT:ILL-ERR-PORT
REXEC:AUDIT:PARAM-NOT-OK

REXEC:OVERFLOW

REXEC:OVERFLOW:USERNAME
REXEC:OVERFLOW:COMMAND
REXEC:OVERFLOW:PASSWORD

RLOGIN:AUDIT

RLOGIN:AUDIT:PARAM-NOT-OK
RLOGIN:AUDIT:REQ-ILLEGAL-PORT

RLOGIN:FAILURE

RLOGIN:FAILURE:LOGIN-FAILURE

RLOGIN:INFO

RLOGIN:INFO:RLOGIN-LOGIN

RLOGIN:OVERFLOW

RLOGIN:OVERFLOW:TERMINAL
RLOGIN:OVERFLOW:USERNAME
RLOGIN:OVERFLOW:LONG-ARGS

RLOGIN:REQERR

RLOGIN:REQERR:DATA-IN-1ST-LINE

RLOGIN:USER

RLOGIN:USER:USER-BIN
RLOGIN:USER:USER-ECHO
RLOGIN:USER:USER-ROOT
RLOGIN:USER:ROOT-ACCESS

RPC

RPC:KRB5-LIB-OF
RPC:NULL-TADDR2UADDR
RPC:WDB-AGENT
RPC:PCNFSD-FS
RPC:SOL-CDE-CALENDAR-MGR
RPC:CALL-IT-OF
RPC:SUN-SOLARIS-SADMIND-BO
RPC:KADMIND-KLOG
RPC:SUN-SOLARIS-SADMIND-ADM
RPC:XDR-INTEGER-OVERFLOW
RPC:RLPR-FS
RPC:KADMIND-RENAME
RPC:EMC-LEGATO-NW-OF
RPC:KADMIND-OF
RPC:AUTOMOUNTD-OF
RPC:YPUPDATED-CMD-INJ

RPC:AUDIT

RPC:AUDIT:REQ-INVALID-XID
RPC:AUDIT:INVALID-DIR
RPC:AUDIT:GETPORT-FAILED
RPC:AUDIT:REQUEST-DENIED

RPC:FAILURE

RPC:FAILURE:SET-FAILED
RPC:FAILURE:CALLIT-FAILED
RPC:FAILURE:UNSET-FAILED

RPC:REQERR

RPC:REQERR:REQ-INVALID-PROC

RPC:RPC.CMSD

RPC:RPC.CMSD:RPC-CMSD-OVERFLOW

RPC:RPC.MOUNTD

RPC:RPC.MOUNTD:LINUX-MOUNTD-OBO
RPC:RPC.MOUNTD:XLINK-IOF
RPC:RPC.MOUNTD:SHOWMOUNT-TCP
RPC:RPC.MOUNTD:SHOWMOUNT
RPC:RPC.MOUNTD:SHOWMOUNT-UDP

RPC:RPC.SADMIND

RPC:RPC.SADMIND:ADM-METHOD-TRAV
RPC:RPC.SADMIND:SADMIND-OF

RPC:RPC.SNMPXDMID

RPC:RPC.SNMPXDMID:OVERFLOW

RPC:RPC.STATD

RPC:RPC.STATD:STATD-FMT-STR4
RPC:RPC.STATD:STATD-FMT-STR1
RPC:RPC.STATD:STATD-FMT-STR5
RPC:RPC.STATD:RPC-STATD-OF
RPC:RPC.STATD:AUTOMOUNT-TLI
RPC:RPC.STATD:STATD-FMT-STR2

RPC:RPC.TTDBSERVER

RPC:RPC.TTDBSERVER:TT-REAL-PATH
RPC:RPC.TTDBSERVER:TT-MAL-FS
RPC:RPC.TTDBSERVER:TT-MAL-FS-3
RPC:RPC.TTDBSERVER:TT-MAL-OF
RPC:RPC.TTDBSERVER:TT-MAL-FS-2

RPC:RPC.WALLD

RPC:RPC.WALLD:WALLD-ERR-FTSTR-2
RPC:RPC.WALLD:SYSLOG-FS

RPC:RWHOD

RPC:RWHOD:RWHOD-NULL-INJ

RSH:AUDIT

RSH:AUDIT:REQ-ILLEGAL-ERR-PORT
RSH:AUDIT:REQ-ILLEGAL-PORT
RSH:AUDIT:PARAM-OK
RSH:AUDIT:PARAM-NOT-OK

RSH:FAILURE

RSH:FAILURE:LOGIN-FAILURE

RSH:OVERFLOW

RSH:OVERFLOW:COMMAND
RSH:OVERFLOW:USERNAME
RSH:OVERFLOW:WINRSHD-OF
RSH:OVERFLOW:WIN-DAEMON-BO

RSH:USER

RSH:USER:USER-ECHO
RSH:USER:USER-BIN
RSH:USER:USER-ROOT

RSYNC

RSYNC:EXCLUDE-OF
RSYNC:CHUNK-OF
RSYNC:DIR-TRAV

RTSP

RTSP:PLAY
RTSP:SETUP-EMPTY
RTSP:SET-PARAMETER
RTSP:EMPTY-HEADER
RTSP:SETUP-HDR
RTSP:SETUP
RTSP:MS-MEDIA-PLAYER-MC
RTSP:HELIX-RN5AUTH
RTSP:UBIQUITI-AIRCAM-BOF
RTSP:DESCRIBE-BOF
RTSP:VLC-BO
RTSP:REALNETWORKS-HELIX-DOS
RTSP:MAL-RTSP

RTSP:EXPLOIT

RTSP:EXPLOIT:INVALID-PORT

RTSP:OVERFLOW

RTSP:OVERFLOW:LINE-OF
RTSP:OVERFLOW:DESCRIBE-OF
RTSP:OVERFLOW:STREAMCOUNT
RTSP:OVERFLOW:LOADTEST-PW-OF
RTSP:OVERFLOW:RTSP-CONTENT
RTSP:OVERFLOW:TRANSPORT-OF

RTSP:REALSERVER

RTSP:REALSERVER:REAL-SETUP-OF2
RTSP:REALSERVER:REAL-SETUP-OF3
RTSP:REALSERVER:REAL-SETUP-OF4
RTSP:REALSERVER:MAL-HEADER
RTSP:REALSERVER:REAL-SETUP-OF1

RUSERS:AUDIT

RUSERS:AUDIT:REQ-DENIED
RUSERS:AUDIT:ROOT-ACCESS
RUSERS:AUDIT:INVALID-XID
RUSERS:AUDIT:UNKNOWN-VER

RUSERS:ERR

RUSERS:ERR:LONG-NETNAME
RUSERS:ERR:SHORT-READ
RUSERS:ERR:LARGE-CRED
RUSERS:ERR:WRONG-DIR

RUSERS:INFO

RUSERS:INFO:UNKNOWN-PROG

RUSERS:INVALID

RUSERS:INVALID:INVALID-PROC
RUSERS:INVALID:INVALID-DIR
RUSERS:INVALID:BAD-VERF-CRED
RUSERS:INVALID:BAD-CRED-LEN

RUSERS:OVERFLOW

RUSERS:OVERFLOW:HOST-OVERFLOW
RUSERS:OVERFLOW:DEV-OVERFLOW
RUSERS:OVERFLOW:USER-OVERFLOW

SCADA

SCADA:YOKOGAWA-STACK-OF
SCADA:SIEMENS-SIMATIC-WINCC-BO
SCADA:WWSUITE
SCADA:EKTRON-CMS-XSLT-RCE
SCADA:DEQFACTORY-NETB
SCADA:SCADATEC-PROCYON
SCADA:CITECT-OF
SCADA:IOSERVER-INFO-DISCLSURE
SCADA:MEASURESOFT-SCADAPRO-RCE
SCADA:SIEMENS-SIMATIC-CPU-RCE
SCADA:SIEMENS-CSSERVICE-BOF
SCADA:SIEMENS-SIMATIC-S7-300
SCADA:DATAC-REALWIN-OF
SCADA:SIEMENS-AUTO-LM-DOS
SCADA:ICONICS-GENBROKER
SCADA:SIEMENS-SIMATIC-MINIWEB
SCADA:MOXA-MDM-BO
SCADA:COGENT-DATAHUB-BO
SCADA:DATAC-REALWIN-MULT-BOF
SCADA:KINGVIEW-HISTORYSRV-OC3
SCADA:KINGVIEW-HISTORYSVR-OF
SCADA:PROGEA-MOVICON-SEC-BYPASS
SCADA:BACNET-OPC-CLIENT-OF
SCADA:3S-CODESYS-DIR-TRAVERSAL
SCADA:SCADATEC-MODBUS-BO
SCADA:OPTIMA-APIFTP-DOS
SCADA:SIEMENS-TECNO-CSSERVICE
SCADA:CODESYS-FOLDER-CREATION
SCADA:SIEMENS-SIMATIC-HMIL-DIR
SCADA:SIEMENS-SIMATIC-HMILOAD
SCADA:SCADAPHONE-OF-DOS
SCADA:SIEMENS-AUTO-LM-NULL
SCADA:WINLOG-TCP-OF
SCADA:SIEMENS-AUTO-LM-SERIALID
SCADA:CODESYS-GATEWAY-SERVICE
SCADA:SUNWAY-FORCECONTROL-OF
SCADA:3S-CODESYS-GWS-DIRTRVRSL
SCADA:CIP-UNAUTH-CMDEXEC
SCADA:CODESYS-GATEWAY-DOS
SCADA:CODESYS-HEAP-OVF
SCADA:CODESYS-CMPWEBSERVER
SCADA:SIELCO-SISTEMI-WINLOG-BOF
SCADA:ABB-MICROSCADA-BOF
SCADA:SCHNIDER-DB-INFO-DIS
SCADA:SIELCO-SISTEMI-WINLOGPRO
SCADA:KINGVIEW-BOF
SCADA:CODESYS-BO
SCADA:CODESYS-MEM-ERR
SCADA:7T-INTERACTIVE-IGSS-OF
SCADA:REALWIN
SCADA:ABB-WSERVER-CMD-EXEC
SCADA:SCHNEIDER-ELEC-INTER-BOF
SCADA:CODESYS-CONTROL-SERVICE
SCADA:7T-INTERACTIVE-DC-OF
SCADA:SIEMENS-TECNO-VRN-OF
SCADA:WELLINTECH-KING-OF
SCADA:SCHNEIDER-ELE-INT-BO

SCADA:DNP3

SCADA:DNP3:RESPONSE-DOS
SCADA:DNP3:WARM-RESTART
SCADA:DNP3:BROADCAST
SCADA:DNP3:STOP
SCADA:DNP3:READ
SCADA:DNP3:COLD-RESTART
SCADA:DNP3:DISABLE-RESP
SCADA:DNP3:MISC-REQ
SCADA:DNP3:NON-DNP3
SCADA:DNP3:WRITE

SCADA:ICCP

SCADA:ICCP:WRONG-AB-PARAMETER
SCADA:ICCP:WRONG-DT-PARAMETER
SCADA:ICCP:UNSUPPORTED-SERVICE
SCADA:ICCP:INVALID-VERSION
SCADA:ICCP:INVALID-TPDU
SCADA:ICCP:CN-INVALID
SCADA:ICCP:UNSUPPORTED-TPDU
SCADA:ICCP:BUFFER-SIZE
SCADA:ICCP:WRONG-CN-PARA
SCADA:ICCP:REASON-CODE-LENGTH
SCADA:ICCP:WRONG-FN-PARAMETER
SCADA:ICCP:DISCONNECT-CODE
SCADA:ICCP:CN-INVALID-LENGTH

SCADA:IEC104

SCADA:IEC104:INVALID-START-TAG
SCADA:IEC104:SESSION
SCADA:IEC104:MALFORMED-MESSAGE
SCADA:IEC104:SESSION-ALT-PORT
SCADA:IEC104:INVALID-UDP-MSG
SCADA:IEC104:MESSAGE-OVERFLOW
SCADA:IEC104:SHORT-MSG
SCADA:IEC104:MESSAGE-TYPEU-FN
SCADA:IEC104:TYPE-S
SCADA:IEC104:TYPE-I
SCADA:IEC104:TYPE-U

SCADA:MODBUS

SCADA:MODBUS:BAD-PROTO-ID
SCADA:MODBUS:TRAILING-DATA
SCADA:MODBUS:SHORT-PDU
SCADA:MODBUS:UNDERFLOW
SCADA:MODBUS:INVALID-UNI-ID
SCADA:MODBUS:OVERLONG-PDU
SCADA:MODBUS:NOT-MODBUS
SCADA:MODBUS:TRI-COIL-DOS
SCADA:MODBUS:BUSY-EXCEPTION
SCADA:MODBUS:LISTEN-ONLY
SCADA:MODBUS:DOS
SCADA:MODBUS:LENGTH
SCADA:MODBUS:INVALID-HEADER
SCADA:MODBUS:SLAVE-ID
SCADA:MODBUS:READ-ID
SCADA:MODBUS:CLEAR
SCADA:MODBUS:READ
SCADA:MODBUS:WRITE
SCADA:MODBUS:INPUT-INT-OF
SCADA:MODBUS:OPC-SVR-HEAP-CORR
SCADA:MODBUS:GALIL-MODBUS-DOS

SCAN

SCAN:DARKD0RK3R-XSS
SCAN:ACUNETIX
SCAN:MFS-PROBE
SCAN:PYSMBLIB
SCAN:DARKD0RK3R-LFI
SCAN:W3AF
SCAN:DIRBUSTER-UA
SCAN:BREAKINGPOINT-HTTP
SCAN:MUIEBLACKCAT-TOOL
SCAN:MASSCAN-UA
SCAN:OPENVAS-UA
SCAN:PHP-CGI-RCE-ACTIVITY

SCAN:ADM

SCAN:ADM:FTP-SCAN

SCAN:AMAP

SCAN:AMAP:SAP-R3-ON-HTTP
SCAN:AMAP:SAP-R3-ON-SSH
SCAN:AMAP:SSL-SCAN
SCAN:AMAP:SAP-R3-ON-SMTP
SCAN:AMAP:FTP-SCAN
SCAN:AMAP:AMAP-USER

SCAN:APPDETECTIVE

SCAN:APPDETECTIVE:HTTPS
SCAN:APPDETECTIVE:HTTP-UA
SCAN:APPDETECTIVE:LDAP-UA

SCAN:AUDIT

SCAN:AUDIT:NBSTAT-QUERY
SCAN:AUDIT:ARACHNI-WEB-SCANNER
SCAN:AUDIT:IKE-TOOL-SCAN

SCAN:CANVAS

SCAN:CANVAS:NETWORKER-3
SCAN:CANVAS:NOVELL2
SCAN:CANVAS:INGRESS
SCAN:CANVAS:FEDORA4
SCAN:CANVAS:WORDMAIL3
SCAN:CANVAS:TIVOLI3
SCAN:CANVAS:LINUXSNMP
SCAN:CANVAS:ESERV
SCAN:CANVAS:HELIUM-AGENT
SCAN:CANVAS:MAILENABLE

SCAN:CERBERUS

SCAN:CERBERUS:SMTP
SCAN:CERBERUS:FTP
SCAN:CERBERUS:HTTP

SCAN:CORE

SCAN:CORE:DNS-STD-QUERY
SCAN:CORE:MP-IE-ZONE-BYPASS
SCAN:CORE:EXPLOIT-UNPACK
SCAN:CORE:OPENSSH-CHANNEL
SCAN:CORE:JPEG-GDI-VGX-EXPLOIT
SCAN:CORE:NTPD-CTRL-MSG-OF
SCAN:CORE:SQL-SERVER-HELLO
SCAN:CORE:AGENT-LOAD-WIN
SCAN:CORE:EXPLOIT-UNPACK-HTTP
SCAN:CORE:SAMBA-TRANS2
SCAN:CORE:IIS-ASP-CHUNKED
SCAN:CORE:TELNETD-LOGIN
SCAN:CORE:MSRPC-WKSSVC
SCAN:CORE:SAMBA-NTTRANS

SCAN:CYBERCOP

SCAN:CYBERCOP:SMTP-EXPN
SCAN:CYBERCOP:SMTP-EHLO
SCAN:CYBERCOP:OS-PROBE-1
SCAN:CYBERCOP:OS-PROBE-2
SCAN:CYBERCOP:FINGER-REDIR
SCAN:CYBERCOP:FINGER-QUERY
SCAN:CYBERCOP:UDP-BOMB

SCAN:II

SCAN:II:IIS-ISAPI-ENUM
SCAN:II:ISAKMP-FLOOD
SCAN:II:TIQ-WMF-MAL-HEADER
SCAN:II:ALLAIRE-CF-OF

SCAN:ISS

SCAN:ISS:FTP-SCAN

SCAN:METASPLOIT

SCAN:METASPLOIT:LSASS
SCAN:METASPLOIT:VICTIM-PROFILE
SCAN:METASPLOIT:TWIKI-CONF-CMD
SCAN:METASPLOIT:METERPRETER-DLL
SCAN:METASPLOIT:JS-HEAPLIB
SCAN:METASPLOIT:JAVA-APPLET
SCAN:METASPLOIT:EXECCOMMAND-UAF
SCAN:METASPLOIT:SMB-ACTIVE
SCAN:METASPLOIT:APACHE-CHUNK-OF

SCAN:MISC

SCAN:MISC:QUERY
SCAN:MISC:CAT-ETC-PASSWD-UDP
SCAN:MISC:MSTREAM-REP-12754
SCAN:MISC:MSTREAM-REP-15104
SCAN:MISC:SYN-FIN
SCAN:MISC:IDP-TEST
SCAN:MISC:MSTREAM-CLIENT-REQ
SCAN:MISC:SVR-RES-S1024
SCAN:MISC:NULL
SCAN:MISC:NETCAT-DOEXEC-BO
SCAN:MISC:USER-LIST
SCAN:MISC:ADMROCKS-TCP
SCAN:MISC:ADMROCKS-UDP

SCAN:MISC:FTP

SCAN:MISC:FTP:OPENBSD-X86
SCAN:MISC:FTP:FTP-MKD-DOT
SCAN:MISC:FTP:FTP-MKD
SCAN:MISC:FTP:PPC-FS1
SCAN:MISC:FTP:LOGXFR-OF2
SCAN:MISC:FTP:FREEBSD-FTPD-GLOB
SCAN:MISC:FTP:REALPATH-OF1
SCAN:MISC:FTP:BSD-FTPD-MKD-OF
SCAN:MISC:FTP:PATH-LINUX-X86-1
SCAN:MISC:FTP:PATH-LINUX-X86-2
SCAN:MISC:FTP:LOGXFR-OF1
SCAN:MISC:FTP:REALPATH-OF2

SCAN:MISC:HTTP

SCAN:MISC:HTTP:LWGATE-PROBE
SCAN:MISC:HTTP:EDIT-DOC-ATTEMPT
SCAN:MISC:HTTP:POSTING-ATTEMPT
SCAN:MISC:HTTP:WIN-ARGS-CMD
SCAN:MISC:HTTP:WIN-PERL
SCAN:MISC:HTTP:WIN-ARGS-BAT
SCAN:MISC:HTTP:MAN-SH-PROBE
SCAN:MISC:HTTP:VTI-BIN-PROBE
SCAN:MISC:HTTP:CPSHOST-DLL
SCAN:MISC:HTTP:TESTCOUNTER
SCAN:MISC:HTTP:STORE-ACCESS
SCAN:MISC:HTTP:SNORK-ACCESS
SCAN:MISC:HTTP:AX-ADMIN-ACCESS
SCAN:MISC:HTTP:REQ-HTTP-CONF
SCAN:MISC:HTTP:HTGROUP-ACCESS
SCAN:MISC:HTTP:FILEMAIL-ACCESS
SCAN:MISC:HTTP:AXS-ACCESS
SCAN:MISC:HTTP:ENVIRON-CGI
SCAN:MISC:HTTP:START-STOP-DOS
SCAN:MISC:HTTP:FLEXFORM-PROBE
SCAN:MISC:HTTP:ADMCGI-EXE-PROBE
SCAN:MISC:HTTP:CFGWIZ-EXE-PROBE
SCAN:MISC:HTTP:W2TVARS-PM-PROBE
SCAN:MISC:HTTP:POST-QUERY-PROBE
SCAN:MISC:HTTP:MMSTDOD-PROBE
SCAN:MISC:HTTP:MAILLIST-PROBE
SCAN:MISC:HTTP:WEBTRENDS-PROBE
SCAN:MISC:HTTP:CONT-HTM-PROBE
SCAN:MISC:HTTP:EXAMPLEAPP-PRB
SCAN:MISC:HTTP:ADMADM-EXE-PROBE
SCAN:MISC:HTTP:FILES-ACCESS
SCAN:MISC:HTTP:MACHINEINFO
SCAN:MISC:HTTP:ADMIN-NSF-ACCESS
SCAN:MISC:HTTP:NPH-PUBLISH
SCAN:MISC:HTTP:DCFORUM-ACCESS
SCAN:MISC:HTTP:WEBSITEPRO
SCAN:MISC:HTTP:BACKUP-REQ
SCAN:MISC:HTTP:VIEWCODE-ASP
SCAN:MISC:HTTP:INTRANET-REQ
SCAN:MISC:HTTP:SWEDITSERVLET
SCAN:MISC:HTTP:WEBHITS-ACCESS
SCAN:MISC:HTTP:ADMADM-HTM-PROBE
SCAN:MISC:HTTP:WWW-SQL-PROBE
SCAN:MISC:HTTP:RWWWSH-ACCESS
SCAN:MISC:HTTP:UPLOAD-PROBE
SCAN:MISC:HTTP:PERLSHOP-PROBE
SCAN:MISC:HTTP:DELETE-DOC
SCAN:MISC:HTTP:EDIT-ACCESS
SCAN:MISC:HTTP:WEB-MAP-ACCESS
SCAN:MISC:HTTP:WAIS-ACCESS
SCAN:MISC:HTTP:MINISTATS-ADM
SCAN:MISC:HTTP:SEARCH-VTS
SCAN:MISC:HTTP:BIGCONF-ACCESS
SCAN:MISC:HTTP:ADMIN
SCAN:MISC:HTTP:WEBDRIVER-ACCESS
SCAN:MISC:HTTP:RESPONDER-ACCESS
SCAN:MISC:HTTP:SRCADM-PROBE
SCAN:MISC:HTTP:REPOST-ACCESS
SCAN:MISC:HTTP:SRCH-HTM-PROBE
SCAN:MISC:HTTP:SCRIPTS-BROWSE
SCAN:MISC:HTTP:SITE-IISAMPLES
SCAN:MISC:HTTP:PERL-PROBE
SCAN:MISC:HTTP:ACHG-HTR-PROBE
SCAN:MISC:HTTP:MEM-BIN-PROBE
SCAN:MISC:HTTP:QUERYHIT-ACCESS
SCAN:MISC:HTTP:CNF-PROBE
SCAN:MISC:HTTP:MSPROXY-PROBE
SCAN:MISC:HTTP:CSS-PROBE
SCAN:MISC:HTTP:README-EML
SCAN:MISC:HTTP:MSDAC-PROBE
SCAN:MISC:HTTP:MAINFRMST-PROBE
SCAN:MISC:HTTP:CYBERCOP-HTTP
SCAN:MISC:HTTP:WS-FTP-INI-ATMPT
SCAN:MISC:HTTP:WIN-NC
SCAN:MISC:HTTP:WIN-CD..
SCAN:MISC:HTTP:WIN-TELNET-EXE
SCAN:MISC:HTTP:WIN-WSH
SCAN:MISC:HTTP:WIN-RCMD
SCAN:MISC:HTTP:TILDA-ROOT
SCAN:MISC:HTTP:UNIX-BIN-CSH
SCAN:MISC:HTTP:SENDMESSAGE
SCAN:MISC:HTTP:SENDFORM-ACCESS
SCAN:MISC:HTTP:DIR-LISTING
SCAN:MISC:HTTP:VIOLATION-ACCS
SCAN:MISC:HTTP:CODE-ACCESS
SCAN:MISC:HTTP:NESSUS-HTTP
SCAN:MISC:HTTP:SERVER-INFO
SCAN:MISC:HTTP:QUID-PRO-QUO-LOG
SCAN:MISC:HTTP:SEARCH97-VTS
SCAN:MISC:HTTP:VOIDEYE
SCAN:MISC:HTTP:IIS-SAMPLES
SCAN:MISC:HTTP:WEBCOM-EXE
SCAN:MISC:HTTP:ALIBABA
SCAN:MISC:HTTP:IIS-NEWDSN
SCAN:MISC:HTTP:TEST-DOT-CGI
SCAN:MISC:HTTP:FORMHANDLER
SCAN:MISC:HTTP:HEAD
SCAN:MISC:HTTP:ADMIN-FILES
SCAN:MISC:HTTP:UPLOADER-EXE
SCAN:MISC:HTTP:DAY5DATA-PROBE
SCAN:MISC:HTTP:TRACE
SCAN:MISC:HTTP:PUT
SCAN:MISC:HTTP:HTGREP-ACCESS
SCAN:MISC:HTTP:IPLANET-GETPROP
SCAN:MISC:HTTP:AUTH-ACCESS
SCAN:MISC:HTTP:CONTEXTADMIN
SCAN:MISC:HTTP:WWWADM-ACCESS
SCAN:MISC:HTTP:CACHEMGR-ACCESS
SCAN:MISC:HTTP:NETCAT-CMD
SCAN:MISC:HTTP:SHELL-ACCESS
SCAN:MISC:HTTP:TEST-PROBE
SCAN:MISC:HTTP:TEST-CGI-INFO
SCAN:MISC:HTTP:WIN-C-SAMPLE
SCAN:MISC:HTTP:WIN-TFTP-EXE
SCAN:MISC:HTTP:ANNEX-DOS
SCAN:MISC:HTTP:SNIPPETS-PROBE
SCAN:MISC:HTTP:HTW-ACCESS
SCAN:MISC:HTTP:CFAPPMAN-PROBE
SCAN:MISC:HTTP:SYNTXCHK-PROBE
SCAN:MISC:HTTP:FINGER-PROBE
SCAN:MISC:HTTP:ARCHITEXT-QUERY

SCAN:MISC:TELNET

SCAN:MISC:TELNET:TELNET-PORT-21
SCAN:MISC:TELNET:XHOST
SCAN:MISC:TELNET:STROBE
SCAN:MISC:TELNET:SU-BIN
SCAN:MISC:TELNET:SU-ROOT
SCAN:MISC:TELNET:CISCO
SCAN:MISC:TELNET:XHOST-PLUS
SCAN:MISC:TELNET:SU-WRNG-GRP
SCAN:MISC:TELNET:CAT-ETC-INETD
SCAN:MISC:TELNET:CD-VAR-HIDDEN
SCAN:MISC:TELNET:ID
SCAN:MISC:TELNET:ETC-GROUP
SCAN:MISC:TELNET:REBOOT
SCAN:MISC:TELNET:CAT-ETC-PASSWD
SCAN:MISC:TELNET:NC
SCAN:MISC:TELNET:APPEND-RHOSTS
SCAN:MISC:TELNET:TELNET-PORT-25
SCAN:MISC:TELNET:CD-USR-HIDDEN
SCAN:MISC:TELNET:MKDIR
SCAN:MISC:TELNET:VI-ETC-PASSWD
SCAN:MISC:TELNET:NMAP
SCAN:MISC:TELNET:CD-BIN-HIDDEN
SCAN:MISC:TELNET:CD-DOT-DOT-DOT
SCAN:MISC:TELNET:SHUTDOWN
SCAN:MISC:TELNET:APPEND-PASSWD
SCAN:MISC:TELNET:VI-ETC-GROUP
SCAN:MISC:TELNET:TELNET-PORT-80

SCAN:NESSUS

SCAN:NESSUS:GLOBAL-ASA
SCAN:NESSUS:ISS-DIR-LISTING
SCAN:NESSUS:NPH-PUBLISH-CGI
SCAN:NESSUS:SMTP-SCAN
SCAN:NESSUS:DNS-SCAN
SCAN:NESSUS:TFTP-SCAN
SCAN:NESSUS:SSH
SCAN:NESSUS:HTTP-USER-AGENT
SCAN:NESSUS:SMB-SCAN
SCAN:NESSUS:COUNT-CGI

SCAN:NETECT

SCAN:NETECT:SMTP

SCAN:NEXPOSE

SCAN:NEXPOSE:SNMP-PROBE
SCAN:NEXPOSE:TFTP-PROBE
SCAN:NEXPOSE:SQLD-PROBE

SCAN:NIKTO

SCAN:NIKTO:USER-AGENT
SCAN:NIKTO:URL

SCAN:NMAP

SCAN:NMAP:XMAS
SCAN:NMAP:FINGERPRINT
SCAN:NMAP:NMAP-UDP-1
SCAN:NMAP:NSE-HTTP-UA

SCAN:PISS

SCAN:PISS:FTP-SCAN

SCAN:RETINA

SCAN:RETINA:FTP

SCAN:RPVS

SCAN:RPVS:XSS-URL

SCAN:RVSCAN

SCAN:RVSCAN:FTP

SCAN:SAINT

SCAN:SAINT:FTP-SCAN

SCAN:SATAN

SCAN:SATAN:FTP-SCAN

SCAN:SENTINEL

SCAN:SENTINEL:TELNET-SPOOF

SCAN:SSH-RESEARCH

SCAN:SSH-RESEARCH:ACTIVITY

SCAN:WEBTRENDS

SCAN:WEBTRENDS:UDP-PROBE

SCAN:XPROBE

SCAN:XPROBE:XPROBE-BADCODE

SCREENOS

SCREENOS:IDS_ICMP_INFO_REQUEST
SCREENOS:IDS_IP_OPT_TIMESTAMP
SCREENOS:IDS_IP_OPT_SCHT
SCREENOS:IDS_ICMP_INFO_REPLY
SCREENOS:IDS_IP_OPT_LSR
SCREENOS:IDS_ICMP_ECHO_REPLY
SCREENOS:IDS_COMPONENT
SCREENOS:DENY_POLICY
SCREENOS:MULTI_AUTH_FAIL
SCREENOS:CONNECT_SME_PORT
SCREENOS:CONNECT_CMS_PORT
SCREENOS:IDS_IP_UNKNOWN_PROT
SCREENOS:UDP_FLOOD
SCREENOS:IP_SOURCE_ROUTE
SCREENOS:IDS_ICMP_HOST_UNREACH
SCREENOS:IDS_IP_OPT_STREAM
SCREENOS:IDS_IP_OPT_SSR
SCREENOS:IDS_SYN_FRAG
SCREENOS:IDS_ICMP_SRC_QUENCH
SCREENOS:IDS_ICMP_REDIRECT
SCREENOS:IDS_TCP_FIN_NO_ACK
SCREENOS:IDS_ICMP_ADDR_MSK_REP
SCREENOS:IDS_IP_BLOCK_FRAG
SCREENOS:IDS_ICMP_ECHO_REQUEST
SCREENOS:IDS_ICMP_FRAGMENT
SCREENOS:IDS_ICMP_PARA_PROB
SCREENOS:IDS_TCP_NO_FLAG
SCREENOS:IDS_ICMP_TS_REQUEST
SCREENOS:IDS_IP_OPT_RECORD
SCREENOS:IDS_ICMP_TS_REPLY
SCREENOS:IDS_ICMP_TIME_EXCEED
SCREENOS:IDS_ICMP_ADDR_MSK_REQ

SHELLCODE

SHELLCODE:PREPENDENCODER-HTTP
SHELLCODE:HEX-ASCII-HEAPS-CHAR
SHELLCODE:PREPENDENCODER-TCP

SHELLCODE:ACTIVE

SHELLCODE:ACTIVE:DCDR-1-UDP-CTS
SHELLCODE:ACTIVE:DECODER3-80-CL
SHELLCODE:ACTIVE:DECODER2-80-CL
SHELLCODE:ACTIVE:BIND-1-HTTP-CL
SHELLCODE:ACTIVE:REVERSE-80-CTS
SHELLCODE:ACTIVE:REVERSE-80-STC
SHELLCODE:ACTIVE:DCDR-1-TCP-STC
SHELLCODE:ACTIVE:JS-ESCAPE
SHELLCODE:ACTIVE:BIND-1-SMB-STC
SHELLCODE:ACTIVE:BIND-1-TCP-STC
SHELLCODE:ACTIVE:BIND-1-TCP-CTS
SHELLCODE:ACTIVE:DCDR-1-TCP-CTS
SHELLCODE:ACTIVE:BIND-1-SMB-CTS
SHELLCODE:ACTIVE:DECODER2-80-SV
SHELLCODE:ACTIVE:REVERSE-1-SMB
SHELLCODE:ACTIVE:DECODER1-80-CL
SHELLCODE:ACTIVE:DECODER3-80-SV
SHELLCODE:ACTIVE:DCDR-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-2-TCP-CTS
SHELLCODE:ACTIVE:DCDR-2-TCP-STC
SHELLCODE:ACTIVE:BIND-1-UDP-CTS
SHELLCODE:ACTIVE:RVRS-1-UDP-CLT
SHELLCODE:ACTIVE:REVERSE-1-TCP
SHELLCODE:ACTIVE:DCDR-3-TCP-CTS
SHELLCODE:ACTIVE:DCDR-3-UDP-CTS
SHELLCODE:ACTIVE:DCDR-2-UDP-CTS
SHELLCODE:ACTIVE:DECODER1-80-SV
SHELLCODE:ACTIVE:BIND-1-HTTP-SR
SHELLCODE:ACTIVE:BIND-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-3-TCP-STC
SHELLCODE:ACTIVE:JS-UNESCAPE
SHELLCODE:ACTIVE:DCDR-3-UDP-STC
SHELLCODE:ACTIVE:RVRS-1-UDP-STC
SHELLCODE:ACTIVE:DCDR-2-UDP-STC

SHELLCODE:BSDX86

SHELLCODE:BSDX86:SHELL-1-HTTP
SHELLCODE:BSDX86:SHELL-2-HTTP

SHELLCODE:JS

SHELLCODE:JS:ACTIVEX-OBFUS
SHELLCODE:JS:MAL-ABOUT
SHELLCODE:JS:JSOBFU-NEW
SHELLCODE:JS:ASCII-HEX
SHELLCODE:JS:ESCAPE-HIGH-ASCII
SHELLCODE:JS:MAL-UNESCAPE
SHELLCODE:JS:FROMCHARCODE
SHELLCODE:JS:HEX-ESCAPE
SHELLCODE:JS:AVOID-UTF8-TOLOWER
SHELLCODE:JS:ALPHA-UPPER
SHELLCODE:JS:LEGACY-IN-HTML
SHELLCODE:JS:UNICODE-ENC
SHELLCODE:JS:OBFUSCATION

SHELLCODE:LINUX

SHELLCODE:LINUX:CHMDSDW-HTTP
SHELLCODE:LINUX:SYSKILL
SHELLCODE:LINUX:IPTABLES
SHELLCODE:LINUX:REBOOT
SHELLCODE:LINUX:ARMLE-STGR-80C
SHELLCODE:LINUX:SSH-PORTFWD
SHELLCODE:LINUX:CHMOD-ROOT-RWX
SHELLCODE:LINUX:ARMLE-STGR-80S
SHELLCODE:LINUX:UNLINK-HTTP
SHELLCODE:LINUX:UNLINK
SHELLCODE:LINUX:IPTABLES-H
SHELLCODE:LINUX:CHMOD-SHADOW
SHELLCODE:LINUX:ARMLE-STAGER

SHELLCODE:MIPS

SHELLCODE:MIPS:LE-BYTEXORI-CTS
SHELLCODE:MIPS:BE-LONGXOR-CTS
SHELLCODE:MIPS:BE-BYTEXORI-CTS
SHELLCODE:MIPS:LE-BYTEXORI-STC
SHELLCODE:MIPS:BE-BYTEXORI-80S
SHELLCODE:MIPS:BE-LONGXOR-80S
SHELLCODE:MIPS:LE-BYTEXORI-80S
SHELLCODE:MIPS:BE-BYTEXORI-STC
SHELLCODE:MIPS:LE-LONGXOR-STC
SHELLCODE:MIPS:BE-LONGXOR-STC
SHELLCODE:MIPS:LE-BYTEXORI-80C
SHELLCODE:MIPS:LE-LONGXOR-80S
SHELLCODE:MIPS:LE-LONGXOR-80C
SHELLCODE:MIPS:BE-LONGXOR-80C
SHELLCODE:MIPS:BE-BYTEXORI-80C
SHELLCODE:MIPS:LE-LONGXOR-CTS

SHELLCODE:MSF

SHELLCODE:MSF:FTENV-SMB2
SHELLCODE:MSF:PEXALPHANUM-CTS-1
SHELLCODE:MSF:FTENV-SMB1
SHELLCODE:MSF:DCX86-80S
SHELLCODE:MSF:JAVA-APP
SHELLCODE:MSF:GREENDAM
SHELLCODE:MSF:DCX86-UDP1
SHELLCODE:MSF:PROPSPRAY
SHELLCODE:MSF:DCX86-UDP2
SHELLCODE:MSF:DCX86-STC
SHELLCODE:MSF:DCX86-CTS
SHELLCODE:MSF:GEN-FTP
SHELLCODE:MSF:DCX86-80C
SHELLCODE:MSF:PEXCALL-CTS
SHELLCODE:MSF:PEXALPHANUM-CTS
SHELLCODE:MSF:PEXALPHANUM-STC
SHELLCODE:MSF:PEXCALL-STC
SHELLCODE:MSF:ALPHA2-GETEIP-STC
SHELLCODE:MSF:ALPHA2-GETEIP-CTS
SHELLCODE:MSF:JAVA-JAR

SHELLCODE:OSX

SHELLCODE:OSX:ARMLE-STAGER

SHELLCODE:PHP

SHELLCODE:PHP:SHELL-URI
SHELLCODE:PHP:BASE64-STC
SHELLCODE:PHP:BASE64-80S
SHELLCODE:PHP:BASE64-80C
SHELLCODE:PHP:BASE64-CTS
SHELLCODE:PHP:REVERSE-SHELL

SHELLCODE:PPC

SHELLCODE:PPC:LIN-GNRC-STGR-80C
SHELLCODE:PPC:LINUX-GNRC-STAGER
SHELLCODE:PPC:OSX-STAGER
SHELLCODE:PPC:AIX-STAGER
SHELLCODE:PPC:LIN-GNRC-STGR-80S
SHELLCODE:PPC:LONGXOR-CTS
SHELLCODE:PPC:LONGXOR-80S
SHELLCODE:PPC:LONGXOR-STC
SHELLCODE:PPC:LONGXOR-TAG-STC
SHELLCODE:PPC:LONGXOR-TAG-80S
SHELLCODE:PPC:LONGXOR-TAG-CTS
SHELLCODE:PPC:LONGXOR-80C
SHELLCODE:PPC:LONGXOR-TAG-80C

SHELLCODE:SPARC

SHELLCODE:SPARC:WRITE-EXIT
SHELLCODE:SPARC:BIN-KSH
SHELLCODE:SPARC:BSD-REVERSE-TCP
SHELLCODE:SPARC:BSD-BIND-TCP
SHELLCODE:SPARC:SOLARIS-STAGER
SHELLCODE:SPARC:LONGXORTAG-CTS
SHELLCODE:SPARC:LONGXORTAG-80C
SHELLCODE:SPARC:LONGXORTAG-STC
SHELLCODE:SPARC:LONGXORTAG-80S

SHELLCODE:WIN

SHELLCODE:WIN:SHIKATAGANAI-21C
SHELLCODE:WIN:SHELL-PROMPT
SHELLCODE:WIN:SHIKATA-GANAI-STC
SHELLCODE:WIN:SHIKATAGANAI-80S
SHELLCODE:WIN:SHIKATA-GANAI-CTS
SHELLCODE:WIN:PARTITION-FMT
SHELLCODE:WIN:7-SHUTDOWN
SHELLCODE:WIN:7-TASKMGR
SHELLCODE:WIN:SHIKATAGANAI-80C
SHELLCODE:WIN:SMB-REM-EXEC2
SHELLCODE:WIN:7-EXPTERM
SHELLCODE:WIN:SMB-REM-EXEC1

SHELLCODE:X64

SHELLCODE:X64:WIN-STAGER
SHELLCODE:X64:LINUX-SHELL-BIND
SHELLCODE:X64:LINUX-REVERSE-80C
SHELLCODE:X64:LIN-SHEL-BIND-80C
SHELLCODE:X64:LINUX-REVERSE-80S
SHELLCODE:X64:LINUX-FIND-PORT
SHELLCODE:X64:LIN-SHEL-BIND-80S
SHELLCODE:X64:LINUX-REVERSE-TCP
SHELLCODE:X64:WIN-STAGER-80C
SHELLCODE:X64:OSX-STAGER
SHELLCODE:X64:WIN-STAGER-80S
SHELLCODE:X64:XOR-CTS
SHELLCODE:X64:XOR-80C
SHELLCODE:X64:XOR-80S
SHELLCODE:X64:XOR-STC

SHELLCODE:X86

SHELLCODE:X86:JMPCALLADTIVE-80C
SHELLCODE:X86:NONALPHAUPPER-STC
SHELLCODE:X86:FNSTENV-CTS
SHELLCODE:X86:LINUX-BIND-80C
SHELLCODE:X86:WIN-FIND-TAG-80S
SHELLCODE:X86:FNSTENV-80C
SHELLCODE:X86:X90-NOOP-HTTP-HDR
SHELLCODE:X86:LIN-SHELL-REV-80S
SHELLCODE:X86:FNSTENV-80C-1
SHELLCODE:X86:WIN-NONX-TCP
SHELLCODE:X86:WIN-BIND-IPV6-TCP
SHELLCODE:X86:WIN-STAGER
SHELLCODE:X86:ALPHA-MIXED-80C
SHELLCODE:X86:X90-NOOP-STC
SHELLCODE:X86:WIN-SHELL-XPFW
SHELLCODE:X86:WIN-SPEAK-PWNED
SHELLCODE:X86:LIN-REV-IPV6-80S
SHELLCODE:X86:LIN-REV-NONX-80S
SHELLCODE:X86:WIN-REV-ORD-TCP
SHELLCODE:X86:WIN-SPEAK-PWN-80S
SHELLCODE:X86:WIN-NONX-TCP-80S
SHELLCODE:X86:WIN-STAGER-80C
SHELLCODE:X86:LIN-BIND-NONX-80S
SHELLCODE:X86:WIN-REV-ORD-80S
SHELLCODE:X86:WIN-BIND-IPV6-80S
SHELLCODE:X86:LINUX-BIND-IPV6
SHELLCODE:X86:LINUX-BIND-NONX
SHELLCODE:X86:LINUX-REV-IPV6
SHELLCODE:X86:ALPHA-MIXED-CTS
SHELLCODE:X86:LIN-REV-NONX-80C
SHELLCODE:X86:LINUX-FIND-TAG
SHELLCODE:X86:WIN-SPEAK-PWN-80C
SHELLCODE:X86:WIN-BIND-IPV6-80C
SHELLCODE:X86:LIN-SHELL-REV-80C
SHELLCODE:X86:BLOXOR-80S
SHELLCODE:X86:LIN-BIND-NONX-80C
SHELLCODE:X86:LINUX-REV-NONX
SHELLCODE:X86:LIN-REV-IPV6-80C
SHELLCODE:X86:LINUX-REVERSE-TCP
SHELLCODE:X86:LINUX-FND-PRT-80C
SHELLCODE:X86:BSD-BIND-TCP
SHELLCODE:X86:LINUX-FND-TAG-80S
SHELLCODE:X86:LINUX-BIND-80S
SHELLCODE:X86:LINUX-FND-TAG-80C
SHELLCODE:X86:LINUX-SHELL-REV
SHELLCODE:X86:BSD-FIND-PORT
SHELLCODE:X86:BSD-REV-IPV6
SHELLCODE:X86:BSD-BIND-IPV6-TCP
SHELLCODE:X86:LINUX-FIND-PORT
SHELLCODE:X86:BSD-EXEC
SHELLCODE:X86:WIN-STAGER-80S
SHELLCODE:X86:WIN-NONX-TCP-80C
SHELLCODE:X86:BSD-FIND-TAG
SHELLCODE:X86:WIN-FIND-TAG
SHELLCODE:X86:FNSTENV-STC
SHELLCODE:X86:FNSTENV-80S
SHELLCODE:X86:BSD-REVERSE-TCP
SHELLCODE:X86:OSX-REVERSE-TCP
SHELLCODE:X86:OSX-BIND-TCP
SHELLCODE:X86:WIN-FIND-TAG-80C
SHELLCODE:X86:BSDI-STAGER
SHELLCODE:X86:OSX-FIND-PORT
SHELLCODE:X86:SOLARIS-STAGER
SHELLCODE:X86:LINUX-BIND-TCP
SHELLCODE:X86:WIN-REV-ORD-80C
SHELLCODE:X86:UNICODE-MIXED-CTS
SHELLCODE:X86:LIN-BIND-IPV6-80C
SHELLCODE:X86:ALPHA-UPPER-CTS
SHELLCODE:X86:BLOXOR-TCP-CTS
SHELLCODE:X86:UNICODE-MIXED-80C
SHELLCODE:X86:LINUX-FND-PRT-80S
SHELLCODE:X86:BLOXOR-80C
SHELLCODE:X86:COUNTDOWN-CTS
SHELLCODE:X86:ADD-SUB-CTS
SHELLCODE:X86:ADD-SUB-80C
SHELLCODE:X86:ALPHA-MIXED-STC
SHELLCODE:X86:ALPHA-UPPER-80C
SHELLCODE:X86:AVD-UTF8TLWR-CTS
SHELLCODE:X86:UNICODE-MIXED-80S
SHELLCODE:X86:ALPHA-UPPER-80S
SHELLCODE:X86:ALPHA-UPPER-STC
SHELLCODE:X86:ALPHA-MIXED-80S
SHELLCODE:X86:AVD-UTF8TLWR-STC
SHELLCODE:X86:AVD-UTF8-LWR-80S
SHELLCODE:X86:UNICODE-MIXED-STC
SHELLCODE:X86:SINGLSTATCBIT-80S
SHELLCODE:X86:CONTEXT-CPUID-80S
SHELLCODE:X86:SINGLSTATCBIT-STC
SHELLCODE:X86:CONTEXT-TIME-STC
SHELLCODE:X86:JMPCALLADTIVE-STC
SHELLCODE:X86:CONTEXT-STAT-80S
SHELLCODE:X86:CONTEXT-STAT-STC
SHELLCODE:X86:UNICODE-UPPER-80S
SHELLCODE:X86:CONTEXT-TIME-80S
SHELLCODE:X86:CONTEXT-CPUID-STC
SHELLCODE:X86:UNICODE-UPPER-CTS
SHELLCODE:X86:CONTEXT-TIME-80C
SHELLCODE:X86:CONTEXT-STAT-80C
SHELLCODE:X86:CONTEXT-STAT-CTS
SHELLCODE:X86:CONTEXT-TIME-CTS
SHELLCODE:X86:NONALPHAUPPER-CTS
SHELLCODE:X86:NONALPHAUPPER-80C
SHELLCODE:X86:COUNTDOWN-80C
SHELLCODE:X86:SINGLSTATCBIT-80C
SHELLCODE:X86:SINGLSTATICBT-CTS
SHELLCODE:X86:JMPCALLADTIVE-CTS
SHELLCODE:X86:CONTEXT-CPUID-80C
SHELLCODE:X86:UNICODE-UPPER-80C
SHELLCODE:X86:CONTEXT-CPUID-CTS
SHELLCODE:X86:WIN-SHLL-XPFW-80C
SHELLCODE:X86:WIN-SHLL-XPFW-80S
SHELLCODE:X86:COUNTDOWN-STC
SHELLCODE:X86:COUNTDOWN-80S
SHELLCODE:X86:ADD-SUB-80S
SHELLCODE:X86:LIN-BIND-IPV6-80S
SHELLCODE:X86:ADD-SUB-STC
SHELLCODE:X86:UNICODE-UPPER-STC
SHELLCODE:X86:FNSTENV-STC-1
SHELLCODE:X86:UDP-ENCODER
SHELLCODE:X86:NONALPHAUPPER-80S
SHELLCODE:X86:FNSTENV-CTS-1
SHELLCODE:X86:DWORD-ADITIVE-STC
SHELLCODE:X86:FNSTENV-80S-1
SHELLCODE:X86:GETEIP-XOR-80S
SHELLCODE:X86:GETEIP-XOR-80C
SHELLCODE:X86:XOR-DWORD-80S
SHELLCODE:X86:XOR-DWORD-CTS
SHELLCODE:X86:DWORD-ADITIVE-80S
SHELLCODE:X86:X90-NOOP-HTTP-REQ
SHELLCODE:X86:DWORD-ADITIVE-CTS
SHELLCODE:X86:DWORD-ADITIVE-80C
SHELLCODE:X86:GETEIP-XOR-STC
SHELLCODE:X86:XOR-DWORD-STC
SHELLCODE:X86:XOR-DWORD-80C
SHELLCODE:X86:PEXALPHANUM-80S
SHELLCODE:X86:BLOXOR-TCP-STC
SHELLCODE:X86:FLDZ-GET-EIP-80C
SHELLCODE:X86:PEXALPHANUM-80C
SHELLCODE:X86:BASE64-NOOP-STC
SHELLCODE:X86:FLDZ-GET-EIP-STC
SHELLCODE:X86:FLDZ-GET-EIP-CTS
SHELLCODE:X86:FLDZ-GET-EIP-80S
SHELLCODE:X86:BASE64-NOOP-80C
SHELLCODE:X86:BASE64-NOOP-CTS
SHELLCODE:X86:BASE64-NOOP-80S
SHELLCODE:X86:REVERS-CONECT-80S
SHELLCODE:X86:WIN32-ENUM-STC
SHELLCODE:X86:WIN2K-2K3-CTS
SHELLCODE:X86:WIN32-ENUM-80S
SHELLCODE:X86:WIN32-ENUM-CTS
SHELLCODE:X86:REVERS-CONECT-80C
SHELLCODE:X86:REVERS-CONECT-STC
SHELLCODE:X86:REVERS-CONECT-CTS
SHELLCODE:X86:WIN32-ENUM-80C
SHELLCODE:X86:GETEIP-XOR-CTS
SHELLCODE:X86:ALPHA2-GETEIP-80C
SHELLCODE:X86:PEXCALL-80C
SHELLCODE:X86:PEXCALL-80S
SHELLCODE:X86:ALPHA2-GETEIP-80S
SHELLCODE:X86:JMPCALLADTIVE-80S
SHELLCODE:X86:AVD-UTF8-LWR-80C
SHELLCODE:X86:X90-NOOP-CTS

SMB

SMB:REFLECTION
SMB:DUPLICATE-SESSION
SMB:NTLM-LOGIN-FAILED
SMB:CONNECT-FROM-LOCALHOST
SMB:XTIERRPCPIPE
SMB:USER-CMD-INJ
SMB:DOUBLE-NEGO-RESP
SMB:SMB-SRV-NAME-DOS
SMB:NETDDE-SHARE-OF
SMB:SEARCH-OF
SMB:WIN-BROWSER-SERVICE-DOS
SMB:TIMBUKTU-PLUGHNT-COMMAND
SMB:MS-RAP-HEAP-OV
SMB:SMB20-NEG-DOS
SMB:FRAG-EXP-CODE
SMB:NTLM-LOW-ENTROPY
SMB:MS-RAP-STACK-OV
SMB:MS-IE-IESHIMS-DLL-CE
SMB:MS-WIN-VISTA-SP0-SMB-DOS
SMB:HTTP-PAYLOAD
SMB:FRAG-MALICIOUS-PAYLOAD
SMB:MS-WIN-2000-LANMAN-DOS
SMB:MS-WIN-2000-LANMAN-UDP-DOS
SMB:WINS-SNAME-REG
SMB:SAMBA-UNICODE-FLAGS2-DOS
SMB:CLIENT-POOL-CORR
SMB:CLIENT-MESSAGE-OF
SMB:MS-TELNET-INSECURE-LOADING
SMB:MSSQL-DECLARE-EXEC
SMB:ORACLE-JRE-INSECURE-LOAD
SMB:VISIO-MFC71XXX-DLL-HIJACK
SMB:OLEAUT32-WMF
SMB:SMB-COPY-OF
SMB:DCE-RPC-FRAG-MAL-PAYLOAD
SMB:DCE-RPC-FRAG-EXP-PAYLOAD
SMB:MS-RAP-DOS
SMB:PNG-CHUNK-OF
SMB:MAL-WIN-BRIEFCASE
SMB:MS-WINDOWS-FILE-RCE
SMB:WIN-BRIEFCASE-RCE
SMB:SERVER-SVC-OF
SMB:MICROSOFT-LIB-LOADING-CE
SMB:CORE-DLL-REQ-VIA-SMB
SMB:REPLY-ENCRYPTION-KEYS
SMB:INTERNET-PRINT-SVC-INT-OF
SMB:MAILSLOT-OF
SMB:TRANSACTION-RESPONSE-OF
SMB:TRANS2ROOT-OF
SMB:TRANS2ROOT-OF-2

SMB:AUDIT

SMB:AUDIT:LONG-ACCOUNT
SMB:AUDIT:UNK-CMD
SMB:AUDIT:DCERPC-UNEXPECTED-RSP
SMB:AUDIT:INV-PROTOCOL
SMB:AUDIT:UNK-DIALECT
SMB:AUDIT:NULL-ACCOUNT
SMB:AUDIT:NULL-DOMAIN
SMB:AUDIT:NT-LM-0.12
SMB:AUDIT:NULL-NVE-OS
SMB:AUDIT:EXT-SEC-DISABLED
SMB:AUDIT:NULL-NVE-LM
SMB:AUDIT:UNEXP-REQ
SMB:AUDIT:UNEXP-REP
SMB:AUDIT:EXP-NEG
SMB:AUDIT:UNK-SHDR-TYPE
SMB:AUDIT:OLD-VERSION
SMB:AUDIT:BRUTE-LOGIN

SMB:ENUM

SMB:ENUM:NAME-LOOKUP
SMB:ENUM:NETSESSION

SMB:ERROR

SMB:ERROR:GRIND
SMB:ERROR:MAL-MSG
SMB:ERROR:INV-MSG-LEN
SMB:ERROR:MULTI-HEADERS

SMB:EXPLOIT

SMB:EXPLOIT:REGISTRY-DOS
SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW
SMB:EXPLOIT:WINBLAST-DOS
SMB:EXPLOIT:NULL-PATH
SMB:EXPLOIT:NULL-FILENAME
SMB:EXPLOIT:NULL-SERVICE
SMB:EXPLOIT:LANMAN-NUKE
SMB:EXPLOIT:SAMBA-DIR-TRAV
SMB:EXPLOIT:SMBDIE
SMB:EXPLOIT:MAL-JPEG-DL
SMB:EXPLOIT:TRANS2-MDL-CHUNK
SMB:EXPLOIT:FOLDER-COM-EXEC
SMB:EXPLOIT:GREENAPPLE-2
SMB:EXPLOIT:FLASH-CHROME-BREAK
SMB:EXPLOIT:ISS-ACCOUNTNAME-OF
SMB:EXPLOIT:SMB-MULTI-DOS
SMB:EXPLOIT:LLS-NAME
SMB:EXPLOIT:GREENAPPLE
SMB:EXPLOIT:PRINT-SPOOL-BYPASS
SMB:EXPLOIT:LINUX-TRANS2-OF
SMB:EXPLOIT:SMB2-ZERO-LEN-WRT
SMB:EXPLOIT:SRV-RENAME-CE
SMB:EXPLOIT:CVE-2015-0240-RCE
SMB:EXPLOIT:MS-2015-0096-CE
SMB:EXPLOIT:SMB1-CHAINING-MC
SMB:EXPLOIT:MPLAYER-SAMI
SMB:EXPLOIT:DOT-JOB
SMB:EXPLOIT:WILD-FILE-DOS

SMB:EXT

SMB:EXT:DOT-ZIP

SMB:FILE

SMB:FILE:EICAR-COPY
SMB:FILE:AUTORUN.INF-COPY
SMB:FILE:MS-OBJ-PACKAGER
SMB:FILE:CRAFTED-NAME-RCE
SMB:FILE:DLL-TRANSFER
SMB:FILE:NAME-INV-CHARS
SMB:FILE:WEB-VIEW-DOC-SCR-INJ
SMB:FILE:SANDWORM-RCE
SMB:FILE:WIRESHARK-INSECUREPATH

SMB:INFO

SMB:INFO:NULL-GSS-TOKEN
SMB:INFO:WFWGRP-3.1A
SMB:INFO:LANMAN-2.1
SMB:INFO:LANMAN-1.2X002
SMB:INFO:LANMAN-1.0
SMB:INFO:PCLAN-1.0
SMB:INFO:NEG-FAILED
SMB:INFO:MSNET-1.03
SMB:INFO:XENIX-CORE
SMB:INFO:DOT-EXE-FILE-XFER

SMB:NETBIOS

SMB:NETBIOS:UNK-SHDR-FLAGS
SMB:NETBIOS:SHARE-LVL-SEC
SMB:NETBIOS:INV-CDNAME-LEN
SMB:NETBIOS:INV-CGNAME-LEN
SMB:NETBIOS:INV-CDNAME-ENC
SMB:NETBIOS:INV-CGNAME-ENC
SMB:NETBIOS:INV-SNAME-LEN
SMB:NETBIOS:INV-SHDR-LEN
SMB:NETBIOS:RMT-REG-ACCESS
SMB:NETBIOS:NOVELL-TRAN-REQ-DOS
SMB:NETBIOS:RRAS-MEM-CORRUPTION
SMB:NETBIOS:WIN-RPC-UPNP-DOS
SMB:NETBIOS:WIN7-KERNEL-DOS
SMB:NETBIOS:GETPRINTERDATA-DOS

SMB:OF

SMB:OF:ACCOUNT-NAME-OVERFLOW
SMB:OF:DIALECT-INDEX-OVERFLOW
SMB:OF:SECUR-TOKEN-OVERFLOW
SMB:OF:SPOOL-SVC-OF
SMB:OF:NETCONMGR-DOS
SMB:OF:WKSSVC-CALL
SMB:OF:NETWARE-CLIENT-RPC
SMB:OF:SMB-INVALID-BUFFER
SMB:OF:RPC-PNP-OF
SMB:OF:PNP-OF
SMB:OF:CREATE-NEG-EOF
SMB:OF:DFS-RESP
SMB:OF:TAPI-SVC-OF
SMB:OF:INVALID-DATACOUNT
SMB:OF:MANGLING-FILE-OF
SMB:OF:SMB2-DOS-2
SMB:OF:RECV-RAW
SMB:OF:NWCW-INV-CALL
SMB:OF:MS-SMB2-RES-DOS
SMB:OF:SMB2-WRITE-OFFSET
SMB:OF:MAL-QFILEPATHINFO
SMB:OF:RECV-RAW-BO
SMB:OF:CVE-2009-3676-DOS
SMB:OF:LINUX-KERNEL-INT-OF
SMB:OF:SMB-IPC-OF

SMB:SAMBA

SMB:SAMBA:NTRANS-RPLY
SMB:SAMBA:NETDFS-OF
SMB:SAMBA:READ-NTTRANS-EA-LIST
SMB:SAMBA:ROOT-SYS
SMB:SAMBA:SETINFOPOLICY-HEAP
SMB:SAMBA:NMBD-BO
SMB:SAMBA:IDL-PARSE-OOB
SMB:SAMBA:SID-QUOTA
SMB:SAMBA:SMBD-ANDX-INFINITE
SMB:SAMBA:DFSENUM-OF
SMB:SAMBA:SPOOLSS-NOTIFY
SMB:SAMBA:SWAT-AUTH-DOS
SMB:SAMBA:LSALOOKUPSIDS

SMB:TOOLS

SMB:TOOLS:PSEXEC

SMTP

SMTP:SPAM-ADDRESS-EVASION
SMTP:AUTO-SPAM
SMTP:RCPT-CMD-INJ
SMTP:MSSQL-WORM-EMAIL
SMTP:WP5-EMAIL
SMTP:REALPLAYER-WAV-BO
SMTP:HTML-VAL-XSS
SMTP:SPAM-ASSN-INJ
SMTP:SYM-NESTED-ZIP
SMTP:SAGTUBE-DOS
SMTP:BANNER-CAPTURE
SMTP:INVALID-HELO
SMTP:MS-XLS-BIFF-REC-RCE
SMTP:IBM-LOTUS-NOTES-XSS
SMTP:NASM-PPSCAN-BO
SMTP:FROM-FIELD-FS
SMTP:MERCMAIL-AUTH-OF
SMTP:SQWEBMAIL-EMAIL-HEADER-INJ
SMTP:IPSWITCH-REPLY-TO-OF
SMTP:SPAMASS-DOS
SMTP:SMTP-URI-INJ
SMTP:FFSMOUNTFS-BOF
SMTP:URL-LOC
SMTP:SHELLSHOCK
SMTP:SPAMASSASS-LM-DOS
SMTP:MULTIPLE-HYD-BOF
SMTP:IBM-LOTUS-INT-OVERFLOW
SMTP:NOVELL-GROUPWISE-BO

SMTP:AUDIT

SMTP:AUDIT:EXTERNAL-MESG
SMTP:AUDIT:DUPLICATE-HEADER
SMTP:AUDIT:EMPTY-BOUNDARY
SMTP:AUDIT:ENCODE
SMTP:AUDIT:REQ-MISSING-RCPT-TO
SMTP:AUDIT:INVALID-FILENAME
SMTP:AUDIT:REQ-HDR-FLD-UNKNOWN
SMTP:AUDIT:REP-NESTED-REPLY
SMTP:AUDIT:REQ-UNKNOWN-CMD
SMTP:AUDIT:REQ-MISSING-HELLO
SMTP:AUDIT:REQ-INVALID-CMD-SEQ
SMTP:AUDIT:COMMAND-FAILED
SMTP:AUDIT:MISSING-MAIL-FROM
SMTP:AUDIT:REP-INVALID-REPLY
SMTP:AUDIT:REQ-NESTED-REQUEST
SMTP:AUDIT:ENCODE-MIME-TYPE
SMTP:AUDIT:REQ-BINARY-DATA
SMTP:AUDIT:REQ-BIN-DATA-3
SMTP:AUDIT:HIGH-VOLUME
SMTP:AUDIT:REQ-BIN-DATA-2

SMTP:COMMAND

SMTP:COMMAND:VRFY
SMTP:COMMAND:TURN
SMTP:COMMAND:EXPN
SMTP:COMMAND:HELP
SMTP:COMMAND:WIZ
SMTP:COMMAND:AV-INETSERV-DOS
SMTP:COMMAND:BDAT
SMTP:COMMAND:ETRN
SMTP:COMMAND:DEBUG
SMTP:COMMAND:STARTTLS-CMD

SMTP:DOS

SMTP:DOS:SMARTMAIL-DOS
SMTP:DOS:EUDORA-MIME-DOS
SMTP:DOS:SENDMAIL-HEADERS-DOS
SMTP:DOS:GNU-MAILMAN-DATE-DOS
SMTP:DOS:GNU-SCRUBBER-UTF8-DOS
SMTP:DOS:CLAM-TNEF-DOS
SMTP:DOS:OPENSSL-TLSRECORD
SMTP:DOS:MS-XL-2003-NULL-DOS
SMTP:DOS:MS-MALWARE-ENGINE

SMTP:EMAIL

SMTP:EMAIL:HEADER-FROM-PIPE
SMTP:EMAIL:MAIL-FROM-PIPE
SMTP:EMAIL:HEADER-TO-PIPE
SMTP:EMAIL:EUDORA-SPOOF1
SMTP:EMAIL:EUDORA-SPOOF3
SMTP:EMAIL:EUDORA-LONG-MSG-URL
SMTP:EMAIL:EUDORA-SPOOF4
SMTP:EMAIL:REPLY-TO-PIPE
SMTP:EMAIL:RCPT-TO-PIPE
SMTP:EMAIL:RELAY-ADDR-OF
SMTP:EMAIL:IBM-LOTUS-NTS-WPD-BO
SMTP:EMAIL:RCPT-TO-DECODE

SMTP:EXCHANGE

SMTP:EXCHANGE:INV_BDAT_CMD
SMTP:EXCHANGE:INV_BDAT_SEC_LEN
SMTP:EXCHANGE:CMD_XEXCH50_2LONG
SMTP:EXCHANGE:INVLD_XEXCH50_CMD
SMTP:EXCHANGE:SCT_XEXCH50_2LONG
SMTP:EXCHANGE:MIME-MALF-ATTACH
SMTP:EXCHANGE:XLINK2_TOO_LONG
SMTP:EXCHANGE:AUTH-GUEST
SMTP:EXCHANGE:IMAP-DOS
SMTP:EXCHANGE:CALENDAR-HEAP
SMTP:EXCHANGE:OWA-CSS
SMTP:EXCHANGE:ICAL-DOS
SMTP:EXCHANGE:MS03-046-CHECK
SMTP:EXCHANGE:OWA-JSCRIPT
SMTP:EXCHANGE:MULTI-MAILROUTE
SMTP:EXCHANGE:MULTI-LONG-MAILRT
SMTP:EXCHANGE:EXCH-TNEF-BO
SMTP:EXCHANGE:MAL-VERB-XEXCH50
SMTP:EXCHANGE:MAILROUTE-OF

SMTP:EXPLOIT

SMTP:EXPLOIT:RELAY-ATTEMPT
SMTP:EXPLOIT:PINE-BOUNDARY
SMTP:EXPLOIT:PINE-SLASHQUOTE
SMTP:EXPLOIT:SENDMAIL-IDENTEXEC
SMTP:EXPLOIT:RELAY-ATTEMPT-VAR
SMTP:EXPLOIT:EUDORA-URL-SPOOF
SMTP:EXPLOIT:MIME-TOOLS-EVADE
SMTP:EXPLOIT:DMAIL-FS
SMTP:EXPLOIT:KERIO-MS-FS
SMTP:EXPLOIT:EMAIL-ADDR-FS
SMTP:EXPLOIT:POSTFIX-AUTH-REUSE
SMTP:EXPLOIT:SUSPICIOUS-COMM
SMTP:EXPLOIT:SUSPICIOUS-TO
SMTP:EXPLOIT:SUSPICIOUS-FROM
SMTP:EXPLOIT:QT-PICT-FILE-MC
SMTP:EXPLOIT:AUTH-BRUTE-FORCE
SMTP:EXPLOIT:MS-THEME-RCE
SMTP:EXPLOIT:MAL-AU-DOS
SMTP:EXPLOIT:JPXDECODE-RCE
SMTP:EXPLOIT:AVI-RIGHT-CLICK
SMTP:EXPLOIT:EXIM-DOVECOT-RCE
SMTP:EXPLOIT:BITDEF-LOG
SMTP:EXPLOIT:PINE-CHARSET-OF-1
SMTP:EXPLOIT:HCP-QUOTE-SCRIPT
SMTP:EXPLOIT:GNUPG-INT-OF

SMTP:EXT

SMTP:EXT:DOUBLE-EXTENSION
SMTP:EXT:DOT-VBS
SMTP:EXT:DOT-EXE
SMTP:EXT:DOT-PIF
SMTP:EXT:DOT-SHS
SMTP:EXT:DOT-SCR
SMTP:EXT:DOT-BAT
SMTP:EXT:DOT-COM
SMTP:EXT:DOT-OCX
SMTP:EXT:DOT-CMD
SMTP:EXT:DOT-ADE
SMTP:EXT:DOT-ADP
SMTP:EXT:DOT-MSP
SMTP:EXT:DOT-MSI
SMTP:EXT:DOT-WSC
SMTP:EXT:DOT-WSH
SMTP:EXT:DOT-WSF
SMTP:EXT:DOT-HTA
SMTP:EXT:DOT-MDE
SMTP:EXT:DOT-INS
SMTP:EXT:DOT-CHM
SMTP:EXT:DOT-INF
SMTP:EXT:DOT-HLP
SMTP:EXT:DOT-JSE
SMTP:EXT:DOT-CRT
SMTP:EXT:DOT-MDB
SMTP:EXT:DOT-JS
SMTP:EXT:DOT-BAS
SMTP:EXT:DOT-MSC
SMTP:EXT:DOT-WSZ
SMTP:EXT:DOT-VB
SMTP:EXT:DOT-REG
SMTP:EXT:DOT-PCD
SMTP:EXT:DOT-SCT
SMTP:EXT:DOT-HT
SMTP:EXT:DOT-GRP
SMTP:EXT:DOT-ANI
SMTP:EXT:DOT
SMTP:EXT:FILE-AVI
SMTP:EXT:DOT-PPT
SMTP:EXT:DOT-386
SMTP:EXT:DOT-URL
SMTP:EXT:DOT-ISP
SMTP:EXT:DOT-ZIP
SMTP:EXT:DOT-CPL
SMTP:EXT:DIR-TRAV
SMTP:EXT:DOUBLE-EXTENSION-MIME
SMTP:EXT:DOT-LNK
SMTP:EXT:DOT-WMF
SMTP:EXT:DOT-JOB

SMTP:IIS

SMTP:IIS:IIS-ENCAPS-RELAY
SMTP:IIS:CDO-OF
SMTP:IIS:SSL-PCT-OF

SMTP:INVALID

SMTP:INVALID:DUP-BOUNDARY
SMTP:INVALID:UNFIN-MULTIPART
SMTP:INVALID:PARTIAL-MESG
SMTP:INVALID:DUP-AUTH
SMTP:INVALID:2MANY-BOUNDARY
SMTP:INVALID:BOUNDARY-MISS
SMTP:INVALID:BASE64-CHAR

SMTP:MAILMAN

SMTP:MAILMAN:PASSWD-DISCLOSURE

SMTP:MAJORDOMO

SMTP:MAJORDOMO:COMMAND-EXEC

SMTP:MAL

SMTP:MAL:FIREFOX-HTML-URL-INJ
SMTP:MAL:SQM-CONTENT-XSS
SMTP:MAL:OUTLOOK-MAILTO-QUOT
SMTP:MAL:NOTES-INI-SMTP
SMTP:MAL:XSS-URL-IN-EMAIL
SMTP:MAL:JPEG-ATTACH-COMMENT-OF
SMTP:MAL:DATA-SCHEME
SMTP:MAL:BMP-MAL-HEADER
SMTP:MAL:WMF-MAL-HEADER
SMTP:MAL:TBIRD-JAVASCRIPT
SMTP:MAL:MALFORMED-WMF
SMTP:MAL:ANI-MAL-HEADER
SMTP:MAL:IBM-ATTACHMENT-VIEWER
SMTP:MAL:OUTLOOK-SHELL
SMTP:MAL:DOMINO-INOTES-XSS
SMTP:MAL:AIM-BO-URL
SMTP:MAL:LOTUS-MIF-VIEWER
SMTP:MAL:EMAIL-URL-HIDING-ENC
SMTP:MAL:EXIM4-HEADER
SMTP:MAL:LOTUS-DOC-VIEWER
SMTP:MAL:LOTUS-LZH-BOF
SMTP:MAL:ANI-ATTACH
SMTP:MAL:NAV-ZIP-BOMB
SMTP:MAL:LOTUS-MAILTO
SMTP:MAL:ACROBAT-UUEXEC
SMTP:MAL:LOTUS-APPLIX
SMTP:MAL:MAL-ZIP-HDR
SMTP:MAL:NOTES-BIGMAIL-DOS
SMTP:MAL:MS-HSC-DVD-VLN
SMTP:MAL:LOTUS-VIEWER
SMTP:MAL:LOTUS-WPD

SMTP:OUTLOOK

SMTP:OUTLOOK:DHTML-HANDLER-RACE
SMTP:OUTLOOK:OBJECT-TAG
SMTP:OUTLOOK:MMCN-EXEC
SMTP:OUTLOOK:OSS-FILE
SMTP:OUTLOOK:VML-BOF
SMTP:OUTLOOK:TZID-OF
SMTP:OUTLOOK:RTF-PARSE
SMTP:OUTLOOK:VEVENT-MEMCORRUPT
SMTP:OUTLOOK:LOCAL-LINK
SMTP:OUTLOOK:MHTML-CDI
SMTP:OUTLOOK:OBJECT-TAG-XML
SMTP:OUTLOOK:W32-PARAM
SMTP:OUTLOOK:MIME-PARSE-UAF
SMTP:OUTLOOK:HTML-NAME-OF
SMTP:OUTLOOK:TNEF-INT-OF
SMTP:OUTLOOK:OWA-XSS

SMTP:OVERFLOW

SMTP:OVERFLOW:CONTENT-NAME
SMTP:OVERFLOW:COMMAND-LINE
SMTP:OVERFLOW:EMAIL-ADDRESS
SMTP:OVERFLOW:TOO-MANY-RCPT
SMTP:OVERFLOW:FILENAME
SMTP:OVERFLOW:BOUNDARY
SMTP:OVERFLOW:REPLY-LINE
SMTP:OVERFLOW:TEXT-LINE-OF
SMTP:OVERFLOW:EMAIL-DOMAIN
SMTP:OVERFLOW:EMAIL-USERNAME
SMTP:OVERFLOW:TABS-EHLO-OF
SMTP:OVERFLOW:SENDMAIL-MIME-OF
SMTP:OVERFLOW:SENDMAIL-CMT-OF1
SMTP:OVERFLOW:OUTLOOK-CERT-OF
SMTP:OVERFLOW:METAMAIL-HDR-FS2
SMTP:OVERFLOW:MHTML-OF
SMTP:OVERFLOW:METAMAIL-HDR-OF2
SMTP:OVERFLOW:HEADER-LINE-OF
SMTP:OVERFLOW:APPLE-PICT-MC
SMTP:OVERFLOW:MS-WMF-OF
SMTP:OVERFLOW:SENDMAIL-CMT-OF2
SMTP:OVERFLOW:NTLM-AUTH-OF
SMTP:OVERFLOW:MAILENABLE-BO

SMTP:REQERR

SMTP:REQERR:REQ-DUPLICATE-HELLO
SMTP:REQERR:REQ-SYNTAX-ERROR

SMTP:RESPONSE

SMTP:RESPONSE:BAD-RESPONSE
SMTP:RESPONSE:USER-UNKNOWN
SMTP:RESPONSE:PIPE-FAILED
SMTP:RESPONSE:RLY-ACC-DENIED
SMTP:RESPONSE:RLY-PBTED

SMTP:SENDMAIL

SMTP:SENDMAIL:ADDR-PRESCAN-ATK
SMTP:SENDMAIL:SENDMAIL-FF-OF
SMTP:SENDMAIL:DEBIAN-SASL-AUTH

SMTP:SERVER

SMTP:SERVER:OVERFLOW-WIN-X86

SMTP:VULN

SMTP:VULN:NOVELL-GROUPWISE-XSS
SMTP:VULN:CMAILSERVER
SMTP:VULN:EXIM-4-20
SMTP:VULN:IBM-LOTUS-GIF-PARS-CE
SMTP:VULN:MAILENABLE-FS
SMTP:VULN:MERCUR-4-2
SMTP:VULN:GROUPWISE-IMG-OF
SMTP:VULN:MERCUR-3-3

SNMP

SNMP:TRAP-DECODE-DOS
SNMP:FREEBSD-GETBULKRQST-BO
SNMP:SQUID-PROXY-ASN1-OF
SNMP:SNMPV3
SNMP:SNMPV2U
SNMP:SNMPV1
SNMP:SNMPV2C
SNMP:HMAC-AUTH-BYPASS
SNMP:HMAC-AUTH-BYPASS-EXPLOIT
SNMP:FMT-STR-TCP

SNMP:AUDIT

SNMP:AUDIT:NO-SUCH-NAME
SNMP:AUDIT:UNKNOWN-VERSION
SNMP:AUDIT:OTHER-ERROR
SNMP:AUDIT:PRIVATE
SNMP:AUDIT:BAD-VALUE
SNMP:AUDIT:PUBLIC
SNMP:AUDIT:SET-REQUEST

SNMP:COMMUNITY

SNMP:COMMUNITY:FORMAT-CHAR
SNMP:COMMUNITY:NULL-CHAR
SNMP:COMMUNITY:ZERO-LEN
SNMP:COMMUNITY:AVAYA-DEFCOM1
SNMP:COMMUNITY:SURECOM-RTR
SNMP:COMMUNITY:INTERNAL
SNMP:COMMUNITY:ILMI
SNMP:COMMUNITY:OVERFLOW-1K

SNMP:DANGEROUS

SNMP:DANGEROUS:JETDIRECT-PASS
SNMP:DANGEROUS:LINKSYS-WAP55AG
SNMP:DANGEROUS:SAMSUNG-PRINTERS

SNMP:DOS

SNMP:DOS:GETBULK
SNMP:DOS:CISCO-DOS
SNMP:DOS:WIN-DEL

SNMP:ENCODING

SNMP:ENCODING:GET-BULK-REQ
SNMP:ENCODING:ZLEN-FOR-VALUE
SNMP:ENCODING:NZLEN-FOR-NULL
SNMP:ENCODING:MALFORMED-OID
SNMP:ENCODING:GAUGE-TOO-BIG
SNMP:ENCODING:OIDVAL-TOO-BIG
SNMP:ENCODING:ZLEN-FOR-OID
SNMP:ENCODING:IP-TOO-BIG
SNMP:ENCODING:COUNTER-TOO-BIG
SNMP:ENCODING:ES-TOO-BIG
SNMP:ENCODING:EI-TOO-BIG
SNMP:ENCODING:TT-TOO-BIG
SNMP:ENCODING:VALUE-MISSING
SNMP:ENCODING:OID-TOO-LONG
SNMP:ENCODING:TLEN-TOO-BIG
SNMP:ENCODING:INT-TOO-BIG
SNMP:ENCODING:INVALID-MIBROOT

SNMP:ENUM

SNMP:ENUM:LM2-ACCESS
SNMP:ENUM:ORINOCO-INFO1

SNMP:ERROR

SNMP:ERROR:INVALID_TIMETICKS
SNMP:ERROR:INV_NON_REPEATERS
SNMP:ERROR:INVALID_MAX_REPS
SNMP:ERROR:INVALID_GAUGE_VALUE
SNMP:ERROR:INVALID_ESTATUS
SNMP:ERROR:INVALID-REQUEST
SNMP:ERROR:MSG-TOO-SHORT
SNMP:ERROR:CLIENT-RESPONSE
SNMP:ERROR:INVALID-RESPONSE
SNMP:ERROR:INVALID-MSG-FORMAT
SNMP:ERROR:SERVER-REQUEST

SNMP:INFO

SNMP:INFO:ERROR_STATUS_GEN_ERR
SNMP:INFO:ERR_STAT_INCON_VAL
SNMP:INFO:ERR_STAT_INCON_NAME
SNMP:INFO:ERR_STAT_AUTH_ERROR
SNMP:INFO:ERR_STATUS_WRG_LEN
SNMP:INFO:ERR_STAT_NO_CREAT
SNMP:INFO:ERR_STAT_NO_ACCESS
SNMP:INFO:ERR_STAT_WRG_ENC
SNMP:INFO:ERR_STAT_WRONG_VAL
SNMP:INFO:ERR_STAT_NOT_WRITABLE
SNMP:INFO:ERR_STAT_UNDO_FAILD
SNMP:INFO:ERR_STAT_RES_UNAVAIL
SNMP:INFO:ERR_STATUS_WRG_TYPE
SNMP:INFO:ERR_STAT_COMMIT_FAILD

SNMP:RESPONSE

SNMP:RESPONSE:TOO-BIG
SNMP:RESPONSE:READ-ONLY

SNMPTRAP:AUDIT

SNMPTRAP:AUDIT:UNKNOWN-VERSION
SNMPTRAP:AUDIT:PUBLIC
SNMPTRAP:AUDIT:PROXY-AGENT
SNMPTRAP:AUDIT:PRIVATE

SNMPTRAP:COMMUNITY

SNMPTRAP:COMMUNITY:ZERO-LEN
SNMPTRAP:COMMUNITY:NULL-CHAR
SNMPTRAP:COMMUNITY:FORMAT-CHAR
SNMPTRAP:COMMUNITY:OVERFLOW-1K

SNMPTRAP:ENCODING

SNMPTRAP:ENCODING:NZLEN-NULL
SNMPTRAP:ENCODING:OID-TOO-LONG
SNMPTRAP:ENCODING:ZLEN-FOR-OID
SNMPTRAP:ENCODING:MALFORMED-OID
SNMPTRAP:ENCODING:TT-TOO-BIG
SNMPTRAP:ENCODING:CNTR-TOO-BIG
SNMPTRAP:ENCODING:INT-TOO-BIG
SNMPTRAP:ENCODING:TLEN-TOO-BIG
SNMPTRAP:ENCODING:OVAL-TOO-BIG
SNMPTRAP:ENCODING:IP-TOO-BIG
SNMPTRAP:ENCODING:GAUGE-TOO-BIG
SNMPTRAP:ENCODING:ZLEN-VALUE
SNMPTRAP:ENCODING:INVALID-MROOT

SNMPTRAP:ERROR

SNMPTRAP:ERROR:INV_TIMETICKS
SNMPTRAP:ERROR:INV_ERR_STAT
SNMPTRAP:ERROR:INV_ERRSTAT_LEN
SNMPTRAP:ERROR:INV_GAUGE_VAL
SNMPTRAP:ERROR:UNEXPECTED-REPLY
SNMPTRAP:ERROR:MSG-TOO-SHORT
SNMPTRAP:ERROR:INVALID-MSG-FMT

SNMPTRAP:INFO

SNMPTRAP:INFO:STAT_OTHER_ERR
SNMPTRAP:INFO:STAT_RSUNAVAIL
SNMPTRAP:INFO:ERR_STAT_WRNG_LEN
SNMPTRAP:INFO:ERR_STAT_2BIG
SNMPTRAP:INFO:STAT_UNDO_FAIL
SNMPTRAP:INFO:ERR_STAT_NO_NAME
SNMPTRAP:INFO:STAT_INCON_VAL
SNMPTRAP:INFO:ERR_STAT_AUTH_ERR
SNMPTRAP:INFO:STAT_WRNG_TYPE
SNMPTRAP:INFO:ERR_STAT_BAD_VAL
SNMPTRAP:INFO:ERR_STAT_GEN_ERR
SNMPTRAP:INFO:STAT_WRNG_VAL
SNMPTRAP:INFO:ERR_STAT_NO_ACC
SNMPTRAP:INFO:STAT_INCON_NAME
SNMPTRAP:INFO:ERR_STAT_COM_FAIL
SNMPTRAP:INFO:ERR_STAT_NO_CREAT
SNMPTRAP:INFO:ERR_STAT_RD_ONLY
SNMPTRAP:INFO:ERR_STAT_WRNG_ENC
SNMPTRAP:INFO:ERR_STAT_NOT_WRIT

SPYWARE

SPYWARE:LIGATS

SPYWARE:AD

SPYWARE:AD:PACIMEDIA
SPYWARE:AD:STATIONRIPPER
SPYWARE:AD:ATLAS
SPYWARE:AD:SHOPNAV
SPYWARE:AD:A9TOOLBAR
SPYWARE:AD:SEARCHHIPPOTOOLBAR
SPYWARE:AD:GOLDENPALACECASINO
SPYWARE:AD:BROWSERACCELERATOR
SPYWARE:AD:BTGRAB
SPYWARE:AD:ZIPITFAST
SPYWARE:AD:FREEWAREFILEBAR
SPYWARE:AD:HANSONELLISTOOLBAR
SPYWARE:AD:YELLOWBRIDGETOOLBAR
SPYWARE:AD:WHENUSAVENOW
SPYWARE:AD:MEDIATICKETS
SPYWARE:AD:COMTRYMUSICDL
SPYWARE:AD:ACTIVESEARCH
SPYWARE:AD:VIRTUMONDE
SPYWARE:AD:KAZOOM
SPYWARE:AD:KOOLBAR
SPYWARE:AD:VIEWPOINTMEDIA
SPYWARE:AD:OFFEROPTIMIZER
SPYWARE:AD:SPEDIABAR
SPYWARE:AD:KEENVALUE
SPYWARE:AD:TRANSPONDERSTUB
SPYWARE:AD:ZAPSPOT
SPYWARE:AD:BARGAINBUDDY
SPYWARE:AD:ISEARCH
SPYWARE:AD:CRAZYWINNINGS
SPYWARE:AD:PRAIZETOOLBAR
SPYWARE:AD:WHENUSEARCH
SPYWARE:AD:HOTBOTDESKBAR
SPYWARE:AD:MINIBUG
SPYWARE:AD:BONZIBUD
SPYWARE:AD:CASHBACK
SPYWARE:AD:GAMEBAR
SPYWARE:AD:IGETNET
SPYWARE:AD:ADULTLINKS
SPYWARE:AD:TVZSEARCH
SPYWARE:AD:PURITYSCAN
SPYWARE:AD:MYWAYSEARCHBAR
SPYWARE:AD:BLOWSEARCH
SPYWARE:AD:EXACTSEARCH
SPYWARE:AD:IST-POWERSCAN
SPYWARE:AD:CASINOONNET
SPYWARE:AD:NABAZATOOLBAR
SPYWARE:AD:HSADVISORTOOLBAR
SPYWARE:AD:ASIAFINESTTOOLBAR
SPYWARE:AD:WORDIQTOOLBAR
SPYWARE:AD:LINKSPIDERSEARCHBAR
SPYWARE:AD:MONEYBAR
SPYWARE:AD:EZULA-TOPTEXT
SPYWARE:AD:APROPOSMEDIA
SPYWARE:AD:ESYNDICATE
SPYWARE:AD:TRELLIANTOOLBAR
SPYWARE:AD:STARWARETOOLBAR
SPYWARE:AD:ALTAVISTATOOLBAR
SPYWARE:AD:DIVXPRO
SPYWARE:AD:AORNUM
SPYWARE:AD:ELITEBAR
SPYWARE:AD:ATGAMES
SPYWARE:AD:CLIPGENIE
SPYWARE:AD:BROADCASTURBANTUNER
SPYWARE:AD:MYDAILYHOROSCOPE
SPYWARE:AD:NETWORKESSENTIALS
SPYWARE:AD:EXACTNAVISEARCH
SPYWARE:AD:BUNDLEWARE
SPYWARE:AD:SIDEFIND
SPYWARE:AD:7FASST
SPYWARE:AD:WHENUWEATHERCAST
SPYWARE:AD:SMARTPOPS
SPYWARE:AD:MAPQUEST-TOOLBAR
SPYWARE:AD:FUNBUDDYICONS
SPYWARE:AD:SEARCHITBAR
SPYWARE:AD:SEEQTOOLBAR
SPYWARE:AD:CUSTOMTOOLBAR
SPYWARE:AD:4ARCADEPBAR
SPYWARE:AD:CASALEMEDIA
SPYWARE:AD:WINPUP
SPYWARE:AD:IST-ISTBAR
SPYWARE:AD:WAREZP2P
SPYWARE:AD:CRACKSPIDER
SPYWARE:AD:DOWNLOADWARE
SPYWARE:AD:WHENU-CLOCKSYNC
SPYWARE:AD:BROADCASTPC
SPYWARE:AD:EZSEARCHBAR
SPYWARE:AD:SPYWARENUKER
SPYWARE:AD:HXDL
SPYWARE:AD:POWERZONE
SPYWARE:AD:ZUVIO
SPYWARE:AD:ZENOSEARCH
SPYWARE:AD:FAVSEARCH
SPYWARE:AD:ASKJEEVESTOOLBAR
SPYWARE:AD:MYWEBSEARCHTOOLBAR
SPYWARE:AD:TOOLBARBROWSER
SPYWARE:AD:GABESTMEDIAPLAYER
SPYWARE:AD:COMEDYPLANET
SPYWARE:AD:CALLINGHOME-BIZ
SPYWARE:AD:METAEUREKA
SPYWARE:AD:ULTRABAR
SPYWARE:AD:MIDADDLE
SPYWARE:AD:ARESPREMIUM
SPYWARE:AD:WINFIXER2005
SPYWARE:AD:INEXPLORERTOOLBAR
SPYWARE:AD:ZTOOLBAR
SPYWARE:AD:NETSTER
SPYWARE:AD:HOTOFFERS
SPYWARE:AD:MYSEARCHADROTATOR
SPYWARE:AD:SC-SEARCH-O-MATIC
SPYWARE:AD:GROOWESEARCHBAR
SPYWARE:AD:MIRAGOSEARCHBAR
SPYWARE:AD:BLUBSTER-2X
SPYWARE:AD:HENBANG
SPYWARE:AD:AURORA
SPYWARE:AD:WINSYSBA
SPYWARE:AD:2005SEARCHLOADER
SPYWARE:AD:MALWARE_CRUSH_3_7
SPYWARE:AD:NETWORDAGENT
SPYWARE:AD:NETGUARDERWEBCLEANER
SPYWARE:AD:YOURPRIVACYGUARD
SPYWARE:AD:3WPLAYER_1_7
SPYWARE:AD:IMNAMES
SPYWARE:AD:U88
SPYWARE:AD:ROOGOO
SPYWARE:AD:YAYAD
SPYWARE:AD:CINMUS
SPYWARE:AD:ALLSUM
SPYWARE:AD:NEWWEB
SPYWARE:AD:BORLAN
SPYWARE:AD:EQISO
SPYWARE:AD:MOKEAD
SPYWARE:AD:DOWNLOADER-G
SPYWARE:AD:WEBREDIR
SPYWARE:AD:PPRICH
SPYWARE:AD:WINZIX-2-2-0
SPYWARE:AD:X-CON3.2.8
SPYWARE:AD:GOPHORIA010B
SPYWARE:AD:PARTYPOKER07
SPYWARE:AD:DRIVECLEANER10111
SPYWARE:AD:COOPEN
SPYWARE:AD:ICOOLOADER25
SPYWARE:AD:AVSYSTEMCARE
SPYWARE:AD:WINANTIVIRUSPRO2007
SPYWARE:AD:PESTBOT
SPYWARE:AD:VROOMSEARCH
SPYWARE:AD:IEDEFENDER
SPYWARE:AD:MALWARE-ALARM
SPYWARE:AD:CONTRA_VIRUS
SPYWARE:AD:SYSTEM-DOCTOR
SPYWARE:AD:SPY_SHREDDER_2_1
SPYWARE:AD:NEW-DOT-NET
SPYWARE:AD:DOWNLOAD-ACCEL
SPYWARE:AD:ADTOOLS
SPYWARE:AD:POWERSTRIP
SPYWARE:AD:SEPRO
SPYWARE:AD:DOGPILETOOLBAR
SPYWARE:AD:SHOPATHOMESELECT
SPYWARE:AD:LORDOFSEARCH
SPYWARE:AD:GAMESPY-ARCADE
SPYWARE:AD:URLBLAZE
SPYWARE:AD:VX2-LOCALNRD
SPYWARE:AD:GIRAFATOOLBAR
SPYWARE:AD:PALTALK
SPYWARE:AD:NICTECH-BM2
SPYWARE:AD:HOTBAR
SPYWARE:AD:TOPICKS
SPYWARE:AD:ADBARS
SPYWARE:AD:PEOPLEONPAGE
SPYWARE:AD:WUPD-MEDIAACCESS
SPYWARE:AD:VEGASPALMSCASINO
SPYWARE:AD:TEOMA
SPYWARE:AD:SSSPIDER
SPYWARE:AD:DIYBAR
SPYWARE:AD:FREEDOWNLOADMANAGER
SPYWARE:AD:ADSTART
SPYWARE:AD:WEBCPR
SPYWARE:AD:EZTRACKS
SPYWARE:AD:BESTOFFERS
SPYWARE:AD:ADCLICKER-EJ
SPYWARE:AD:WINADISCOUNT
SPYWARE:AD:SNAPULTRASEARCH136
SPYWARE:AD:ZAMINGO
SPYWARE:AD:2MFREEGAMES
SPYWARE:AD:EMPIREPOKER
SPYWARE:AD:NETPUMPER126
SPYWARE:AD:WEBSEARCH
SPYWARE:AD:ACCESSIBILITYTOOLBAR
SPYWARE:AD:GOLDRIVIERACASINO
SPYWARE:AD:ZANGOTOOLBAR
SPYWARE:AD:DESKTOPMEDIA
SPYWARE:AD:GEOMUNDOSTOOLBAR
SPYWARE:AD:SUNSHINESPY_1_0
SPYWARE:AD:ELITE_PROTECTOR
SPYWARE:AD:VIRUSPROTECTPRO37
SPYWARE:AD:ADULTP2P_1_5
SPYWARE:AD:JILYIETOOLBAR
SPYWARE:AD:LIVEPROTECTION
SPYWARE:AD:INSTANTBUZZ
SPYWARE:AD:SIMBAR
SPYWARE:AD:EARTHLINKTOOLBAR
SPYWARE:AD:FREESCRATCHANDWIN
SPYWARE:AD:IZITOTOOLBAR
SPYWARE:AD:SUPERFASTMP3SEARCH
SPYWARE:AD:DOWNLOADRECEIVER
SPYWARE:AD:DELFINMEDIAVIEWER
SPYWARE:AD:COMODOTOOLBAR
SPYWARE:AD:TARGETSAVER
SPYWARE:AD:SUPERFISH
SPYWARE:AD:SUPERFISH-INSTALL
SPYWARE:AD:PRICE-FOUNTAIN

SPYWARE:BH

SPYWARE:BH:THECOOLBAR
SPYWARE:BH:EXCITESEARCHBAR
SPYWARE:BH:VIPNETLINK
SPYWARE:BH:QMTOOLBAR
SPYWARE:BH:LOOKTHRUBAR
SPYWARE:BH:CWS-GONNASEARCH
SPYWARE:BH:EXACTSEEK
SPYWARE:BH:123MANIA
SPYWARE:BH:SPOTON
SPYWARE:BH:ZEROPOPUP
SPYWARE:BH:DAOSEARCH
SPYWARE:BH:CNSMIN-3721
SPYWARE:BH:STARTNOW
SPYWARE:BH:2ND-THOUGHT
SPYWARE:BH:OEMJIBAR
SPYWARE:BH:ABLE2KNOWTOOLBAR
SPYWARE:BH:NAVEXCEL
SPYWARE:BH:SEARCHFORIT
SPYWARE:BH:CWS-CAMEUP
SPYWARE:BH:ISTSLOTCHBAR
SPYWARE:BH:INTERNETOPTIMIZER
SPYWARE:BH:SIDESTEP
SPYWARE:BH:WISHBONE
SPYWARE:BH:BLAZEFIND
SPYWARE:BH:YOURSITEBAR
SPYWARE:BH:QCBAR
SPYWARE:BH:COUPONBAR
SPYWARE:BH:NAVEXCEL-HELPER
SPYWARE:BH:ILOOKUP
SPYWARE:BH:FFINDER
SPYWARE:BH:NEED2FIND
SPYWARE:BH:MAPSTANTOOLBAR
SPYWARE:BH:ABCSEARCH
SPYWARE:BH:CWSSTARTPAGE-2
SPYWARE:BH:ADTRAFFIC
SPYWARE:BH:COOLSEARCH
SPYWARE:BH:PHAZEBAR
SPYWARE:BH:SEARCH4TOP
SPYWARE:BH:SOGOU
SPYWARE:BH:RICERCADOPPIA
SPYWARE:BH:SEARCHESSISTANT
SPYWARE:BH:8848
SPYWARE:BH:EZGREETS-TOOLBAR
SPYWARE:BH:BAZOOKABAR
SPYWARE:BH:DIGITALNAMES
SPYWARE:BH:SEARCHNUGGET
SPYWARE:BH:EXTREME-BIZ
SPYWARE:BH:FREECRUISE-TB
SPYWARE:BH:BLUEWAVEADULTLINK-TB
SPYWARE:BH:DREAMBAR
SPYWARE:BH:MYFUNCARDS
SPYWARE:BH:LOOKQUICK
SPYWARE:BH:GRALICWRAP
SPYWARE:BH:SEXYVIDEOSCREENSAVER
SPYWARE:BH:BAIDU_TOOLBAR_4_9_4
SPYWARE:BH:EXTRATOOLBAR10
SPYWARE:BH:RABIO42
SPYWARE:BH:ONESTEPSEARCH10118
SPYWARE:BH:SIDEFIND-1-0
SPYWARE:BH:MUSICSTARWARETOOL
SPYWARE:BH:WOWOK-MP3
SPYWARE:BH:PERSONALWEB
SPYWARE:BH:3SEARCH
SPYWARE:BH:NEWDOTNETQUICKSEARCH
SPYWARE:BH:MORPHEUS-TOOLBAR
SPYWARE:BH:SCNTOOLBAR
SPYWARE:BH:LOOKSTER
SPYWARE:BH:CNNICUPDATE
SPYWARE:BH:SOSOTOOLBAR
SPYWARE:BH:PROVENTACTICS35
SPYWARE:BH:IMESHMEDIABAR
SPYWARE:BH:411WEBTOOLBAR
SPYWARE:BH:SBUHOTBAR484
SPYWARE:BH:EZ_TRACKS_TOOLBAR
SPYWARE:BH:KWORD-INTERKEY
SPYWARE:BH:KOMPASS-TOOLBAR
SPYWARE:BH:HDT_BAR
SPYWARE:BH:DEEPDO_TOOLBAR
SPYWARE:BH:PEOPLE_PAL_6_6
SPYWARE:BH:SOFA_TOOLBAR
SPYWARE:BH:HITHOPPER
SPYWARE:BH:YELLOWPAGES
SPYWARE:BH:SWBAR-ADROAD-CPR
SPYWARE:BH:LYCOSSIDESEARCH
SPYWARE:BH:FUNWEBPRODUCTS
SPYWARE:BH:LOCATORSTOOLBAR
SPYWARE:BH:RX-TOOLBAR
SPYWARE:BH:IMESHBAR
SPYWARE:BH:MICROGRAMING
SPYWARE:BH:FREEZE-COM
SPYWARE:BH:SNAPTOOLBAR
SPYWARE:BH:SPYNOVA
SPYWARE:BH:DEALIO_TOOLBAR
SPYWARE:BH:GETMIRAR
SPYWARE:BH:FLASHBAR
SPYWARE:BH:YOKSUPERSEARCH
SPYWARE:BH:PUSHTOOLBAR
SPYWARE:BH:SEARCHSQUIRE
SPYWARE:BH:HOTBAR100368
SPYWARE:BH:ABOUTBLANK
SPYWARE:BH:STUMBLEUPON

SPYWARE:BP

SPYWARE:BP:SMILEYCENTRAL
SPYWARE:BP:MACHERSTOOLBAR
SPYWARE:BP:IEPLUGIN
SPYWARE:BP:MIRARTOOLBAR
SPYWARE:BP:RUSSIAN-SEARCHBAR
SPYWARE:BP:NEWNET
SPYWARE:BP:INTERNETMARKETINGBAR
SPYWARE:BP:DITTO_TOOLBAR
SPYWARE:BP:BYDOU
SPYWARE:BP:BAIGOO
SPYWARE:BP:UPLINK
SPYWARE:BP:HAPPYTOFIND
SPYWARE:BP:BROWSERACCELERATOR30
SPYWARE:BP:IECODEC
SPYWARE:BP:ZQUEST-COOKIE
SPYWARE:BP:BYSOO
SPYWARE:BP:WILDTANGENT
SPYWARE:BP:ETCETERASEARCH
SPYWARE:BP:COMETCURSOR

SPYWARE:DIALER

SPYWARE:DIALER:EASYDATES
SPYWARE:DIALER:PLUGINACCESS
SPYWARE:DIALER:YEAKNET
SPYWARE:DIALER:TIB-PORN-DIALER
SPYWARE:DIALER:STRIPPLAYER
SPYWARE:DIALER:IEACCESS

SPYWARE:DM

SPYWARE:DM:TRUSTYFILES
SPYWARE:DM:MYNAPSTER
SPYWARE:DM:SLINKYSLATETOOLBAR
SPYWARE:DM:ALEXA-TOOLBAR
SPYWARE:DM:BRIDALBASICS
SPYWARE:DM:POPULARSCREENSAVERS
SPYWARE:DM:KONTIKI
SPYWARE:DM:ALTNET-VAR1
SPYWARE:DM:DWN-ARL
SPYWARE:DM:WEBHANCER

SPYWARE:GM

SPYWARE:GM:ALBUMGALAXY
SPYWARE:GM:SONGOOG
SPYWARE:GM:SEARCHBOSS
SPYWARE:GM:TWISTER
SPYWARE:GM:DOTCOMTOOLBAR
SPYWARE:GM:VIRTUALBOUNCER
SPYWARE:GM:SAH-CASHBACK
SPYWARE:GM:ZANGO-EASY-MESSENGER
SPYWARE:GM:SPYSHERIFF
SPYWARE:GM:SONYROOTKIT
SPYWARE:GM:SPYWARESTORMER
SPYWARE:GM:MYSPACEBARIE
SPYWARE:GM:IOWAWEBDOWNLOADER
SPYWARE:GM:CHILDWEBGUARDIAN
SPYWARE:GM:SPYDAWN
SPYWARE:GM:SPYWARELOCKED33
SPYWARE:GM:EXPERTANTIVIRUS41
SPYWARE:GM:UFIXER2007
SPYWARE:GM:VMNTOOLBAR16
SPYWARE:GM:ERRORSAFE
SPYWARE:GM:NETCRAFTTOOLBAR
SPYWARE:GM:SPYWAREQUAKE
SPYWARE:GM:RELEVANTKNOWLEDGE
SPYWARE:GM:WEBSITELOGGER34
SPYWARE:GM:TROJ-SPYWAD-X
SPYWARE:GM:PCAST
SPYWARE:GM:EDONKEY2000

SPYWARE:KL

SPYWARE:KL:XPCSPY-FTP
SPYWARE:KL:STARLOGGER
SPYWARE:KL:WINSPY
SPYWARE:KL:MASSCONNECT
SPYWARE:KL:FKWP-KEYLOGGER
SPYWARE:KL:CAM2FTP
SPYWARE:KL:WINTECTIVE
SPYWARE:KL:ELITEKEYLOGGER
SPYWARE:KL:SPYLANTERNKEYLOGGER
SPYWARE:KL:CODENAMEALVIN
SPYWARE:KL:KGBKEYLOGGER
SPYWARE:KL:007SPYSOFTWARE-FTP
SPYWARE:KL:NETTRACK-SPY
SPYWARE:KL:HACKERWACKER
SPYWARE:KL:PROAGENT
SPYWARE:KL:ELGOLF
SPYWARE:KL:SPYOUTSIDE-SMTP
SPYWARE:KL:PERFECTKEYLOGGER-FTP
SPYWARE:KL:ACTIVEKEYLOGGER
SPYWARE:KL:ACTIVEKEYLOGGERHOME
SPYWARE:KL:XP-ADVANCEDKEYLOGGER
SPYWARE:KL:LTTLOGGER
SPYWARE:KL:BEEE
SPYWARE:KL:MYBRKEYLOGGER
SPYWARE:KL:ADVANCEDSPY_4
SPYWARE:KL:COMPUTERMONITOR_1_1
SPYWARE:KL:EMAILSPYMONITOR_6_9
SPYWARE:KL:APLUSKEYLOGGER
SPYWARE:KL:LANTERNKEYLOGGER_6
SPYWARE:KL:ACTIVEKEYLOGGER_392
SPYWARE:KL:FINDNOT_GUARDOG
SPYWARE:KL:ARDAMAXKLOGGER28
SPYWARE:KL:WINFAMILYSAFETY
SPYWARE:KL:LOGIT10
SPYWARE:KL:MG-SHADOW20
SPYWARE:KL:SMART_PC_KEYLOGGER
SPYWARE:KL:DESKTOPSCOUT
SPYWARE:KL:FARSIGHTER
SPYWARE:KL:ESURVEILLER
SPYWARE:KL:PC-PARENT
SPYWARE:KL:BOSSEVERYWARE
SPYWARE:KL:GURLWATCH
SPYWARE:KL:ACTIVITY-LOGGER
SPYWARE:KL:DREAMSCAPEKEYLOGGER
SPYWARE:KL:PCACTMONPRO
SPYWARE:KL:LITTLEWITCHKEYLOGGER
SPYWARE:KL:FEARLESSKEYSPY
SPYWARE:KL:COMPUTERSPY
SPYWARE:KL:STEALTHACTREPORTER
SPYWARE:KL:ADVCMPMONITOR
SPYWARE:KL:PAGKEYLOG
SPYWARE:KL:STARR
SPYWARE:KL:GHOSTKEYLOGGER
SPYWARE:KL:SYSTEMSURVEILLANCE
SPYWARE:KL:POWERSPY
SPYWARE:KL:SPYTECTOR131
SPYWARE:KL:EMAILSPYPRO
SPYWARE:KL:PC-BLACK-BOX
SPYWARE:KL:RADARSPY-10
SPYWARE:KL:SUPREMESPY
SPYWARE:KL:BEYONDKEYLOGGER_SMTP
SPYWARE:KL:BEYOND-KEYLOGGER-FTP
SPYWARE:KL:WIN32.REMOTEKEYLOG.B
SPYWARE:KL:ALLINONEKEYLOGGER
SPYWARE:KL:KEYSPYWARE
SPYWARE:KL:NICESPY
SPYWARE:KL:ADVANCEDKEYLOGGER
SPYWARE:KL:KEYSPY
SPYWARE:KL:SYSTEMSLEUTH
SPYWARE:KL:SPYGRAPHICAPRO
SPYWARE:KL:SSKC20
SPYWARE:KL:APOPHISSPY10
SPYWARE:KL:COMPUTERMONITORKL
SPYWARE:KL:BASP-PRO-4
SPYWARE:KL:MSN-SPY-MONITOR
SPYWARE:KL:KEYLOGGERKINGHOME32
SPYWARE:KL:OVERSPY
SPYWARE:KL:PERFECTKEYLOGGER168
SPYWARE:KL:POWEREDKEYLOGGER-2-2
SPYWARE:KL:WATCHDOG
SPYWARE:KL:ACESPY
SPYWARE:KL:WEBMAILSPY
SPYWARE:KL:SPYBUDDY372
SPYWARE:KL:KEYLOGGERPRO
SPYWARE:KL:EYESPYPRO
SPYWARE:KL:PCSENTINELSOFTWAREKL
SPYWARE:KL:007SPYSOFTWARE-SMTP
SPYWARE:KL:ACTUALSPY
SPYWARE:KL:NETOBSERVE
SPYWARE:KL:DESKTOPDETECTIVE
SPYWARE:KL:ACTIVITYMONITOR
SPYWARE:KL:SPYOUTSIDE-FTP
SPYWARE:KL:ARDAMAXKEYLOGGER
SPYWARE:KL:SC-KEYLOG
SPYWARE:KL:SYS-KEYLOG-1-3
SPYWARE:KL:NETVIZOR52
SPYWARE:KL:INWEBSITELOG24
SPYWARE:KL:ACTIVITYKEYLOGGER
SPYWARE:KL:COMPUTERKEYLOGGER
SPYWARE:KL:WINVESTIGATOR

SPYWARE:RAT

SPYWARE:RAT:ANALFTP
SPYWARE:RAT:FADE1-0-HTTP
SPYWARE:RAT:SMALLUPLOADER
SPYWARE:RAT:ANTILAMER
SPYWARE:RAT:NETOPREMOTECONTROL
SPYWARE:RAT:DIEMSMUTTER
SPYWARE:RAT:ACIDHEAD
SPYWARE:RAT:HIDDENCAMERA
SPYWARE:RAT:COOLREMOTECONTROL
SPYWARE:RAT:SHNAPPZHTTPRAT
SPYWARE:RAT:THEEF-2-0-ICQ
SPYWARE:RAT:THEEF-2.0-CGI
SPYWARE:RAT:ACIDDROP
SPYWARE:RAT:REMOTEHAVOC
SPYWARE:RAT:BIONET-TCP
SPYWARE:RAT:MASTER
SPYWARE:RAT:FORCEDCONTROL
SPYWARE:RAT:CIA1-22-FTP
SPYWARE:RAT:NEUROTICKAT1-3-ICQ
SPYWARE:RAT:HATREDFRIEND-TCP
SPYWARE:RAT:ERAZER-ICQ
SPYWARE:RAT:PRORAT1-9-ICQ
SPYWARE:RAT:EXCEPTION1-0-HTTP
SPYWARE:RAT:CIA1-22-HTTP
SPYWARE:RAT:ABACAB-HTTP
SPYWARE:RAT:ASSASSIN1-1-HTTP
SPYWARE:RAT:CIA1-22-ICQ
SPYWARE:RAT:DSKLITE1-0-ICQ
SPYWARE:RAT:BEAST202-ICQ
SPYWARE:RAT:CIA1-22-SMTP
SPYWARE:RAT:SPYAGENT
SPYWARE:RAT:ACTMONMONITORING
SPYWARE:RAT:BOBO
SPYWARE:RAT:SNIPERNET
SPYWARE:RAT:BIFROSE
SPYWARE:RAT:ANALRAPE-ICQ-NOTIFY
SPYWARE:RAT:FEAR2-0
SPYWARE:RAT:NETDEMON1-0
SPYWARE:RAT:DATARAPE10F-GETPWD
SPYWARE:RAT:BUSCHTROMMEL1-22
SPYWARE:RAT:REMOTE-ANYTHING
SPYWARE:RAT:AIR
SPYWARE:RAT:REMOTER
SPYWARE:RAT:MINIOBLIVION
SPYWARE:RAT:FADE1-0-TCP
SPYWARE:RAT:STEALTHREDIR-FTP
SPYWARE:RAT:STEALTHREDIR-TCP
SPYWARE:RAT:PCACMEPRO
SPYWARE:RAT:INCOMMAND
SPYWARE:RAT:ARCANUM-0-1-1
SPYWARE:RAT:ROACH10-INITIALRESP
SPYWARE:RAT:MINIMO
SPYWARE:RAT:NIGHTCREATURE
SPYWARE:RAT:OMERTA-V13
SPYWARE:RAT:AQUA-0-2
SPYWARE:RAT:BADRAT1-1
SPYWARE:RAT:CYBERNETIC1-62
SPYWARE:RAT:SOFTWARSHADOW-CTS
SPYWARE:RAT:SOFTWARSHADOW-STC
SPYWARE:RAT:AMITIS
SPYWARE:RAT:SKYRATSHOW
SPYWARE:RAT:FERAT1-00-CTS
SPYWARE:RAT:NEUROTICKAT1-3-CTS
SPYWARE:RAT:FREAK
SPYWARE:RAT:COMA-CTS
SPYWARE:RAT:BEAST202-STC
SPYWARE:RAT:COMA-STC
SPYWARE:RAT:ASSASSIN-1-1STC
SPYWARE:RAT:ALEXMESSOMALEX-CTS
SPYWARE:RAT:KATUX2-0-SERVER
SPYWARE:RAT:BEAST20X-CTS
SPYWARE:RAT:HANUMAN
SPYWARE:RAT:REMOTECONTROL-17
SPYWARE:RAT:ASSASSIN1-1-CTS
SPYWARE:RAT:FERAT1-00-STC
SPYWARE:RAT:ALEXMESSOMALEX-STC
SPYWARE:RAT:LANFILTRATOR1-1-STC
SPYWARE:RAT:GREEKHACKERS1-1-CTS
SPYWARE:RAT:GREEKHACKERS1-1-STC
SPYWARE:RAT:SCHWINDLER1-82-CTS
SPYWARE:RAT:LANFILTRATOR-SIN
SPYWARE:RAT:HVLRAT-530-CTS
SPYWARE:RAT:HVLRAT-530-STC
SPYWARE:RAT:SCHWINDLER1-82-STC
SPYWARE:RAT:MINICOMMAND203-STC
SPYWARE:RAT:BIONET405-STC
SPYWARE:RAT:BIONET405-CTS
SPYWARE:RAT:CIA1-22
SPYWARE:RAT:FAKE0-2
SPYWARE:RAT:WINSHELL
SPYWARE:RAT:BSETROJAN
SPYWARE:RAT:SMARTHACKUPLOADER
SPYWARE:RAT:A-311DEATH
SPYWARE:RAT:ROACH1-0-CTS
SPYWARE:RAT:LITTLEWITCHEXPLORER
SPYWARE:RAT:SPECREM6-2-CTS
SPYWARE:RAT:SNID-X2-1-2C-STC
SPYWARE:RAT:NEUROTICKAT1-3-STC
SPYWARE:RAT:SPECREM6-2-STC
SPYWARE:RAT:ROACH1-0-STC
SPYWARE:RAT:SNID-X2-1-2C-CTS
SPYWARE:RAT:SCREENCONTROL10-CTS
SPYWARE:RAT:HERMANUPLOADER-CTS
SPYWARE:RAT:SHITHEEP
SPYWARE:RAT:SCREENCONTROL10-STC
SPYWARE:RAT:LAMESPY
SPYWARE:RAT:CD-ROMTROJAN
SPYWARE:RAT:NETCONTROLE3-0
SPYWARE:RAT:AMREMOTECLIENT1-1
SPYWARE:RAT:NTRC2000
SPYWARE:RAT:PHOENIX2-1-28
SPYWARE:RAT:REMOTESTORM1-2-CTS
SPYWARE:RAT:FLUX
SPYWARE:RAT:FREAK88DAS
SPYWARE:RAT:DIGITALUPLOAD
SPYWARE:RAT:HERMANUPLOADER-STC
SPYWARE:RAT:REMOTESTORM1-2STC
SPYWARE:RAT:BOSSWATCHER
SPYWARE:RAT:CIA1-3
SPYWARE:RAT:BIONET
SPYWARE:RAT:PRORAT1-9
SPYWARE:RAT:MINICOMMAND203-CTS
SPYWARE:RAT:SHNAPPZHTTPRAT-SMTP
SPYWARE:RAT:BIONET-FTP
SPYWARE:RAT:FF-RAT-SRV-RSP
SPYWARE:RAT:NETANGEL1-0-SIN
SPYWARE:RAT:BLUEFIRE-FTP
SPYWARE:RAT:YAT1-3
SPYWARE:RAT:TRAITOR21
SPYWARE:RAT:WEBCAMTROJAN
SPYWARE:RAT:NETCONTROLTAKEOVER
SPYWARE:RAT:RTB666
SPYWARE:RAT:ANTIPC
SPYWARE:RAT:96MM
SPYWARE:RAT:FF-RAT-BIN-BEACON
SPYWARE:RAT:JOKERSFTP
SPYWARE:RAT:BACKATTACK
SPYWARE:RAT:STRIKER1-0
SPYWARE:RAT:SERVEME
SPYWARE:RAT:EVILFTP
SPYWARE:RAT:FATALWOUND
SPYWARE:RAT:XHX1-6
SPYWARE:RAT:AUTOCRAT
SPYWARE:RAT:HANKYPANKY
SPYWARE:RAT:PCSHARE
SPYWARE:RAT:SUPERSPY
SPYWARE:RAT:X2A
SPYWARE:RAT:SPYAGENT-FTP
SPYWARE:RAT:CHARON-1-0-3
SPYWARE:RAT:SUPERRA
SPYWARE:RAT:SPYONE-1-0
SPYWARE:RAT:STATWIN
SPYWARE:RAT:RIX310
SPYWARE:RAT:SUPERVISORPLUS
SPYWARE:RAT:DIGIWATCHER-2-32
SPYWARE:RAT:SPYAGENT-ALERT
SPYWARE:RAT:DSKLITE1-0
SPYWARE:RAT:HUNTERGOP
SPYWARE:RAT:COOLCAT
SPYWARE:RAT:NCPH
SPYWARE:RAT:MITHRIL-1-45
SPYWARE:RAT:FRAG-ROCK-2-0
SPYWARE:RAT:HORNET
SPYWARE:RAT:OMNIQUARD-IRC
SPYWARE:RAT:EXCEPTION1-0
SPYWARE:RAT:MINICOMMAND203-ICQ
SPYWARE:RAT:FORCE1-61
SPYWARE:RAT:BLUEFIRE
SPYWARE:RAT:ROBO-HACK1-2
SPYWARE:RAT:SPYAGENT-SMTP
SPYWARE:RAT:NEUROTICKITTEN
SPYWARE:RAT:LANFILTRATOR1-1-CTS
SPYWARE:RAT:NUCLEAR-RAT-6-21
SPYWARE:RAT:DWMREMOTECONTROL
SPYWARE:RAT:GH0ST

SPYWARE:TROJAN

SPYWARE:TROJAN:G-SPOT
SPYWARE:TROJAN:HALFLIFEJACKER
SPYWARE:TROJAN:SILENTSPY
SPYWARE:TROJAN:DOWNLOADER-YD
SPYWARE:TROJAN:SANDESA-ICQNOTIF
SPYWARE:TROJAN:HTTPRAT
SPYWARE:TROJAN:BLHOUSE
SPYWARE:TROJAN:3XBACKDOOR
SPYWARE:TROJAN:SINIQUE1-0
SPYWARE:TROJAN:FALLINGSTAR
SPYWARE:TROJAN:OUTBREAK
SPYWARE:TROJAN:FKWP-WDOWNLOADER
SPYWARE:TROJAN:HELIOS-ICQNOTIFY
SPYWARE:TROJAN:ABREMOTEPRO31
SPYWARE:TROJAN:HATREDFIEND
SPYWARE:TROJAN:SNOWDOOR
SPYWARE:TROJAN:LOKITECH
SPYWARE:TROJAN:UPNRUN-V10
SPYWARE:TROJAN:APOFIS1.0
SPYWARE:TROJAN:HAVRAT1.1
SPYWARE:TROJAN:ABWIZ-C
SPYWARE:TROJAN:DOWNLOADER-ARM
SPYWARE:TROJAN:SPAM-MAXY
SPYWARE:TROJAN:DOWNLOADER.AB
SPYWARE:TROJAN:BAC-GEN-E
SPYWARE:TROJAN:CROSSBOW
SPYWARE:TROJAN:BERSEK1.0
SPYWARE:TROJAN:AGENTWD
SPYWARE:TROJAN:CYN21
SPYWARE:TROJAN:51D1B
SPYWARE:TROJAN:UNNAMED-BD
SPYWARE:TROJAN:YURI-1-2
SPYWARE:TROJAN:BLUEEYE10B
SPYWARE:TROJAN:ACCESSREMOTEPC
SPYWARE:TROJAN:GENIE17
SPYWARE:TROJAN:HOTMAILHACKER5
SPYWARE:TROJAN:BACKORIFICE2006
SPYWARE:TROJAN:DOWNLOADERDELF
SPYWARE:TROJAN:TROYA_1_4
SPYWARE:TROJAN:BANDOOK-1-35
SPYWARE:TROJAN:THEEF210
SPYWARE:TROJAN:THEEF210FTP
SPYWARE:TROJAN:LITHIUM102
SPYWARE:TROJAN:BIFROST121
SPYWARE:TROJAN:RADMIN30
SPYWARE:TROJAN:SHARK232
SPYWARE:TROJAN:EXPLOIT_1_4_5
SPYWARE:TROJAN:EVILGOAT
SPYWARE:TROJAN:BRAINWIPER
SPYWARE:TROJAN:SNAKETROJAN
SPYWARE:TROJAN:MOSUCKER3-0
SPYWARE:TROJAN:LETMERULE20-STC
SPYWARE:TROJAN:BACKLASH
SPYWARE:TROJAN:BAROK
SPYWARE:TROJAN:AUTOSPY-CTS
SPYWARE:TROJAN:LETMERULE20-CTS
SPYWARE:TROJAN:HRAT
SPYWARE:TROJAN:LITTLEWITCH-CMD
SPYWARE:TROJAN:AUTOSPY-STC
SPYWARE:TROJAN:FUNFACTORY-STC
SPYWARE:TROJAN:PHANTOMFTP
SPYWARE:TROJAN:CLANDESTINE
SPYWARE:TROJAN:WOLLF
SPYWARE:TROJAN:DACRYPTIC
SPYWARE:TROJAN:WEBDOWNLOADER
SPYWARE:TROJAN:ERAZER
SPYWARE:TROJAN:MESSIAH2-0
SPYWARE:TROJAN:RAD1-2-3
SPYWARE:TROJAN:HGZ
SPYWARE:TROJAN:TEQUILABANDITA
SPYWARE:TROJAN:FUCKTROJAN
SPYWARE:TROJAN:NUCLEARUP
SPYWARE:TROJAN:INIKILLER
SPYWARE:TROJAN:SEED1-0
SPYWARE:TROJAN:ELFRAT
SPYWARE:TROJAN:ABACAB
SPYWARE:TROJAN:MYDEMISE
SPYWARE:TROJAN:OPTIXLITE
SPYWARE:TROJAN:DIMBUS
SPYWARE:TROJAN:ERASER
SPYWARE:TROJAN:REVERSABLE
SPYWARE:TROJAN:COMANDO
SPYWARE:TROJAN:SINSTERLER
SPYWARE:TROJAN:X-BKDR
SPYWARE:TROJAN:NETSHADOW
SPYWARE:TROJAN:ACROPOLIS
SPYWARE:TROJAN:THUZEROTOLERANCE
SPYWARE:TROJAN:GWBOY
SPYWARE:TROJAN:HUE1-0
SPYWARE:TROJAN:VOICESPY
SPYWARE:TROJAN:NETANGEL1-0
SPYWARE:TROJAN:SUNSHADOW-1-70
SPYWARE:TROJAN:IEVA1.0
SPYWARE:TROJAN:BANDOOK-V1-0
SPYWARE:TROJAN:DWNLDR-ARQ
SPYWARE:TROJAN:ZSPYII0.99
SPYWARE:TROJAN:WINEGGDROPSPRO
SPYWARE:TROJAN:NIRVANA-2.0
SPYWARE:TROJAN:POISONIVY212
SPYWARE:TROJAN:ONE
SPYWARE:TROJAN:ZZMM20
SPYWARE:TROJAN:ONLY1RAT
SPYWARE:TROJAN:ACIDSHIVERS
SPYWARE:TROJAN:X-DOOR
SPYWARE:TROJAN:ACESSOR20
SPYWARE:TROJAN:YXNETSCREEN20
SPYWARE:TROJAN:LURKER11
SPYWARE:TROJAN:YKW375
SPYWARE:TROJAN:THEX-12
SPYWARE:TROJAN:LAMERAT10
SPYWARE:TROJAN:WEBCENTER
SPYWARE:TROJAN:WINSHADOW30
SPYWARE:TROJAN:OPTIXPRO132
SPYWARE:TROJAN:BOER
SPYWARE:TROJAN:TROLLA
SPYWARE:TROJAN:REVOPA
SPYWARE:TROJAN:Y3K2K5
SPYWARE:TROJAN:FURAX10B3
SPYWARE:TROJAN:PSEUDORAT01B
SPYWARE:TROJAN:COBRAUPLOADER
SPYWARE:TROJAN:WINTERLOVE
SPYWARE:TROJAN:REMOTEHACK
SPYWARE:TROJAN:GLOBALKILLER-STC
SPYWARE:TROJAN:BLACKCURSE4
SPYWARE:TROJAN:DARKMOON-4-11
SPYWARE:TROJAN:DLOADERAGENT-TL
SPYWARE:TROJAN:ZALIVATOR142PRO
SPYWARE:TROJAN:WINICABRAS11
SPYWARE:TROJAN:HELIOS-3-1-STC
SPYWARE:TROJAN:CRASHCOOL-1-1
SPYWARE:TROJAN:EVADE1-1B
SPYWARE:TROJAN:TRAILOFDESTRUC20
SPYWARE:TROJAN:CROSSFIRESTROJAN
SPYWARE:TROJAN:SPYLPLY.A
SPYWARE:TROJAN:KMSNRAT100
SPYWARE:TROJAN:ZXSHELL

SPYWARE:UTIL

SPYWARE:UTIL:AMPLIFYTOOLBAR
SPYWARE:UTIL:NUCLEARSCAN
SPYWARE:UTIL:SARIA
SPYWARE:UTIL:WEBFERRET
SPYWARE:UTIL:COPERNICMETABAR
SPYWARE:UTIL:SPYBLOCS-EBLOCS
SPYWARE:UTIL:COPERNICAGENT
SPYWARE:UTIL:I2HUB
SPYWARE:UTIL:BOHAJER-DOWNLOADER
SPYWARE:UTIL:SPYWARESTRIKE
SPYWARE:UTIL:SPAMBLOCKERUTILITY
SPYWARE:UTIL:HIPPYNOTIFY20
SPYWARE:UTIL:SMARTBARXP

SSH

SSH:OPENSSH-MAXSTARTUP-DOS
SSH:NON-STD-PORT
SSH:SYSAX-MULTI-SERVER-DOS
SSH:PRAGMAFORT-KEY-OF
SSH:BRUTE-LOGIN

SSH:AUDIT

SSH:AUDIT:UNEXPECTED-HEADER
SSH:AUDIT:SSH-V1

SSH:ERROR

SSH:ERROR:INVALID-HEADER
SSH:ERROR:MSG-TOO-LONG
SSH:ERROR:MSG-TOO-SHORT
SSH:ERROR:INVALID-PKT-TYPE
SSH:ERROR:COOKIE-MISMATCH

SSH:MISC

SSH:MISC:EXPLOIT-CMDS-UNIX
SSH:MISC:MAL-VERSION
SSH:MISC:UNIX-ID-RESP

SSH:OPENSSH

SSH:OPENSSH:BLOCK-DOS
SSH:OPENSSH:NOVEL-NETWARE
SSH:OPENSSH:GOODTECH-SFTP-BOF

SSH:OVERFLOW

SSH:OVERFLOW:SECURECRT-BOF
SSH:OVERFLOW:PUTTY-VER
SSH:OVERFLOW:FREESSHD-KEY-OF

SSL

SSL:UNK-HANDSHAKE-TYPE
SSL:ENC-LEN-VALUE-TOO-BIG
SSL:SERIAL-NUM-TOO-LONG
SSL:MSG-IN-WRONG-DIR
SSL:UNK-CHG-CPHR-SPEC-MSG
SSL:ENC-TAG-VALUE-TOO-BIG
SSL:SESSION-ID-LEN-2BIG
SSL:CLNT-MSTR-KEY-OVERFLOW
SSL:CIPHER-SUITE-OVERFLOW
SSL:SESSION-KEY-REUSE-UNAVAIL
SSL:SERVR-CERT-FAILS-VALIDATION
SSL:OPENSSL-TLS-HEARTBEAT
SSL:UNKNOWN-CIPHER-SUITE
SSL:SSL-V3-BRUTE-FORCE
SSL:GNUTLS-CERT-POLICY-BYPASS
SSL:GNUTLS-ASN1-LENGTH-OF
SSL:HTTPS-UNIX-CMDS
SSL:HTTPS-UNIX-ID-RESP
SSL:DEFAULT-PW
SSL:GNUTLS-TLS-RECORD-MC
SSL:DTLS-DOS
SSL:TLS-BRUTE-FORCE
SSL:MOZ-SSLV2-CL
SSL:SYS-MGMT-HOMEP-CMD-INJ
SSL:MALFORMED-SCHANNEL-NEGO
SSL:SSL-V3-TRAFFC
SSL:ALIEN-VAULT-SOAP-REQUEST-CE
SSL:OPENSSL-ECDH-DOS
SSL:OPENSSL-DTLS-MEMEXHTN_DOS
SSL:NAGIOS-NRPE-CHKUSRS-CI
SSL:UTN-USERFIRST-HARDWARE
SSL:OPENSSL-REC-HANDLING-DOS
SSL:OPENSSL-MEMLEAK-DOS
SSL:SLAPPER-WORM-PROBE
SSL:OPENSSL-FLOOD
SSL:THC-SSL-DOS
SSL:OPENSSL-DTLS-SRTP-DOS
SSL:TURKTRUST-FRAUD-CERTIFICATE
SSL:EGO-GOV-FRAUD-CERTIFICATE
SSL:HP-DIAGNOSTICS-OF
SSL:OPENSSL-AES-NI-INTUDF
SSL:DIGINOTAR-CERT-KEY-NEGO
SSL:OPENSSL-DTLSCLIENTHELLO-DOS
SSL:SSLSCAN-ACTIVITY
SSL:MS-WINDOWS-TLS-BYPASS
SSL:MS-SCHANNEL-RCE
SSL:APACHE-MOD-SSL
SSL:OPENSSL-DTLS1-DOS
SSL:OPENSSL-DTLS-DOS
SSL:OPENSSL-TLS-DOS
SSL:MCAFEE-EPOLICY-XML
SSL:OPENSSL-HEARTBEAT-ALTERNATE
SSL:CPHR-DOS
SSL:GNUTLS-CERT-BYPASS
SSL:OPENSSL-SRP-BO
SSL:ALIEN-VAULT-SOAP-CE
SSL:X509-CN-NULL-BYTE
SSL:APPLE-SSL-BYPASS
SSL:OPENSSL-TLSRECORD-DOS
SSL:GNUTLS-HELLO-SESSION-ID-OF
SSL:MGM-CONSOLE-XSS
SSL:SERVER-HELLO-SESSION-ID-OF
SSL:OPENSSL-MITM-SEC-BYPASS
SSL:OPENSSL-DO-SSL3-WRITE-DOS
SSL:ALIEN-VAULT-OSSIM-SOAP-CE
SSL:BEA-WEBLOGIC-DOS
SSL:OPENSSL-ALT-CHAINS-CERT-FRG
SSL:NOVELL-ZENWORKS-UL
SSL:OPENSSL-CHAINS-CERT-FORG
SSL:OPENSSL-DHE-DOS
SSL:SYMC-WEB-CMD-INJ
SSL:EPO-XMLNTITY-INJ
SSL:NOVELL-GROUPWISE-DIR-TRA
SSL:OPENSSL-TLS-DTLS-HEARTBEAT
SSL:OPENSSL-ECDH-UAF
SSL:MOZILLA-NSS-RSA-SIG-FORGERY
SSL:GNUTLS-EXTRACT-DER-DOS
SSL:OPENSSL-GET-KEY-EXCH-UAF
SSL:OPENSSL-DTLS-REC-DOS
SSL:OPENSSL-DTLS1-BOF
SSL:APPLE-SSL-BYPASS-PROXY
SSL:APACHE-NIO-CONNECTOR-DOS

SSL:AUDIT

SSL:AUDIT:SESSION-KEY-REUSE
SSL:AUDIT:CERT-EXPIRED
SSL:AUDIT:KEY-RENEGOTIATION
SSL:AUDIT:TLS-V11-TRAFFIC
SSL:AUDIT:TLS-V12-TRAFFIC
SSL:AUDIT:TLS-V10-TRAFFIC
SSL:AUDIT:HTTP-OVER-SSL
SSL:AUDIT:NOT-SSL
SSL:AUDIT:CERT-BIT-LT-2048
SSL:AUDIT:SSL-V2-TRAFFIC
SSL:AUDIT:SSL-V3-TRAFFIC
SSL:AUDIT:DTLS-CLT-HELLO-FRAG
SSL:AUDIT:RSA-EXPORT-CIPHER
SSL:AUDIT:DHEEXP-512CPHR-LOGJAM

SSL:IIS

SSL:IIS:CERT-DOS

SSL:INVALID

SSL:INVALID:CONTENT-TYPE
SSL:INVALID:VALIDITY-FMT
SSL:INVALID:SVR-HELLO-FMT
SSL:INVALID:CERT-VERSION
SSL:INVALID:MESSAGE-FMT
SSL:INVALID:COMP-METHOD
SSL:INVALID:COMP-METH-LEN
SSL:INVALID:SESSION-ID-LEN
SSL:INVALID:CLIENT-HELLO
SSL:INVALID:CERT-CHAIN
SSL:INVALID:CIPHER-SPEC
SSL:INVALID:CERT-FORMAT
SSL:INVALID:CHALLENGE-LEN
SSL:INVALID:SVR-HELLO-DATA
SSL:INVALID:CIPHER-LEN
SSL:INVALID:CIPHER-SUITE
SSL:INVALID:NULL-CERT
SSL:INVALID:SSL-INV-VER
SSL:INVALID:GNUTLS-RECORD-BO
SSL:INVALID:GNUTLS-RECORD-OF

SSL:OVERFLOW

SSL:OVERFLOW:SSL-KEY_ARG2
SSL:OVERFLOW:SSL-KEY_ARG1
SSL:OVERFLOW:BEA-PLUGINS-CERT
SSL:OVERFLOW:KEY-ARG-NO-ENTROPY
SSL:OVERFLOW:X509-OBJ-ID-OV
SSL:OVERFLOW:OPENSSL-SRP-CSUITE
SSL:OVERFLOW:ELLIPTIC-POLY-DOS
SSL:OVERFLOW:MSCRSFT-SCHANNL-CE
SSL:OVERFLOW:CIPHERS-OF
SSL:OVERFLOW:CIPHERS-OBO

SSL:VULN

SSL:VULN:OPENSSL-HS-DOS
SSL:VULN:ASN1-TYPE-CMP-DOS
SSL:VULN:F5-ICONTROL-SOAP-CE
SSL:VULN:CVE-2015-0291-DOS
SSL:VULN:CVE-2015-0208-DOS
SSL:VULN:SYMANTEC-EP-PARAM-XSS
SSL:VULN:MOZILLA-NSS-REG
SSL:VULN:DTLS-DOUBLE-FREE-DOS

SYSLOG

SYSLOG:CP-SYSLOGD-ESC
SYSLOG:SYSLOG-CRAFTED-PKT
SYSLOG:HP-MGMT-IMCSYSLOGDM-UAF
SYSLOG:PRI-PARSING-TCP-DOS
SYSLOG:RSYSLOG-BO
SYSLOG:PRI-PARSING-DOS
SYSLOG:WATCHER-PRO-DATE-XSS

SYSLOG:AUDIT

SYSLOG:AUDIT:MISSING-PRI
SYSLOG:AUDIT:TIMESTAMP
SYSLOG:AUDIT:PACKET
SYSLOG:AUDIT:INVALID-DAY
SYSLOG:AUDIT:INVALID-MONTH
SYSLOG:AUDIT:MISSING-TS
SYSLOG:AUDIT:INVALID-PRIORITY
SYSLOG:AUDIT:EMPTY-PRI

SYSLOG:FAILURES

SYSLOG:FAILURES:EMPTY-MSG
SYSLOG:FAILURES:MSG-TOO-LONG
SYSLOG:FAILURES:UNEXP-REPLY
SYSLOG:FAILURES:MSG-TOO-SHORT

SYSLOG:FORMAT

SYSLOG:FORMAT:PRI-TOO-LONG
SYSLOG:FORMAT:PRIORITY

TCP:AMBIGUOUS

TCP:AMBIGUOUS:WSF-TOOBIG

TCP:AUDIT

TCP:AUDIT:UNSOL-SACKPERM
TCP:AUDIT:OLD-SYNACK
TCP:AUDIT:S2C-FUTURE-ACK
TCP:AUDIT:C2S-FUTURE-ACK
TCP:AUDIT:SYN-RTNS--BADWSF
TCP:AUDIT:C2S-PART-OUT-OF-WIN
TCP:AUDIT:SYN-RTNS-BADTS
TCP:AUDIT:OPTIONS-UNNEGOT-SACK
TCP:AUDIT:UNSOL-WSF
TCP:AUDIT:S2C-OLD-ESTB
TCP:AUDIT:S2C-RST-DATA
TCP:AUDIT:SYN-RTNS-BADISS
TCP:AUDIT:C2S-CLOSED-ACK
TCP:AUDIT:S2C-TIMEWAIT-ACK
TCP:AUDIT:S2C-SEG-OUT-OF-WIN
TCP:AUDIT:C2S-URG-DATA
TCP:AUDIT:S2C-FIN-OUT-OF-WIN
TCP:AUDIT:S2C-FINWAIT2-FIN
TCP:AUDIT:S2C-LASTACK-ACK
TCP:AUDIT:S2C-PART-OUT-OF-WIN
TCP:AUDIT:S2C-TIMEWAIT-FIN
TCP:AUDIT:OPT-UNSOL-TS
TCP:AUDIT:SYNSENT-NONSYN
TCP:AUDIT:S2C-SYN-RST
TCP:AUDIT:C2S-FINRETR-BADSEQ
TCP:AUDIT:SYN-RTNS-BADWIN
TCP:AUDIT:C2S-RST-DATA
TCP:AUDIT:C2S-TIMEWAIT-FIN
TCP:AUDIT:C2S-TIMEWAIT-ACK
TCP:AUDIT:C2S-LASTACK-ACK
TCP:AUDIT:SYNRCVD-SYNACK
TCP:AUDIT:SYNSENT-RST
TCP:AUDIT:BAD-SYN-NONSYN
TCP:AUDIT:WRONG-CHECKSUM
TCP:AUDIT:C2S-SEG-OUT-OF-WIN
TCP:AUDIT:NONSYN-SACKPERM
TCP:AUDIT:OPTIONS-UNNEGOT-TS
TCP:AUDIT:C2S-OLD-ESTB
TCP:AUDIT:UNKNOWN
TCP:AUDIT:S2C-SIMUL-SYN
TCP:AUDIT:S2C-FINRETR-BADSEQ
TCP:AUDIT:OPT-UNSUP
TCP:AUDIT:OLD-3WH-ACK

TCP:C2S:AMBIG

TCP:C2S:AMBIG:C2S-SYN-DATA
TCP:C2S:AMBIG:SYN-RTNS--BADSACK
TCP:C2S:AMBIG:OLAP-MISMATCH

TCP:C2S:ERROR

TCP:C2S:ERROR:REASS-LOST-TRACK

TCP:C2S:EVASION

TCP:C2S:EVASION:C2S-URG-OUT-WIN
TCP:C2S:EVASION:C2S-ESTB-SYN

TCP:C2S:EXPLOIT

TCP:C2S:EXPLOIT:TCP-ZERO-PORT
TCP:C2S:EXPLOIT:C2S-URG-OVERLAP
TCP:C2S:EXPLOIT:URG-WO-FLG
TCP:C2S:EXPLOIT:RST-BRUTE-FORCE

TCP:C2S:FLAGSERROR

TCP:C2S:FLAGSERROR:DIRTY-SYN

TCP:C2S:INFO

TCP:C2S:INFO:C2S-FIN-OUT-OF-WIN

TCP:ERROR

TCP:ERROR:FLOW-MEMORY-EXCEEDED
TCP:ERROR:REASS-MEMORY-OVERFLOW

TCP:EXPLOIT

TCP:EXPLOIT:SOCKSTRESS

TCP:OPTERR

TCP:OPTERR:NONSYN-MSS
TCP:OPTERR:BAD-LENGTH
TCP:OPTERR:BAD-OPTION
TCP:OPTERR:SYN-SACK
TCP:OPTERR:NONSYN-WSF
TCP:OPTERR:TOO-LONG
TCP:OPTERR:SHORT-READ
TCP:OPTERR:ZERO-LENGTH
TCP:OPTERR:MS-ZERO-WINDOW-SIZE
TCP:OPTERR:MS-ORPHAN-CONNECTION

TCP:S2C:AMBIG

TCP:S2C:AMBIG:OLAP-MISMATCH

TCP:S2C:ERROR

TCP:S2C:ERROR:REASS-LOST-TRACK

TCP:S2C:EVASION

TCP:S2C:EVASION:S2C-URG-OUT-WIN
TCP:S2C:EVASION:S2C-ESTB-SYN

TCP:S2C:EXPLOIT

TCP:S2C:EXPLOIT:URG-WO-FLAGS
TCP:S2C:EXPLOIT:S2C-URG-OVERLAP

TCP:S2C:FLAGSERROR

TCP:S2C:FLAGSERROR:DIR-SYNACK

TCP:S2C:INFO

TCP:S2C:INFO:S2C-URG-DATA

TELNET:AUDIT

TELNET:AUDIT:REQ-SUBNEG-UNKNOWN
TELNET:AUDIT:USER

TELNET:CMD

TELNET:CMD:CAT-ETC-PASSWD
TELNET:CMD:HALT
TELNET:CMD:ALLIED-TELESIS-PRIV
TELNET:CMD:SCRIPT-TAGS-STREAM
TELNET:CMD:RAPIDHAMSTER-R2-TRAV

TELNET:DOS

TELNET:DOS:GAMSOFT
TELNET:DOS:TLNTSVR-EXE-DOS

TELNET:EXPLOIT

TELNET:EXPLOIT:RESOLV-HOST-CONF
TELNET:EXPLOIT:SGI-RLD
TELNET:EXPLOIT:MIT-KERB-DASH-E
TELNET:EXPLOIT:SOL-AUTH-BYPASS
TELNET:EXPLOIT:SOLARIS-LOGIN-OF
TELNET:EXPLOIT:MS-CREDENTIAL
TELNET:EXPLOIT:SUN-TELNETD-OF
TELNET:EXPLOIT:LD-LIBRARY-PATH
TELNET:EXPLOIT:LD-PRELOAD

TELNET:FAILURE

TELNET:FAILURE:BRUTE-FORCE
TELNET:FAILURE:EMP-CISCO-PWD
TELNET:FAILURE:LOGIN-FAILED
TELNET:FAILURE:LOGIN-INCORRECT
TELNET:FAILURE:NOT-ON-CONSOLE
TELNET:FAILURE:GUEST
TELNET:FAILURE:WINDOWS
TELNET:FAILURE:NON-NTLM
TELNET:FAILURE:PERM-DENIED

TELNET:NEGOT

TELNET:NEGOT:REQ-SUBNEG-FORMAT

TELNET:OVERFLOW

TELNET:OVERFLOW:SUBOPTION
TELNET:OVERFLOW:OPTION
TELNET:OVERFLOW:LOGIN-OF
TELNET:OVERFLOW:SGI
TELNET:OVERFLOW:YBSD-OF-CHECK
TELNET:OVERFLOW:ABSOLUTE-UK2-OF
TELNET:OVERFLOW:NEW-ENVIRON-OF
TELNET:OVERFLOW:CCPROXY-HOST-OF
TELNET:OVERFLOW:LINEMODE-OF
TELNET:OVERFLOW:BSD-ENCRY-KEYID
TELNET:OVERFLOW:OPTIONS-REPLY

TELNET:SVRRESP

TELNET:SVRRESP:MS-CLIENT-INFO

TELNET:USER

TELNET:USER:DEFAULT-PW-NORTEL
TELNET:USER:DEFAULT-PW-3
TELNET:USER:DEFAULT-PW
TELNET:USER:DEFAULT-PW-2
TELNET:USER:ROOT
TELNET:USER:APC-BACKDOOR
TELNET:USER:DYNALINK-BACKDOOR
TELNET:USER:AXIS-COPYRIGHT
TELNET:USER:DEFAULT-PW-3COM
TELNET:USER:DEFAULT-PW-4
TELNET:USER:EZSETUP
TELNET:USER:OUTOFBOX
TELNET:USER:4DGIFTS

TFTP

TFTP:FILENAME-TOO-LONG
TFTP:FNAME-NOT-T2
TFTP:MSG-TOO-SHORT
TFTP:MISSING-FILENAME
TFTP:EMPTY-FILENAME
TFTP:MISSING-MODE
TFTP:MSG-TOO-LONG
TFTP:NOVELL-ZENWORKS-DESK-CE
TFTP:FS-FILE
TFTP:WVFTP-OPTION-OF
TFTP:MRIS-ACCESS-VIOLATE
TFTP:MULT-SERVER-DOS
TFTP:SERVER-ERROR-BO
TFTP:TRANSPORT-BOF

TFTP:AUDIT

TFTP:AUDIT:C2S-UNEXP-ACK
TFTP:AUDIT:S2C-UNEXP-ACK
TFTP:AUDIT:C2S-INVALID-OPCODE
TFTP:AUDIT:WRITE-FAILED
TFTP:AUDIT:READ-FAILED
TFTP:AUDIT:S2C-INVALID-OPCODE
TFTP:AUDIT:C2S-UNEXP-DATA
TFTP:AUDIT:S2C-UNEXP-DATA

TFTP:DIRECTORY

TFTP:DIRECTORY:DOT-DOT
TFTP:DIRECTORY:SOLAR-TFTP-TRVRS
TFTP:DIRECTORY:REQ-FILE-DIR-TRV
TFTP:DIRECTORY:ROOT

TFTP:DOS

TFTP:DOS:LINUX-KERNEL

TFTP:FILE

TFTP:FILE:PASSWD-MAKREC
TFTP:FILE:ADMIN-DLL

TFTP:OPERATION

TFTP:OPERATION:FS-TFTP-OF
TFTP:OPERATION:GET
TFTP:OPERATION:WRITE

TFTP:OVERFLOW

TFTP:OVERFLOW:MODE-TOO-LONG

TFTP:REQUEST

TFTP:REQUEST:NULL-PTR

TIP

TIP:INV-IDENTIFY-RESP
TIP:RECONNECT

TROJAN

TROJAN:EAGHOUSE
TROJAN:ROOTKIT-DL
TROJAN:PUSHDO-ACTIVITY
TROJAN:BLEEDING-LIFE-EK
TROJAN:WALDEC-ACTIVITY
TROJAN:FAKE-AV-CO-CC
TROJAN:CAPFIRE4-CNC
TROJAN:GUPTACHAR-2.0
TROJAN:BYTE-VERIFY-HTML
TROJAN:WIPER-FLAME-UPDATE
TROJAN:CFM-UFO
TROJAN:MITGLEIDER
TROJAN:HXDEF1.00
TROJAN:DYRE
TROJAN:PEACOMM-TROJAN
TROJAN:POISONIVY-CNC
TROJAN:THE-RAT
TROJAN:WIPER-BACKDOOR-ACT
TROJAN:ALDIBOT-DETECTION
TROJAN:FISP-A-BOOTKIT
TROJAN:DUO-USB
TROJAN:EQUATIONGRP-EQUATIONLASR
TROJAN:ASPXSPY-ACTIVITY
TROJAN:GOZI-REG
TROJAN:SAKURA-1.1-ARCH-REQ
TROJAN:SAKURA-BIN-DOWNLOAD
TROJAN:PROFTPD-BACKDOOR-BEACON
TROJAN:PROFTPD-BACKDOOR
TROJAN:SAKURA-LANDING-OBFUS
TROJAN:SAKURA-LANDING-REQ
TROJAN:OSX-DNS-CHANGER
TROJAN:DROIDDREAM
TROJAN:DLINK-BACKDOOR
TROJAN:BACKDOOR-LEOUNCIA
TROJAN:DEADBEEF-CNC
TROJAN:JECT.A
TROJAN:BOT-FEODO-ACTIVITY
TROJAN:ITSOKNOPROBLEMBRO-CNC
TROJAN:EBURY-DNS-EXFILTRATION
TROJAN:CVE-2013-3893-CNC
TROJAN:R2D2
TROJAN:SPYEYE-BEACON
TROJAN:BEACON-C2-CNC
TROJAN:ZMEU-BOT-SCAN
TROJAN:KRONOS-CNC-COMM
TROJAN:ZEROACCESS-BOTNET-P2P
TROJAN:ENFAL-LURID-CNC
TROJAN:TAIDOOR-CNC
TROJAN:TINBA-CHECKIN-RQST
TROJAN:KAZY-BEACON
TROJAN:APT1-SSL-YAHOO
TROJAN:APT1-SSL-WEBMAIL
TROJAN:APT1-SSL-SUR
TROJAN:APT1-SSL-IBM
TROJAN:APT1-SSL-NO-NAME
TROJAN:APT1-SSL-VIRTUALLYTHERE
TROJAN:APT1-SSL-MOON-NIGHT
TROJAN:APT1-SSL-SERVER
TROJAN:APT1-SSL-AOL
TROJAN:APT1-SSL-NS
TROJAN:APT1-SSL-EMAIL
TROJAN:BLACKHOLE-KIT-URL-REQ
TROJAN:APACHE-DARKLEECH
TROJAN:OPHIARU-BOTNET
TROJAN:ANDROID-SPAMSOLDIER-BOT
TROJAN:RUN-FOREST-RUN
TROJAN:SYNOLOCKER-ACTIVITY
TROJAN:WIPER-FLAME-POST-EXFIL
TROJAN:HTRAN-UA
TROJAN:CITADEL-BEACON
TROJAN:APT1-WEBC2-UGX-UA
TROJAN:APT1-WEBC2-CLOVER-UA
TROJAN:FAKE-MSIE-6.0-UA
TROJAN:APT1-SSL-ALPHA
TROJAN:W32-PARITE-CNC
TROJAN:APT1-WEBC2RAVE-TOSCTB-UA
TROJAN:APT1-SSL-LAME
TROJAN:UNKNOWN-BACKDOOR-KNOCK
TROJAN:PUSHDO-POST-CNC
TROJAN:NIGHT-DRAGON-CC
TROJAN:ASPXSPY-CONNECT
TROJAN:MALVERTISING-CO-CC
TROJAN:SAKURA-BIN-LOAD-REQ
TROJAN:SAFEPACK-PLUGIN-DETECT
TROJAN:APT1-WEBC2-DIV-UA
TROJAN:CDORKED-BACKDOOR
TROJAN:CDORKED-INFECTED-SERVER
TROJAN:EBURY-SSH-BACKDOOR
TROJAN:SIMPLE-PHP-BACKDOOR
TROJAN:BACKOFF-ACTIVITY
TROJAN:BACKDOOR-BY-ZOMBIE
TROJAN:NGRBOT-ACTIVITY
TROJAN:EQUATIONGRP-PRIVLIB
TROJAN:CRYPTOWALL
TROJAN:HTTP-ZEROACCESS-BOTNET
TROJAN:EQUATIONGRP-CRYPTOLIB
TROJAN:PITTY-TIGER-ACTIVITY
TROJAN:TESLACRYPT-CNC
TROJAN:OLDBAIT-CHOSTICK-CHECKIN
TROJAN:SOFACY-CNC
TROJAN:SOFACY-MALICIOUS-REQUEST

TROJAN:ADMW0RM

TROJAN:ADMW0RM:USER-LOGIN

TROJAN:AUTOPROXY

TROJAN:AUTOPROXY:INFECTED-HOST

TROJAN:BACKCONSTR

TROJAN:BACKCONSTR:FTP-PORT-OPEN
TROJAN:BACKCONSTR:FTP-ON
TROJAN:BACKCONSTR:CONNECTION

TROJAN:BACKDOOR

TROJAN:BACKDOOR:BANNER
TROJAN:BACKDOOR:PERL-SHELLBOT-S
TROJAN:BACKDOOR:PANDORA-DOS-CNC
TROJAN:BACKDOOR:MURCY-CNC
TROJAN:BACKDOOR:CHINACHOPPERCNC
TROJAN:BACKDOOR:GHOSTNET-CNC
TROJAN:BACKDOOR:DRIDEX-FEODO

TROJAN:BACKORIFICE

TROJAN:BACKORIFICE:BO2K-CONNECT
TROJAN:BACKORIFICE:EXECUTION
TROJAN:BACKORIFICE:WEB-SERVER
TROJAN:BACKORIFICE:BOPING
TROJAN:BACKORIFICE:CONN-REQ

TROJAN:CDK

TROJAN:CDK:PORT15858
TROJAN:CDK:PORT79

TROJAN:COREFLOOD

TROJAN:COREFLOOD:C-AND-C
TROJAN:COREFLOOD:TRACKER-REQ

TROJAN:DAGGER

TROJAN:DAGGER:SERVER-RES
TROJAN:DAGGER:CLIENT-CONNECT

TROJAN:DOLY

TROJAN:DOLY:SERVER-RES-V1
TROJAN:DOLY:SERVER-RES-V2
TROJAN:DOLY:COMMAND-V1

TROJAN:DONALDDICK

TROJAN:DONALDDICK:SERVER-RES

TROJAN:GATECRASHER

TROJAN:GATECRASHER:SERVER-RES
TROJAN:GATECRASHER:GC-PROBE

TROJAN:GIRLFRIEND

TROJAN:GIRLFRIEND:SERVER-RES

TROJAN:INFECTOR

TROJAN:INFECTOR:SVR-RES
TROJAN:INFECTOR:CLIENT-REQ

TROJAN:MISC

TROJAN:MISC:WEBSERVCT10
TROJAN:MISC:ROOTBEER-CLIENT
TROJAN:MISC:AOLADMIN-SRV-RESP
TROJAN:MISC:GHOST-SRV-RESP
TROJAN:MISC:FRENZY-SRV-RESP
TROJAN:MISC:NETTAXI-SRV-RESP
TROJAN:MISC:CHUPA-COMMAND
TROJAN:MISC:KONIK-CLIENT-REQ
TROJAN:MISC:LESZCZ-SRV-RESP
TROJAN:MISC:SCHNECK-SERV-RESP
TROJAN:MISC:LITHIUM-SRV-RESP
TROJAN:MISC:UNDETECTED-SRV-RESP
TROJAN:MISC:MASSAKER-SRV-RESP
TROJAN:MISC:TRUVA-SERV-RESP
TROJAN:MISC:CELINE-SRV-RESP
TROJAN:MISC:GIRLFRIEND-SRV-RESP
TROJAN:MISC:GIFT-COMMAND
TROJAN:MISC:HACKWORLD-CMD
TROJAN:MISC:GSPOT-COMMAND
TROJAN:MISC:CGI-BUINET-SRV-RESP
TROJAN:MISC:DTR-BANNER
TROJAN:MISC:DCONNECT
TROJAN:MISC:FE-SERV-RESP
TROJAN:MISC:CYN-CLIENT-REQ
TROJAN:MISC:FILENAIL-REQUEST
TROJAN:MISC:FORE-SRV-RESP
TROJAN:MISC:FBACKDOOR-SRV-RESP
TROJAN:MISC:DRAT-SRV-VERSION
TROJAN:MISC:DANTON-SVR-RESP
TROJAN:MISC:INCOMMAND-SVR-VER
TROJAN:MISC:BLADERUNNER-RESP
TROJAN:MISC:BDDT-SRV-OK
TROJAN:MISC:CAFEINI-SERV-RESP
TROJAN:MISC:BACKAGE-COMMAND
TROJAN:MISC:BF-EVOLUTION-BANNER
TROJAN:MISC:AMANDA-SRV-RESP
TROJAN:MISC:BASICHELL-SRV-RESP
TROJAN:MISC:BREACHPRO-CAP-REQ
TROJAN:MISC:BLACKANGEL-SRV-RESP
TROJAN:MISC:ASYLUM-COMMAND
TROJAN:MISC:BREACH-SRV-RESP
TROJAN:MISC:BLAZER-SERV-RESP
TROJAN:MISC:ECLYPSE-SRV-RESP
TROJAN:MISC:CRACKDOWN-SRV-RESP
TROJAN:MISC:RUX-COMMAND
TROJAN:MISC:RPM-COMMAND
TROJAN:MISC:RATHEAD-SRV-RESP
TROJAN:MISC:R3C-SERV-RESP
TROJAN:MISC:REMOTEHACK-CLIENTID
TROJAN:MISC:RULER-SERV-RESP
TROJAN:MISC:REMOTEHACK-SVR-RESP
TROJAN:MISC:PROSIAK-SERV-RESP
TROJAN:MISC:PHOENIX-SERV-RESP
TROJAN:MISC:PITFALL-SERV-RESP
TROJAN:MISC:SONOFPW-SERV-RESP
TROJAN:MISC:R0XR4T-COMMAND
TROJAN:MISC:PSYCHWARD-SRV-RESP
TROJAN:MISC:PCINVADER-COMMAND
TROJAN:MISC:FLU-COMMAND
TROJAN:MISC:PROJNEXT-SERV-RESP
TROJAN:MISC:PHASE-ZERO-SRV-RESP
TROJAN:MISC:PCINVADER-FTP-BANR
TROJAN:MISC:PPORT-INFO-REQ
TROJAN:MISC:SCARAB-CONNECT
TROJAN:MISC:WINMITE-SRV-RDY
TROJAN:MISC:TRANSSCOUT-CLIENTID
TROJAN:MISC:VOODOO-COMMAND
TROJAN:MISC:TRON-COMMAND
TROJAN:MISC:UPLOADER-LOGIN-REQ
TROJAN:MISC:THING-SERV-RESP
TROJAN:MISC:WINRAT12-TCP
TROJAN:MISC:WINCRASH10-SRV-RDY
TROJAN:MISC:VAGNCKER-SERV-RESP
TROJAN:MISC:XANADU111-CON
TROJAN:MISC:WOW23-TCP
TROJAN:MISC:WINRAT10-TCP
TROJAN:MISC:WINCRASH
TROJAN:MISC:ULTORS-SERV-RESP
TROJAN:MISC:WANREMOTE-ADMIN
TROJAN:MISC:MOONPIE-SERV-RESP
TROJAN:MISC:NETRAIDER-SRV-RESP
TROJAN:MISC:MEETLAMER-COMMAND
TROJAN:MISC:NIRVANA-COMMAND
TROJAN:MISC:OSIRIS-SERV-RESP
TROJAN:MISC:KIDTERROR-SRV-RESP
TROJAN:MISC:MAVERICKS-SRV-RESP
TROJAN:MISC:INTRUDER-RESPONSE
TROJAN:MISC:INSANE-SRV-RESP
TROJAN:MISC:OBLIVION-SRV-RESP
TROJAN:MISC:OXON-COMMAND
TROJAN:MISC:MOSUCKER-SERV-RESP
TROJAN:MISC:ONE-CLIENTID
TROJAN:MISC:MOBLIVION-SERV-RESP
TROJAN:MISC:MOONPIE3-FTP-RESP
TROJAN:MISC:NETSPY-SRV-RESP
TROJAN:MISC:HOSTCONTROL-RESP
TROJAN:MISC:NETSILENCE-SRV-RESP
TROJAN:MISC:MICHAL-SRV-RESP
TROJAN:MISC:MNEAH-SERV-RESP
TROJAN:MISC:NOKNOK-COMMAND
TROJAN:MISC:LEGUARDIEN
TROJAN:MISC:GLACIER
TROJAN:MISC:ULTIMATERAT
TROJAN:MISC:EXECUTOR-CMD
TROJAN:MISC:LAST2K-CONN
TROJAN:MISC:RADMIN-CMD
TROJAN:MISC:OPTIX-PRO-CONN
TROJAN:MISC:SCHOOLBUS-JOYBD
TROJAN:MISC:CYN-CLIENT-CONN
TROJAN:MISC:TROJAN-CIA
TROJAN:MISC:ILLUSION-1-0
TROJAN:MISC:ULTIMATE-RAT21
TROJAN:MISC:MILLENIUM-SERV-RESP
TROJAN:MISC:CRAZZYNET-SRV-RESP
TROJAN:MISC:ULLYSSE
TROJAN:MISC:HELLZ-SRV-RESP
TROJAN:MISC:PITFALL-TELNET-ID
TROJAN:MISC:VAMPIRE-SRV-RESP
TROJAN:MISC:NETTERROR-SRV-RESP
TROJAN:MISC:CONNECTION-RESP
TROJAN:MISC:MOONPIE-FTP-RESP
TROJAN:MISC:PRAYER-SERV-RESP
TROJAN:MISC:MWI-DOC-EXPKIT

TROJAN:MS-04-028

TROJAN:MS-04-028:R-ADMIN-START
TROJAN:MS-04-028:TOOL-DOWNLOAD
TROJAN:MS-04-028:BACKDOOR-LOGIN

TROJAN:MYDOOM

TROJAN:MYDOOM:S-IRC-BACKDOOR
TROJAN:MYDOOM:MYDOOM-TROJAN
TROJAN:MYDOOM:AH-HTTP-INFECT

TROJAN:NETBUS

TROJAN:NETBUS:CLT-GETINFO-12346
TROJAN:NETBUS:SERVER-RES-12345
TROJAN:NETBUS:PRO-SERVER-RES
TROJAN:NETBUS:SERVER-RES-12346
TROJAN:NETBUS:CLT-GETINFO-12345

TROJAN:NETDEVIL

TROJAN:NETDEVIL:NETDEVIL1-4
TROJAN:NETDEVIL:NETDEVIL-STC
TROJAN:NETDEVIL:NETDEVIL

TROJAN:NETMTROPOL

TROJAN:NETMTROPOL:CLI-REQ-5301
TROJAN:NETMTROPOL:CLI-REQ-5302

TROJAN:NETSPHERE

TROJAN:NETSPHERE:SVR-RES-HIGH
TROJAN:NETSPHERE:SVR-RES

TROJAN:PHASEZERO

TROJAN:PHASEZERO:SERVER-RES

TROJAN:PHATBOT

TROJAN:PHATBOT:FTP-CONNECT
TROJAN:PHATBOT:CMD-CONNECT

TROJAN:QAZ

TROJAN:QAZ:TCP25-CALLING-HOME
TROJAN:QAZ:CLIENT-LOGIN
TROJAN:QAZ:TCP139-SCAN

TROJAN:REMOTE-EXPLORER

TROJAN:REMOTE-EXPLORER:CONNECT

TROJAN:SATANS-BD

TROJAN:SATANS-BD:SERVER-RES

TROJAN:SUBSEVEN

TROJAN:SUBSEVEN:2.2-SERVER-RES
TROJAN:SUBSEVEN:SCAN
TROJAN:SUBSEVEN:SUBSEVEN
TROJAN:SUBSEVEN:SUBSEVEN-HTTP
TROJAN:SUBSEVEN:2.1.A-SRVR-RES

TROJAN:TELNET

TROJAN:TELNET:USER-HIDEPAK
TROJAN:TELNET:USER-REWT
TROJAN:TELNET:USER-W00W00
TROJAN:TELNET:USER-SATORI
TROJAN:TELNET:USER-HAX0R
TROJAN:TELNET:USER-R00T
TROJAN:TELNET:USER-LRKR0X
TROJAN:TELNET:USER-HIDESOURCE
TROJAN:TELNET:USER-FRIDAY
TROJAN:TELNET:USER-BACKDOOR
TROJAN:TELNET:USER-WH00T
TROJAN:TELNET:USER-D13HH

TROJAN:Y3K-RAT

TROJAN:Y3K-RAT:Y3K14-RAT-TCP
TROJAN:Y3K-RAT:Y3K16-RAT-BANNER

TROJAN:YAT

TROJAN:YAT:YAT-BANNER

UDP

UDP:ZERO-DATA
UDP:PORT-ZERO
UDP:SNORT-FRAG3-DETECTION
UDP:XTACACSD-BO
UDP:MS-WINDOWS-TCP-IP-CNTR

VIRUS

VIRUS:HERE-YOU-HAVE
VIRUS:BITCOIN-MINER-BOTNET

VIRUS:POP3

VIRUS:POP3:UUENCODED-DOT-VBS
VIRUS:POP3:EICAR-ATTACHMENT
VIRUS:POP3:NIMDA
VIRUS:POP3:SOBER-K

VIRUS:SMTP

VIRUS:SMTP:DOUBLE-EXTENSION
VIRUS:SMTP:NIMDA
VIRUS:SMTP:EICAR-ATTACHMENT
VIRUS:SMTP:EXE-IN-ZIP
VIRUS:SMTP:UUENCODED-DOT-VBS
VIRUS:SMTP:EXE-ATTACH-1
VIRUS:SMTP:LOCALHOST-HELO
VIRUS:SMTP:ZONEALARM-EXE
VIRUS:SMTP:ASPROX

VNC

VNC:SESSION
VNC:ULTRA-CLIENT-OF
VNC:QEMU-KVM-DOS
VNC:ULTRAVNC-CLIENT-AUTH-OF
VNC:CHICKEN-VNC-DOS
VNC:LIBVNCSERVER-DIVBYZERO-DOS
VNC:GNOME-VINO-VNC-SERVER-DOS
VNC:AUTH-BYPASS

VNC:AUDIT

VNC:AUDIT:AUTH-FAILED
VNC:AUDIT:CLIENT-BITPERPIXEL
VNC:AUDIT:CONNECT-FAIL
VNC:AUDIT:AUTH-SCHEME
VNC:AUDIT:AUTH-STATUS
VNC:AUDIT:SERVER-BITPERPIXEL
VNC:AUDIT:ENCODING-TYPE
VNC:AUDIT:UNKNOWN-SERVER-MSG
VNC:AUDIT:UNKNOWN-CLIENT-MSG

VNC:ERR

VNC:ERR:CONFLICT-HEXTILE-MASK
VNC:ERR:TOO-MANY-AUTH-FAIL
VNC:ERR:SVR-CUT-TOO-LONG
VNC:ERR:SVR-CUT-OVERFLOW
VNC:ERR:BRUTE-FORCE
VNC:ERR:CLNT-CUT
VNC:ERR:NO-AUTH-SCHEME

VNC:INVALID

VNC:INVALID:SERVER-RESPONSE
VNC:INVALID:SERVER-VERSION
VNC:INVALID:NAME-TOO-LONG
VNC:INVALID:CLIENT-VERSION
VNC:INVALID:CLIENT-REQUEST

VNC:OVERFLOW

VNC:OVERFLOW:AUTH-RESPONSE
VNC:OVERFLOW:CLIENT-INIT
VNC:OVERFLOW:AUTH-STATUS
VNC:OVERFLOW:AUTH-CHALLENGE
VNC:OVERFLOW:SET-ENCODINGS
VNC:OVERFLOW:REASON
VNC:OVERFLOW:NAME
VNC:OVERFLOW:CLIENT-CUT-TEXT
VNC:OVERFLOW:RSN-TOO-LONG
VNC:OVERFLOW:REALVNC-MSG-BO
VNC:OVERFLOW:SER-WRT-SCALNG-RCE

VOIP

VOIP:ASTERISK-IAX2-DOS
VOIP:IAX-INT-OF
VOIP:APPLE-FACETIME-REQ
VOIP:CISCO-UCM-OF
VOIP:ASTERISK-CS-OVERFLOW
VOIP:IAX2-DOS
VOIP:SKINNY-DRV-DOS
VOIP:DIGIUM-ASTERISK-SECBYPASS

VOIP:H225RAS

VOIP:H225RAS:REG-BAD-ID-CHAR
VOIP:H225RAS:URQ-DOS

VOIP:H225RAS:AUDIT

VOIP:H225RAS:AUDIT:UNKN-MESSAGE

VOIP:H225RAS:DOS

VOIP:H225RAS:DOS:LRQ
VOIP:H225RAS:DOS:RRQ
VOIP:H225RAS:DOS:ARQ

VOIP:H225SGN

VOIP:H225SGN:SETUP-NOGRANT-PORT
VOIP:H225SGN:SETUP-NOTGRANT-IP
VOIP:H225SGN:SETUP
VOIP:H225SGN:RELEASE-COMPLETE
VOIP:H225SGN:PROTO

VOIP:MGCP

VOIP:MGCP:INV-CHAR-LOW
VOIP:MGCP:OVERLONG-UTF8
VOIP:MGCP:INV-CHAR-HIGH
VOIP:MGCP:INVALID-HEX-LOW
VOIP:MGCP:UTF8-ERROR
VOIP:MGCP:LINE-OVERFLOW
VOIP:MGCP:INVALID-HEX-HIGH
VOIP:MGCP:DOUBLE-ENCODING

VOIP:MGCP:AUDIT

VOIP:MGCP:AUDIT:INV-RSP-HDR
VOIP:MGCP:AUDIT:UNKNOWN-METHOD
VOIP:MGCP:AUDIT:INV-PARM-RM
VOIP:MGCP:AUDIT:INV-CMD-HDR
VOIP:MGCP:AUDIT:INV-TRANS-ID
VOIP:MGCP:AUDIT:INV-PARM-NAME
VOIP:MGCP:AUDIT:INV-PARM-RD
VOIP:MGCP:AUDIT:INV-IP-DOMAIN
VOIP:MGCP:AUDIT:INV-CALL-ID
VOIP:MGCP:AUDIT:INV-CONN-ID
VOIP:MGCP:AUDIT:INV-EP-NAME

VOIP:MGCP:SDP

VOIP:MGCP:SDP:HEADER-ORD-ERR
VOIP:MGCP:SDP:HEADER-RPT-ERR
VOIP:MGCP:SDP:HEADER-UNK-ERR
VOIP:MGCP:SDP:SYNTAX-ERROR
VOIP:MGCP:SDP:INV-ORIGIN
VOIP:MGCP:SDP:INV-CI
VOIP:MGCP:SDP:MAL-HEADER
VOIP:MGCP:SDP:VERSION-OF
VOIP:MGCP:SDP:TIME-OF
VOIP:MGCP:SDP:MEDIA-PORT-OF

VOIP:MGMT

VOIP:MGMT:XPRESSA-HTTP-DOS
VOIP:MGMT:VICIDIAL-INFO-DISC

VOIP:RTP

VOIP:RTP:FLOW-START-VIDEO
VOIP:RTP:FLOW-START
VOIP:RTP:RTPFLOOD-DOS
VOIP:RTP:IAXFLOOD-DOS

VOIP:SIP

VOIP:SIP:OVERSIZED-UDP-MSG
VOIP:SIP:SHORT-REQUEST
VOIP:SIP:SECURITY-PAR-ERR
VOIP:SIP:MALFORMED-PORT
VOIP:SIP:SECURITY-BAD-SCHEMA
VOIP:SIP:SECURITY-PAR-UFLOW
VOIP:SIP:DOUBLE-ENCODING
VOIP:SIP:BRUTE-FORCE
VOIP:SIP:HAMMER
VOIP:SIP:HEADER-UFLOW
VOIP:SIP:BRUTE-INV
VOIP:SIP:SHORT-RESPONSE
VOIP:SIP:UNK-SRV-RESP
VOIP:SIP:EMERGENCY-NUMBER
VOIP:SIP:SQL-INJ
VOIP:SIP:EMERGENCY-PRIORITY
VOIP:SIP:KEEP-ALIVE-2
VOIP:SIP:BYE-AUTH
VOIP:SIP:SQL-CMD-2
VOIP:SIP:SQL-CMD-1
VOIP:SIP:UNKNOWN-DATA
VOIP:SIP:ASTERISK-RTP-TYPE
VOIP:SIP:SESSION-REQ
VOIP:SIP:BIN-IN-AUTH-RESP
VOIP:SIP:SRV-RESP-400
VOIP:SIP:SRV-RESP-401
VOIP:SIP:KEEP-ALIVE
VOIP:SIP:KEEP-ALIVE-3
VOIP:SIP:RESPR-INV-OPT-OF
VOIP:SIP:FMT-STR
VOIP:SIP:DIGIUM-ASTERISK-DOS
VOIP:SIP:INVITE-MSG-DOS
VOIP:SIP:MULTI-TECH-INVITE-OF
VOIP:SIP:CSCO-INVITE-DOS
VOIP:SIP:ASTERISK-UDPTL-BO
VOIP:SIP:ASTERISK-CHANNEL-DOS
VOIP:SIP:TEARDOWN-BYE-DOS
VOIP:SIP:BT-RECON-SMAP
VOIP:SIP:BT-RECON-SIPSCAN
VOIP:SIP:BT-RECON-ENUMIAX
VOIP:SIP:BT-RECON-SVMAP
VOIP:SIP:INVITEFLOOD-DOS
VOIP:SIP:ASTERISK-RES-DOS
VOIP:SIP:GS-EAVESDROP
VOIP:SIP:SIPSAK-OPTION-FLOOD
VOIP:SIP:ASTERISK-SDP-MEDIA-DOS
VOIP:SIP:CISCO-PHNE-MSG-SEQ-DOS
VOIP:SIP:WENGO-PHONE-DOS

VOIP:SIP:AUDIT

VOIP:SIP:AUDIT:UTF8-ERROR
VOIP:SIP:AUDIT:CONTENT-LENGTH
VOIP:SIP:AUDIT:NO-COLON
VOIP:SIP:AUDIT:MISSING-VERSION
VOIP:SIP:AUDIT:INV-REQ-HEADER
VOIP:SIP:AUDIT:UNK-METHOD
VOIP:SIP:AUDIT:SYNTAX-ERROR
VOIP:SIP:AUDIT:INV-CHARACTER
VOIP:SIP:AUDIT:INV-TERMINATION
VOIP:SIP:AUDIT:EMPTY-HEADER-VAL
VOIP:SIP:AUDIT:INVALID-RCODE
VOIP:SIP:AUDIT:BAD-IPV6
VOIP:SIP:AUDIT:URI-ERROR
VOIP:SIP:AUDIT:INVALID-HEX-LOW
VOIP:SIP:AUDIT:BAD-IPV4
VOIP:SIP:AUDIT:INV-CHAR-LOW
VOIP:SIP:AUDIT:INV-REP-HEADER
VOIP:SIP:AUDIT:UNK-HEADER
VOIP:SIP:AUDIT:INVALID-HEX-HIGH
VOIP:SIP:AUDIT:DUPLICATE-HEADER
VOIP:SIP:AUDIT:INV-CHAR-HIGH
VOIP:SIP:AUDIT:NOT-SIP
VOIP:SIP:AUDIT:INV-FROM
VOIP:SIP:AUDIT:INV-CSEQ
VOIP:SIP:AUDIT:INV-CONTACT
VOIP:SIP:AUDIT:INV-CONT-TYPE
VOIP:SIP:AUDIT:INV-URI
VOIP:SIP:AUDIT:SESSION-HIJACK
VOIP:SIP:AUDIT:TELEPRESENCE
VOIP:SIP:AUDIT:INV-INVITE-SRC
VOIP:SIP:AUDIT:INV-PARA-VIA
VOIP:SIP:AUDIT:INV-VIA-PROT-ID
VOIP:SIP:AUDIT:DUPLICATE-INVITE
VOIP:SIP:AUDIT:INV-CALL-ID

VOIP:SIP:LIMITS

VOIP:SIP:LIMITS:CALL-INFO-OF
VOIP:SIP:LIMITS:CONTACT-OF
VOIP:SIP:LIMITS:CONTENT-LEN-OF
VOIP:SIP:LIMITS:CSEQ-OF
VOIP:SIP:LIMITS:EXPIRES-OF
VOIP:SIP:LIMITS:FROM-OF
VOIP:SIP:LIMITS:CONTENT-TYPE-OF
VOIP:SIP:LIMITS:IN-REPLY-TO-OF
VOIP:SIP:LIMITS:MAX-FWRDS-OF
VOIP:SIP:LIMITS:SIP-NEG-CNT-LEN
VOIP:SIP:LIMITS:REJ-CONTACT-OF
VOIP:SIP:LIMITS:MIN-EXPIRES-OF
VOIP:SIP:LIMITS:REQ-DISPO-OF
VOIP:SIP:LIMITS:REC-ROUTE-OF
VOIP:SIP:LIMITS:PROX-AUTH-OF
VOIP:SIP:LIMITS:PRIORITY-OF
VOIP:SIP:LIMITS:CONT-ENC-OF
VOIP:SIP:LIMITS:PROX-AUTHRIZ-OF
VOIP:SIP:LIMITS:ROUTE-OF
VOIP:SIP:LIMITS:ALLOW-OF
VOIP:SIP:LIMITS:ACC-LAN-OF
VOIP:SIP:LIMITS:PROX-REQ-OF
VOIP:SIP:LIMITS:AUTHORIZ-OF
VOIP:SIP:LIMITS:ORGANIZATION-OF
VOIP:SIP:LIMITS:ACC-OF
VOIP:SIP:LIMITS:AUTH-INFO-OF
VOIP:SIP:LIMITS:ACC-CONTACT-OF
VOIP:SIP:LIMITS:ACC-ENC-OF
VOIP:SIP:LIMITS:CALL-ID-OF
VOIP:SIP:LIMITS:RETRY-AFTER-OF

VOIP:SIP:OVERFLOW

VOIP:SIP:OVERFLOW:LINE-OVERFLOW
VOIP:SIP:OVERFLOW:HEADER-OF
VOIP:SIP:OVERFLOW:CHUNK-OF
VOIP:SIP:OVERFLOW:MAX-FORWARD
VOIP:SIP:OVERFLOW:USERNAME
VOIP:SIP:OVERFLOW:OVERLONG-UTF8
VOIP:SIP:OVERFLOW:PORT-OF
VOIP:SIP:OVERFLOW:LINE-OF
VOIP:SIP:OVERFLOW:SECURITY-PAR
VOIP:SIP:OVERFLOW:METHOD
VOIP:SIP:OVERFLOW:FROM-OF
VOIP:SIP:OVERFLOW:QPOP-OF
VOIP:SIP:OVERFLOW:VIA-HOST-OF
VOIP:SIP:OVERFLOW:HDR-EXP-OF
VOIP:SIP:OVERFLOW:T-38-SDP-OF
VOIP:SIP:OVERFLOW:HDR-URI-OF
VOIP:SIP:OVERFLOW:SIPXTAPI-OF

VOIP:SIP:SDP

VOIP:SIP:SDP:HEADER-ORD-ERR
VOIP:SIP:SDP:SYNTAX-ERROR
VOIP:SIP:SDP:HEADER-UNK-ERR
VOIP:SIP:SDP:HEADER-RPT-ERR
VOIP:SIP:SDP:VERSION-OF
VOIP:SIP:SDP:MEDIA-PORT-OF
VOIP:SIP:SDP:TIME-OF
VOIP:SIP:SDP:MAL-HEADER-CLT
VOIP:SIP:SDP:INV-CI
VOIP:SIP:SDP:HDR-BOF
VOIP:SIP:SDP:MAL-HEADER-STC

VOIP:SKYPE

VOIP:SKYPE:SKYPE-ENCRYPTED
VOIP:SKYPE:INSTALL
VOIP:SKYPE:VERSION-CHECK
VOIP:SKYPE:LOGIN
VOIP:SKYPE:PROBE-1
VOIP:SKYPE:CONNECTION

VOIP:SMPP

VOIP:SMPP:NOKIA-SMS-MMS-DOS

WHOIS

WHOIS:REQUEST-TOO-LONG
WHOIS:UNEXPECTED-REPLY
WHOIS:INVALID_EOL
WHOIS:TUNNEL

WORM

WORM:COMMWARRIORB
WORM:LOVEGATE-INFECTED
WORM:WORM-BROPIA-F
WORM:CHOD.B
WORM:CHUNKED-WORM
WORM:AKAK-TRAFFIC
WORM:DISTTRACK-CNC
WORM:DISTTRACK-USER-AGENT
WORM:DISTTRACK-PROPAGATION
WORM:STATS-PHP-IFRAME
WORM:MARE-D-SCAN
WORM:THE-MOON-LINKSYS
WORM:MINIFLAME-CNC
WORM:BLACKHOLE-ACTIVITY
WORM:CRYPTOLOCKER-RACKETEER

WORM:AGOBOT

WORM:AGOBOT:PY-HTTP-PROP
WORM:AGOBOT:SASSER-FTP-OF

WORM:BAGLE

WORM:BAGLE:Q-HTTP
WORM:BAGLE:HTTP-BACKDOOR
WORM:BAGLE:AF-HTTP

WORM:BERBEW

WORM:BERBEW:KEYLOGGER-UPLOAD

WORM:BLASTER

WORM:BLASTER:BACKDOOR-CMD

WORM:CODERED

WORM:CODERED:INFECTION-ATTEMPT

WORM:CODERED-2

WORM:CODERED-2:INFECT-ATTEMPT

WORM:CONFICKER

WORM:CONFICKER:C-ACTIVITY
WORM:CONFICKER:C-ACTIVITY-2

WORM:DABBER

WORM:DABBER:TFTP-TRANSFER
WORM:DABBER:SASSER-PROBE
WORM:DABBER:B-BACKDOOR-CMD

WORM:EMAIL

WORM:EMAIL:SOBIG-DL-REQUEST

WORM:FIZZER

WORM:FIZZER:IRC-CHAN-1
WORM:FIZZER:IRC-CHAN-2

WORM:LOVGATE

WORM:LOVGATE:P-NET-SHARE-SPREAD
WORM:LOVGATE:BACKDOOR-LOGIN

WORM:MASLAN

WORM:MASLAN:IRC-BACKDOOR-CON

WORM:MIMAIL

WORM:MIMAIL:MIMAIL.A

WORM:MOFEI

WORM:MOFEI:MOFEI-BACKDOOR3
WORM:MOFEI:MOFEI-B-PROPAGATION
WORM:MOFEI:MOFEI-BACKDOOR2

WORM:MYTOB

WORM:MYTOB:ED-IRC

WORM:NACHI

WORM:NACHI:D-WEBDAV-ATK
WORM:NACHI:B-C-D-INFECT-ATTEMPT

WORM:NETSKY

WORM:NETSKY:V-SMTP-PROP

WORM:NIMDA

WORM:NIMDA:NIMDA-RICHED20
WORM:NIMDA:EMAIL-PROP
WORM:NIMDA:BIN-255-CMD
WORM:NIMDA:NIMDA-NWS
WORM:NIMDA:NIMDA-EML
WORM:NIMDA:SCRIPTS-ROOT
WORM:NIMDA:SCRIPTS-C11C-CMD
WORM:NIMDA:SCRIPTS-CMD
WORM:NIMDA:MSADC-ROOT

WORM:PHPINCLUDE

WORM:PHPINCLUDE:EXPLOIT
WORM:PHPINCLUDE:SEARCH-REQ

WORM:SANTY

WORM:SANTY:INFECT-ATTEMPT
WORM:SANTY:GOOGLE-SEARCH

WORM:SASSER

WORM:SASSER:FTP-SRV-OVERFLOW
WORM:SASSER:A-D-F-SHELL-CMD
WORM:SASSER:A-D-F-FTP-DL-5554

WORM:SDBOT

WORM:SDBOT:DX-IRC-BEACON
WORM:SDBOT:OH-BACKDOOR-COMMAND

WORM:SLAMMER

WORM:SLAMMER:INFECT-ATTEMPT

WORM:SLAPPER

WORM:SLAPPER:CINIK-SRC
WORM:SLAPPER:C2-INFEC
WORM:SLAPPER:C-INFECT
WORM:SLAPPER:B-INFECT
WORM:SLAPPER:AION-INFECT
WORM:SLAPPER:WORM-INFECT

WORM:SMB

WORM:SMB:BUGBEAR-B
WORM:SMB:DELODER-2
WORM:SMB:DELODER
WORM:SMB:W32-SLACKOR

WORM:SQL-SNAKE

WORM:SQL-SNAKE:MSSQL-REG-2
WORM:SQL-SNAKE:MSSQL-REG-3
WORM:SQL-SNAKE:MSSQL-REG-1

WORM:WITTY

WORM:WITTY:INFECT-ATTEMPT

WORM:ZAFI

WORM:ZAFI:D-BACKDOOR-UPL

X11

X11:X11-XC-QUERY-SECURITY
X11:XFS-SWAP-CHAR
X11:XFS-QUERYX

APP:ENCRYPTED-TRAFFIC-3

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the most strict, and should create the fewest false positives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-1

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the least strict, and should catch the most traffic, but might trigger on non-encrypted traffic.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-2

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is moderately strict, and is a compromise between false-positives and false-negatives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:NAV-ENT-WEB-OF

Description

This signature detects attempts to exploit a known vulnerability in Norton Antivirus Enterprise (NAV). A successful attack can lead to a stack overflow causing a denial of service or arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

An attacker could exploit the vulnerability to execute arbitrary code with System level privileges.

References

APP:CONEXANT-LOGIN

Description

This signature detects a default blank login to a DSL router based on the Conexant chipset. Attackers can supply a blank password on a secret port to modify the router settings.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The authentication mechanism used by the Conexant AccessRunner DSL Console can be bypassed. This could allow a remote user to access the device's configuration settings. ** The discoverer of this issue has reported that it may not be present in some devices. There is currently no known reason for why some devices are vulnerable while others are not. This record will be updated if and when further details become available.

Affected Products

References

APP:HP-SAN-IQ-CMD-INJ

Description

This signature detects attempts to exploit a known vulnerability in the HP SAN iQ Appliance. A successful attack can lead to command injection within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:WINCOM-AUTH-BO

Description

This signature detects attempts to exploit a known vulnerability against WinComLPD. A successful attack allows attackers to execute arbitrary code with the privileges of the user running the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:GIOP-COMM

Description

This signature detects properly formatted GIOP communication. This signature triggers when your network is carrying Object Request Broker traffic.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:JONDO-PROXY

Description

This signature detects the runtime behavior of Jondo Privacy Generator. Jondo is a proxy application that enables users to re-route communication through an encrypted pipe. This is usually used to bypass corporate network usage policies.

Severity

INFO

Group

APP

Supported By

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:LINUX-SCTP-FWD-TSN-BO

Description

This signature detects attempts to exploit a known vulnerability against Linux SCTP Handler. A successful exploit can lead to buffer overflow and remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:HP-MGMT-CENTER-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP Intelligent Management Center img component. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:YOUSENDIT

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:INDUSOFT-WEBSTUDIO-RCE

Description

A code execution vulnerability has been identified in the Remote Agent component of InduSoft Web Studio. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:SUPERSCOUT-USERDB

Description

This signature detects attempts to exploit a known vulnerability in the Webfilter for SuperScout Web Reports Server running on Microsoft Windows 2000 and NT. Attackers can use a simple GET request to obtain the user database (a txt file that contains user names and encrypted passwords) from the server.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

SurfControl SuperScout WebFilter is web filtering software for Microsoft Windows operating systems. SurfControl SuperScout WebFilter includes a remotely accessible reporting service. It has been reported that SuperScout WebFilter insecurely stores some types of information. The reports server included as part of the SuperScout WebFilter package stores sensitive information in a publicly accessible, unrestricted directory. A remote user could gain access to user credentials.

Affected Products

References

APP:NTOP-WEB-FS1

Description

This signature detects attempts to exploit a known vulnerability against Ntop, an application for displaying network usage (similar to the common UNIX command "top"). When the Web interface is enabled (tcp/3000), attackers can send a maliciously crafted string to crash the ntop daemon and execute arbitrary commands.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

ntop is a tool designed to give an overview of network performance and usage, similar to the Unix top command. ntop was designed for Linux, BSD and Unix based systems, although it has also been ported to Windows. A vulnerability has been reported in some versions of ntop. User supplied data is used in an unsafe manner in printf and syslog calls, leading to a format string vulnerability. Exploitation of this vulnerability may result in the execution of arbitrary code. If ntop is executed with the -w flag, it may be possible to remotely exploit this vulnerability through a malicious HTTP request. It was also reported that this condition was produced using Netscape with the following web request: http://target:port/`ls` This occurred because Netscape was URL encoding the request, which caused the request to be interpreted as a format string by NTop. For example, `ls` is converted to %60ls%60. Other versions of ntop may share this vulnerability. This has not been confirmed.

Affected Products

References

APP:RH-ICOMMERCE-ANYFILE

Description

This signature detects attempts to exploit a directory traversal vulnerability in Red Hat Interchange Commerce Servers. A successful directory traversal attack, can allow attackers to read any file on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A vulnerability has been reported for Interchange 4.8.5 and earlier. Reportedly, Interchange may disclose contents of files to attackers. The vulnerability occurs due to the placement of the 'doc' folder. Reportedly, the folder will be installed as follows: <INTERCHANGE_ROOT>/doc. This folder, by default, contains Interchange man pages. This vulnerability is only exploitable when the Interchange service runs in INET (Internet service) mode. An attacker may exploit this vulnerability to the contents of restricted files accessible to the Interchange process. It has been reported that this issue may be exploited through a '../' directory traversal sequence in a HTTP request to the vulnerable server.

Affected Products

References

APP:HP-DATA-PROTECTOR-MMD-BOF

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Manager MMD Service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability because of an access violation error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager A.06.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:IPSO-FILE-VIEW

Description

This signature detects attempts to exploit a known vulnerability in "Voyager", a Web GUI included with Nokia IP-boxes. IPSO 3.6-FCS6 and other versions are vulnerable. Attackers can use Voyager to instruct a CGI script to view the contents of arbitrary files on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It has been reported that Nokia IPSO does not properly handle some types of requests through Voyager. Because of this, an attacker with access to the interface may be able to view potentially sensitive information.

Affected Products

References

APP:CUPS-GIF-BO

Description

This signature detects attempts to exploit a known vulnerability against multiple vendor CUPS GIF Decoders. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

CUPS is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied GIF image data before copying it to an insufficiently sized buffer. Successful exploits allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. CUPS 1.3.6 is vulnerable; other versions may also be affected.

Affected Products

References

APP:HP-STORAGEWORKS-OPC22-BO

Description

This signature detects an attempt to exploit a known vulnerability against HP StorageWorks application. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:POSTFIX-IPV6-RELAYING-ISSUE

Description

There is a vulnerability in the way Postfix handles the relaying of e-mail messages. In certain configurations, the vulnerable Postfix becomes an open relay for mail addressed to MX host with IPv6 addresses. An attacker can exploit this flaw to deliver bulk arbitrary mail, using 3rd party resources, to an e-mail gateway with IPv6 addresses registered. A successful attack allows an attacker to use the target Postfix as an open relay to MX hosts with IPv6 addresses. The target will relay mail from an untrusted SMTP client. The vulnerable system may be used to send unsolicited e-mail such as spam.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:WINMAIL-PATH-DIS

Description

This signature detects attempts to access a vulnerable Winmail module. A successful exploit can allow attackers to obtain information about the server's internal structure.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:BRG-MAIL-US-PASS

Description

This signature detects attempts to exploit a known vulnerability against Brightmail AntiSpam. Versions earlier than 6.0.2 are vulnerable. Attackers can exploit a hard-coded database administrator password vulnerability to bypass security restrictions and gain administrative access. This could allow attackers to modify the device behavior.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Symantec Brightmail AntiSpam is susceptible to a remote information disclosure vulnerability. This issue is due to a failure of the application to properly ensure that remote database access is properly disabled. In cases where the affected package was upgraded, rather than freshly installed, remote database access was not properly disabled. Remote access to the database may be simplified for attackers, as the database utilizes a static password. This vulnerability allows remote attackers to gain access to potentially sensitive database contents.

Affected Products

References

APP:POSTFIX-GLD-FS

Description

This signature detects attempts to exploit a known vulnerability in the Postfix Greylisting daemon. A successful exploit with a malicious format string, can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It is reported that GLD contains a format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function. Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers. GLD version 1.4 is reportedly affected, but prior versions may also be affected.

Affected Products

References

APP:COLDFUSIONMX-ACC

Description

This signature detects attempts to access the fileprobe.cfm. With default settings, Macromedia ColdFusion MX will return an error message containing the full path of the ColdFusion software. Versions 6.x are vulnerable.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A vulnerability has been reported for Macromedia ColdFusion MX that may reveal the physical path information to attackers. When certain malformed URL requests are received by the server, an error message is returned containing the full path of the ColdFusion installation.

Affected Products

References

APP:MERCURY-BOF

Description

This signature detects attempts to exploit a known vulnerability in the Mercury Mail Transport System product. The vulnerability is created by the lack of proper enforcement of maximum allowable length of user supplied data. A malicious unauthenticated attacker can exploit this vulnerability, which can result in a stack buffer overflow leading to arbitrary code execution on the target host.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Mercury Mail is prone to a remote buffer-overflow vulnerability in its mailbox name service. This issue occurs because the application fails to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM privileges in the context of the affected server process. Mercury Mail 4.01b is affected; other versions may also be affected.

Affected Products

References

APP:VMS-8.3.5-CMD-EXE

Description

This signature detects an attempt to redirect the flow of the VisNetic MailServer administration interface. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:PEER2MAIL

Description

This signature detects the Peer2Mail application. Peer2Mail allows files to be stored on a mail server as e-mail attachments for later retrieval from another computer. This can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:HP-LOADRUNNER-RCE

Description

This signature detects attempts to exploit a known vulnerability against HP LoadRunner. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.

Affected Products

References

APP:WINPRICE

Description

This signature detects activity of the WinPrice client, an application made by Quatrain (http://www.katren.ru) for purchasing prescription drugs over the Internet. This activity may be illegal in your area.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:SENTINEL-LM-OF

Description

This signature detects attempts to exploit a known vulnerability in the Sentinel License Manage. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A remote buffer overflow vulnerability affects SafeNet Sentinel License Manager. This issue is due to a failure of the application to securely copy network-derived data into finite process buffers. An attacker may leverage this issue to execute arbitrary code with SYSTEM privileges.

Affected Products

References

APP:GOOG-PICASA

Description

This signature detects the activity of the Google Picasa Client. Picasa is a photo repository, editing, and uploading client by Google Inc.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:MOZY-ACTY

Description

This signature detects the activity of the Mozy Backup Client. Mozy is an on-line file backup service provided by Berkeley Data Systems.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:EMC-ALPHA-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC AlphaStor Agent. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

EMC AlphaStor Server Agent is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Successful exploits may allow attackers to execute arbitrary code with SYSTEM-level privileges; failed attempts will likely cause denial-of-service conditions. These issues affect AlphaStor 3.1 SP1 for Windows. Previous versions, and versions for additional platforms, may also be affected.

Affected Products

References

APP:SVN-DATE-SERVE

Description

This signature detects attempts to exploit a known vulnerability in the Subversion Svnserve. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

References

APP:OPENVIEW-STORAGE-BO

Description

This signature detects an attempt to exploit a Buffer Overflow vulnerability against HP Open View Storage. Successful exploitation could allow an attacker to execute arbitrary codes into the context of the running application

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:BORLAND-STARTEAM

Description

This signature detects attempts to exploit a known vulnerability in the Borland CaliberRM 2006. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Borland StarTeam Multicast Service is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will cause a denial-of-service condition. This issue affects Borland StarTeam Multicast Service 6.4 included in Borland CaliberRM 2006, 2007, and 2008. Other Borland products may also be affected.

Affected Products

References

APP:FEDORA-DIR-SER-INFO-LEAK

Description

This signature detects an information disclosure attack against the Fedora directory service. Fedora Directory Server 1.0.2 DSGW is vulnerable to an information leakage that can allow an attacker to retrieve multiples files on the system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:RETRO-CL-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC Retrospect Client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Dantz Retrospect Backup Client is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

Affected Products

References

APP:CHKPOINT-FW-INFO-DISC

Description

This signature detects attempts to exploit an information disclosure vulnerability in Checkpoint Firewall WebUI. Due to insufficient sanitization of user input, attackers can gain access to arbitrary files on the targeted system.

Severity

MEDIUM

Group

APP

Supported By

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:SVN-DATE-OF

Description

This signature detects attempts to exploit a known vulnerability against SVN SubVersion server. Versions 1.0.0 and 0.37 are vulnerable. A successful attack allows the attacker to execute arbitrary code within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

References

APP:CHROME-ENGINE-4-DOS

Description

This signature detects attempts to exploit a known vulnerability in the Chrome Engine 4. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Chrome Engine 4 is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected server, resulting in denial-of-service conditions. Chrome Engine version 4 is vulnerable; other versions may also be affected.

Affected Products

References

APP:EMC-NSRINDEXD-BO

Description

This signature detects attempts to exploit a known vulnerability in EMC NetWorker. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.

Affected Products

References

APP:SOLARWINDS-LOG-EVENT-MANAGR

Description

A policy bypass vulnerability exists in SolarWinds Log and Event Manager. A remote attacker can exploit this vulnerability to access the database with administrator privileges. Once accessed, the attacker can read and write information in the database.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:EMC-DATA-PROTECTION-DOS

Description

This signature detects attempts to exploit a known vulnerability against EMC Data Protection Advisor. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:FREEPBX-ARI-DOS

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Asterisk Recording Interface (ARI) webui. A malformed request can result in a denial of service of the Web interface.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The Asterisk Recording Interface is prone to the following issues: 1. Multiple security bypass vulnerabilities. 2. A cross-site request-forgery vulnerability. 3. A cross-site scripting vulnerability. Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Affected Products

References

APP:SITEMINDER-AUTH-REDIR

Description

This signature detects attempts to exploit a known vulnerability in Netegrity's Siteminder application. Attackers can send a maliciously formatted hyperlink designed to trick users into believing they are logging into their Siteminder server. Instead, the hyperlink redirects the user's authentication information to a server under the attacker's control, enabling the attacker to obtain the user's login information.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:CLAMAV-UPX-OF-HTTP

Description

This signature detects attempts to exploit a known vulnerability in ClamAV. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

ClamAV is prone to a remote buffer-overflow vulnerability. This condition occurs when the program processes malformed UPX-compressed executables. Successful exploitation may result in the execution of arbitrary code in the context of the application.

Affected Products

References

APP:AFP-LEN-OF

Description

This signature detects attempts to exploit a known vulnerability in Apple Filing Protocol. Attackers can send a maliciously crafted packet that contains an invalid PathName length to overflow a string buffer and execute arbitrary code. Note: Apple Inc. has fixed this vulnerability in APPLE-SA-2004-05-03 Security Update 2004-05-03

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It has been reported that AppleFileServer is prone to a remote buffer overflow vulnerability that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. The issue presents itself when the application receives a 'LoginExt' packet containing a malformed 'PathName' argument. Apple Mac OS X 10.3.3 and prior are reported to be prone to this issue. This issue was previously disclosed in a multiple BID 10268 (Apple OS X Multiple Unspecified Large Input Vulnerabilities), however, it is being assigned a new BID as a result of new information available.

Affected Products

References

APP:VINZANT-ARCHTCTR-AUTHWKNESS

Description

This signature detects Architectural Authentication Weakness attempts on Vinzant Global ECS Agent. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:HP-LEFTHAND-HYDRA-PING-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP LeftHand Virtual SAN Appliance. A successful attack can lead to a heap overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513.

Affected Products

References

APP:HP-INSIGHT-MANAGER-RCE

Description

This signature detects attempts to exploit a known vulnerability against Hewlett-Packard Insight Manager. A successful exploit can lead to the remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:ZEND-SERVER-JAVA-RCE

Description

This signature detects attempts to exploit a known vulnerability against Zend Server Java Bridge. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Zend Server is prone to a remote code-execution vulnerability in the Zend Java Bridge component. Successful exploits can allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

References

APP:HP-MEDIA-SIGN-IN-NAME-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations SignInName Parameter. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Media Operations is prone to a remote denial-of-service vulnerability that occurs because of a NULL-pointer dereference error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Media Operations 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:EMC-ALPHASTOR-LIB-BOF

Description

This signature detects attempts to exploit a known vulnerability against EMC AlphaStor. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Buffer overflow in the Library Control Program (LCP) in EMC AlphaStor 4.0 before build 910 allows remote attackers to execute arbitrary code via crafted commands.

Affected Products

References

APP:HP-PROCURVE-FILE-UPLD-SSL

Description

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Affected Products

References

APP:LANDESK-QIP-HEAL

Description

There exists a memory corruption vulnerability in LANDesk QIP service. The vulnerability is due to insufficient validation when processing specially crafted In case of a successful exploitation, the attacker can inject and execute arbitrary code with the privileges of the affected service, normally In the case of an unsuccessful code execution attack, the service will be terminated due to memory corruption, causing Denial of Service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

LANDesk Intel QIP Service is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with SYSTEM-level privileges. This will result in a complete compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects the following: LANDesk Management Suite 8.8 and earlier LANDesk Security Suite 8.8 and earlier LANDesk Server Manager 8.8 and earlier

Affected Products

References

APP:APPLE-MACOSX-ODP-RCE

Description

This signature detects attempts to exploit a known vulnerability against Apple Mac OS X. A successful attack can lead to arbitrary code execution. Failed exploit attempts could trigger a denial of service condition on the targeted system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Directory Service in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted message.

Affected Products

References

APP:BAOFENG-STORM-PLAYLIFL-BO

Description

This signature detects attempts to exploit a known vulnerability in the BaoFeng Storm multimedia player. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

BaoFeng Storm is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Storm 3.09.62 is vulnerable; other versions may also be affected.

Affected Products

References

APP:HP-LOADRUNNER-SSL

Description

This signature detects attempts to exploit a known vulnerability against HP LoadRunner. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.

Affected Products

References

APP:WEBSENSE-FAV-BYPASS

Description

This signature detects attempts to exploit a known security-bypass vulnerability against multiple Websense products. A successful exploit may allow attackers unauthorized access to a victim's system where they could download, view, or manipulate files.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Multiple Websense products are prone to an authentication-bypass vulnerability. Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access. The following Websense products are affected: Websense Web Security Gateway Anywhere 7.6 Websense Web Security Gateway 7.6 Websense Web Security 7.6 Websense Web Filter 7.6

Affected Products

References

APP:MCAFEE-FIREWALL-RCE

Description

This signature detects attempts to exploit a known vulnerability against McAfee Firewall. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

McAfee Firewall Reporter is prone to an authentication-bypass vulnerability. Successfully exploiting this issue will allow attackers to point the 'cgisess' cookie value to an arbitrary file that exists on the server, bypassing certain security restrictions. This issue may allow websites to bypass certain security restrictions and gain access to potentially sensitive information. This issue was introduced in McAfee Firewall Reporter 5.1.0.6

Affected Products

References

APP:HP-MGMT-DBMAN-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP Intelligent Management Center dbman component. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Intelligent Management Center is prone to multiple remote code-execution vulnerabilities. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

References

APP:HP-DATA-PROTECTOR-OP-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:HP-DATA-PRTCTR-EXEC-BAR-CE

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1885.

Affected Products

References

APP:FLASH-RTMP-RESP

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Adobe Flash Player is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following versions are affected: Adobe Flash Player 11.2.202.233 and prior versions for Windows, Mac OS and Linux operating systems Adobe Flash Player 11.1.115.7 and prior versions for Android 4.x Adobe Flash Player 11.1.111.8 and prior versions for Android 3.x and 2.x

Affected Products

References

APP:ADOBE-FLASH-RTMP-RCE

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.

Affected Products

References

APP:EMBARCADERO-CONNECT-OF

Description

This signature detects attempts to exploit a known vulnerability against Embarcadero InterBase. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Embarcadero InterBase XE is prone to a stack-based buffer-overflow vulnerability. Successful exploits will allow attackers to execute arbitrary code with SYSTEM privileges. Failed exploit attempts will result in a denial-of-service condition. A successful attack will completely compromise affected computers.

Affected Products

References

APP:HP-DATA-PROTECTOR-DOS

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector Express. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Express is prone to a privilege-escalation vulnerability. Attackers can exploit this issue to execute arbitrary code with escalated privileges or cause denial-of-service conditions. Successfully exploiting this issue may result in the complete compromise of affected computers. UPDATE (June 23, 2009): This issue was originally reported as a local vulnerability. Additional reports indicate that remote attacks are possible. The issue affects the following: HP Data Protector Express and SSE 3.x prior to build 47065 HP Data Protector Express and SSE 4.x prior to build 46537

Affected Products

References

APP:LANDESK-OF

Description

This signature detects attempts to exploit a known vulnerability in LANDesk Management Suite. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

LANDesk Management Suite is prone to a remote stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue would result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects LANDesk Management Suite 8.7; prior versions may also be affected.

Affected Products

References

APP:PEERCAST-FS

Description

This signature detects attempts to exploit a known vulnerability against PeerCast. A format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code through format strings sent in a URL.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

PeerCast is affected by a remote format string vulnerability. The vulnerability arises when the server attempts to handle a malformed HTTP GET request. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access. PeerCast 0.1211 and prior versions are affected by this issue.

Affected Products

References

APP:APPLE-CUPS-PNG-FILTER-OF

Description

This signature detects attempts to exploit a known vulnerability in the Apple CUPS PNG Filter. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

CUPS is prone to an integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied PNG image sizes before using them to allocate memory buffers. Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. Versions prior to CUPS 1.3.10 are vulnerable.

Affected Products

References

APP:SQUID-HTCP-DOS

Description

A denial of service vulnerability exists in Squid Proxy. The vulnerability is due to a NULL pointer dereference when processing specially crafted Hypertext Caching Protocol (HTCP) packets. Remote attackers can exploit this issue by sending a malicious HTCP request to the target server. Successful exploitation could terminate the affected server process abnormally and result in a denial of service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Squid Web Proxy Cache is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users.

Affected Products

References

APP:WEBSENSE-TRITON-RCE

Description

This signature detects attempts to exploit a known flaw in Websense Triton. A successful attack would result in SYSTEM-level command execution. This vector is normally protected by SSL/TLS encryption. In such cases, in order for the IDP to protect your server, the SSL private key must be loaded on the IDP, the SSL Forward Proxy feature must be utilized, or some other SSL off-loading system must be used.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Websense Triton is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.

Affected Products

References

APP:QUEST-BIG-BRO-FD

Description

This signature detects attempts to exploit a known vulnerability in the Quest Software Big Brother bbntd.exe component. These vulnerabilities allow a remote attacker to delete or overwrite arbitrary files using the "page" and "ack addtag_event" commands, respectively. A successful attack can result in execution of arbitrary code with privileges up to and including SYSTEM, depending on the file being replaced.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:RIM-BLACKBERRY-DOS

Description

This signature detects a packet creating a denial of service in the RIM BlackBerry Server product. The communication between BlackBerry routers can be disrupted by sending crafted Service Routing Protocol (SRP) messages. A remote unauthenticated attacker can cause a denial-of- service condition of the BlackBerry service.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The Blackberry Enterprise Server Router component is prone to a denial of service vulnerability. This vulnerability may be triggered by sending malformed SRP (Server Routing Protocol) packets to the Router. This could only be exploited by an attacker who can communicate with the Router.

Affected Products

References

APP:HP-DATA-PRTCTR-EXEC_SETUP

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP OpenView Storage Data Protector is prone to multiple remote code-execution vulnerabilities that affect the Cell Manager and Client components. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

References

APP:ADOBE-FLASH-MEDIA-SRVR

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Media Server. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

The Adobe Flash Media Server is prone to a remote denial-of-service vulnerability. Successful exploits will allow attackers to crash the affected application, denying service to legitimate users. Due to the nature of this issue, arbitrary code execution may be possible; however, this has not been confirmed.

Affected Products

References

APP:VMAUTH-FS

Description

A denial of service vulnerability has been reported in the authorization service of some VMware products. The flaw is due to a design error when processing login requests. An attacker can exploit this vulnerability by supplying malicious USER or PASS strings to the target host. Successful exploitation would result on the termination of the "vmware-authd" process causing a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

VMware Player and Workstation are prone to a remote denial-of-service vulnerability because the applications fail to perform adequate validation checks on user-supplied input. An attacker can exploit this issue to crash the 'vmware-authd' process, denying service to legitimate users. NOTE: This issue was also covered in BID 39345 (VMware Hosted Products VMSA-2010-0007 Multiple Remote and Local Vulnerabilities); this BID is being retained to properly document the issue.

Affected Products

References

APP:RDP-BRUTE-FORCE

Description

This signature detects numerous Windows Remote Desktop Protocol (RDP) connections between two peers in a short period of time, which can be an indication of a Brute Force Attack (also known as a "Dictionary Attack"). An attacker may be attempting to guess valid credentials on an RDP-enabled Windows PC. A successful attack could result in arbitrary code execution with the privileges of the compromised credentials.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:HP-PM-EXP-DATA-LOGS

Description

This signature detects attempts to exploit a known buffer overflow vulnerability in HP Power Manager. It is due to insufficient bounds checking in the HP Power Manager while processing URL parameters. In a successful code execution attack the injected code is executed within the security context of the SYSTEM user. An unsuccessful exploit attempt can terminate the affected service abnormally and result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Power Manager is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code with SYSTEM privileges, resulting in a complete compromise of the affected computer. Failed exploit attempts will result in a denial-of-service condition. NOTE: This BID initially referenced CVE-2009-3999 and CVE-2009-4000. These issues are now described in BID 37867 (CVE-2009-3999) and BID 37873 (CVE-2009-4000). Versions prior to Power Manager 4.2.10 are affected.

Affected Products

References

APP:HP-DATA-PRTCTR-EXEC_CMD-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP OpenView Storage Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP OpenView Storage Data Protector is prone to a stack-based buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue by sending specially crafted packets to TCP port 5555. Successful exploits will allow attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. HP OpenView Storage Data Protector versions 6.0, 6.10, 6.11 and 6.20 are vulnerable.

Affected Products

References

APP:MAL-AFP-DSI-REQ

Description

This signature detects malformed Apple Filing Protocol requests. Certain products, such as Novell Netware, are vulnerable to such requests. Successful attacks could result in a denial-of-service condition or possibly remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Novell NetWare is prone to multiple remote denial-of-service vulnerabilities. A remote attacker can exploit these issues to consume an excessive amount of resources or to crash the affected computer, denying service to legitimate users. NetWare 6.5 SP8 is vulnerable; other versions may also be affected.

Affected Products

References

APP:SAFENET-VPN-OF

Description

This signature detects attempts to exploit a known vulnerability in the SafeNet IKE module. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

SafeNet SoftRemote is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. Versions prior to SoftRemote 10.8.6 are vulnerable.

Affected Products

References

APP:CPANEL-RESETPASS

Description

This signature detects attempts to remotely execute a command on a cPanel system. There is a feature which allows users to reset their passwords by email; when this feature is enabled, it allows users to execute commands as root.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

A potential remote command execution vulnerability has been discovered in the cPanel Application. This issue occurs due to insufficient sanitization of externally supplied data to the script that handles resetting user passwords. An attacker may exploit this problem by crafting a malicious URI request for the affected script; the attacker may then supply shell metacharacters and arbitrary commands as a value for the affected variable.

Affected Products

References

APP:KINDLE-BROWSER-NPAPI-RCE

Description

This signature detects attempts to exploit a known vulnerability against Kindle Touch Browser. A successful attack can lead to arbitrary code execution. Version 5.1.0 is affected by this vulnerability.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:NOW-SMS-OF-MSF

Description

This signature detects attempts to exploit a known vulnerability against Now Wireless Now SMS/MMS Gateway. Attackers can execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. This signature is based of the public PoC available in Metasploit Exploit Framework.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:CDE-DTSPCD-OF

Description

This signature detects attempts to exploit a known vulnerability against CDE, a Motif-based GUI for UNIX systems. Attackers can use dtspcd, a server program that listens on TCP/6112, to overflow the buffer in the libDtSvc library and gain administrative privileges. This signature can also trigger on Bittorent traffic running on TCP/6112.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

CDE is a Motif-based graphical user environment for UNIX systems. It is shipped with a number of commercial systems. A buffer-overflow vulnerability in the 'dtspcd' component may allow a remote attacker to gain administrative privileges on the affected host. The overflow is believed to be in the libDtSvc library, which used by the 'Subprocess Control Service'. The overflow is exploitable through the 'dtspcd' service,a server utility that facilitates remote invocation of CDE utilities and commands. The 'dtspcd' service listens on TCP port 6112, runs with root privileges, and is enabled by default (through 'inetd') on many systems.

Affected Products

References

APP:POSTFIX-GREYLISTD-OF

Description

This signature detects attempts to exploit a known vulnerability in the Postfix Greyisting daemon. A successful exploit can lead to a buffer overflow and remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

It is reported that GLD contains a buffer overflow vulnerability. This issue is due to a failure of the application to properly ensure that a fixed-size memory buffer is sufficiently large prior to copying user-supplied input data into it. Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers. GLD version 1.4 is reportedly affected, but prior versions may also be affected.

Affected Products

References

APP:MCAFEE-ORCH-BO

Description

This signature detects attempts to exploit a known vulnerability in McAfee ePolicy Orchestrator. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

McAfee Common Management Agent is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users.

Affected Products

References

APP:JBOSS-JMX-AUTH-BYPASS

Description

This signature detects attempts to exploit a known authentication bypass vulnerability in the RedHat JBoss Enterprise Application Platform JMX Console. This is caused by the authentication policy within the application that only enforces restrictions for GET and POST methods, other HTTP request verbs bypass authentication. Unauthenticated remote attackers can exploit this to gain administrative access to JBoss JMX management console and to upload and execute arbitrary Java code within the security context of the JBoss server process, normally SYSTEM on Windows platforms.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

JBoss Enterprise Application Platform is prone to multiple vulnerabilities, including an information-disclosure issue and multiple authentication-bypass issues. An attacker can exploit these issues to bypass certain security restrictions to obtain sensitive information or gain unauthorized access to the application.

Affected Products

References

APP:HP-DATA-PRTCTR-OPCODE

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 6.2X allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-2008.

Affected Products

References

APP:INTERSYSTEMS-CACHE-OF

Description

This signature detects attempts to exploit a known flaw in InterSystems Cache server. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

InterSystems Cache is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts will result in denial-of-service conditions. InterSystems Cache 2009.1 is vulnerable; other versions may also be affected.

Affected Products

References

APP:BOMBER-BO

Description

This signature detects attempts to exploit a known vulnerability in the Bomberclone. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user that is running the application. This signature is based on the public PoC in the Metasploit Framework.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

BomberClone is prone to a buffer-overflow vulnerability. This issue is due to a failure in the application to perform proper boundary checks on user-supplied data before storing it in a finite sized buffer. This issue may be exploited to execute arbitrary code in the context of the user who is running the application. Version 0.11.6.2 is vulnerable; other versions may also be affected.

Affected Products

References

APP:IA-WEBMAIL-OF

Description

This signature detects attempts to exploit a known flaw in IA WebMail. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

IA WebMail Server is said to be prone to a remote buffer overrun that could allow an attacker to execute arbitrary code. The problem occurs due to insufficient bounds checking when handling GET requests. As a result, an attacker may be capable of overrunning the bounds of an internal memory buffer and effectively control the flow of execution.

Affected Products

References

APP:VIDEOSPIRIT-OF

Description

This signature detects attempts to exploit a known vulnerability in the VideoSpirit Pro. A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:YOUSENDIT-ENCRYPTED

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:VMWARE-SPRING-CLASSLOADER

Description

This signature detects attempts to exploit a known remote code execution vulnerability in VMware SpringSource. It is due to a design weakness in the Web application framework. A remote attacker can leverage this weakness by sending a crafted HTTP request to a target system. A successful attack results in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Spring Framework is prone to a remote code-injection vulnerability. An attacker can exploit this issue to inject and execute arbitrary malicious Java code within the context of the affected application. Successful exploits will compromise the affected application and the underlying system; other attacks are also possible. Versions of Spring Framework prior to 3.03, 2.5.6.SEC02, and 2.5.7.SR01 are vulnerable.

Affected Products

References

APP:HP-DATA-PRTCTR-RDS-DOS

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:AGENTX-RECEIVE-INT-OF

Description

This signature detects attempts to exploit a known buffer overflow vulnerability in multiple products that use the AgentX++ software. It is due to an integer overflow error in AgentX::receive_agentx function that can lead to a heap buffer overflow. A remote unauthenticated attacker can exploit this by sending maximum payload length value in a packet to the target server. A successful attack allows for arbitrary code injection and execution with the privileges of the server process. Code injection that does not result in execution can terminate the application due to memory corruption and can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

AgentX++ is prone to a remote code-execution vulnerability. Exploiting this issue can let attackers execute arbitrary code within the context of the user running the AgentX master process; in some cases, the superuser may be the owner of the process. Failed attempts may cause the application to crash, denying service to legitimate users. AgentX++ 1.4.16 is vulnerable; other versions may also be affected. In addition, these issues affect versions prior to Helix Server and Helix Mobile Server 14.0. NOTE: This issue was previously covered in BID 39490 (RealNetworks Helix and Helix Mobile Server Multiple Remote Code Execution Vulnerabilities) but has been given its own record to better document it.

Affected Products

References

APP:TRACKERCAM-OF

Description

This signature detects attempts to exploit a known flaw in TrackerCam. A successful attack results in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

TrackerCam is prone to multiple remote vulnerabilities, including buffer-overflow issues, a directory-traversal issue, an information-disclosure issue, an HTML-injection issue, and denial-of-service issues. A remote attacker could exploit these issues to execute arbitrary code, obtain potentially sensitive information, launch phishing attacks or steal cookie based authentication credentials, and deny service to legitimate users.

Affected Products

References

APP:SPREECOMMERCE-RCE

Description

This signature detects attempts to exploit a known flaw in Spreecommerce related to the api/orders.json script in the search functions of the rd_searchlogic gem, which may allow a remote attacker to execute arbitrary commands.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:CHKPOINT-FW-WEBUI-REDIRECT

Description

This signature detects attempts to exploit a known vulnerability in the CheckPoint Firewall WebUI. It is due to insufficient validation of user-supplied input. A successful exploit may aid in phishing attacks, other attacks are possible.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP:FCKEDITOR-RCE-UPLOAD

Description

This signature detects attempts to exploit a known flaw in FCKeditor. FCKeditor is a web based open source HTML text editor. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

FCKeditor is prone to a vulnerability that lets attackers upload arbitrary files it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Versions prior to FCKeditor 2.6.4.1 are vulnerable.

Affected Products

References

APP:NOW-SMS-OF

Description

This signature detects attempts to exploit a known vulnerability in the Now SMS MMS Gateway. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the administrator.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Now SMS/MMS Gateway is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to insufficiently sized buffers. Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. These issues affect Now SMS/MMS Gateway 2007.06.27 and prior versions.

Affected Products

References

APP:HP-PWR-MGR-DIR-TRAV

Description

This signature detects attempts to exploit a known vulnerability in the HP Power Manager UPS management system. It is due to an input validation error while processing parameters sent to the formExportDataLogs form of the Web based management Web server. Remote unauthenticated attackers can exploit this to overwrite arbitrary files with attacker-controlled data on the target system by sending malicious HTTP requests. Successful exploitation can lead to injection and execution of arbitrary code on the target system within the security context of SYSTEM.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

HP Power Manager is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code with SYSTEM privileges, resulting in a complete compromise of the affected computer. Failed exploit attempts will result in a denial-of-service condition. NOTE: This BID initially referenced CVE-2009-3999 and CVE-2009-4000. These issues are now described in BID 37867 (CVE-2009-3999) and BID 37873 (CVE-2009-4000). Versions prior to Power Manager 4.2.10 are affected.

Affected Products

References

APP:DISKPULSE-GETSERVERINFO-OF

Description

This signature detects attempts to exploit a known remote code-execution vulnerability in DiskPulse Server. It is because it fails to properly bounds-check user-supplied data. Specifically, a buffer-overflow condition occurs when an overly long string is provided in the "GetServerInfo" request. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts can cause denial-of-service conditions.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

DiskPulse Server is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. DiskPulse Server 2.2.34 is vulnerable; other versions may also be affected.

Affected Products

References

APP:RSLOGIX-RSVCHOST-DOS

Description

This signature detects attempts to exploit a known vulnerability in the Rockwell RSLogix RsvcHost.exe. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

RSLogix is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the application, denying service to legitimate users. RSLogix 5000 is vulnerable. Other versions may also be affected.

Affected Products

References

APP:APPLE-SIRI

Description

This signature detects the Apple Siri application being used. Siri is a natural-language voice recognition system used to interact with Apple iPhone and similar products in order to find information, make appointments, set reminders, and similar personal assistant functions. Its use on your network may be a violation of your organization's Acceptable Use Policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

References

APP:HP-DATA-PROTECTOR-GET-SQL

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

Extended Description

Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1225.

Affected Products

References

APP:HP-DATA-PROTECTOR-REQ-SQL

Description

This signature detects attempts to exploit a known vulnerabil